Demystifying MCP Security: The Missing Layer in Enterprise AI Infrastructure
As the year 2025 is gloriously dubbed the “Year of the Agent,” we’re seeing the agent paradigm rapidly penetrate the cybersecurity realm. Recently, our AI and cybersecurity team at Sixty Degree Capital (shout out to Jojo Ye, MBA and Mohan Zhang ) collectively conducted research focused on the core MCP (multi-agent control plane) security components within the broader agent security framework.
MCP is reshaping Enterprise Architecture. Fundamentally, MCP reframes how LLMs interact with enterprise systems by enabling unified communication between large language models and SaaS applications. It introduces an abstraction layer over resources—data (text or binary, such as URIs or tables) and the actions on those resources (e.g., list, read, update). This unified framing offers power and convenience, but introduces novel security challenges across the MCP lifecycle.
There are two primary phases to securing MCP:
Pre-deployment or Build Phase – This is when services and APIs are registered within the MCP framework. One of the biggest concerns during this phase is the emergence of shadow MCPs and untracked APIs. While API penetration testing is commonly employed to detect issues before release, MCP introduces a new and complex attack surface, including threats like supply chain attacks originating from poorly governed service registration or third-party dependencies.
Runtime Phase – As MCP enters production, it begins mediating intensive data interactions between LLMs and enterprise systems. It not only authorizes and accesses potentially sensitive data, but also injects prompts into LLMs—creating the same risk surface faced by agents in terms of prompt injection, data leakage, or misuse of authority. To address these, traditional multi-layered data protection approaches—like fine-grained user management, authentication, and real-time data access analysis—need to be extended and re-engineered to fit the MCP paradigm.
More specifically, identity management and policy enforcement remain critical gaps. MCP’s role as a centralized proxy allows it to break silos between SaaS applications, but its identity control mechanisms are often underdeveloped. Without proper identity modeling and policy orchestration, engineers are reluctant to adopt fully centralized MCP structures—resulting in operational friction and security debt.
Last but not least, the action flow across MCP—both inbound data integration, outbound LLM interaction and further exposes SaaS APIs may lead to potential misuse. Any outbound action triggered through MCP can affect downstream applications or services, reinforcing the need for tighter guardrails, context-aware access controls, and runtime validation mechanisms to mitigate risks associated with delegated authority and prompt-driven behaviors.
From our research, we’ve identified four foundational subspaces where builders and investors should pay close attention:
Given that it’s still early days in agent security, we’ll continue deepening our research and issue new editions of our agent security map. We’ve kept some stealth startups anonymous for now—but as these entities emerge publicly, we’ll add them to our evolving map, alongside new logos as they appear.
Securing AI and infrastructure.
1wThe AI software stack needs a security layer! Great analysis of what is emerging to provide that. Thanks!
Well said, Brett Liu, Engineer/CFA. Thanks for the mention 💚 Looking forward to next week!
Thanks for shout out Brett Liu, Engineer/CFA!