| permalink | /labs/lab-05-mcp-validation/ |
|---|---|
| title | Lab 05: MCP Configuration Validation |
| description | Validate MCP server configurations against allowlists, transport security, and permission scope requirements. |
🇫🇷 [Version française]({{ '/fr/labs/lab-05-mcp-validation/' | relative_url }})
| Duration | Level | Prerequisites |
|---|---|---|
| 30 min | Intermediate | Lab 04 |
- Run the MCP configuration validator on demo apps
- Understand server allowlists and transport security requirements
- Detect overly broad tool permissions
Working Directory: Run the following commands from the
apm-security-scan-demo-apprepository root.
Get-Content src\config\mcp-allowlist.json | python -m json.toolpython src\converters\mcp-to-sarif.py --scan-dir apm-demo-app-003 --output app003-mcp.sarifpython -c "import json; d=json.load(open('app003-mcp.sarif')); [print(f'{r[\"ruleId\"]}: {r[\"message\"][\"text\"]}') for r in d['runs'][0]['results']]"Edit apm-demo-app-003\mcp.json to remove the rogue-data-server entry, then re-scan:
python src\converters\mcp-to-sarif.py --scan-dir apm-demo-app-003 --output app003-mcp-fixed.sarifVerify the finding count decreased.
- MCP validator produces findings for app 003
- You understand server allowlists and transport security
- Removing a rogue server reduces the finding count
Proceed to Lab 06: GitHub Security Tab or Lab 06 ADO.

