▲ | jdns 4 days ago | |||||||
i'd honestly say it's closer (but not analogous) to opening a website in your browser. you wouldn't expect javascript on a website to be able to escape the sandbox and run arbitrary code on your computer. companies taking this seriously and awarding bounties is indicative it's fairly severe | ||||||||
▲ | datadrivenangel 4 days ago | parent | next [-] | |||||||
Malware from untrusted websites is as old as the internet. With advertisements, even trusted sites can deliver hostile content. The RCE/Malware issue aside, if the website you go to is a login page for some service, do you know it's the legitimate website? MCP Phishing is going to be a thing | ||||||||
▲ | mehdibl 4 days ago | parent | prev | next [-] | |||||||
this issue is not even MCP at the core. Claude Code/ Gemini CLI were opening "url's" without sanitization and validation. That's the core flaw. There is a second issue with an XSS flawed package too in the bridge that is easy to patch. So there is a chain of issues and you need to leverage them to get there and first pick an MCP that is flawed from a bad actor. | ||||||||
| ||||||||
▲ | fulafel 4 days ago | parent | prev [-] | |||||||
JS has been able to escape the sandbox as long as browsers had JS support. The stream of vulnerability discoveries has been constant. |