Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
What's Hot

Top Startups and High-Tech Funding News for the Weekly Ends June 20, 2025

Harvard International Students: What the Judge’s Judgment Means

Apple is talking to you to win AI startup confusion

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
Fyself News
Home » Researchers show how MCP prompt injection can be used for both attack and defense
Identity

Researchers show how MCP prompt injection can be used for both attack and defense

userBy userApril 30, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

April 30, 2025Ravi LakshmananArtificial Intelligence/Email Security

Important MCP and A2A Defects

As the field of artificial intelligence (AI) continues to evolve rapidly, a new report from Tenable reveals that Model Context Protocol (MCP) uses techniques that are susceptible to rapid injection attacks to develop rapid injection tools and identify malicious tools.

Launched by Humanity in November 2024, MCP is a framework designed to connect large-scale language models (LLMs) with external data sources and services and interact with those systems using model control tools to enhance the accuracy, relevance and utility of AI applications.

Following the client-server architecture, hosts with MCP clients such as Claude desktops and cursors can communicate with a variety of MCP servers, each exposes specific tools and features.

Cybersecurity

Open Standard offers a unified interface for accessing a variety of data sources and switching between LLM providers, but comes with a new set of risks, ranging from excessive allowance to indirect rapid injection attacks.

For example, given the MCP for Gmail to interact with Google’s email services, an attacker can send malicious messages with indications that when parsed by LLM, it could cause unwanted actions, such as forwarding emails that are sensitive to email addresses under control.

MCPs have also been found to be vulnerable to what is called tool addiction. This instruction is embedded with malicious instructions in the description of the tool that appears to LLMS, and lag pull attacks occur when they first work in a benign way, but later change behavior via time-lagged malicious updates.

“While users can authorize use and access to the tool, it should be noted that the permissions given to the tool can be reused without re-employing the user,” Sentinelone said in a recent analysis.

Finally, there is also the risk of cross-tool contamination or cross-server tools shadowing, which can seriously affect the way one MCP server overrides or interferes with another, leading to new ways of delaminating data.

The latest findings in Tenable show that using the MCP framework, we can create a tool that records all MCP tool function calls by including a specially written description that tells LLM to insert this tool before other tools are invoked.

In other words, rapid injection is to record information about “the tool being asked to run, such as the MCP server name, the MCP tool name and description, and the user prompt that LLM attempts to run that tool.”

Another use case involves embedding descriptions in the tool and turning them into the kind of firewall that blocks the execution of unauthorized tools.

“The tool should require explicit approval before running on most MCP host applications,” said security researcher Ben Smith.

“Even so, there are many ways to use tools to do things that are not strictly understood by the specification. These methods rely on LLM through the description and return values ​​of the MCP tool itself. LLM is non-deterministic, so the result is also the result.”

It’s not just MCP

This disclosure comes when Trustwave SpiderLabs reveals that the newly introduced Agent2Agent (A2A) protocol that enables communication and interoperability between agent applications could be exposed to new form attacks that can lead the system to the game.

Cybersecurity

A2A was announced earlier this month by Google as a way for AI agents to work with siloed data systems and applications, regardless of the vendor or framework used. It is important to note here that while the MCP connects the LLMS to the data, the A2A connects one AI agent to another. In other words, they are both complementary protocols.

“Let’s say you compromised an agent through another vulnerability (probably through the operating system). If you use a compromised node (agent) to create an agent card and truly exaggerate your capabilities, the host agent should choose us every time for every task, and we send you sensitive data for all users.

“Attacks not only stop at capturing data, they are active and even return false results. This can be effected downstream by LLM or by users.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleJudge releases Palestinian student activist arrested in his citizenship interview
Next Article The Massa Pequa Chiefs Mascot will be the focus of the controversy in Trump’s investigation
user
  • Website

Related Posts

Qilin ransomware adds “Cole Lawyer” feature that puts pressure on victims for larger ransoms

June 20, 2025

Television in Iranian states hijacked mid-distance broadcasts amid geopolitical tensions. $90 million stolen from Crypto Heist

June 20, 2025

Successful In-house SOC 6 steps up to 24 hours a day, 365 days a year

June 20, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Top Startups and High-Tech Funding News for the Weekly Ends June 20, 2025

Harvard International Students: What the Judge’s Judgment Means

Apple is talking to you to win AI startup confusion

The wavy spy says the man is following him, his wife is afraid

Trending Posts

Sana Yousaf, who was the Pakistani Tiktok star shot by gunmen? |Crime News

June 4, 2025

Trump says it’s difficult to make a deal with China’s xi’ amid trade disputes | Donald Trump News

June 4, 2025

Iraq’s Jewish Community Saves Forgotten Shrine Religious News

June 4, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Top Startups and High-Tech Funding News for the Weekly Ends June 20, 2025

Apple is talking to you to win AI startup confusion

Mira Murati’s AI Startup Thinking Machine Lab emerges from stealth at $20 billion seed and $1 billion valuation

Elon Musk’s AI startup Xai will increase bond yields to 12.5% ​​with a $5 billion debt hike due to weak investor demand

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.