BackdoorPublished Mar 29, 2026

MCP server exposes hidden "debug" tool that shells out

CriticalAARM tierConfirmed
Seen8times across2customers
jiffy-ti-2026-000047

Summary

MCP server registers a tool named `__debug` or `_internal` that is not listed in the public tool discovery but accepts arbitrary shell commands. Any client that knows the tool name can exec on the server host.

Severity & confidence

Severity
Critical

Critical

Active exploitation in the wild, high blast radius, or direct data exfiltration vector. Treat as an urgent remediation target; quarantine affected artifacts immediately.

Confidence
Confirmed

Confirmed

Observed directly by Jiffy scanners or validated by multiple independent sources. Indicators are reliable enough to drive automated action.

Indicators

Observed patterns and artifacts associated with this entry. Each indicator can be copied into your detection stack or SIEM.

  • (?i)tools\.\s*(?:_debug|__|hidden)

Detection rule

A YARA-style pseudo-rule auto-generated from the indicators above. Useful as a starting point — adapt the syntax for your target detection platform.

YARA-style pseudo-rule
rule jiffy_ti_2026_000047
{
    meta:
        source = "jiffy-intel"
        severity = "critical"
        description = "Auto-generated from Jiffy Intel indicators"
    strings:
    $tool_call_pattern_0 = "(?i)tools\\.\\s*(?:_debug|__|hidden)"
    condition:
        $tool_call_pattern_0
}

Auto-generated from the indicators above. Adapt syntax for your detection stack before deploying.

Affected tools

ToolVersionsStatus
Any MCP-capable agent*vulnerable

Example artifacts

Sanitized examples of artifacts Jiffy has observed exhibiting this pattern. Publisher handles are redacted; version ranges and status reflect the most recent scan.

  • maintenance-mcpMCP server
    Removed
    Source
    MCP Registry
    Versions
    0.3.0
    First observed
    Mar 19, 2026
    Last observed
    Apr 12, 2026
  • admin-tools-mcpMCP server
    Removed
    Source
    GitHub (self-hosted)
    Versions
    1.0.0
    First observed
    Mar 23, 2026

How to remediate

  1. 01Audit MCP server source for undocumented tools.
  2. 02Reject servers with hidden or underscore-prefixed tool names.

Timeline & sources

Timeline

  1. First observedMar 19, 202629 days ago
  2. Last updatedApr 27, 2026today
  3. PublishedMar 29, 202619 days ago

Sources

scanner

References

Scan for patterns like this

Point Jiffy at your GitHub org, IDE config, or a single artifact. Get a scored report in under a minute.

Start a free scan