Protocol Intelligence

The MCP
Ecosystem Blog

Security research, tool discovery patterns, and infrastructure insights for developers building with the Model Context Protocol.

Security
Tool poisoning, supply chain, schema drift
Discovery
BM25, semantic routing, context management
Infrastructure
Proxies, gateways, sandboxing, OAuth
Ecosystem
Standards, conferences, community trends
$

Latest Transmissions

The EU AI Act Article 12 Deadline Just Moved. Here Is What Still Has a 2026 Deadline.

The EU Council and Parliament agreed on May 7 to push the high-risk AI compliance deadline from August 2026 to December 2027. Multiple parallel mandates — DORA, NIS2, GPAI obligations, transparency rules — did not move. Here is what the Omnibus VII delay actually changes for organizations deploying AI agents.

eu-ai-actarticle-12omnibus-viidoranis2complianceregulationgovernance

The Official MCP 2026 Roadmap Names the Enterprise Gaps. The Spec Team Is Routing Them Through Extensions.

Anthropic published the official 2026 MCP roadmap. Four enterprise gaps are named directly — audit trails, SSO-integrated auth, gateway behavior, configuration portability — and the spec team is explicitly routing them through extensions and a new Enterprise Working Group rather than into the core protocol.

mcpmodelcontextprotocolroadmapanthropicenterpriseworking-groupauditgovernance

The State of MCP Security 2026: What 24,008 Exposed Secrets and Eight Public Incidents Tell Us About a Maturing Threat Surface

PipeLab's State of MCP Security 2026 is the first comprehensive defense-coverage grading for the MCP ecosystem. 24,008 exposed secrets. 82% path-traversal vulnerability rate. Eight named in-the-wild incidents. The numbers describe a category that has outgrown its own tooling.

mcpsecuritypipelabowaspauditsupply-chainecosystemstate-of

341 Malicious Skills, Zero Registry Checks: What OpenClaw's ClawHavoc Means for MCP

In January 2026, 341 malicious skills infiltrated OpenClaw's official registry. The MCP ecosystem faces the same structural vulnerability — and scanning alone won't fix it.

mcpsecurityregistrysupply-chainopenclawClawHavoc

The Attack That Gets Better as Your AI Gets Smarter

Unit 42's MCPTox benchmark found 72.8% attack success on o1-mini. More capable models are more vulnerable to MCP sampling injection because the attack exploits instruction-following. You cannot model-upgrade your way out of this.

MCPsecuritysamplingprompt-injectionUnit42MCPToxOWASP