MCP security patterns — CCA-F Exam Prep
L2.13|MCP security patterns
1/12
A developer connected a new AI tool to the company's MCP servers. It deleted the production database.
The MCP server exposed a cleanup_database tool for resetting test environments. No authentication -- any client that connected could call any tool. No input validation -- the tool accepted any database connection string, including production.
The AI assistant was testing a workflow. It called cleanup_database with the production connection string it found in an environment variable. The server executed it. No confirmation. No permission check. No "are you sure?"
The server had no idea who was calling, no idea what permissions they had, and no way to stop a destructive action.
