Blog

Security insights for the MCP ecosystem

📅

The OWASP MCP Top 10: Why Your AI Agents Are Vulnerable

Anthropic's Model Context Protocol is exploding in adoption, but most MCP servers ship with critical security flaws. Here's what the OWASP MCP Top 10 says, and what you can do about it.

security ai mcp owasp
Read more →
📅

How to Secure Your MCP Servers: A Practical Guide

A step-by-step guide to hardening your MCP server configurations. Covers tool descriptions, schemas, permissions, transport, supply chain, and CI/CD integration.

security mcp guide best-practices
Read more →
📅

How to Add MCP Security Scanning to Your CI/CD Pipeline

Step-by-step tutorial for adding automated MCP security scanning to GitHub Actions, GitLab CI, and any CI/CD pipeline using the Ferrok API.

security mcp cicd devops
Read more →
📅

MCP Tool Poisoning: How Attackers Hijack AI Agents Through Tool Descriptions

Learn how malicious actors can compromise AI agents by injecting malicious tool descriptions into MCP servers, and how to defend against these attacks.

security mcp tool-poisoning
Read more →
📅

EU AI Act and MCP: What You Need to Know Before August 2026

The EU AI Act goes into full effect in August 2026. Discover what compliance means for MCP deployments and how to prepare your systems before the deadline.

security compliance eu-ai-act mcp
Read more →
📅

Ferrok vs Snyk Agent Scan: Which MCP Security Scanner Is Right for You?

A comprehensive comparison of MCP security scanning tools. Understand the differences in detection accuracy, integration, and reporting capabilities.

security mcp comparison
Read more →
📅

Preventing Prompt Injection in MCP: A Practical Guide

Explore effective strategies for defending MCP systems against prompt injection attacks, including input validation, output filtering, and runtime detection.

security mcp prompt-injection
Read more →
📅

MCP Rug Pull Attacks: When Trusted Tools Turn Malicious

A deep dive into supply chain attacks on MCP servers. Learn how attackers compromise trusted tools and how to implement defense mechanisms.

security mcp supply-chain
Read more →