ãã㯠MCPã®ã»ãã¥ãªãã£ã«ã¤ãã¦æ¸ããããµã¤ããã¾ã¨ããè¨äºã§ã ã¯ããã« MCPã®æ´»ç¨ã§Xããã¾ãã¾ãªããã°ã§è³ãã£ã¦ãã¾ããããããMCPã®ã»ãã¥ãªãã£é¢ã«ã¤ãã¦ã¯ã¾ã ããã¾ã§å¤ãã®æ å ±ã¯åºã¦ãã¾ããã MCPã®ä»æ§ãã»ãã¥ãªãã£ã«é¢ãã¦ã¯ã¾ã ã¾ã æµåçã§ä½ãæ£ããæ å ±ãªã®ãå®ãã§ã¯ãªãã§ãã ãã®ãããªç°å¢ã®ä¸ã§ãç§ã¯1ã¶æã»ã©åããMCPã®ã»ãã¥ãªãã£é¢ã«ã¤ãã¦ç´°ã ã¨ãã£ããã¢ãããã¦ãã¾ããããããªç§ãåèã«ãã¦ãããµã¤ãããã¼ã«ãç´¹ä»ãã¦ããã¾ãã ãã¼ã« ãã1-2é±éã»ã©ãç§ã注åãã¦ããã®ãMCPã»ãã¥ãªãã£ã«ã¤ãã¦ã®ãã¼ã«ã§ããããã»ãã¥ãªãã£ãã¼ã«ãã§ããã®ããã¨æãã»ã©éãé度ã§ãã¼ã«ãåºã¦ãã¾ãã 1. MCP-Scan: An MCP Security Scanner mcpâscanã¯ããã¼ã«ã«ã«ã¤ã³ã¹ãã¼ã«ãããMCPãµã¼ãè¨å®ãå帰çã«æ¤åºããããã³ã
We have discovered a critical vulnerability in the Model Context Protocol (MCP) that allows for "Tool Poisoning Attacks." Many major providers such as Anthropic and OpenAI, workflow automation systems like Zapier and MCP clients like Cursor are susceptible to this attack. Concerned about MCP and agent security? Sign up for early access to Invariant Guardrails, our security platform for agentic AI
ããã«ã¡ã¯ãGoogle Cloud ã«ã¹ã¿ãã¼ã¨ã³ã¸ãã¢ã®åç°ã§ãã AIã¢ããªã±ã¼ã·ã§ã³ã®å©ç¨ãæ¡å¤§ããã«ã¤ãã¦ããã®ã»ãã¥ãªãã£ã¨å®å ¨æ§ã確ä¿ãããã¨ãé常ã«éè¦ã«ãªã£ã¦ãã¾ããããã§ä»åãç´¹ä»ããã®ããæ§ã ãªã»ãã¥ãªãã£ãå®å ¨æ§ã®ãªã¹ã¯ã«å¯¾ãã¦ãLLMã®ããã³ããã¨ã¬ã¹ãã³ã¹ãã¹ã¯ãªã¼ãã³ã°ãããã¨ã§ãAIã¢ããªã±ã¼ã·ã§ã³ã®ã»ãã¥ãªãã£ã¨å®å ¨æ§ãå¼·åããããã«è¨è¨ããããGoogle Cloudã®ãã«ããã¼ã¸ããµã¼ãã¹ã§ããModel Armorã§ãã æ¬è¨äºã§ã¯ãModel Armorã®ä¸»ãªæ©è½ããã¢ã¨åããã¦è§£èª¬ãã¾ãã Model Armor ã¨ã¯ï¼ ãã£ã«ã¿ã¼ å®å ¨ãã¤è²¬ä»»ãã AI ãã£ã«ã¿ã¼: ãããã®ãã£ã«ã¿ã¼ã¯ãæ§çãªã³ã³ãã³ããå±éºãªæ´»åããã©ã¹ã¡ã³ãããã¤ãã¹ãã¼ãã«é¢é£ããæ¸å¿µã«å¯¾å¦ãããã¨ã§ãã³ã³ãã³ãã®å®å ¨æ§ã確ä¿ããããã«è¨è¨ããã¦ãã¾ãããã£ã«ã¿ã¼ã¯ã
This website uses cookies to analyze our traffic and only share that information with our analytics partners. Accept About This Repository This is the repository for the OWASP Top 10 for Large Language Model Applications. However, this project has now grown into the comprehensive OWASP GenAI Security Project - a global initiative that encompasses multiple security initiatives beyond just the Top 1
ç·æ¥äºæ 対å¿ãµã¼ãã¹ããµã¤ãã¼119®ã 伿¥ã®æ§ã ãªã»ãã¥ãªãã£ã¤ã³ã·ãã³ãçºçæã«ãè¿ éãªå°ãè¾¼ãããã©ã¬ã³ã¸ãã¯ãå¾©æ§æ¯æ´ãªã©ãè¡ãã¤ã³ã·ãã³ã対å¿ãµã¼ãã¹ã§ããã¾ããã¹ãã¼ã¯ãã«ãã¼ã¸ã®èª¬æãã¡ãã£ã¢å¯¾å¿ã®ä»ãå ¬è¡¨å¾ã«ãããSNSããã¼ã¯ã¦ã§ããªã©ã®ç£è¦ããã¬ãã£ããªã³ã¡ã³ãçºè¦æã®å¯¾å¿ã¾ã§ç·åçã«ãµãã¼ããã¾ãããã«ã¦ã§ã¢ãªã©ã®ã¦ã¤ã«ã¹ææããµã¤ãã¼æ»æãWebãµã¤ãæ¹ãããæ å ±æ¼ãããªã©ã®ã»ãã¥ãªãã£ã¤ã³ã·ãã³ãã®çããã被害ãªã©ãçºçãããããã«ãé£çµ¡ãã ããã
ãã®è¨äºã§ã¯ãçµç¹ã®ã»ãã¥ãªãã£ãè©ä¾¡ãã¦æ¹åããã®ã«å½¹ç«ã¤CISãã³ããã¼ã¯ã®æ¦è¦èª¬æã¨ãå®éã®ãã³ããã¼ã¯ãå©ç¨ããAWSç°å¢ã®å ·ä½çãªãã§ãã¯é ç®ã«ã¤ãã¦ããç´¹ä»ãã¾ãã 西澤ã§ããå æ¥ãCIS(Center for Internet Security)ããCIS AWS Foundation Benchmarkãçºè¡¨ããã¾ãããCISã¯ãã»ãã¥ãªãã£ã®ä¿é²ãç®çã¨ããç±³å½ã®éå¶å©å£ä½ã§ãå°éå®¶ã«ããç²¾æ»ãããã»ãã¥ãªãã£åºæºãå ¬éãã¦ããã¦ãã¾ããä»åãå ¬éãããããã¥ã¡ã³ããèªã¿è§£ããã¨ã§ãAWSãå©ç¨ããä¸ã§å¿ è¦ã¨ãªãã»ãã¥ãªãã£è¨å®ã«ã¤ãã¦çè§£ãæ·±ãããã¨ãã§ããã°ã¨ç®ãéãã¦ã¿ããã¨ã«ãã¾ããã AWS Security Blog | Security and Compliance in the AWS Cloud CISãã³ããã¼ã¯ã¨ã¯ï¼ CISã¨ã¯ä¸è¨ã®ãããªéå¶å©å£ä½
ã©ã³ãã³ã°
ã©ã³ãã³ã°
ãç¥ãã
ãªãªã¼ã¹ãé害æ å ±ãªã©ã®ãµã¼ãã¹ã®ãç¥ãã
ææ°ã®äººæ°ã¨ã³ããªã¼ã®é ä¿¡
å¦çãå®è¡ä¸ã§ã
j次ã®ããã¯ãã¼ã¯
kåã®ããã¯ãã¼ã¯
lãã¨ã§èªã
eã³ã¡ã³ãä¸è¦§ãéã
oãã¼ã¸ãéã
{{#tags}}- {{label}}
{{/tags}}