mischard
ProAgent
0ops_ctf
Task: AI agent service with MCP support and user-configurable MCP server URL. Solution: MCP Tool Poisoning via malicious tool descriptions that instruct the agent to call built-in read_file("/flag") and pass the contents back through a two-step workflow.
$ ls tags/ techniques/
ai_agentmcpmodel_context_protocoltool_poisoningindirect_prompt_injectionssh_tunnelreverse_tunnelllm_exploitationagent_abuseread_file
MCP Tool Poisoning via malicious tool descriptionsIndirect Prompt Injection through tool responsesSSH reverse tunnel for exposing local MCP serverTwo-step workflow exploitation
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Create a free account with GitHub, then upgrade to Pro.
$ssh [email protected]