Appearance
Why It Matters
Committed MCP launch paths should not upload local credential files or secret-bearing config files to remote buckets, endpoints, or hosts.
What Triggers
SEC684 matches MCP command and args combinations that pair sensitive file paths like .env, ~/.aws/credentials, ~/.ssh/id_rsa, or ~/.kube/config with transfer commands such as scp, rsync, curl --upload-file, aws s3 cp, or gsutil cp.
False Positives
If a server genuinely needs a credential file, it should read it locally on the host where it runs. Shipping a launcher that uploads the file elsewhere is a distinct and risky behavior.
Remediation
Remove the remote transfer of sensitive credential files from the committed MCP launch path and keep credential files local to the trusted runtime.