Skip to content

A practical, community-driven checklist for pentesting MCP servers. Covers traffic analysis, tool-call behavior, namespace abuse, auth flows, and remote server risks. Maintained by Appsecco and licensed for remixing.

License

Notifications You must be signed in to change notification settings

appsecco/pentesting-mcp-servers-checklist

Repository files navigation

README

A practical, community-driven checklist for pentesting Model Context Protocol (MCP) servers. This guide covers local and remote MCP server risks, traffic analysis, tool-call behaviors, context boundaries, authorization flows, and unsafe code paths.

Originally created for the OWASP Bay Area talk on Pentesting MCP Servers (Oct 2025), this checklist is designed for practitioners performing assessments on MCP-based tools, agents, and integrations.

Why this exists

MCP servers are becoming the new execution layer for AI agents. This means they expose:

  • File system access
  • Tool execution
  • Remote APIs
  • STDIO and HTTP bridges
  • Autonomous actions initiated by LLMs

Because of this, MCP servers introduce a wide attack surface that security testers need structured guidance for. This checklist helps you perform systematic and repeatable assessments.

What this checklist covers

1. Local MCP Server Checks

  • Secrets, PII, API keys in local files
  • Dangerous functions (eval/exec)
  • Namespace abuse
  • Tool output mixed with user input
  • Version pinning vs “latest” MCP versions

2. Remote MCP Server Checks

  • URL redirection boundaries
  • Data boundary validation
  • Authorization and tenant isolation
  • Code execution via redirect flows
  • API telemetry consistency

3. Traffic Analysis

  • Inspect STDIO using proxy clients
  • Inspect HTTP-based MCP servers
  • Detect appended context or unexpected tool chaining

How to use this repo

  • Use the PDF checklist for field assessments
  • Fork and adapt it for your team
  • Submit PRs with improvements
  • Open issues for new MCP attack patterns

Downloads

Contribute

We welcome:

  • New checklist items
  • Additional MCP server categories
  • Tooling contributions
  • Red-team test cases
  • Sanitized findings

License

This project is licensed under CC BY 4.0. You may remix, adapt, and build upon this checklist for any purpose, even commercially, as long as you provide attribution.

Maintainers

Appsecco

About

A practical, community-driven checklist for pentesting MCP servers. Covers traffic analysis, tool-call behavior, namespace abuse, auth flows, and remote server risks. Maintained by Appsecco and licensed for remixing.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published