Checklists/AI Security/MCP Security

MCP Security Checklist

24 security checks for Model Context Protocol (MCP) servers and AI agents covering tool poisoning, prompt injection, RCE prevention, and cross-server attacks.

🚨 Critical Threat Landscape

The Model Context Protocol (MCP) attack surface is riddled with vulnerabilities:

40% of MCP servers have security vulnerabilities (Check Point/Lakera)

53% use insecure credentials (hardcoded keys)

43% vulnerable to command injection (Equixly)

9+ major MCP breaches since April 2025 (AuthZed timeline)

16 minutes average time to AI system compromise (Zscaler)

72.4% cascade rate between MCP servers

📄
Want this as a PDF? DM me on Telegram →
Showing 24 of 24 vulnerabilities
#1

Path Traversal Protection

Critical

Tool arguments validated against boundaries, no directory traversal via ../

#2

Command Injection Prevention

Critical

CLI flags and parameters properly sanitized, no shell injection vectors

#3

RCE via Execute Primitives

Critical

Git hooks, filters (smudge/clean), aliases, and post-checkout scripts secured or disabled

#4

File System Boundaries

Critical

Write operations restricted to designated directories, no arbitrary file access

#5

Prompt Injection Amplification

Critical

LLM context parsing robust against malicious instructions embedded in tool outputs

#6

Output Poisoning Resistance

Critical

Tool responses sanitized before context injection, no instruction embedding

#7

Semantic Exfiltration Controls

Critical

Sensitive data detection prevents covert channel attacks via tool responses

#8

Cross-Tool Chaining Attacks

Critical

Combined MCP server capabilities audited as attack surface

#9

OAuth Implementation

High

No hardcoded credentials, proper OAuth flows for API access

#10

API Key Management

High

Keys rotated, scoped appropriately, stored securely

#11

Permission Boundaries

High

MCP servers run with minimal required privileges, no unnecessary system access

#12

Server Isolation Policies

High

Data flow between MCP servers requires explicit authorization

#13

Shared Context Contamination

High

Multiple servers can't poison each other's tool contexts

#14

Combined Capability Mapping

High

Git + Browser, Filesystem + Network combinations assessed for compound risks

#15

Package Version Pinning

High

Dependencies locked to specific versions, checksums verified

#16

Typosquatting Prevention

High

Package names validated against known-good registries

#17

Internal Registry Usage

High

Curated package sources preferred over public npm/pip repositories

#18

Context Window Pollution

Medium

Large tool outputs don't overwhelm LLM attention mechanisms

#19

Instruction Segregation

Medium

Clear boundaries between system prompts and tool-generated content

#20

Context Injection Limits

Medium

Maximum response sizes enforced to prevent context stuffing attacks

#21

SSRF Prevention

Medium

URL validation on web requests, no internal network access

#22

Webhook Security

Medium

Incoming webhooks authenticated and validated against tampering

#23

Third-Party API Limits

Medium

Rate limiting and validation on external service calls

#24

Audit Logging

Medium

All tool invocations logged with parameters and outcomes for forensics

Need an MCP Security Audit?

Zealynx pioneered MCP security assessments. We've analyzed the attack surfaces, breach patterns, and defense strategies that make the difference.

oog
zealynx

Subscribe to Our Newsletter

Stay updated with our latest security insights and blog posts

© 2024 Zealynx