
Attack scenario 1: Malicious code and credential theft via supply chain
Attack scenario 2: Over-privileged credentials enable lateral movement
Attack scenario 3: Prompt injection triggers unauthorized database operations
Attack scenario 4: Exposed Remote MCP Servers with no authentication
Attack scenario 5: Credential leakage through logs and crash dumps
Detecting MCP security incidents
The most direct path to compromising an MCP server is through the server package itself.
A developer needs an MCP server that integrates with a project management tool. They search npm, find a package named @project-tools/mcp-server with a plausible README and recent download numbers, and install it. The package functions correctly. It exposes the expected tools and connects to the project management API. But it also contains malicious code designed for data exfiltration that harvests every environment variable accessible to the process.
The malicious code runs at import time, before any sandboxing or monitoring can intervene. The exfiltration request targets a domain that appears to be a legitimate analytics endpoint. And because MCP servers aggregate credentials for multiple backend services within their process environment, a single compromised package grants access to all services at once.
A supply chain attack requires some luck; the developer has to install the malicious package. Over-privileged credentials, by contrast, are already waiting for an attacker who finds any foothold.
Trusted by the world’s best DevOps and security teams. Doppler is the secrets manager developers love.
