Skip to main content
9 – 17 UHR +49 8031 3508270 LUITPOLDSTR. 9, 83022 ROSENHEIM
DE / EN

MCP as Standard for Agent Tool Usage – Yes, But Please Securely

Tobias Jonas Tobias Jonas | | 3 min read

You use MCP to quickly and flexibly integrate tools and APIs into AI and LLM solutions. The potential is enormous, but when security aspects are neglected, dangerous attack vectors can come into play. In the following, I’ll show you what risks exist and how to minimize them from a Software Engineering perspective.

MCP Command Injection

Command Injection can occur when malicious actors embed dangerous commands in seemingly normal content. Imagine someone inserting a hidden command into an email that is unintentionally executed on your server infrastructure and reveals sensitive data. The solution lies in rigorous validation and whitelist-based filtering of inputs.

MCP Tool Poisoning

Tool Poisoning is another threat. A compromised tool can infiltrate your MCP system and gain access to sensitive resources such as API keys or databases. Think of a tool that – although externally harmless – has been internally sabotaged and causes your entire production line to stutter. Here it helps to verify tool providers in advance and run tools in isolated environments so that an error doesn’t affect all systems.

SSE Bypassing

Bypassing via open SSE connections is a classic example of long-lasting connections that allow attackers to perform manipulations during data transfer. Compare it to an open door that should actually close automatically. A timeout function and regular checking of connections ensure that the door is only open when it’s actually needed.

Privilege Escalation

Privilege Escalation should not be underestimated. If a tool gains higher privileges through an error or attack, it can override the permissions of other tools – similar to an employee who gains unauthorized access to confidential areas. A clear separation of permissions and fine-grained access management ensure that everyone only gets access to what they really need.

Persistent Context Misuse

Persistent Context Misuse is another point. If the context remains active too long, this can cause tools to automatically execute tasks – without you noticing. It’s comparable to a calendar that is never reset and suddenly executes past, no longer relevant appointments. Regular resetting or a stateless architecture helps to manage the context in a targeted manner.

Server Data Takeover/Spoofing

Server Data Takeover/Spoofing rounds out the picture. Here, attackers can attempt to extract or manipulate data through compromised tools – like a hacker posing as a trusted employee. Secure end-to-end encryption, regular security updates, and active monitoring are essential to detect and prevent such attacks early.

My Personal MCP Outlook

Software Engineering means systematically identifying these risks and proactively securing them. Code reviews, automated security tests, and holistic monitoring should always be a fixed part of the development process alongside functionality.

The further development of MCP will largely depend on how early security aspects are integrated into the development process. With the increasing emergence of AI and LLMs, I believe that MCP – when securely implemented – will become a fixed standard in Agent Tool usage. It’s up to us to set the right course from the beginning so that innovation and security go hand in hand.

Tobias Jonas
Written by

Tobias Jonas

Co-CEO, M.Sc.

Tobias Jonas, M.Sc. ist Mitgründer und Co-CEO der innFactory AI Consulting GmbH. Er ist ein führender Innovator im Bereich Künstliche Intelligenz und Cloud Computing. Als Co-Founder der innFactory GmbH hat er hunderte KI- und Cloud-Projekte erfolgreich geleitet und das Unternehmen als wichtigen Akteur im deutschen IT-Sektor etabliert. Dabei ist Tobias immer am Puls der Zeit: Er erkannte früh das Potenzial von KI Agenten und veranstaltete dazu eines der ersten Meetups in Deutschland. Zudem wies er bereits im ersten Monat nach Veröffentlichung auf das MCP Protokoll hin und informierte seine Follower am Gründungstag über die Agentic AI Foundation. Neben seinen Geschäftsführerrollen engagiert sich Tobias Jonas in verschiedenen Fach- und Wirtschaftsverbänden, darunter der KI Bundesverband und der Digitalausschuss der IHK München und Oberbayern, und leitet praxisorientierte KI- und Cloudprojekte an der Technischen Hochschule Rosenheim. Als Keynote Speaker teilt er seine Expertise zu KI und vermittelt komplexe technologische Konzepte verständlich.

LinkedIn