VECTOR

MCP Protocol Exploitation

Every tool call is an attack surface. VECTOR finds the gaps. Tool description poisoning, parameter injection, SSRF, data exfiltration, server impersonation, authentication bypass, and registry poisoning — weaponised for authorised red team engagements.

7
Subsystems
172
Tests
View Documentation GitHub

Every Tool Call Is an Attack Surface

VECTOR targets the Model Context Protocol — the emerging standard for AI tool integration. Every MCP server, every tool description, every parameter schema, every authentication flow — all exploitable. VECTOR finds the gaps between what MCP promises and what it actually secures.

01

POISONER

TOOL DESCRIPTION POISONING

Inject malicious instructions into MCP tool descriptions. Manipulate AI behaviour through crafted tool metadata. Exploit trust in tool registries to alter agent decisions.

02

INJECTOR

PARAMETER INJECTION

Inject payloads through MCP tool parameters. Exploit insufficient input validation. Parameter type confusion. Schema bypass. Nested object injection.

03

SSRF

SERVER-SIDE REQUEST FORGERY

Force MCP servers to make unintended requests. Internal network scanning via tool calls. Cloud metadata endpoint access. Service-to-service exploitation.

04

EXFIL

DATA EXFILTRATION

Extract sensitive data through MCP tool responses. Conversation history leakage. Context window exfiltration. Cross-session data theft via tool abuse.

05

IMPERSONATOR

SERVER IMPERSONATION

Impersonate legitimate MCP servers. Man-in-the-middle tool calls. Rogue server injection. Trust chain exploitation. Credential harvesting via fake tools.

06

AUTH

AUTHENTICATION BYPASS

Bypass MCP authentication mechanisms. Token theft. Session hijacking. OAuth flow exploitation. API key extraction from tool configurations.

07

REGISTRY

REGISTRY POISONING

Poison MCP tool registries. Supply chain attacks on tool packages. Typosquatting tool names. Malicious tool updates. Registry trust exploitation.

UNLEASHED Gate

Standard mode detects. UNLEASHED exploits. Ed25519 crypto. Dual-gate safety. One operator.

Detection

Maps MCP attack surfaces. Identifies vulnerable tool descriptions and parameter schemas. No exploitation. Reports only.

Dry Run

Plans full MCP exploitation campaigns. Shows exactly what would work. Ed25519 required. No execution.

Live Execution

Cryptographic override. Private key controlled. One operator. Founder's machine only.

THIS TOOL IS FOR AUTHORISED SECURITY TESTING ONLY. EVERY EXECUTION IS SIGNED AND LOGGED.

172
Tests
7
Subsystems
50,914
Ecosystem Tests
Available On

Security Distros & Package Managers

Kali Linux
.deb package
Parrot OS
.deb package
BlackArch
PKGBUILD
REMnux
.deb package
Tsurugi
.deb package
PyPI
pip install

Every Tool Call Is an Attack Surface. VECTOR Finds the Gaps.

7 subsystems. 172 tests. MCP protocol exploitation. The tool that proves your AI tool integrations aren't safe.