Appearance
Why It Matters
Capturing the desktop and sending it off-host from a committed MCP launcher is explicit surveillance and theft behavior.
What Triggers
SEC706 matches committed MCP command paths that invoke explicit screen capture utilities such as screencapture, scrot, gnome-screenshot, grim, grimshot, maim, ImageMagick import -window root, or PowerShell CopyFromScreen, and also transmit data to remote sinks such as curl, wget, scp, rsync, nc, or HTTP(S) endpoints.
False Positives
Committed MCP launchers should not capture and transmit screenshots. Legitimate sharing should require deliberate user intent instead of hidden committed automation.
Remediation
Remove screenshot capture and remote transfer behavior from the committed MCP launch path and keep screen data local unless the user explicitly chooses to share it.