AuthZ Agent of Chaos: MCP

AuthZ Agent of Chaos: MCP

There’s a lot of excitement around agentic AI open protocols such as Model Context Protocol (MCP) and Agent2Agent (A2A), and for good reason. Agents capable of acting on a broader set of resources and capabilities deliver undeniable benefits to organizations seeking an easier way to connect AI to data sources. The global adoption of these protocols could truly represent an inflection point for human-computer interactions. This article however will focus on MCP with a follow-up on A2A in the coming weeks.

TL;DR - OAuth alone will not solve all security concerns. Without the proper security considerations, these protocols could erode nearly all security boundaries that rely on identity.  

There are existing efforts towards crafting an RFC for MCP server authorization, but the open nature of MCP’s design specification requires organizations to take proactive ownership of their security. Specifically, MCP could introduce vulnerabilities that compound traditional attack vectors with novel, AI-specific vectors. MCP utilizes agents that operate within a decentralized authorization landscape. As a result, these agents inherit the trust boundaries and security perimeters of the user without attribution, creating what I’ve characterized as an "AuthZ agent of chaos." 

While many great technical papers are emerging on the topic, I thought I would summarize some of my observations and overall security concerns.

Permission Management Challenges

The permission management architecture within MCP inherits the full scope of a user’s OAuth permission scope. Current implementations frequently employ a one-time authorization model wherein initial permission grants persist throughout interaction sessions. Claude Desktop, for instance, applies initial permission responses to all subsequent interactions with a particular tool, creating an exploitable security boundary that transforms temporary access grants into persistent access approvals. The lack of a secure default and forcing a choice between approval fatigue and persistent access will result in the the user opting for the latter as the only viable option. These design patterns point to fundamental identity and attribution weaknesses that will require substantial protocol evolution to adequately address. Authorization boundaries and transitive identity have dissolved entity security boundaries, creating fundamental challenges for auth systems that depend on stable identity constructs.

Inter-tool Attack Surface

Security research has recently demonstrated indirect prompt injection is possible through embedding malicious commands in seemingly innocuous documents it is possible to orchestrate complex multi-tool attack chains without triggering additional permission prompts. The attack pattern illustrates how the aggregate nature of tool access and permissions creates exponentially more complex attack surfaces that traditional security models fail to adequately capture or contain. We can observe scenarios where permission amplification cascades that emerge unpredictably from the interaction between ostensibly separate agent-mediated authorization domains. In enterprise AI systems, which allow shared workspaces, MCP permits data to traverse the LLM as the control plane, effectively bypassing the primary data access restrictions. 

Embracing MCP Responsibly

Ultimately, securing MCP for your organization and the broader agentic tool ecosystem requires augmenting traditional role-based access models focused primarily on assumed human identity paradigms. Instead, organizations must develop adaptive governance frameworks that can accommodate the inherent complexity of agent-mediated computational ecosystems. This necessitates a fundamental reconceptualization of security, away from deterministic control models, toward composite identity and probabilistic threat frameworks capable of evaluating the properties of autonomous system interactions. 

The future of MCP security lies not in constraining its capabilities. As an industry, we must prioritize developing governance models that can harness MCP’s transformative potential while mitigating the novel risks it introduces to our ecosystems. I remain bullish on the benefits of AI and long-term the lessons learned in the failure conditions in early use cases will prove valuable for strengthening the safety and security of our platforms.


What can you do:

  • Develop guidelines and policies for the use of MCP within your organization.
  • Ensure agent actions can be audited, logged, and accurately attributed. This will likely require a composite identity framework. 
  • Use key management systems to securely store MCP server secrets.
  • Audit and repossess unused access entitlements across your enterprise. 
  • Explore resources for how to improve and adopt MCP responsibly.


Graham Neray

Cofounder & CEO at Oso

6mo

Great post

Abhi Sharma

Founder, CEO, and Chief Leaf Blower at Relyance AI

7mo

Josh Lemos - Spot-on analysis. "AuthZ agent of chaos" perfectly captures the MCP challenge. You've nailed the risks around persistent access and amplified attack surfaces – highlighting the critical need for Conservation of Accountability and addressing Compounding Data Risk in agentic systems. Totally agree traditional RBAC isn't enough. While adaptive governance and composite identity are the goal, they seem fundamentally dependent on real-time, contextual understanding of the data itself. Without knowing the what, why, and where of data flows through these agents, these frameworks can't be effectively implemented. Our approach to starting to help tackle with continued policy and controls context at runtime is Data Journeys. https://www.relyance.ai/product/data-journeys

Like
Reply

Check out Gunnar Peterson's excellent write up on MCP and Identity for a detailed explanation of the Identity issues/limits of OAuth: https://defensiblesystems.substack.com/p/oauths-role-in-mcp-security

To view or add a comment, sign in

More articles by Josh Lemos

  • Given Enough AIs, All Bugs Are Shallow

    We're in the best era ever for finding security vulnerabilities quickly and at scale. Linus' Law, Eric Raymond's famous…

    9 Comments
  • Agents of Order - Agentic Defense

    The AI landscape continues to transform at a blistering pace. Over the past year, I often hypothesized the asymmetric…

    14 Comments
  • AuthZ Agents of Chaos

    The emergence of agentic AI represents a significant inflection point in computing that requires strategic…

    8 Comments
  • Authorization - The Forgotten Second A

    It seems that everyone in InfoSec is focused on solving three problems: identity, identity, and identity. Its the Who…

    3 Comments
  • Death of Traditional Penetration Testing

    Yes, another $something is dead article. What I mean is the traditional one-size-fits-all cookie-cutter engagement of…

    20 Comments
  • Honeypots - Bringing Stealthy Back

    Deception and passive monitoring have a long history What is new is old: Cuckoo's Egg 2.0 (if you don't know what I'm…

    3 Comments
  • Security Experts Versus the Layperson

    If you are like most technology professionals family and friends come to you for advice on anything tangentially…

    2 Comments
  • Security Program Spring Cleaning - Part 3 of 3

    Now we’ve dusted the bunnies under the furniture, steam cleaned the carpets, and nearly fell asleep reviewing…

    1 Comment
  • Security Program Spring Cleaning - Part 2 of 3

    Last week I kicked off a series of “Spring Cleaning” security tips to freshen up those dusty networks; we moved the…

  • Security Program Spring Cleaning - Part 1 of 3

    The weather is warming and as we reach mid-Spring in North America, it is time when one must ask - is my security…

    3 Comments

Others also viewed

Explore content categories