
Security Challenges
Managing Expanded Access
MCP opens new security considerations that must be addressed:
Key Security Challenges
- Over-permissive Tool Access: Many MCP servers expose powerful functions with limited restrictions
 - Authentication Gaps: Authentication is optional in the protocol specification
 - Prompt Injection Risks: Malicious MCP servers could include hidden instructions to trick models
 - Audit Limitations: Difficult to trace which prompts led to specific tool calls
 - Supply Chain Risks: Using unvetted third-party MCP servers poses similar risks to untrusted packages
 
Required Safeguards
- Implement robust authentication and authorization for MCP endpoints
 - Verify and restrict which MCP servers can be used
 - Inspect prompts for potential injection attacks
 - Consider human approval for high-risk operations
 - Monitor and audit all MCP interactions
 
"Security is manageable with good practices, but it remains a notable consideration when integrating MCP into enterprise platforms."