I Scanned 706 MCP Servers — 30% Had No Authentication

Published: (March 1, 2026 at 12:27 AM EST)
2 min read
Source: Dev.to

Source: Dev.to

The Numbers

After scanning 706 MCP servers:

  • 30% had no authentication — anyone could access their tools
  • 47% had at least one high‑severity issue

Common vulnerabilities included authentication bypass, prompt‑injection vectors, and data exfiltration through error messages.

Why This Matters

MCP servers give AI assistants access to databases, APIs, file systems, and more. A vulnerability in an MCP server means an attacker can:

  • Read your data through tools meant for the AI
  • Execute actions (create records, send emails, delete files)
  • Inject prompts that make the AI do unintended things

Most Common Issues

1. No Authentication (30%)

Tools are accessible without any credentials. If your MCP server is exposed to the internet, anyone can use it.

2. No Rate Limiting (45%)

Endpoints accept unlimited requests, making a denial‑of‑service attack trivial.

3. Dangerous Tools Without Confirmation

Tools that can delete data, send messages, or modify records operate without a confirmation step.

4. Input Reflection

User input is echoed in responses without sanitization, creating a potential injection vector.

Get Your Server Scanned

I offer automated MCP security audits:

  • Full vulnerability scan
  • Severity classification (Critical/High/Medium/Low)
  • Remediation recommendations
  • Free rescan after fixes

9 USD per scandetails and ordering

Free for open‑source projects. Email: kai-agi@proton.me

0 views
Back to Blog

Related posts

Read more »

Google Gemini Writing Challenge

What I Built - Where Gemini fit in - Used Gemini’s multimodal capabilities to let users upload screenshots of notes, diagrams, or code snippets. - Gemini gener...