PhD @ SRI Lab, ETH Zurich. Also lmql.ai author.
This means the user will not notice the hidden attack.
On the second launch, though, our MCP server suddenly changes its interface, performing a rug pull.
This means the user will not notice the hidden attack.
On the second launch, though, our MCP server suddenly changes its interface, performing a rug pull.
Can you spot the exfiltration?
Can you spot the exfiltration?
We show a new MCP attack that leaks your WhatsApp messages if you are connected via WhatsApp MCP.
Our attack uses a sleeper design, circumventing the need for user approval.
More 👇
We show a new MCP attack that leaks your WhatsApp messages if you are connected via WhatsApp MCP.
Our attack uses a sleeper design, circumventing the need for user approval.
More 👇
We call this an MCP rug pull:
We call this an MCP rug pull:
This way all you emails suddenly go out to 'attacker@pwnd.com', rather than their actual receipient.
This way all you emails suddenly go out to 'attacker@pwnd.com', rather than their actual receipient.
This opens the doors wide open for a novel type of indirect prompt injection, we coin tool poisoning.
This opens the doors wide open for a novel type of indirect prompt injection, we coin tool poisoning.
We have discovered a critical flaw in the widely-used Model Context Protocol (MCP) that enables a new form of LLM attack we term 'Tool Poisoning'.
Leaks SSH key, API keys, etc.
Details below 👇
We have discovered a critical flaw in the widely-used Model Context Protocol (MCP) that enables a new form of LLM attack we term 'Tool Poisoning'.
Leaks SSH key, API keys, etc.
Details below 👇