$ ls -la /blog

All Posts

Security research, ecosystem analysis, and infrastructure insights from the MCP protocol landscape.

341 Malicious Skills, Zero Registry Checks: What OpenClaw's ClawHavoc Means for MCP

In January 2026, 341 malicious skills infiltrated OpenClaw's official registry. The MCP ecosystem faces the same structural vulnerability — and scanning alone won't fix it.

mcpsecurityregistrysupply-chainopenclawClawHavoc

The Attack That Gets Better as Your AI Gets Smarter

Unit 42's MCPTox benchmark found 72.8% attack success on o1-mini. More capable models are more vulnerable to MCP sampling injection because the attack exploits instruction-following. You cannot model-upgrade your way out of this.

MCPsecuritysamplingprompt-injectionUnit42MCPToxOWASP

Nobody Is Checking: What Three Independent Scans of 14,000+ MCP Servers Reveal

Three independent teams scanned 14,000+ MCP servers in 30 days. All found the same vulnerabilities. All ended with the same recommendation. None of them could enforce it.

mcpsecurityscanningecosystemadmission-control

MCP Is Deprecating Sampling, Roots, and Logging: What It Means for the Ecosystem

SEP-2577 proposes removing three core MCP features simultaneously. The protocol is scope-reducing to become a lean stateless tool-calling layer. Here is what builders need to know.

mcpprotocolsamplingdeprecationecosystem

A Malicious MCP Server Can Inflate Your API Bill 658x — And Standard Defenses Miss It 97% of the Time

A new class of MCP attack turns tool responses into a billing amplifier. A session that should cost $0.10 costs $65.80. The schema is clean, the task completes, and 97% of standard defenses never notice.

mcpsecurityattackeconomicsresearch

Three Governance Gaps Nobody Instruments in Multi-Agent Systems

Three independent teams arrived at the same conclusion this week: multi-agent systems fail silently because nobody instruments delegation, escalation, or reputation. Here are the practical instrumentation points.

multi-agentgovernancedelegationobservabilitymcpa2aagent-coordination

MCP Server-Initiated Sampling: The Spec Feature That Becomes an Attack Vector

MCP sampling lets servers request LLM completions through the client. Unit42 research shows how this legitimate spec feature enables prompt injection, cross-server poisoning, privilege escalation, and data exfiltration.

mcpsecuritysamplingprompt-injectionunit42spec

Q1 2026 MCP CVE Roundup: 9 Vulnerabilities, 3 Patterns, 1 Lesson

MCP went from zero CVEs to nine in a single quarter. A data-driven breakdown of every vulnerability, the three recurring patterns behind them, and what the ecosystem should do next.

mcpsecuritycvevulnerabilityprotocol

Only 8.5% of MCP Servers Use OAuth

A study of 5,200+ MCP servers found 88% require credentials, 53% use static API keys, and only 8.5% use OAuth. Six RSAC vendors announced MCP governance — none fix these numbers. The gateway layer does.

securityMCPOAuthauthenticationgateway

The Approved Server Problem: How a Legitimate MCP Server Can Still Exfiltrate Everything

Quarantine catches obvious malware. Docker contains filesystem access. But an approved, isolated MCP server with outbound network access can silently POST every tool call payload to an attacker. Here is what to do about it.

securityMCPexfiltrationnetwork-isolationdefense-in-depth

The LiteLLM Supply Chain Attack Is the Best Argument for Docker-Isolated MCP Servers

LiteLLM v1.82.7 was compromised via a poisoned GitHub Action. The .pth malware fires on every Python startup, stealing SSH keys, cloud creds, and API keys. Many MCP servers pull LiteLLM as a transitive dependency.

securityMCPsupply-chainDockerLiteLLMisolation

The Single-Agent Era Is Over

In 72 hours: Microsoft AutoGen retired, GitHub launched Squad, Block's Goose pivoted to multi-agent. Three independent signals, same conclusion: the single-agent architecture is done.

multi-agentMCParchitectureAutoGenGitHub-SquadGoose

Identity Secures the Agent, But Who Secures the Tool Call?

Microsoft, CyberArk, and Okta frame AI agent security through identity. But identity alone does not prevent tool poisoning or parameter manipulation. The MCP gateway layer is the missing half.

securityMCPidentitygatewayarchitecture

$430M in One Month: Why AI Agent Security Is 2026's Hottest VC Category

March 2026 saw $430M+ invested in AI agent security across 5 major rounds. Combined with 30 CVEs, 9 documented MCP breaches, and 1,184 malicious skills, the market signal is unmistakable.

securityMCPVCmarket-analysisAI-agents

chmod for AI Agents: How the MCP Permission Model War Will Shape Agent Security

Three radically different permission models for MCP emerged this month: Unix-style rwxd, DIFC labels, and scope-per-service. The winner will define how enterprises govern AI agent tool access.

securityMCPpermissionsarchitectureagents

From Azure SSRF to RSAC Stage: What CVE-2026-26118 Teaches Us About MCP Gateway Security

The first high-profile MCP CVE (CVSS 8.8) in Azure's MCP Server plus Token Security's MCPwned RSAC presentation show why every MCP deployment needs a gateway layer that inspects tool calls before they reach upstream servers.

securityMCPCVEAzuregatewayRSAC

Why MCP Gateways and Runtime Hooks Are Complementary, Not Competing

Security Boulevard argues gateways are a bad idea for MCP. They are half right. The best architecture uses both gateways for perimeter defense and hooks for runtime context. Here is how they fit together.

securityMCPgatewayhooksarchitecturedefense-in-depth

MCP Security Just Became an Enterprise Product Category

In five days, three companies launched dedicated MCP security products. Combined with OWASP MCP Top 10 and CoSAI's threat taxonomy, MCP security has transitioned from research concern to funded enterprise market.

securityMCPenterprisegatewaymarket-analysis

From Theory to Exploit: Real MCP Attacks and How Gateways Stop Them

MCP security has moved from theoretical risks to documented exploits. ContextCrush, Unit42 sampling attacks, and cross-agent escalation prove the attack surface is real. Here is how gateway-level interception stops them.

securityMCPexploitsgatewaytool-poisoningsupply-chain

The MCP Registry Landscape: Why It Matters and How to Auto-Publish Your Server

MCP servers are scattered across GitHub repos, awesome-lists, and third-party directories. The Official MCP Registry changes that. Here's why registries matter, how the ecosystem fits together, and how to set up automatic publishing from your CI pipeline.

MCPregistryCI/CDopen-sourcedeveloper-tools

Deploy Your Own Agent Messaging Hub in 15 Minutes -- For Free

SynapBus is a single Go binary that gives your AI agent swarm Slack-like messaging, semantic search, and MCP connectivity. Deploy it with Docker or Kubernetes, expose it via Cloudflare Tunnel, and connect your first agents -- total cost: $0.

SynapBusMCPmulti-agentdeploymenttutorial

A2A v1.0 Is Here: How Google's Agent Protocol Complements MCP

Google's Agent-to-Agent protocol just hit v1.0 under the Linux Foundation. Here is how A2A and MCP work together to enable the next generation of AI agent architectures.

A2AMCPagent-protocolsmulti-agentagentic-ai

The OWASP MCP Top 10: A Security Framework for the AI Agent Era

The OWASP MCP Top 10 maps the most critical security risks in AI agent tool integration — from tool poisoning to context poisoning. Here is what practitioners need to know.

securityMCPOWASPtool-poisoningagentic-ai

Securing MCP Servers: From Tool Poisoning to Filesystem Sandboxing

The MCP security landscape has evolved through three waves: protocol scanning, traffic proxying, and OS-level sandboxing. Here's the full map of projects and where the frontier is heading.

securityMCPsandboxingagentic-ai

MCP Tool Annotations: What They Are, Why They Matter, and What's Coming Next

The MCP spec includes five tool annotation fields that tell agents whether tools are read-only, destructive, or open-world. Most servers don't use them. Here's why that needs to change.

MCPtool-annotationssecurityagentic-ai

NIST Evaluates MCP for AI Agent Identity Governance

NIST's draft concept paper lists MCP as one of five standards under evaluation for agentic AI authentication. What this means for MCP's legitimacy and enterprise adoption.

governanceNISTidentityMCPstandards

Why Google Dropped MCP: Context Explosion and the Tool Discovery Problem

Google quietly removed MCP from its Workspace CLI after tool definitions ballooned context windows to 100K tokens. The tool discovery problem is MCP's biggest scaling barrier.

tool-discoveryMCPcontext-managementBM25

The Confused Deputy Problem in MCP Authentication

MCP's authentication model has a fundamental gap: servers cannot verify whether an agent was authorized to use the credentials it presents. Here's why this matters and what's being done about it.

securityOAuthauthenticationMCP

Anatomy of the Clinejection Attack: When AI Agents Become Supply Chain Vectors

A detailed breakdown of the Clinejection attack chain that compromised the Cline VS Code extension in January 2026, and what it reveals about trust boundary gaps in MCP composition.

securitysupply-chainMCPagentic-ai

The State of MCP Security in 2026: What You Need to Know

A comprehensive look at the security landscape of the Model Context Protocol ecosystem - from tool poisoning attacks to emerging defenses.

securityMCPsupply-chaintool-discoveryagentic-ai