Tool Poisoning
Attackers compromise MCP-connected tools to manipulate agent behavior, extract context, or return malicious outputs.
Definition
Tool Poisoning is a critical attack on the input layer of the Model Context Protocol (MCP). In this attack, adversaries tamper with a tool’s description, parameters, or exposed interface to trick the agent into invoking it incorrectly or dangerously. By manipulating what a tool claims to do, attackers can steer agent execution toward malicious outcomes, bypass validation, or leak sensitive data.
This type of attack lives in the input layer of the MCP model, exploiting how tools are registered, described, and selected before execution begins.
How Akto MCP Security Helps
Akto secures every layer of the Model Context Protocol by continuously monitoring agents, tools, and connected APIs. It discovers MCP servers automatically, maps related tool and API activity, and runs deep security tests to identify misconfigurations, unexpected behaviors, and abuse patterns. Each MCP interaction is validated in real time to prevent threats like unauthorized tool usage, context leaks, or prompt manipulation. With built-in test coverage for every known MCP attack vector, Akto helps teams catch issues early and keep agent environments safe and compliant.