ログイン中: ゲストモード

ResearchApr 4, 2026Abcas Security Research

Which Capability Patterns Correlate With Higher Risk in MCP Servers? Observations Across 2,867 Servers

Across 2,867 unique MCP servers, dynamic code execution and unsafe network exposure showed the highest BLOCK rates. Risk concentration increased further when multiple high-risk capabilities appeared together.

Terminology

TermMeaning
Capability patternA public-facing grouping of server capabilities observed during scanning
Unique serverA normalized server identity after deduplicating repeated scans of the same target
BLOCK rateThe share of servers in a group that received a BLOCK verdict
Co-occurrenceTwo or more capabilities observed on the same server

Lead

When evaluating MCP server risk, the key question is not only which server a team is considering, but what that server can actually do. File access, outbound transmission, dynamic code execution, and external command execution each create different attack surfaces.

This report analyzes the relationship between 11 public-facing capability groupings and final PASS / WARN / BLOCK verdicts across 2,867 unique MCP servers. The goal is not to expose internal logic, but to show which capability patterns are most strongly associated with higher operational risk.

Key Findings

  1. Unsafe network exposure had the highest observed BLOCK rate: 67 of 71 servers, or 94.4%.
  2. Dynamic code execution followed next: 104 of 134 servers, or 77.6%, were BLOCK.
  3. Out of 2,867 servers, 484 (16.9%) showed clearly observable high-risk capabilities.
  4. Risk increased further when high-risk capabilities co-occurred. In this dataset, 13 capability pairs reached a 100% BLOCK rate.
  5. Servers without directly observed high-risk capabilities still concentrated heavily at WARN. “No visible high-risk capability” does not mean “low risk.”

Dataset

ItemValue
Unique servers analyzed2,867
Observation windowApril 2026
Public-facing capability groups11
Servers with clearly observed high-risk capabilities484 (16.9%)
Servers without directly observed high-risk capabilities2,383 (83.1%)

The 11 Public-Facing Capability Groups

Capability GroupDescriptionServers% of Total
Local file readingReading local files1445.0%
External data retrievalPulling data from the web or APIs1445.0%
Dynamic code executionEvaluating or executing code at runtime1344.7%
Outbound transmissionSending data to external services883.1%
Unsafe network exposureDangerous bind or TLS settings712.5%
Local file writingCreating or updating files682.4%
External command executionLaunching shell commands or child processes612.1%
Cross-server relayCalling other servers or relaying results onward381.3%
Local file deletionDeleting files270.9%
Heavy resource consumptionLooping or high-cost execution patterns160.6%
Broad OAuth permissionsRequesting unusually wide OAuth scopes20.1%

BLOCK Rates by Capability Group

Capability GroupServersPASSWARNBLOCKBLOCK Rate
Unsafe network exposure71046794.4%
Dynamic code execution13426410477.6%
Local file deletion27721866.7%
External command execution612014065.6%
Heavy resource consumption1662850.0%
Outbound transmission8823224348.9%
Local file writing6822133348.5%
Cross-server relay3812101642.1%
External data retrieval14455335638.9%
Local file reading14454365437.5%

What Stands Out Most

1. Unsafe network exposure

Unsafe network exposure was the strongest single risk signal in this dataset. Once observed, it was rarely isolated. It tended to appear alongside other operational capabilities, and the combined result was often a BLOCK verdict.

2. Dynamic code execution

Dynamic code execution was the second strongest signal, with a 77.6% BLOCK rate. This is not because the capability is automatically malicious, but because it creates multiple points of failure at once: input handling, privilege boundaries, outbound communication, and execution control.

3. “Read-only” capabilities are not harmless

Local file reading and external data retrieval showed lower BLOCK rates than the top-risk groups, but both still landed around 40%. These capabilities remain relevant because they open well-known paths such as Path Traversal and SSRF.

Co-Occurrence Patterns That Matter

In this dataset, 13 capability pairs reached a 100% BLOCK rate. Representative examples:

PairServersBLOCK Rate
Dynamic code execution + external command execution9100%
Dynamic code execution + local file writing8100%
Dynamic code execution + unsafe network exposure9100%
External command execution + outbound transmission9100%
Local file reading + outbound transmission18100%

The practical point is not that any one capability is “the problem.” The larger risk comes from attack-surface connectivity: a capability that executes, another that reads, and another that sends outward create a more dangerous chain than any one of them alone.

Are Servers Without These Capabilities Safe?

No.

The 2,383 servers without directly observed high-risk capabilities were distributed as follows:

VerdictCountPercentage
PASS61525.8%
WARN1,71872.1%
BLOCK472.0%

Many of these servers were still flagged because of provenance concerns, permission requests, or communication/configuration issues. In other words, the absence of an obvious attack surface is not proof of low risk.

How To Read This Operationally

For procurement or deployment review, the most practical screening order is:

  1. Does the server execute code dynamically or launch external commands?
  2. Does it send data outward or relay results to other systems?
  3. Does it expose unsafe network behavior?
  4. Are multiple such capabilities present at the same time?

This order helps teams triage faster before they spend time on deeper per-server review.

Limitations

  1. This report uses public-facing capability groupings, not internal implementation terminology.
  2. Very small groups should be treated as reference values; broad OAuth permissions appeared in only 2 servers.
  3. The 100% BLOCK pairs are observed results from this dataset, not guarantees about future populations.
  4. Three-capability and larger combinations will be analyzed separately.

Conclusion

Across 2,867 unique MCP servers, dynamic code execution and unsafe network exposure were the two strongest observed correlates of BLOCK verdicts. Risk increased further when multiple high-risk capabilities appeared together.

For real-world MCP server review, teams should focus less on popularity and more on which capabilities coexist on the same server. Risk tends to compound through combinations, not through labels alone.


MCP Guard continuously tracks observed MCP server behavior to understand how capability patterns and threat signals move together over time.