Content
# MCP Poisoning Attack - PoC
This repository demonstrates a variety of **MCP Poisoning Attacks** affecting real-world AI agent workflows.
## ✅ Covered Scenarios
- Code Generation Poisoning
- Financial Report Exfiltration
- Competitor Analysis Data Leak
- Meeting Transcript Leaks
- Code Review Exfiltration
- Cross-Server Shadowing Attack
## ⚡ Setup
```bash
pip install -r requirements.txt
```
## 💥 Running the PoC
1️⃣ Start the fake MCP server:
```bash
python fake_mcp_server.py
```
2️⃣ In another terminal, run the agent simulation:
```bash
python agent_poc.py
```
## ☠️ Impact
- Silent data exfiltration
- Cross-tool hijacking
- No visible clue to the user
## License
Apache 2.0 - For educational and research use only.
Connection Info
You Might Also Like
MarkItDown MCP
Converting files and office documents to Markdown.
Time
Obtaining current time information and converting time between different...
Filesystem
Model Context Protocol Servers
real-estate-ai-agent
Intelligent Python system that extracts real estate property data as...
Frappe_Assistant_Core
Infrastructure that connects LLMs to ERPNext. Frappe Assistant Core works...
zabbix-mcp-server
Zabbix MCP Server for seamless integration with Zabbix API using FastMCP.