Top 10 MCP Security Risks (and How to Avoid Them)
Jun 21, 2025
2 mins
Matt (Co-Founder and CEO)
🛡️ Why MCP Security Matters
Model Context Protocol (MCP) is fast becoming the connective tissue for agent-native applications — bridging LLMs like Claude and GPT with external tools and APIs. But early deployments are facing real-world breaches, misconfigurations, and even injection attacks. The recent article by Secure Micro rang the alarm bells for a lack of security in MCP servers. It's time to reflect on what else is going to prevent companies fully realising the benefits of MCP.
MCP gives agents superpowers. But without proper guardrails, it gives attackers a backdoor too.
Let’s break down the top 10 security risks we’re seeing in the wild.
⚠️ Top 10 Security Risks in MCP Deployments
1. Publicly Exposed MCP Servers
MCP servers shouldn’t be discoverable via Shodan — and yet, here we are.
Impact: Anyone on the internet can hit your endpoints.
Fix: Block all public network access. Whitelist internal traffic. Run behind an API gateway or VPN.
2. No Authentication Layer
By default, many MCP servers accept unauthenticated requests.
Impact: Anyone can act as anyone.
Fix: Require token-based authentication (OAuth2, signed JWT, or scoped bearer tokens).
3. Lack of Scoped Authorization
MCP spec doesn't define scopes — so most implementations skip them.
Impact: An agent can access everything once authenticated.
Fix: Define least-privilege scopes per agent and per function. Validate on every request.
4. Missing Audit Trails
You can’t debug what you don’t log.
Impact: No visibility into what your agents accessed or modified.
Fix: Log every agent interaction: request origin, scope used, action taken, and output.
5. Hardcoded Secrets in Repos
Seen in multiple GitHub MCP examples.
Impact: Anyone can extract your API keys, internal IPs, and DB credentials.
Fix: Use env vars or secret managers. Scan repos with tools like TruffleHog.
6. Injection Vulnerabilities
Anthropic’s reference SQLite server had a confirmed SQLi vector.
Impact: Prompt or toolchain manipulation.
Fix: Sanitize all inputs, including model responses. Apply classic web security practices to agent interfaces.
7. No Rate Limiting or Abuse Protection
MCP agents can be spammed — especially if open to external LLMs.
Impact: DoS attacks, LLM credit burn, function abuse.
Fix: Add rate limiting and request origin validation. Log anomalies.
8. Overprivileged Agents
Many teams let agents access everything “just to get it working.”
Impact: One bad prompt = full database dump.
Fix: Treat agents like untrusted interns. Limit their actions per use case.
9. No Identity Abstraction
Agents act on behalf of users — but how do you prove who initiated what?
Impact: No accountability, no delegation, no rollback.
Fix: Implement structured delegation. Use tokens that encode both agent and user identity.
10. Unsecured Agent-to-Agent Calls
Agents calling other agents via MCP is powerful — and dangerous.
Impact: Chain-of-trust attacks.
Fix: Use signed requests, verify token chains, and scope every hop in the chain.
Tags:#MCP #AgentSecurity #Authentication #Authorization #AIInfrastructure #Prefactor #LLM #DevSecOps #AgentIdentity #M2MSecurity