Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
Windows Microsoft

MCP Will Be Built Into Windows To Make an 'Agentic OS' - Bringing Security Concerns (devclass.com) 57

It's like "a USB-C port for AI applications..." according to the official documentation for MCP — "a standardized way to connect AI models to different data sources and tools."

And now Microsoft has "revealed plans to make MCP a native component of Windows," reports DevClass.com, "despite concerns over the security of the fast-expanding MCP ecosystem." In the context of Windows, it is easy to see the value of a standardised means of automating both built-in and third-party applications. A single prompt might, for example, fire off a workflow which queries data, uses it to create an Excel spreadsheet complete with a suitable chart, and then emails it to selected colleagues. Microsoft is preparing the ground for this by previewing new Windows features.

— First, there will be a local MCP registry which enables discovery of installed MCP servers.

— Second, built-in MCP servers will expose system functions including the file system, windowing, and the Windows Subsystem for Linux.

— Third, a new type of API called App Actions enables third-party applications to expose actions appropriate to each application, which will also be available as MCP servers so that these actions can be performed by AI agents. According to Microsoft, "developers will be able to consume actions developed by other relevant apps," enabling app-to-app automation as well as use by AI agents.

MCP servers are a powerful concept but vulnerable to misuse. Microsoft corporate VP David Weston noted seven vectors of attack, including cross-prompt injection where malicious content overrides agent instructions, authentication gaps because "MCP's current standards for authentication are immature and inconsistently adopted," credential leakage, tool poisoning from "unvetted MCP servers," lack of containment, limited security review in MCP servers, supply chain risks from rogue MCP servers, and command injection from improperly validated inputs. According to Weston, "security is our top priority as we expand MCP capabilities."

Security controls planned by Microsoft (according to the article):
  • A proxy to mediate all MCP client-server interactions. This will enable centralized enforcement of policies and consent, as well as auditing and a hook for security software to monitor actions.
  • A baseline security level for MCP servers to be allowed into the Windows MCP registry. This will include code-signing, security testing of exposed interfaces, and declaration of what privileges are required.
  • Runtime isolation through what Weston called "isolation and granular permissions."

MCP was introduced by Anthropic just 6 months ago, the article notes, but Microsoft has now joined the official MCP steering committee, "and is collaborating with Anthropic and others on an updated authorization specification as well as a future public registry service for MCP servers."


MCP Will Be Built Into Windows To Make an 'Agentic OS' - Bringing Security Concerns

Comments Filter:
  • by SuperKendall ( 25149 ) on Saturday May 24, 2025 @06:37PM (#65402105)

    Those who do not watch movies are doomed to live them.

    Here we have someone literally making an AI MCP, as if they have never watched TRON!

  • Whew (Score:4, Funny)

    by fahrbot-bot ( 874524 ) on Saturday May 24, 2025 @06:43PM (#65402115)

    Another reason to be happy my systems are (officially) too old to to run Windows 11 -- though they run Windows 10 and Linux Mint just fine...

    • Don't worry, SystemD will copy it just like it copied the idea of svhost.exe of the pre-win10 days when it was a giant blob of minor process. And even if a minor one crashed, bluescreen. It's windows lite.

  • by fuzzyfuzzyfungus ( 1223518 ) on Saturday May 24, 2025 @06:47PM (#65402117) Journal
    An MS implementation of vibes-RPC based on a 'standard' that is basically a list of security risks, an acknowledgment that they cannot be addressed at the protocol level, and then a "we're using JSON; um, maybe do some kind of authentication and don't get owned by malformed messages".

    I know that there is such a thing as too proscriptive; but 'MCP' seems to be really working for that USB-C comparison; in the specific sense of possibly being anything and promising nothing that people like so much with type-C connectors.
  • by Gravis Zero ( 934156 ) on Saturday May 24, 2025 @06:52PM (#65402127)

    "security is our top priority as we expand MCP capabilities."

    This is a lie because the AI components being installed is completely unnecessary in the first place. Furthermore, if security was the top priority then it would be disable by default and limited to users who choose to install it. Since these are not how it's being deployed it's clear that David Weston is an untrustworthy piece of shit that will lie to you for personal gain.

    • by gweihir ( 88907 ) on Saturday May 24, 2025 @07:38PM (#65402179)

      Hahahah, reminds me of one bank claiming "Security is our highest priority!". They did not even verify the certificate of their own app as we found. You could put an SSL-breaker prosy in between and read everything. We even did a transfer (seeing everything including amount, TAN, etc.) and it went through.

      This is an instance of the "Big Lie" technique, i.e. if your product sucks, just claim it is great. Many people fall for that.

    • This trash seems to be flooding into the OS at an ever-increasing tempo. Each year Windows gets less suitable for serious business.

      Yes, Microsoft has always had the wrong focus, so that's old news. But it seems like the sheer volume of crap, and the deepness of its integration with the system, is increasing. Run through services.msc on W10 and have a fun time figuring out which ones correspond to all these BS features. Because if you go through the normal Settings GUI, what you pick there is likely to overr

    • Most of what a computer is capable of is unnecessary to most users. But the disabled by default option creates additional hurdles that are a general problem to users, especially if something requires installation. Windows already has managed this through network categorisation. You can bet your bottom dollar this will only work if you tick the network connection as a private network - in which case there's no security issue unless you are your own evil enemy.

      it's clear that David Weston is an untrustworthy piece of shit that will lie to you for personal gain.

      Or more accurately security is his top priority,

      • You can bet your bottom dollar this will only work if you tick the network connection as a private network

        Oh sweet summer child, that is clearly not what's happening.

        Or more accurately security is his top priority, within the bounds given to him

        Which means "top priority" is actually a lie since the bounds have a nigher priority.

        and calling someone a piece of shit... well... give how you talk about others consider looking in the mirror.

        I despise liars and if you lie for personal gain then you should not be allowed to be part of society.

        • I despise liars and if you lie for personal gain then you should not be allowed to be part of society.

          How does one go about disallowing someone from being part of society?

        • Oh sweet summer child, that is clearly not what's happening.

          Show me the code. I mean you seem to be clear about the implementation already. Show me that this works differently than every other discovery type protocol currently used in Windows. You must have evidence to make a claim that this is completely architecturally different from everything else right?

          Which means "top priority" is actually a lie since the bounds have a nigher priority.

          That's not how bounds work. If you get told to make a knife, your top priority can still be making the safest possible knife that still cuts something. The actual safe option is to not have a knife. Learn the dif

          • Show me that this works differently than every other discovery type protocol currently used in Windows.

            I'm going to chalk this up to miscommunication because MCP is not a discovery protocol, it's an client/server protocol which means it could be between your PC and something on the internet. How Microsoft will manage MCP connectivity has only been defined as "A proxy to mediate all MCP client-server interactions.". My point was that MCP clients would likely be interfacing with a server on the internet rather than an MCP server on one's LAN.

            That's not how bounds work.

            It depends on context. When someone speaks for a company, I it in the

      • by vbdasc ( 146051 ) on Sunday May 25, 2025 @03:25AM (#65402513)

        His personal top priority could be security, let me admit this for the sake of argument. But... he said "our top priority", ie "MS' top priority", as he represents Microsoft. And no, security definitely isn't Microsoft's top priority. Hence yes, Mr. Weston is a liar.

    • by Entrope ( 68843 )

      I was going to say that he mis-explained Microsoft's "solution" here:

      A proxy to mediate all MCP client-server interactions. This will enable centralized [collection and monetization of even more user data by M$FT].

  • History Repeats? (Score:4, Informative)

    by lockecole2 ( 455419 ) on Saturday May 24, 2025 @07:01PM (#65402137)

    OLE / COM+ by any other name, perhaps?

    • by Anonymous Coward
      I was thinking DDE (Dynamic Data Exchange) myself but, yes, just same old tech for a new generation.
      • Can I just vibe code it now?

        "Once youâ(TM)ve provided the documentation, clearly describe to Claude what kind of server you want to build. Be specific about:

        What resources your server will expose
        What tools it will provide
        Any prompts it should offer
        What external systems it needs to interact with
        For example:

        Copy
        Build an MCP server that:
        - Connects to my company's PostgreSQL database
        - Exposes table schemas as resources
        - Provides tools for running read-only SQL queries
        - Includes prompts for common data anal

    • by fuzzyfuzzyfungus ( 1223518 ) on Saturday May 24, 2025 @07:47PM (#65402185) Journal
      It would be mildly hilarious if the actual adoption is basically just conventional, non 'agentic' malware taking advantage of yet another IPC mechanism being added, likely in a rush and without due care because that's how Microsoft does 'AI' as during the 'Recall' debacle.

      There's nothing actually 'AI' related about the interface; aside from it happening to originate through the usual "industry runner-up suddenly decides that open interoperability is a critical virtue" process; and any novelty is usually a gold rush for exploiting naïve and optimistic implementations by people rushing to ship first or coming in without properly understanding the problem.
      • Control the agenda. People in the MS world will become dependent on it and it becomes the defacto standard in a narrow industry segment. Its a pretty common business tactic. You gotta start somewhere.
        • Control the agenda. People in the MS world will become dependent on it and it becomes the defacto standard in a narrow industry segment. Its a pretty common business tactic. You gotta start somewhere.

          Q: How many Microsoft engineers are required to screw in a lightbulb?

          A: None, because Microsoft can declare Darkness the new Standard.

  • by Anonymous Coward

    Possibilities:

    Master Control Program (Tron), a computer character from the 1982 film Tron
    Microsoft Certified Partner, an independent company that provides Microsoft-related products or services
    Microsoft Certified Professional, a certification from Microsoft
    Model Context Protocol [wikipedia.org], a standard for applications to provide context to LLMs
    Multi-chip package, in semiconductor packaging technology

  • by gweihir ( 88907 ) on Saturday May 24, 2025 @07:35PM (#65402173)

    Still evil as fuck...

  • Not so much for you.
    You would want to grab the steering wheel on those standards before your competitor does.

    Control the platform, Like Google and Android ..
  • by rapjr ( 732628 ) on Saturday May 24, 2025 @08:50PM (#65402273)
    Accepts remote commands, controls all apps, reports everything to a centralized server.
  • by OrangeTide ( 124937 ) on Saturday May 24, 2025 @09:45PM (#65402325) Homepage Journal

    Nopeing right out of this shit.

  • by PPH ( 736903 ) on Saturday May 24, 2025 @10:28PM (#65402371)

    Hook your LLM garbage to my file system and other resources? Just no.

    Will I be able to "re-plumb" your MCP stuff to data stores of my own choosing? Like in the movie "Brazil" where Tuttle re-connects the environmental suits of the Central Services technicians to the sewer line.

  • "The" (only) top priority is profit (which is true for almost all US corporations). AI Security will take a back seat if profit is at stake.
  • All the marketing wank sounds great, I want all of that. But only if it can do that on my machine, without a network connection or a central server.

    If any queries need to leave my machine, then I do not want this thing at all, and would consider it a virus.

  • ... Master Control Program anyone? no? Tron?

  • this sounds like the story of internet explorer being bundled with windows in the early internet days.

Think of your family tonight. Try to crawl home after the computer crashes.

Working...