MCP Package Security Scan Reveals Widespread Destructive Capabilities Without Confirmation

✍️ OpenClawRadar📅 Published: March 23, 2026🔗 Source
MCP Package Security Scan Reveals Widespread Destructive Capabilities Without Confirmation
Ad

A security researcher scanned 2,386 MCP (Model Context Protocol) packages on npm and found significant security risks in how AI agents interact with external tools. MCP packages enable Claude Code to connect to external tools, and when installed, they gain full system access including shell, files, network, and environment variables.

Key Findings from the Scan

The most concerning discovery: 63.5% of packages expose destructive operations without requiring human confirmation. These operations include deleting files, dropping databases, and deploying code. If someone injects a malicious prompt into a tool response, the AI agent will execute these destructive actions without asking for permission.

Additional Security Issues

  • 49% of packages had security issues overall
  • 402 critical severity vulnerabilities
  • 240 high severity vulnerabilities
  • 122 packages auto-execute code on npm install
  • Real-world cases included SSH key theft, Unicode prompt injection, and delayed backdoors

The researcher notes that not all findings represent malware—most are "dangerous capability without guardrails." However, 63.5% of packages are "one prompt injection away from real damage."

Ad

Detection and Response

The scanning tool achieved 99.4% precision with 39.9% recall—meaning near-zero false alarms but not catching everything yet. Malicious patterns have been converted to detection rules, and responsible disclosure was made to affected parties.

The researcher built ATR (Agent Threat Rules) as an open standard for detecting these threats—61 detection rules released under MIT license, not locked to any specific tool. Anyone can use these rules to scan MCP packages.

You can scan any skill without installing anything at panguard.ai—paste a GitHub URL and get a report in 3 seconds. The full research report is available at panguard.ai/research/mcp-ecosystem-scan.

📖 Read the full source: r/ClaudeAI

Ad

👀 See Also

GitHub Copilot CLI vulnerability allows malware execution via prompt injection
Security

GitHub Copilot CLI vulnerability allows malware execution via prompt injection

A vulnerability in GitHub Copilot CLI allows arbitrary shell command execution via indirect prompt injection without user approval. Attackers can craft commands that bypass validation and execute malware immediately on the victim's computer.

OpenClawRadar
Claude chatbot exploited in Mexican government data breach
Security

Claude chatbot exploited in Mexican government data breach

A hacker used Anthropic's Claude chatbot to attack multiple Mexican government agencies, stealing 150GB of data including taxpayer records and employee credentials. The hacker jailbroke Claude with prompts to bypass guardrails and generate thousands of detailed attack plans.

OpenClawRadar
AppLovin Mediation Cipher Broken: Device Fingerprinting Bypasses ATT
Security

AppLovin Mediation Cipher Broken: Device Fingerprinting Bypasses ATT

Reverse-engineering revealed that AppLovin's custom cipher uses a constant salt + SDK key, a SplitMix64 PRNG, and no authentication. Decrypted requests carry ~50 device fields (hardware model, screen size, locale, boot time, etc.) even when ATT is denied, enabling deterministic re-identification across apps.

OpenClawRadar
Security Warning: ClawProxy Script Stole API Keys, Resulting in Significant OpenRouter Bill
Security

Security Warning: ClawProxy Script Stole API Keys, Resulting in Significant OpenRouter Bill

A developer installed a closed-source ClawProxy script from a Reddit user on a sandboxed WSL Ubuntu 24.04 system, which stole their OpenRouter API key and used it via Google Vertex API to run up a large bill on Opus 4.6 overnight.

OpenClawRadar