SAFE-MCP Contributor Opportunities

Always-up-to-date list of techniques ready for contribution

Last updated: January 20, 2026

85

Total Techniques

70

Contributed

13

In Progress

12

Available

Hackathon Assignments (13)

These techniques are assigned to hackathon participants and are not available for claiming.

SAFE-MCP Nov 23 Hackathon

Technique IDAssigneeTactic
SAFE-T1207Petrus MgbebuPersistence
SAFE-T1308Obiora EbukaPrivilege Escalation
SAFE-T1407Afeez OlawaleDefense Evasion
SAFE-T1506Ayomide OnatolaCredential Access
SAFE-T1507Pritika BistaCredential Access
SAFE-T1911Silva ChijiokeExfiltration

SAFE-MCP Nov 22 Hackathon

Technique IDAssigneeTactic
SAFE-T1004Ryan JenningsInitial Access
SAFE-T1205Arjun SubediPersistence
SAFE-T1406Aditi BhartiDefense Evasion
SAFE-T1605Umesh RawatDiscovery
SAFE-T1606Vikranth Kumar ShivaaDiscovery
SAFE-T1912Rajiv ShresthaExfiltration
SAFE-T2103Pratikshya RegmiImpact

Available Techniques by Tactic

Pick a technique below to contribute. Check the TEMPLATE.md for documentation structure.

ATK-TA0011 (1 available)

IDNameDescription
SAFE-T1901Outbound Webhook C2LLM calls "http.post" to attacker URL with commands/results

ATK-TA0001 (1 available)

IDNameDescription
SAFE-T1005Exposed Endpoint ExploitMisconfigured public MCP endpoints (no auth, debug on) let attackers connect, enumerate tools or trigger RCE

ATK-TA0003 (1 available)

IDNameDescription
SAFE-T1206Credential Implant in ConfigAdds attacker's API/SSH keys to server .env, giving re-entry

ATK-TA0005 (1 available)

IDNameDescription
SAFE-T1405Tool Obfuscation/RenamingMalicious tool named "Utils-Helper" to blend in among 30 legit tools

ATK-TA0007 (1 available)

IDNameDescription
SAFE-T1604Server Version EnumerationGET /version or header analysis for vulnerable builds

ATK-TA0009 (2 available)

IDNameDescription
SAFE-T1802File CollectionBatch-read sensitive files for later exfil
SAFE-T1805Context Snapshot CaptureQuery vector store embeddings wholesale

ATK-TA0010 (2 available)

IDNameDescription
SAFE-T1913HTTP POST ExfilUse outbound web tool to POST to attacker server
SAFE-T1914Tool-to-Tool ExfilChain two tools so second one emails data out

ATK-TA0011 (2 available)

IDNameDescription
SAFE-T1902Covert Channel in ResponsesEncode data in whitespace or markdown links returned to chat
SAFE-T1903Malicious Server Control ChannelAttacker operates rogue server; every tool call doubles as heartbeat

ATK-TA0040 (1 available)

IDNameDescription
SAFE-T2104Fraudulent TransactionsPayment-tool instructed to move funds

Quick Links