
Attack scenario 1: Malicious code and credential theft via supply chain
Attack scenario 2: Over-privileged credentials enable lateral movement
Attack scenario 3: Prompt injection triggers unauthorized database operations
Attack scenario 4: Exposed Remote MCP Servers with no authentication
Attack scenario 5: Credential leakage through logs and crash dumps
Detecting MCP security incidents
Most teams treat MCP servers the way they treated cloud storage buckets in 2018. They see them as a necessary infrastructure to be set up quickly and secured later. The problem is that an MCP server is a credentialed execution layer. In most real-world deployments, it holds live credentials for every backend service it is configured to reach.
When one is compromised, an attacker does not have to work through a list of targets. They gain access to GitHub, production databases, cloud infrastructure, and internal APIs in a single step, and the security risks scale with every service the server can reach.
Let's walk through five attack scenarios playing out across real-world MCP deployments right now. These include supply chain compromise, overprivileged credentials, prompt injection, unauthenticated server exposure, and credential leakage through logs. For each scenario, we explain how the attack works, why it succeeds, what to monitor, and the highest impact defenses.
MCP servers are high-value targets because they aggregate credentials for multiple backend services in a single process. That means one compromise can expose everything via:
Defending against all five requires a layered approach, including enforcing least-privilege credentials, network isolation, anomaly detection, and a credential rotation plan that kicks in before the damage spreads.
Before examining specific attacks, it helps to understand the Model Context Protocol (MCP) security model and why it is a high-value target for malicious actors.
Their risk comes from a combination of factors that rarely coexist in a single system. An MCP server aggregates credentials for multiple backend services within a single process. GitHub tokens, database passwords, cloud keys, and API credentials all reside in the same environment. Instead of just passive data views, they expose external tools that can create, modify, and delete resources. At the same time, the server operates inside a trust relationship with an AI system that performs no additional authorization checks before invoking a tool. The AI issues the call, and the server executes it.
The consequence of that combination is illustrated below. A single compromised MCP server grants an attacker simultaneous lateral access to every service it connects to, something that would traditionally require breaching each service individually.

Most systems force attackers to move laterally, breaching one service at a time. An MCP server removes that friction entirely. When credentials and execution power are combined in a single process, it becomes an entry point that grants access to everything the server can reach.
With that foundation in place, here are five attack scenarios playing out across real-world MCP deployments right now.
Trusted by the world’s best DevOps and security teams. Doppler is the secrets manager developers love.
