Skip to content

MCP tool integration has no per-message authentication or integrity verification #7403

@razashariff

Description

@razashariff

Summary

AutoGen's MCP integration enables agents to call tools via MCP, but MCP itself provides no cryptographic identity or message integrity layer. Any agent can call any tool, messages are unsigned, and tool definitions can be tampered with.

The gap

  • No agent identity: No passport or certificate mechanism for agents calling MCP tools.
  • No message signing: JSON-RPC messages are unsigned -- parameters can be modified in transit.
  • No tool integrity: Tool definitions from tools/list are not signed. Tool poisoning (OWASP MCP03) is a known attack vector.
  • No replay protection: Same tool call can be replayed indefinitely.

OWASP has published an MCP Top 10 covering these risks.

Existing work

An IETF Internet-Draft has been published to address this:

The spec adds agent passports (ECDSA P-256), per-message signing, tool definition signatures, and nonce-based replay protection -- fully backward-compatible with current MCP.

Happy to discuss integration approaches.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions