Protocol-level attacks
Attacks that exploit the MCP protocol itself — auth bypasses, command injection in the transport layer, token mis-redemption, and poisoned tool metadata. These flaws live below the application; no amount of careful tool design inside an MCP server will save a deployment from a broken protocol boundary.