Exposing the Unseen: Mapping MCP Servers Across the Internet

38 gepeto42 12 7/18/2025, 1:29:50 PM knostic.ai ↗

Comments (12)

NitpickLawyer · 2h ago
Sure, but I was expecting more details on what was available. At least some analysis (perhaps using embeddings) on common function names, types, etc. What are people exposing? Is there overlap? What % of the open servers looked the same (indicating a common example / tutorial deployment)? What's the proportion of read/write functions (again using embeddings / word cloud maybe?)...

As is the article feels a bit light on details. I'm not surprised that there are open servers out there, but if you're writing an article about that, at least provide interesting details.

orliesaurus · 22m ago
It's like 2010 all over again: People would put api.domain.com up and no auth - great times for builders..and ill-intentioned folks!
qwertox · 28m ago
Do major LLM providers, which allow the user of remote MCP to my own servers announce the IP ranges from which they will contact my servers?

In that case, limiting the remote IPs would also be useful. I haven't played around with MCP, but it's on my todo list.

john_minsk · 1h ago
Hmmm. I thought that's the idea of MCP server - give LLM an interface to use your service. Why would it require authentication? One of the tools could be to authenticate. Please destroy this position if I'm wrong.
victorbjorklund · 55m ago
That only makes sense if models were autonomously adding MCP servers and managing accounts themselves. Currently, users add MCP servers to their clients (like Cursor or Claude Desktop), so authentication should happen at that level. If the model handled auth, you'd still need to provide credentials to the LLM for it to provide it to the MCP server anyway. It's better to pass auth data as for example headers in requests - this way your credentials never get sent to the model provider (unless you're running locally).
prophesi · 59m ago
The two things I can think of are MCP servers with functions that make calls to a database with sensitive information, or are easy to pwn due to propping them up in a hasty and irresponsible manner.

The article would actually be interesting if they tried either of those with the servers they found.

smrtinsert · 1h ago
What happened to best practices? Starting a demo locally is something but opening it up to the internet irresponsibly is something else.
debarshri · 1h ago
At least you can chat with the server when you feel lonely as a hacker. With MongoDB, you only get bson data.
rvz · 1h ago
> We identified a total of 1,862 MCP servers exposed to the internet. From this set, we manually verified a sample of 119. All 119 servers granted access to internal tool listings without authentication.

Here we go again.

Before we had seen (and there still) MongoDB databases exposed all over the internet with zero credentials protecting them. (you can just connect to them and you are in.)

Now we have exposed MCP servers waiting to be prompt injected and their data to be exfiltrated from say, a connected service or database if they are connected to any. [0]

So now you can just talk to anyone's exposed MCP server and ask for the secret passwords, environment variables and sensitive data.

And the AI will just hand it all over.

[0] https://news.ycombinator.com/item?id=44507024

jddj · 1h ago
How did they breach the server? They uh.. They told it that someone would die if it didn't send the .env with the AWS keys to prevent-the-tragedy.xyz
exe34 · 31m ago
I love that it's almost like shenanigans around the 3 laws of robotics.
mistrial9 · 1h ago
hide all the printers! demand biometrics!

safety people are excessive, too