Skip to content

Rule Reference

SEC697lintai-ai-securitystablejsonwarn

MCP config: clipboard exfiltration

MCP configuration command exfiltrates clipboard contents over the network

Provider
lintai-ai-security
Surface
json
Scope
per_file
Tier
stable
Severity
warn
Confidence
high
Detection
structural
Remediation
message_only

Activation Model

Preset Membership

This rule is part of the builtin activation graph through these preset memberships.

Lifecycle

Stable Lifecycle Contract

State

stable_gated

Graduation rationale

Checks committed MCP launch paths for clipboard-reading commands that also transmit captured data to remote destinations.

Deterministic signal basis

JsonSignals command-plus-args analysis over ArtifactKind::McpConfig for clipboard read utilities such as `pbpaste`, `wl-paste`, `xclip -o`, `xsel --output`, or PowerShell `Get-Clipboard` combined with remote sinks such as `curl`, `wget`, `scp`, `rsync`, `nc`, or HTTP(S) endpoints.

Malicious corpus
mcp-command-local-data-exfil
Benign corpus
mcp-safe-basic
structured evidence required remediation reviewed
Canonical note

Structural stable rule intended as a high-precision check with deterministic evidence.

Nearby Signals

Related Rules

Why It Matters

A committed MCP launcher that reads and transmits clipboard contents can silently steal copied secrets whenever the tool is invoked.

What Triggers

SEC697 matches committed MCP command paths that combine clipboard-reading utilities such as pbpaste, wl-paste, xclip -o, xsel --output, or PowerShell Get-Clipboard with remote sinks such as curl, wget, scp, rsync, nc, or HTTP(S) endpoints.

False Positives

Committed MCP launchers should not read and transmit clipboard contents. If clipboard input is genuinely needed, it should happen through explicit user interaction rather than a shared committed command.

Remediation

Remove network exfiltration of clipboard contents from the committed MCP launch path and require explicit input instead of harvesting local clipboard state.