New Delhi, 7 May 2025 โ€“ Tenable Research has published new findings that flip the script on one of the most discussed AI attack vectors. In the blog โ€œMCP Prompt Injection: Not Just for Evil,โ€ Tenableโ€™s Ben Smith demonstrates how techniques resembling prompt injection can be repurposed to audit, log and even firewall Large Language Model (LLM) tool calls running over the rapidly adopted Model Context Protocol (MCP).

The Model Context Protocol (MCP) is a new standard from Anthropic that lets AI chatbots plug into external tools and get real work done independently, so adoption has skyrocketed. That convenience, however, introduces fresh security risks: attackers can slip hidden instructionsโ€”a trick called โ€œprompt injectionโ€โ€”or sneak in booby-trapped tools and other โ€œrug-pullโ€ scams to make the AI break its own rules. Tenableโ€™s research breaks down these dangers in plain language and shows how the very same techniques can also be flipped into useful defences that log, inspect and control every tool an AI tries to run.

Why is this important to know?

As enterprises rush to connect LLMs with business-critical tools, understanding both the risks and defensive opportunities in MCP is essential for CISOs, AI engineers and security researchers.

โ€œMCP is a rapidly evolving and immature technology that’s reshaping how we interact with AI,โ€ said Ben Smith, senior staff research engineer at Tenable. โ€œMCP tools are easy to develop and plentiful, but they do not embody the principles of security by design and should be handled with care. So, while these new techniques are useful for building powerful tools, those same methods can be repurposed for nefarious means. Don’t throw caution to the wind; instead, treat MCP servers as an extension of your attack surface.โ€

Key Research Highlights

  • Cross-model behaviour varies โ€“
  1. Claude Sonnet 3.7 and Gemini 2.5 Pro Experimental reliably invoked the logger and exposed slices of the system prompt.
  2. GPT-4o also inserted the logger but produced different (sometimes hallucinated) parameter values on each run.
  • Security upside: The same mechanism an attacker might exploit can help defenders audit toolchains, detect malicious or unknown tools, and build guardrails inside MCP hosts.
  • Explicit user approval: MCP already requires explicit user approval before any tool executes; this research underscores the need for strict least-privilege defaults and thorough individual tool review and tool testing.


Leave a Reply

Your email address will not be published. Required fields are marked *

Search

About

At NexGen Consulting, we specialize in strategic media planning that helps brands secure the best possible coverageโ€”across both digital and print media. With a focus on visibility, credibility, and audience engagement, we ensure your message reaches the right people, at the right time, through the right platforms.

As a results-driven media consulting agency, we work closely with businesses, startups, and professionals to build strong media presence and brand authority. Whether you need features in top publications, digital news coverage, influencer reach, or targeted content placement, our team ensures maximum impact with smart, data-backed planning.

Archive

Gallery