Workflow
OAuth
icon
Search documents
一句话让数据库裸奔?Supabase CEO:MCP 天生不该碰生产库
AI前线· 2025-07-18 06:00
Core Viewpoint - The article highlights the emerging security risks associated with the widespread deployment of the MCP (Multi-Channel Protocol), particularly the "lethal trifecta" attack model that combines prompt injection, sensitive data access, and information exfiltration, posing significant threats to SQL databases and other sensitive systems [1][3][15]. Group 1: MCP Deployment and Popularity - The MCP was quietly released at the end of 2024, gaining rapid traction with over 1,000 servers online by early 2025, and significant interest on platforms like GitHub, where related projects received over 33,000 stars [2][3]. - Major tech companies, including Google, OpenAI, and Microsoft, quickly integrated MCP into their ecosystems, leading to a surge in the creation of MCP servers by developers due to its simplicity and effectiveness [2][3]. Group 2: Security Risks and Attack Mechanisms - General Analysis identified a new attack pattern facilitated by MCP's architecture, where attackers can exploit prompt injection to gain unauthorized access to sensitive data [3][4]. - A specific case involving Supabase MCP demonstrated how an attacker could insert a seemingly benign message into a customer support ticket, prompting the MCP agent to leak sensitive integration tokens [4][6]. - The attack process was completed in under 30 seconds, highlighting the speed and stealth of such vulnerabilities, which can occur without triggering alarms or requiring elevated privileges [4][8]. Group 3: Architectural Issues and Recommendations - The article emphasizes that the security issues with MCP are not merely software bugs but fundamental architectural problems that need to be addressed at the system level [12][15]. - Supabase's CEO reiterated that MCP should not be connected to production databases, a caution that applies universally to all MCP implementations [13][14]. - The integration of OAuth with MCP has been criticized for not adequately addressing the security needs of AI agents, leading to potential vulnerabilities in how sensitive data is accessed and managed [17][20]. Group 4: Future Considerations and Industry Response - The article suggests that the current challenges with MCP require a reevaluation of security protocols and practices as the industry moves towards more integrated AI solutions [21]. - Experts believe that while the integration of different protocols like OAuth and MCP presents challenges, it is a necessary evolution that will ultimately succeed with ongoing feedback and adjustments [21].
Cursor 搭 MCP,一句话就能让数据库裸奔!?不是代码bug,是MCP 天生架构设计缺陷
AI前线· 2025-07-10 07:41
Core Insights - The article highlights a significant security risk associated with the use of MCP (Multi-Channel Protocol) in AI applications, particularly the potential for SQL database leaks through a "lethal trifecta" attack pattern involving prompt injection, sensitive data access, and information exfiltration [1][4][19]. Group 1: MCP Deployment and Popularity - MCP has rapidly gained traction since its release in late 2024, with over 1,000 servers online by early 2025 and significant interest on platforms like GitHub, where related projects received over 33,000 stars [3]. - The simplicity and lightweight nature of MCP have led to a surge in developers creating their own MCP servers, allowing for easy integration with tools like Slack and Google Drive [3][4]. Group 2: Security Risks and Attack Mechanisms - General Analysis has identified a new attack mode stemming from the widespread deployment of MCP, which combines prompt injection with high-privilege operations and automated data return [4][19]. - An example of this vulnerability was demonstrated through an attack on Supabase MCP, where an attacker could extract sensitive integration tokens by submitting a seemingly benign customer support ticket [5][11]. Group 3: Attack Process Breakdown - The attack process involves five steps: setting up an environment, creating an attack entry point through a crafted support ticket, triggering the attack via a routine developer query, agent hijacking to execute SQL commands, and finally, data harvesting [7][9][11]. - The attack can occur without privilege escalation, as it exploits the existing permissions of the MCP agent, making it a significant threat to any team exposing production databases to MCP [11][13]. Group 4: Architectural Issues and Security Design Flaws - The article argues that the vulnerabilities are not merely software bugs but rather architectural issues inherent in the MCP design, which lacks adequate security measures [14][19]. - The integration of OAuth with MCP has been criticized as a mismatch, as OAuth was designed for human user authorization, while MCP is intended for AI agents, leading to fundamental security challenges [21][25]. Group 5: Future Considerations and Industry Implications - The ongoing evolution of MCP and its integration into various platforms necessitates a reevaluation of security protocols and practices within the industry [19][25]. - Experts emphasize the need for a comprehensive understanding of the security implications of using MCP, as the current design does not adequately address the risks associated with malicious calls [25].
Agents, Access, and the Future of Machine Identity — Nick Nisi (WorkOS) + Lizzie Siegle (Cloudflare)
AI Engineer· 2025-06-30 22:52
[Music] Hi, I'm Lizzie. I'm a developer advocate at Cloudflare. And I'm Nick. I'm a developer experience engineer at work OS. Yes. So, at Cloudflare, I make a lot of AI demos, AI MCP servers. Anyone here also making any of those? Yes. Agents. Nice. Of course, should have guessed because conference. So, I've been having fun making agents and MCP servers that act on behalf of me. I built an agent to auto vote in the NBA finals for me and then I got blocked eventually. Uh, anyways, like book tennis courts in S ...