MCPGuard : Automatically Detecting Vulnerabilities in MCP Servers
Bin Wang 1, Zexin Liu 1, Hao Yu 1, Ao Yang 1, Yenan Huang 2, Jing Guo 2, Huangsheng Cheng 2, Hui Li 1, Huiyu Wu 2
Published on arXiv
2510.23673
AI Supply Chain Attacks
OWASP ML Top 10 — ML06
Insecure Plugin Design
OWASP LLM Top 10 — LLM07
Prompt Injection
OWASP LLM Top 10 — LLM01
Key Finding
MCP security requires novel defenses because the attack surface extends beyond traditional code execution to semantic interpretation of natural language metadata in tool descriptions, enabling tool poisoning and agent hijacking at scale.
MCPGuard
Novel technique introduced
The Model Context Protocol (MCP) has emerged as a standardized interface enabling seamless integration between Large Language Models (LLMs) and external data sources and tools. While MCP significantly reduces development complexity and enhances agent capabilities, its openness and extensibility introduce critical security vulnerabilities that threaten system trustworthiness and user data protection. This paper systematically analyzes the security landscape of MCP-based systems, identifying three principal threat categories: (1) agent hijacking attacks stemming from protocol design deficiencies; (2) traditional web vulnerabilities in MCP servers; and (3) supply chain security. To address these challenges, we comprehensively survey existing defense strategies, examining both proactive server-side scanning approaches, ranging from layered detection pipelines and agentic auditing frameworks to zero-trust registry systems, and runtime interaction monitoring solutions that provide continuous oversight and policy enforcement. Our analysis reveals that MCP security fundamentally represents a paradigm shift where the attack surface extends from traditional code execution to semantic interpretation of natural language metadata, necessitating novel defense mechanisms tailored to this unique threat model.
Key Contributions
- Systematic taxonomy of MCP security threats across three categories: agent hijacking from protocol design flaws, traditional web vulnerabilities, and supply chain risks
- Comprehensive survey of proactive and runtime defense strategies including layered detection pipelines, agentic auditing frameworks, and zero-trust registry systems
- Identification that MCP security represents a paradigm shift where the attack surface extends to semantic interpretation of natural language metadata in tool descriptions
🛡️ Threat Analysis
One of the three explicitly identified threat categories is supply chain security for MCP servers, covering compromised MCP packages distributed via registries and zero-trust registry systems as countermeasures — directly within ML06's scope of attacks on the AI/ML ecosystem and tooling infrastructure before deployment.