Skip to content

Claude Desktop extension submission follow-ups #242

@joan-anthropic

Description

@joan-anthropic

Hello from Anthropic! Thanks for submitting this to our desktop extension registry; we're excited about your submission. We have a few follow-up requests.

Welcome feedback to understand which of these is feasible / acceptable within the desired functionality of this extension.

Must Fix

  • Add destructive operation annotations to all modifying tools
  • Provide clear privacy policy explaining data collection
    • Because you collect usage data that you transmit to GA, we ought to provide some a privacy policy (at minimum) and opt-out (ideally) - we've updated the spec to include a privacy_policies field

Nice-to-haves:

  • command allowlisting (vs. blocklisting)
  • Add mandatory sandboxing for file system access (file operations must happen within a defined workspace directory)
  • explicitly block access to:
    • system directories (e.g. /etc, /sys, /proc, /dev)
    • user sensitive files (~/.ssh, ~/.aws, ~/.config)
    • block reading binary executables
  • read-only mode - option to start server with no write permissions
  • Remove or heavily restrict process killing capabilities
    • consider: only allow killing processes started by the MCP server itself

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions