MCP Server Vulnerability Checklist (2026 Edition)
- 43% of public MCP servers have command-execution vulnerabilities as of early 2026 — per a February 2026 audit.
- The attack surface is wider than most developers realize: prompt injection, supply chain, SSRF, and auth bypasses are all in scope.
- This 24-point checklist covers every major class. Run it before your MCP server touches production.
Why MCP security is a problem right now
The Model Context Protocol gives LLMs the ability to call tools, read files, and execute code on behalf of users. That is extremely useful. It is also a large attack surface that most developers have not fully mapped.
In April 2026, The Register reported that a design flaw in MCP's STDIO transport "puts 200,000 servers at risk" of complete takeover. The researchers at Ox Security responsible for the disclosure found that the flaw "lets anyone run any arbitrary OS command" if the server accepts STDIO connections without guarding what gets executed during startup. Anthropic declined to treat it as a protocol-level fix, calling the behavior expected. That means the fix is on you as the server operator.
The academic side reinforces this. Research published in April 2025 on arXiv (2504.03767) — "MCP Safety Audit: LLMs with the Model Context Protocol Allow Major Security Exploits" — documented three primary attack classes: malicious code execution, remote access control, and credential theft. The researchers also released MCPSafetyScanner, a free automated tool for testing a server's posture. The problem was visible before it became a crisis. Now it is a crisis.
The best public reference for what a secure MCP server looks like is the SlowMist MCP Security Checklist on GitHub. The 24 items below draw on that structure, the Ox Security disclosure, the CVE record for CVE-2026-33032, and the arXiv paper. Where a check maps directly to a known CVE or published finding, the source is cited.
Run this checklist interactively
Paste your server's config and get a pass/fail score against all 24 items in about 90 seconds.
Open the free MCP Security Checklist tool →The 24-point checklist
Each item has: the check question, why it matters, and one concrete way to verify it. Severity ratings follow SlowMist's three-tier model: High items are non-negotiable before production, Medium items are strongly advised, Low items are context-dependent hardening.
-
01 Does every MCP endpoint require authentication — including sub-paths?High
-
02 Are there any hardcoded or static credentials in config files?High
-
03 Is TLS enforced on all non-STDIO transports with no HTTP fallback?High
-
04 Is the SSE session-establishment endpoint (GET) also authenticated?High
-
05 Is the IP allowlist explicitly set rather than defaulting to allow-all?Medium
-
06 Does the STDIO transport guard against arbitrary OS command execution at startup?High
-
07 Does each tool operate at the minimum privilege it needs?High
-
08 Do tool handlers validate and reject unexpected input shapes?High
-
09 Do destructive tools require human confirmation before executing?High
-
10 Is auto-approval disabled on the MCP client?High
-
11 Are rate limits enforced on tool call volume per session?Medium
-
12 Are the server’s name, description, and tool descriptions free of injected instructions?High
-
13 Does the server sanitize data returned from external sources before passing it to the LLM?High
-
14 In multi-server setups, does each server treat data from other servers as untrusted?Medium
-
15 Are all third-party MCP packages pinned to exact versions with checksum verification?High
-
16 Have all marketplace-sourced skills been audited for injected payloads?High
-
17 Is the server protected against rug pulls — tool list or description changes after client approval?Medium
-
18 Is the server process isolated in a container or sandbox?High
-
19 Do tools that make outbound HTTP requests validate the destination URL against an allowlist?High
-
20 Do file-serving tools block path traversal?High
-
21 Do logs capture every tool invocation, session open, and auth event with timestamp and caller identity?High
-
22 Are credentials and secrets excluded from log output?High
-
23 Are alerts configured for anomalous call patterns?Medium
-
24 Have you run an automated scanner against the server?Low
Want a scored report you can actually share?
The free checklist tool above runs you through these 24 items interactively. If you need a full audit with findings, remediation steps, and a PDF you can hand to a security team or client, that’s what Septim Spire is for.
Septim Spire — full audit, $199 →The three vulnerability classes that cause most real incidents
Twenty-four items is a lot. If you are triaging a server under time pressure, prioritize the three classes that arXiv 2504.03767 and the 2026 CVE record show causing the most real incidents:
- Auth bypass. Items 1, 4, 21. One missing middleware call creates a CVSS 9.8. Check every endpoint, including sub-paths and the SSE session endpoint.
- Prompt injection. Items 12, 13, 14. The LLM is part of your attack surface. Data it reads is data it may act on.
- Supply chain. Items 15, 16. You are responsible for every package you pull in. Marketplaces do not pre-screen. Pin versions, read source code, verify checksums.
The other 18 items matter. But if you can only run three categories today, run those three.
Sources
- The Register: "MCP design flaw puts 200k servers at risk" — April 16, 2026. Primary source for the STDIO design flaw, Ox Security researcher names, and CVE list.
- Gentic News: "MCP Security Crisis: 43% of Servers Vulnerable" — 2026. Aggregation of BlueRock, Trend Micro, Astrix, and Koi Security findings.
- arXiv 2504.03767: "MCP Safety Audit" — Radosevich & Halloran, April 2025. Primary academic source for attack class taxonomy and MCPSafetyScanner.
- SlowMist MCP Security Checklist — GitHub. Primary structural reference for checklist categories and severity tiers.
- New Claw Times: CVE-2026-33032 writeup — 2026. Primary source for nginx-ui auth bypass mechanics and Yotam Perkal quote.
Want Septim to audit your stack?
Spire is a structured technical audit: we work through the 24 items above against your actual server configuration, document every finding with severity and remediation steps, and deliver a written report within 5 business days. One-time, no subscription.
Septim Spire — $199 →