# MCP Server Threat Patterns Reference for `mcp-scanner-agent`. Based on MCPTox benchmark (2025), Endor Labs analysis of 2,614 MCP implementations, Invariant Labs Tool Poisoning research, Operant AI Shadow Escape disclosure (CVE pending), and Trail of Bits credential storage audit. **OWASP MCP Top 10 (2025):** MCP01 Token Mismanagement · MCP02 Privilege Escalation · MCP03 Tool Poisoning · MCP04 Supply Chain · MCP05 Command Injection · MCP06 Prompt Injection · MCP07 Insufficient AuthN/AuthZ · MCP08 Lack of Audit · MCP09 Shadow MCP Servers · MCP10 Context Over-Sharing --- ## 1. Tool Poisoning **MITRE ATLAS:** AML.T0043 (Craft Adversarial Data), AML.T0051 (LLM Prompt Injection) ### Description Malicious instructions embedded in tool `description`, `name`, or parameter `description` fields that manipulate LLM behavior without modifying the tool's functional code. The attack exploits the trust gap between what users see in UI and what the model receives. MCPTox benchmark (2025) found a 72.8% attack success rate against o1-mini; more capable models are often *more* susceptible because they follow instructions more faithfully. ### Attack Sub-Types **Direct injection** — Malicious text appended after legitimate tool description, often inside tags intended to look authoritative: ``, ``, ``. **Hidden text** — White-on-white Unicode, zero-width characters, or ANSI escape codes that hide instructions from human reviewers but are visible to the LLM. **Benign-framing bypass** — Instructions disguised as formatting hints or localization metadata: ``. ### Detection: What to Look For ``` # In tool description fields — flag any of: