ログイン中: ゲストモード

ResearchApr 8, 2026Abcas Security Research

MCP-Specific Threat Signals Across 2,869 Servers: What We Observed and What Remains Unproven

Out of 2,869 unique MCP servers, 228 servers (7.9%) showed MCP-specific threat signals. Prompt Injection, Function Hijacking, and PleaseFix Attack overlapped on the same 134 servers, while Indirect Theft was observed on 113 servers through a partly separate path. In this dataset, none of these signals were observed on their own; every detected case also showed conventional threat signals.

Terminology

TermMeaning
MCP-specific threat signalA threat pattern observed in the context of AI-agent behavior or MCP interaction
Conventional threat signalA threat pattern such as Shell RCE or SSRF that predates MCP
Co-occurrenceMultiple threat signals observed on the same server
Observation scopeThe range directly covered by this dataset. Zero detections do not prove absence

Lead

Did MCP and AI agents really introduce new attack surfaces? The useful way to approach that question is not through theory alone, but by asking where concrete threat signals were actually observed.

This report reviews six MCP-specific threat patterns across 2,869 unique MCP servers. The focus is on which patterns overlapped, how they related to conventional threats, and what still remains unproven.

Key Findings

  1. 228 servers (7.9%) showed at least one MCP-specific threat signal.
  2. Prompt Injection, Function Hijacking, and PleaseFix Attack were observed on the same 134 servers in this dataset.
  3. Indirect Theft was observed on 113 servers and was strongly associated with outbound transmission or cross-server relay.
  4. In this dataset, no server showed MCP-specific threat signals without also showing conventional threat signals.
  5. Servers with MCP-specific threat signals had a 58.8% BLOCK rate, compared with 32.7% for servers that showed only conventional threats.
  6. Tool Poisoning and Tool Name Collision had zero detections within the current observation scope.

Dataset

ItemValue
Total population2,869 unique MCP servers
MCP-specific threat patterns tracked6
Servers with at least one MCP-specific threat signal228
Observation windowApril 2026

Detection Status of MCP-Specific Threat Signals

Threat PatternDetectionsDetection Rate
Prompt Injection1344.7%
PleaseFix Attack1344.7%
Function Hijacking1344.7%
Indirect Theft1133.9%
Tool Poisoning00.0%
Tool Name Collision00.0%

The first notable pattern is that the top three signals have identical counts.
Understanding what kind of capability cluster sat behind that overlap is the main question for this article.

The Three Signals That Overlapped on 134 Servers

Co-occurrence analysis produced the following results.

Threat PairCo-occurring Servers
Prompt Injection + PleaseFix Attack134
Prompt Injection + Function Hijacking134
PleaseFix Attack + Function Hijacking134

In this dataset, the three signals were observed together on the same server group.
That overlap closely matched the 134 servers discussed in Part 4 that exposed dynamic code execution capability.

The correct takeaway is limited: in this dataset, the three signals concentrated around the same capability group.
That does not prove a universal law. It does indicate that when AI-agent interaction and execution-oriented capability converge on the same server, these three signals tended to emerge together.

Indirect Theft Also Appeared Through a Separate Path

Indirect Theft was observed on 113 servers.
It overlaps partly with the three-signal group, but not in the same shape.

ComparisonThree-signal overlap groupIndirect Theft
Detections134113
Commonly associated capabilityDynamic code executionOutbound transmission / cross-server relay
Overlap patternSame 134 serversPartial overlap only

Within the 113 Indirect Theft detections:

Commonly Associated CapabilityServersPercentage
Outbound transmission8877.9%
Cross-server relay3833.6%

Some servers had both capabilities, so the totals exceed 113.
This matters because it shows that MCP-specific threat signals do not all arise through the same operational path. Even without code execution, outbound transmission or cross-server relay can create a different risk route.

Of the 134 servers with Prompt Injection, only 19 (14.2%) also showed Indirect Theft.
So Indirect Theft cannot be explained solely by the three-signal overlap group.

Relationship With Conventional Threats

Server CategoryServers
Conventional threats only257
MCP-specific threats only0
Both228
No threats2,384

In this dataset, zero servers showed MCP-specific threat signals alone.

This is not proof that MCP-specific threats must always be accompanied by conventional ones in every future dataset.
It does suggest that, here, the capabilities associated with MCP-specific signals also tended to create conventional attack surfaces at the same time.

Average threat counts across the 228 servers were:

MetricValue
Average total threats4.7
Average MCP-specific threats2.3
Average conventional threats2.4

The near-even split means that looking at only one side gives an incomplete view of actual exposure.

BLOCK Rate Comparison

Server CategoryServersBLOCKBLOCK Rate
With MCP-specific threat signals22813458.8%
Conventional threats only2578432.7%

Servers with MCP-specific threat signals showed a higher BLOCK rate.
However, it would be too strong to say the MCP-specific signals themselves directly caused that gap. A more defensible reading is that high-risk capabilities such as execution or outbound transmission were often present at the same time, and those broader capability clusters were strongly associated with BLOCK verdicts.

The Two Zero-Detection Patterns

Threat PatternDetectionsLikely Reason Within Current Scope
Tool Poisoning0Requires evaluating intent and manipulation inside tool definitions, which is harder to capture in simple aggregate analysis
Tool Name Collision0Depends on multi-server environments and is difficult to surface from single-server observation alone

Zero detections do not mean the threats do not exist.
They more likely indicate that these patterns are harder to observe inside the current scope and single-server-centered dataset.

Why Conventional Tools Often Miss These Signals

MCP-specific threat signals are not typically assessed by conventional web security tooling. Three reasons stand out.

1. AI-agent mediation

Prompt Injection and PleaseFix Attack depend not only on user input, but on the chain from attacker input to AI-agent judgment to tool execution. Conventional tooling often does not model that full path.

2. MCP semantics

Function Hijacking and Tool Poisoning require understanding tool definitions together with how an AI agent interprets them. That falls outside the normal scope of generic WAF or SAST tooling.

3. Session context

Indirect Theft depends on the context of what data moves where. The same outbound transmission could be legitimate workflow behavior or suspicious exfiltration. That distinction often requires session-level understanding.

Limitations

  1. These detections indicate that threat-pattern preconditions were observed, not that attacks were actually executed.
  2. Zero detections for Tool Poisoning and Tool Name Collision are heavily influenced by the current observation scope.
  3. The finding that the same 134 servers carried the three-signal overlap is an observed fact in this dataset, not a guarantee about future populations.
  4. This is a snapshot based on 2,869 unique servers, not a complete census of the entire MCP ecosystem.

Conclusion

Out of 2,869 unique MCP servers, 228 showed MCP-specific threat signals.
Within that group, Prompt Injection, Function Hijacking, and PleaseFix Attack overlapped on the same 134 servers, while Indirect Theft also emerged through outbound transmission and cross-server relay.

The practical lesson is that MCP-specific and conventional threats should not be reviewed in isolation.
Security review needs to examine how AI-specific attack surfaces and conventional attack surfaces compound on the same server.


MCP Guard continuously tracks how MCP-specific and conventional threat signals overlap across MCP servers.