MCP-38: A Comprehensive Threat Taxonomy for Model Context Protocol Systems (v1.0)
arXiv cs.AI / 3/20/2026
📰 NewsIdeas & Deep AnalysisModels & Research
Key Points
- MCP-38 introduces a protocol-specific threat taxonomy comprising 38 categories for the Model Context Protocol, addressing a distinct attack surface not captured by existing threat models.
- It was developed through a four-phase methodology: protocol decomposition, multi-framework cross-mapping, real-world incident synthesis, and remediation-surface categorization.
- Each category is mapped to STRIDE, the OWASP Top 10 for LLM Applications (2025, LLM01--LLM10), and the OWASP Top 10 for Agentic Applications (2026, ASI01--ASI10).
- The taxonomy highlights semantic attack surface threats such as tool description poisoning, indirect prompt injection, parasitic tool chaining, and dynamic trust violations, which prior work does not adequately cover.
- MCP-38 provides the definitional and empirical foundation for automated threat intelligence platforms.
Related Articles

How to Build an AI Team: The Solopreneur Playbook
Dev.to

CrewAI vs AutoGen vs LangGraph: Which Agent Framework to Use
Dev.to

14 Best Self-Hosted Claude Alternatives for AI and Coding in 2026
Dev.to
[P] Finetuned small LMs to VLM adapters locally and wrote a short article about it
Reddit r/MachineLearning
Experiment: How far can a 28M model go in business email generation?
Reddit r/LocalLLaMA