(no title)
ebfe1 | 10 months ago
With that said, some vulnerabilities like command injections or argument injection, the responsibility is on MCP developer to make sure they follow best practices and not let user take control of these commands when "shelling out".
No comments yet.