
The MCP Security Problem Is Really a Least-Privilege Problem
- 3 minutes - Mar 22, 2026
- #ai#mcp#security#protocols#enterprise
The most important security story around agent infrastructure right now is not a single CVE. It is the growing realization that MCP security is immature by default.
As of March 2026, reporting around MCP security points to more than 30 CVEs, thousands of publicly reachable servers with weak or no authentication, and a still-evolving roadmap for making the protocol more production-ready. One especially concerning figure: roughly 36% of observed MCP servers reportedly accept connections without meaningful authentication.
That is obviously a protocol and ecosystem problem. But underneath it is something even more fundamental: many teams still are not designing agent access around least privilege.
Why This Is Happening
MCP is useful because it gives agents a standard way to connect to tools, data sources, and operational systems. That creates leverage fast. It also creates temptation fast.
Once teams realize an agent can talk to:
- a database
- a ticketing system
- cloud infrastructure
- internal APIs
- knowledge systems
the default instinct is to wire everything up so the agent can be “helpful.”
That is exactly how broad, fragile permission surfaces get created.
The Real Security Issue
The protocol itself matters, of course. Secure defaults, auth models, connection handling, and SDK behavior all matter. But even with a perfect protocol, the system would still be dangerous if teams gave agents broad access without carefully limiting scope.
Least privilege is boring until it is the difference between:
- an agent that can read one repository’s docs
- and an agent that can reach production data, modify workflows, and call internal admin tools
The second case is where prompt injection, malicious tool output, or simple model error stop being annoying and start becoming operational incidents.
Why MCP Makes This More Visible
MCP does not create the least-privilege problem. It makes it easier to see because it standardizes the connection layer.
That has two consequences:
The upside:
Teams can finally build reusable, portable integrations instead of custom one-offs for every tool.
The downside:
It becomes easier to roll out a lot of connectivity before governance catches up.
That is why the current MCP security conversation feels chaotic. The ecosystem moved quickly on interoperability because the value was immediate. It is now being forced to catch up on permission models, authentication, and operational safety.
What Teams Should Do
If your team is using or planning MCP, the most practical mindset is this:
Assume secure connectivity is your job until the ecosystem proves otherwise.
That means:
- expose the minimum tool surface an agent actually needs
- use separate identities for separate agent workflows
- prefer read-only access wherever possible
- isolate sensitive systems behind explicit approval or separate paths
- log agent access in a way humans can audit later
- treat unauthenticated or weakly authenticated MCP servers as unacceptable in production
This is not glamorous work. It is foundational work.
The Broader Lesson
The AI tool market spent a long time asking whether agents could be useful. Now we are in the phase where organizations need to ask whether agents can be safely useful at scale.
That is a different standard. It rewards:
- disciplined permissions
- stronger identity boundaries
- protocol maturity
- infrastructure thinking instead of demo thinking
MCP is still likely to matter a great deal. The standardization momentum is real, and the interoperability benefits are obvious. But the teams that win with it will not be the ones that connected everything first. They will be the ones that designed clear, narrow, auditable access patterns from the start.
The MCP security problem is real. But the deeper lesson is that agent systems cannot be safe if least privilege is treated as an optional polish step instead of a design principle.

