Session
(MCP Security) - How Your Friendly MCP Tool Might Betray You
We all love the convenience and power of AI-enhanced tools using MCP. But what if these handy servers had a hidden dark side? Let's dive into real-world examples of how MCP servers can silently leak your data, execute malicious commands, or even grant attackers access to your systems.
You’ll learn about sleeper attacks, tool poisoning, shadowing, and remote code execution—complete with chilling real-life cases and practical advice on defending yourself.
This is an eye-opening session that exposes why blind trust in MCP is a dangerous game.
AI-powered MCP tools make our lives easier—but they can also open the door to serious security risks. In this eye-opening session, we’ll uncover how attackers exploit MCP servers through data leaks, tool poisoning, sleeper attacks, and remote code execution.

Daniel Ostrovsky
UI/UX Architect at Payoneer | AI Architect | Full Cycle Development Expert | Public Speaker | Open Source Contributor |
Tel Aviv, Israel
Links
Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.
Jump to top