T-5003validatedactive
MCP Server Hopping
Hop between MCP servers using compromised tool access to reach new services
Tactic
Lateral Movement (Stage 5)
Pivot from compromised agent to connected services or other agents
Attack Class
MCP-EXPLOIT
Attacking Model Context Protocol server configurations, tool registrations, and inter-server trust
Evidence
validated
Reproduced in controlled lab environment (DVAA) with documented steps.
DVAA Validation
tool-chain-exfiltration
Honeypot Coverage (AgentPwn)
Queued
In scope for honeypot observation; trap page or telemetry hook not yet built.
Multi-MCP fixture network not yet built.
Detection (HackMyAgent)
Live3 live · 0 queued
MCP-001MCP-002MCP-003
npx hackmyagent secure --ciLive = check implemented in hackmyagent; queued = declared, not yet implementedDefense (OASB Controls)
Live9 live · 0 queued
How to Cite
AI Agent Threat Matrix T-5003 (MCP Server Hopping). OpenA2A, 2026. https://threats.opena2a.org/techniques/T-5003