MCPSafe.io
RegistryThreatsMethodologyDocsPricingScanSign in
MCPSafe.io

Security checks for MCP servers — public packages and private repos, fast or deep.

Legal

Privacy PolicyCookie PolicyTerms of ServiceSecurity disclosure

Resources

State of MCP SecuritySupportSystem statusMade in Germany 🇩🇪

© 2026 MCPSafe. All rights reserved.

GDPR — Privacy Policy
← Threat Catalog

Configuration & Environment

Outbound TLS verification disabled

HIGHCWE: CWE-295Rule: MCP-233

MCP server makes HTTPS calls with `verify=False`, `rejectUnauthorized: false`, or `NODE_TLS_REJECT_UNAUTHORIZED=0` — accepting any certificate and inviting man-in-the-middle attacks.

What it is

TLS verification is what makes HTTPS more than `http://`. With it off, an on-path attacker can serve any certificate they like and the client trusts it. The bug almost always shows up the same way: a developer hits an SSL error in dev, disables verification to make it go away, forgets to put it back.

Why it matters for MCP

MCP servers frequently fetch from external APIs (GitHub, npm, OAuth providers). Disabling TLS verification on those calls means any compromised network position — corporate proxy, hostile coffee shop, malicious VPN — can steal API tokens and API responses in flight.

Vulnerable example

example.py
1
import httpx
2
3
async def fetch(url: str) -> bytes:
4
    async with httpx.AsyncClient(verify=False) as client:
5
        return (await client.get(url)).content

Secure example

example.py
1
import httpx
2
3
async def fetch(url: str) -> bytes:
4
    async with httpx.AsyncClient() as client:  # verify defaults to True
5
        return (await client.get(url)).content

How MCPSafe detects this

MCPSafe matches `httpx.AsyncClient(verify=False)`, `requests.get(..., verify=False)`, JS `fetch(..., { agent: new https.Agent({ rejectUnauthorized: false }) })`, and `axios.create({ httpsAgent: new https.Agent({ rejectUnauthorized: false }) })`. Also flags any process.env.NODE_TLS_REJECT_UNAUTHORIZED = "0" assignment.

See the full threat catalog for every documented detection.

Further reading

  • CWE-295: Improper Certificate Validation
  • OWASP TLS Cheat Sheet

Scan an MCP server for this issue

MCPSafe runs this check — and every other rule in the catalog — on any MCP server you paste in.

Scan now