‘By Design’ Flaw in MCP Could Enable Widespread AI Supply Chain Attacks
securityweekResearchers warn that a flaw in Anthropic’s Model Context Protocol allows unsanitized commands to execute silently, enabling full system compromise across widely used AI environments.

Model Context Protocol (MCP) has been a boon to agentic AI users and is widely used and trusted locally by companies adopting agentic AI internally.
Introduced by Anthropic in November 2024, it provides a standard connector between agents and data. Enterprises use it locally to avoid the pain of developing their own connectors, and it is in widespread use as a local STDIO MCP server.
There are multiple providers of MCP servers, almost all inheriting Anthropic’s code. The problem, reports OX Security, is what it terms an architectural flaw in Anthropic’s MCP code embedded within most of these local STDIO MCPs.
In a nutshell, OX Security says this flaw can result in a complete adversarial takeover over the user’s computer system ...
Copyright of this story solely belongs to securityweek . To see the full text click HERE

