-
Notifications
You must be signed in to change notification settings - Fork 8.5k
MCP tool integration has no per-message authentication or integrity verification #7403
Copy link
Copy link
Open
Description
Summary
AutoGen's MCP integration enables agents to call tools via MCP, but MCP itself provides no cryptographic identity or message integrity layer. Any agent can call any tool, messages are unsigned, and tool definitions can be tampered with.
The gap
- No agent identity: No passport or certificate mechanism for agents calling MCP tools.
- No message signing: JSON-RPC messages are unsigned -- parameters can be modified in transit.
- No tool integrity: Tool definitions from
tools/listare not signed. Tool poisoning (OWASP MCP03) is a known attack vector. - No replay protection: Same tool call can be replayed indefinitely.
OWASP has published an MCP Top 10 covering these risks.
Existing work
An IETF Internet-Draft has been published to address this:
- IETF Datatracker: https://datatracker.ietf.org/doc/draft-sharif-mcps-secure-mcp/
- Reference implementations: npm / PyPI (zero dependencies)
- Interactive demo: https://agentsign.dev/playground
The spec adds agent passports (ECDSA P-256), per-message signing, tool definition signatures, and nonce-based replay protection -- fully backward-compatible with current MCP.
Happy to discuss integration approaches.
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
No labels