RL Blog

Topics

All Blog PostsAppSec & Supply Chain SecurityDev & DevSecOpsProducts & TechnologySecurity OperationsThreat Research

Follow us

XX / TwitterLinkedInLinkedInFacebookFacebookInstagramInstagramYouTubeYouTubeblueskyBluesky

Subscribe

Get the best of RL Blog delivered to your in-box weekly. Stay up to date on key trends, analysis and best practices across threat intelligence and software supply chain security.

ReversingLabs: The More Powerful, Cost-Effective Alternative to VirusTotalSee Why
Skip to main content
Contact UsSupportLoginBlogCommunity
reversinglabsReversingLabs: Home
Solutions
Secure Software OnboardingSecure Build & ReleaseProtect Virtual MachinesIntegrate Safe Open SourceGo Beyond the SBOM
Increase Email Threat ResilienceDetect Malware in File Shares & StorageAdvanced Malware Analysis SuiteICAP Enabled Solutions
Scalable File AnalysisHigh-Fidelity Threat IntelligenceCurated Ransomware FeedAutomate Malware Analysis Workflows
Products & Technology
Spectra Assure®Software Supply Chain SecuritySpectra DetectHigh-Speed, High-Volume, Large File AnalysisSpectra AnalyzeIn-Depth Malware Analysis & Hunting for the SOCSpectra IntelligenceAuthoritative Reputation Data & Intelligence
Spectra CoreIntegrations
Industry
Energy & UtilitiesFinanceHealthcareHigh TechPublic Sector
Partners
Become a PartnerValue-Added PartnersTechnology PartnersMarketplacesOEM Partners
Alliances
Resources
BlogContent LibraryCybersecurity GlossaryConversingLabs PodcastEvents & WebinarsLearning with ReversingLabsWeekly Insights Newsletter
Customer StoriesDemo VideosDocumentationOpenSource YARA Rules
Company
About UsLeadershipCareersSeries B Investment
EventsRL at RSAC
Press ReleasesIn the News
Pricing
Software Supply Chain SecurityMalware Analysis and Threat Hunting
Request a demo
Menu
AppSec & Supply Chain SecurityOctober 16, 2025

MCP credential weakness raises red flags

More than half of Model Context Protocol servers were found to rely on static, long-lived credentials. With AI agents on the rise, that’s a problem.

John P. Mello Jr.
John P. Mello Jr., Freelance technology writer.John P. Mello Jr.
FacebookFacebookXX / TwitterLinkedInLinkedInblueskyBlueskyEmail Us
Red flags raised over MCP server credential weakness

MCP servers, which are important to the fast-developing AI stack, have a credentials problem. A recent analysis of more than 5,200 open-source Model Context Protocol server implementations by Astrix Security found that, while the vast majority of servers (88%) require credentials, more than half (53%) use credentials that rely on insecure, long-lived, static secrets, such as API keys and personal access tokens (PATs).

Relying on long-lived secrets as credentials, especially when saved on the user’s endpoint in a nonsafe manner, creates two serious security risks, Astrix Security researcher Tomer Yahalom explained.

The first: If an attacker manages to obtain your secret, they will be able to use it for a long time if it is long-lived. But the problem is later compounded.

The first risk is further amplified by the second risk, which is storing secrets in an unsafe manner. That can significantly increase the chances of an attacker gaining access to these credentials in the first place.

Tomer Yahalom

Rosario Mastrogiacomo, vice president of strategy and solutions engineering at Sphere Technology Solutions, said that static secrets such as API keys and PATs are the equivalent of permanent passwords that never expire. “Once leaked, they can be reused indefinitely and often go undetected in code repositories or logs. For AI systems, where agents can autonomously call APIs, this risk can be compounded,” he said. 

A single exposed key can grant persistent access to model weights, training data, or even production systems. Credentials sprawl in these environments creates invisible, systemic risk that’s difficult to contain.

Rosario Mastrogiacomo

The Astrix Security study also found some other serious concerns — and they come at a time when the use of AI coding and AI agents is on the rise. Here’s what your team needs to know about the risk — and what you can do about it.

Get Guide: How the Rise of AI Will Impact Supply Chain Security

Authentication security is still lagging for MCP

The Astrix team also found that adoption of more modern and secure authentication methods, like OAuth, for MCP servers is lagging. They noted that only 8.3% of the servers supported OAuth. While adoption is growing, they said, it’s still far behind, despite being the best approach for security.

As with any new technology, developers rush to utilize MCP without considering security, since adoption of secure authentication methods is often thought to be more complicated and time-consuming.

Tomer Yahalom

MCP implementations were designed for speed and interoperability, not zero trust, said Mastrogiacomo. “Many organizations still treat these servers as internal developer infrastructure rather than production assets. As a result, they don’t enforce token rotation, scoped credentials, or vault-based retrieval,” he said.

Culturally, security teams are still catching up to the reality that machine-to-machine and agent-to-agent authentication requires the same rigor as human access control. Legacy practices are hard to unlearn.

Rosario Mastrogiacomo

Another insecure practice discovered in 79%) of servers was the storage of API keys in environment variables. Abhay Bhargav, CEO of AppSecEngineer, said that environment variables have no access control, are long-lived credentials, and have no encryption or protection. 

They can be read by any process on the local machine and apps running in the environment. In addition, there’s no audit logging.

Abhay Bhargav 

Mastrogiacomo noted that environmental variables are not secure boundaries and are readable by any process on the host, logged in crash dumps, and often copied into build pipelines. “In shared or containerized environments, that exposure is magnified,” he said.

For AI agents that operate across multiple execution layers, environment variables become unintentional broadcast channels for credentials. It’s a silent but pervasive form of credentials leakage.

Rosario Mastrogiacomo

What’s at risk with MCP server security?

Getting MCP server security right is critical because a compromised MCP server provides direct access to sensitive resources, data, and tools and can amplify prompt-injection attacks into full-system compromises. Gal Moyal, of the CTO office at Noma Security, said that as organizations deploy multiple MCP servers to enable different AI capabilities, they expand their attack surface while introducing authentication vulnerabilities, supply chain risks from third-party servers, and visibility gaps that make it difficult to monitor what AI agents are actually doing. 

MCP servers represent a critical control point in the AI stack where proper security controls determine whether AI agents remain safely constrained or become pathways for data exfiltration, unauthorized access, and lateral movement across enterprise systems.

Gal Moyal

Traditional security tools can’t see MCP servers as distinct risk entities, Moyal said. “Endpoint detection treats them as legitimate processes. CNAPP [Cloud-native application protection platform] solutions don’t understand agent-to-server communication patterns. And manual inventories are obsolete the moment a developer spins up a new agent.”

MCP servers amplify both agent productivity and risk. Enterprise cybersecurity organizations require the visibility and runtime protection needed to embrace agentic AI securely while maintaining control over powerful, potentially destructive capabilities.

Gal Moyal

AppSecEngineer’s Bhargav said that in this case, like many others in the recent history of application development, speed of implementation has far outpaced the speed of security.

This will cause more pain for companies in the short term before it gets better. It’s essential for companies to get their developers and engineering teams trained on MCP risks and applying programmatic and, in many cases, custom defenses to protect themselves.

Abhay Bhargav

New free, open-source tool developed to mitigate risk

In addition to its research findings, Astrix Security released an open-source tool that wraps around any MCP server to pull secrets directly from a secure vault at runtime, ensuring that no sensitive secrets are exposed on host machines. 

Instead of relying on static credentials in configuration files, the tool pulls the relevant secret from a vault — currently, the project supports only AWS Secrets Manager — and starts the designated MCP server with the secret injected into its environment variables. Using the tool ensures that no exposed secrets exist on any machine hosting MCP servers.

Astrix Security’s Yahalom said that because the secret is stored in AWS, the user will need to be authenticated using the AWS command-line interface to access the secret, and since AWS credentials are automatically invalid and require reauthentication, this, in practice, serves as temporary access to the long-lived secret.

Mastrogiacomo said the wrapping approach Astrix proposes is solid. “It enforces just-in-time secrets retrieval, minimizing static exposure,” he said. But it’s not a complete solution to the problem, he added.

[One] single tool alone won’t solve this. The real progress will come from governance — defining ownership for every server, enforcing credential rotation policies, and integrating runtime attestation into identity workflows. We need a full identity lifecycle for AI infrastructure — not just better wrappers for secrets.

Rosario Mastrogiacomo

See related post: The Postmark MCP server attack: 5 key takeaways

Keep learning

  • Get up to speed on the state of software security with RL's Software Supply Chain Security Report 2026. Plus: See the the webinar to discussing the findings.
  • Learn why binary analysis is a must-have in the Gartner® CISO Playbook for Commercial Software Supply Chain Security.
  • Take action on securing AI/ML with our report: AI Is the Supply Chain. Plus: See RL's research on nullifAI and watch how RL discovered the novel threat.
  • Get the report: Go Beyond the SBOM. Plus: See the CycloneDX xBOM webinar.

Explore RL's Spectra suite: Spectra Assure for software supply chain security, Spectra Detect for scalable file analysis, Spectra Analyze for malware analysis and threat hunting, and Spectra Intelligence for reputation data and intelligence.

Tags:AppSec & Supply Chain Security

More Blog Posts

AI coding racing

Can AppSec keep pace with AI coding?

AI lets software teams generate code at a rate faster than security can validate it. One way to win the race: more AI.

Learn More about Can AppSec keep pace with AI coding?
Can AppSec keep pace with AI coding?
Finger on map

LLMmap puts its finger on ML attacks

Researchers show how LLM fingerprinting can be used to automate generation of customized attacks.

Learn More about LLMmap puts its finger on ML attacks
LLMmap puts its finger on ML attacks
Vibeware bad vibes

Vibeware: More than bad vibes for AppSec

Threat actors are leveraging the freewheeling vibe-coding trend to deliver malicious software at scale.

Learn More about Vibeware: More than bad vibes for AppSec
Vibeware: More than bad vibes for AppSec
CRA accelerates advantage

The CRA is coming: Are you ready?

Here's how the EU's Cyber Resilience Act will reshape the software industry — and how that accelerates advantages.

Learn More about The CRA is coming: Are you ready?
The CRA is coming: Are you ready?

Spectra Assure Free Trial

Get your 14-day free trial of Spectra Assure for Software Supply Chain Security

Get Free TrialMore about Spectra Assure Free Trial
Blog
Events
About Us
Webinars
In the News
Careers
Demo Videos
Cybersecurity Glossary
Contact Us
reversinglabsReversingLabs: Home
Privacy PolicyCookiesImpressum
All rights reserved ReversingLabs © 2026
XX / TwitterLinkedInLinkedInFacebookFacebookInstagramInstagramYouTubeYouTubeblueskyBlueskyRSSRSS
Back to Top