By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Researchers Demonstrate How MCP Prompt Injection Can Be Used for Both Attack and Defense
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Researchers Demonstrate How MCP Prompt Injection Can Be Used for Both Attack and Defense
Computing

Researchers Demonstrate How MCP Prompt Injection Can Be Used for Both Attack and Defense

News Room
Last updated: 2025/04/30 at 2:20 PM
News Room Published 30 April 2025
Share
SHARE

Apr 30, 2025Ravie LakshmananArtificial Intelligence / Email Security

As the field of artificial intelligence (AI) continues to evolve at a rapid pace, new research has found how techniques that render the Model Context Protocol (MCP) susceptible to prompt injection attacks could be used to develop security tooling or identify malicious tools, according to a new report from Tenable.

MCP, launched by Anthropic in November 2024, is a framework designed to connect Large Language Models (LLMs) with external data sources and services, and model-controlled tools to interact with those systems to enhance the accuracy, relevance, and utility of AI applications.

It follows a client-server architecture, allowing hosts with MCP clients such as Claude Desktop or Cursor to communicate with different MCP servers, each of which exposes specific tools and capabilities.

Cybersecurity

While the open standard offers a unified interface to access various data sources and even switch between LLM providers, they also come with a new set of risks, ranging from excessive permission scope to indirect prompt injection attacks.

For example, given an MCP for Gmail to interact with Google’s email service, an attacker could send malicious messages containing hidden instructions that, when parsed by the LLM, could trigger undesirable actions, such as forwarding sensitive emails to an email address under their control.

MCP has also been found to be vulnerable to what is called tool poisoning, wherein malicious instructions are embedded within tool descriptions that are visible to LLMs, and rug pull attacks, which occur when an MCP tool functions in a benign manner initially, but mutates its behavior later on via a time-delayed malicious update.

“It should be noted that while users are able to approve tool use and access, the permissions given to a tool can be reused without re-prompting the user,” SentinelOne said in a recent analysis.

Finally, there also exists the risk of cross-tool contamination or cross-server tool shadowing that causes one MCP server to override or interfere with another, stealthily influencing how other tools should be used, thereby leading to new ways of data exfiltration.

The latest findings from Tenable show that the MCP framework could be used to create a tool that logs all MCP tool function calls by including a specially crafted description that instructs the LLM to insert this tool before any other tools are invoked.

In other words, the prompt injection is manipulated for a good purpose, which is to log information about “the tool it was asked to run, including the MCP server name, MCP tool name and description, and the user prompt that caused the LLM to try to run that tool.”

Another use case involves embedding a description in a tool to turn it into a firewall of sorts that blocks unauthorized tools from being run.

“Tools should require explicit approval before running in most MCP host applications,” security researcher Ben Smith said.

“Still, there are many ways in which tools can be used to do things that may not be strictly understood by the specification. These methods rely on LLM prompting via the description and return values of the MCP tools themselves. Since LLMs are non-deterministic, so, too, are the results.”

It’s Not Just MCP

The disclosure comes as Trustwave SpiderLabs revealed that the newly introduced Agent2Agent (A2A) Protocol – which enables communication and interoperability between agentic applications – could be exposed to novel form attacks where the system can be gamed to route all requests to a rogue AI agent by lying about its capabilities.

Cybersecurity

A2A was announced by Google earlier this month as a way for AI agents to work across siloed data systems and applications, regardless of the vendor or framework used. It’s important to note here that while MCP connects LLMs with data, A2A connects one AI agent to another. In other words, they are both complementary protocols.

“Say we compromised the agent through another vulnerability (perhaps via the operating system), if we now utilize our compromised node (the agent) and craft an Agent Card and really exaggerate our capabilities, then the host agent should pick us every time for every task, and send us all the user’s sensitive data which we are to parse,” security researcher Tom Neaves said.

“The attack doesn’t just stop at capturing the data, it can be active and even return false results — which will then be acted upon downstream by the LLM or user.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article A Tariff Standoff With China, Power Outages, and the End of Christmas
Next Article Can AI fix California’s epic traffic jams?
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

We Ran Thousands of Miles to Find the Best Running Shoes for Every Type of Stride
Gadget
Nothing Phone 3 doesn’t win on value, but it won me over anyway
News
10 Best Miro OKR Template to Align Goals in 2025
Computing
Drivers face ‘new standard’ as major state announces ‘real time’ license change
News

You Might also Like

Computing

10 Best Miro OKR Template to Align Goals in 2025

28 Min Read
Computing

New Ubuntu Concept Snapdragon X Laptop ISOs Published – Your Mileage May Vary

3 Min Read
Computing

COTI Launches Monthly DeCC Space In Collaboration With Secret Network | HackerNoon

5 Min Read
Computing

The TechBeat: We Timed It: How Long Does It Really Take to Buy Crypto in the Top 5 Wallets? (7/27/2025) | HackerNoon

5 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?