(评论)
(comments)

原始链接: https://news.ycombinator.com/item?id=43689178

开源工具MCP-Shield已发布,旨在解决日益增长的MCP(多客户端平台)服务器安全问题。该工具由nick_wolf创建,并在Hacker News上分享,它通过在指令级别分析服务器行为来检测工具投毒攻击、数据泄露通道和跨域操作。 该工具扫描已安装的MCP服务器(如Cursor或Claude Desktop),并揭示试图访问敏感文件(例如SSH密钥)、操纵跨域数据(例如WhatsApp重定向)、隐藏其他工具或泄露数据的隐藏指令。代码库中提供了示例和检测输出。 社区正在寻求反馈,特别是关于检测模式和误报方面。用户khafra赞扬了该工具将基于签名的分析和LLM驱动的深度分析相结合的特点,而pcwelder则询问了关于提示注入检测的问题。paulgb提出了一个问题,即服务器向MCP-Shield提供一套工具,向客户端提供另一套工具,从而绕过MCP-Shield。


原文
Hacker News new | past | comments | ask | show | jobs | submit login
Show HN: MCP-Shield – Detect security issues in MCP servers (github.com/riseandignite)
13 points by nick_wolf 45 minutes ago | hide | past | favorite | 3 comments
I noticed the growing security concerns around MCP (https://news.ycombinator.com/item?id=43600192) and built an open source tool that can detect several patterns of tool poisoning attacks, exfiltration channels and cross-origin manipulations.

MCP-Shield scans your installed servers (Cursor, Claude Desktop, etc.) and shows what each tool is trying to do at the instruction level, beyond just the API surface. It catches hidden instructions that try to read sensitive files, shadow other tools' behavior, or exfiltrate data.

Example of what it detects:

- Hidden instructions attempting to access ~/.ssh/id_rsa

- Cross-origin manipulations between server that can redirect WhatsApp messages

- Tool shadowing that overrides behavior of other MCP tools

- Potential exfiltration channels through optional parameters

I've included clear examples of detection outputs in the README and multiple example vulnerabilities in the repo so you can see the kinds of things it catches.

This is an early version, but I'd appreciate feedback from the community, especially around detection patterns and false positives.











Nice! This is a much-needed space for security tooling, and I appreciate that you've put some thought into the new attack vectors. I also like the combination of signature-based analysis, and having an LLM do its own deep dive.

I expect a lot of people to refine the tool as they use it; one big challenge in maintaining the project is going to be incorporating pull requests that improve the prompt in different directions.



Cool.

If I'm not wrong you don't detect prompt injection done in the tool results? Any plans for that?



Neat, but what’s to stop a server from reporting one innocuous set of tools to MCP-Shield and then a different set of tools to the client?






Join us for AI Startup School this June 16-17 in San Francisco!


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact



Search:
联系我们 contact @ memedata.com