SecAppDev 2026 lecture details

Model Context Protocol (MCP) Security

An introduction to the Model Context Protocol (MCP) and its security risks. Covers MCP architecture, threat models, and practical defenses to prevent prompt injection, tool abuse, and data leakage in AI tool integrations.

Schedule TBD
Abstract

The Model Context Protocol (MCP) allows AI systems to interact with external tools, services, and data sources. While this expands capability, it also introduces new security risks including prompt injection, data exfiltration, tool abuse, and trust boundary violations. This session explains the MCP architecture and threat model, analyzes common attack patterns, and presents practical defenses such as OAuth 2.1 integration, AI validation, capability scoping, and policy enforcement. Attendees will learn how to design and operate MCP integrations safely in real-world AI system.

Key takeaway

Understand MCP risks and apply concrete controls to secure AI tool integrations and prevent prompt injection, tool abuse, and data exfiltration.

Content level

Advanced

Target audience

Software engineers, AppSec engineers, AI engineers, and security architects building AI systems.

Prerequisites

Basic understanding of AI/LLMs, APIs, and common application security concepts such as injection and access control.

Join us for SecAppDev. You will not regret it!

Grab your seat now
Jim Manico
Jim Manico

Secure Coding Instructor, Manicode Security

Expertise: Application security

More details

Join us for SecAppDev. You will not regret it!

Grab your seat now

SecAppDev offers the most in-depth content you will find in a conference setting

Grab your seat now