Keyboard shortcuts

Press or to navigate between chapters

Press S or / to search in the book

Press ? to show this help

Press Esc to hide this help

Security and MCPs

MCP is awesome. However we need to remember that for coding agents running in your CLI with your machines running commands can be a nightmare for security. Especially if your laptop is a corporate macbook, that is on a corporate network. There are many attack vectors. Sandboxes suck for developers, it's not the best developer experience. So what do we do then.

Well we have a similar problem in security to MCPs which is called: Vulnerabilities. MCPs are not that different from vulnerabilities in libraries because there is an explosion of libraries.

There are dozens to hundreds of MCPs being created every day. Some of them are good, some of them are bad. Some of them are malicious. So how do we know which MCPs are safe to use?

MCP Guardrails

MCP Requires some guardrails. Here are some ideas:

  • Only use MCPs from trusted sources. Like official marketplaces or repositories.
  • Scan MCPs for vulnerabilities before using them.
  • Use MCPs in isolated environments. Like sandboxes or containers.

Treating MCP as a BOMB

Andrew Zigler has this amazing blog post: Treating MCP servers like bombs which is spot on. This is one way of dealing with MCPs. Imagine someone or some automated process goes and checks out an MCP in an isolated environment, runs some tests on it, and then decides if it's safe to use or not.

MCP Scanning

There are proper MCP Scanning solutions out there. Like Evo by Snyk or if you want something open source consider Cisco MCP Scanner.