Summary
Currently, API keys in the MCP Server configuration Environment Variables section are displayed in plain text. This poses a security risk as sensitive credentials are visible to anyone viewing the configuration interface.
Current Behavior
- API keys and other sensitive environment variables are displayed in plain text
- No masking or hiding mechanism is implemented for sensitive fields
- Credentials are exposed in the UI, creating potential security vulnerabilities
Requested Feature
Implement password-style masking for sensitive environment variables, particularly API keys, in the MCP Server configuration interface.
Acceptance Criteria
Suggested Implementation
-
Auto-detection: Automatically mask environment variables with names containing:
API_KEY
TOKEN
SECRET
PASSWORD
PRIVATE_KEY
-
UI Components:
- Use password input type for sensitive fields
- Add eye icon toggle button to show/hide values
- Visual indicator (lock icon) for masked fields
-
Manual Override:
- Checkbox or toggle to manually mark fields as sensitive
- Setting should persist in configuration
Security Benefits
- Prevents shoulder surfing attacks
- Reduces risk of accidental credential exposure in screenshots/recordings
- Follows security best practices for credential management
- Improves overall application security posture
Priority
Medium-High - Security-related feature that protects sensitive user credentials
Additional Context
This feature request is based on standard security practices implemented in most configuration management tools and password managers. Similar functionality exists in tools like Docker Desktop, Kubernetes dashboards, and various CI/CD platforms.
Labels: enhancement, security, feature-request, ui/ux
Summary
Currently, API keys in the MCP Server configuration Environment Variables section are displayed in plain text. This poses a security risk as sensitive credentials are visible to anyone viewing the configuration interface.
Current Behavior
Requested Feature
Implement password-style masking for sensitive environment variables, particularly API keys, in the MCP Server configuration interface.
Acceptance Criteria
••••••••)Suggested Implementation
Auto-detection: Automatically mask environment variables with names containing:
API_KEYTOKENSECRETPASSWORDPRIVATE_KEYUI Components:
Manual Override:
Security Benefits
Priority
Medium-High - Security-related feature that protects sensitive user credentials
Additional Context
This feature request is based on standard security practices implemented in most configuration management tools and password managers. Similar functionality exists in tools like Docker Desktop, Kubernetes dashboards, and various CI/CD platforms.
Labels:
enhancement,security,feature-request,ui/ux