You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/protocol.md
+1-2Lines changed: 1 addition & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -411,8 +411,7 @@ user's responsibility to wrap that function around all handlers in their server.
411
411
-_Secure session IDs_. This SDK generates cryptographically secure session IDs by default.
412
412
If you create your own with
413
413
[`ServerOptions.GetSessionID`](https://pkg.go.dev/github.com/modelcontextprotocol/go-sdk/mcp#ServerOptions.GetSessionID), it is your responsibility to ensure they are secure.
414
-
If you are using Go 1.24 or above,
415
-
we recommend using [`crypto/rand.Text`](https://pkg.go.dev/crypto/rand#Text)
414
+
We recommend using [`crypto/rand.Text`](https://pkg.go.dev/crypto/rand#Text).
416
415
417
416
-_Binding session IDs to user information_. The SDK supports this mitigation through
Copy file name to clipboardExpand all lines: internal/docs/protocol.src.md
+1-2Lines changed: 1 addition & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -336,8 +336,7 @@ user's responsibility to wrap that function around all handlers in their server.
336
336
-_Secure session IDs_. This SDK generates cryptographically secure session IDs by default.
337
337
If you create your own with
338
338
[`ServerOptions.GetSessionID`](https://pkg.go.dev/github.com/modelcontextprotocol/go-sdk/mcp#ServerOptions.GetSessionID), it is your responsibility to ensure they are secure.
339
-
If you are using Go 1.24 or above,
340
-
we recommend using [`crypto/rand.Text`](https://pkg.go.dev/crypto/rand#Text)
339
+
We recommend using [`crypto/rand.Text`](https://pkg.go.dev/crypto/rand#Text).
341
340
342
341
-_Binding session IDs to user information_. The SDK supports this mitigation through
0 commit comments