
Security News
Browserslist-rs Gets Major Refactor, Cutting Binary Size by Over 1MB
Browserslist-rs now uses static data to reduce binary size by over 1MB, improving memory use and performance for Rust-based frontend tools.
Security News
Sarah Gooding
June 19, 2025
The Model Context Protocol (MCP) specification has been updated since its last revision in March 2025, introducing two major enhancements aimed at improving integration reliability and tightening security across implementations.
This update adds support for structured tool output, allowing tools to return well-defined, machine-readable data instead of relying on ad-hoc text. It also formally classifies MCP servers as OAuth Resource Servers and requires clients to adopt Resource Indicators, aligning MCP with modern OAuth security expectations to prevent misuse of access tokens.
Tools can now declare an outputSchema
, a JSON Schema describing the precise structure of their results. When present, servers must return the tool’s output in a new structuredContent
field that strictly validates against the declared schema. For tools that don’t declare an outputSchema
, behavior remains unchanged: results are returned as free-form text or content arrays.
This improvement makes it far easier to handle tool results programmatically and securely. Developers can trust that structured outputs match a predictable shape, reducing the need for fragile text parsing. This is especially important when integrating tools from untrusted servers: clients can validate data before using it, adding a layer of protection.
This update specifically targets simpler, fully schema-described result cases. Support for more advanced, multi-part or dynamically structured tool outputs remains available via the flexible content
array and is still evolving under separate proposals.
MCP servers must now be treated as OAuth Resource Servers and align with modern OAuth standards:
These upgrades close several known OAuth weaknesses and make MCP suitable for secure, large-scale use. They help prevent stolen tokens from being reused on other services and make it harder for attackers to intercept or replay tokens in the first place.
While this update brings MCP’s OAuth handling much closer to modern standards with better binding and validation, it does not fully eliminate the risk of phishing if a user configures a malicious MCP server. Alibaba Cloud Security raised this concern in a recent issue, showing that an attacker could trick users into trusting a fake MCP server which then points to a rogue OAuth server to steal tokens. The new resource parameter and audience checks greatly limit misuse of stolen tokens, but stronger binding between each MCP server and its legitimate OAuth server is still being discussed in the community to fully address this advanced scenario.
Structured Tool Output and OAuth improvements are the headline features, but the revision also includes many supportive improvements to boost consistency and usability:
MCP-Protocol-Version
header in all subsequent requests to avoid version mismatches._meta
, context
, and title
improve structure and display clarity.A complete list of changes, including all minor schema revisions, is available in the full changelog on GitHub.
Subscribe to our newsletter
Get notified when we publish new security blog posts!
Try it now
Security News
Browserslist-rs now uses static data to reduce binary size by over 1MB, improving memory use and performance for Rust-based frontend tools.
Research
Security News
Eight new malicious Firefox extensions impersonate games, steal OAuth tokens, hijack sessions, and exploit browser permissions to spy on users.
Security News
The official Go SDK for the Model Context Protocol is in development, with a stable, production-ready release expected by August 2025.