mcp-stdio-guard 0.3.0 → 0.4.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +144 -13
- package/package.json +1 -1
- package/src/index.js +1558 -76
package/README.md
CHANGED
|
@@ -11,7 +11,7 @@
|
|
|
11
11
|
<p align="center">
|
|
12
12
|
<a href="https://github.com/1Utkarsh1/mcp-stdio-guard/actions/workflows/ci.yml"><img alt="CI" src="https://github.com/1Utkarsh1/mcp-stdio-guard/actions/workflows/ci.yml/badge.svg" /></a>
|
|
13
13
|
<a href="https://www.npmjs.com/package/mcp-stdio-guard"><img alt="npm" src="https://img.shields.io/npm/v/mcp-stdio-guard?color=0b6bcb" /></a>
|
|
14
|
-
<a href="https://badge.socket.dev/npm/package/mcp-stdio-guard/0.
|
|
14
|
+
<a href="https://badge.socket.dev/npm/package/mcp-stdio-guard/0.4.0"><img alt="Socket" src="https://badge.socket.dev/npm/package/mcp-stdio-guard/0.4.0" /></a>
|
|
15
15
|
<img alt="runtime dependencies" src="https://img.shields.io/badge/runtime%20deps-0-1f8f4c" />
|
|
16
16
|
<img alt="node" src="https://img.shields.io/badge/node-%3E%3D18-2f855a" />
|
|
17
17
|
<a href="LICENSE"><img alt="license" src="https://img.shields.io/badge/license-MIT-111827" /></a>
|
|
@@ -23,7 +23,7 @@
|
|
|
23
23
|
|
|
24
24
|
MCP stdio servers use stdout as their protocol channel. Debug text, banners, progress logs, `console.log`, Python `print`, or any other stray stdout output can corrupt the stream and make clients fail in confusing ways.
|
|
25
25
|
|
|
26
|
-
`mcp-stdio-guard` starts your server, performs a real MCP initialize handshake, optionally sends a real post-initialize MCP request such as `tools/list`, validates every stdout frame, and scans source for risky stdout calls.
|
|
26
|
+
`mcp-stdio-guard` starts your server, performs a real MCP initialize handshake, probes advertised `tools`, `resources`, and `prompts` list capabilities, optionally sends a real post-initialize MCP request such as `tools/list`, validates every stdout frame, checks returned tool metadata, and scans source for risky stdout calls.
|
|
27
27
|
|
|
28
28
|
## Why This Exists
|
|
29
29
|
|
|
@@ -60,13 +60,25 @@ Run your MCP server behind the guard:
|
|
|
60
60
|
mcp-stdio-guard -- node ./server.js
|
|
61
61
|
```
|
|
62
62
|
|
|
63
|
+
Use a deterministic profile for common workflows:
|
|
64
|
+
|
|
65
|
+
```bash
|
|
66
|
+
mcp-stdio-guard --profile registry --json -- node ./server.js
|
|
67
|
+
```
|
|
68
|
+
|
|
69
|
+
Use a config file for registry runs that need environment names, request lists, or explicitly safe tool calls:
|
|
70
|
+
|
|
71
|
+
```bash
|
|
72
|
+
mcp-stdio-guard --config mcp-stdio-guard.config.json
|
|
73
|
+
```
|
|
74
|
+
|
|
63
75
|
Exercise a real MCP operation after initialization:
|
|
64
76
|
|
|
65
77
|
```bash
|
|
66
78
|
mcp-stdio-guard --request tools/list -- node ./server.js
|
|
67
79
|
```
|
|
68
80
|
|
|
69
|
-
Scan source for obvious stdout writes too:
|
|
81
|
+
Scan source for obvious stdout writes too. Findings are warnings unless `--fail-on-static` is set:
|
|
70
82
|
|
|
71
83
|
```bash
|
|
72
84
|
mcp-stdio-guard --scan src --fail-on-static --request tools/list -- node ./server.js
|
|
@@ -99,6 +111,8 @@ mcp-stdio-guard --repeat 2 --request tools/list -- node ./server.js
|
|
|
99
111
|
| Invalid JSON-RPC frames | Yes | No |
|
|
100
112
|
| Server crash after `notifications/initialized` | Yes | No |
|
|
101
113
|
| Missing `initialize` or operation response | Yes | No |
|
|
114
|
+
| Duplicate tool names or invalid `inputSchema.required` | Yes with `--request tools/list` | No |
|
|
115
|
+
| Cold/warm protocol, capability, or tool-list drift | Warning with `--repeat` | No |
|
|
102
116
|
| stderr diagnostics | Allowed | Allowed |
|
|
103
117
|
|
|
104
118
|
## Live MCP Coverage
|
|
@@ -122,17 +136,74 @@ mcp-stdio-guard [options] -- <command> [args...]
|
|
|
122
136
|
|
|
123
137
|
| Option | Description |
|
|
124
138
|
| --- | --- |
|
|
139
|
+
| `--config <path>` | read a JSON config file for registry runs and explicitly safe tool calls |
|
|
140
|
+
| `--profile <name>` | apply a deterministic guard profile: `custom`, `smoke`, `registry`, `ci`, or `strict` |
|
|
125
141
|
| `--protocol <version>` | MCP protocol version to send, default `2025-11-25` |
|
|
126
142
|
| `--timeout <ms>` | initialize and request timeout, default `5000` |
|
|
127
143
|
| `--repeat <count>` | run the same guard multiple times to catch cold/warm startup behavior |
|
|
128
144
|
| `--request <method>` | send one MCP request after initialization, for example `tools/list` |
|
|
129
145
|
| `--params <json>` | JSON params for `--request` |
|
|
130
|
-
| `--scan <path>` | scan source for risky stdout writes |
|
|
146
|
+
| `--scan <path>` | scan source for risky stdout writes and visible startup-output risks |
|
|
131
147
|
| `--fail-on-static` | make static scan findings fail the command |
|
|
132
148
|
| `--json` | print machine-readable output |
|
|
133
149
|
| `--cwd <path>` | run the server command from a specific directory |
|
|
134
150
|
| `--help` | show help |
|
|
135
151
|
|
|
152
|
+
## Profiles
|
|
153
|
+
|
|
154
|
+
Profiles are deterministic presets for common workflows. Existing CLI behavior remains the default `custom` profile, so current commands keep working unless `--profile` is provided.
|
|
155
|
+
|
|
156
|
+
| Profile | Behavior |
|
|
157
|
+
| --- | --- |
|
|
158
|
+
| `custom` | preserve explicit CLI flags and legacy defaults |
|
|
159
|
+
| `smoke` | initialize only unless `--request` is provided; skip advertised `tools/list`, `resources/list`, and `prompts/list` probes |
|
|
160
|
+
| `registry` | run advertised list probes and repeat twice by default for cold/warm consistency |
|
|
161
|
+
| `ci` | emit JSON output and make static scan findings fail when `--scan` is used |
|
|
162
|
+
| `strict` | combine CI-style output/static failures with registry-style repeat depth; future adversarial probes will attach here |
|
|
163
|
+
|
|
164
|
+
Explicit flags can still narrow or deepen a profile. For example, `--profile registry --repeat 1` keeps registry capability probing but disables the repeat preset.
|
|
165
|
+
|
|
166
|
+
## Config Files
|
|
167
|
+
|
|
168
|
+
Config files let registries run repeatable checks without hiding what was executed. The file is JSON, and CLI flags still override matching config defaults. Parsing happens before the server process starts, so invalid config does not launch the target command.
|
|
169
|
+
|
|
170
|
+
Supported fields:
|
|
171
|
+
|
|
172
|
+
| Field | Meaning |
|
|
173
|
+
| --- | --- |
|
|
174
|
+
| `command` | command as either `["node", "./server.js"]` or `"node"` with `args` |
|
|
175
|
+
| `args` | arguments used only when `command` is a string |
|
|
176
|
+
| `cwd` | working directory, resolved relative to the config file |
|
|
177
|
+
| `env` | environment variables to pass; values are redacted in JSON output |
|
|
178
|
+
| `profile`, `protocol`, `timeoutMs`, `repeat`, `json` | same meaning as CLI options |
|
|
179
|
+
| `scan` or `scanPath` | source scan path, resolved relative to the config file |
|
|
180
|
+
| `failOnStatic` | make static scan findings fail |
|
|
181
|
+
| `request` | one explicit post-initialize request: `{ "method": "tools/list" }` |
|
|
182
|
+
| `requests` | list of explicit post-initialize requests |
|
|
183
|
+
| `safeToolCalls` | opt-in `tools/call` recipes; no tool is called unless listed here or explicitly requested |
|
|
184
|
+
|
|
185
|
+
Example:
|
|
186
|
+
|
|
187
|
+
```json
|
|
188
|
+
{
|
|
189
|
+
"profile": "registry",
|
|
190
|
+
"command": ["node", "./server.js"],
|
|
191
|
+
"cwd": ".",
|
|
192
|
+
"json": true,
|
|
193
|
+
"env": {
|
|
194
|
+
"API_TOKEN": "set-in-runner"
|
|
195
|
+
},
|
|
196
|
+
"requests": [
|
|
197
|
+
{ "method": "tools/list" }
|
|
198
|
+
],
|
|
199
|
+
"safeToolCalls": [
|
|
200
|
+
{ "name": "echo", "arguments": { "text": "hello" } }
|
|
201
|
+
]
|
|
202
|
+
}
|
|
203
|
+
```
|
|
204
|
+
|
|
205
|
+
The guard does not discover and call arbitrary tools from `tools/list`. Tool execution only happens through an explicit `safeToolCalls` entry or an explicit `tools/call` request you provide.
|
|
206
|
+
|
|
136
207
|
## JSON Contract
|
|
137
208
|
|
|
138
209
|
`--json` is intended for CI, registries, and badge ingestion. The current contract is `schemaVersion: 1`; new fields may be added, but these fields are stable for consumers:
|
|
@@ -141,21 +212,29 @@ mcp-stdio-guard [options] -- <command> [args...]
|
|
|
141
212
|
| --- | --- |
|
|
142
213
|
| `schemaVersion` | JSON contract version, currently `1` |
|
|
143
214
|
| `ok` | `true` when no error-severity issue was found |
|
|
215
|
+
| `config` | config file metadata and checks used, or `{ "enabled": false, ... }` |
|
|
216
|
+
| `profile` | selected guard profile, for example `custom`, `smoke`, `registry`, `ci`, or `strict` |
|
|
144
217
|
| `command` | command and arguments that were validated |
|
|
145
218
|
| `protocol` | MCP protocol version sent by the guard |
|
|
146
219
|
| `negotiatedProtocol` | protocol version returned by the server, when available |
|
|
147
220
|
| `initialized` | whether the server completed the initialize handshake |
|
|
148
221
|
| `operation` | post-initialize request result, or `null` when `--request` was not used |
|
|
222
|
+
| `operations` | all explicit post-initialize requests, including config requests and safe tool calls |
|
|
223
|
+
| `toolSchema` | summary of `tools/list` metadata validation when that operation was requested or probed from an advertised tools capability |
|
|
224
|
+
| `capabilityProbes` | whether advertised capability list probes were enabled for this run |
|
|
225
|
+
| `capabilityKeys` | sorted capability keys returned by `initialize` for a single run; repeat mode exposes this inside each `runs` entry |
|
|
226
|
+
| `capabilityChecks` | advertised capability probes observed during a single run; repeat mode exposes this inside each `runs` entry |
|
|
227
|
+
| `drift` | repeat-run comparison summary for negotiated protocol, advertised capabilities, tool names/counts, and resource/prompt list counts |
|
|
149
228
|
| `process` | startup, timeout, exit code, signal, and guard-termination metadata for a single run; repeat mode exposes this inside each `runs` entry |
|
|
150
229
|
| `checks` | badge-friendly per-class statuses |
|
|
151
230
|
| `issueClasses` | registry-friendly summary grouped by `installRuntime`, `stdioTransport`, and `mcpProtocol` |
|
|
152
231
|
| `fingerprint` | redacted reproducibility metadata for debugging registry and CI runs |
|
|
153
232
|
| `issues` | machine-readable diagnostics with `class`, `severity`, `code`, and `message`; repeat mode also adds `run` |
|
|
154
233
|
| `staticScan` | whether source scanning was enabled and whether findings fail the command |
|
|
155
|
-
| `staticFindings` | source scan findings with file, line, and message |
|
|
234
|
+
| `staticFindings` | source scan findings with language, file, line, reason, and message |
|
|
156
235
|
| `runs` | per-run results when `--repeat` is used |
|
|
157
236
|
|
|
158
|
-
Check statuses are `pass`, `fail`, `warning`, or `skipped`. The `checks` object separates the signal into `initialize`, `stdout`, `jsonRpc`, `operation`, `process`, `pythonBuffering`, `staticScan`, and `repeat`, each with stable `status` and `issueCodes` fields. When `--repeat` is used, `checks.repeat` also includes `runs`, `passedRuns`, and `failedRuns`; each entry in `runs` is a normal schema-versioned result for that individual guard run.
|
|
237
|
+
Check statuses are `pass`, `fail`, `warning`, or `skipped`. The `checks` object separates the signal into `initialize`, `stdout`, `jsonRpc`, `operation`, `capabilities`, `toolSchema`, `process`, `pythonBuffering`, `staticScan`, and `repeat`, each with stable `status` and `issueCodes` fields. When `--repeat` is used, `checks.repeat` also includes `runs`, `passedRuns`, and `failedRuns`; each entry in `runs` is a normal schema-versioned result for that individual guard run.
|
|
159
238
|
|
|
160
239
|
`issueClasses` is additive to `checks`. It groups issue codes by the kind of problem a registry or client should display:
|
|
161
240
|
|
|
@@ -171,12 +250,20 @@ Current issue-code mapping:
|
|
|
171
250
|
| --- | --- |
|
|
172
251
|
| `installRuntime` | `initialize-timeout`, `operation-missing-response`, `operation-timeout`, `python-buffered-stdio`, `server-crashed`, `server-exited`, `spawn-failed` |
|
|
173
252
|
| `stdioTransport` | `static-stdout-write`, `stdout-content-length-framing`, `stdout-empty-line`, `stdout-non-json`, `stdout-without-newline` |
|
|
174
|
-
| `mcpProtocol` | `initialize-error`, `initialize-invalid-capabilities`, `initialize-invalid-protocol-version`, `initialize-invalid-result`, `initialize-invalid-server-info`, `initialize-missing-capabilities`, `initialize-missing-protocol-version`, `initialize-missing-server-info`, `notification-response`, `operation-error`, `response-id-mismatch`, `response-id-type-mismatch`, `stdout-invalid-json-rpc`, `stdout-unexpected-request-id` |
|
|
253
|
+
| `mcpProtocol` | `capability-list-error`, `capability-list-missing-response`, `capability-list-timeout`, `capability-list-unsupported`, `initialize-error`, `initialize-invalid-capabilities`, `initialize-invalid-protocol-version`, `initialize-invalid-result`, `initialize-invalid-server-info`, `initialize-missing-capabilities`, `initialize-missing-protocol-version`, `initialize-missing-server-info`, `notification-response`, `operation-error`, `repeat-capability-drift`, `repeat-list-shape-drift`, `repeat-protocol-drift`, `repeat-tool-drift`, `response-id-mismatch`, `response-id-type-mismatch`, `stdout-invalid-json-rpc`, `stdout-unexpected-request-id`, `tool-description-missing`, `tool-input-schema-invalid`, `tool-input-schema-required-missing`, `tool-name-duplicate`, `tool-name-invalid`, `tools-list-invalid-result` |
|
|
175
254
|
|
|
176
255
|
Initialize lifecycle checks are part of the MCP protocol class. Missing or invalid `protocolVersion` and `capabilities` fail the run before the guard sends `notifications/initialized` or any normal request. Missing or invalid `serverInfo` is warning-level so registries can surface incomplete metadata without confusing it with a broken transport.
|
|
177
256
|
|
|
178
257
|
JSON-RPC invariant checks distinguish wrong response ids from id type round-trip problems and fail servers that respond to `notifications/initialized`. JSON-RPC error frames must be structured with numeric `code` and string `message` fields.
|
|
179
258
|
|
|
259
|
+
Tool schema checks run when `tools/list` receives a successful result, either from `--request tools/list` or from the advertised tools capability probe. Duplicate or invalid tool names, missing `inputSchema`, invalid schema shapes, and `required` entries that are absent from `properties` are MCP protocol failures. Missing tool descriptions are warning-level so registries can show quality guidance without marking the server broken.
|
|
260
|
+
|
|
261
|
+
Capability honesty checks are additive. If `initialize` advertises `capabilities.tools`, `capabilities.resources`, or `capabilities.prompts`, the guard probes the matching `tools/list`, `resources/list`, or `prompts/list` method after `notifications/initialized`. Unadvertised capabilities are `skipped`, not failed. `capability-list-unsupported` means an advertised list method returned method-not-found; `capability-list-error`, `capability-list-timeout`, and `capability-list-missing-response` mean the advertised list method existed in the contract but failed at runtime.
|
|
262
|
+
|
|
263
|
+
Repeat drift checks compare successful initialized runs against the first initialized run. Negotiated protocol changes, advertised capability key changes, added or removed tool names, tool count changes, and resource/prompt list count changes are warning-level `repeat-*` issues. Tool order is normalized before comparison, so order-only changes do not warn.
|
|
264
|
+
|
|
265
|
+
The repeat `drift` object has stable `status`, `issueCodes`, `baselineRun`, and `comparedRuns` fields. Its nested `negotiatedProtocol`, `capabilities`, `tools`, `lists.resources`, and `lists.prompts` sections include `changedRuns` so registries can show exactly what changed between cold and warm starts.
|
|
266
|
+
|
|
180
267
|
Runtime issue codes remain backward-compatible. For finer registry display, runtime issues may also include a stable `detailCode`:
|
|
181
268
|
|
|
182
269
|
| Existing issue code | Detail codes |
|
|
@@ -205,8 +292,11 @@ Registry display flow:
|
|
|
205
292
|
| --- | --- |
|
|
206
293
|
| 1 | Show `issueClasses` first so install/runtime, stdio transport, and MCP protocol failures stay distinct |
|
|
207
294
|
| 2 | Use `fingerprint.command`, `fingerprint.cwd`, and `fingerprint.package` to show what was actually run |
|
|
208
|
-
| 3 |
|
|
209
|
-
| 4 | Show `
|
|
295
|
+
| 3 | Show `checks.capabilities` as advertised MCP surface honesty |
|
|
296
|
+
| 4 | Show `checks.toolSchema` as tool metadata quality, separate from startup and stdio transport health |
|
|
297
|
+
| 5 | Show `drift` warnings as stability advisories, not hard failures, unless another check failed |
|
|
298
|
+
| 6 | Compare `fingerprint.system`, `fingerprint.runtimes`, and `fingerprint.timings` before marking a package broken |
|
|
299
|
+
| 7 | Show `fingerprint.env.names` only when debugging; never ask users to paste secret values |
|
|
210
300
|
|
|
211
301
|
Example:
|
|
212
302
|
|
|
@@ -214,8 +304,15 @@ Example:
|
|
|
214
304
|
{
|
|
215
305
|
"schemaVersion": 1,
|
|
216
306
|
"ok": true,
|
|
307
|
+
"config": {
|
|
308
|
+
"enabled": false,
|
|
309
|
+
"path": "",
|
|
310
|
+
"resolvedPath": "",
|
|
311
|
+
"checks": { "command": false, "cwd": false, "envNames": [], "requests": [], "safeToolCalls": [] }
|
|
312
|
+
},
|
|
313
|
+
"profile": "custom",
|
|
217
314
|
"fingerprint": {
|
|
218
|
-
"guard": { "name": "mcp-stdio-guard", "version": "0.
|
|
315
|
+
"guard": { "name": "mcp-stdio-guard", "version": "0.4.0" },
|
|
219
316
|
"command": {
|
|
220
317
|
"executable": "node",
|
|
221
318
|
"args": ["./server.js"],
|
|
@@ -227,9 +324,18 @@ Example:
|
|
|
227
324
|
"exists": true
|
|
228
325
|
},
|
|
229
326
|
"protocol": "2025-11-25",
|
|
327
|
+
"config": {
|
|
328
|
+
"enabled": false,
|
|
329
|
+
"path": "",
|
|
330
|
+
"resolvedPath": "",
|
|
331
|
+
"checks": { "command": false, "cwd": false, "envNames": [], "requests": [], "safeToolCalls": [] }
|
|
332
|
+
},
|
|
333
|
+
"profile": "custom",
|
|
230
334
|
"timeoutMs": 5000,
|
|
231
335
|
"repeat": 1,
|
|
232
|
-
"
|
|
336
|
+
"capabilityProbes": true,
|
|
337
|
+
"operation": { "method": "tools/list", "hasParams": false, "source": "cli-request", "safeToolCallName": "" },
|
|
338
|
+
"operations": [{ "method": "tools/list", "hasParams": false, "source": "cli-request", "safeToolCallName": "" }],
|
|
233
339
|
"system": { "platform": "darwin", "arch": "arm64", "osRelease": "25.0.0" },
|
|
234
340
|
"runtimes": {
|
|
235
341
|
"node": { "version": "v24.0.0", "role": "guard-and-target" }
|
|
@@ -258,16 +364,40 @@ Example:
|
|
|
258
364
|
"killReason": "guard-finished",
|
|
259
365
|
"spawnError": null
|
|
260
366
|
},
|
|
367
|
+
"capabilityProbes": true,
|
|
368
|
+
"capabilityKeys": ["tools"],
|
|
369
|
+
"capabilityChecks": {
|
|
370
|
+
"tools": { "advertised": true, "method": "tools/list", "responded": true, "itemCount": 2, "error": null },
|
|
371
|
+
"resources": { "advertised": false, "method": "resources/list", "responded": false, "itemCount": null, "error": null },
|
|
372
|
+
"prompts": { "advertised": false, "method": "prompts/list", "responded": false, "itemCount": null, "error": null }
|
|
373
|
+
},
|
|
261
374
|
"issueClasses": {
|
|
262
375
|
"installRuntime": { "status": "pass", "issueCodes": [] },
|
|
263
376
|
"stdioTransport": { "status": "pass", "issueCodes": [] },
|
|
264
377
|
"mcpProtocol": { "status": "pass", "issueCodes": [] }
|
|
265
378
|
},
|
|
379
|
+
"toolSchema": {
|
|
380
|
+
"checked": true,
|
|
381
|
+
"toolCount": 2,
|
|
382
|
+
"toolNames": ["read_file", "search"],
|
|
383
|
+
"validToolCount": 2,
|
|
384
|
+
"warningCount": 0,
|
|
385
|
+
"errorCount": 0,
|
|
386
|
+
"duplicateNames": []
|
|
387
|
+
},
|
|
266
388
|
"checks": {
|
|
267
389
|
"initialize": { "status": "pass", "issueCodes": [] },
|
|
268
390
|
"stdout": { "status": "pass", "issueCodes": [] },
|
|
269
391
|
"jsonRpc": { "status": "pass", "issueCodes": [] },
|
|
270
392
|
"operation": { "status": "pass", "issueCodes": [] },
|
|
393
|
+
"capabilities": {
|
|
394
|
+
"status": "pass",
|
|
395
|
+
"issueCodes": [],
|
|
396
|
+
"tools": { "status": "pass", "issueCodes": [], "advertised": true, "method": "tools/list", "responded": true, "itemCount": 2 },
|
|
397
|
+
"resources": { "status": "skipped", "issueCodes": [], "advertised": false, "method": "resources/list", "responded": false, "itemCount": null },
|
|
398
|
+
"prompts": { "status": "skipped", "issueCodes": [], "advertised": false, "method": "prompts/list", "responded": false, "itemCount": null }
|
|
399
|
+
},
|
|
400
|
+
"toolSchema": { "status": "pass", "issueCodes": [] },
|
|
271
401
|
"process": { "status": "pass", "issueCodes": [] },
|
|
272
402
|
"pythonBuffering": { "status": "pass", "issueCodes": [] },
|
|
273
403
|
"staticScan": { "status": "skipped", "issueCodes": [] },
|
|
@@ -282,7 +412,7 @@ The guard is registry-agnostic. It does not care whether an install command came
|
|
|
282
412
|
|
|
283
413
|
```yaml
|
|
284
414
|
- run: npm ci
|
|
285
|
-
- run: npx mcp-stdio-guard --scan src --
|
|
415
|
+
- run: npx mcp-stdio-guard --profile ci --scan src --request tools/list -- node ./server.js
|
|
286
416
|
```
|
|
287
417
|
|
|
288
418
|
## Output
|
|
@@ -296,6 +426,7 @@ frames: 2 stdout / 0 invalid
|
|
|
296
426
|
stderr: 0 lines
|
|
297
427
|
protocol: 2025-11-25
|
|
298
428
|
request: tools/list responded
|
|
429
|
+
tool schemas: 2/2 valid
|
|
299
430
|
```
|
|
300
431
|
|
|
301
432
|
Polluted stdout:
|
|
@@ -314,7 +445,7 @@ request: tools/list responded
|
|
|
314
445
|
|
|
315
446
|
- Runtime dependencies: zero.
|
|
316
447
|
- Default behavior: validate the real process boundary.
|
|
317
|
-
- Optional static scan: intentionally simple and conservative.
|
|
448
|
+
- Optional static scan: intentionally simple and conservative; catches common JavaScript and Python stdout writes, stdout logging handlers, and visible startup-output risks.
|
|
318
449
|
- CI posture: fail on protocol corruption, crashes, and missing responses.
|
|
319
450
|
- Promotion promise: no fake stars, no spam, just a tool that catches a real MCP failure mode.
|
|
320
451
|
|