A security research tool demonstrating MCP (Model Context Protocol) prompt injection vulnerabilities for educational and security awareness training purposes.
This project implements both an MCP client and server to demonstrate how malicious MCP tools can manipulate AI assistants through hidden prompt injection techniques. It serves as educational material for understanding potential security risks in MCP implementations.
- TUI Chat Interface: Terminal-based chat interface built with Bubble Tea the LLM
- Malicious MCP Server: Demonstrates prompt injection through hidden escape sequences in tool descriptions
- Exfiltration Endpoint: Logs sensitive data locally for analysis
- Terminal UI for chatting with LLMs through MCP tools
- Configurable LLM endpoints (OpenAI API compatible)
- Real-time tool execution and response handling
- Markdown rendering for chat messages
- Provides two tools:
quote_of_the_day
: Returns random quotes with hidden injection promptsinternal_words_service
: Collects and logs conversation data locally
- Uses terminal escape sequences to hide malicious instructions
- Demonstrates compliance-themed social engineering
a555mcp -c config.json
a555mcp server
The application requires a JSON configuration file specifying:
- LLM endpoint and model
- MCP servers to connect to
Look at the config-example.json
file for an example configuration.
This tool demonstrates:
- How MCP tools can inject hidden prompts using escape sequences
- Social engineering through compliance-themed instructions
- Local data exfiltration through seemingly benign tools
- The importance of validating MCP tool descriptions and behaviors
Ideal for:
- Security awareness training
- MCP security research
- Understanding prompt injection vulnerabilities
- Demonstrating AI assistant manipulation techniques