OLS-2575: Remove service-side secret keyword tool filtering#2819
Conversation
Made-with: Cursor
|
@onmete: This pull request references OLS-2575 which is a valid jira issue. DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
| ) | ||
| status = "error" | ||
| logger.exception(tool_output) | ||
| break |
There was a problem hiding this comment.
Just try/except was removed here, the rest is an indentation shift.
|
@onmete: all tests passed! Full PR test history. Your PR dashboard. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here. |
|
/lgtm |
|
/approve |
|
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: onmete The full list of commands accepted by this bot can be found here. The pull request process is described here DetailsNeeds approval from an approver in each of these files:
Approvers can indicate their approval by writing |
Description
Remove service-side substring filtering for "secret" in MCP tool arguments, and rely on MCP server-side
denied_resourceshardening forv1/Secretto prevent secret content leakage.This change removes over-blocking of legitimate Kubernetes operations that only reference secrets by name/path (for example
secretRefand/var/run/secrets/...).Type of change
Related Tickets & Documents
Checklist before requesting a review
Testing
uv run pytest -q tests/unit/tools/test_tools.pyraise_for_sensitive_tool_argsgate remains in_execute_single_tool_call.Made with Cursor