
Attack scenario 1: Malicious code and credential theft via supply chain
Attack scenario 2: Over-privileged credentials enable lateral movement
Attack scenario 3: Prompt injection triggers unauthorized database operations
Attack scenario 4: Exposed Remote MCP Servers with no authentication
Attack scenario 5: Credential leakage through logs and crash dumps
Detecting MCP security incidents
The first two scenarios require compromising the MCP server or its credentials. This scenario requires neither. The attacker compromises the input data that the AI processes.
An MCP server exposes a run_query tool that allows an AI assistant to execute SQL queries against a production database. The server is designed for read-only analytical queries, such as finding the top-selling products last quarter or counting active users over the past week.
An attacker creates a message that embeds instructions within data that the AI processes. For example, a support ticket might contain:
When the AI assistant processes this ticket using a summarization or triage workflow, the injected instructions may be interpreted as legitimate commands. The MCP server receives the SQL statements as tool invocations and executes them against the database.
The attack exploits two properties of the MCP architecture. First, an AI agent relies on the content it processes to determine what actions to take, with no reliable way to distinguish legitimate user intent from malicious instructions hidden within that content. Second, the MCP server has no authorization layer of its own. It executes any tool invocations the MCP client sends, without verifying that they match the user's original intent.
Security researchers at Wiz Research have identified specific security vulnerabilities through injection attacks against Anthropic's official MCP PostgreSQL and Puppeteer servers, and Palo Alto Networks Unit 42 has published a taxonomy of prompt attack vectors that apply directly to MCP tool invocations.
Prompt injection is hard to spot and hides inside legitimate data. The next scenario does not need that kind of disguise at all.
Trusted by the world’s best DevOps and security teams. Doppler is the secrets manager developers love.
