MCP Security News

Latest security developments, research findings, and protocol updates related to Model Context Protocol security.


2025

June 26, 2025 - Desktop Extensions Launch: Security Implications for One-Click MCP Installation

Protocol UpdateMedium PrioritySecurity Review Recommended

Anthropic launched MCP Desktop Extensions, transforming MCP from complex developer setup to one-click installation for end users. While this dramatically improves usability, it introduces new security considerations for enterprise deployments.

Key Security Features:

  • Enterprise-level security controls with Group Policy and MDM support
  • Ability to pre-install approved extensions and blocklist specific publishers
  • Sensitive data stored in OS keychain with automatic updates
  • Supports private extension directories for organizations

Security Implications:

  • Reduces technical barriers but increases attack surface
  • Centralized extension management enables better security oversight
  • Need for new security policies around extension approval processes

Recommended Actions:

  1. Enterprise: Implement extension approval workflows
  2. Review: Audit installed extensions regularly
  3. Policy: Establish guidelines for approved MCP extensions
  4. Monitor: Set up alerts for unauthorized extension installations

Source: Desktop Extensions Engineering Blog


May 1, 2025 - Atlassian Official MCP Server: Enterprise MCP Security Model

Industry AdoptionLow PriorityReference Implementation

Atlassian released their official remote MCP server for Jira and Confluence Cloud, demonstrating enterprise-grade security practices for MCP deployments.

Security Highlights:

  • OAuth authentication with existing permission controls
  • Runs on Atlassian infrastructure with “privacy by design” principles
  • Demonstrates secure remote MCP server architecture
  • Built using Cloudflare’s Agents SDK

Security Implications:

  • Provides reference implementation for enterprise MCP security
  • Shows how to maintain security while enabling AI access to enterprise data
  • Validates remote MCP server deployment model

Source: Atlassian Remote MCP Server


March 27, 2025 - Microsoft & MCP Spec Update: Enhanced Security Framework

Protocol UpdateHigh PrioritySecurity Enhancement

Microsoft released Playwright-MCP server and the MCP specification received major security updates, including OAuth 2.1-based authorization framework and enhanced transport security.

Security Enhancements:

  • OAuth 2.1-based authorization framework implementation
  • Streamable HTTP transport with improved security
  • JSON-RPC batching with better error handling
  • Enhanced tool annotations for secure agent interactions

Security Implications:

  • Standardized secure communication protocol for AI agents
  • Improved authentication and authorization mechanisms
  • Better support for enterprise security requirements

Source: VentureBeat MCP Update Coverage


March 26, 2025 - OpenAI Adopts MCP: Industry Standardization

Industry AdoptionMedium PriorityProtocol Validation

OpenAI officially adopted MCP across ChatGPT, Agents SDK, and Responses API, signaling MCP’s evolution toward industry standard for AI-data connections.

Security Implications:

  • Validates MCP security model across competing platforms
  • Increases importance of MCP security best practices
  • Standardizes AI-data connection patterns across industry

Key Features:

  • Two-way connections between AI models and external data sources
  • Controlled data access through “MCP servers” with client connections
  • Open source protocol with growing ecosystem of integrations

Source: TechCrunch OpenAI MCP Adoption


February 2025 - API MCP Connector: Simplified Integration

Protocol UpdateMedium PriorityDevelopment Security

Anthropic launched the API MCP Connector, enabling developers to connect Claude to remote MCP servers without custom client code, while automatically handling security concerns.

Security Features:

  • Automatic connection management and authentication handling
  • Built-in error handling and security controls
  • Standardized approach to third-party MCP server integration

Security Implications:

  • Reduces complexity-related security risks in MCP implementations
  • Provides secure defaults for MCP connections
  • Enables broader adoption with maintained security posture

Source: Anthropic Agent Capabilities API


January 2025 - MCP Integrations Launch: Remote Server Expansion

Protocol UpdateMedium PriorityExpanded Attack Surface

Anthropic launched MCP Integrations, expanding from local-only to remote servers with 10 major enterprise integrations including Jira, Confluence, Zapier, and others.

Security Implications:

  • Expanded attack surface with remote server connections
  • New trust models for third-party MCP servers
  • Need for comprehensive security policies around integration approval

Key Features:

  • Remote server connectivity across web and desktop apps
  • Enhanced research capabilities with citation transparency
  • Cross-platform workflow automation

Source: Anthropic Integrations Launch


January 17, 2025 - Critical: 1,862 MCP Servers Exposed Without Authentication

Security ResearchHigh PriorityImmediate Action Required

Security researchers at Knostic.ai have discovered 1,862 MCP servers exposed to the internet without authentication, with 100% of sampled servers (119/119) allowing unauthorized access to internal tool listings.

Key Findings:

  • 1,862 MCP servers discoverable via Shodan search engine
  • All 119 manually verified servers lacked authentication
  • Servers vulnerable to data exfiltration, remote code execution, and credential theft
  • Custom Python tooling developed for systematic discovery

Security Implications:

  • Validates concerns about unauthenticated MCP deployments
  • Demonstrates real-world exploitation potential at scale
  • Highlights need for mandatory authentication in MCP implementations

Recommended Actions:

  1. Immediate: Audit your MCP server deployments for internet exposure
  2. Urgent: Implement authentication on all MCP servers
  3. Review: Check if your servers appear in Shodan results
  4. Monitor: Set up alerts for unauthorized access attempts

Research Source: Finding MCP Servers with Shodan

Related Documentation:


How to Stay Updated


Submit Security News

Have security research, vulnerability disclosures, or protocol updates to share?

  1. Research Findings: Submit via GitHub Issues
  2. Community Discussion: Post in GitHub Discussions
  3. Direct Contact: Email the working group at security@modelcontextprotocol.org

This page tracks significant security developments in the MCP ecosystem. For vulnerability disclosures, see our Known Vulnerabilities database.