Understanding Model Context Protocol (MCP) Vulnerabilities: Rug Pull Attacks

July 29, 2025

Paresh Bhaya

Paresh Bhaya

Tentacles surrounding a browser warning dialog

Model Context Protocol (MCP) is currently a prominent topic in the technology news cycle. As with any new protocol or technology, there is an understandable excitement surrounding its potential, which can sometimes lead to a neglect of inherent risks and security implications. We are now observing novel vulnerabilities emerging with MCP that were previously unforeseen.

In this installment, we will delve into the specifics of Rug Pull attacks. You can view our first installment on Tool Poisoning Attacks here.

Rug Pull Attacks: An overview

A Rug Pull Attack is a targeted security threat in which a previously trusted MCP server or tool—after gaining user confidence—is silently updated to include malicious instructions. Once updated, AI agents or users who continue to interact with the compromised server/tool may unknowingly trigger actions that lead to data exfiltration, system compromise, or other harmful outcomes

How Rug Pull Attacks Happen

  1. Initial Benign State: The MCP server and the tool initially begin in a benign state. Many clients have a user approval process where they need to approve the tool during installation or before execution.

  2. Exploiting Established Trust: Once the client trusts the tool, the MCP server can weaponize it by injecting a malicious prompt, effectively "pausing" the tool itself.

  3. Silent Update: Due to the bidirectional nature of MCP, the MCP server can send a tools list change notification to the client. The client then pulls an updated version of the tool, integrating the malicious prompt.

  4. Consequences: This attack occurs at runtime between the client and the server.

Imagine a trusted photo editing tool. Once approved, the MCP server silently updates it with a malicious prompt that, instead of simply editing photos, begins searching for and uploading personal documents to an external server.

Mitigation Strategies

Defending against rug pull attack vulnerabilities requires a multi-layered strategy. Key measures include:

  • Enforcing explicit, policy-based access controls to govern what updated tools are allowed to do.

  • Implementing manual vetting and continuous monitoring of tool updates.

  • Disabling auto-approval or auto-update mechanisms, especially for sensitive or high-permission tools.

The most robust defense is to use a hosted MCP Gateway like Natoma, which performs security scanning, restricts usage to trusted MCP sources, and ensures that servers or tools are never auto-updated without explicit authorization.

Looking Ahead

In the subsequent blogs in this series, we will explore other emerging vulnerabilities within the Model Context Protocol, including data poisoning, prompt injection, and privilege escalation attacks. Understanding these risks is paramount as we continue to harness the power of advanced AI models.

Stay tuned for our next installment.

About Natoma

Natoma enables enterprises to adopt AI agents securely. The secure agent access gateway empowers organizations to unlock the full power of AI, by connecting agents to their tools and data without compromising security.

Leveraging a hosted MCP platform, Natoma provides enterprise-grade authentication, fine-grained authorization, and governance for AI agents with flexible deployment models and out-of-the-box support for 100+ pre-built MCP servers.

You may also be interested in:

A high-speed train speeding along the tracks

Model Context Protocol: How One Standard Eliminates Months of AI Integration Work

See how MCP enables enterprises to configure connections in 15-30 minutes, allowing them to launch 50+ AI tools in 90 days.

A high-speed train speeding along the tracks

Model Context Protocol: How One Standard Eliminates Months of AI Integration Work

See how MCP enables enterprises to configure connections in 15-30 minutes, allowing them to launch 50+ AI tools in 90 days.

A high-speed train speeding along the tracks

Model Context Protocol: How One Standard Eliminates Months of AI Integration Work

See how MCP enables enterprises to configure connections in 15-30 minutes, allowing them to launch 50+ AI tools in 90 days.

A robot that symbolizes transformation

How to Prepare Your Organization for AI at Scale

Scaling AI across your enterprise requires organizational transformation, not just technology deployment.

A robot that symbolizes transformation

How to Prepare Your Organization for AI at Scale

Scaling AI across your enterprise requires organizational transformation, not just technology deployment.

A robot that symbolizes transformation

How to Prepare Your Organization for AI at Scale

Scaling AI across your enterprise requires organizational transformation, not just technology deployment.

An open gate in a brick wall

Common AI Adoption Barriers and How to Overcome Them

This guide identifies the five most common barriers preventing AI success and provides actionable solutions based on frameworks from leading enterprises that successfully scaled AI from pilot to production.

An open gate in a brick wall

Common AI Adoption Barriers and How to Overcome Them

This guide identifies the five most common barriers preventing AI success and provides actionable solutions based on frameworks from leading enterprises that successfully scaled AI from pilot to production.

An open gate in a brick wall

Common AI Adoption Barriers and How to Overcome Them

This guide identifies the five most common barriers preventing AI success and provides actionable solutions based on frameworks from leading enterprises that successfully scaled AI from pilot to production.