Security Guide

MCP Security — Securing Model Context Protocol

Model Context Protocol (MCP) is the fastest-growing AI integration standard — and its security model has significant gaps. This guide covers the MCP threat taxonomy, authentication controls, supply chain verification, and shadow server detection.

53%
MCP servers with hardcoded secrets
78%
Without mTLS authentication
Zero
Supply chain SBOMs in the wild

MCP Threat Taxonomy

T1 — Hardcoded Secrets in MCP Server Config

API keys, database credentials, and service tokens embedded in MCP server configuration files. Commonly committed to version control or exposed in container images.

T2 — Unauthenticated Tool Invocation

MCP servers that accept tool calls without verifying caller identity. Any client with network access can invoke sensitive tools — data extraction, file write, external API calls.

T3 — Tool Poisoning via Supply Chain

Malicious MCP servers published to registries with tool descriptions designed to manipulate LLM behavior — prompt injection embedded in tool descriptions, not just tool outputs.

T4 — Shadow MCP Servers

Unauthorized MCP servers deployed by developers bypassing security review. Shadow servers create unmonitored data pathways and bypass DLP and audit controls.

Control 1: Enforce mTLS with SPIFFE Identity

Control 2: Generate and Verify MCP SBOMs

Control 3: Detect Shadow MCP Servers

See MCP Gateway in Action → Read: LiteLLM Supply Chain Attack