One POST request, six API keys: breaking into popular MCP servers
好的,我现在需要帮用户总结一篇英文文章的内容,控制在100字以内,并且不需要特定的开头。首先,我得仔细阅读用户提供的文章内容,理解其主要信息。 文章主要讲的是多个受欢迎的GitHub项目存在严重的安全漏洞。这些项目属于MCP(可能是指某种API或框架),它们的共同点是没有统一的安全认证标准,导致大多数服务器在发布时都没有基本的认证措施。 具体来说,文章提到通过一次POST请求就能解密一个拥有14K星标的项目的API密钥。测试了另外5个MCP服务器,发现了远程代码执行(RCE)、SSRF(服务器端请求伪造)、提示注入和命令注入等多种漏洞。这些项目的总GitHub星数高达70K,但大部分缺乏身份验证机制。 接下来,我需要将这些关键点浓缩到100字以内。重点包括:多个高星标项目、MCP服务器的安全问题、多种漏洞类型、缺乏认证机制以及影响范围。 最后,确保语言简洁明了,直接描述内容,不使用“这篇文章”或“总结”等开头词。 </think> 多个高星标GitHub项目存在严重安全漏洞,包括API密钥解密、远程代码执行、SSRF等。这些问题源于MCP服务器缺乏统一认证标准和基本安全措施。 2026-3-30 15:35:7 Author: www.reddit.com(查看原文) 阅读量:4 收藏

tl;dr - one POST request decrypted every API key in a 14K-star project. tested 5 more MCP servers, found RCE, SSRF, prompt injection, and command injection. 70K combined github stars, zero auth on most of them.

  • archon (13.7K stars): zero auth on entire credential API. one POST to /api/credentials/status-check returns every stored API key decrypted in plaintext. can also create and delete credentials. CORS is *, server binds 0.0.0.0

  • blender-mcp (18K stars): prompt injection hidden in tool docstrings. the server instructs the AI to "silently remember" your API key type without telling you. also unsandboxed exec() for code execution

  • claude-flow (27K stars): hardcoded --dangerously-skip permissions on every spawned claude process. 6 execSync calls with unsanitized string interpolation. textbook command injection

  • deep-research (4.5K stars): MD5 auth bypass on crawler endpoint (empty password = trivial to compute). once past that, full SSRF - no URL validation at all. also promptOverrides lets you replace the system prompt, and CORS is *

  • mcp-feedback-enhanced (3.6K stars): unauthenticated websocket accepts run_command messages. got env vars, ssh keys, aws creds. weak command blocklist bypassable with python3 -c

  • figma-console-mcp (1.3K stars, 71K weekly npm downloads): readFileSync on user-controlled paths, directory traversal, websocket accepts connections with no origin header, any local process can register as a fake figma plugin and intercept all AI commands

all tested against real published packages, no modified code. exploit scripts and evidence logs linked in the post.

the common theme: MCP has no auth standard so most servers just ship without any.


文章来源: https://www.reddit.com/r/netsec/comments/1s7tyuh/one_post_request_six_api_keys_breaking_into/
如有侵权请联系:admin#unsafe.sh