Skip to content

Proposal: Further hardening container images for MCP #90

@Mossaka

Description

@Mossaka

Since Agentic Workflows support running custom MCP servers in Docker Containers, we should take advantage of the robust set of security features that container or Open Container Initiative (OCI) provides that are designed to further restrict and secure containerized applications. I'd like to write down a list of features that are in addition to #78 and github/gh-aw-mcpg#275

  • Image Signing: verify that the image has not been tampered with since it was signed
  • Seccomp: Filter and restrict the system calls a container can make to the host kernel
  • AppArmor & SELinux: Use Mandatory Access Control (MAC) profiles to confine container actions, such as file access and network operations.
  • Run as Non-Root: The best practice is to run container processes as a non-privileged user
  • Linux Capabilities: We can remove all default Linux capabilities and add back only those that are strictly necessary (--cap-drop=ALL)
  • Resource Limits (cgroups): Constrain CPU and memory usage to prevent Denial of Service (DoS) attacks

Metadata

Metadata

Assignees

Labels

enhancementNew feature or request

Type

No type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions