<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"><channel><title>PolicyLayer Attack Database</title><description>A verified catalogue of attacks targeting MCP (Model Context Protocol) deployments. Named CVEs, real incidents, and the policies that prevent them.</description><link>https://policylayer.com/</link><language>en-gb</language><item><title>Backdoored community MCP server</title><link>https://policylayer.com/attacks/backdoored-community-mcp-server/</link><guid isPermaLink="true">https://policylayer.com/attacks/backdoored-community-mcp-server/</guid><description>Author-malicious MCP servers published to npm, PyPI, mcp.so, Smithery, and Glama. Kaspersky PoC, VirusTotal audit of 17,845 repos (8% flagged), AgentSeal scan of 1,808 servers (66% findings).</description><pubDate>Sun, 19 Apr 2026 00:00:00 GMT</pubDate><category>supply-chain</category></item><item><title>Compromised MCP server package</title><link>https://policylayer.com/attacks/compromised-mcp-package/</link><guid isPermaLink="true">https://policylayer.com/attacks/compromised-mcp-package/</guid><description>Real supply-chain compromises in the MCP ecosystem — the Shai-Hulud worm (chalk, debug), postmark-mcp BCC backdoor, and CVE-2025-6514 in mcp-remote. How they spread and how to contain them.</description><pubDate>Sun, 19 Apr 2026 00:00:00 GMT</pubDate><category>supply-chain</category></item><item><title>Confused Deputy</title><link>https://policylayer.com/attacks/confused-deputy/</link><guid isPermaLink="true">https://policylayer.com/attacks/confused-deputy/</guid><description>The classic confused-deputy problem (Hardy, 1988) applied to MCP. In June 2025 an Asana MCP cross-tenant leak affected ~1,000 organisations. The MCP spec added RFC 8707 audience binding in response.</description><pubDate>Sun, 19 Apr 2026 00:00:00 GMT</pubDate><category>behaviour</category></item><item><title>Credential leak via error messages</title><link>https://policylayer.com/attacks/credential-leak-via-errors/</link><guid isPermaLink="true">https://policylayer.com/attacks/credential-leak-via-errors/</guid><description>Verbose MCP error messages echo secrets — stack traces, failed command output, upstream HTTP responses — into the agent&apos;s context, logs, and transcripts. OWASP MCP01:2025 classification.</description><pubDate>Sun, 19 Apr 2026 00:00:00 GMT</pubDate><category>credential-data</category></item><item><title>Destructive Action Autonomy</title><link>https://policylayer.com/attacks/destructive-action-autonomy/</link><guid isPermaLink="true">https://policylayer.com/attacks/destructive-action-autonomy/</guid><description>When AI agents delete production systems on their own. Amazon&apos;s Kiro wiped an AWS region for 13 hours; Replit&apos;s agent destroyed a SaaStr database. How require_approval policies prevent it.</description><pubDate>Sun, 19 Apr 2026 00:00:00 GMT</pubDate><category>behaviour</category></item><item><title>Indirect Prompt Injection</title><link>https://policylayer.com/attacks/indirect-prompt-injection/</link><guid isPermaLink="true">https://policylayer.com/attacks/indirect-prompt-injection/</guid><description>The root category where attackers plant instructions in data the agent retrieves — webpages, emails, PDFs, calendar invites. Greshake et al. 2023 onward, now acknowledged by OpenAI.</description><pubDate>Sun, 19 Apr 2026 00:00:00 GMT</pubDate><category>behaviour</category></item><item><title>Hidden Instructions in Tool Descriptions</title><link>https://policylayer.com/attacks/hidden-instructions-in-tool-descriptions/</link><guid isPermaLink="true">https://policylayer.com/attacks/hidden-instructions-in-tool-descriptions/</guid><description>The most-reproduced MCP attack in the literature — attackers hide prompt-injection instructions in tool description and schema fields the user never sees. Demonstrated against Cursor by Invariant Labs.</description><pubDate>Sun, 19 Apr 2026 00:00:00 GMT</pubDate><category>protocol</category></item><item><title>Data exfiltration via tool chaining</title><link>https://policylayer.com/attacks/data-exfiltration-via-tool-chaining/</link><guid isPermaLink="true">https://policylayer.com/attacks/data-exfiltration-via-tool-chaining/</guid><description>How attackers chain MCP tool calls to move data from private sources to attacker-controlled sinks. The Supabase Cursor and GitHub MCP incidents of 2025, and the policy patterns that break the chain.</description><pubDate>Sun, 19 Apr 2026 00:00:00 GMT</pubDate><category>credential-data</category></item><item><title>MCP rug pull</title><link>https://policylayer.com/attacks/mcp-rug-pull/</link><guid isPermaLink="true">https://policylayer.com/attacks/mcp-rug-pull/</guid><description>Rug pulls exploit MCP&apos;s lack of re-approval when tool definitions change. Benign tools earn trust, then silently shift behaviour after approval. Invariant Labs PoC, ETDI paper, and detection patterns.</description><pubDate>Sun, 19 Apr 2026 00:00:00 GMT</pubDate><category>supply-chain</category></item><item><title>MCP STDIO Command Injection</title><link>https://policylayer.com/attacks/mcp-stdio-command-injection/</link><guid isPermaLink="true">https://policylayer.com/attacks/mcp-stdio-command-injection/</guid><description>Ox Security disclosed a systemic command-injection flaw in Anthropic&apos;s MCP STDIO transport on 15 April 2026, affecting 150M+ SDK downloads. Anthropic called it &quot;expected behaviour.&quot;</description><pubDate>Sun, 19 Apr 2026 00:00:00 GMT</pubDate><category>protocol</category></item><item><title>Typosquatting MCP Servers</title><link>https://policylayer.com/attacks/mcp-typosquatting/</link><guid isPermaLink="true">https://policylayer.com/attacks/mcp-typosquatting/</guid><description>How attackers published typosquatted MCP server packages (postmark-mcp, SANDWORM_MODE) to steal emails, SSH keys, and cloud credentials from Claude, Cursor, Windsurf and VS Code users.</description><pubDate>Sun, 19 Apr 2026 00:00:00 GMT</pubDate><category>protocol</category></item><item><title>MCPwn — nginx-ui Auth Bypass (CVE-2026-33032)</title><link>https://policylayer.com/attacks/mcpwn-auth-bypass/</link><guid isPermaLink="true">https://policylayer.com/attacks/mcpwn-auth-bypass/</guid><description>CVE-2026-33032 (MCPwn) — the CVSS 9.8 auth bypass that exposed 2,600+ nginx-ui MCP servers to full takeover in two HTTP requests. How it works and how to block it.</description><pubDate>Sun, 19 Apr 2026 00:00:00 GMT</pubDate><category>protocol</category></item><item><title>Privilege escalation via admin-only tools</title><link>https://policylayer.com/attacks/privilege-escalation-admin-tools/</link><guid isPermaLink="true">https://policylayer.com/attacks/privilege-escalation-admin-tools/</guid><description>How agents discover and invoke privileged MCP tools via over-scoped tokens — repo+admin:org PATs, Supabase service_role keys, cloud IAM roles covering read and admin alike.</description><pubDate>Sun, 19 Apr 2026 00:00:00 GMT</pubDate><category>credential-data</category></item><item><title>Prompt Injection via Tool Results</title><link>https://policylayer.com/attacks/prompt-injection-via-tool-results/</link><guid isPermaLink="true">https://policylayer.com/attacks/prompt-injection-via-tool-results/</guid><description>MCP tool responses that contain instructions the agent follows. Demonstrated by Invariant Labs against GitHub MCP in May 2025 and by Rehberger against ChatGPT Operator in February 2025.</description><pubDate>Sun, 19 Apr 2026 00:00:00 GMT</pubDate><category>behaviour</category></item><item><title>Runaway Tool Loops</title><link>https://policylayer.com/attacks/runaway-tool-loops/</link><guid isPermaLink="true">https://policylayer.com/attacks/runaway-tool-loops/</guid><description>Self-sustaining loops of tool calls that burn API quotas, tokens, and third-party billing for days before detection. Framework-level mitigations from LangChain and Claude Code.</description><pubDate>Sun, 19 Apr 2026 00:00:00 GMT</pubDate><category>behaviour</category></item><item><title>Token Mis-redemption Across MCP Servers</title><link>https://policylayer.com/attacks/token-mis-redemption/</link><guid isPermaLink="true">https://policylayer.com/attacks/token-mis-redemption/</guid><description>Why the MCP 2025-11-25 specification makes RFC 8707 resource indicators mandatory. Token mis-redemption lets a malicious MCP server replay a stolen token against a more privileged service.</description><pubDate>Sun, 19 Apr 2026 00:00:00 GMT</pubDate><category>protocol</category></item><item><title>Session hijacking in HTTP MCP</title><link>https://policylayer.com/attacks/session-hijacking-http-mcp/</link><guid isPermaLink="true">https://policylayer.com/attacks/session-hijacking-http-mcp/</guid><description>How predictable Mcp-Session-Id headers let attackers attach to SSE streams, read tool I/O, and inject tool calls. CVEs disclosed against oatpp, Ruby, TypeScript and Java MCP SDKs.</description><pubDate>Sun, 19 Apr 2026 00:00:00 GMT</pubDate><category>credential-data</category></item><item><title>Tool Poisoning in MCP Definitions</title><link>https://policylayer.com/attacks/tool-poisoning/</link><guid isPermaLink="true">https://policylayer.com/attacks/tool-poisoning/</guid><description>Tool poisoning embeds hidden prompt injections in MCP tool names, descriptions, and schemas. Disclosed by Invariant Labs in April 2025, reproduced against Cursor, Claude Desktop, and 45 real servers.</description><pubDate>Sun, 19 Apr 2026 00:00:00 GMT</pubDate><category>protocol</category></item></channel></rss>