The Model Context Protocol (MCP) has evolved rapidly from local stdio connections to remote HTTP servers, creating significant security vulnerabilities. The author demonstrates how Tailscale can provide a secure connectivity model for MCP servers by keeping them off the public internet while enabling remote access through private networks. The solution includes application-aware permissions using Tailscale's grants mechanism, allowing fine-grained control over which users can access specific MCP tools and resources. While this approach requires Go for server implementation and local client proxies, it offers a more secure alternative to exposing MCP servers publicly.

10m read timeFrom leebriggs.co.uk
Post cover image
Table of contents
A quick history of the MCP evolutionAnd yet, there’s still a problemMy first MCP serverA proper security model in actionThe caveatsThe codeHypocrisy
1 Comment

Sort: