GitHub MCP Exploited: Accessing private repositories via MCP

42 points by op


dubiouslittlecreature

Why are we still doing this? What is even the point?

“Yes I’d like to shove an unproven technology literally everywhere I can with almost zero regard for user privacy or agency.”

“Yes I’d like to be able to ask the bot nicely to give me private data.”

equeue

The post detailing the attack and findings is here: https://invariantlabs.ai/blog/mcp-github-vulnerability

An important excerpt:

Importantly, this is not a flaw in the GitHub MCP server code itself, but rather a fundamental architectural issue that must be addressed at the agent system level. This means that GitHub alone cannot resolve this vulnerability through server-side patches.

rsanheim

Wow the original report is not very clear about this, too busy trying to push their product I guess. The simple mitigation here if you are using github-mcp or something similar:

What makes this a bit difficult, in particular with GItHub, is that there are about 15 different ways you can integrate “Copilot” into your workflow, and determining how things are actually integrated and what they have access to is not easy at all. There needs to be much better education and UI/UIX around this.

kghose

Social engineering our AI overlords to hurt each other. I like the gallows humor.

dubiouslittlecreature

@simonw: Do you know if the harmful behavior here will happen in the default configuration? Do I need to turn something on in one of my repos to make myself vulnerable or am I screwed regardless?