MCPGuard : Automatically Detecting Vulnerabilities in MCP Servers
2510.23673v1
cs.CR, cs.AI
2025-10-30
Авторы:
Bin Wang, Zexin Liu, Hao Yu, Ao Yang, Yenan Huang, Jing Guo, Huangsheng Cheng, Hui Li, Huiyu Wu
Abstract
The Model Context Protocol (MCP) has emerged as a standardized interface
enabling seamless integration between Large Language Models (LLMs) and external
data sources and tools. While MCP significantly reduces development complexity
and enhances agent capabilities, its openness and extensibility introduce
critical security vulnerabilities that threaten system trustworthiness and user
data protection. This paper systematically analyzes the security landscape of
MCP-based systems, identifying three principal threat categories: (1) agent
hijacking attacks stemming from protocol design deficiencies; (2) traditional
web vulnerabilities in MCP servers; and (3) supply chain security. To address
these challenges, we comprehensively survey existing defense strategies,
examining both proactive server-side scanning approaches, ranging from layered
detection pipelines and agentic auditing frameworks to zero-trust registry
systems, and runtime interaction monitoring solutions that provide continuous
oversight and policy enforcement. Our analysis reveals that MCP security
fundamentally represents a paradigm shift where the attack surface extends from
traditional code execution to semantic interpretation of natural language
metadata, necessitating novel defense mechanisms tailored to this unique threat
model.
Ссылки и действия
Дополнительные ресурсы: