-
-
Notifications
You must be signed in to change notification settings - Fork 253
new active script to detect open mcp servers #499
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
|
Great job! No new security vulnerabilities introduced in this pull requestUse @Checkmarx to reach out to us for assistance. Just send a PR comment with Examples: |
|
@bananabr thanks for this PR! Am I right in thinking that the paths you're checking should be absolute, ie Do you have any links to example MCP servers which this rule detects so we can test it? The build is failing, but it looks like you can fix that with |
|
The file name and code link don't match. They should also follow the naming guidance: https://github.com/zaproxy/community-scripts/blob/main/CONTRIBUTING.md#naming-scripts |
|
|
||
| function getMetadata() { | ||
| return ScanRuleMetadata.fromYaml(` | ||
| id: 100030 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Please reserve an ID by opening a PR against: https://github.com/zaproxy/zaproxy/blob/main/docs/scanners.md
| category: server | ||
| risk: medium | ||
| confidence: medium | ||
| cweId: 200 # CWE-200: Information Exposure |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
| .setCweId(200) | ||
| .setWascId(13) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Details that are set/common in the metadata block don't need to be re-set here.


This script detects potentially exposed MCP servers by sending MCP initialization requests