Home / Technology / AI Protocol Flaw Exposes 200,000 Servers
AI Protocol Flaw Exposes 200,000 Servers
2 May
Summary
- A design default in MCP's STDIO transport allows arbitrary command execution.
- An estimated 200,000 instances are vulnerable, with 7,000 on public IPs.
- Anthropic stated the behavior is by design, developers must sanitize inputs.

A significant security vulnerability has been identified within the Model Context Protocol (MCP), an open standard for AI agent-to-tool communication. The default STDIO transport mechanism, widely adopted by platforms including OpenAI and Google DeepMind, possesses a design flaw allowing for arbitrary operating system command execution without input sanitization. Researchers estimate that approximately 200,000 instances may be vulnerable, with 7,000 identified on public IPs.
Anthropic, the creator of MCP, has stated that the behavior is by design and that input sanitization is the responsibility of individual developers. This stance has led to a debate regarding security responsibility, with OX Security researchers highlighting the risk of widespread exploitation. While numerous products have released patches, these address specific entry points rather than the core protocol design, meaning the insecure default remains.
Security experts emphasize that every MCP STDIO configuration should be treated as an untrusted input surface, akin to user input for a database query. Recommendations include enumerating all MCP deployments, patching affected products, sandboxing services, and auditing third-party registries. The situation underscores a broader challenge in AI infrastructure security, where insecure defaults can propagate across numerous implementations.
This critical flaw, discovered after MCP's donation to the Linux Foundation in December 2025, has resulted in numerous CVEs. Despite the potential for widespread compromise, Anthropic has not issued a standalone public statement or architectural changes, maintaining that STDIO's execution model is a secure default and protocol-level restrictions would impair its core function.