MCP Client Top 10 Security Risks
While MCP servers provide the backend functionality, MCP clients (such as Claude Desktop, Cursor, VS Code with MCP extensions, and other AI applications) represent the critical human interface to the MCP ecosystem. Clients handle user interactions, manage server connections, and serve as the trust boundary between users and the broader MCP infrastructure.
Client-side security risks are particularly important because compromised clients can undermine the security of entire MCP deployments from the user’s perspective. Unlike server-side risks that focus on backend security, client risks center on user interaction, local data protection, trust relationships, and the unique challenges of securing AI-integrated applications.
The Top 10 MCP Client Security Risks
MCP-C01: Malicious Server Connection
Connecting to compromised or malicious MCP servers
Malicious server connection occurs when clients connect to compromised or malicious MCP servers without proper validation. This includes fake servers, DNS poisoning, server impersonation, and connection hijacking. The distributed nature of MCP server deployment makes it easy for attackers to create malicious servers that appear legitimate to unsuspecting clients.
Impact: Data theft, malicious code execution, credential compromise
MCP-C02: Insecure Credential Storage
Improper storage of MCP server credentials on the client
Insecure credential storage involves improper storage of MCP server credentials, API keys, and authentication tokens on the client system. This includes plaintext credentials, weak encryption, accessible credential files, and inadequate protection of sensitive authentication data. Client-side credential storage is particularly vulnerable to local attacks and system compromise.
Impact: Credential theft, unauthorized server access, account takeover
MCP-C03: UI/UX Deception
Misleading users about MCP server actions or permissions
UI/UX deception involves misleading users about MCP server actions, permissions, or capabilities through the client interface. This includes hidden tool calls, misleading permission dialogs, unclear action descriptions, and interfaces that don’t clearly communicate what actions are being performed. Users may unknowingly authorize dangerous operations.
Impact: Unintended actions, data exposure, user manipulation
MCP-C04: Insufficient Server Validation
Inadequate validation of MCP server authenticity and integrity
Insufficient server validation occurs when clients fail to properly validate MCP server authenticity and integrity before establishing connections. This includes no certificate validation, missing server verification, weak trust models, and inadequate verification of server identity. Without proper validation, clients may connect to malicious servers.
Impact: Connection to malicious servers, man-in-the-middle attacks
MCP-C05: Client-Side Data Leakage
Sensitive data leaking through client logs, caches, or storage
Client-side data leakage involves sensitive data leaking through client logs, caches, temporary files, or local storage mechanisms. This includes credentials in logs, cached sensitive responses, temporary file exposure, and inadequate cleanup of sensitive data. Client systems often store more data than users realize, creating multiple leakage vectors.
Impact: Data breaches, credential exposure, privacy violations
MCP-C06: Excessive Permission Granting
Clients granting excessive permissions to MCP servers
Excessive permission granting occurs when clients grant more permissions to MCP servers than necessary for their intended function. This includes overprivileged server access, permission escalation, unnecessary scopes, and inadequate permission review processes. Users may grant broad permissions without understanding the implications.
Impact: Increased attack surface, potential for greater damage
MCP-C07: Client-Side Code Execution
Malicious responses from MCP servers executing code on the client
Client-side code execution involves malicious responses from MCP servers that execute code on the client system. This includes script injection, code execution via responses, client-side attacks through crafted responses, and exploitation of client-side interpreters. Clients that process server responses unsafely are vulnerable to code execution attacks.
Impact: Client compromise, malware installation, system takeover
MCP-C08: Insecure Communication Handling
Poor implementation of secure communication protocols
Insecure communication handling involves poor implementation of secure communication protocols between clients and servers. This includes weak TLS implementation, certificate bypass vulnerabilities, protocol downgrade attacks, and inadequate encryption of sensitive communications. Clients must properly implement secure communication to protect data in transit.
Impact: Data interception, credential theft, communication tampering
MCP-C09: Session and State Management Failures
Inadequate management of client sessions and application state
Session and state management failures involve inadequate management of client sessions, authentication state, and application state. This includes session hijacking, state manipulation, authentication bypass, and inadequate session termination. Poor session management can lead to unauthorized access and privilege escalation.
Impact: Unauthorized access, privilege escalation, data manipulation
MCP-C10: Update and Patch Management
Insecure update mechanisms or delayed security patches
Update and patch management issues involve insecure update mechanisms or delayed application of security patches. This includes unverified updates, delayed patches, insecure update channels, and inadequate update verification. Clients with poor update mechanisms remain vulnerable to known security issues.
Impact: Persistent vulnerabilities, malware distribution, system compromise
Honourable Mentions
While not in the top 10, these additional client-side security concerns are important for comprehensive MCP client security:
Local Storage Vulnerabilities
Sensitive data stored insecurely on client filesystem, including accessible configuration files and unencrypted local databases that can be accessed by other applications or users.
Client-Side Prompt Injection
Malicious prompts manipulating client behavior and UI manipulation through crafted responses designed to trick users into performing unintended actions.
Dependency Vulnerabilities
Vulnerable third-party libraries in client applications and supply chain attacks targeting client dependencies, particularly relevant for applications built with multiple open source components.
Privacy and Data Handling
Inadequate user privacy protections and unauthorized data collection and transmission, including telemetry and usage data that may expose sensitive information.
Cross-Platform Security Issues
Platform-specific vulnerabilities and inconsistent security implementations across different operating systems, creating security gaps in multi-platform deployments.
Configuration Security
Insecure client configuration management, including exposed configuration files and weak default settings that leave clients vulnerable to attack.
Network Security
Inadequate network security controls, including poor firewall integration and network-based attack vulnerabilities specific to client environments.
Client vs Server Risk Differences
Client risks focus on:
- User interaction and deception through interfaces
- Local data protection and storage security
- Trust relationships with remote servers
- UI/UX security implications and user awareness
- Client-side execution environments and local attacks
Server risks focus on:
- Service provision and backend API security
- Infrastructure security and system hardening
- Multi-tenancy and isolation between users
- Protocol implementation and specification compliance
- Backend system integration and data processing
Using This Guide
This Client Top 10 list serves as a foundation for understanding MCP client security risks. Each risk will be expanded into detailed guidance covering:
- Detailed attack scenarios and real-world examples
- Technical implementation of client-side attacks and defenses
- Prevention strategies and secure development practices
- Detection and monitoring approaches for client security
- User education and awareness strategies
Organizations should use this list to assess their MCP client implementations, train users on security best practices, and develop comprehensive security strategies for AI-integrated client applications.