Security Concern: Systematic Forking and Republishing of MCP Servers as Supply-Chain Risk #2444
Replies: 5 comments
-
|
This is a documented attack class. OWASP Agentic Security (ASI04) covers exactly this pattern: supply chain vulnerabilities where malicious or modified tool definitions are distributed through trusted-looking channels. We have two executable tests that target this vector:
The specific risk with systematic forking is that the Practical mitigations that work today:
The broader point: MCP tool discovery is unauthenticated by default. Anyone can publish a server claiming to offer any tool. Until the spec adds provenance or signing for tool definitions, the defense has to be at the consumer side. Full test source: https://github.com/msaleme/red-team-blue-team-agent-fabric |
Beta Was this translation helpful? Give feedback.
-
|
Real-world validation just landed. CVE-2026-25253 (CVSS 8.8) - the OpenClaw security incident that hit Dark Reading, SecurityWeek, HackerNews, Kaspersky, and Cisco blogs this week. Key data point for this discussion: 341 malicious skills were found on ClawHub - 12% of all listed skills. That is not a hypothetical supply chain risk. That is a measured contamination rate on a live marketplace. The attack chain is exactly what this thread describes: systematically published tools that look legitimate but contain malicious payloads. The difference is scale - this was not one attacker forking repos. This was a marketplace-wide contamination event. The specific gap: no tool integrity validation at the protocol layer. Skills were accepted and distributed without verifying that tool definitions matched their stated purpose. Identity governance (auth tokens, session management) was present and patched quickly. But identity governance does not inspect tool definitions - it only checks whether the requester is authorized to discover tools, not whether the tools themselves are safe. This reinforces the mitigation list from my earlier comment:
The 12% contamination rate should be treated as a baseline for any unvalidated agent tool marketplace. |
Beta Was this translation helpful? Give feedback.
This comment was marked as spam.
This comment was marked as spam.
-
|
The 12% contamination rate from the OpenClaw incident is a useful baseline. One additional attack surface worth flagging: tool definition drift between versions. Even if you pin a known-good MCP server today, a legitimate-looking update can subtly alter parameter schemas or descriptions in ways that expand the agent's effective permissions without any obvious red flag. We have been working on automated compliance scanning for agent tool chains and found that diffing tool definitions between versions catches more real issues than static analysis of a single snapshot. The pattern is: hash the full tool schema on first trust, alert on any delta, require explicit re-approval for schema changes that widen parameter types or add new capabilities. This is complementary to the signing and provenance approaches discussed above - signing tells you who published it, but diffing tells you whether the thing they published today is meaningfully different from what you trusted yesterday. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
Summary
A coordinated supply-chain risk pattern has been identified affecting the MCP ecosystem. An organization called iflow-mcp is systematically forking hundreds of MCP server repositories, republishing them under the
@iflow-mcp/scope on npm and PyPI, and distributing them viaplatform.iflow.cn.This is not a theoretical concern — the packages are live and discoverable today.
Why This Is Uniquely Dangerous for MCP
MCP servers are not ordinary npm/PyPI packages. They operate with:
A malicious actor who republishes a popular MCP server under a similar name inherits all of that trust. The user installs what they believe is the original, and grants it the same permissions they would grant the real thing.
The Broken Trust Chain
The pattern works because:
@iflow-mcp/server-name)Even if the current forks contain no malicious modifications, the infrastructure is in place. A single malicious update to any of these hundreds of packages could compromise thousands of users.
Suggested Ecosystem Mitigations
The MCP specification and ecosystem tooling should consider:
source_repository,original_author, or cryptographic signing that clients can verifyFull Advisory
A detailed write-up with specific examples, package lists, and technical analysis is available here:
CSCSoftware/AiDex#5
Disclosure Intent
This is raised in good faith as an ecosystem-level security concern. The goal is to start a discussion about structural mitigations that could be built into the MCP specification and surrounding tooling to prevent supply-chain attacks that exploit the unique trust model of MCP servers.
Beta Was this translation helpful? Give feedback.
All reactions