ログイン中: ゲストモード

ResearchApr 6, 2026Abcas Security Research

Why MCP Servers With Dynamic Code Execution Show Higher Risk Concentration: Observations From 134 Servers

Across 134 MCP servers with dynamic code execution capability, the same threat cluster repeatedly appeared and 77.6% received BLOCK verdicts. When external command execution or outbound communication was also present, risk concentration increased further.

Terminology

TermMeaning
Dynamic code execution capabilityThe ability to evaluate or run code at runtime
External command execution capabilityThe ability to launch shell commands or child processes
Co-occurrenceMultiple threats or capabilities observed on the same server
BLOCK rateThe share of servers in a group that received a BLOCK verdict

Lead

Among MCP servers, those with dynamic code execution capability warrant especially careful review. The reason is not simply that "code can run." The real issue is that input handling, privilege boundaries, outbound communication, and execution control tend to converge inside the same server.

This report examines 134 servers where dynamic code execution capability was observed, and 62 servers where external command execution capability was observed, within a population of 2,867 unique MCP servers. The goal is to identify which threat clusters appeared repeatedly and how risk intensified when multiple execution-oriented capabilities were combined.

Key Findings

  1. The same five threat patterns were observed across all 134 servers with dynamic code execution capability.
  2. Of those 134 servers, 104 servers (77.6%) received BLOCK.
  3. Across the 62 servers with external command execution capability, Shell RCE and Argument Injection were observed in all cases.
  4. The 9 servers where both execution-oriented capabilities were observed all received BLOCK in this dataset.
  5. Roughly one-fifth of the servers with dynamic code execution capability also exposed communication-related capabilities.

Dataset

ItemValue
Total population2,867 unique MCP servers
Servers with dynamic code execution capability134
Servers with external command execution capability62
Observation windowApril 2026

Threats Repeatedly Observed Across 134 Servers

The following five threat patterns were observed across all 134 servers with dynamic code execution capability.

Threat PatternObservation Rate
Shell RCE100%
Function Hijacking100%
PleaseFix Attack100%
Prompt Injection100%
Insecure Plugin Design100%

What this supports is a narrower claim: in this dataset, these five patterns consistently appeared together for servers with dynamic code execution capability.

This is not proof that attacks actually occurred. It does show that servers with dynamic code execution capability tended to expose multiple attack surfaces at the same time.

Additional Threats That Often Overlapped

Some of the 134 servers also showed additional threat patterns.

Additional ThreatObservation RateCommonly Associated Capability
SSRF22.4%External data retrieval
Path Traversal14.9%Local file reading
Data Exfiltration14.2%Outbound transmission
Indirect Theft14.2%Outbound transmission
Clawdrain6.7%Heavy resource consumption
MITM6.7%Unsafe network exposure
DNS Rebinding6.7%Unsafe network exposure
Argument Injection6.7%External command execution

Dynamic code execution already creates a broad attack surface on its own. When outbound communication or file operations are added, additional threat families become easier to observe on the same server.

The 62 Servers With External Command Execution Capability

The 62 servers with external command execution capability showed the following pattern.

Threat PatternObservation Rate
Shell RCE100%
Argument Injection100%
Path Traversal46.8%
Data Exfiltration21.0%
Indirect Theft21.0%
SSRF17.7%

External command execution may look narrower than dynamic code execution, but command argument handling and file-path processing often become direct attack surfaces. That helps explain why Argument Injection and Path Traversal appeared at relatively high rates in this group.

When Both Execution Capabilities Are Present

Nine servers showed both dynamic code execution capability and external command execution capability. In this dataset, all nine received BLOCK.

This is not proof of a universal rule that two execution capabilities are always dangerous. It does indicate that when multiple execution-oriented capabilities concentrate on the same server, the review posture becomes substantially more severe.

Three Design Patterns

In this dataset, servers with dynamic code execution capability fell into three broad patterns.

1. Single-function execution

103 servers, or about 77% of the group.
These servers mainly focused on running code and exposed fewer additional capabilities.

2. Execution plus communication

Roughly 20% of the group.
These servers combined code execution with outbound or inbound communication, making overlaps with threats such as SSRF and Data Exfiltration more common.

3. Multi-function integration

9 servers, or about 7% of the group.
These servers combined code execution, external commands, file operations, and outbound communication. In this dataset, this pattern was the most strongly associated with BLOCK verdicts.

How To Read This Operationally

For deployment review, the most practical screening order is:

  1. Does the server execute code dynamically?
  2. Does it launch external commands?
  3. Does it also send data outward or fetch external data?
  4. Are file operations combined with those capabilities?

More capability can look convenient, but it also creates more connected attack surfaces. Servers that combine execution, outbound transmission, and write access deserve especially careful review.

Limitations

  1. This report is a trend analysis based on observed data, not proof that attacks were actually carried out.
  2. Sandbox implementation quality was not evaluated directly.
  3. Some servers without observed dynamic code execution capability may still expose execution paths through other mechanisms.
  4. Individual server names are not disclosed here because the article focuses on aggregate patterns rather than per-server alerts.

Conclusion

Across 2,867 unique MCP servers, the 134 servers with dynamic code execution capability showed a strongly repeated threat cluster. When external command execution or communication-related capabilities were also present, risk became more compound.

The main lesson is not just that running code is risky. It is that execution capability becomes materially more dangerous when combined with other operational capabilities on the same server. Function separation and clear privilege boundaries matter.


MCP Guard continuously tracks the co-occurrence of execution-oriented capabilities and threat signals across MCP servers.