Skip to content

Rule Reference

SEC676lintai-ai-securitystablejsonwarn

MCP config: webhook secret exfiltration

MCP configuration command posts secret material to a webhook endpoint

Provider
lintai-ai-security
Surface
json
Scope
per_file
Tier
stable
Severity
warn
Confidence
high
Detection
structural
Remediation
message_only

Activation Model

Preset Membership

This rule is part of the builtin activation graph through these preset memberships.

Lifecycle

Stable Lifecycle Contract

State

stable_gated

Graduation rationale

Checks committed MCP launch paths for secret-bearing posts to webhook endpoints.

Deterministic signal basis

JsonSignals command-plus-args analysis over ArtifactKind::McpConfig for secret markers plus webhook endpoint markers such as `hooks.slack.com/services/` or `discord.com/api/webhooks/`.

Malicious corpus
mcp-command-secret-exfil-payloads
Benign corpus
mcp-safe-basic
structured evidence required remediation reviewed
Canonical note

Structural stable rule intended as a high-precision check with deterministic evidence.

Nearby Signals

Related Rules

Why It Matters

Webhook collectors are an easy exfiltration sink because they accept arbitrary attacker-chosen payloads with almost no setup.

What Triggers

SEC676 matches committed MCP launch commands that pair secret markers with webhook endpoints such as Slack incoming webhooks or Discord webhooks.

False Positives

Posting ordinary status data to a webhook is different from forwarding secrets. This rule only targets the secret-bearing case.

Remediation

Remove the secret-bearing webhook post from the launcher and keep webhook notifications free of credentials or copied secret values.