MCP Tool Validation
Generated by π€ AI
GenAIScript added a few feature to secure Model Context Protocol (MCP) tools and mitigate specific attacks such as rug pull, tool poisoning, or prompt injection.
Starting with v1.127, you can configure the following options as documented here:
- tools signature hash to prevent rug pull attacks, where the list of tools is modified without your knowledge.
script({ mcpServers: { playwright: { ..., toolsSha: "..." } }})- prompt injection detect using content safety scanner. This will scan both the tools definition file, to prevent tool poisoning and every tool output, to prevent prompt injection.
script({ mcpServers: { playwright: { ..., detectPromptInjection: "always" } }})- in fact, every tool can be instrumented with content safety scanning.
defTool("fetch", "Fetch a URL", { url: { type: "string" }, }, async args => ..., { detectPromptInjection: "always"})Are we done?
Section titled βAre we done?βThere are still many other security aspects to consider when using MCP tools, these features are just a few of them.