Give Them an Inch and They Will Take a Mile:Understanding and Measuring Caller Identity Confusion in MCP-Based AI Systems
Yuhang Huang 1, Boyang Ma 1, Biwei Yan 1, Xuelong Dai 1, Yechao Zhang 1, Minghui Xu 1, Kaidi Xu 2, Yue Zhang 1
Published on arXiv
2603.07473
Insecure Plugin Design
OWASP LLM Top 10 — LLM07
Key Finding
Most real-world MCP servers rely on persistent, caller-agnostic authorization states and lack per-tool authentication, allowing unauthorized callers to invoke sensitive operations after any initial authorization by any other caller
Caller Identity Confusion
Novel technique introduced
The Model Context Protocol (MCP) is an open and standardized interface that enables large language models (LLMs) to interact with external tools and services, and is increasingly adopted by AI agents. However, the security of MCP-based systems remains largely unexplored.In this work, we conduct a large-scale security analysis of MCP servers integrated within MCP clients. We show that treating MCP servers as trusted entities without authenticating the caller identity is fundamentally insecure. Since MCP servers often cannot distinguish who is invoking a request, a single authorization decision may implicitly grant access to multiple, potentially untrusted callers.Our empirical study reveals that most MCP servers rely on persistent authorization states, allowing tool invocations after an initial authorization without re-authentication, regardless of the caller. In addition, many MCP servers fail to enforce authentication at the per-tool level, enabling unauthorized access to sensitive operations.These findings demonstrate that one-time authorization and server-level trust significantly expand the attack surface of MCP-based systems, highlighting the need for explicit caller authentication and fine-grained authorization mechanisms.
Key Contributions
- Large-scale empirical security analysis of real-world MCP servers demonstrating that most rely on persistent, caller-agnostic authorization states without re-authentication
- Identification of 'caller identity confusion' as a fundamental flaw — a single authorization decision implicitly grants access to multiple, potentially untrusted callers
- Proposed system design for explicit per-caller authentication and fine-grained per-tool authorization to mitigate the identified attack surface