I wrote a blogpost about how an attacker can use prompt injections to break origin isolation and cause forced tool execution on a victim page.
https://www.earlence.com/blog.html#/post/webmcp-sameorigin
This requires some serious thinking about WebMCP's security properties.
I wrote a blogpost about how an attacker can use prompt injections to break origin isolation and cause forced tool execution on a victim page.
https://www.earlence.com/blog.html#/post/webmcp-sameorigin
This requires some serious thinking about WebMCP's security properties.