Skip to content

Hide Navigation Hide TOC

MCP Tool Description — IMPORTANT Tag Cross-Tool Shadowing Attack - ATR-2026-00161 (27b999f5-cda4-5cd6-afe2-7c8a21dd139e)

Detects MCP tool poisoning attacks that embed hidden instructions inside an XML-style tag in a tool description, or that chain behavior across multiple co-installed MCP servers by referring to "the also present" or "previously declared" tool. This is the attack class Invariant Labs published proof-of-concept exploits for in April 2025 against Claude Desktop and Cursor, achieving SSH private key and mcp.json configuration exfiltration. Also detects the January 2026 fake "Postmark MCP Server" pattern of embedding sensitive file read directives in tool descriptions. The visible tool signature looks benign (e.g. a numeric "add" function), but the description contains LLM-visible directives that the UI does not render. Users approving the tool on the basis of its surface behavior are unaware of the shadowed instruction.

Cluster A Galaxy A Cluster B Galaxy B Level
MCP Tool Description — IMPORTANT Tag Cross-Tool Shadowing Attack - ATR-2026-00161 (27b999f5-cda4-5cd6-afe2-7c8a21dd139e) Agent Threat Rules LLM Plugin Compromise (adbb0dd5-ff66-4b2f-869f-bfb3fdb45fc8) MITRE ATLAS Attack Pattern 1
MCP Tool Description — IMPORTANT Tag Cross-Tool Shadowing Attack - ATR-2026-00161 (27b999f5-cda4-5cd6-afe2-7c8a21dd139e) Agent Threat Rules Indirect (a4a55526-2f1f-403b-9691-609e46381e17) MITRE ATLAS Attack Pattern 1
LLM Prompt Injection (19cd2d12-66ff-487c-a05c-e058b027efc9) MITRE ATLAS Attack Pattern Indirect (a4a55526-2f1f-403b-9691-609e46381e17) MITRE ATLAS Attack Pattern 2