Appearance
Why It Matters
Keylogging from a committed MCP launch path is spyware behavior because it can silently capture secrets, credentials, prompts, and private communications typed by the developer.
What Triggers
SEC729 matches MCP commands that invoke explicit keylogger primitives such as logkeys, xinput test, evtest, showkey, PowerShell GetAsyncKeyState, or inline Python listener markers like pynput.keyboard.Listener.
False Positives
Shared committed MCP launch paths should not capture keyboard input. Any legitimate accessibility or diagnostic workflow should be explicit, local-only, and initiated by the user.
Remediation
Remove keystroke capture or keylogger behavior from the committed MCP launch path and require deliberate user-driven diagnostics outside shared automation.