Remix.run Logo
mooreds 14 hours ago

I love this breakdown of how MCP leverages OAuth to help provide additional security. The example flows were helpful to me.

A few nits:

- scopes are often set up at the administrative level, but approved by the user. In general, a client should only ask for the scopes they need at the time of authorization, and step up/step down over time

- other than with a bit of hand waving, the author doesn't talk about the security risks of MCP servers. I was hoping to hear more about that.

- a key part of security for MCP servers is what happens between the MCP server and the data/functionality/APIs it is protecting. I have found articles about this to be sorely lacking, probably because it is bespoke to each MCP server. I expect the provided to MCP is not passed through, but then what is? And how is that authorization managed.