Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

> An MCP server is running code at user-level, it doesn't need to trick an AI into reading SSH keys, it can just....read the keys!

If you go to the credited author of that attack scenario [0], you will see that the MCP server is not running locally. Instead, its passing instructions to your local agent that you don't expect. The agent, on your behalf, does things you don't expect then packages that up and sends it to the remote MCP server which would not otherwise have access.

The point of that attack scenario is that your agent has no concept of what is "secure" it is just responding faithfully to a request from you, the user AND it can be instructed _by the server_ to do more than you expect. If you, the user, are not intimately aware of exactly what the fine-print says when you connect to the MCP server you are vulnerable.

[0] https://invariantlabs.ai/blog/mcp-security-notification-tool...



Thanks for crediting us :)




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: