MCP-38: A Comprehensive Threat Taxonomy for Model Context Protocol Systems (v1.0)
arXiv cs.AI / 3/20/2026
📰 NewsIdeas & Deep AnalysisModels & Research
Key Points
- MCP-38 introduces a protocol-specific threat taxonomy comprising 38 categories for the Model Context Protocol, addressing a distinct attack surface not captured by existing threat models.
- It was developed through a four-phase methodology: protocol decomposition, multi-framework cross-mapping, real-world incident synthesis, and remediation-surface categorization.
- Each category is mapped to STRIDE, the OWASP Top 10 for LLM Applications (2025, LLM01--LLM10), and the OWASP Top 10 for Agentic Applications (2026, ASI01--ASI10).
- The taxonomy highlights semantic attack surface threats such as tool description poisoning, indirect prompt injection, parasitic tool chaining, and dynamic trust violations, which prior work does not adequately cover.
- MCP-38 provides the definitional and empirical foundation for automated threat intelligence platforms.
Related Articles
How AI is Transforming Dynamics 365 Business Central
Dev.to
Algorithmic Gaslighting: A Formal Legal Template to Fight AI Safety Pivots That Cause Psychological Harm
Reddit r/artificial
Do I need different approaches for different types of business information errors?
Dev.to
ShieldCortex: What We Learned Protecting AI Agent Memory
Dev.to
How AI-Powered Revenue Intelligence Transforms B2B Sales Teams
Dev.to