Conversation
|
Some optional additions: 1. System prompt immutability: 2. Manual kill switch 3. Cascading failure containment 4. Behavioral baseline and drift detection 5. (9.6.2) concern This control says "without using the user's credentials," but the recommended pattern is for downstream services to enforce the user's access level, which requires user-scoped auth (delegated tokens, token exchange, or the service's native auth). 6. Minimize non-deterministic scope |
|
Thanks for the thorough review, these are well-researched points! My thoughts:
Coincidentally, I think this would be now consistent with your PR's (#150) good suggestion (also now both L2): "10.2.9 | Verify that MCP servers do not pass through access tokens received from clients to downstream APIs and instead obtain a separate token scoped to the server's own identity (e.g., via on-behalf-of or client credentials flow)."
|
|
Great feedback. Clean and fair. |
Revise C09 levels and terminology
Rebalances C09 level assignments and minor terminology improvements. Reordered accordingly.
Level changes
Language and terminology changes
References added