{"id":14423,"date":"2025-07-10T07:17:01","date_gmt":"2025-07-10T07:17:01","guid":{"rendered":"https:\/\/newestek.com\/?p=14423"},"modified":"2025-07-10T07:17:01","modified_gmt":"2025-07-10T07:17:01","slug":"mcp-is-fueling-agentic-ai-and-introducing-new-security-risks","status":"publish","type":"post","link":"https:\/\/newestek.com\/?p=14423","title":{"rendered":"MCP is fueling agentic AI \u2014 and introducing new security risks"},"content":{"rendered":"<div>\n<div id=\"remove_no_follow\">\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<section class=\"wp-block-bigbite-multi-title\">\n<div class=\"container\"><\/div>\n<\/section>\n<p>Model Context Protocol (MCP) was created in late 2024 by OpenAI\u2019s top competitor Anthropic. It was so good as a means for providing a standardized way to connect AI models to various data sources and tools that OpenAI adopted it as a standard, as have most other big AI players and all three hyperscalers.<\/p>\n<p>In just a few months, MCP has caught fire, with several thousand MCP servers now available from a wide range of vendors enabling AI assistants to connect to their data and services. And with <a href=\"https:\/\/www.cio.com\/article\/3496519\/agentic-ai-decisive-operational-ai-arrives-in-business.html\">agentic AI<\/a> increasingly seen as the future of IT, MCP \u2014 and <a href=\"https:\/\/www.cio.com\/article\/3991302\/ai-protocols-set-standards-for-scalable-results.html\">related protocols ACP and Agent2Agent<\/a> \u2014 will only grow in use in the enterprise.<\/p>\n<p>But as <a href=\"https:\/\/www.csoonline.com\/article\/3529615\/companies-skip-security-hardening-in-rush-to-adopt-ai.html\">organizations rushing into AI<\/a> are beginning to find out, innovations like MCP also come with significant risks.<\/p>\n<p>In May, work management vendor Asana released an MCP server to allow AI assistants to access the Asana Work Graph. Though the server, AI assistants could access an organization\u2019s Asana data, generate reports, and create and manage tasks, for example. One month later, <a href=\"https:\/\/www.csoonline.com\/article\/4009373\/asanas-mcp-ai-connector-could-have-exposed-corporate-data-csos-warned.html\">security researchers found a bug<\/a> that could have allowed users to see data belonging to other users. That same month, Atlassian also released an MCP server. Security researchers <a href=\"https:\/\/www.catonetworks.com\/blog\/cato-ctrl-poc-attack-targeting-atlassians-mcp\/\">found<\/a> a vulnerability allowing attackers to submit malicious support tickets and gain privileged access.<\/p>\n<p>The risk is so big that OWASP launched its <a href=\"https:\/\/owasp.org\/www-project-mcp-top-10\/\">MCP Top 10 project<\/a> the same day as the Atlassian attack report was published, though, as of this writing, the OWASP list is still empty.<\/p>\n<p>On that same week, an update to MCP was <a href=\"https:\/\/modelcontextprotocol.io\/specification\/2025-06-18\/changelog\">released<\/a>, addressing some of the vulnerabilities that security experts have been worrying about.<\/p>\n<p>Here is an in-depth look at MCP and what CISOs should know about its risks, mitigations, and emerging solutions for better securing the MCP servers on which their organization\u2019s AI agents increasingly depend.<\/p>\n<h2 class=\"wp-block-heading\" id=\"what-is-model-context-protocol-mcp\">What is model context protocol (MCP)?<\/h2>\n<p>MCP is a kind of API, but instead of allowing one computer program to talk to another computer program in a standardized way, it allows an AI agent or chatbot to talk to databases, tools, and other resources.<\/p>\n<p>In the past, a company that wanted to pass data into an LLM would turn that data into a vector database and pass relevant context to the AI by adding the information to a prompt. This was called RAG, or <a href=\"https:\/\/www.infoworld.com\/article\/2335814\/what-is-retrieval-augmented-generation-more-accurate-and-reliable-llms.html\">retrieval augmented generation<\/a>, and required a vector database, and then a custom integration into the application\u2019s business logic.<\/p>\n<p>MCP servers turned this on its head.<\/p>\n<p>Instead of doing multiple integrations, a developer can just put an MCP server in front of the database, and an AI agent can just pull whatever data it needs, when it needs it, no additional programming necessary. Anthropic has already announced pre-built MCP servers for Atlassian, Cloudflare, Intercom, Linear, PayPal, Plaid, Sentry, Square, Wokato, Zapier, and Invideo. And that\u2019s for the consumer-friendly version of Claude. Developers using Claude Code can access any MCP server anywhere.<\/p>\n<p>OpenAI announced support for MCP server connections to Cloudflare\u2060, HubSpot\u2060, Intercom, PayPal, Plaid, Shopify\u2060, Stripe, Square, Twilio, Zapier, and more in late May. But developers can connect OpenAI\u2019s models to any MCP server anywhere by using OpenAI\u2019s Responses API.<\/p>\n<p>Companies can use MCP servers to expose their own data to their own AI processes, to expose their own data to external users, or to connect to public sources of information or functionality.<\/p>\n<p>All these carry significant risks to all parties involved, but the technology is so useful that many companies are moving ahead anyway.<\/p>\n<p>And it\u2019s not just tech firms. Yageo Group, a manufacturing company, is already looking at deploying the technology. Some of that is being done by recently acquired subsidiaries. \u201cAnd the parent company I\u2019m working at right now is looking at expanding governance around it,\u201d says Terrick Taylor, information security operations manager at Yageo.<\/p>\n<p>But he\u2019s worried about security implications, including data leakage, and with so many applications being built at so many different sites, it\u2019s hard to keep up. \u201cPretty soon my hair is going to turn gray.\u201d<\/p>\n<h2 class=\"wp-block-heading\" id=\"mitigating-mcp-server-risks\">Mitigating MCP server risks<\/h2>\n<p>When it comes to using MCP servers there\u2019s a big difference between developers using it for personal productivity and enterprises putting them into production use cases.<\/p>\n<p>Derek Ashmore, application transformation principal at Asperitas Consulting, suggests that corporate customers don\u2019t rush on MCP adoption until the technology is safer and more of the major AI vendors support MCP for their production-level environments.<\/p>\n<p>One problem is that while MCP risks can be eliminated or mitigated by deploying MCP servers in a secure manner, others are built into the MCP protocol itself. According to Equixly, the MCP protocol specification mandates session identifiers in URLs, which violates security best practices. MCP also lacks required message signing or verification mechanisms, which allows for message tampering.<\/p>\n<p>\u201cMCP servers are still catching up in this security maturity cycle, making them particularly vulnerable during this adoption phase,\u201d states Equixly CTO Alessio Della Piazza in a <a href=\"https:\/\/equixly.com\/blog\/2025\/03\/29\/mcp-server-new-security-nightmare\/\">blog<\/a>.<\/p>\n<p>Some of these protocol issues were addressed in the latest MCP protocol <a href=\"https:\/\/modelcontextprotocol.io\/specification\/2025-06-18\/changelog\">update<\/a>.<\/p>\n<p>MCP servers are now classified as OAuth resource servers, addressing some of the authentication issues that Equixly identified. There is also a new resource indicator requirement, which could prevent attackers from obtaining access\u2019 tokens.<\/p>\n<p>The protocol has now mandatory protocol version headers, which will help reduce confusion about which version of which MCP server is running.<\/p>\n<p>These <a href=\"https:\/\/modelcontextprotocol.io\/specification\/2025-06-18\/changelog\">changes<\/a> don\u2019t fix all the problems that security researchers have identified, nor do they instantly fix all the MCP servers already deployed, but they\u2019re a sign that the community is moving in the right direction.<\/p>\n<p>And, for enterprises deploying MCP servers and implementing authorization flows, there\u2019s now a new set of MCP security <a href=\"https:\/\/modelcontextprotocol.io\/specification\/2025-06-18\/basic\/security_best_practices\">best practices<\/a>.<\/p>\n<p>If those aren\u2019t enough, <a href=\"https:\/\/support.anthropic.com\/en\/articles\/11596040-best-practices-for-building-mcp-servers\">Anthropic<\/a> has also added a page about MCP server best practices to its own support portal, for organizations building new MCP servers.<\/p>\n<p>And, for organizations deploying third-party MCP servers, CyberArk has some advice:<\/p>\n<ul class=\"wp-block-list\">\n<li>Before using a new MCP server, verify if it is part of the official servers published on the <a href=\"https:\/\/github.com\/modelcontextprotocol\/servers\">MCP GitHub<\/a>; if not, try using it in a sandbox environment first.<\/li>\n<li>Make sure to include MCP in your threat modeling, penetration tests, and red-team exercises.<\/li>\n<li>When you install a local MCP server, perform a manual code review for anomalies or backdoors. Supplement this by submitting the codebase to a large-language model or automated analysis tool to highlight any hidden malicious patterns.<\/li>\n<li>Use an MCP client whose default is to show you every tool call and its input before approving it.<\/li>\n<\/ul>\n<p>Understanding MCP security is going to be key for enterprises going forward, especially if they are deploying AI agents in any significant way.<\/p>\n<p>According to Gartner, MCP is emerging as the AI integration standard predicting that by 2026, 75% of API gateway vendors and 50% of iPaaS vendors will have MCP features.<\/p>\n<p>Organizations need to be careful about the expanded attack surface and about new supply chain risks from third-party MCP servers. That can sound familiar to cybersecurity managers. These are all issues that the industry has had to deal with before. But MCP servers are more than just a new version of APIs, warns Lori MacVittie, distinguished engineer and chief evangelist in F5 Networks\u2019 Office of the CTO. It\u2019s a fundamental paradigm shift, she says, similar in impact to the move from perimeter security to application security.<\/p>\n<p>\u201cMCP is breaking everything,\u201d she says. \u201cIt\u2019s breaking core security assumptions that we\u2019ve held for a long time.\u201d<\/p>\n<p>The reason? Most of the functionality of MPC lies within the context window where the MCP server communicates in plain language with AI agents. That means that there\u2019s potential for deceit and manipulation. \u201cSomeone can say, \u2018I am the CEO,\u2019. How do you prevent that?\u201d<\/p>\n<p>The system can\u2019t be trusted to work as intended because core components \u2014 AI agents and LLM \u2014 are not deterministic. \u201cI don\u2019t think anyone\u2019s got how to do it right yet,\u201d MacVittie says.<\/p>\n<p><strong>MCP security vendors<\/strong><\/p>\n<p>That\u2019s not to say that there aren\u2019t already vendors out there trying to sell MCP security. Here are a few:<\/p>\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/mcp.backslash.security\/\">BackSlash Security<\/a>: Searchable database of thousands of MCP servers with risk ratings, free MCP risk self-assessment tool, and commercial services to manage MCP risks.<\/li>\n<li><a href=\"https:\/\/www.lasso.security\/\">Lasso Security<\/a>: Open-source MCP gateway that allows configuration and lifecycle management of MCP servers and sanitizes sensitive information in MCP messages.<\/li>\n<li><a href=\"https:\/\/invariantlabs.ai\/blog\/introducing-mcp-scan\">Invariant Labs<\/a>: Their MCP-Scan is an open-source scanner that performs static analysis of MCP servers and does real-time monitoring to detect tool poisoning attacks, rug pulls, and prompt injection attacks.<\/li>\n<li><a href=\"https:\/\/www.pillar.security\/\">Pillar Security<\/a>: MCP server protection services including automated discovery, red teaming assessments and runtime protection.<\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2025\/06\/cloud-security-model-context-protocol-mcp-security\/\">Palo Alto Networks<\/a>: Their Cortex Cloud WAAS tool offers MCP protocol validation and detects API-layer attacks against MCP endpoints.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Model Context Protocol (MCP) was created in late 2024 by OpenAI\u2019s top competitor Anthropic. It was so good as a means for providing a standardized way to connect AI models to various data sources and tools that OpenAI adopted it as a standard, as have most other big AI players and all three hyperscalers. In just a few months, MCP has caught fire, with several&#8230; <\/p>\n<p class=\"more\"><a class=\"more-link\" href=\"https:\/\/newestek.com\/?p=14423\">Read More<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-14423","post","type-post","status-publish","format-standard","hentry","category-uncategorized","is-cat-link-borders-light is-cat-link-rounded"],"_links":{"self":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts\/14423","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=14423"}],"version-history":[{"count":0,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts\/14423\/revisions"}],"wp:attachment":[{"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=14423"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=14423"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=14423"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}