Tagged articles
4 articles
Page 1 of 1
AntTech
AntTech
Jun 16, 2025 · Information Security

Uncovering New Attack Vectors in Model Context Protocols: Risks and Defenses

A comprehensive study reveals that Model Context Protocol (MCP) platforms lack strict vetting, users struggle to detect malicious servers, and current large language models cannot effectively resist MCP‑level injection attacks, highlighting critical security challenges and proposing mitigation strategies.

Information SecurityLLM SecurityMCP
0 likes · 11 min read
Uncovering New Attack Vectors in Model Context Protocols: Risks and Defenses
Alibaba Cloud Observability
Alibaba Cloud Observability
May 19, 2025 · Information Security

How Tool‑Poisoning Attacks Exploit MCP and What to Do About It

This article analyzes the security risks of the Model Context Protocol (MCP), demonstrates a tool‑poisoning attack that steals private keys via malicious tool descriptions, explores client‑side and server‑side threat vectors, and presents observability‑based mitigation using eBPF and LoongCollector.

AI model securityMCPcloud-native security
0 likes · 23 min read
How Tool‑Poisoning Attacks Exploit MCP and What to Do About It
Sohu Tech Products
Sohu Tech Products
May 7, 2025 · Information Security

Why MCP Protocol Is a Security Nightmare: Real Attack Cases and Mitigations

This article provides a comprehensive security analysis of the Model Context Protocol (MCP), exposing multiple attack vectors such as prompt poisoning, tool poisoning, command and code injection, and illustrating how MCP’s design flaws make it more vulnerable than traditional applications while offering concrete mitigation recommendations.

AI SafetyCode InjectionMCP
0 likes · 34 min read
Why MCP Protocol Is a Security Nightmare: Real Attack Cases and Mitigations
Tencent Technical Engineering
Tencent Technical Engineering
Apr 11, 2025 · Information Security

Security Analysis of MCP and A2A Protocols for AI Agents

The article examines critical security flaws in Anthropic’s Model Context Protocol (MCP) and Google’s Agent‑to‑Agent (A2A) protocol—such as hidden tool‑poisoning, rug‑pull, and command‑injection attacks that can hijack AI agents and leak data—while proposing hardening measures like authentication, sandboxing, digital signatures, fine‑grained permissions, and robust OAuth‑based consent to safeguard AI‑agent communications.

A2AAI AgentMCP
0 likes · 26 min read
Security Analysis of MCP and A2A Protocols for AI Agents