-
Notifications
You must be signed in to change notification settings - Fork 59
Known Security Issues With WebMCP
Alex Nahas edited this page Sep 7, 2025
·
1 revision
- Issue: The browser extension can share data between different websites at the agent's discretion, bypassing the Same-Origin Policy (SOP) and CORS protections
- Concern: Data from a banking app could be shared with a malicious site if both are MCP-B enabled
- Action needed: Implement guardrails when domain shifts happen via elicitation, enforce data isolation between origins
- Issue: MCP-B essentially allows backdooring apps by using existing user session credentials
- Concern: All MCP app actions are logged under the same scope as user access, making audit trails indistinguishable
- Action needed: Consider implementing OAuth delegation (RFC 8693) or similar mechanisms to distinguish agent actions from direct user actions
- Issue: The extension automatically seeks out and attaches to MCP servers when pages load
- Risk: Malicious sites that end up in browser tabs (through redirects, pop-ups, etc.) could steal data from other web apps
- Action needed: Implement opt-in consent mechanism - e.g., popup asking "Website X has an MCP server, do you trust it to connect?"
- Issue: Users have no control over what tools/permissions the agent gets - it's entirely up to the website owner
- Comparison: With traditional MCP, users explicitly grant OAuth scopes; with MCP-B, websites decide what access to expose
- Action needed: Consider user-controllable permission system for tools, ability to restrict agent access below user's own permissions
- Issue: Users can't audit what tools a website exposes until after connection
- Risk: Malicious tools could appear after initial connection
-
Action needed:
- Show full tool list at connection time
- Warn if new tools appear that weren't in the initial list
- Allow users to selectively enable/disable specific tools
- Issue: Directives to execute dangerous actions (like "delete all data") can come from sources other than the user
- Concern: Traditional security assumes user intent behind actions; with agents, this assumption breaks
- Action needed: Robust prompt injection defenses, clear separation of user intent vs agent suggestions
- Issue: From a compliance perspective, agent actions being indistinguishable from user actions is problematic
- Concern: Legal/regulatory requirements often need clear audit trails of who/what performed actions
- Action needed: Implement clear logging/identification of agent-initiated vs user-initiated actions
- Issue: The zero-configuration nature means users are implicitly trusting both the model and website owners
- Comparison: Like "putting your SSN into a website" - requires significant trust
- Action needed: Clear communication of risks to users, possibly implement trust levels or reputation system
- Connection Consent UI: Show popup for each new MCP server connection
- Tool Inspection: Pre-connection tool audit with ability to selectively enable/disable
- Domain Isolation: Enforce data isolation between different origins, require explicit permission for cross-origin data sharing
- Agent Identity: Clear identification in logs/actions when agent is acting vs direct user action
- Permission Scoping: Allow users to grant agents reduced permissions compared to their own access
- Security Warnings: Alert users when sensitive operations are requested or when crossing trust boundaries