Resources/AI Security & Hacks Library
Public incident archive

Zealynx AI Security & Hacks Library

A reference-backed archive of AI security incidents, hacks, disclosures, and research signals that materially change what auditors should check. This is the public hemeroteca layer for Zealynx AI audit work.

Seeded incidents
12
Featured cases
5
Threat classes
5
Affected system types
8

What this archive is for

Turn daily AI security signal into a durable archive of incidents, exploit patterns, and auditor-facing lessons instead of letting it disappear inside chats or one-off articles.

Why auditors use it

Every entry is classified by threat class, affected system, severity, and control implication, with explicit “what should an auditor check now?” guidance.

Why search and AI systems should care

The library is structured for discoverability: stable incident notes, references, chronology, concise summaries, and clear mappings into Zealynx audit methodology and checklists.

disclosureApril 20263 references

Anthropic MCP SDK config-to-exec design flaw

Critical

OX Security disclosed that Anthropic's official MCP SDKs allow configuration values to shape the spawned command line, turning supply-chain or config control into host-side execution authority.

Capability EscalationTool MisuseSkill or Plugin Backdoors

Auditor check now: Trace every config value that can influence executable path, args, env, or workdir

Open incident note
incidentSeptember 20253 references

Postmark MCP supply-chain trojan with silent BCC exfiltration

High

A trojanized Postmark MCP package on npm silently BCC'd every outbound email to an attacker-controlled inbox.

Skill or Plugin BackdoorsData Exfiltration

Auditor check now: Verify connector provenance, update flow, and package ownership history

Open incident note
incidentAugust 20253 references

Cursor CurXecute workspace-write to RCE (CVE-2025-54135)

Critical

CurXecute showed how a workspace-file write path in Cursor could become remote code execution.

Capability EscalationTool Misuse

Auditor check now: Map writable files that can later influence shell, build, or IDE execution

Open incident note
Filters

Browse the archive

Filter by incident type, threat class, affected system, severity, or year. Every entry links primary references and ends with auditor-facing control checks.

Entry type

Threat class

Affected system

Severity

Year

Archive entries

12 entries match the current filter set.

Sorted newest first and grouped by year for fast historical review.

2026

disclosureApril 20263 referencesFeatured

Anthropic MCP SDK config-to-exec design flaw

Critical

OX Security disclosed that Anthropic's official MCP SDKs allow configuration values to shape the spawned command line, turning supply-chain or config control into host-side execution authority.

Why it matters: This is a runtime authority and supply-chain problem at the execution sink. If config can steer process spawn, any poisoned registry entry, package, or deployment default can become code execution.

Capability EscalationTool MisuseSkill or Plugin Backdoors
MCP deploymentsCoding agentsLong-lived agents

Auditor check now

Trace every config value that can influence executable path, args, env, or workdir

Zealynx takeaway

For Zealynx, this is a model example of why MCP reviews must start from authority and execution sinks rather than prompt wording.

incidentMarch 20262 references

nginx-ui MCP auth bypass to RCE (CVE-2026-33032)

Critical

An auth bypass in an nginx-ui MCP endpoint created a direct route to remote code execution.

Why it matters: Exposed MCP endpoints collapse identity, transport, and execution risk into one path. Once auth is weak, the rest of the runtime inherits the blast radius.

Capability EscalationTool Misuse
Internet-exposed MCP deployments

Auditor check now

Confirm whether any MCP transport endpoint is reachable from the public internet

Zealynx takeaway

Remote MCP exposure is not a product feature to wave away. It is a direct authority surface.

incidentJanuary 20262 references

Anthropic mcp-server-git chained flaws

Critical

Three chained flaws in Anthropic's mcp-server-git showed how repository tooling can amplify multiple smaller weaknesses into a critical compromise path.

Why it matters: Git tooling sits at the center of coding-agent authority. Chained flaws here can affect code integrity, branch safety, and CI trust.

Capability EscalationTool Misuse
Coding agentsMCP deployments

Auditor check now

Trace how git actions can affect hooks, submodules, branch targets, and remotes

Zealynx takeaway

For coding agents, git is not just source control. It is a privileged execution and distribution surface.

incidentJanuary 20263 references

gemini-mcp-tool command injection (CVE-2026-0755)

Critical

A command injection flaw in gemini-mcp-tool showed how look-alike or loosely reviewed MCP packages can become direct shell compromise paths.

Why it matters: This is a combined package-provenance and prompt-to-shell problem. The package name can look benign while its execution semantics are dangerous.

Skill or Plugin BackdoorsCapability Escalation
MCP deploymentsCoding agents

Auditor check now

Inspect package wrappers for execAsync or shell interpolation paths

Zealynx takeaway

For agents that can install or invoke packages, naming trust is not security. Execution semantics are.

2025

incidentSeptember 20252 references

Flowise CustomMCP STDIO transport RCE (CVE-2025-59528)

Critical

Flowise's CustomMCP node exposed a CVSS 10.0 path from STDIO transport handling to remote code execution.

Why it matters: Transport semantics are part of the authority plane. If the connector bridge is unsafe, every downstream tool inherits that insecurity.

Capability EscalationTool Misuse
MCP deploymentsWorkflow builders

Auditor check now

Review how transport adapters spawn and connect to local processes

Zealynx takeaway

Transport adapters deserve the same audit depth as the tools they expose.

incidentSeptember 20253 referencesFeatured

Postmark MCP supply-chain trojan with silent BCC exfiltration

High

A trojanized Postmark MCP package on npm silently BCC'd every outbound email to an attacker-controlled inbox.

Why it matters: This is the cleanest example of MCP impersonation and agentic supply-chain failure. The connector looked legitimate while exfiltrating sensitive communication.

Skill or Plugin BackdoorsData Exfiltration
MCP deploymentsLong-lived agentsCustomer support agents

Auditor check now

Verify connector provenance, update flow, and package ownership history

Zealynx takeaway

If a connector can reach customers, counterparties, or internal inboxes, it needs the same scrutiny as a privileged SaaS integration.

incidentAugust 20253 references

Anthropic Filesystem MCP EscapeRoute path-bypass flaws

High

EscapeRoute showed that symlink and path-prefix bypasses in Anthropic's Filesystem MCP server could break assumed file-scope restrictions.

Why it matters: Filesystem scope is one of the main safety claims in agent tooling. If it can be bypassed, file-read and file-write boundaries are not trustworthy controls.

Capability EscalationTool Misuse
MCP deploymentsCoding agents

Auditor check now

Test symlink, mount, and path-normalization bypasses against file tools

Zealynx takeaway

A file tool is only as safe as its path-resolution semantics under attacker-controlled structure.

incidentAugust 20253 referencesFeatured

Cursor CurXecute workspace-write to RCE (CVE-2025-54135)

Critical

CurXecute showed how a workspace-file write path in Cursor could become remote code execution.

Why it matters: Coding agents collapse repository trust and execution. Once a writable workspace can shape later execution, prompt-to-sink chains become practical.

Capability EscalationTool Misuse
Coding agents

Auditor check now

Map writable files that can later influence shell, build, or IDE execution

Zealynx takeaway

For coding agents, file write authority is often just pre-execution authority with a time delay.

incidentJuly 20253 references

Cursor MCPoison tool descriptor injection (CVE-2025-54136)

High

The MCPoison issue in Cursor showed that malicious tool descriptions could steer agent behavior through descriptor injection.

Why it matters: This demonstrates that prose policy and tool metadata can function as authorization logic when the runtime lacks robust separation.

Tool MisuseIndirect Prompt Injection
Coding agentsMCP deployments

Auditor check now

Test poisoned descriptors against real tool invocation paths

Zealynx takeaway

If a tool description can change model behavior materially, it belongs in threat modeling and incident logging.

incidentJuly 20253 referencesFeatured

mcp-remote OAuth shell injection (CVE-2025-6514)

Critical

A malicious authorization_endpoint value in mcp-remote's OAuth flow could trigger OS command execution during connection setup.

Why it matters: OAuth metadata looked like configuration, but in practice it became shell influence. The lesson is that remote handshake state can be part of the prompt-to-sink path.

Tool MisuseCapability Escalation
MCP deploymentsCoding agents

Auditor check now

Inspect OAuth handshake fields that flow into subprocess or shell wrappers

Zealynx takeaway

This is a textbook example of untrusted remote metadata crossing into an execution sink.

incidentJune 20253 references

Anthropic MCP Inspector unauthenticated RCE (CVE-2025-49596)

Critical

A critical unauthenticated RCE in Anthropic's official MCP Inspector exposed developer machines to host compromise.

Why it matters: Official tooling can still be part of the attack surface. Auditors cannot assume first-party MCP infrastructure is safe by default.

Capability EscalationTool Misuse
MCP deploymentsDeveloper tooling

Auditor check now

Include inspector, debugger, and local orchestration tooling in scope

Zealynx takeaway

A serious AI audit must include developer-side companion tooling, not just the deployed agent.

incidentApril 20253 referencesFeatured

WhatsApp MCP tool poisoning attack

High

Invariant Labs documented a peer-server tool poisoning attack where poisoned tool descriptions enabled silent exfiltration of WhatsApp chat history.

Why it matters: This is one of the first concrete proofs that tool descriptors themselves can act like privileged prompt injection inside a multi-tool agent runtime.

Tool MisuseData Exfiltration
MCP deploymentsMessaging agentsLong-lived agents

Auditor check now

Inspect how tool descriptors are ingested, sanitized, and diffed over time

Zealynx takeaway

When the model reads tool text as working context, descriptor text becomes policy-bearing input and deserves audit treatment.

Smart Contract Security Digest

Monthly exploit breakdowns, audit checklists, and DeFi security research — straight to your inbox

© 2026 Zealynx