MCP Security Tactics, Techniques, and Procedures (TTPs)

A comprehensive database of security tactics, techniques, and procedures specific to Model Context Protocol (MCP) implementations. This resource provides detailed technical information about attack vectors, detection methods, and mitigation strategies for MCP security threats.

About This Framework

This TTP framework is designed to evolve into a MITRE ATT&CK-style resource specifically for MCP security. It organizes security threats by category and provides actionable intelligence for defenders, developers, and security professionals.

TTP Categories

🎯 Prompt Injection & Manipulation

7 techniques

Techniques for manipulating AI behavior through malicious prompts and instructions

Explore Techniques →

🛠️ Tool Poisoning & Metadata Attacks

8 techniques

Methods for compromising MCP tools and manipulating their metadata

Explore Techniques →

📊 Data Exfiltration & Credential Theft

6 techniques

Unauthorized extraction of sensitive data and credentials from MCP systems

Explore Techniques →

💻 Command & Code Injection

7 techniques

Execution of arbitrary commands and code through MCP vulnerabilities

Explore Techniques →

🔐 Authentication & Authorization

8 techniques

Bypassing authentication and authorization controls in MCP systems

Explore Techniques →

🔗 Supply Chain & Dependencies

7 techniques

Compromising MCP through malicious packages and dependency attacks

Explore Techniques →

🎭 Context Manipulation

5 techniques

Manipulating context data to influence AI behavior and decision-making

Explore Techniques →

🔌 Protocol Vulnerabilities

5 techniques

Exploiting flaws in MCP protocol implementation and communication

Explore Techniques →

🛡️ Privilege & Access Control

6 techniques

Escalating privileges and bypassing access controls in MCP deployments

Explore Techniques →

💰 Economic & Infrastructure Abuse

3 techniques

Abusing MCP systems for economic damage and infrastructure disruption

Explore Techniques →

📊 Monitoring & Operational Security

5 techniques

Exploiting gaps in monitoring and operational security practices

Explore Techniques →

🤖 AI-Specific Vulnerabilities

4 techniques

Vulnerabilities specific to AI reasoning and model behavior

Explore Techniques →

How to Use This Framework

For Security Teams

  • Threat Hunting: Use TTPs to identify potential attack vectors in your environment
  • Risk Assessment: Evaluate which TTPs are most relevant to your MCP deployment
  • Detection Rules: Develop monitoring and alerting based on specific TTP indicators
  • Incident Response: Reference TTPs during security incident investigation

For Developers

  • Secure Development: Understand attack techniques to build more secure MCP applications
  • Code Review: Use TTPs as a checklist during security code reviews
  • Testing: Validate security controls against known attack techniques
  • Threat Modeling: Incorporate TTPs into application threat modeling exercises

For Auditors

  • Security Assessment: Evaluate MCP implementations against known attack techniques
  • Compliance Testing: Verify security controls address relevant TTPs
  • Penetration Testing: Use TTPs to guide security testing activities
  • Risk Evaluation: Assess organizational exposure to specific attack techniques

TTP Structure

Each TTP entry includes:

  • Description: Clear explanation of the attack technique
  • Impact: Potential consequences of successful exploitation
  • Detection Methods: Ways to identify the technique being used
  • Mitigation Strategies: Defensive measures and countermeasures
  • Real-World Examples: Documented cases and demonstrations
  • Sources & References: Research and industry reports

Contributing to the TTP Framework

How to Contribute

  • GitHub Discussions - Suggest new TTPs or improvements
  • Research Contributions - Share findings from security research
  • Field Experience - Document real-world attack observations
  • Detection Methods - Contribute monitoring and detection approaches

Community Development

This framework is community-driven and evolves based on:

  • Emerging Threats: New attack techniques and vulnerabilities
  • Research Findings: Academic and industry security research
  • Field Experience: Real-world incident reports and observations
  • Technology Evolution: Changes in MCP specifications and implementations

Implementation Guidance

Community Resources


This TTP framework represents the collective knowledge of the MCP security community and is continuously updated based on emerging threats and research findings.


Table of contents