Security Model

Every tool on mcpsearchtool.com runs in a WebAssembly sandbox. No exceptions.

WASM Sandbox Isolation

Tools execute in isolated wasmtime instances with:

  • No file system access by default
  • No network access by default
  • Memory limits enforced (128MB default)
  • Execution timeout (30 seconds default)

Capability-Based Security

Tools request capabilities in their policy.yaml:

component_id: tools/pdf-parser:v1.0.0
max_memory_bytes: 134217728
max_execution_time_ms: 30000
allowed_file_access: []
allowed_network_domains: []
allowed_wasi_capabilities:
  - random
  - clocks

Cryptographic Signing

  • Every component is signed with Ed25519 or RSA-PSS
  • Responsible party embedded in OCI annotations
  • Full provenance chain available

Trust Boundaries

Boundary Protection
Registry Push OAuth 2.0 + JWT (no anonymous push)
Component Signing Ed25519/RSA-PSS signatures
Runtime Isolation WASM sandbox + WASI P2 capabilities
Audit Trail All loads/invocations logged