Red Specter VECTOR

MCP Protocol Exploitation Framework — 7 subsystems. 172 tests.

v1.0.0
Contents
OverviewInstallationPOISONER — Tool Description PoisoningINJECTOR — Parameter InjectionSSRF — Server-Side Request ForgeryEXFIL — Data ExfiltrationIMPERSONATOR — Server ImpersonationAUTH — Authentication BypassREGISTRY — Registry PoisoningUNLEASHED ModeCLI ReferenceMITRE ATLAS MappingDisclaimer

Overview

VECTOR targets the Model Context Protocol (MCP) — the emerging standard for connecting AI agents to external tools and data sources. Every MCP server exposes tool descriptions, parameter schemas, and authentication flows that can be exploited. VECTOR finds the gaps.

Every tool call is an attack surface. VECTOR finds the gaps.

Installation

$ pip install red-specter-vector
$ vector init
$ vector status

POISONER — Tool Description Poisoning

IDTechniqueDescription
PS-001Description InjectionInject malicious instructions into MCP tool description fields
PS-002Metadata ManipulationAlter tool metadata to influence AI agent decision-making
PS-003Schema PoisoningModify parameter schemas to accept malicious input types
PS-004Trust ExploitationExploit implicit trust in tool registry descriptions

INJECTOR — Parameter Injection

IDTechniqueDescription
IJ-001Type ConfusionExploit parameter type validation weaknesses in MCP servers
IJ-002Nested InjectionInject payloads via nested object parameters
IJ-003Schema BypassBypass JSON schema validation through edge cases
IJ-004Command InjectionInject OS commands through tool parameter values

SSRF — Server-Side Request Forgery

Force MCP servers to make unintended network requests. Internal network scanning via tool call parameters. Cloud metadata endpoint access through SSRF chains. Service-to-service exploitation via MCP server trust relationships.

EXFIL — Data Exfiltration

Extract sensitive data through MCP tool responses. Conversation history leakage via crafted tool calls. Context window exfiltration through response manipulation. Cross-session data theft through persistent tool abuse.

IMPERSONATOR — Server Impersonation

Impersonate legitimate MCP servers to intercept tool calls. Man-in-the-middle attacks on MCP connections. Rogue server injection into tool registries. Trust chain exploitation through server certificate manipulation.

AUTH — Authentication Bypass

Bypass MCP authentication mechanisms. OAuth token theft from tool configurations. Session hijacking via MCP transport layer weaknesses. API key extraction from exposed tool server configurations.

REGISTRY — Registry Poisoning

Poison MCP tool registries with malicious tool packages. Supply chain attacks on MCP tool distribution. Typosquatting legitimate tool names. Malicious tool update injection. Registry trust chain exploitation.

VECTOR UNLEASHED

Standard mode detects. UNLEASHED exploits. Ed25519 crypto. Dual-gate safety. One operator.

# Scan MCP attack surfaces (detection only)
$ vector scan --target mcp-server.example.com

# UNLEASHED (dry run)
$ vector exploit --target mcp-server.example.com --override

# UNLEASHED (live)
$ vector campaign --target mcp-server.example.com --override --confirm-destroy

UNLEASHED mode is restricted to authorised operators with Ed25519 private key access. Targets must be in allowed_targets.txt. 30-minute auto-lock. Unauthorised use violates applicable law.

CLI Reference

CommandDescription
vector initInitialise configuration and Ed25519 keys
vector statusSystem status and subsystem count
vector scanScan MCP servers for vulnerabilities
vector poisonPOISONER — tool description poisoning tests
vector injectINJECTOR — parameter injection tests
vector ssrfSSRF — server-side request forgery tests
vector exfilEXFIL — data exfiltration tests
vector impersonateIMPERSONATOR — server impersonation tests
vector authAUTH — authentication bypass tests
vector registryREGISTRY — registry poisoning tests
vector campaignFull MCP exploitation campaign

MITRE ATLAS Mapping

VECTOR techniques map to MITRE ATLAS tactics including AML.T0040 (ML Supply Chain Compromise), AML.T0043 (Craft Adversarial Data), and emerging MCP-specific threat vectors for tool-based AI agent exploitation.

Disclaimer

Red Specter VECTOR is for authorised security testing only. MCP protocol exploitation can disrupt AI agent operations and expose sensitive data. You must have explicit written permission before testing any system. Unauthorised use may violate the Computer Misuse Act 1990 (UK), CFAA (US), or equivalent legislation.