Skip to main content

Security Framework Mappings

ThoughtJack scenarios map to established security frameworks to help security teams prioritize testing and communicate findings using shared taxonomy.

MITRE ATT&CK

MITRE ATT&CK is a knowledge base of adversary tactics and techniques. ThoughtJack scenarios map to ATT&CK techniques where MCP-specific attacks parallel traditional attack patterns.

Why ATT&CK mapping matters

  • Shared language: security teams already understand ATT&CK; mapping MCP attacks to it reduces the learning curve
  • Coverage analysis: identify which ATT&CK techniques your MCP client is vulnerable to
  • Risk prioritization: ATT&CK techniques have associated severity and prevalence data

Mapping approach

MCP attacks don't always have direct ATT&CK equivalents. ThoughtJack maps to the closest applicable technique:

MCP AttackATT&CK TechniqueRationale
Prompt injection in tool responsesT1059 (Command and Scripting Interpreter)Injected instructions cause the agent to execute actions
Tool description injectionT1036 (Masquerading)Malicious tool disguised as legitimate
Credential harvesting via descriptionsT1556 (Modify Authentication Process)Social engineering through tool interfaces
Rug pull (tool swap)T1574 (Hijack Execution Flow)Legitimate tool replaced with malicious version
Resource exfiltrationT1552 (Unsecured Credentials)Data extracted via resource content
Unicode obfuscationT1027 (Obfuscated Files or Information)Content disguised using Unicode tricks
Notification floodT1498 (Network Denial of Service)Resource exhaustion via message volume
Nested JSON DoST1499 (Endpoint Denial of Service)Parser resource exhaustion

Limitations

ATT&CK was designed for traditional computing environments. Some MCP-specific attacks have no direct parallel:

  • Escalation ladders - gradual trust manipulation over multiple calls
  • list_changed abuse - exploiting MCP's dynamic capability protocol
  • Bidirectional protocol attacks - exploiting the server's ability to send unsolicited messages

ThoughtJack maps these to the closest technique but notes where the mapping is approximate.

OWASP MCP Top 10

The OWASP MCP Top 10 is a categorization of risks specific to Model Context Protocol implementations.

Mapping

OWASP MCP IDRiskThoughtJack scenarios
MCP-01Tool Injectionrug-pull, prompt-injection
MCP-02Resource Poisoningresource-exfiltration, resource-rug-pull
MCP-03Capability Mutationrug-pull, resource-rug-pull
MCP-04Prompt Injection via Toolsprompt-injection, credential-harvester
MCP-05Data Exfiltrationresource-exfiltration
MCP-06Denial of Serviceslow-loris, nested-json-dos, notification-flood
MCP-07Protocol Abusenotification-flood (batch amplify, pipe deadlock)
MCP-08Unicode/Encoding Attacksunicode-obfuscation
MCP-09Trust Boundary Violationrug-pull, escalation-ladder
MCP-10Credential Theftcredential-harvester

Using mappings in reports

When reporting test results, reference both frameworks:

Finding: MCP client follows injected instructions in tool responses
Scenario: prompt-injection
MITRE ATT&CK: T1059.004 (Command and Scripting Interpreter: Unix Shell)
OWASP MCP: MCP-04 (Prompt Injection via Tools)
Severity: High

This provides context that security teams can act on regardless of which framework they prefer.

Adding mappings to custom scenarios

When creating custom scenarios, include framework mappings in the OATF attack block:

attack:
id: "my-scenario"
name: "My Custom Attack"
severity: high
classification:
mappings:
- framework: mitre_attack
id: "T1059.004"
- framework: owasp_mcp
id: "MCP-04"

See OATF Document Schema for the complete field reference.