Source
arXiv:2603.22489 — Model Context Protocol Threat Modeling and Analyzing Vulnerabilities to Prompt Injection with Tool Poisoning (March 23, 2026)
Key Contribution
Threat-models MCP clients specifically. Identifies tool poisoning as the critical client-side attack vector (malicious tool descriptions injecting instructions into the agent's context). Evaluates 7 MCP clients' defenses and proposes a multi-layered mitigation strategy: description sanitization, trust scoring, runtime policy enforcement, and audit logging.
Relevance to Zeph
Directly targets zeph-mcp and zeph-tools:
Implementation Sketch
Add structured tool-description threat category to TrustScoreStore (penalize injection patterns)
Cross-reference with ContentSanitizer — apply quarantine-style scanning to tool descriptions at ingest
Integrate paper's policy labels into sanitize_tools() output annotations
Related: security(tools): adversarial policy agent — pre-execution LLM validation of tool calls against user-defined policies #2447 (pre-execution LLM policy validation), research(security): MCP tool trust/confidentiality metadata — capability labels + STPA-based data-flow policy (arXiv:2601.08012) #2420 (MCP trust/confidentiality metadata)
Priority
P2 — active attack surface in production MCP client code; paper directly maps to Zeph's architecture.
Source
arXiv:2603.22489 — Model Context Protocol Threat Modeling and Analyzing Vulnerabilities to Prompt Injection with Tool Poisoning (March 23, 2026)
Key Contribution
Threat-models MCP clients specifically. Identifies tool poisoning as the critical client-side attack vector (malicious tool descriptions injecting instructions into the agent's context). Evaluates 7 MCP clients' defenses and proposes a multi-layered mitigation strategy: description sanitization, trust scoring, runtime policy enforcement, and audit logging.
Relevance to Zeph
Directly targets
zeph-mcpandzeph-tools:ToolExecutorandsanitize_tools()pathsanitize.rstruncation are partial mitigationsImplementation Sketch
TrustScoreStore(penalize injection patterns)ContentSanitizer— apply quarantine-style scanning to tool descriptions at ingestsanitize_tools()output annotationsPriority
P2 — active attack surface in production MCP client code; paper directly maps to Zeph's architecture.