Add a new security rule for MCP (Model Context Protocol) implementations based on the CoSAI (Coalition for Secure AI) MCP Security paper approved by the OASIS Project Governing Board (January 2026).
Background
MCP has rapidly established itself as the protocol for transmitting structured context between AI agents and services. Given the growing importance and attack surface of MCP and agentic systems, it is imperative that deployment-specific security threats are identified and mitigations are implemented.
Multiple critical CVEs have been reported and incidents such as data leakage have already occurred across MCP/agentic deployments, including:
- Asana AI incident (May 2025): Tenant isolation flaw allowing cross-organization data contamination
- WordPress Plugin vulnerability: Over 100,000 sites affected by privilege escalation via MCP
- Supabase MCP Issue: Prompt injection via support ticket data exposing private tables
Reference
Proposed Rule ID
codeguard-0-mcp-security
Always Apply
false - This rule should be applied when MCP implementations are detected (probably python, go, typescript, etc.)
Checklist
Add a new security rule for MCP (Model Context Protocol) implementations based on the CoSAI (Coalition for Secure AI) MCP Security paper approved by the OASIS Project Governing Board (January 2026).
Background
MCP has rapidly established itself as the protocol for transmitting structured context between AI agents and services. Given the growing importance and attack surface of MCP and agentic systems, it is imperative that deployment-specific security threats are identified and mitigations are implemented.
Multiple critical CVEs have been reported and incidents such as data leakage have already occurred across MCP/agentic deployments, including:
Reference
Proposed Rule ID
codeguard-0-mcp-securityAlways Apply
false- This rule should be applied when MCP implementations are detected (probably python, go, typescript, etc.)Checklist
sources/core/codeguard-0-mcp-security.md