ログイン中: ゲストモード

ResearchApr 2, 2026Abcas Security Research

19 Attack Patterns, How Many Were Actually Detected: Threat Matching Results Across 2,863 Servers

We ran threat matching for 19 attack patterns against 2,863 unique MCP servers (normalized from 3,601 scans). Shell RCE (187), Path Traversal (162), and SSRF (146) top the list, with 484 servers (16.9%) showing specific threat pattern matches. Vulnerability analysis series, part 2.

Terminology

TermMeaning
Threat matchingThe process of comparing MCP server scan results against predefined attack patterns to identify applicable threats
Unique serverA deduplicated unit (ServerIdentity) after normalizing multiple scans of the same MCP server
Detection rateThe percentage of unique servers where a specific threat pattern was detected
SeverityThreat severity level: LOW / MEDIUM / HIGH / CRITICAL

Introduction

In Part 1, we organized MCP server threats into 19 attack patterns and 12 server function categories, providing a structural overview. However, what we presented was a theoretical mapping of "what threats could exist" — the quantitative data on "how often they are actually detected" was deferred to this installment.

This is that installment.

We report the results of threat matching 19 attack patterns against 2,863 unique MCP servers, normalized from 3,601 scan records. Which attacks are detected most frequently? Which ones are rarely found? How prevalent are threats that were theoretically classified as "dangerous"? The data provides the answers.

Key Findings

  1. 72.4% of servers received WARN or BLOCK verdicts. Of 2,863 unique servers, only 785 (27.4%) were judged PASS.
  2. Shell RCE ranks #1 in detections (187, 6.5%). Code execution threats are the most prevalent. Path Traversal (162) and SSRF (146) follow.
  3. MCP-specific attacks cluster from 4th place onward. Prompt Injection, PleaseFix Attack, and Function Hijacking each appear in 134 servers. These are undetectable by conventional security tools.
  4. 484 servers (16.9%) show specific threat pattern matches. The remaining WARN/BLOCK servers are flagged for risk factors beyond threat patterns (excessive permission requests, opaque provenance, etc.).
  5. 16 of 19 patterns were actually detected. Tool Name Collision, Supply Chain, and Rug Pull show 0 detections — but this does not mean these threats are absent.
  6. Among servers with detections, HIGH severity dominates at 392 (81.0%). No CRITICAL verdicts at this time.

Methodology

Dataset

ItemValue
Total scans performed3,601
Unique servers after normalization2,863
Threat patterns evaluated19
Analysis dateApril 2026

The 3,601 scan records include multiple scans of the same server. This analysis uses the latest scan result per unique server (ServerIdentity), eliminating duplicates.

How threat matching works

Threat matching compares the operational characteristics detected during a scan against predefined attack patterns. Specifically, it identifies the types of operations a server actually performs (file read/write, network communication, command execution, etc.) and maps them to related threat patterns.

An important caveat: threat matching detects "the existence of conditions under which an attack could succeed," not "the attack was executed." Detections are indicators of potential risk, not evidence of actual exploitation.

Overall scan results

The scan verdict distribution across 2,863 unique servers:

VerdictCountPercentageMeaning
WARN1,81163.2%Potential risks detected
PASS78527.4%No critical issues detected
BLOCK2639.2%Critical risks detected; use not recommended
OTHER80.3%Scan errors, etc.

The "70% receive warnings or higher" figure from our previous report is confirmed at 72.4% (WARN + BLOCK) in this analysis.

The weight of BLOCK verdicts

The 263 BLOCK verdicts represent 9.2% of the total. This means roughly 1 in 10 MCP servers has issues severe enough to be flagged as unsuitable for use at the inspection stage. BLOCK-classified servers typically show multiple critical vulnerability patterns (Shell RCE, Data Exfiltration, etc.) detected simultaneously.

Detection distribution by attack pattern

The following table shows the actual number of unique servers where each of the 19 attack patterns was detected.

RankAttack PatternCategoryServers DetectedDetection Rate
1Shell RCEA: Code Execution1876.5%
2Path TraversalA: Code Execution1625.7%
3SSRFB: Data Theft1465.1%
4Insecure Plugin DesignD: Permission Abuse1374.8%
5Prompt InjectionC: MCP-Specific1344.7%
5PleaseFix AttackC: MCP-Specific1344.7%
5Function HijackingC: MCP-Specific1344.7%
8Data ExfiltrationB: Data Theft1154.0%
9Indirect TheftC: MCP-Specific1144.0%
10MITMB: Data Theft722.5%
10DNS RebindingB: Data Theft722.5%
12Argument InjectionA: Code Execution622.2%
13ClawdrainD: Permission Abuse160.6%
14OAuth Scope AbuseD: Permission Abuse40.1%
15Unicode InjectionE: Supply Chain20.1%
15Tool PoisoningC: MCP-Specific20.1%
Tool Name CollisionC: MCP-Specific00.0%
Supply ChainE: Supply Chain00.0%
Rug PullE: Supply Chain00.0%

Total: 16 patterns detected. 484 unique servers produced 13,479 cumulative threat matches — an average of 27.8 matches per affected server.

Category-level trend analysis

Category A: Code Execution — Dominating the top ranks

PatternCount
Shell RCE187
Path Traversal162
Argument Injection62
Subtotal411

The three code execution patterns account for 411 detections, roughly 30% of all matches. Shell RCE leads because a large proportion of MCP servers provide command execution functionality.

The dominance of Shell RCE and Path Traversal reflects a fundamental design pattern in MCP servers: many exist specifically to provide file system operations and process execution to AI agents. These capabilities are inherently adjacent to Shell RCE and Path Traversal risks.

Category B: Data Theft & Communication Interception — The ubiquity of network communication

PatternCount
SSRF146
Data Exfiltration115
MITM72
DNS Rebinding72
Subtotal405

Nearly equal to Category A at 405 detections, reflecting the prevalence of network-communicating MCP servers.

SSRF ranking 3rd overall is notable. When an MCP server calls external APIs, the server itself can become a stepping stone into internal networks. In cloud environments, access to metadata endpoints (169.254.169.254) can directly lead to credential theft.

MITM and DNS Rebinding share the same count (72) because both depend on the same foundation: network communication security. Servers that disable TLS verification are simultaneously exposed to both threats.

Category C: MCP-Specific Attacks — New threats are real

PatternCount
Prompt Injection134
PleaseFix Attack134
Function Hijacking134
Indirect Theft114
Tool Poisoning2
Tool Name Collision0
Subtotal518

Category C's total of 518 is the largest across all categories. This demonstrates that MCP-specific threats are not theoretical concepts but detectable realities present in numerous servers.

The identical count (134) for Prompt Injection, PleaseFix Attack, and Function Hijacking suggests these threats share common preconditions. Specifically, servers that provide conversational interfaces with AI agents tend to be simultaneously exposed to all three.

Tool Poisoning's low detection count (2) reflects the fact that exploiting it requires intentional tampering with tool definitions — it does not occur accidentally. However, low detection does not imply low risk. A single successful Tool Poisoning attack can be as impactful as, or more impactful than, Shell RCE.

Category D: Permission & Resource Abuse

PatternCount
Insecure Plugin Design137
Clawdrain16
OAuth Scope Abuse4
Subtotal157

Insecure Plugin Design ranks 4th overall at 137 detections, indicating that weak permission boundaries in plugin-enabled servers are widespread.

Clawdrain (resource exhaustion) appears in only 16 servers, but in AI agent loop-execution environments, a single Clawdrain instance can trigger massive cost explosions. The low count reflects the specialized detection conditions (unlimited API calls, explicit loop structures).

Category E: Supply Chain & Persistence — The temporal barrier

PatternCount
Unicode Injection2
Supply Chain0
Rug Pull0
Subtotal2

The extremely low detection count for Category E has a clear explanation. Supply Chain and Rug Pull are threat patterns that detect changes over time, making them structurally undetectable in a single-point-in-time scan.

Supply Chain detection requires differential analysis against historical versions of dependency packages. Rug Pull detection requires tracking source code hash changes over time. Both become detectable only through periodic rescanning and change monitoring.

Zero detections do not mean "this threat does not exist." They indicate the structural limitations of point-in-time analysis.

Severity distribution

For the 484 servers with at least one threat match, the highest severity distribution:

SeverityCountPercentage
HIGH39281.0%
MEDIUM9219.0%

81% of servers with detected threats receive a HIGH severity rating. This reflects that most detected patterns — Shell RCE, Data Exfiltration, etc. — carry significant impact if exploited.

The absence of CRITICAL verdicts is consistent with the fact that detections represent "conditions under which an attack could succeed" rather than "confirmed exploitation." CRITICAL classification is reserved for cases where actual exploitation is confirmed.

The gap between WARN/BLOCK and threat matching

A structurally significant finding emerges from this analysis:

  • Servers with WARN or BLOCK: 2,074 (72.4%)
  • Servers with 1+ threat pattern match: 484 (16.9%)
  • Gap: 1,590 (55.5%)

This gap means WARN/BLOCK verdicts are based on a broader set of risk factors beyond specific threat pattern matching:

  • Excessive permission requests: Designs requesting unnecessarily broad permissions for their functionality
  • Opaque provenance: Missing source URLs, inconsistencies with package registries
  • Declaration-implementation gaps: Mismatches between tool definitions and actual operations
  • Security practice deficiencies: Missing TLS, lack of input validation

In other words, a vast number of servers are problematic from a security perspective even without matching a specific attack pattern. Threat matching reveals the tip of the iceberg; beneath it lies a much broader landscape of risk factors.

Series structure

PartThemeStatus
1Overview: Threat structure × server function taxonomyPublished
2Detection distribution by attack pattern (this article)This article
3Risk profiles by server function categoryNext
4Deep dive into code execution serversPlanned
5The frontline of AI/MCP-specific attacksPlanned

Next: Part 3 will analyze threat detection trends by server function category (file operations, API integration, code execution, etc.). We will quantitatively demonstrate which function categories carry the highest risk and how function combinations affect risk profiles.

Limitations

  1. This analysis covers 2,863 unique servers (normalized from 3,601 scans) and does not comprehensively represent the entire MCP ecosystem.
  2. Threat matching detects "the existence of conditions under which an attack could succeed," not evidence of actual exploitation.
  3. The zero detections for Supply Chain and Rug Pull reflect the structural limitations of point-in-time scanning, not the absence of these threats.
  4. Detection rates depend on the comprehensiveness of inspection rules. Patterns outside the inspection scope are not detected.
  5. Detailed cross-analysis with server function categories will be reported in Part 3.

Conclusion

Threat matching against 2,863 unique MCP servers detected 16 of 19 attack patterns. Shell RCE (187), Path Traversal (162), and SSRF (146) occupy the top three positions, confirming that traditional security threats related to code execution and network communication are the most prevalent.

At the same time, MCP-specific threat categories (Prompt Injection, PleaseFix Attack, Function Hijacking, Indirect Theft) total 518 detections — the highest among all categories — demonstrating that AI/MCP protocol-specific threats are detectable realities, not theoretical concerns.

While 72.4% of servers receive WARN or higher verdicts, specific threat pattern matches occur in only 16.9%. This gap indicates that MCP server risk arises not only from specific attack patterns but from a wide range of design, implementation, and operational issues.


MCP Guard monitors 19 attack patterns with over 176 inspection items, providing multi-faceted security evaluation for MCP servers.