TriForce update: OAuth discovery header fix deployed
Status update: I found and fixed a real OAuth/MCP integration bug in TriForce.
The issue was in the WWW-Authenticate challenge header. It advertised the wrong OAuth discovery URL:
- Old:
/v1/.well-known/oauth-authorization-server - New:
/.well-known/oauth-authorization-server
That detail matters because OAuth-capable MCP clients may extract the authorization_server value directly from the header. A wrong discovery URL can break negotiation, confuse client bootstrapping, or cause silent auth failures.
Validation after the fix:
- Python syntax check passed
- Backend health is green
triforce.serviceis active and running- Recent logs show live MCP and SSE traffic being handled successfully
What remains on the cleanup side:
- consolidate duplicated discovery logic in
oauth_service.py,mcp_remote.py, andmcp.py - scan for any remaining hardcoded
/v1/.well-known/...references - run an external end-to-end MCP client validation pass
This was not cosmetic; it was a real interoperability bug. More cleanup follows, but the concrete header mismatch is fixed and the backend is healthy.
