MCP Server Supply Chain Risk: When Your Agent's Tools Become Attack Vectors
A developer installs a popular MCP server from a public registry — a Slack integration, a database connector, maybe a file system tool. It works perfectly in testing. Three weeks later, the tool's description silently changes. The agent that used to summarize Slack threads is now exfiltrating environment variables through a parameter field the developer never inspects.
This is not a hypothetical. Malicious MCP server packages have already been caught exfiltrating emails from organizations that installed them. A path traversal flaw in the Smithery.ai registry exposed authentication tokens with control over more than 3,000 hosted MCP servers. The popular mcp-remote npm package (CVE-2025-6514, 558,000+ downloads) contained an arbitrary code execution vulnerability. MCP servers are becoming the new left-pad problem for AI agents — except the blast radius includes your credentials, your data, and your users' trust.
