To unlock these tests: publish your source on GitHub.
- C1Command InjectionCode Vulnerabilities › Command & Shell Execution
- C10Prototype PollutionCode Vulnerabilities › Data Store Injection
- C11ReDoS — Catastrophic Regex BacktrackingCode Vulnerabilities › Server-Hardening Failures
- C12Unsafe DeserializationCode Vulnerabilities › Dynamic Code Evaluation & Deserialization
- C13Server-Side Template Injection (SSTI)Code Vulnerabilities › Dynamic Code Evaluation & Deserialization
- C14JWT Algorithm Confusion / None Algorithm AttackCode Vulnerabilities › Insecure Credential & Crypto
- C15Timing Attack on Secret or Token ComparisonCode Vulnerabilities › Insecure Credential & Crypto
- C16Dynamic Code Evaluation with User InputCode Vulnerabilities › Command & Shell Execution
- C2Path TraversalCode Vulnerabilities › Filesystem & Network Traversal
- C3Server-Side Request Forgery (SSRF)Code Vulnerabilities › Filesystem & Network Traversal
- C4SQL InjectionCode Vulnerabilities › Data Store Injection
- C5Hardcoded Secrets in Source CodeCode Vulnerabilities › Insecure Credential & Crypto
- C6Error Message Information LeakageCode Vulnerabilities › Server-Hardening Failures
- C7Wildcard CORS ConfigurationCode Vulnerabilities › Server-Hardening Failures
- C8No Authentication on Network-Exposed ServerCode Vulnerabilities › Server-Hardening Failures
- C9Excessive Filesystem ScopeCode Vulnerabilities › Command & Shell Execution
- G7DNS-Based Data Exfiltration ChannelData Exfiltration › Explicit Network Exfiltration
- H1MCP OAuth 2.0 Insecure ImplementationAuthentication & Identity › OAuth Misimplementation
- I12Capability Escalation Post-InitializationHuman Oversight › Post-Init Capability Escalation
- I15Transport Session SecurityAuthentication & Identity › Session & Transport Security
- J1Cross-Agent Configuration PoisoningSupply Chain Security › Config Injection & Bridge Supply Chain
- J2Git Argument InjectionCode Vulnerabilities › Command & Shell Execution
- J4Health Endpoint Information DisclosureModel Manipulation › Information Disclosure Via Debug Surface
- J5Tool Output Poisoning PatternsPrompt Injection › Indirect Gateway Injection
- J7OpenAPI Specification Field InjectionCode Vulnerabilities › OpenAPI / Spec Field Injection
- K1Absent Structured LoggingAudit & Logging › Absent or Unstructured Logging
- K10Package Registry SubstitutionTool Poisoning › Update-Channel Spoofing
- K11Missing Server Integrity VerificationSupply Chain Security › Known Vulnerable Dependencies
- K12Executable Content in Tool ResponseTool Poisoning › Annotation Deception
- K13Unsanitized Tool OutputTool Poisoning › Annotation Deception
- K14Agent Credential Propagation via Shared StateAuthentication & Identity › Cross-Boundary Credential Sharing
- K16Unbounded Recursion / Missing Depth LimitsProtocol & Transport › JSON-RPC Batching & Flooding
- K17Missing Timeout or Circuit BreakerDenial of Service › Recursion & Loop Bombs
- K18Cross-Trust-Boundary Data Flow in Tool ResponseData Exfiltration › Source-to-Sink Flow
- K19Missing Runtime Sandbox EnforcementDenial of Service › Timeout & Circuit-Breaker Gaps
- K2Audit Trail DestructionAudit & Logging › Log Destruction
- K20Insufficient Audit Context in LoggingAudit & Logging › Insufficient Audit Context
- K3Audit Log TamperingAudit & Logging › Log Destruction
- K5Auto-Approve / Bypass Confirmation PatternHuman Oversight › Auto-Approve & Bypass
- K6Overly Broad OAuth ScopesAuthentication & Identity › OAuth Misimplementation
- K7Long-Lived Tokens Without RotationAuthentication & Identity › OAuth Misimplementation
- K8Cross-Boundary Credential SharingData Exfiltration › Trust-Boundary Data Flow
- K9Dangerous Post-Install HooksSupply Chain Security › Install-Time Execution
- L1GitHub Actions Tag PoisoningSupply Chain Security › CI/CD Poisoning
- L10Registry Metadata SpoofingTool Poisoning › Update-Channel Spoofing
- L11Environment Variable Injection via MCP ConfigSupply Chain Security › Config Injection & Bridge Supply Chain
- L12Build Artifact TamperingCode Vulnerabilities › OpenAPI / Spec Field Injection
- L13Build Credential File TheftSupply Chain Security › CI/CD Poisoning
- L14Hidden Entry Point MismatchSupply Chain Security › Manifest & Entry-Point Confusion
- L15Update Notification SpoofingTool Poisoning › Behavior Drift
- L2Malicious Build Plugin InjectionCode Vulnerabilities › OpenAPI / Spec Field Injection
- L3Dockerfile Base Image Supply Chain RiskSupply Chain Security › Registry & Distribution Substitution
- L4MCP Config File Code InjectionSupply Chain Security › Manifest & Entry-Point Confusion
- L5Package Manifest Confusion IndicatorsSupply Chain Security › Manifest & Entry-Point Confusion
- L6Config Directory Symlink AttackSupply Chain Security › Registry & Distribution Substitution
- L7Transitive MCP Server DelegationSupply Chain Security › Manifest & Entry-Point Confusion
- L8Version Rollback / Downgrade AttackSupply Chain Security › Registry & Distribution Substitution
- L9CI/CD Secret Exfiltration PatternsSupply Chain Security › CI/CD Poisoning
- M2TokenBreak Boundary ManipulationModel Manipulation › Tokenizer Boundary Attacks
- M6Progressive Context Poisoning EnablersHuman Oversight › Tool-Position & Progressive Poisoning
- M7Tool Response Structure BombDenial of Service › Response Payload Amplification
- M8Inference Cost AmplificationDenial of Service › Inference Cost Amplification
- M9Model-Specific System Prompt ExtractionModel Manipulation › Reasoning Extraction
- N1JSON-RPC Batch Request AbuseProtocol & Transport › JSON-RPC Batching & Flooding
- N10Incomplete Handshake Denial of ServiceProtocol & Transport › JSON-RPC Batching & Flooding
- N11Protocol Version Downgrade AttackProtocol & Transport › Protocol Version & Method Confusion
- N12Resource Subscription Content MutationPrompt Injection › Indirect Gateway Injection
- N13HTTP Chunked Transfer SmugglingProtocol & Transport › Streaming & Session Hijacking
- N14Trust-On-First-Use Bypass (TOFU)Authentication & Identity › Session & Transport Security
- N15JSON-RPC Method Name ConfusionProtocol & Transport › Protocol Version & Method Confusion
- N2JSON-RPC Notification FloodingProtocol & Transport › JSON-RPC Batching & Flooding
- N3JSON-RPC Request ID CollisionProtocol & Transport › JSON-RPC Batching & Flooding
- N4JSON-RPC Error Object InjectionPrompt Injection › Protocol-Surface Injection
- N5Capability Downgrade DeceptionProtocol & Transport › Protocol Version & Method Confusion
- N6SSE Reconnection HijackingProtocol & Transport › Streaming & Session Hijacking
- N7Progress Token Prediction and InjectionProtocol & Transport › Streaming & Session Hijacking
- N8Cancellation Race ConditionProtocol & Transport › JSON-RPC Batching & Flooding
- N9MCP Logging Protocol InjectionPrompt Injection › Context & Trust Manipulation
- O10Privacy-Violating TelemetryData Exfiltration › Covert Channels
- O4Clipboard and UI Exfiltration InjectionData Exfiltration › Trust-Boundary Data Flow
- O5Environment Variable HarvestingData Exfiltration › Covert Channels
- O6Server Fingerprinting via Error ResponsesData Exfiltration › Covert Channels
- O8Timing-Based Covert ChannelData Exfiltration › Covert Channels
- O9Ambient Credential ExploitationData Exfiltration › Covert Channels
- P1Docker Socket Mount in ContainerContainer & Runtime › Container Escape Vectors
- P10Host Network Mode and Missing Egress ControlsContainer & Runtime › Host Mount & Network
- P2Dangerous Container CapabilitiesContainer & Runtime › Container Escape Vectors
- P3Cloud Metadata Service AccessContainer & Runtime › Cloud Metadata Access
- P4TLS Certificate Validation BypassContainer & Runtime › TLS & Crypto Misconfig
- P5Secrets Exposed in Container Build LayersSupply Chain Security › Registry & Distribution Substitution
- P6LD_PRELOAD and Shared Library HijackingContainer & Runtime › Container Escape Vectors
- P7Sensitive Host Filesystem MountContainer & Runtime › Host Mount & Network
- P8Insecure Cryptographic Mode or Static IV/NonceContainer & Runtime › TLS & Crypto Misconfig
- P9Missing Container Resource LimitsDenial of Service › Container Resource Exhaustion
- Q13MCP Bridge Package Supply Chain AttackSupply Chain Security › Config Injection & Bridge Supply Chain
- Q15A2A/MCP Protocol Boundary ConfusionHuman Oversight › Trust-Delegation Confusion
- Q3Localhost MCP Service HijackingProtocol & Transport › Localhost & Concurrency Hijack
- Q4IDE MCP Configuration InjectionSupply Chain Security › Config Injection & Bridge Supply Chain
- Q7Desktop Extension Privilege ChainContainer & Runtime › Privileged Roots & Extensions