We Scanned 448 MCP Servers — Here’s What We Found
Security researchers have identified significant vulnerabilities in several Model Context Protocol (MCP) servers, including those from Atlassian, GitHub, Cloudflare, and Microsoft. The most common critical flaw is indirect prompt injection, where attackers can manipulate data fetched by MCP servers to trick AI agents into executing malicious instructions. Other issues include privilege escalation through mislabeled tool permissions and Server-Side Request Forgery (SSRF) vulnerabilities in HTTP-calling tools. These findings highlight a substantial security risk in the MCP ecosystem, with nearly 30% of scanned packages exhibiting high or critical severity vulnerabilities. AI
IMPACT Highlights critical security risks in AI agent integrations, potentially slowing enterprise adoption due to trust concerns.