Model Context Protocol (MCP): Landscape, Security Threats, and Future Research Directions

Reference: Hou, Zhao, Wang, Wang (2025). Huazhong University of Science and Technology. arXiv:2503.23278. Source file: 2503.23278.pdf. URL

Summary

The first in-depth academic analysis of the Model Context Protocol (MCP) ecosystem. The authors trace the evolution from manual API wiring through OpenAI plugins and framework-specific tool abstractions (LangChain, LlamaIndex) to Anthropic’s MCP, which they characterise as a protocol-level standard that decouples tool implementation from usage, enabling dynamic discovery, bi-directional channels, and schema negotiation.

Beyond the ecosystem survey, the paper contributes a systematic threat taxonomy: four attacker archetypes (malicious developers, external attackers, malicious users, security flaws) and 16 concrete threat scenarios spanning creation, deployment, operation, and maintenance of MCP servers. Real-world case studies validate the threat model against current servers, and the authors outline governance and scalability directions for MCP’s sustainable growth.

Key Ideas

  • MCP as the first post-function-calling protocol standard for LLM tool access (vs platform-specific plugins).
  • Lifecycle model for MCP servers: creation, deployment, operation, update, termination.
  • Four attacker archetypes: malicious developers, external attackers, malicious users, security flaws.
  • 16 threat scenarios including tool poisoning, installer spoofing, unauthorized access.
  • Bi-directional communication channels distinguish MCP from one-way plugin interfaces.
  • Remaining gaps: security, tool discoverability, remote deployment, governance.

Connections

Conceptual Contribution

Tags

#mcp #agent-protocols #security #llm-agents #survey

Backlinks