
Security Challenges
Managing Expanded Access
MCP opens new security considerations that must be addressed:
Key Security Challenges
- Over-permissive Tool Access: Many MCP servers expose powerful functions with limited restrictions
- Authentication Gaps: Authentication is optional in the protocol specification
- Prompt Injection Risks: Malicious MCP servers could include hidden instructions to trick models
- Audit Limitations: Difficult to trace which prompts led to specific tool calls
- Supply Chain Risks: Using unvetted third-party MCP servers poses similar risks to untrusted packages
Required Safeguards
- Implement robust authentication and authorization for MCP endpoints
- Verify and restrict which MCP servers can be used
- Inspect prompts for potential injection attacks
- Consider human approval for high-risk operations
- Monitor and audit all MCP interactions
"Security is manageable with good practices, but it remains a notable consideration when integrating MCP into enterprise platforms."