-
Notifications
You must be signed in to change notification settings - Fork 231
update doc for unsecure option #323
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Pull Request Overview
This PR updates documentation for the --enable-insecure-transports
command line option to provide clearer security warnings. The change makes it more explicit that this option enables unauthenticated HTTP transport and poses security risks.
Key Changes
- Enhanced XML documentation comment for the
EnableInsecureTransports
property - Updated command line option description to include specific security warnings
Reviewed Changes
Copilot reviewed 2 out of 2 changed files in this pull request and generated no comments.
File | Description |
---|---|
core/Azure.Mcp.Core/src/Areas/Server/Options/ServiceStartOptions.cs | Added detailed security warning to XML documentation for EnableInsecureTransports property |
core/Azure.Mcp.Core/src/Areas/Server/Options/ServiceOptionDefinitions.cs | Updated command line option description with explicit security warnings |
Comments suppressed due to low confidence (1)
core/Azure.Mcp.Core/src/Areas/Server/Options/ServiceStartOptions.cs:1
- There's a duplicate word 'mode' in the documentation comment. It should be 'Gets or sets the mode for the server.'
// Copyright (c) Microsoft Corporation.
$"--{EnableInsecureTransportsName}", | ||
() => false, | ||
"Enable insecure transport") | ||
"Enables insecure, unauthenticated transport over streamable HTTP. Use with extreme caution, this disables all transport security and may expose sensitive data to interception.") |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Please rebase
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Description needs to be explicitly set
@anuchandy please follow up |
@anuchandy are you planning to merge this PR or should it be closed? |
What does this PR do?
[Provide a clear, concise description of the changes]
[Any additional context, screenshots, or information that helps reviewers]
Adding additional text on the
--enable-insecure-transport
switch that indicates that connections to the streamable http transport are not authenticated, making it clear why it's marked as insecure.GitHub issue number?
[Link to the GitHub issue this PR addresses]
Pre-merge Checklist
CHANGELOG.md
for product changes (features, bug fixes, UI/UX, updated dependencies
)README.md
documentation/docs/azmcp-commands.md
/docs/e2eTestPrompts.md
ToolDescriptionEvaluator
and obtained a score of0.4
or more and a top 3 ranking for all related test promptscrypto mining, spam, data exfiltration, etc.
)/azp run mcp - pullrequest - live
to run Live Test Pipeline