Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file not shown.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file not shown.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file not shown.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file not shown.
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@ authors:
- alex
---

![blog cover](agentic_guardrails_header.png)
![blog cover](agentic_guardrails_header.jpg)


In [our previous blog post](https://block.github.io/goose/blog/2025/03/31/securing-mcp/) we detailed the Model Context Protocol (MCP) system and discussed some security concerns and mitigations. As a brief recap, MCP provides agents with a means to accomplish tasks using defined tools; reducing the burden of using complex and varied APIs and integrations on the agent.
Expand All @@ -32,7 +32,7 @@ That’s a lot of words, here’s a picture instead, *(Typos Provided for free\*

<div style={{textAlign: "center"}}>

![CSRF Example - Attack Works](image2.png)
![CSRF Example - Attack Works](image2.jpg)


<em>Example of a successful CSRF attack chain with by a very devious hacker</em>
Expand All @@ -43,7 +43,7 @@ Today, CSRF is largely mitigated by **browser-enforced CORS (Cross-Origin Resour

<div style={{textAlign: "center"}}>

![CSRF Example - Attack Fails](image5.png)
![CSRF Example - Attack Fails](image5.jpg)


<em>CORS mitigated the CSRF attack leaving a very sad (but still devious) hacker. Note: in practice the CORS check would likely happen during preflight.</em>
Expand Down Expand Up @@ -212,7 +212,7 @@ To handle these threats we propose **removing** **all tool-call responses from t

<div style={{textAlign: "center"}}>

![Tool Response Flush Process](image4.png)
![Tool Response Flush Process](image4.jpg)


<em>Our workflow imagined (mostly) correctly with ♥️ by ChatGPT</em>
Expand Down
Loading