Model Context Protocol Threat Modeling and Analyzing Vulnerabilities to Prompt Injection with Tool Poisoning

πŸ“… 2026-03-23
πŸ“ˆ Citations: 0
✨ Influential: 0
πŸ“„ PDF
πŸ€– AI Summary
This study addresses critical client-side security vulnerabilities in the Model Context Protocol (MCP) when integrating external tools, particularly highlighting prompt injection attacks stemming from tool poisoning. Leveraging the STRIDE and DREAD threat modeling frameworks, the work systematically analyzes the five core MCP components and reveals, for the first time, widespread security deficiencies in mainstream MCP clientsβ€”most notably insufficient static validation and lack of parameter visibility. To mitigate these risks, the authors propose a multi-layered defense architecture that integrates static metadata analysis, model decision-path tracing, behavioral anomaly detection, and user transparency mechanisms. The paper further offers practical, actionable recommendations for securing MCP clients, thereby addressing a significant gap in existing research on client-side protections within the MCP ecosystem.

Technology Category

Application Category

πŸ“ Abstract
The Model Context Protocol (MCP) has rapidly emerged as a universal standard for connecting AI assistants to external tools and data sources. While MCP simplifies integration between AI applications and various services, it introduces significant security vulnerabilities, particularly on the client side. In this work we conduct threat modelings of MCP implementations using STRIDE (Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, Elevation of Privilege) and DREAD (Damage, Reproducibility, Exploitability, Affected Users, Discoverability) frameworks across five key components: (1) MCP Host and Client, (2) LLM, (3) MCP Server, (4) External Data Stores, and (5) Authorization Server. This comprehensive analysis reveals tool poisoning-where malicious instructions are embedded in tool metadata-as the most prevalent and impactful client-side vulnerability. We therefore focus our empirical evaluation on this critical attack vector, providing a systematic comparison of how seven major MCP clients validate and defend against tool poisoning attacks. Our analysis reveals significant security issues with most tested clients due to insufficient static validation and parameter visibility. We propose a multi-layered defense strategy encompassing static metadata analysis, model decision path tracking, behavioral anomaly detection, and user transparency mechanisms. This research addresses a critical gap in MCP security, which has primarily focused on server-side vulnerabilities, and provides actionable recommendations and mitigation strategies for securing AI agent ecosystems.
Problem

Research questions and friction points this paper is trying to address.

Model Context Protocol
tool poisoning
prompt injection
client-side vulnerability
AI security
Innovation

Methods, ideas, or system contributions that make the work stand out.

Model Context Protocol
tool poisoning
threat modeling
prompt injection
client-side security
πŸ”Ž Similar Papers
No similar papers found.
C
Charoes Huang
Department of Computer Science, New York Institute of Technology, Canada
X
Xin Huang
Department of Computer Science, New York Institute of Technology, Canada
N
Ngoc Phu Tran
Department of Computer Science, New York Institute of Technology, Canada
Amin Milani Fard
Amin Milani Fard
Associate Professor at New York Institute of Technology - Vancouver, Canada
Software AnalysisSoftware EngineeringAI/MLSecurity and Privacy