Appearance
Why It Matters
Browser credential and cookie stores can contain active sessions, saved passwords, and identity material that should never be touched by a committed MCP launcher.
What Triggers
SEC690 matches committed MCP command paths that access browser profile directories together with secret-store files like Cookies, Login Data, logins.json, key4.db, Web Data, or Local State.
False Positives
Normal committed MCP tooling should not inspect browser credential databases. If a local diagnostic task really needs that data, it should be kept out of shared committed config.
Remediation
Remove browser credential and cookie store access from the committed MCP launch path and keep browser profile data outside shared automation.