SAFE-MCP Contributor Opportunities

Always-up-to-date list of techniques ready for contribution

Last updated: November 29, 2025

84

Total Techniques

47

Contributed

13

In Progress

27

Available

Hackathon Assignments (13)

These techniques are assigned to hackathon participants and are not available for claiming.

SAFE-MCP Nov 23 Hackathon

Technique IDAssigneeTactic
SAFE-T1207Petrus MgbebuPersistence
SAFE-T1308Obiora EbukaPrivilege Escalation
SAFE-T1407Afeez OlawaleDefense Evasion
SAFE-T1506Ayomide OnatolaCredential Access
SAFE-T1507Pritika BistaCredential Access
SAFE-T1911Silva ChijiokeExfiltration

SAFE-MCP Nov 22 Hackathon

Technique IDAssigneeTactic
SAFE-T1004Ryan JenningsInitial Access
SAFE-T1205Arjun SubediPersistence
SAFE-T1406Aditi BhartiDefense Evasion
SAFE-T1605Umesh RawatDiscovery
SAFE-T1606Vikranth Kumar ShivaaDiscovery
SAFE-T1912Rajiv ShresthaExfiltration
SAFE-T2103Pratikshya RegmiImpact

Available Techniques by Tactic

Pick a technique below to contribute. Check the TEMPLATE.md for documentation structure.

ATK-TA0008 (1 available)

IDNameDescription
SAFE-T1701Cross-Tool ContaminationUsing compromised MCP tools to access other connected services and systems

ATK-TA0010 (1 available)

IDNameDescription
SAFE-T1910Covert Channel ExfiltrationData smuggling through tool parameters, error messages, or legitimate-appearing operations

ATK-TA0011 (1 available)

IDNameDescription
SAFE-T1901Outbound Webhook C2LLM calls "http.post" to attacker URL with commands/results

ATK-TA0001 (2 available)

IDNameDescription
SAFE-T1005Exposed Endpoint ExploitMisconfigured public MCP endpoints (no auth, debug on) let attackers connect, enumerate tools or trigger RCE
SAFE-T1009Authorization Server Mix-upClient follows redirect to look-alike AS domain (e.g., accounts-google.com vs accounts.google.com), causing authorization codes or tokens to be leaked to attacker-controlled server

ATK-TA0003 (2 available)

IDNameDescription
SAFE-T1203Backdoored Server BinaryInserts cron job or reverse shell on install; persists even if MCP service is uninstalled
SAFE-T1206Credential Implant in ConfigAdds attacker's API/SSH keys to server .env, giving re-entry

ATK-TA0004 (2 available)

IDNameDescription
SAFE-T1302High-Privilege Tool AbuseInvoke a VM-level or root tool from normal user context
SAFE-T1305Host OS Priv-Esc (RCE)Achieve root via misconfigured service running as root, then alter host

ATK-TA0005 (2 available)

IDNameDescription
SAFE-T1404Response TamperingModel instructed not to mention risky action, keeping UI output "harmless"
SAFE-T1405Tool Obfuscation/RenamingMalicious tool named "Utils-Helper" to blend in among 30 legit tools

ATK-TA0006 (1 available)

IDNameDescription
SAFE-T1505In-Memory Secret ExtractionQuery vector store for "api_key" embedding strings

ATK-TA0007 (2 available)

IDNameDescription
SAFE-T1603System-Prompt DisclosureCoax model into printing its system prompt/tool JSON
SAFE-T1604Server Version EnumerationGET /version or header analysis for vulnerable builds

ATK-TA0008 (4 available)

IDNameDescription
SAFE-T1702Shared-Memory PoisoningWrite false tasks to shared vector DB so peer agents execute them
SAFE-T1704Compromised-Server PivotUse hijacked server as beachhead to infect other hosts in same IDE/workspace
SAFE-T1706OAuth Token Pivot ReplayAttacker reuses OAuth tokens across different services by exploiting either shared Authorization Server trust (e.g., GitHub token used at Slack) or Resource Servers that fail to validate audience claims, enabling unauthorized cross-service access
SAFE-T1707CSRF Token RelayLeaked OAuth token is passed via Cross-Site Request Forgery to access different resources on the same Resource Server (e.g., pivoting between GCP projects under same Google AS)

ATK-TA0009 (4 available)

IDNameDescription
SAFE-T1802File CollectionBatch-read sensitive files for later exfil
SAFE-T1803Database DumpUse SQL tool to SELECT \* from prod DB
SAFE-T1804API Data HarvestLoop over customer REST endpoints via HTTP tool
SAFE-T1805Context Snapshot CaptureQuery vector store embeddings wholesale

ATK-TA0010 (2 available)

IDNameDescription
SAFE-T1913HTTP POST ExfilUse outbound web tool to POST to attacker server
SAFE-T1914Tool-to-Tool ExfilChain two tools so second one emails data out

ATK-TA0011 (2 available)

IDNameDescription
SAFE-T1902Covert Channel in ResponsesEncode data in whitespace or markdown links returned to chat
SAFE-T1903Malicious Server Control ChannelAttacker operates rogue server; every tool call doubles as heartbeat

ATK-TA0040 (1 available)

IDNameDescription
SAFE-T2104Fraudulent TransactionsPayment-tool instructed to move funds

Quick Links