Replies: 1 comment 1 reply
-
|
I like the hash-bound approval direction, especially for mutations where the agent can transform intent into a materially different final action. One extra boundary I would want is a final pre-execution scan over the exact A pattern we are testing in Armorer Guard is:
The MCP proxy shape is useful here because it can sit immediately before the wrapped server receives armorer-guard mcp-proxy -- npx your-mcp-serverDemo if useful for testing the UX: https://huggingface.co/spaces/armorer-labs/armorer-guard-demo Curious whether you imagine the hash-bound approval as purely client-side UX, or whether servers should also receive a policy/approval artifact they can verify. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
Pre-submission Checklist
Discussion Topic
Hash-bound (or cryptographic) approval for high-risk MCP mutations?
I opened a more concrete Kubernetes-focused RFC here:
containers/kubernetes-mcp-server#1150
I wanted to ask whether this problem belongs at the broader MCP level as an optional mutation-approval profile.
MCP already has useful foundations: tool annotations, human-in-the-loop guidance, and URL-mode elicitation for out-of-band flows. What I’m exploring is whether high-risk mutation tools need a portable lifecycle around the approval itself:
plan: server creates a concrete mutation plan, dry-run result, policy findings, and digestchallenge: server creates a time-bounded, identity-bound approval challenge for that exact planexecute: server verifies the digest, approval state, TTL, requester/approver binding, and current dry-run result before mutatingThe concern is not simply “should the user be asked before a dangerous tool runs?” Existing confirmation/elicitation mechanisms can do that.
The narrower concern is: did the human approve the exact mutation payload that was later executed?
This seems especially relevant for MCP servers that mutate real infrastructure: Kubernetes, cloud resources, CI/CD, IAM, databases, incident response systems, etc.
I have a reference implementation and SafetyE2E tests in Kubernetes-MCP-Guard, but I’m not proposing that implementation specifically. I’m asking whether MCP would benefit from a small optional interoperability profile for digest-bound mutation approval.
Questions:
Beta Was this translation helpful? Give feedback.
All reactions