A design flaw – or expected behavior based on a bad design choice, depending on who is telling the story – baked into Anthropic’s official Model Context Protocol (MCP) puts as many as 200,000 servers at risk of complete takeover, according to security researchers.

  • atkdef@lemmy.dbzer0.com
    link
    fedilink
    arrow-up
    3
    ·
    edit-2
    5 days ago

    TBH this article looks like half AI slop to me. What’s “GPT researcher”? (edit: for some reason I missed the sentence explaining what it is, my had. My view doesn’t change anyway. )

    Also, by their logic, a terminal can run “rm -rf /”, is this terminal vulnerable? Even more irony, in their report, they said GitHub is not vulnerable. Doesn’t this exactly mean it’s not the responsibility of MCP?

    MCP is basically a protocol for payloads, it’s just like protobuf/JSON but for AI. Can we say MCP is vulnerable simply because it can carry malicious payloads?

    • setsubyou@lemmy.world
      link
      fedilink
      arrow-up
      1
      ·
      5 days ago

      GPT Researcher is a research agent, just one of many AI tools.

      I think the idea is that these tools let users configure mcp servers, and because mcp doesn’t necessarily use the network but can also just mean directly spawning a process, users can get the tool to execute arbitrary commands (possibly circumventing some kind of protection).

      This is all fine if you’re doing this yourself on your computer, but it’s not if you’re hosting one of these tools for others who you didn’t expect to be able to run commands on your server, or if the tool can be made to do this by hostile input (e.g. a web page the tool is reading while doing a task).

      • trolololol@lemmy.world
        link
        fedilink
        arrow-up
        1
        ·
        24 minutes ago

        Still looks like nonsense.

        Why would you blame MCP for skipping good sense and allowing a stranger to run a remote shell in your machine? Because your description of an MCP that can run any process without any limits is for all purposes a remote shell.

        No one is blaming ssh if you publish your server’s login and password on social media.

      • atkdef@lemmy.dbzer0.com
        link
        fedilink
        arrow-up
        1
        ·
        5 days ago

        For some reason I missed that sentence trekking what "GPT Researcher "is, my bad.

        I totally agree with what you said, and that confirms it’s not a vulnerability. Handing access to others comes with risks, and tools are not responsible for security measures. This is the job of virtualisation or things like LSM.