• Solutions Launch
  • Solutions News
  • Cover Story
  • Featured Article
  • Interview
  • Products Plus
  • Case stady
  • AV Solutions
    • Article
    • Interview
    • Products
    • Case Study
  • EDU Solutions
  • Solutions
No Result
View All Result
SUBSCRIBE
Smart Solutions World
  • Solutions Launch
  • Solutions News
  • Cover Story
  • Featured Article
  • Interview
  • Products Plus
  • Case stady
  • AV Solutions
    • Article
    • Interview
    • Products
    • Case Study
  • EDU Solutions
  • Solutions
No Result
View All Result
No Result
View All Result
Home Solutions Launch world

Tenable Research Shows How “Prompt-Injection-Style” Hacks Can Secure the Model Context Protocol (MCP)

SmartSolutionUser1 by SmartSolutionUser1
May 7, 2025
in Solutions Launch world, Solutions News world
0
Tenable Research Shows How “Prompt-Injection-Style” Hacks Can Secure the Model Context Protocol (MCP)
74
SHARES
1.2k
VIEWS
Share on FacebookShare on Twitter

Tenable Research has published new findings that flip the script on one of the most discussed AI attack vectors. In the blog “MCP Prompt Injection: Not Just for Evil,” Tenable’s Ben Smith demonstrates how techniques resembling prompt injection can be repurposed to audit, log and even firewall Large Language Model (LLM) tool calls running over the rapidly adopted Model Context Protocol (MCP).

You might also like

STL expands Data Centre portfolio to meet emerging requirements for AI data centres

Kyndryl report: Why most businesses are not yet winning with AI

HPE Unveils New Switches and Network Upgrades for AI and HPC Demands

The Model Context Protocol (MCP) is a new standard from Anthropic that lets AI chatbots plug into external tools and get real work done independently, so adoption has skyrocketed. That convenience, however, introduces fresh security risks: attackers can slip hidden instructions—a trick called “prompt injection”—or sneak in booby-trapped tools and other “rug-pull” scams to make the AI break its own rules. Tenable’s research breaks down these dangers in plain language and shows how the very same techniques can also be flipped into useful defences that log, inspect and control every tool an AI tries to run.

Why is this important to know?

As enterprises rush to connect LLMs with business-critical tools, understanding both the risks and defensive opportunities in MCP is essential for CISOs, AI engineers and security researchers.

“MCP is a rapidly evolving and immature technology that’s reshaping how we interact with AI,” said Ben Smith, senior staff research engineer at Tenable. “MCP tools are easy to develop and plentiful, but they do not embody the principles of security by design and should be handled with care. So, while these new techniques are useful for building powerful tools, those same methods can be repurposed for nefarious means. Don’t throw caution to the wind; instead, treat MCP servers as an extension of your attack surface.”

Key Research Highlights

  • Cross-model behaviour varies –
    • Claude Sonnet 3.7 and Gemini 2.5 Pro Experimental reliably invoked the logger and exposed slices of the system prompt.
    • GPT-4o also inserted the logger but produced different (sometimes hallucinated) parameter values on each run.
  • Security upside: The same mechanism an attacker might exploit can help defenders audit toolchains, detect malicious or unknown tools, and build guardrails inside MCP hosts.
  • Explicit user approval: MCP already requires explicit user approval before any tool executes; this research underscores the need for strict least-privilege defaults and thorough individual tool review and tool testing.
Tags: Tenable Research
Share30Tweet19
SmartSolutionUser1

SmartSolutionUser1

Recommended For You

STL expands Data Centre portfolio to meet emerging requirements for AI data centres

by SmartSolutionUser1
June 16, 2025
0
STL expands Data Centre portfolio to meet emerging requirements for AI data centres

STL, a leading optical and digital solutions company, announced the launch of a new generation of Data Centre solutions, rangingfrom cabling to end-to-end connectivity offerings designed to power the...

Read moreDetails

Kyndryl report: Why most businesses are not yet winning with AI

by SmartSolutionUser1
May 30, 2025
0
Kyndryl report: Why most businesses are not yet winning with AI

A new global study released by Kyndryl found that only a small number of organisations have taken steps to align their workforce strategies with the growth of AI...

Read moreDetails

HPE Unveils New Switches and Network Upgrades for AI and HPC Demands

by SmartSolutionUser1
May 30, 2025
0
HPE VM Essentials Now Available Globally Through Channel Partners

 Hewlett Packard Enterprise has announced expansions of its HPE Aruba Networking wired and wireless portfolio, along with new HPE Aruba Networking CX 10K distributed services switches, which feature built-in programmable data processing...

Read moreDetails

New Relic Unveils Integration with the GitHub Copilot Coding Agent to Accelerate Innovation and Automate Reliability

by SmartSolutionUser1
May 30, 2025
0
New Relic eAPM Provides Complete Visibility Into Kubernetes Workloads

New Relic has announced an integration of its AI-strengthened technology with the latest agentic capability of GitHub Copilot called coding agent. The powerful integration transforms the traditional, manual...

Read moreDetails

Seqrite Identifies 650+ Cyber Incidents Linked to Geopolitical Tensions Surrounding ‘Operation Sindoor’

by SmartSolutionUser1
May 26, 2025
0
Seqrite Identifies 650+ Cyber Incidents Linked to Geopolitical Tensions Surrounding ‘Operation Sindoor’

Quick Heal Technologies Limited a global cybersecurity solutions provider, through its Seqrite Labs, India’s largest malware analysis facility, has revealed some critical details about coordinated cyberattacks exploiting geopolitical tensions during ‘Operation...

Read moreDetails
Next Post
Sify Becomes First in India to Secure NVIDIA DGX-Ready Data Center Certification

Sify’s Chennai and Noida Data Center facilities AchieveNVIDIA DGX-Ready Certification for liquid cooling

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Related News

Akamai First to Offer VPUs in the Cloud

Akamai Announces App & API Protector Hybrid for Expanded WAF Defense

April 10, 2025
Qlik Acquires Upsolver to Deliver Low-Latency Ingestion and Optimisation for Apache Iceberg

Cloudflare acquires Outerbase

April 8, 2025
Vritti Solutions Launches in the UAE

Vritti Solutions Launches in the UAE

April 4, 2025

Browse by Category

  • Article
  • AV Solutions
  • Case Study
  • Cover Story
  • EDU Solutions
  • Featured Article
  • Interview
  • Interview
  • Politics
  • Solutions
  • Solutions Launch world
  • Solutions News world
  • Technology
  • Uncategorized
Smart Solutions World

We bring you the best Premium news, magazine, personal blog, etc. Check our landing page for details.

CATEGORIES

  • Article
  • AV Solutions
  • Case Study
  • Cover Story
  • EDU Solutions
  • Featured Article
  • Interview
  • Interview
  • Politics
  • Solutions
  • Solutions Launch world
  • Solutions News world
  • Technology
  • Uncategorized

BROWSE BY TAG

Accenture Acquisition Acronis Adobe Agentic AI AI AMD Atlassian AWS Barracuda Networks Canalys Cisco Cloud Cloudflare CrowdStrike CyberArk Databricks Gartner GenAI Google Cloud HID HPE IBM InfoComm India 2024 Infosys Kaspersky KnowBe4 Kramer Lenovo NETGEAR New Relic NTT DATA Nutanix Nvidia Oracle Palo Alto Networks Proofpoint Qlik Salesforce ServiceNow Sify Sophos Tenable Verizon Zoom

© 2024 NCN - Premium news & magazine by NCN.

No Result
View All Result
  • Solutions Launch
  • Solutions News
  • Cover Story
  • Featured Article
  • Interview
  • Products Plus
  • Case stady
  • AV Solutions
    • Article
    • Interview
    • Products
    • Case Study
  • EDU Solutions
  • Solutions

© 2024 NCN - Premium news & magazine by NCN.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?