AI Navigate

Compatibility at a Cost: Systematic Discovery and Exploitation of MCP Clause-Compliance Vulnerabilities

arXiv cs.AI / 3/12/2026

💬 OpinionIdeas & Deep Analysis

Key Points

  • The paper identifies a new attack surface called compatibility-abusing attacks that arise from the MCP's optional clauses, enabling risks such as silent prompt injection and DoS across multi-language SDKs.
  • It presents a universal intermediate representation (IR) generator to normalize MCP SDKs across languages, enabling cross-language analysis of compliance.
  • It proposes an auditable static analysis workflow guided by large language models to reason about cross-language and cross-clause compliance in MCP implementations.
  • It formalizes the attack semantics of MCP clauses and builds a three-modality pipeline to uncover exploitable non-compliance issues.

Abstract

The Model Context Protocol (MCP) is a recently proposed interoperability standard that unifies how AI agents connect with external tools and data sources. By defining a set of common client-server message exchange clauses, MCP replaces fragmented integrations with a standardized, plug-and-play framework. However, to be compatible with diverse AI agents, the MCP specification relaxes many behavioral constraints into optional clauses, leading to misuse-prone SDK implementation. We identify it as a new attack surface that allows adversaries to achieve multiple attacks (e.g, silent prompt injection, DoS, etc.), named as \emph{compatibility-abusing attacks}. In this work, we present the first systematic framework for analyzing this new attack surface across multi-language MCP SDKs. First, we construct a universal and language-agnostic intermediate representation (IR) generator that normalizes SDKs of different languages. Next, based on the new IR, we propose auditable static analysis with LLM-guided semantic reasoning for cross-language/clause compliance analysis. Third, by formalizing the attack semantics of the MCP clauses, we build three attack modalities and develop a modality-guided pipeline to uncover exploitable non-compliance issues.