The Model Context Protocol (MCP) is an open standard designed to enable AI assistants to interact with external tools and services on behalf of users. Launched by Anthropic in November 2024, MCP standardizes how applications provide context to LLMs - think of it like a "USB-C port for AI applications."
MCP's core premise is to create a universal interface layer that makes any digital tool accessible to AI systems through natural language commands, replacing fragmented integrations with a single protocol. This helps solve a key challenge: even the most sophisticated models are constrained by their isolation from data—trapped behind information silos and legacy systems.
Rather than building custom integrations for each service, MCP aims to connect AI models directly to different data sources and tools, offering:
At a high level, MCP follows a client-server architecture:
The MCP server acts as an intermediary between AI assistants and various services. When users request actions through natural language, the AI interprets these requests and communicates with the MCP server to execute them.
Let's walk through how a user might set up and use MCP with Gmail:
This enables powerful workflows where users can manage their email through natural conversations without directly interacting with Gmail's interface.
While the convenience of MCP is undeniable, it introduces several significant security risks that warrant serious consideration:
If an attacker obtains the OAuth token stored by the MCP server for Gmail, they can create their own MCP server instance using this stolen token. This allows them to:
Unlike traditional account compromises that might trigger suspicious login notifications, using a stolen token through MCP may appear as legitimate API access, making detection more difficult.
MCP servers represent a high-value target because they typically store authentication tokens for multiple services. If attackers successfully breach an MCP server, they gain:
This creates a concerning "keys to the kingdom" scenario where compromising a single MCP server could grant attackers broad access to a user's digital life or even an organization's resources if deployed in enterprise settings.
MCP creates a new attack vector through indirect prompt injection vulnerabilities in AI interfaces. Since the AI assistant interprets natural language commands before sending them to the MCP server:
This represents a particularly insidious threat because users may not realize that sharing certain content with their AI could result in dangerous automated actions being taken through MCP. Traditional security boundaries between viewing content and executing actions become blurred.
MCP servers typically request broad permission scopes to provide flexible functionality, creating significant privacy and security risks:
The concentration of access to disparate services in a single protocol layer fundamentally changes the security model of digital services, which were typically designed with the assumption that different applications would have segregated access to user data.
The Model Context Protocol represents an exciting advancement in AI capabilities that has quickly gained traction. Anthropic's strong developer brand, having released pre-built MCP servers for popular enterprise systems like Google Drive, Slack, GitHub, Git, Postgres, and Puppeteer, has contributed to its success.
The protocol is particularly notable for being based on the successful Language Server Protocol (LSP), which gives it architectural advantages over competing standards. MCP is considered "AI-native" - designed specifically with AI integration patterns in mind, rather than being adapted from other purposes.
However, as MCP adoption grows, we'll need to see:
The convenience of using natural language to access our digital tools through AI assistants is compelling, but we must ensure that security controls evolve alongside these new capabilities. As MCP adoption continues its rapid growth, the security community will need to develop new frameworks that address the unique challenges it presents.
For users and organizations considering MCP adoption, a careful risk assessment and implementation of additional security controls will be essential to safely harness the power of this emerging protocol.
Subscribe and get the latest security updates
Back to blog