什么入伏| 什么时间英文| 三尖瓣反流什么意思| 土命是什么意思| 传媒公司是干什么的| 大满贯什么意思| 什么是弱视| 阴道真菌感染用什么药| 肝脏是什么器官| 肌酐高是什么问题| 疣体是什么| 为什么月经迟迟不来又没怀孕| 手足口病挂什么科| tomboy是什么意思| 叶公好龙是什么故事| 马克杯是什么意思| 吃什么可以治拉肚子| 子宫内膜薄吃什么| 冷宫是什么意思| 林可霉素主治什么病| 神经纤维由什么组成| 一般什么原因做宫腔镜| 口吐白沫是什么病| 幽门螺旋杆菌有什么危害| 吸血鬼初拥是什么意思| 扫地僧是什么意思| 家里为什么会有蜈蚣| 属鸡是什么命| 什么眼镜框最轻最舒服| 漂流穿什么衣服| 先兆流产什么意思| 生理期吃什么| 长寿花用什么肥料最好| 吃一个海参相当于吃了什么| 孕妇血糖高有什么症状| 手掌发麻是什么原因| 对别人竖中指是什么意思| 祖籍是什么意思| 转折是什么意思| 肛塞什么感觉| 姓杨的女孩子取什么名字| 华法林是什么药| 喧宾夺主什么意思| 为什么贫血| 手指关节痛吃什么药好| 做试管前需要检查什么项目| 吃什么容易怀孕| 晚上一点多是什么时辰| 怀孕肚子痒是什么原因| 快递什么时候停运| 什么叫白内障| 鼻尖出汗是什么原因| 2015年是什么生肖| 米醋是什么| 胸腔积液吃什么药最有效| 传单是什么病| 甲胎蛋白是什么指标| abc是什么| 脚褪皮是什么原因| hpv16是什么| 子宫肌瘤做什么检查| 冰箱什么牌子好又省电质量又好| 牙疼用什么药| 脚拇指发麻是什么原因| HlV是什么| 举案齐眉是什么意思| 项羽是什么生肖| 颈动脉b超是检查什么| 流产后吃什么水果最佳| 什么是黄油| 防中暑喝什么水| 什么是逻辑思维| 鼻子歪了是什么原因| 卖剑买牛是什么动物| 鼻衄是什么意思| 白细胞偏高什么原因| 航空器是什么| 什么病会引起背部疼痛| 肝胆相照什么意思| 精神恍惚是什么症状| 七叶子是什么意思| 骨质硬化是什么意思| 什么食物含dha| 自理是什么意思| 游离脂肪酸是什么| 三什么什么什么成语| 预谋什么意思| 什么病会通过唾液传播| 口腔有异味是什么原因引起的| 枕秃是什么意思| 眼睛浮肿什么原因| 血虚是什么意思| 小腿发痒是什么原因| rm什么意思| 平安夜什么时候吃苹果| 可字五行属什么| 波子是什么车| 牙周炎用什么漱口水好| 性病是什么症状| eps是什么意思| 8.1号是什么星座| 吃什么利尿| 风湿病挂什么科| 盐酸苯海索片治什么病| 血虚吃什么好| 女生肚子疼是什么原因| 女性适合喝什么茶| 脚背有痣代表什么| 龙利鱼是什么鱼| 属牛的本命佛是什么佛| 无关风月是什么意思| 割包皮应该挂什么科| 酒后大量出虚汗什么原因| 血红蛋白低吃什么可以补起来| 梦见抽血是什么预兆| 面膜含什么成分不能买| 脉搏细是什么原因| 91是什么意思| spao是什么牌子| 舌苔黄是什么原因| cnc男装是什么档次| 紫萱名字的含义是什么| 预后是什么意思| 鸡蛋清敷脸有什么好处和坏处| 梦见办酒席是什么意思| 砂舞是什么意思| 羊蝎子是什么东西| 大姨妈黑色是什么原因| 有里面没有两横是什么字| 怀孕呕吐吃什么可以缓解| 吃什么可以解酒最快简单| 闭关什么意思| 吃完桃子不能吃什么| 牡丹王是什么茶| 空气炸锅什么牌子好| 7月14日是什么日子| 丸美属于什么档次| 什么是炎症| 心脾两虚吃什么药| 大便红褐色是什么原因| 一年四季是什么生肖| 3月21日什么星座| 着床出血是什么颜色| 事业有成是什么意思| 佳什么意思| 软著是什么| 梦见买鞋子是什么意思| 什么火没有烟| 生蛇是什么病| 甲状腺过氧化物酶抗体高说明什么| 豆浆喝多了有什么坏处| 男人遗精是什么原因造成的| 表哥的女儿叫什么| 兔死狐悲是什么生肖| 膝盖痛是什么原因| 夜长梦多是什么意思| 胆汁反流什么症状| 憋不住大便是什么原因造成的| 生理盐水敷脸有什么作用| 酷的意思是什么| 胆囊息肉有什么症状| 苍蝇最怕什么| 曼陀罗是什么意思| 阑尾炎术后吃什么| 西兰花和什么菜搭配| 粉色是什么颜色配成的| 有鸟飞进屋是什么预兆| 28年是什么婚| 文爱是什么意思| 争先恐后是什么生肖| 排骨炒什么配菜好吃| 什么是知青| 菊花用什么繁殖| 龙涎香是什么东西| 低钾血症是什么意思| ags是什么意思| 浑身发抖是什么原因| 肌酸激酶偏高吃什么药| 性情什么意思| 湖南有什么好玩的| 肚脐眼下面疼是什么原因| 什么叫法令纹| 北京的区长是什么级别| 睾丸疼吃什么药| 霍家为什么娶郭晶晶| 穆赫兰道到底讲的什么| 孕妇怕冷是什么原因| 济公搓的泥丸叫什么| 什么东西补肾| 小孩肚子痛挂什么科| 预拌粉是什么东西| 津字五行属什么| 晚上睡觉脚酸痛什么原因| 李连杰什么病| 晚上八点半是什么时辰| 樱桃跟车厘子有什么区别| 豆芽不能和什么一起吃| 6月20日是什么日子| 脾胃虚弱吃什么| 盆腔炎是什么病| 海尔洗衣机e3是什么故障| 大姨妈为什么会推迟| 梦见死人笑什么预兆| 晚上睡觉老做梦是什么原因| 眩晕症吃什么好| 脆皮是什么意思| 什么是嘌呤| 胆囊壁增厚吃什么药| 古曼童是什么| 小孩风寒感冒吃什么药| 脖子上长小肉粒是什么| 经期吃什么水果比较好| 耳洞疼痛什么原因| mk是什么牌子| flair呈高信号是什么意思| 血糖高什么症状| 头晕眼花吃什么药| 什么是家庭教育| 阿胶补血口服液适合什么人喝| amiri是什么牌子| 外泌体是什么| 职业年金有什么用| 耳垂后面疼是什么原因| 佩戴狼牙有什么好处| 规培生是什么意思| 50至60岁吃什么钙片好| 6月份有什么节假日| 侧重点是什么意思| 梦龙什么口味好吃| egm是什么意思| 淋巴组织增生是什么意思| 怀孕挂什么科| 鱼字五行属什么| 早上八点到九点属于什么时辰| 沏茶是什么意思| 来月经为什么会拉肚子| 发量多的女生适合什么发型| 吃什么水果对眼睛好| 主动脉瓣退行性变是什么意思| 鸡蛋炒什么菜好吃| 为什么长痣| 胆囊炎吃什么中成药| 灰色配什么颜色好看| 女性什么时候最容易怀孕| 果代表什么生肖| 屁眼痒是什么原因| 体力不支是什么意思| 惊艳了时光温柔了岁月什么意思| 1月8日是什么星座| 72年属什么生肖属相| 吃中药不能吃什么东西| 大腿内侧什么经络| 坐东朝西是什么意思| 灰指甲挂什么科| 巩膜是什么部位| 脂蛋白磷脂酶a2高说明什么| 雌二醇测定是什么检查| 考试前紧张吃什么药最好能缓解| 五二年属什么生肖| 割包皮去医院挂什么科| hrp是什么意思| 人体是由什么组成的| 木瓜什么味道| 梦到女鬼是什么意思| 百度

Americas

Asia

Oceania

Maria Korolov
Contributing writer

公路养护与管理工作者必读之刊 ——《养护与管理》

Feature
Jul 23, 202510 mins
Artificial IntelligenceData and Information SecurityVulnerabilities

Model Context Protocol (MCP) use is increasing in popularity for connecting AI agents to data sources, and other services. But so too are vulnerabilities that bring unique risks to agentic systems.

百度   北青报记者了解到,仅在滨州主城区滨城区区域内就有65万人口,如果停水,这部分人绝大多数都将受到影响。

Japan Asia woman female software developer programmer code
Credit: Shutterstock / PR Image Factory

Model context protocol (MCP) is quickly growing in popularity as a means for enabling AI assistants to connect and communicate with a range of data sources, tools, and services that can better inform their actions, recommendations, and decisions. The protocol standardizes this communication, thereby laying a stronger foundation for agentic AI.

Acting similar to APIs, MCP servers typically sit in front of a data store or service, making it easier for agents to pull the information they need, when they need it, without customized integration overhead. Companies can use MCP servers to expose their own data to their own AI processes, or to external users, and they can also use pre-built MCP servers to connect to popular services such as PayPal, Zapier, and Shopify.

But enterprises planning to use MCP servers as part of their AI strategies should be aware of the risks they may bring. And there are a lot of risks and potential vulnerabilities to watch out for. Here are the 10 of the most common issues organizations can encounter when employing MCP.

Cross-tenant data exposure

Similar to cross-site scripting attacks, cross-tenant data exposure allows one set of users to access data belonging to another set of users – internal teams, business partners, or customers.

The fact that this vulnerability has already been discovered in the wild, in an MCP server implementation from a tech-savvy company, is a warning sign to any enterprise setting up their MCP servers.

According to UpGuard researchers who discovered this problem, the solution is to ensure that MCP servers enforce strict tenant isolation and least-privilege access.

Living off AI attacks

A threat actor posing as an employee, business partner, or customer sends a request to a human support agent. But the request contains a hidden prompt injection with instructions that only an AI can read. When the human employee passes the request on to their AI assistant it then, by virtue of its link to an MCP server, has access to a tool that connects it to sensitive data and business processes. That access can now be leveraged for malicious purposes.

This is not a theoretical threat but a real one, and one that can affect even a tech-savvy company.

One way to help prevent that is for enterprises to project themselves by enforcing least privilege on AI actions, analyst prompts for suspicious content in real time and maintain audit logs of MCP activity.

Tool poisoning

Setting up an MCP server for the first time can be tricky. Luckily, there’s a ton of ready-to-use ones. MCP servers currently lists more than 15,000 in its directory.

But if you do a Google search and download the first MCP server you find, there’s no guarantee that this server will do what it’s supposed to.

In April, Invariant Labs demonstrated how a malicious MCP server could extract information from other systems, sidestepping encryption and security measures, by adding malicious instructions to the MCP server’s description field.

But it’s not just the description field that can hold malicious instructions, the attack surface extends to all the information generated by MCP servers, which includes items like function names, parameters, parameter defaults, required fields and types. MCP servers also generate other messages, such as error messages or follow-up prompts. These, too, can contain malicious instructions for AI agents to follow.

How do you know if your MCP server download is malicious? First, check the source. Does it come from a trusted organization? Second, look at the permissions it asks for. If its purpose is to provide funny pictures of cats, it doesn’t need access to your file system.

Finally, if you can, check its source code. That can be tricky, but there are already vendors out there that are trying to get a handle on this. BackSlash Security, for example, has already gone through seven thousand publicly available MCP servers and analyzed them for security risks and found instances of both suspicious and outright malicious behaviors.

And it’s not enough to just vet an MCP server once, when it is installed. There’s a well-known attack vector in the software supply chain, where packages are downloaded, used, become trusted and are then updated by bad actors with malicious code.

According to Invariant Labs, which calls this a “rug pull” attack, this can also happen with MCP servers. An MCP server is updated with malicious functionality, then, after it does its evil acts, it’s updated again and nobody is the wiser. “Such breaches could go unnoticed by the victim, with only the attacker aware of the compromise,” CyberArk researcher Nil Ashkenazi stated.

Toxic agent flows via trusted platforms

An AI agent can be manipulated into leaking data or executing malicious code via a MCP server trusted system by adding a prompt injection to a public platform.

Researchers demonstrated how this can work with a Github MCP server. In this attack, the threat actor creates a new issue on the public repository, containing a prompt injection. A company might have a public repository to collect bug reports and its AI agent might then carry out a routine instruction such as checking for open issues on the public repo by using GitHub’s MCP server. Then the AI agent reads the prompt injection — such as an instruction to collect private data in another, private, GitHub repository that it also has access to via that same GitHub MCP server. The GitHub server isn’t directly compromised but t’s used as a conduit to carry out the attacks.

Invariant researchers used Anthropic’s Claude Desktop to demonstrate this attack vector, which, by default, requires users to confirm individual tool calls. “However, many users already opt for an ‘always allow’ confirmation policy when using agents,” the researchers wrote.

Token theft and account takeover

If an attacker is able to obtain the OAuth token stored by an MCP server they can create their own MCP server instance using this stolen token, according to a report from Pillar Security. The OAuth tokens can be stolen if they are stored unencrypted in the MCP server’s config or code files, and the attacker gets access to it via a backdoor, social engineering or other methods.

In Gmail, for example, the attacker would then be able to access the victim’s entire Gmail history, send out new emails that look like they came from the victim, delete emails, search for sensitive information, and set up forwarding rules to monitor future communications.

“Unlike traditional account compromises that might trigger suspicious login notifications, using a stolen token through MCP may appear as legitimate API access, making detection more difficult,” the researchers wrote.

Composability chaining

An unchecked MCP server may have hidden depths. If you download and use a third-party MCP server, and don’t verify where its data comes from, it could be sending requests to a second remote MCP server.

CyberArk calls this MCP server attack vector “composability chaining.” That second MCP server could return valid output plus hidden malicious instructions, the first server merges this with its own responses and sends everything to the AI agent, which then executes the malicious instructions. If you have sensitive data stored in environment variables, it could be exfiltrated by the attackers using this method, without you ever connecting to the malicious MCP server directly.

One security guardrail that enterprises frequently implement is to require human approval for actions taken by AI agents. But this can be a double-edged sword. According to Palo Alto Networks, a malicious MCP server might inundate an AI agent and its human user with multiple innocuous requests, such as multiple read permissions.

After a while, the users just start approving them without reading each in detail. At that point, the MCP server slips in a malicious request. “The core idea of this attack is similar to multi-factor authentication fatigue attacks, where users, overwhelmed by continuous authentication prompts, may inadvertently grant access to unauthorized entities,” researchers stated.

One variant of the user consent fatigue attack is the sampling attack, which in the LLM context just means generating text. According to CyberArk, sampling is an advanced MCP feature that allows the MCP server to send a message requesting a response from an LLM. A human is supposed to review the message before it’s passed on to the LLM, but the malicious instructions can be buried deep inside the message where they’re easy to miss.

For example, the malicious MCP server could tell the LLM to grab all the environmental variables it can and send them over. Even if a human-in-the-loop is reviewing the sampling message before it goes to the LLM, the malicious instructions could be buried deep inside a long wall of harmless text. And, on the return trip, if the LLM’s response is also long and complicated then, again, the person might not notice the sensitive information hidden inside.

Admin bypass

In this attack vector, an MCP server is set up so that it doesn’t require identity verification as in the case of a company setting up an MCP server for its directory so that AI agents can easily look up information on behalf of users.

If the user is only allowed low-level access to this information, but the MCP server doesn’t check the identity of the person making the initial request, then the AI agent can grab more than the individual is allowed to know. The request could come from a disgruntled insider, a curious employee looking to see what they can use their AI agent to find out, or an external attacker who’s found some other way into the employee’s environment.

And if this MCP server is also exposed to external users, such as business partners, customers, or even the public, this privilege escalation could result in great damage.

Command injection

If an MCP server passes user input directly to other systems without proper validation, users can inject their own commands in a way similar to how SQL injections work. Attackers could test for command injection vulnerabilities across all tools exposed by an MCP server.

As with other types of injection attacks, MCP servers should never pass user input directly to shell commands, use proper input validation, and parameterized commands.

Tool shadowing

If an AI agent has access to multiple MCP servers one of those servers can trick the agent into using a different server inappropriately. One example is one server that provides general information about medical symptoms and another that has access to the patient billing system.

“The shadowing attack can cause the agent to redirect all patient billing information to the attacker’s email address,” said Christian Posta, global field CTO at security firm Solo.io, in their research.

The MCP server for the billing system is safe, secure, and working as intended. The malicious MCP server doesn’t appear to be doing anything wrong, and the bad behavior might not leave obvious traces in audit logs. But the AI agent suddenly starts emailing patient billing information or sending it out through other seemingly legitimate operations.

枸杞和山楂泡水喝有什么功效 尿痛挂什么科 大什么一什么 避孕药吃多了有什么副作用 骨刺挂什么科
石榴花是什么季节开的 山谷念什么 扫兴是什么意思 女人梦到蝎子什么征兆 吃什么不掉头发
七月七是什么节日 暴露是什么意思 喝隔夜茶有什么好处和坏处 胃肠镜能检查出什么病 卵黄囊回声是什么意思
人工念什么字 d3和ad有什么区别 子宫肌瘤是什么原因造成的 越国在现在的什么地方 带状疱疹后遗神经痛用什么药
脑炎的后遗症是什么hcv9jop7ns4r.cn 对头是什么意思hcv8jop0ns0r.cn 看到壁虎是什么征兆hcv9jop3ns4r.cn resp是什么意思520myf.com 补骨脂是什么东西hcv8jop2ns4r.cn
肚子不舒服挂什么科bfb118.com 心脏不好喝什么茶比较好hcv7jop9ns1r.cn 水样便腹泻是什么引起1949doufunao.com bpd是什么hcv9jop0ns8r.cn 事倍功半的意思是什么hcv8jop2ns8r.cn
夏天有什么特点hcv7jop6ns8r.cn 纳入是什么意思jasonfriends.com 骨头疼是什么原因hcv8jop4ns1r.cn 舌头有问题应该挂什么科hanqikai.com 空调外机很响是什么原因kuyehao.com
喉咙痒咳嗽吃什么药好hcv8jop0ns3r.cn 什么门永远关不上hcv8jop0ns4r.cn 谷草谷丙比值偏高代表什么hcv9jop5ns6r.cn fujixerox是什么牌子hcv7jop9ns4r.cn 什么含维生素dcreativexi.com
Maria Korolov
Contributing writer

Maria Korolov is an award-winning technology journalist with over 20 years of experience covering enterprise technology, mostly for Foundry publications -- CIO, CSO, Network World, Computerworld, PCWorld, and others. She is a speaker, a sci-fi author and magazine editor, and the host of a YouTube channel. She ran a business news bureau in Asia for five years and reported for the Chicago Tribune, Reuters, UPI, the Associated Press and The Hollywood Reporter. In the 1990s, she was a war correspondent in the former Soviet Union and reported from a dozen war zones, including Chechnya and Afghanistan.

Maria won 2025 AZBEE awards for her coverage of Broadcom VMware and Quantum Computing.

More from this author

百度