Securing the Model Context Protocol
close menu
Bookswagon
search
My Account
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Home > Computing and Information Technology Books > Computer science > Artificial intelligence > Securing the Model Context Protocol: Defend agentic AI systems from supply chain, runtime, and code execution threats
Securing the Model Context Protocol: Defend agentic AI systems from supply chain, runtime, and code execution threats

Securing the Model Context Protocol: Defend agentic AI systems from supply chain, runtime, and code execution threats


     0     
5
4
3
2
1



Out of Stock


Notify me when this book is in stock
X
About the Book

Learn to build and secure MCP servers for agentic AI systems by translating real-world threat models into OAuth 2.1, sandboxing, RBAC, and supply chain defenses that work in production. Key Features Threat-model MCP systems across supply chain, runtime, and code-mode attack surfaces Implement OAuth 2.1, RBAC, tenant isolation, and policy-first authorisation for MCP Harden MCP servers with sandboxing, validation, monitoring, and supply chain controls Book DescriptionAs agentic AI shifts from text generation to operational roles, it relies on the Model Context Protocol (MCP) to interface with databases and execute code. While MCP provides essential connectivity, it introduces a sophisticated attack surface. Securing MCP offers a hands-on framework for protecting these autonomous systems throughout their lifecycle. The book begins by deconstructing MCP architecture to establish a rigorous threat model, categorizing risks across supply chain integrity, runtime execution, and "code-execution" attack vectors. Readers will learn to map these vulnerabilities to testable security controls that mirror adversary behavior. It then details the technical implementation of OAuth 2.1 and scoped authorization, ensuring every interaction is authenticated and auditable. Beyond identity, the guide explores specialized threats like prompt injection, tool poisoning, and "rug pull" malicious updates. For enterprise production, it covers deployment hardening - including sandboxing, I/O validation, and secrets management - before addressing governance through RBAC, policies, and human-in-the-loop (HITL) mechanisms. Complete with Python implementations and verification checklists, this book provides the professional roadmap required to deploy agentic AI with institutional-grade security.What you will learn Design and secure MCP servers for both local and remote agentic deployments Detect and mitigate agent-native attacks such as prompt injection and tool poisoning Sandbox MCP tool execution using containers, gVisor, and Firecracker-style isolation Secure higher-risk MCP patterns, including remote execution and code-mode servers Harden the MCP supply chain using signing, verification, and dependency controls Establish monitoring, governance, and human-in-the-loop approval workflows Who this book is forThis book is for software engineers, security engineers, platform architects, and DevSecOps practitioners who are building, deploying, or securing MCP-based agentic AI systems. It’s also useful for AI/ML engineers integrating third-party MCP servers, security teams assessing agentic AI risk, and engineering leaders defining governance and control requirements for tool-connected assistants. Familiarity with Python, REST APIs, and OAuth is helpful, but not required - core concepts and security patterns are introduced and explained as you go.

Table of Contents:
Table of Contents

  1. Introduction to MCP
  2. The Security Imperative
  3. OAuth 2.1 Implementation
  4. Token Management & Scopes
  5. Identity Providers Integration
  6. Rug Pull and Line Jumping Attack
  7. Tool Poisoning
  8. CVES & Exploits Analysis - A Case Study
  9. Local Server Security Fundamentals
  10. Sandboxing & Isolation
  11. Input/Output Validation
  12. Remote MCP Architecture
  13. Secrets Management
  14. Multi-Tenancy & Data Isolation
  15. Permission Models & RBAC
  16. Security Design Patterns
  17. Supply Chain Security
  18. Monitoring & Observability
  19. Governance & Compliance
  20. Human-in-the-Loop Controls


About the Author :
Idan Habler is an AI Security Researcher at Cisco, focused on securing agentic and autonomous AI systems across enterprise environments. His expertise spans agentic threat modeling, AI red-teaming, secure tool and agent-to-agent interactions, and defense-in-depth architectures for generative AI systems. Prior to Cisco, Idan worked as an AI Security Researcher at Intuit and served in senior cyber R&D and cybersecurity roles within Israel's military. Idan holds a Ph.D. in Software and Information Systems Engineering from Ben-Gurion University, where his research focused on cyber risk assessment and advanced threats to complex systems. He is a core team member of the OWASP Securing Agentic Applications initiative and a founding member of AIVSS. Through OWASP, he co-authors security standards and guidance including the Agent Name Service (ANS) and the Agent-to-Agent Secure (A2AS) protocol, and develops practical threat modeling frameworks for multi-agent AI systems. A recognized contributor to the AI security community, Idan's work appears in leading research and industry venues, and he collaborates with industry, academia, and open-source communities to advance secure-by-design approaches for agentic AI systems at scale. Vineeth Sai Narajala is a Senior Technical Lead for AI Security Research at Cisco, where he leads initiatives to secure AI systems across the company's networking, security, and infrastructure products. His expertise includes model safety guardrails, prompt-injection protections, compute isolation, and secure token management for agentic AI systems. Prior to Cisco, Vineeth served as a Senior Generative AI Security Engineer at Amazon Web Services (AWS) and as a Senior Security Engineer at Meta. Vineeth is Co-Lead of OWASP AIVSS and a workstream co-lead within OWASP's GenAI security efforts focused on agentic application security, where he advances practical standards, threat modeling guidance, and best practices for the community. He regularly presents at major security conferences including RSA Conference, OWASP Global AppSec, BSides events, and CypherCon. With deep technical expertise at the intersection of AI and cybersecurity, Vineeth focuses on security solutions that help teams ship agentic AI features safely at scale.


Best Sellers


Product Details
  • ISBN-13: 9781807307578
  • Publisher: Packt Publishing Limited
  • Publisher Imprint: Packt Publishing Limited
  • Height: 235 mm
  • Sub Title: Defend agentic AI systems from supply chain, runtime, and code execution threats
  • ISBN-10: 1807307573
  • Publisher Date: 31 Jul 2026
  • Binding: Paperback
  • Language: English
  • Width: 191 mm


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Securing the Model Context Protocol: Defend agentic AI systems from supply chain, runtime, and code execution threats
Packt Publishing Limited -
Securing the Model Context Protocol: Defend agentic AI systems from supply chain, runtime, and code execution threats
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Securing the Model Context Protocol: Defend agentic AI systems from supply chain, runtime, and code execution threats

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!