Supply ChainPublished Mar 9, 2026

MCP server published to PyPI with confusable package name

MediumAARM tierConfirmed
Seen22times across5customers
jiffy-ti-2026-000048

Summary

Attacker publishes a Python package with a name confusingly similar to a popular MCP server (hyphen vs. underscore, missing dash). Install completes; MCP server behaves like the real one for basic tool calls but exfiltrates arguments.

Severity & confidence

Severity
Medium

Medium

Notable weakness with plausible abuse chains or partial mitigations already in place. Track, and resolve as part of your normal hardening cadence.

Confidence
Confirmed

Confirmed

Observed directly by Jiffy scanners or validated by multiple independent sources. Indicators are reliable enough to drive automated action.

Indicators

Observed patterns and artifacts associated with this entry. Each indicator can be copied into your detection stack or SIEM.

  • (?i)mcp[-_](?:serever|serer|sever|servr)

Detection rule

A YARA-style pseudo-rule auto-generated from the indicators above. Useful as a starting point — adapt the syntax for your target detection platform.

YARA-style pseudo-rule
rule jiffy_ti_2026_000048
{
    meta:
        source = "jiffy-intel"
        severity = "medium"
        description = "Auto-generated from Jiffy Intel indicators"
    strings:
    $content_pattern_0 = "(?i)mcp[-_](?:serever|serer|sever|servr)"
    condition:
        $content_pattern_0
}

Auto-generated from the indicators above. Adapt syntax for your detection stack before deploying.

Affected tools

ToolVersionsStatus
Any MCP-capable agent*vulnerable

Example artifacts

Sanitized examples of artifacts Jiffy has observed exhibiting this pattern. Publisher handles are redacted; version ranges and status reflect the most recent scan.

  • mcp_serever_toolsMCP server
    Removed
    Source
    PyPI
    Versions
    0.1.0
    First observed
    Feb 21, 2026
    Last observed
    Mar 18, 2026
  • mcp-severe-helpersMCP server
    Removed
    Source
    PyPI
    Versions
    1.0.0
    First observed
    Feb 26, 2026

How to remediate

  1. 01Allowlist exact PyPI/npm package names for MCP servers.
  2. 02Reject installs of near-typosquats.

Timeline & sources

Timeline

  1. First observedFeb 21, 20261 month ago
  2. Last updatedApr 20, 2026today
  3. PublishedMar 9, 20261 month ago

Sources

scanner

References

Scan for patterns like this

Point Jiffy at your GitHub org, IDE config, or a single artifact. Get a scored report in under a minute.

Start a free scan