Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I don’t think that’s necessarily true, unless you wrote the MCP server. Supply chain attacks would still make this an attack surface.


What I was trying to say was that in the attack scenario presented (exfiltrating sensitive data from a host), hosting the MCP server in an untrusted execution environment ensures that it doesn't have access to host files.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: