CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◇ Industry News & Leadership Mar 20, 2026

AI Conundrum: Why MCP Security Can't Be Patched Away

Dark Reading Archived Mar 20, 2026 ✓ Full text saved

MCP introduces security risks into LLM environments that are architectural and not easily fixable, researcher says at RSAC 2026 Conference.

Full text archived locally
✦ AI Summary · Claude Sonnet


    APPLICATION SECURITY CYBER RISK THREAT INTELLIGENCE VULNERABILITIES & THREATS NEWS AI Conundrum: Why MCP Security Can't Be Patched Away MCP introduces security risks into LLM environments that are architectural and not easily fixable, researcher says at RSAC 2026 Conference. Jai Vijayan,Contributing Writer March 19, 2026 4 Min Read SOURCE: UMUT HASANOGLU VIA SHUTTERSTOCK Organizations rushing to connect their LLM-powered apps to external data sources and services using the Model Context Protocol (MCP) may be inadvertently creating attack surfaces that are fundamentally different from anything their existing security controls can handle. Making matters worse is that the risks are not the kind a security team can address via patching or configuration changes because they exist at the architectural level in both large language models (LLMs) and in MCP, says Gianpietro Cutolo, cloud threat researcher at Netskope, who is scheduled to highlight the issue at a session next week at the RSAC 2026 Conference in San Francisco Foundational Problems The problem has to do with how an LLM behaves when MCP is in the picture, he adds. Typically, when an LLM receives a prompt or an instruction, it generates a response that a user has to review and decide what to do with. The worst that can happen is a hallucinated response. Related:GlassWorm Malware Evolves to Hide in Dependencies That dynamic changes completely with MCP because the LLM is no longer just generating a response but is executing real actions on behalf of the user. In an MCP-enabled environment, an LLM can access enterprise data, trigger workflows, call APIs, and make decisions autonomously, Cutolo says. For example, a user might ask their AI assistant — like Claude or ChatGPT — to schedule a meeting, and the LLM could use a Google Calendar MCP connector to check availability, create a calendar event, and set up a reminder, all without the user needing to do anything manually. It's the model that chooses the specific functions or capabilities that an MCP server might publish — like "fetch emails" or "create calendar event" or "search files." It is also the model that instructs the MCP server what parameters to use when, for instance, fetching emails or creating a calendar event.  But while MCP connectors allow organizations to extend the capabilities of their LLM-enabled apps and services, they also introduce new risk, Cutolo says.  Loading... One major issue is the fact that LLMs cannot distinguish between content and instructions. When an MCP connector fetches content from an external source like an email or a document, for instance, the LLM processes it all as input. This makes it trivial for an adversary to hide a malicious instruction in content that the model retrieves or processes. As an example, Cutolo points to an attacker sending an email containing both legitimate content and malicious instructions to a target individual. If the user asked their AI-assistant to summarize the email, the MCP connector would fetch the email from the user's inbox and inject both the legit text and the malicious instructions into the LLM's context. Because the LLM is unable to distinguish content from instruction, it will execute whatever instruction that adversary might have hidden in that email — like exfiltrating files and data for instance or sending emails on the user's behalf without the user ever knowing a thing. The consequences of this kind of indirect prompt injection can be substantial in environments with multiple MCP connectors to local files, Jira tickets, Google Drives, and folders on the hard drive and other services, Cutolo points out. A single poisoned email instructing the agent to exfiltrate folder contents could trigger coordinated actions across all those services in one pass, he notes. Related:Real-Time Banking Trojan Strikes Brazil's Pix Users Another way adversaries can take advantage is by tool poisoning. When an LLM connects to an MCP server it asks the server to list all the tools or capabilities that it supports, their names, description, input requirements, and other data. The tool metadata goes directly into the LLM context window. An adversary can plant malicious instructions in the tool metadata that once again the LLM will process as content, because it cannot distinguish content from instruction, he says. Related:Xygeni GitHub Action Compromised Via Tag Poison The third attack class that Cutolo plans on highlighting at the conference is Rug Pull, where the creator of an MCP server — or an attacker that might have gained access to it — could maliciously alter it. The protocol currently has no mechanism to notify an MCP client or AI agent of any changes to the server. That means if a legitimate MCP server is subsequently compromised through a malicious update, it could begin serving malicious tool descriptions or instructions that cause the AI agent to take malicious actions, without the agent or MCP client having any way to know the server was tampered with, he says. Patching Won't Work Because these are foundational issues in how LLM and MCP work, organizations cannot patch or update their way out of risk, Cutolo warns. For the indirect prompt injection threat, he recommends organizations take measures like separating MCP servers for private versus public data, as well as scanning for instruction-like patterns, hidden text, and unusual formatting in any context that the agent might process, and keeping humans in the loop for all sensitive actions. Organizations should inventory and vet every MCP server in their environment, enforce least-privilege permissions so each connector has access only to what its specific task requires, log all MCP traffic, and build behavioral baselines that can flag when an agent's activity deviates from expected behavior, he adds. The practical defense for tool poisoning, he says, is to scan tool metadata for malicious instructions before installing any MCP server. RSAC Conference MAR 23, 2026 TO MAR 26, 2026 Join thousands of your peers at RSAC™ 2026 Conference in San Francisco from March 23–26. Discover new strategies, explore bold technologies, and connect with peers who share your challenges and ambitions. Don’t just attend the Conference—be part of the community that defines what’s next. SECURE YOUR SPOT About the Author Jai Vijayan Contributing Writer Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year career at Computerworld, Jai also covered a variety of other technology topics, including big data, Hadoop, Internet of Things, e-voting, and data analytics. Prior to Computerworld, Jai covered technology issues for The Economic Times in Bangalore, India. Jai has a Master's degree in Statistics and lives in Naperville, Ill. More Insights Industry Reports Frost Radar™: Non-human Identity Solutions 2026 CISO AI Risk Report Cybersecurity Forecast 2026 The ROI of AI in Security ThreatLabz 2025 Ransomware Report Access More Research Webinars Building a Robust SOC in a Post-AI World Retail Security: Protecting Customer Data and Payment Systems Rethinking SSE: When Unified SASE Delivers the Flexibility Enterprises Need Securing Remote and Hybrid Work Forecast: Beyond the VPN AI-Powered Threat Detection: Beyond Traditional Security Models More Webinars You May Also Like APPLICATION SECURITY Trump Administration Rescinds Biden-Era Software Guidance by Alexander Culafi JAN 29, 2026 APPLICATION SECURITY OWASP Highlights Supply Chain Risks in New Top 10 List by Jai Vijayan, Contributing Writer NOV 10, 2025 APPLICATION SECURITY It Takes Only 250 Documents to Poison Any AI Model by Jai Vijayan, Contributing Writer OCT 22, 2025 CYBERATTACKS & DATA BREACHES DeepSeek Breach Opens Floodgates to Dark Web by Emma Zaballos APR 22, 2025 Editor's Choice CYBERSECURITY OPERATIONS Why Stryker's Outage Is a Disaster Recovery Wake-Up Call byJai Vijayan MAR 12, 2026 5 MIN READ CYBER RISK What Orgs Can Learn From Olympics, World Cup IR Plans byTara Seals MAR 12, 2026 THREAT INTELLIGENCE Commercial Spyware Opponents Fear US Policy Shifting byRob Wright MAR 12, 2026 9 MIN READ Want more Dark Reading stories in your Google search results? 2026 Security Trends & Outlooks THREAT INTELLIGENCE Cybersecurity Predictions for 2026: Navigating the Future of Digital Threats JAN 2, 2026 CYBER RISK Navigating Privacy and Cybersecurity Laws in 2026 Will Prove Difficult JAN 12, 2026 ENDPOINT SECURITY CISOs Face a Tighter Insurance Market in 2026 JAN 5, 2026 THREAT INTELLIGENCE 2026: The Year Agentic AI Becomes the Attack-Surface Poster Child JAN 30, 2026 Download the Collection Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox. SUBSCRIBE Webinars Building a Robust SOC in a Post-AI World THURS, MARCH 19, 2026 AT 1PM EST Retail Security: Protecting Customer Data and Payment Systems THURS, APRIL 2, 2026 AT 1PM EST Rethinking SSE: When Unified SASE Delivers the Flexibility Enterprises Need WED, APRIL 1, 2026 AT 1PM EST Securing Remote and Hybrid Work Forecast: Beyond the VPN TUES, MARCH 10, 2026 AT 1PM EST AI-Powered Threat Detection: Beyond Traditional Security Models WED, MARCH 25, 2026 AT 1PM EST More Webinars White Papers Autonomous Pentesting at Machine Speed, Without False Positives Fixing Organizations' Identity Security Posture Best practices for incident response planning Industry Report: AI, SOC, and Modernizing Cybersecurity The Threat Prevention Buyer's Guide: Find the best AI-driven threat protection solution to stop file-based attacks. Explore More White Papers GISEC GLOBAL 2026 GISEC GLOBAL is the most influential and the largest cybersecurity gathering in the Middle East & Africa, uniting global CISOs, government leaders, technology buyers, and ethical hackers for three power-packed days of innovation, strategy, and live cyber drills. 📌 BOOK YOUR SPACE
    💬 Team Notes
    Article Info
    Source
    Dark Reading
    Category
    ◇ Industry News & Leadership
    Published
    Mar 20, 2026
    Archived
    Mar 20, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗