protect against attacks from MCP server URLs
https://verialabs.com/blog/from-mcp-to-shell documents some attacks that arise from trusting the authentication URLs served by MCP servers. We should fix this along the lines of https://github.com/modelcontextprotocol/typescript-sdk/pull/877, by preventing certain URL schemes.
#539 addresses PRM, but we should also address auth server metadata and DCR as well, following https://github.com/modelcontextprotocol/typescript-sdk/pull/877.
We can accept a PR from the community on this one.
I think this issue should be close by https://github.com/modelcontextprotocol/go-sdk/pull/539
is this issue still open ?
@appleboy @krtkvrm per Jonathan's comment above (https://github.com/modelcontextprotocol/go-sdk/issues/526#issuecomment-3347545895), I think there is more to do here: "we should also address auth server metadata and DCR as well, following https://github.com/modelcontextprotocol/typescript-sdk/pull/877."