benchmark 2026

Give Them an Inch and They Will Take a Mile:Understanding and Measuring Caller Identity Confusion in MCP-Based AI Systems

Yuhang Huang 1, Boyang Ma 1, Biwei Yan 1, Xuelong Dai 1, Yechao Zhang 1, Minghui Xu 1, Kaidi Xu 2, Yue Zhang 1

0 citations

α

Published on arXiv

2603.07473

Insecure Plugin Design

OWASP LLM Top 10 — LLM07

Key Finding

Most real-world MCP servers rely on persistent, caller-agnostic authorization states and lack per-tool authentication, allowing unauthorized callers to invoke sensitive operations after any initial authorization by any other caller

Caller Identity Confusion

Novel technique introduced


The Model Context Protocol (MCP) is an open and standardized interface that enables large language models (LLMs) to interact with external tools and services, and is increasingly adopted by AI agents. However, the security of MCP-based systems remains largely unexplored.In this work, we conduct a large-scale security analysis of MCP servers integrated within MCP clients. We show that treating MCP servers as trusted entities without authenticating the caller identity is fundamentally insecure. Since MCP servers often cannot distinguish who is invoking a request, a single authorization decision may implicitly grant access to multiple, potentially untrusted callers.Our empirical study reveals that most MCP servers rely on persistent authorization states, allowing tool invocations after an initial authorization without re-authentication, regardless of the caller. In addition, many MCP servers fail to enforce authentication at the per-tool level, enabling unauthorized access to sensitive operations.These findings demonstrate that one-time authorization and server-level trust significantly expand the attack surface of MCP-based systems, highlighting the need for explicit caller authentication and fine-grained authorization mechanisms.


Key Contributions

  • Large-scale empirical security analysis of real-world MCP servers demonstrating that most rely on persistent, caller-agnostic authorization states without re-authentication
  • Identification of 'caller identity confusion' as a fundamental flaw — a single authorization decision implicitly grants access to multiple, potentially untrusted callers
  • Proposed system design for explicit per-caller authentication and fine-grained per-tool authorization to mitigate the identified attack surface

🛡️ Threat Analysis


Details

Domains
nlp
Model Types
llm
Threat Tags
inference_timeblack_box
Applications
llm agentsmcp-based ai systemstool-using llms