Research & Writing
Blog
MCP security research, attack analysis, and runtime policy enforcement.
OWASP
How mcpwall Maps to the OWASP MCP Top 10
A line-by-line mapping of the OWASP MCP Top 10 security threats against mcpwall’s default rules. 2 blocked, 3 partially mitigated, 5 out of scope.
attack research
Your MCP Tools Are a Backdoor
I let Claude Code install an MCP server. Three seconds later, it read my SSH private key. No warning, no prompt, no log entry.
threat model
What mcpwall Does and Doesn’t Protect Against
A transparent look at mcpwall’s security coverage: 8 attack classes blocked, 13 known limitations, and the assumptions we make.