-
-
Notifications
You must be signed in to change notification settings - Fork 563
Open
Description
Hello from Anthropic! Thanks for submitting this to our desktop extension registry; we're excited about your submission. We have a few follow-up requests.
Welcome feedback to understand which of these is feasible / acceptable within the desired functionality of this extension.
Must Fix
- Add destructive operation annotations to all modifying tools
- Provide clear privacy policy explaining data collection
- Because you collect usage data that you transmit to GA, we ought to provide some a privacy policy (at minimum) and opt-out (ideally) - we've updated the spec to include a
privacy_policiesfield
- Because you collect usage data that you transmit to GA, we ought to provide some a privacy policy (at minimum) and opt-out (ideally) - we've updated the spec to include a
Nice-to-haves:
- command allowlisting (vs. blocklisting)
- Add mandatory sandboxing for file system access (file operations must happen within a defined workspace directory)
- explicitly block access to:
- system directories (e.g. /etc, /sys, /proc, /dev)
- user sensitive files (~/.ssh, ~/.aws, ~/.config)
- block reading binary executables
- read-only mode - option to start server with no write permissions
- Remove or heavily restrict process killing capabilities
- consider: only allow killing processes started by the MCP server itself
wonderwhy-er
Metadata
Metadata
Assignees
Labels
No labels