Skip to content

docs: add security middleware guide for production MCP deployments#3828

Open
pshkv wants to merge 1 commit intomodelcontextprotocol:mainfrom
pshkv:feat/sint-policy-gateway-security-layer
Open

docs: add security middleware guide for production MCP deployments#3828
pshkv wants to merge 1 commit intomodelcontextprotocol:mainfrom
pshkv:feat/sint-policy-gateway-security-layer

Conversation

@pshkv
Copy link
Copy Markdown

@pshkv pshkv commented Apr 4, 2026

Summary

The existing > [!WARNING] block correctly states that reference servers are educational examples and that developers must evaluate their own security requirements. This PR makes that guidance actionable by adding a concrete integration guide.

What's added:

  1. docs/security-middleware.md — a 5-minute integration guide covering:

    • The authorization gap in plain MCP deployments (no authz, no audit, no human-in-the-loop)
    • SINT PolicyGateway integration pattern (wraps MCP clients, intercepts tool calls)
    • Tier table: readFile → T0 auto-allow; deleteFile → T2 human review; bash/exec → T3 explicit sign-off
    • Performance: p50 < 2ms, p99 < 10ms intercept overhead
    • Coverage for OWASP Agentic AI Top-10 (ASI01-10), regression-tested suite
  2. README.md — adds 4 lines under the existing Security section pointing to the guide

About SINT Protocol

  • GitHub: https://github.com/sint-ai/sint-protocol
  • License: MIT
  • Language: TypeScript (zero-dependency crypto via @noble/ed25519)
  • Tests: 1,105 tests across 31 packages, including 10-test MCP attack surface conformance suite
  • Bridges: MCP, ROS 2, MAVLink, A2A, IoT (MQTT/CoAP)

Why this matters for MCP

MCP intentionally separates capability from authorization. Without a security layer, agentic deployments have:

  • No per-agent scoping of which tools can be called
  • No audit trail for incident response
  • No human-in-the-loop for irreversible operations (deleteFile, bash, etc.)
  • No rate limiting for runaway agents

This is not a criticism of MCP — it's the correct layering. The gap is in the deployment ecosystem. This PR adds one concrete reference for closing it.

What this is NOT

  • Not proposing to add SINT as a reference server in src/
  • Not replacing the existing WARNING — the warning is correct and important
  • This is purely documentation, adding docs/security-middleware.md (new file) + 4 README lines

cc @jspahrsummers — happy to revise the framing if you'd prefer a different approach to documenting security deployment patterns.

The existing WARNING note correctly identifies that reference servers are
not production-ready and that developers must evaluate security requirements.
This PR makes that guidance actionable by:

1. docs/security-middleware.md — concrete 5-minute integration guide:
   - Shows the authorization gap in plain MCP deployments
   - Documents the SINT PolicyGateway integration pattern
   - Tier table for common MCP tools (T0 read-only → T3 shell exec)
   - Performance benchmarks (p99 < 10ms overhead)
   - OWASP ASI01-10 conformance suite reference

2. README.md — adds a note under the Security section pointing to
   docs/security-middleware.md

SINT Protocol is MIT-licensed, TypeScript, zero-dependency crypto
(@noble/ed25519 + SHA-256), and regression-tested with 1,105 tests.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant