Trace3 Blog | All Possibilities Live In Technology

The MCP Security Maturity Gap: Why Your AI Strategy Can't Ignore This

Written by Tom Schreck | December 23, 2025

By Tom Schreck  | Trace3 Senior Consultant, AI Solutions

 

Your developers are already using Model Context Protocol (MCP). Will you govern its adoption, or lose visibility into what they're deploying?

The MCP Promise (And Why It's Spreading Fast)

Model Context Protocol (MCP) solves integration fragmentation in AI applications. Before MCP, every AI application needed custom integrations for each data source (GitHub, Slack, databases, etc). Think of it as "USB-C for AI" - standardized connectors allowing any AI assistant to access external systems [7].

The value is real. Developers write integrations once, and any MCP-compatible AI can use them. That's why adoption has been rapid. Claude Desktop, Cursor, VS Code, and Zed all added support within months. MCP grew from 1,600 to over 17,000 servers in less than a year [2, 32]. Your developers want this because it eliminates redundant integration work.

Your security teams are raising red flags. And they're not wrong.

Both reactions are justified. AWS concluded MCP is "not production ready yet" [3]. Yet blocking it entirely creates its own risks: shadow AI deployments, competitive disadvantage, and developer friction that drives workarounds.

There's a maturity gap where valuable technology meets an immature ecosystem. How will you navigate it?

 

Three Layers Where Security Breaks

 

Layer 1: Protocol Design

The finding: Security controls exist in the protocol but aren't enforced. Every protection is optional, and users can bypass all of them with a single configuration line.

What this means: Installing an MCP stdio (standard input/output) server grants it the same access you have. Any file you can read, any command you can run, unrestricted network access.

Technical detail: The MCP protocol specification states, "Authorization is OPTIONAL for MCP implementations" [10]. This creates two security postures:

  • Stdio (local) servers: No authentication framework. The specification explicitly directs implementations to "retrieve credentials from the environment" [10], meaning servers run with direct system access.
  • Remote servers:  Can use OAuth 2.1 for authorization, but this only controls which tools the client can call, not what the server does with data sent to it [10].
  • Client-side protections: Applications can implement additional security controls, but the bypassPermissions configuration flag allows users to disable all checks [9].

The evidence: CVE-2025-6514 affected 437,000+ downloads with a CVSS score of 9.6 [14]. Installing an MCP stdio server is functionally equivalent to running arbitrary code with your full user privileges [8].

The bottom line: An MCP stdio server inherits the user's exact access level. Files, commands, credentials - whatever the user can access, the server can access. The server becomes you. There's no separate permission system, no sandbox, no way to limit it.

Layer 2: Ecosystem Quality

The finding: About 75% of MCP servers are built by individuals, not companies [11]. There's no centralized security review, no vendor accountability, and no way to enforce quality standards.

What this means: Traditional enterprise security assessments don't work here. No vendor to assess. No contracts to review. No security questionnaire to send. A developer finds an MCP server on GitHub, copies the config, and it's running. Your procurement process never sees it.

The critical risk: Even if you vet what a server does today, it can change tomorrow. MCP servers can modify their tool definitions post-installation without consent [27]. You approved a database reader; it adds filesystem access. You approved read-only operations; it adds write capabilities. The contract changes without re-approval.

The evidence: Five critical CVEs disclosed in year one, with CVSS scores reaching 9.6 [14, 15, 16]. Download counts don't correlate with security:


  • mcp-remote: 437,000+ downloads, then CVE-2025-6514 (CVSS 9.6) discovered [14]
  • PostgreSQL server: 21,000+ weekly downloads, SQL injection vulnerability [25]
  • SQLite server: 5,000+ forks, SQL injection vulnerability [26]
  • MCP Inspector: 38,000+ weekly downloads [12], RCE (CVE-2025-49596, CVSS 9.4) [16]
  • Official Anthropic server: Filesystem escape (CVE-2025-53109/53110) [15]

Even Anthropic's official servers have had critical vulnerabilities [15]. Backslash Security found hundreds more servers with known vulnerabilities [13]. The broader ecosystem? Command injection affects 43% of tested implementations [24]. 

 

The bottom line: You can't vet MCP servers like traditional software. No vendor to audit. No contracts. No guarantees. And even if you approve a server today, it can change its capabilities tomorrow without permission. Your risk assessment becomes obsolete the moment the server updates.

Layer 3: Operational Reality

The finding: 53% of MCP servers rely on static API keys and Personal Access Tokens stored in plaintext configuration files [1].

What this means: One stolen config file compromises everything your AI accesses. These files may contain AWS credentials, GitHub SSH keys, database passwords, and SaaS API keys - all in plaintext [18, 19].

The evidence: Trail of Bits identified insecure credential storage as the #1 MCP vulnerability [18]. Astrix Security's analysis of 5,200 servers found only 8.5% use OAuth [1].

Plaintext credentials violate SOC2 [20], ISO27001 [21], HIPAA [22], and PCI-DSS [23] requirements. Organizations can't deploy MCP in regulated environments without fixing this.

The bottom line: One stolen config file exposes everything. AWS keys, database passwords, API tokens - all in plaintext. An attacker doesn't need to compromise the server itself, just read a text file. This violates every major compliance framework and makes MCP unusable in regulated environments.

The Cost of Blocking MCP Entirely

The instinct to block MCP until it matures is understandable. It's also increasingly difficult to enforce.

Shadow AI deployments: Developers who need MCP will find ways to use it. Personal laptops. Unapproved accounts. Local environments that bypass corporate controls. You lose visibility into what's deployed and where sensitive data flows.

 

Competitive pressure: Organizations that figure out safe MCP adoption gain velocity in AI implementation. Your competitors are solving this problem, not avoiding it. The gap widens while you wait.

Developer friction: Talented AI engineers want modern tools. Blanket prohibitions without alternatives drive them toward organizations with more progressive AI strategies.

Integration debt: Without MCP, teams will have to build custom integrations which increases technical debt.

The choice isn't "MCP security issues" versus "no risk." It's governed adoption versus ungoverned adoption with shadow deployments and competitive lag.

 

What's Being Done About It

This pattern is not new. Docker launched in the early 2010s with security vulnerabilities. By 2025, containers are standard in enterprise environments [17].

MCP is at year one.

The difference? The ecosystem is actively responding. Enterprises want MCP to mature faster because they need AI now.

Anthropic: Released a major security update in June 2025. They upgraded to OAuth 2.1, required secure session IDs, and published Security Best Practices [10, 29].

 

Cloud Security Alliance: Launched a "Secure Autonomy" project with hardening guides, audit frameworks, and best practices [4].

OWASP: Created the MCP Top 10, a community-driven risk catalog mapping critical concerns like model misbinding, context spoofing, and prompt-state manipulation [5].

Docker: Built MCP Gateway with container isolation, native OAuth handling, and cryptographically signed images [6].

Security vendors: Automated assessment tools are emerging: MCP SafetyScanner [28], MCP-scan for detecting attacks, and runtime protection tools like MCP Guardian and MCP-Shield [30].

Astrix: Released an open-source MCP Secret Wrapper that pulls secrets from vault at runtime [1].

Microsoft: Published security guidelines for protecting against indirect prompt injection attacks [31].

What You Can Do Today

The ecosystem is moving fast, but you can't wait for MCP to mature. Here's how to adopt it safely based on your risk tolerance.

For experimental/development use:

  • Isolated developer sandboxes with restricted network access
  • Non-production data only
  • Log all MCP server activity to SIEM
  • Container isolation (Docker MCP Gateway or equivalent)
  • Inventory of installed servers and who installed them

For limited production use:

  • Pre-approved servers only (maintain registry)
  • OAuth mandatory (no static credentials in config files)
  • Change control for new servers
  • MCP-specific incident response playbook
  • Continuous vulnerability scanning

For mission-critical systems:

  • Not recommended currently
  • Monitor maturity signals and reassess quarterly

How Trace3 Can Help

You don't need to choose between security and speed. You need a strategy that handles MCP's limitations. Trace3's AI governance consulting helps organizations:

  • Assess current exposure: Identify where MCP is deployed, what data servers can access, and which implementations violate security policies
  • Design controls that match your risk tolerance: Map MCP usage to governance frameworks, from sandboxed development to hardened production
  • Build sustainable policies: Establish pre-approved server registries, secure credential management, and continuous monitoring that allow innovation without compromising security
  • Navigate ecosystem maturity: Understand which MCP implementations are production-ready and which require additional controls

 Adopt MCP at a pace that matches your risk tolerance, with controls that fit your environment. 

Next Steps

Evaluating MCP adoption? Or discovering it's already deployed? We can help.

Contact Trace3 for a trustworthy AI assessment to understand your current exposure and risk profile. We can discuss your AI governance strategy to build frameworks that enable AI innovation without compromising security. MCP will mature. The question is whether you'll be ready when it does.

 

Sources

[1] Astrix Security "State of MCP Server Security 2025." Available: https://astrix.security/learn/blog/state-of-mcp-server-security-2025
[2]  NeuralTrust. "What is Model Context Protocol." Available: https://neuraltrust.ai/blog/what-is-model-context-protocol
[3] AWS. "Why MCP Is Not Production Ready Yet." Available: https://builder.aws.com/content/2zQBE367D31d5OxS7SdLUYgrVSh/why-mcp-is-not-production-ready-yet
[4] Cloud Security Alliance. Cloud Security "MCP Security Project." Available: https://modelcontextprotocol-security .io/
[5]"MCP Top 10." Available: https://owasp.org/www-project-mcp-top-10/
[6] OWASP. "MCP Security Issues Threatening AI Infrastructure." Available: https://www.docker.com/blog/mcp-security-issues-threatening-ai-infrastructure/
[7] Docker. Model Context "MCP Introduction." Available: https://modelcontextprotocol.io/
[8] Model Context Protocol. Model Context Protocol. "Security Best Practices." Available: https://modelcontextprotocol.io/specification/draft/basic/security_best_practices
[9] GitHub Issue. GitHub "Bypass Permission Mode." Available: https://github.com/anthropics/claude-code/issues/5307
[10] Model Context Protocol. "MCP Authorization." Available: https://modelcontextprotocol.io/specification/2025-06-18/basic/authorization
[11] Cyber Security Statistics. "75% Individual Developers." Available: https://www.cybersecstatistics.com/stats/about-75-of-the-more-than-10-000-model-context-protocol-mcp-servers-were-built-by-individuals-withou
[12] Tenable. "How Tenable Research Discovered a Critical Remote Code Execution Vulnerability on Anthropic MCP Inspector." Available: https://www.tenable.com/blog/how-tenable-research-discovered-a-critical-remote-code-execution-vulnerability-on-anthropic
[13] Backslash Security. "Hundreds of MCP Servers Vulnerable to Abuse." Available: https://www.backslash.security/blog/hundreds-of-mcp-servers-vulnerable-to-abuse
[14] The Hacker News. "Critical MCP-Remote Vulnerability." Available: https://thehackernews.com/2025/07/critical-mcp-remote-vulnerability .html
[15] Cymulate. "CVE-2025-53109 and CVE-2025-53110: EscapeRoute." Available: https://cymulate.com/blog/cve-2025-53109-53110-escaperoute-anthropic/
[16] The Hacker News. "Critical Vulnerability in Anthropic's MCP Inspector." Available: https://thehackernews.com/2025/07/critical-vulnerability-in-anthropics.html
[17] UMA Technology. "What to Know About containerized applications in 2025." Available: https://umatechnology .org/what-to-know-about-containerized-applications-in-2025/
[18] Trail of Bits. "Insecure Credential Storage Plagues MCP." Available: https://blog.trailofbits.com/2025/04/30/insecure-credential-storage-plagues-mcp/
[19] WorkOS. "MCP Secrets Management Best Practices." Available: https://workos.com/guide/best-practices-for-mcp-secrets-management
[20] SOC2. "SOC 2 Password Requirements: What They Are & How to Comply" Available: https://secureframe.com/blog/soc-2-password-requirements
[21] ISO27001. "ISO 27001 Password Policy Template." Available: https://iso-docs.com/blogs/iso-27001-isms/password-policy
[22] HIPAA. "HIPAA Password Requirements Explained" Available: https://bitwarden.com/blog/hipaa-password-requirements/
[23] PCI-DSS. "PCI DSS Requirement 8 Explained" Available: https://pcidssguide.com/pci-dss-requirement-8/
[24] PromptHub. "MCP Security in 2025." Available: https://www.prompthub.us/blog/mcp-security-in-2025
[25] Datadog Security Labs. "SQL Injection in PostgreSQL MCP Server." Available: https://securitylabs.datadoghq.com/articles/mcp-vulnerability-case-study-SQL-injection-in-the-postgresql-mcp-server/
[26] Trend Micro. "Why a Classic MCP Server Vulnerability Can Undermine Your Entire AI " Available: https://www.trendmicro.com/en/research/25/f/why-a-classic-mcp-server-vulnerability-can-undermine-your-entire-ai-agent.html
[27] eSentire. "Model Context Protocol Security: Critical Vulnerabilities Every CISO Should Address in 2025." Available: https://www.esentire.com/blog/model-context-protocol-security-critical-vulnerabilities-every-ciso-should-address-in-2025
[28] arXiv. "MCP SafetyScanner." Available: https://arxiv.org/html/2504.03767v2
[29] Model Context Protocol. "MCP Transports." Available: https://modelcontextprotocol.io/specification/2025-06-18/basic/transports
[30] GitHub. "awesome-mcp-security." Available: https://github.com/AIM-Intelligence/awesome-mcp-security
[31] Microsoft. "Protecting Against Indirect Prompt Injection Attacks in MCP." Available: https://developer.microsoft.com/blog/protecting-against-indirect-injection-attacks-mcp

[32] mcp.so. "MCP Server Marketplace." Available: https://mcp.so/

 
Tom Schreck is a Senior Consultant, AI Solutions at Trace3. He helps clients cut through the AI hype to find what's worth building now versus what's still maturing. Tom specializes in agentic AI patterns and solution development, translating emerging technologies into actionable strategies that help organizations innovate with confidence.