attack 2026

Compatibility at a Cost: Systematic Discovery and Exploitation of MCP Clause-Compliance Vulnerabilities

Nanzi Yang , Weiheng Bai , Kangjie Lu

0 citations

α

Published on arXiv

2603.10163

Insecure Plugin Design

OWASP LLM Top 10 — LLM07

Prompt Injection

OWASP LLM Top 10 — LLM01

Key Finding

The first systematic framework for MCP clause-compliance analysis reveals exploitable non-compliance vulnerabilities across multi-language MCP SDKs, enabling attacks including silent prompt injection and denial of service against LLM agents.

Compatibility-Abusing Attacks

Novel technique introduced


The Model Context Protocol (MCP) is a recently proposed interoperability standard that unifies how AI agents connect with external tools and data sources. By defining a set of common client-server message exchange clauses, MCP replaces fragmented integrations with a standardized, plug-and-play framework. However, to be compatible with diverse AI agents, the MCP specification relaxes many behavioral constraints into optional clauses, leading to misuse-prone SDK implementation. We identify it as a new attack surface that allows adversaries to achieve multiple attacks (e.g, silent prompt injection, DoS, etc.), named as \emph{compatibility-abusing attacks}. In this work, we present the first systematic framework for analyzing this new attack surface across multi-language MCP SDKs. First, we construct a universal and language-agnostic intermediate representation (IR) generator that normalizes SDKs of different languages. Next, based on the new IR, we propose auditable static analysis with LLM-guided semantic reasoning for cross-language/clause compliance analysis. Third, by formalizing the attack semantics of the MCP clauses, we build three attack modalities and develop a modality-guided pipeline to uncover exploitable non-compliance issues.


Key Contributions

  • Identification of 'compatibility-abusing attacks' — a new attack surface arising from optional/relaxed behavioral clauses in MCP SDKs across multiple languages
  • Language-agnostic intermediate representation (IR) generator enabling cross-language static analysis of MCP SDK compliance
  • Three formalized attack modalities (including silent prompt injection and DoS) with a modality-guided pipeline to discover exploitable non-compliance issues in MCP implementations

🛡️ Threat Analysis


Details

Domains
nlp
Model Types
llm
Threat Tags
white_boxinference_time
Datasets
Multi-language MCP SDKs
Applications
llm agentsmcp-integrated ai systemsai tool/plugin frameworks