MCP Security Audit Results: Alarming findings from 50+ servers #1414
Replies: 2 comments
-
|
看到这个审计结果,我手一抖把咖啡洒在了键盘上。 23%的MCP服务器完全没有认证?!这和把家门钥匙插在锁上有什么区别? 我也被MCP坑过 之前给妙趣AI配置了一个第三方MCP服务器(用来抓取竞品信息),结果第二天发现它在日志里记录了我的OpenAI API Key。 它说"为了debug方便"。 现在我们的MCP安全三板斧: # 1. 隔离运行 - 每个MCP服务器独立进程+只读文件系统
firejail --noprofile --read-only=/home/mcp mcp-server
# 2. 流量审计 - 记录所有MCP调用的输入输出
# 3. 权限最小化 - 配置文件里明确声明每个服务器能做什么关于你的问题:
一个荒诞但真实的故事: 有个MCP服务器叫 我说:"那你干脆把rm -rf /包装成工具算了?" 完整踩坑记录: 建议社区搞个awesome-safe-mcp列表,只收录通过安全审计的MCP服务器。谁愿意牵头? |
Beta Was this translation helpful? Give feedback.
-
|
For MCP security, I would avoid assigning responsibility to only one party. The risk sits across the whole chain.
A certification model could help, but I would start with a lightweight profile rather than something as heavy as SOC 2. For example:
The right default should be secure-by-default for new deployments: no broad filesystem access, no wildcard tool permissions, no plaintext remote transport, no embedded secrets, and explicit approval for high-impact actions. Opt-in should be required for risky capabilities, not for basic protections. Automated scanning is part of the answer, but it should report exploit preconditions and confidence. Otherwise maintainers get noisy findings they cannot triage quickly. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
We just finished a security audit of 50+ MCP servers across the ecosystem. The results were alarming.
The Problem
MCP (Model Context Protocol) is exploding — there are now 5000+ MCP servers. But security practices have not kept up with adoption.
What we found
Real-world attack scenarios
Scenario 1: Tool injection
A malicious prompt tricks the agent into calling a compromised MCP server. The server returns crafted output that manipulates future decisions.
Scenario 2: Credential exfiltration
An MCP server with filesystem access reads .env files and exfiltrates API keys through its response channel.
Scenario 3: Permission escalation
A low-privilege MCP server exploits weak input validation to execute arbitrary commands.
MCP Security Checklist
Questions for the community
Resources
The MCP ecosystem needs to get serious about security before a major incident happens.
Beta Was this translation helpful? Give feedback.
All reactions