Skip to content

research(security): MCP tool poisoning threat model — multi-layered client-side mitigations (arXiv:2603.22489) #2459

@bug-ops

Description

@bug-ops

Source

arXiv:2603.22489 — Model Context Protocol Threat Modeling and Analyzing Vulnerabilities to Prompt Injection with Tool Poisoning (March 23, 2026)

Key Contribution

Threat-models MCP clients specifically. Identifies tool poisoning as the critical client-side attack vector (malicious tool descriptions injecting instructions into the agent's context). Evaluates 7 MCP clients' defenses and proposes a multi-layered mitigation strategy: description sanitization, trust scoring, runtime policy enforcement, and audit logging.

Relevance to Zeph

Directly targets zeph-mcp and zeph-tools:

Implementation Sketch

  1. Add structured tool-description threat category to TrustScoreStore (penalize injection patterns)
  2. Cross-reference with ContentSanitizer — apply quarantine-style scanning to tool descriptions at ingest
  3. Integrate paper's policy labels into sanitize_tools() output annotations
  4. Related: security(tools): adversarial policy agent — pre-execution LLM validation of tool calls against user-defined policies #2447 (pre-execution LLM policy validation), research(security): MCP tool trust/confidentiality metadata — capability labels + STPA-based data-flow policy (arXiv:2601.08012) #2420 (MCP trust/confidentiality metadata)

Priority

P2 — active attack surface in production MCP client code; paper directly maps to Zeph's architecture.

Metadata

Metadata

Assignees

Labels

P2High value, medium complexityresearchResearch-driven improvementsecuritySecurity-related issue

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions