Detection Library
highexperimentalLinuxOCINetworkT1071.001

Linux Agent Connecting To Unapproved MCP Or Tool Endpoints

Detects AI agent processes connecting to MCP server ports or tool endpoint addresses that are not in the approved configuration, which may indicate tool hijacking or connection to a rogue MCP server.

Updated Jan 10, 2025 · OCI AI Security Team

agentic-aisupply-chainmcptool-endpointlinuxociowasp-asi04

Problem Statement

MCP servers define the tools available to an AI agent. Connecting to a rogue MCP server allows an attacker to inject malicious tool definitions, override tool behaviors, or exfiltrate tool call results containing sensitive data.

Sample Logs

{"timestamp":"2025-01-10T11:55:30Z","computer_name":"oci-worker-18","user":"agent_svc","image":"/usr/bin/python3","destination_hostname":"rogue-mcp.attacker.com","destination_ip":"203.0.113.5","destination_port":8765,"initiated":true}

Required Fields

image
destination_hostname
destination_ip
destination_port
user
computer_name

False Positives

  • ·Legitimate MCP servers running on non-standard ports that are approved but not yet in the allowlist
  • ·Development environments with local MCP servers accessible from test workers

Tuning Guidance

Maintain an explicit allowlist of approved MCP server IPs and hostnames. Alert on any connection to MCP-typical ports that resolves to a hostname not in the allowlist.