threat intelligence
MCP Threat Observatory
The first public tracker of Model Context Protocol security threats in OSS AI repositories. Updated continuously. April 2026.
9
OWASP MCP risks catalogued
35%
of AI repos with agent config exposure
2
active CVEs tracked
47
agent security findings in benchmark
CVE-2025-59536 ACTIVE
CVE-2026-21852 ACTIVE
Threat Status Board — OWASP MCP Top 10
MCP01
Covered
Prompt Injection / Jailbreak
Steering docs committed to repo can be modified to hijack AI agent behaviour.
MCP02
Covered
Insecure Authentication
API keys and bearer tokens hardcoded in MCP server config files. CVE-2025-59536.
MCP03
Covered
Excessive Permission
enableAllProjectMcpServers=true or non-empty alwaysAllow grants blanket tool access. CVE-2026-21852.
MCP04
Detection Pending
Confused Deputy
Agent acts on behalf of attacker by being tricked into performing unintended actions.
MCP05
Covered
Insecure Data Handling
Steering docs contain internal architecture context, credentials, and operational procedures.
MCP06
Detection Pending
Insufficient Logging
Agent actions not captured in audit trail; no tamper-evident log of tool invocations.
MCP07
Covered
Insecure Configuration
Hardcoded IPs, absolute paths, and missing .gitignore entries in agent config files.
MCP08
Detection Pending
SSRF via MCP
MCP server URL fields pointing to internal network endpoints, exploitable for SSRF.
MCP09
Covered
Broken Access Control
Agent config files in public repos publish full MCP server topology and permission model.
MCP10
Partial
Supply Chain
Compromised MCP server packages in npm/pip, or malicious servers injected via config.
Live Findings — 20 Repository Benchmark Scan
| Repo | MCP Risk | Finding | Severity | DC Clause | Receipt |
|---|
Scan data: ticketyboo-scanner v1 · April 2026 · 20 OSS AI repositories · DC-v1-default DevContract
Anatomy of an MCP Supply Chain Attack
Based on CVE-2025-59536 and CVE-2026-21852 attack vectors — Check Point Research, April 2026
Active CVEs
CVE-2025-59536
RCE via Malicious Claude Code Project Files
PublishedApril 2026 — Check Point Research
CVSS Score9.1 Critical
AffectedClaude Code — untrusted repositories
MechanismMalicious .claude/ config triggers RCE and API key exfiltration before Workspace Trust prompt
StatusPatched — Claude Code 1.x
ScannerMCP02 — agent config credential check
CVE-2026-21852
enableAllProjectMcpServers Auto-Activation
PublishedApril 2026 — Anthropic Security Advisory
CVSS Score8.8 High
AffectedClaude Code with enableAllProjectMcpServers: true
MechanismAll project MCP servers activated on clone — before user consent. Full filesystem, env, SSH access.
StatusPatched — default changed to false
ScannerMCP03 — enableAllProjectMcpServers check
OWASP MCP Top 10 — Reference