Your Jira MCP server has worked every day since you wired it in. On June 30, 2026, that stops being reassuring.
That is the date Atlassian retires the legacy HTTP+SSE endpoint on its official Remote MCP server. It is not the first deprecation to hit Model Context Protocol (MCP) integrations, and it will not be the last. The teams I watch get surprised by these are not the careless ones. They are the ones who did the setup correctly, confirmed it worked, and then filed it mentally under "done." That filing decision is the bug. An MCP server is not a connection string you set once. It is a maintained dependency on someone else's evolving API, plus a standing tradeoff between token cost and security, and it decays whether or not you are looking at it.
This is the audit you run so the decay surfaces on your schedule instead of on the vendor's.
Your MCP server is a dependency, not a config file
Here is the mental model that causes the damage. An MCP server feels like configuration: you point Claude at an endpoint, authorize it, watch it pull a Jira ticket, and the wiring fades into the background like a database connection string. Connection strings do not rot. MCP servers do, because every MCP server is a wrapper around an API that someone else controls, and that someone else has a deprecation calendar you did not put on your own.
Atlassian's calendar has already fired once. On August 1, 2025, Atlassian removed the Jira REST search endpoints (GET and POST /rest/api/{2,3,latest}/search). Any MCP server still calling them returned an error pointing users to migrate to /rest/api/3/search/jql. The widely used community server sooperset/mcp-atlassian took the hit: Discussion #672, opened the same month asking when the project would adapt, sat without a maintainer reply for weeks while a parallel bug report logged jira_search failing outright. Teams running that server did not get a notification. They got a tool that quietly returned nothing useful until someone noticed Claude had stopped finding tickets.
Now the calendar fires again. The June 30, 2026 sunset retires the /v1/sse transport endpoint on Atlassian's official server in favor of Streamable HTTP. Atlassian auto-updated its out-of-box connectors, so Claude.ai and the supported IDE integrations move across with no operator action. In the enterprise org where I run Claude Code plus MCP plus Jira at company-wide scale, we are on the out-of-box connector. We did nothing, and it kept working through the transport change. That is the good outcome, and it is worth being honest about why it happened: not because the integration was robust, but because the maintenance was someone else's and they did it. Any team that built a custom client against the SSE URL has to change that configuration before the deadline, and nothing in their setup will warn them first.
First MCP spec
Model Context Protocol's first published revision (2024-10-07). Most early integrations date from the months after this.
OAuth resource server
Spec revision 2025-06-18 reclassifies MCP servers as OAuth 2.1 resource servers and removes JSON-RPC batching, a breaking change for servers built against the prior spec.
Jira endpoints removed
Atlassian shuts off the Jira REST search endpoints. Community servers wired to them start failing without a notification to operators.
Streamable HTTP
Spec revision 2025-11-25 makes Streamable HTTP the official remote transport and deprecates HTTP+SSE.
Atlassian SSE sunset
The official Atlassian server retires its /v1/sse endpoint. Out-of-box connectors were auto-migrated; custom clients hardcoding the old URL stop working.
Read that timeline as a dependency's changelog, because that is what it is. The API-versioning problem in MCP is sharper than in a normal client library: a language model calling a tool cannot detect that an endpoint's response shape drifted, and it operates with little human oversight between the drift and the wrong answer. The failure is not loud at your monitoring layer. It is loud exactly once, at the moment a specific tool call fails, to whichever user happened to make it.
What changed under you since you wired it up
The vendor API is one moving part. The protocol is the other, and it has moved further since early 2025 than a working integration makes obvious. If you are on a vendor-managed connector you may assume this section is not about you. It is. The protocol floor shifted under every implementation, and the vendor only shields you from the parts they chose to absorb.
If you stood up an MCP server in the first half of 2025, you built against a spec that no longer describes how MCP works. The 2025-06-18 revision reclassified MCP servers as OAuth 2.1 resource servers, requiring resource indicators (RFC 8707) so a token issued for one server cannot be replayed against another. The same revision removed JSON-RPC batching, which is a breaking change for any server that relied on it. Then the 2025-11-25 spec made Streamable HTTP the official remote transport and pushed HTTP+SSE into legacy status. The protocol maintainers committed to backward compatibility at the spec level, and that commitment holds. It does not help you if your server is a community implementation that never tracked the auth model change, or a vendor server whose transport you pinned by URL.
The practical test is blunt. Open your MCP server's documentation and find the spec revision it targets. As of this writing in May 2026, the current revision is 2025-11-25 and the 2026 roadmap organizes around working groups rather than committing to dates, though secondary trackers point at a possible mid-2026 release. If your server's docs reference a revision older than 2025-06-18, you are running an integration whose authorization model predates the audience-locking fix, and "it still works" is not the same statement as "it is still safe."
Official versus community is a tradeoff, not a winner
The obvious lesson from the Atlassian story is "use the vendor's official server and let them absorb the churn." It is half right, and the half it gets wrong is the half that costs you.
Start with the strongest version of the counter-argument, because it is a good one. For a practitioner on a curated, vendor-maintained server, the maintenance burden genuinely shifts upstream. Atlassian moved every out-of-box connector across the SSE deprecation with zero operator action. The ecosystem is trending toward managed remote servers. If that trend holds, "audit your MCP server periodically" sounds like advice for a problem the vendor already solved.
Three things break that argument. First, the same Atlassian deprecation notice that auto-migrated connectors also states that custom implementations may require manual changes, so "official" only buys you the absorption if you also stayed inside the out-of-box path and never hardcoded an endpoint. Second, vendor-maintained does not mean vendor-permanent. In March 2026, AWS Labs deprecated more than a dozen of its own official MCP servers in a single announcement, some with no MCP replacement at all. An official server can be sunset as a product decision, which is a failure mode community servers and custom servers do not have in quite the same shape. Third, the official server is frequently the expensive one. The official Atlassian server spends roughly ten thousand tokens on combined Jira and Confluence tool definitions before you have asked it anything; GitHub's official server runs higher still. Atlassian Labs shipped a separate mcp-compressor proxy specifically because the official server's schema footprint is large enough to need one. The mitigation existing is the proof the problem is real.
So the decision is not "official good, community bad." It is: which failure mode can you afford to own?
Community / custom server
- You own the upstream-API-deprecation fix, and nobody emails you the deadline
- Maintenance depends on a volunteer maintainer's bandwidth (see sooperset/mcp-atlassian #672)
- Usually leaner: fewer tools, smaller schema, lower token cost per call
- You control the auth model and can keep it current yourself
Official / vendor server
- Vendor absorbs transport and auth migrations for out-of-box connectors
- Vendor can also deprecate the whole server as a product decision (AWS Labs, March 2026)
- Often token-heavy: full tool schemas in context, sometimes needing a compressor proxy
- Custom clients that pin an endpoint still carry the migration themselves
In the enterprise org I work in, the official Atlassian server is the right call because the team is large, the connector is out-of-box, and the token cost is acceptable against the value of not owning the migration. For a token-constrained setup where every thousand tokens of tool schema competes with the working context, a lean community Jira server can be the right call instead, as long as whoever picks it understands they just signed up to own the next deprecation. Both are defensible. Neither is "set it and forget it."
The security surface you stopped looking at
The maintenance argument is the visible half. The security argument is the half that does not announce itself at all, because a stale MCP server keeps returning data right up until it returns the wrong data to the wrong caller.
MCP's security surface has three documented classes. None of them are theoretical anymore. Tool poisoning came first. Simon Willison showed in April 2025 that tool descriptions are visible to the model but not the user, which makes them an injection channel, including "rug pull" mutations where a tool rewrites its own definition after you installed it. Palo Alto Unit 42 followed in December 2025 with working covert tool invocation and conversation hijacking through MCP sampling. The third class is the worst. OX Security disclosed in April 2026 a systemic flaw in the STDIO transport: unsanitized input reaches process parameters, which enables remote code execution across SDK languages. Named CVEs. Thousands of exposed servers.
The number that should change behavior is the first one. A majority of the MCP repositories Astrix Security analyzed hard-code static secrets rather than use the OAuth model the spec has recommended since mid-2025. If your server was wired up before that revision, the default it shipped with is probably the insecure one, and it has been the insecure one every day since, working perfectly. The maintenance evidence already in this post points the same way. A server nobody is patching is a server nobody is rotating credentials on either.
The good news is that over-privileged tools are auditable, not just lamentable. The academic mcp-sec-audit work, published March 2026, pairs static and dynamic analysis to enumerate the privileged capabilities a server can reach (file operations, command execution, network access). It found hundreds of such instances across a real-world benchmark of 45 servers, at a 75 percent detection rate there and 100 percent against intentionally vulnerable test servers. You do not need their tooling to apply the finding. A server's advertised tool list and the capability surface it can reach are two different things, and only the first is visible from the chat window.
The MCP re-audit playbook
None of this requires continuous monitoring infrastructure. It requires a recurring checklist and a calendar entry. Run this on a fixed cadence, and additionally any time an upstream vendor announces an API, auth, or transport change.
Transport and endpoint check
Confirm the server uses Streamable HTTP, not legacy HTTP+SSE. Grep your client config for hardcoded endpoint URLs (the Atlassian /v1/sse pattern). A pinned URL is a deprecation waiting for a date.
Auth model check
Verify the server runs OAuth 2.1 with resource indicators, not static API keys or PATs baked into config. If it ships static-secret defaults, treat that as a finding, not a footnote.
Upstream deprecation watch
Subscribe to the vendor's developer changelog and the MCP spec blog. Add the next known sunset date to your team calendar now. For Atlassian, that date is June 30, 2026.
Token cost measurement
Measure the tokens the server's tool definitions consume before any call. Decide deliberately whether a compressor proxy or OAuth-scope tool filtering is worth the added moving part.
Capability and scope review
List the privileged capabilities the server can reach versus what your workflow needs. Scope MCP tool access per environment (settings.json permissions is where this lives in Claude Code).
Maintenance health check
For community servers: last commit date, open-issue response latency, CVE patch history. For official servers: is the vendor still investing, or is this the next AWS-Labs-style deprecation?
Cadence rule of thumb: re-audit on any upstream version, auth, or transport announcement, and on a fixed quarterly minimum regardless. The quarterly pass is cheap. The unscheduled one, the kind that starts with a user saying "Claude stopped finding our tickets," is not.
Step three is the one teams skip and the one that pays for the whole exercise. The official MCP authorization guidance and the OWASP MCP Top 10 are both maintained, public, and free. Reading them once a quarter is less work than the incident you are preventing. Step five connects to a broader point I have made about where rules belong in Claude Code: MCP tool permissions are a deterministic boundary, and deterministic boundaries belong in configuration that fails closed, not in prose the model may or may not honor.
If this audit reads like the kind of discipline you already apply to individual agentic tasks, that is not a coincidence. It is the same plan, audit, implement, verify loop applied one layer down, to the integration the tasks run on top of. And if you are an engineering leader rather than the person running the audit, the cadence above maps cleanly onto a governance tier: mandate the transport and auth checks, recommend the token and capability review, and make the deprecation-watch a named owner's job rather than an assumption.
The work is keeping it working
MCP is what turns Claude from a capable assistant into a team member that can look things up on its own. The payoff is genuine. So is the dependency you took on to get it. The setup guide gets you to a working connection. The work after that, the part nobody schedules, is keeping it working while the API underneath it moves.
If you have not wired these servers up yet, start with the Jira, GitHub, and Confluence MCP setup guide and build the audit cadence in from day one rather than retrofitting it after the first silent break. If the servers are already in production and you are not sure when their upstream APIs deprecate, that uncertainty is the finding. Scoping and data-boundary configuration is part of what I do in MCP server setup and integration engagements, and a 15-minute call is enough to pressure-test whether your current setup has a deprecation clock you are not watching: book a slot and bring your server list.
The June 30 deadline is one date on one vendor's calendar. The point of the audit is that you stop finding out about those dates from your users.