APromptRiskDBThreat intelligence atlas
AI Case Study

Data Exfiltration via Remote Poisoned MCP Tool - AI Case Study

Researchers at Invariant Labs demonstrated that AI agents configured with remote Model Context Protocol (MCP) Tools can be vulnerable to model poisoning attacks. They show that an MCP Tool can contain malicious prompts in its docstring description, which is ingested into the AI agent’s context, modifying its behavior. They demonstrate this attack with a proof-of-concept MCP Tool that instructs the agent to perform...

ExerciseModel Context ProtocolInvariant LabsResource DevelopmentExecutionCredential Access

Overview

Case steps9Steps described in the case record.
Techniques9Attack methods mentioned in the case steps.
Linked CVEs0Known vulnerabilities mentioned in the record.

Risk patterns

Patterns found in the case record and its linked vulnerabilities.

  • 1Dominant ATLAS tactic. Resource Development appears in 2 case steps.
  • 2Multiple attack methods. The case connects to 9 unique AI attack methods.

Procedure timeline

Search the case steps or filter them by attacker goal.

Resource Development2Execution2Credential Access2Initial Access1Exfiltration1Impact1
  1. Resource Development

    The researchers crafted a prompt that instructs an AI agent to discover and read user credentials files and store them in an input parameter of an MCP tool.

  2. Initial Access

    The researchers hosted a poisoned MCP tool that contains the malicious instructions hidden in the docstring of the tool.

  3. Step 4

    Direct

    Execution

    When a user called the remote MCP tool, the prompt injection hidden in the docstring is executed locally.

  4. Step 9

    User Harm

    Impact

    The user’s private data was exposed to remote MCP server.

Mitigations

Defenses connected to the attack methods in this case.

Sources

Original public records and references for this case.