Data Exfiltration & Credential Theft

Unauthorized extraction of sensitive data and credentials from MCP systems through various attack vectors and techniques.

Overview

Data exfiltration attacks target the valuable information processed and stored by MCP systems, including conversation histories, API keys, credentials, and sensitive business data.

Attack Techniques

Data Exfiltration

Unauthorized extraction of sensitive data through MCP tools or communication channels.

Credential Exfiltration

Theft of API keys, tokens, passwords, and other authentication credentials.

Token Theft/Overreach

Unauthorized access to OAuth tokens or excessive token permissions.

API Key Exposure

Accidental or malicious exposure of API keys and secrets.

Conversation History Exfiltration

Covert extraction of entire conversation histories through malicious MCP servers.

Sensitive Information Disclosure

Unintended exposure of confidential data through MCP tool responses or logging.

Impact Assessment

  • Severity: High to Critical
  • Likelihood: Medium to High
  • Detection Difficulty: Medium

This category contains 6 distinct attack techniques focused on unauthorized data and credential theft.


Table of contents