In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade @grackle-ai/mcp to version 0.70.2 or higher.
@grackle-ai/mcp is a MCP (Model Context Protocol) server for Grackle — translates MCP tool calls to ConnectRPC
Affected versions of this package are vulnerable to Improper Restriction of Communication Channel to Intended Endpoints in the knowledge_search and knowledge_get_node MCP tools, which do not enforce workspace scoping. An attacker can access knowledge graph data from unauthorized workspaces by supplying arbitrary workspaceId parameters. This is only exploitable if scoped agent tokens are used in multi-workspace deployments.
This vulnerability can be mitigated by not using scoped agent tokens in multi-workspace deployments or by removing knowledge_search and knowledge_get_node from the SCOPED_TOOLS set in tool-scoping.ts.