Agent Horror Stories

Viewer discretion advised ยท Updated nightly

โ† Back to the feed
Curatedsecurity breachยท

Thousands of MCP Servers Exposed to the Internet With No Authentication

Security researchers discovered thousands of MCP servers deployed with no authentication whatsoever, giving anyone on the internet full access to the tools and data these servers control.

Original source
View on equixly.com
Nightmare Fuel

No password. No API key. No auth at all. Just open to the internet.

Security researchers at Equixly discovered thousands of MCP servers deployed with zero authentication, fully accessible to anyone who could reach them over the network. Each exposed server provided unrestricted access to whatever tools, databases, and APIs the MCP server was configured to control.

The exposed servers included connections to file systems, databases, email systems, code repositories, and cloud infrastructure. An attacker didn't need to hack anything โ€” they just needed to connect to an MCP server that nobody had bothered to protect.

The root cause was systemic: the MCP specification doesn't mandate authentication by default. Many MCP server implementations ship without auth, and developers deploy them without adding any. The result is a massive, growing attack surface of unauthenticated tool-access servers scattered across the internet.

The MCP ecosystem has a default-open security model. Thousands of servers are running right now with no auth. Each one is a free backdoor to whatever it's connected to.

More nightmares like this