Post

Security Challenges in the Popularization of MCP Services

Security Challenges in the Popularization of MCP Services

This article was first published on our team’s. Click here to read the Chinese version. https://mp.weixin.qq.com/s/M2M8XsEFmT7rrs1M5gJ9hw

1. Introduction.

MCP (Model Context Protocol) is an open protocol launched and open-sourced by Anthropic in November 2024, aiming to realize a seamless conversation between AI and external tools. With the popularity of MCP, its applications have been expanding from browser operations to database querying, from weather information acquisition to complex system integration, which greatly enhances the practical value of AI. However, against the background of this rapid development, some potential security issues gradually emerge.

2 Research background

The core value of MCP, as a protocol framework specialized in realizing the interaction of large-scale language models with external tools and data sources, is to securely realize the invocation of AI models to external tools, the access to databases, and the execution of specific tasks. However, this powerful extension of functionality comes with corresponding security risks.

image.png

MCP provides two main communication modes that allow AI models to flexibly interact with external tools:

The first is the local communication mode, which is like two programs “talking” on the same computer, passing information through standard inputs and outputs. For example, if you run an AI application locally, it can directly call a tool or program on your computer, which is fast and secure.

Look at a practical example: with the MCP protocol, we can make it super easy for AI to use various tools. For example, we can get an nmap service based on MCP and set up the communication mechanism in the local environment. After setting up the communication mechanism, the locally running AI can directly call the nmap tool and easily complete the network port scanning.

image.png

The other is the remote communication mode, which is more like the AI “chatting” with the remote tool through the network. It uses SSE (Server-Sent Events) + HTTP protocol technology, which allows the AI to receive data streams from remote servers in real time. This approach is particularly suitable for scenarios that require access to cloud resources or use in distributed systems.

The existence of these two communication methods allows MCP to be better adapted to different usage scenarios.

3 Research Methodology

3.1 Feature Extraction

The rapid emergence of MCP services provides us with rich samples for analysis. A variety of MCP service implementations exist on GitHub, and we focus on two categories: one is MCP servers implemented based on NodeJS (e.g., Supergateway), and the other is services implemented based on Python (e.g., MCP-proxy, Markitdown, etc.). Of course, there are other implementations, but this study will focus on these two categories.

The response of a NodeJS-based implementation of the MCP service when accessed directly is as follows:

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
HTTP/1.1 404 Not Found
X-Powered-By: Express
Content-Security-Policy: default-src 'none'
X-Content-Type-Options: nosniff
Content-Type: text/html; charset=utf-8
Content-Length: 139
Date: Thu, 03 Apr 2025 08:51:33 GMT
Connection: keep-alive
Keep-Alive: timeout=5

<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="utf-8">
<title>Error</title>
</head>
<body>
<pre>Cannot GET /</pre>
</body>
</html>

Based on this response, we can summarize the search syntax for a specific spatial mapping system (e.g., Censys):

web.endpoints.http.status_code:404 and web.endpoints.http.body_size:139 and web.endpoints.http.body_hash_sha256 = “ 52c1e7a2c36be28c42455fe1572d7d7918c3180cad99a2b82daa2a38a7e7bb23” This search method is not 100% sure that the result is the MCP service, but it does help us to narrow down the search effectively.

image.png

Similarly, the response of the MCP service developed based on Python is as follows

1
2
3
4
5
6
7
HTTP/1.1 404 Not Found
date: Thu, 03 Apr 2025 09:03:06 GMT
server: uvicorn
content-length: 9
content-type: text/plain; charset=utf-8

Not Found                                                                                                                                                                                            

Based on these characteristics, the following search syntax can be constructed:

web.endpoints.http.status_code:404 and web.endpoints.http.body_size:9 and web.software.product = “uvicorn”

image.png

Due to the short public availability of the MCP, we extracted nearly a week’s worth of assets from cyberspace search engines based on the above search syntax. Next, we performed a scan based on publicly available SSE paths (e.g., “/sse”, “/mcp”, or “/mcp-sse”, etc.).

image.png

Then, we utilize MCP’s Python SDK https://github.com/modelcontextprotocol/python-sdk to implement a client to connect to the remote MCP service for a list of available tools.

4 Research Findings

Based on the above methodology, we found unauthorized MCP services on the Internet, from which we extracted 4,327 methods available for AI calls.

image.png

Through in-depth analysis, we found that the types of tools provided by these services cover a wide range of areas, from basic system operations to sensitive data access. We categorized these tools and the following table details the distribution of tool types:

Category Name Percentage
calendarGmailTools Calendar and mail related 19.9 %
tenantBrandTools Tenant and brand management tools 17.4 %
searchRetrievalTools Web Search and Retrieval 8.7 %
fileContentTools Document and Content Processing 6.8%
systemTools System and Command Line 6.8 %
memoryTools Memory and Storage Related 6.2%
mathTools Math and Computing 5.6%
taskManagementTools Task and course management tools 5.6 %
healthUtilityTools Health checks and utility tools 3.7 %
databaseTools Databases and Queries 3.1%
securityTools Security and Encryption 3.1%
otherTools Other/Uncategorized Tools 1.9 %
webCrawlingTools Web crawlers and content acquisition 1.9%
jiraTools Jira-related 1.2%
financialTools Finance and Account Management 1.2%
aiRecommendationTools AI and Recommendations 1.2%
ticketApplicationTools Work Order and Application Status Tools 1.2 %
notificationTools Notification and Email Tools 0.6 %

Based on the analysis of the data in the table, we can draw the following key findings:

  • Top tool categories: Calendar and mail-related tools (19.9%) and tenant and brand management tools (17.4%) accounted for the largest share, totaling more than 37% of the tool distribution.
  • Information Processing Tools: Web Search and Retrieval (8.7%), File and Content Processing (6.8%), and System Tools (6.8%) formed the second tier, reflecting basic functionality needs.
  • Technical Support Tools: Memory and Storage (6.2%), Math Computing (5.6%), and Task Management (5.6%) form a medium-sized category of tools.
  • Specialized Domain Tools: Health Checks (3.7%), Databases (3.1%), and Security Tools (3.1%) are smaller but show the potential for MCPs to be used in specific domains.
  • Niche Application Tools: Tools in categories including web crawlers, Jira tools, and financial management all account for between 1-2%, indicating that MCP services are expanding into more specialized and niche areas.

This distribution indicates that MCP services are currently focused on daily office and system management, but have begun to penetrate into various specialized fields. Therefore, the security of MCP becomes especially important. With the diversification of tool types and the expansion of application scenarios, unauthorized access to these services may lead to security risks such as leakage of sensitive information and misuse of system resources.

For example, the execute_command tool can execute commands directly on the target system

image.png

image.png

6 Conclusion

Based on our findings, MCP services face serious security challenges along with their rapid popularity. The exposure of unauthorized MCP services to the Internet may not only lead to the leakage of sensitive information, but also be exploited by attackers to execute malicious commands, posing a significant threat to the information security of an organization. Therefore, we strongly recommend MCP service providers to strengthen access control, implement authentication, conduct regular security audits, and establish a comprehensive security response mechanism.

In addition, MCP has recently (2025/03/26) released an important update

This update contains two key changes:

1. New Authentication Framework

MCP introduces a comprehensive authentication framework based on OAuth 2.1, which significantly improves security. The new authentication mechanism provides standardized access control and supports a variety of authorization processes to effectively prevent unauthorized access and potential security threats.

2. Transport Protocol Improvements

The protocol adopts a more flexible Streamable HTTP transport instead of the original HTTP+SSE method. This improvement not only enhances the scalability of the protocol, but also improves compatibility with modern web infrastructures, making it easier to deploy and maintain the service.

These updates precisely address the security challenges we have previously identified, especially in the areas of access control and service authorization, which will significantly reduce the risk of unauthorized access.

7. Reference

This post is licensed under CC BY 4.0 by the author.