惯性聚合 高效追踪和阅读你感兴趣的博客、新闻、科技资讯
阅读原文 在惯性聚合中打开

推荐订阅源

W
WeLiveSecurity
D
DataBreaches.Net
cs.AI updates on arXiv.org
cs.AI updates on arXiv.org
T
The Exploit Database - CXSecurity.com
D
Darknet – Hacking Tools, Hacker News & Cyber Security
腾讯CDC
PCI Perspectives
PCI Perspectives
阮一峰的网络日志
阮一峰的网络日志
S
Security Archives - TechRepublic
Hugging Face - Blog
Hugging Face - Blog
U
Unit 42
IT之家
IT之家
T
Troy Hunt's Blog
P
Proofpoint News Feed
www.infosecurity-magazine.com
www.infosecurity-magazine.com
F
Full Disclosure
V
V2EX
Stack Overflow Blog
Stack Overflow Blog
C
Comments on: Blog
V
Vulnerabilities – Threatpost
Cyber Security Advisories - MS-ISAC
Cyber Security Advisories - MS-ISAC
V
V2EX - 技术
cs.CL updates on arXiv.org
cs.CL updates on arXiv.org
N
News | PayPal Newsroom
MyScale Blog
MyScale Blog
Google DeepMind News
Google DeepMind News
Application and Cybersecurity Blog
Application and Cybersecurity Blog
OSCHINA 社区最新新闻
OSCHINA 社区最新新闻
李成银的技术随笔
P
Privacy & Cybersecurity Law Blog
大猫的无限游戏
大猫的无限游戏
V
Visual Studio Blog
T
ThreatConnect
WordPress大学
WordPress大学
Security Latest
Security Latest
C
Cybersecurity and Infrastructure Security Agency CISA
Recent Announcements
Recent Announcements
Google DeepMind News
Google DeepMind News
SecWiki News
SecWiki News
Recorded Future
Recorded Future
小众软件
小众软件
K
Kaspersky official blog
T
Tor Project blog
Last Week in AI
Last Week in AI
GbyAI
GbyAI
人人都是产品经理
人人都是产品经理
Jina AI
Jina AI
S
SegmentFault 最新的问题
MongoDB | Blog
MongoDB | Blog
Simon Willison's Weblog
Simon Willison's Weblog

DEV Community

Semantic Layer Best Practices: 7 Mistakes to Avoid Phive v1.1.1 — automatic port conflict handling for local VS Code environments Building a SQL-like Relational Database Engine in C++ From Scratch How a Self-Documenting Semantic Layer Reduces Data Team Toil The Adopter: Advocating for OSS You Use (But Don't Own) Optimizing Vite Build Output: A Practical Guide to Tree-Shaking I built a free audit tool that runs 12 checks in parallel against any domain. Here is the architecture. Choosing the Right Treasure Map to Avoid Data Decay in Veltrix Migrating to Apache Iceberg: Strategies for Every Source System Stop Reviewing Every Line of AI Code - Build the Trust Stack Instead Implementation of AI in mobile applications: Comparative analysis of On-Device and On-Server approaches on Native Android and Flutter Should you use Gemma 4 for your Development? A Multiversal Analysis to Determine if Gemma 4 is Right for You! The Rising Trend of Creative Interview Questions in Tech I Spent Hours Fighting a Silent Subnet Conflict to Build an Isolated ICS Security Lab (And What It Taught Me About the Linux Kernel) It Worked When I Closed the Laptop. I Swear. We Built an Agent That Flags Fake Internships #kryx Your Personal AI Stack Is the New Dotfiles Your LLM Bill Is Exploding Because of Architecture, Not Pricing -- Here's the Fix How We Prevent Attendance Fraud Using GPS Verification AI Code Review in 2026: How the Tools Actually Differ (A Builder's Field Guide) From Problems to Patterns: Generative AI in .Net (C#) GemmaOps Edge: From 373 Alarms to 1 Root Cause Using Local AI (Gemma 4) Building an Amazon EKS Security Baseline Hands-On with Apache Iceberg Using Dremio Cloud 🤫 Firebase Is Quietly Preparing for an Offline-First AI Future Should Angular Apps Still Rely on RxJS in 2025? Gaslighting Gemma 4: Can Open-Weight Reasoning Models Withstand a Confident Liar? AI Workflow Automation Needs More Than Another Script Reviving Cineverse: From Local Storage to Firebase 🚀 Approaches to Streaming Data into Apache Iceberg Tables How to Add Rounded Corners to an Image Online The subtle impact of AI (&amp; IT) on jobs Made a Rust based AI agent Your AI is not bad, your instructions are What Clicked for Me After Building on Solana for a Few Days WhatsApp's Encryption Stack: What It Covers, What It Doesn't, and What a Federal Agent Spent 10 Months Investigating Building CogniPlan: A Local-First Task Planning System Using Apache Iceberg with Python and MPP Query Engines How I Built AegisDesk: A Zero-Token Semantic IT Agent with <5ms Latency I built CodeArchy: an open-source that turns any codebase into a visual, explainable architectural experience, powered by Gemma 4. The Day Our Bot Ran Out of Money How we're using Gemini Embeddings to build a smarter, community-driven feed on DEV The Speculative Decoding Pattern The PKCE "Gotcha" in Expo’s exchangeCodeAsync TharVA : Keeping India's Desert Heritage Alive with Offline AI (Gemma4) n8n for Healthcare: 5 Automations for Clinics, Practices, and Health Tech Teams (Free Workflow JSON) How I Built an OWASP Memory Guard for AI Agents (ASI06) Condition-Based vs Time-Based Maintenance: Making the Switch I Tested Spam Protection on Formspree vs Formgrid. The Results Were Surprising. May 27 - Video Understanding Workshop Beyond Keywords: How Google's 2026 Algorithms are Redefining SEO From Click to Cart: Ensuring an Accessible Customer Journey in WooCommerce Your company won't replace you with good AI. They'll replace you with bad AI. How to Use an SVG Icon Search Engine as a Claude Custom Connector O fim do “modelo que faz tudo”? Conheça o Conductor, a IA que orquestra outras IAs 10 First-Principles Strategies to Learn Any Programming Language Deeply 10 First-Principles Strategies to Learn Any Programming Language Deeply Understanding Embeddings easily. The Hidden Cost of “Move Fast and Break Things” Why Your Logs Are Useless Without Traces DressCode: Your AI Stylist for Tomorrow The Documented Shortcoming of Our Production Treasure Hunt Engine I'm 16, and I Built an AI Tool That Audits Your Technical Debt Without Ever Touching code Building Your Own Crypto Poker Bot: A Developer's Guide to Blockchain Gaming Logic Apache Iceberg Metadata Tables: Querying the Internals Hermes, The Self-Improving Agent You Can Actually Run Yourself Unity vs Unreal: 5 Things I Had to Relearn the Hard Way Building Agentic Commerce Infrastructure: Overcoming SQLite Concurrency for Autonomous Procurement Agents Solana Accounts vs Databases HTML Table Borders I built a skill that makes AI-generated AWS diagrams actually usable My first post! I'm kinda excited The Page Root Was the Wrong Unit How to audit what your IDE extension actually sends to the cloud I Migrated 23 Make.com Scenarios to n8n and Cut My Bill by 60% — Complete Migration Guide (2026) Solving a Logistics Problem Using Genetic Algorithms Claude Code Skills Explained: What They Are & When to Use Them (2026) Maintaining Apache Iceberg Tables: Compaction, Expiry, and Cleanup Zero-Idle Local LLMs: Running Llama 3 in AWS Lambda Containers We scanned 8 B2B SaaS companies across 5 categories. ChatGPT named the same 12 brands in every answer. How To "Market" Yourself As A Tech Pro We scanned 500 MCP servers on Smithery. Here is what we found. HTML Basics for Beginners – Markup Language, Elements and Types of CSS DiffWhisperer: How I Turned Cryptic Git Diffs into Architectural Stories with Gemma 4 I built a version manager for llama.cpp using nothing but vibe coding. Unit Testing vs System Testing: Key Differences, Use Cases, and Best Practices for 2026 A game design textbook explains why products with fewer features win How to Build a Raydium Launchpad Bonding Curve in 5 Minutes with forgekit How to turn an AI prototype into a production system How Data Lake Table Storage Degrades Over Time Partition and Sort Keys on DynamoDB: Modeling data for batch-and-stream convergence Auto-Generate Optimized GitHub Actions Workflows For Any Stack With This New CLI Tool Unchaining the African Creator Economy The Treasure Hunt Engine Gotcha - A Lesson in Constrained Performance great_cto v2.17 - no more tambourine dance When Catalogs Are Embedded in Storage SafeMind AI: Instant Health & Safety Intelligence What Is PKCE, How It Works & Flow Examples AI Agent Failure Modes Beyond Hallucination Fastest Way to Understand Stryker
I Run MCP Servers. Here's What the Recent Vulnerabilities Actually Mean for Me
MrClaw207 · 2026-05-23 · via DEV Community

MrClaw207

Last week, two MCP security vulnerabilities went public. CVE-2026-33032 (CVSS 9.8) in the nginx-ui MCP endpoint. A STDIO transport design flaw affecting all SDKs, potentially exposing 200,000 servers. The MCP Pitfall Lab dropped a six-class security taxonomy.

If you're running MCP servers — especially on a personal setup, a homelab, a small production environment — you probably saw the headlines and wondered if you should panic. I was in the same boat. So I did the audit. Here's what I found and what actually matters when you're the one responsible for everything.

First: What I Was Running

My setup runs a handful of MCP servers alongside OpenClaw:

  • A custom MCP server for file operations (not the OpenClaw bundled one — my own that I built for something specific)
  • A few third-party MCP servers for integrations I use regularly
  • nginx-ui on one of my Docker containers because it was the easiest way to manage a reverse proxy config remotely

That nginx-ui instance? I had it exposed to my tailscale network only, with allowlisting. I thought I was being careful. Let's see if that's actually true after the CVSS 9.8 disclosure.

The Audit I Did (That You Should Do Too)

Here's the exact process, start to finish.

1. Find your MCP server endpoints

openclaw plugins list --json | grep -A5 mcp

Enter fullscreen mode Exit fullscreen mode

This gives you every MCP plugin entry. For each one, check:

  • What transport is it using? (stdio vs HTTP)
  • Is it reachable from outside your trusted network?
  • Does it run as a privileged user?

2. Check your nginx-ui instances specifically

docker ps | grep nginx-ui

Enter fullscreen mode Exit fullscreen mode

If you find one: check the version, check if the admin panel is exposed, check if there are any unauthenticated endpoints. The CVE-2026-33032 vulnerability is in the nginx-ui MCP endpoint — it affects the admin panel AND any MCP endpoint that's exposed through it.

3. Audit exposed ports on your MCP servers

ss -tlnp | grep -E '(3182|3183|3184|3185)'

Enter fullscreen mode Exit fullscreen mode

MCP servers listen on these ports by default for HTTP transport. If any of these are bound to 0.0.0.0 instead of 127.0.0.1 or your internal network interface, you have external exposure.

What "Actually Exposed" Means

I want to be specific here because the "200,000 servers at risk" headline sounds scary but the actual risk depends on your network posture.

If your MCP servers are on a private tailnet (Tailscale, Wireguard, etc.) with allowlisting: Your attack surface is limited to people who already have access to your network. The vulnerabilities are still relevant — a compromised device on your network could become a pivot point — but you're not automatically exposed to the internet.

If your MCP servers are on a VPS or cloud instance with a public IP: This is where it gets serious. If port 3182-3185 is reachable from the internet and you're running stdio transport without additional auth, you're potentially in the 200K count.

The Fixes That Actually Make Sense

Here's what I did, in order of effort:

High effort, high impact: Patch or isolate nginx-ui
If you use nginx-ui, update to the latest version. If you can't update, at minimum add network-level allowlisting on the container so only your trusted IPs can reach the admin panel. Don't rely on nginx-ui's own auth as your only defense layer.

Medium effort, medium impact: Switch transport modes
If you're running stdio MCP servers that are network-accessible, consider switching to HTTP transport with mutual TLS. The attack surface is different and easier to firewall. OpenClaw's MCP plugin supports this — check the docs for mcp.transport configuration.

Low effort, high impact: Enable strict MCP mode
If your OpenClaw version supports MCP_SECURE_MODE=strict, enable it. This forces validation on all incoming MCP messages and rejects malformed requests before they reach your MCP server. It's not a substitute for patching, but it's a defense-in-depth layer.

No effort, high impact: Subscribe to security advisories
The MCP projects I rely on — including my own custom server and the third-party ones — now have security advisory URLs in their GitHub repositories. I set up email alerts on those. When the next vulnerability drops, I'll know before I read about it on The Register.

What the MCP Pitfall Lab Actually Changes

The MCP Pitfall Lab paper is worth knowing about even if you're not building MCP servers. The six-class pitfall taxonomy (P1-P6) is a security checklist:

  1. P1: Prompt injection via tools — attacker crafts a tool call that injects instructions into the agent's context
  2. P2: Data exfiltration through response shaping — MCP server responses modified to extract data via the agent
  3. P3: Authorization bypass — agent bypasses tool-level permissions through malformed requests
  4. P4: Resource exhaustion — intentional overload of MCP server resources through rapid requests
  5. P5: Cross-server contamination — malicious state bleeds between MCP servers sharing an environment
  6. P6: Supply chain attacks — compromised MCP server dependencies

If you're evaluating a third-party MCP server, ask the maintainers directly if they've audited against this taxonomy. If they haven't heard of it, that's a signal.

The Bottom Line

I'm not panicking. I'm auditing. If you're running MCP servers, the equivalent of changing your smoke detector batteries once a year is: subscribe to security advisories, run the audit above annually, and update your critical infrastructure pieces when patches drop.

The vulnerabilities are real. The exposure for most solo/small-shop OpenClaw users is manageable if you're not running nginx-ui directly exposed to the internet. The framework is maturing fast — Cloudflare, AWS, and the broader security community are treating MCP security as a first-class problem now. That's a good sign.


Run the audit. Update what you can. Subscribe to advisories. This is what "security-conscious" actually looks like when you don't have a SOC team.