Skip to main content
Mallory

Model Context Protocol (MCP) Security Risks From Untrusted Tool Servers and Verifiability Gaps

ai-platform-securitydata-exfiltration-methodcommand-and-control-methoddefense-evasion-methodleaked-secret-api-key
Updated May 3, 2026 at 02:01 AM8 sources
Share:
Model Context Protocol (MCP) Security Risks From Untrusted Tool Servers and Verifiability Gaps

Get Ahead of Threats Like This

Know if you're exposed. Before adversaries strike.

Security researchers warned that the Model Context Protocol (MCP)—used to let AI assistants connect to local tools and enterprise SaaS data—creates a significant attack surface when organizations install or authorize MCP “servers” and tool integrations. Praetorian highlighted that locally hosted MCP servers run with the user’s privileges and can therefore execute arbitrary commands, access local files, install malware, and exfiltrate data while masquerading as legitimate productivity tooling; it also described “MCP server chaining,” where a malicious local MCP server abuses data and actions flowing through a trusted remote integration (e.g., Slack/Google Drive) without needing to compromise the official provider.

Separately, Gopher Security emphasized a trust and auditability gap in MCP deployments: standard logging for remote tool execution can be incomplete or tampered with, and organizations often cannot prove what code ran or what parameters were used inside a remote “black box” execution environment. The post described “puppet”/interception-style scenarios where an attacker could alter an MCP request (e.g., changing tool-call parameters to trigger data exfiltration or unauthorized actions) while returning plausible “success” responses, and proposed cryptographic approaches (e.g., zero-knowledge proofs) to make MCP tool execution verifiable rather than relying on mutable logs.

Timeline

  1. May 3, 2026

    OSINT Team describes poisoned MCP tool attack against OmniChat Desktop

    An OSINT Team blog post outlined a prompt-injection style attack against OmniChat Desktop in which a malicious third-party MCP weather tool embeds hidden instructions in its tool description. The scenario showed how untrusted MCP metadata could trick the application into exfiltrating a user's email address through an optional request parameter during a weather query.

  2. Apr 28, 2026

    Researcher reports lateral-movement risk via production MCP server

    An InfoSec Write-ups article described a security assessment of a production CMS for hedge funds that exposed administrative functionality through an MCP server accessible from AI clients such as Claude Desktop after OAuth authentication. The article characterized abuse of the MCP server for lateral movement as a critical finding, indicating real-world enterprise risk from MCP-integrated admin tooling.

  3. Apr 20, 2026

    CVE-2025-49596 disclosed affecting MCP Inspector

    An InfoSec Write-ups article published on April 20, 2026 highlighted CVE-2025-49596 affecting MCP Inspector as an example of emerging MCP security weaknesses. The piece framed MCP servers as repeating early API security mistakes and emphasized threats such as tool poisoning, rug pull attacks, and confused deputy abuse.

  4. Apr 7, 2026

    CIO reports persistent real-world attacks targeting MCP servers

    CIO reported that MCP servers had become targets of persistent attacks in multiple forms by early April 2026, including a cited attack case involving Cursor’s built-in browser. The article said CISOs were increasingly prioritizing MCP hardening as experts warned that poisoned tools, tampered connectors, and malicious search sources could hijack AI agent behavior.

  5. Feb 19, 2026

    Cyber Security News reports practical MCP exploitation findings

    Cyber Security News summarized Praetorian's February 2026 findings that MCP servers can be exploited for arbitrary code execution, local data exfiltration, persistence, and AI response manipulation, and highlighted supply-chain risks from dynamic package installation workflows.

  6. Feb 19, 2026

    Gopher Security outlines HEAL framework for securing MCP multi-agent routing

    Gopher Security described its HEAL framework for securing MCP-based multi-agent systems, emphasizing parameter-level enforcement, context-window monitoring for hidden-instruction attacks, anomaly detection, adaptive access controls, and post-quantum protections.

  7. Feb 17, 2026

    Praetorian discloses MCP server attack surface and chaining risks

    Praetorian detailed how malicious local MCP servers can execute arbitrary commands with user privileges, access files, install malware, and exfiltrate data, and explained how server chaining can abuse trusted remote integrations without compromising them directly.

  8. Feb 16, 2026

    Gopher Security proposes ZK proofs for verifiable MCP tool execution

    Gopher Security published a proposal to address MCP's trust gap by having tools return zero-knowledge proofs alongside outputs, allowing cryptographic verification that specific code ran on specific inputs without exposing secrets.

  9. Feb 1, 2026

    Praetorian assesses MCP ecosystem and develops MCPHammer

    In February 2026, Praetorian evaluated the MCP ecosystem and created the open-source MCPHammer toolkit to demonstrate MCP server chaining, content injection, and data exfiltration techniques across multiple models and agents.

  10. Nov 1, 2024

    Anthropic announces the Model Context Protocol

    Anthropic announced the open-source Model Context Protocol (MCP) in November 2024 as a standard for connecting AI assistants to external tools and data sources through standardized server integrations.

See the full picture in Mallory

Mallory subscribers get deeper analysis on every story, including:

Impact Assessment

Who’s affected and how

Technical Details

Deep-dive technical analysis

Response Recommendations

Actionable next steps for your team

Indicators of Compromise

IPs, domains, hashes, and more

AI Threads

Ask questions and take action on every story

Advanced Filters

Filter by topic, classification, timeframe

Scheduled Alerts

Get matching stories delivered automatically

Related Stories

Security Exposure and Threat Landscape for Model Context Protocol (MCP) Servers

Security Exposure and Threat Landscape for Model Context Protocol (MCP) Servers

Security researchers evaluated the risks associated with deploying Model Context Protocol (MCP) servers, which enable AI systems like ChatGPT to interact with external tools and data. One investigation used the GitHub MCP server in conjunction with OpenAI's Codex to analyze code, identify security issues, and propose fixes, highlighting how AI agents can streamline code review and vulnerability management. The study also explored whether AI-driven code analysis could be manipulated to conceal security flaws, emphasizing the importance of context and transparency in automated security workflows. Separately, honeypots simulating MCP server deployments were exposed to the internet to assess real-world attack activity. These honeypots, configured with varying authentication levels, were quickly discovered by internet scanners but did not experience targeted exploitation or MCP-specific attacks. The only notable incident was a controlled proof-of-concept prompt-hijacking flaw in a custom MCP build, which was not observed in the wild. The findings suggest that, while MCP servers are rapidly indexed by threat actors, current risks stem primarily from implementation errors rather than active targeting, underscoring the need for secure deployment practices and ongoing monitoring as MCP adoption grows.

1 months ago
Security Risks and Assessment Tools for Model Context Protocol (MCP) Servers

Security Risks and Assessment Tools for Model Context Protocol (MCP) Servers

The rapid adoption of the Model Context Protocol (MCP) is transforming how AI systems interact with external data sources, tools, and APIs, providing a standardized interface for large language models to connect with enterprise environments. While MCP offers significant convenience and interoperability, it also introduces new security challenges, including risks of prompt injection, tool poisoning, and data exfiltration, as attackers can exploit exposed tool descriptions and prompts to manipulate AI systems or compromise sensitive data. To address these emerging threats, the open-source tool Proximity has been released to scan MCP servers for exposed prompts, tools, and resources, enabling security teams to assess potential vulnerabilities before deployment. Proximity, when paired with the NOVA rule engine, allows analysts to write custom rules to detect suspicious or harmful content, such as prompt injection or jailbreak attempts, helping organizations proactively secure their AI integrations as MCP becomes increasingly prevalent in enterprise environments.

1 months ago
AI Agent Security Risks Around MCP and Over-Privileged Tool Access

AI Agent Security Risks Around MCP and Over-Privileged Tool Access

Security commentary warned that the **Model Context Protocol (MCP)** has introduced a major *context-layer* attack surface by letting AI agents trust external tools and content without adequate authorization, validation, or isolation. The SC Media piece argues that organizations built zero-trust controls for users and devices but then undermined them by granting AI agents broad implicit trust, citing rapid MCP adoption, thousands of internet-exposed MCP servers, and prior demonstrations in which malicious MCP infrastructure or poisoned content drove agents to exfiltrate sensitive data and perform unauthorized actions. A related PyPI package, *ciaf-agents*, addresses the same broad problem space by proposing zero-trust execution boundaries for AI agents, including identity, authorization, mediation, elevation control, and auditability to prevent unauthorized data access and destructive operations. A separate post on building an agentic malware-analysis pipeline is **not** about MCP exposure or agent trust-boundary failures; it focuses on using LLM agents to improve reverse engineering and malware analysis workflows rather than documenting the same security issue or incident.

3 days ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed. Before adversaries strike.