You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
A vendor pitching an external "runtime security gateway for MCP agents" (inspecting tool definitions, tool-call arguments, RBAC, and responses) prompted a review of flAPI's own posture. Exposing data warehouses to AI agents over MCP is genuinely high-risk, and a code audit confirms several gaps worth closing in-product rather than punting to an external sidecar.
This epic tracks a prioritized roadmap covering both general and MCP-specific security, MCP first, under a guiding constraint: simple things must stay simple. Defaults remain safe; hardening is opt-in for production but never required for flapii project init demos to work.
TLS in embedded server (schema present, not wired)
Partial
Per-user rate limit (per-IP only today)
Gap
Secrets in logs (JWT secrets, DB passwords leak at DEBUG)
Gap
Guiding principles
Safe defaults, simple opt-in for production hardening. Fresh flapii project init must still work without auth config.
No breaking config changes without a deprecation warning at startup.
MCP-first ordering — blast radius of an unrestricted agent > misconfigured REST endpoint.
Build the inspection points the vendor sells, into flAPI itself — per-tool RBAC + per-call audit + dry-run need access to the tool registry and result shape, which a sidecar cannot see without re-parsing config.
Context
A vendor pitching an external "runtime security gateway for MCP agents" (inspecting tool definitions, tool-call arguments, RBAC, and responses) prompted a review of flAPI's own posture. Exposing data warehouses to AI agents over MCP is genuinely high-risk, and a code audit confirms several gaps worth closing in-product rather than punting to an external sidecar.
This epic tracks a prioritized roadmap covering both general and MCP-specific security, MCP first, under a guiding constraint: simple things must stay simple. Defaults remain safe; hardening is opt-in for production but never required for
flapii project initdemos to work.Current state (audit summary)
RequestValidator)mcp-tool:)Guiding principles
flapii project initmust still work without auth config.Roadmap (waves tracked as child issues)
Mapping to the vendor pitch
The pitch — "shadow-mode audit and query inspection before production" — maps almost 1:1 onto:
RequestValidator; extended by W2.1 (RBAC) and W1.3 (audit)Out of scope
auth.rolesin context — documentation improvement instead)