FreshRSS

๐Ÿ”’
โŒ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
โ˜ โ˜† โœ‡ /r/netsec - Information Security News & Discussion

Detecting unknown MCPs in local dev environments

By: ๏ผu๏ผOk-Guide-4239 โ€” December 29th 2025 at 14:21

Working with a CTO on visibility into what's actually running locally across a 70-engineer org. (For the context, there's no ZTNA implementation, At the moment, if there's a way to approach it from ZTNA angle, I'd love to know)

Engineers use cursor heavily, started adopting MCPs, and now there's a mix of verified, open source, and basically untrusted github repos running locally.

Customer creds are accessible from these environments. We want visibility first - detect what MCPs exist, where they're installed, track usage.

That part feels tractable. But from a detection/monitoring angle, once you know what's there - what's worth actually watching?

Some MCPs legitimately need local execution so you can't just block them. Full network proxying feels unrealistic for dev workflows.

How you approached it? what can implement after visibility?

submitted by /u/Ok-Guide-4239
[link] [comments]
โŒ