Python# Proprietary Software License for Abacum MCP Server
**Copyright (c) 2025, Abacum. All rights reserved.**
This software, including all source code, executables, and accompanying files (collectively, the "Software"), is the confidential and proprietary property of Abacum and its licensors.
**1. Grant of Use:**
This license grants Abacum a non-exclusive, non-transferable, royalty-free, perpetual license to:
(a) Use the Software solely for Abacum's clients and internal business purposes.
(b) Copy the Software only as necessary for deployment, backup, and internal testing required for Abacum's internal business operations.
**2. Restrictions:**
Except as expressly permitted by this license, Abacum is prohibited from:
(a) Redistributing, sublicensing, leasing, selling, or otherwise transferring the Software or any copies thereof to any third party.
(b) Modifying, adapting, reverse engineering, de-compiling, disassembling, or creating derivative works of the Software.
(c) Allowing any party outside of Abacum to access, view, or utilize the source code or executables.
**3. No Warranty:**
The Software is provided "AS IS," without warranty of any kind, express or implied. Abacum disclaims all warranties, including, but not limited to, the implied warranties of merchantability, fitness for a particular purpose, and non-infringement.
Follow the MCP specification for server metadata. Include server name, version, and protocol version. Provide descriptions for all tools and parameters.
Tools
No tools exposed by this server.
Security Category Deep Dive
Sub-Category Tree · Remediation Roadmap · Attack Stories · Compliance Overlay · ATLAS Techniques · Maturity Model
⚡
Prompt Injection
Prompt & context manipulation attacks
69
Maturity
14
Rules
5
Sub-Categories
1
Gaps
64%
Implemented
56
Tests
1
Stories
PI-DIRDirect Input Injection
100%3 rules
Injection via tool descriptions and parameter fields
GAP-001Prompt Injection Coverage GapMissing detection coverage for emerging prompt injection attack variants not addressed by current rules
PI-INDIndirect / Gateway Injection
100%4 rules
Hidden instructions via external content and tool responses
PI-CTXContext Manipulation
100%2 rules
Context window saturation and prior-approval exploitation
PI-ENCEncoding & Obfuscation
100%3 rules
Payload hiding via invisible chars, base64, schema fields
PI-TPLTemplate & Output Poisoning
100%2 rules
Injection via prompt templates and runtime tool output