Key Takeaways
- 8,000+ publicly exposed MCP servers discovered in February 2026 internet scan; 43% carry exploitable command execution vulnerabilities (CVE-mapped)
- Cowork Windows launch (March 2, 2026) extends the agent platform to 75% of developer machines globally—multiplying MCP deployment scale 3x
- MCP's trust model is structurally broken for enterprise: tool descriptions are trusted as-is, tools can mutate after installation, prompt injection through tool outputs enables attacker instructions
- EU AI Act Article 5 (prohibited practices) is live with €35M or 7% revenue penalties; MCP vulnerabilities directly enable subliminal manipulation and unauthorized profiling that violate the Act
- Enterprise adoption is now blocked by a quantified security barrier: Anthropic must ship cryptographic tool attestation, plugin sandboxing, and audit trails before enterprise-grade deployment is defensible
The Expansion and the Vulnerability Are the Same Product
This is not a coincidence of timing. The Model Context Protocol (MCP) is the foundational layer for Cowork's agent capabilities: file system access, external service connections, multi-tool orchestration. Cowork's Windows launch makes the file-system-as-state-substrate agent model available to 75% of global developer machines — approximately 1.5x the macOS install base. The Enterprise Agents Program (February 24) added private plugin marketplaces, 11 open-source plugins, and Deep Connectors for Google Workspace and DocuSign.
Every capability that makes Cowork competitively differentiated is mediated by MCP. And MCP, as of February 2026, is a structurally insecure protocol deployed at scale without adequate security controls.
The exposure data from the February 2026 internet scan: 8,000+ publicly reachable MCP servers, 43% with exploitable command execution vulnerabilities (CVE-mapped), default 0.0.0.0:8080 binding exposing admin panels, debug endpoints, API keys, database credentials, and agent conversation histories. Anthropic's official mcp-server-git carried three CVEs (accepted September 2025, fixed December 2025 — 3-month unpatched window). JFrog's CVE-2025-6514 disclosed an OS command injection in mcp-remote that enables remote code execution via a malicious MCP server.
MCP Security Crisis: Key Metrics (February 2026)
The scale and severity of MCP security exposure coinciding with Cowork's enterprise expansion
Source: r/cybersecurity scan / CVE records / EU AI Act Article 99 (Feb 2026)
Why MCP's Trust Model Is Structurally Broken for Enterprise
MCP's design assumption is single-owner environments where tool descriptions are trusted. This is appropriate for a developer running a personal automation setup with curated tools they control. It is catastrophically inappropriate for enterprise multi-agent workflows.
In Cowork's enterprise deployment model, an organization builds or downloads MCP plugins from a marketplace. Each plugin is an MCP server. MCP's trust model means:
- Tool descriptions are trusted as-is — a plugin that claims 'I write to documents' is trusted. No verification mechanism exists.
- Tool mutation is permitted — a plugin can update its definition after installation. A malicious plugin installs as benign, then reroutes API keys or file operations days later.
- Prompt injection through tool outputs — if a Cowork-connected MCP server returns text that includes malicious instructions, Claude will execute those instructions while appearing to perform the legitimate task.
The Invariant Labs demonstration showed WhatsApp conversation history exfiltration via tool poisoning. The fake Postmark MCP server BCC'd every email handled by affected Claude instances to an attacker-controlled address. These are not hypothetical attack vectors — they have been demonstrated against deployed agentic systems.
The 'confused deputy' problem is unsolvable within MCP's current architecture without cryptographic attestation of tool definitions and a trust hierarchy for multi-agent workflows. Palo Alto Unit 42's analysis of MCP prompt injection attack vectors confirms that instruction-following anomalies can occur at scale, and that multi-agent workflows amplify the confusion of authority.
EU AI Act Collision: Prohibited Practices That MCP Vulnerabilities Enable
The EU AI Act's prohibited practices (Article 5) are live as of February 2, 2025, with penalties up to €35M or 7% of worldwide annual turnover. Key prohibited uses:
- Subliminal manipulation: An MCP server using prompt injection to covertly redirect Claude's actions against users' intentions
- Unauthorized profiling: An attacker extracting conversation histories and behavioral data via exposed MCP endpoints
- Deceptive AI systems: Claude executing attacker instructions while appearing to perform legitimate user tasks
MCP vulnerabilities directly enable all three categories. A compromised Cowork instance — via a malicious plugin in the enterprise marketplace, a prompt injection in an ingested document, or an exposed server endpoint — is an EU AI Act compliance event, not just a security incident.
The EU AI Act enforcement delay (Digital Omnibus proposes extending high-risk Annex III deadlines to December 2027) does NOT delay Article 5 enforcement. Prohibited practices penalties are live now. The 60%+ of SMEs and 50%+ of enterprises lacking adequate AI compliance preparation are unaware that Cowork's MCP security gaps translate directly to active regulatory liability in EU-operating organizations.
The Enterprise Adoption Barrier Is Now Quantified
Prior to the MCP security crisis disclosure, Cowork's enterprise adoption was constrained by:
- Cross-platform availability (resolved: Windows launch)
- IT governance (resolved: admin controls, private marketplaces)
- Regulated industry hesitation (partially resolved: PwC partnership for Finance/Healthcare)
Post-MCP crisis, a fourth barrier is explicit and unresolved:
- Security architecture at enterprise grade (not resolved: requires cryptographic attestation, sandboxed plugin execution, rate limiting, and audit trails for MCP tool use)
The $285B SaaS sector selloff following Cowork's macOS launch priced in the disruption potential; the MCP security crisis prices in the adoption friction. Real-world enterprise CISOs reviewing Cowork deployments in regulated industries face an asymmetric risk calculation: the upside is productivity gains from AI agents, the downside is a €35M EU AI Act violation from a compromised MCP plugin in a marketplace.
MCP Security + Cowork Expansion Collision Timeline
Security vulnerabilities were discovered and multiplied faster than mitigations appeared, while Cowork expanded its attack surface
Anthropic releases MCP as open standard for AI agent tool integration
Simon Willison identifies structural MCP vulnerability: private data + untrusted content + external channel
CVE-2025-68143/68144/68145 accepted for official mcp-server-git
Anthropic fixes 3 CVEs; JFrog discloses CVE-2025-6514 (mcp-remote OS command injection)
$285B SaaS selloff; first major MCP platform security incident
Internet scan reveals mass exposure; Anthropic launches Enterprise Agents Program with plugin marketplaces
75% of developer machines now with persistent file system MCP access
Source: CVE records / Anthropic announcements / security research (Nov 2024 – Mar 2026)
What Needs to Change for Enterprise Trust to Scale
The security requirements for enterprise-grade MCP are known from parallel ecosystems:
- Signed tool registry: Similar to npm with mandatory 2FA publishing — MCP tool definitions must be cryptographically signed and hosted in an auditable registry. Mutations after installation must be flagged and require re-authorization.
- Plugin sandboxing: MCP servers should run in isolated execution environments with explicit capability grants (can read from X folder, cannot write to Y, cannot call external APIs) rather than inheriting Claude's full permission set.
- Audit trails: Every MCP tool invocation must be logged with tool identity, invocation parameters, and output hashes — the audit trail that EU AI Act high-risk system requirements will mandate.
- Prompt injection detection: Runtime monitoring for instruction-following anomalies — Claude acting on instructions that don't originate from the user's input.
None of these are architecturally impossible; all require deliberate security engineering investment that is not yet reflected in MCP's open-source implementations. The security research community has published extensive guidance on these controls. The enterprise-grade implementation is what Anthropic and the MCP ecosystem must ship before the enterprise expansion can proceed safely at scale.
Contrarian Perspective: Misconfiguration, Not Architecture
The 8,000+ exposed servers are almost certainly skewed toward developer/staging environments, not production enterprise deployments. Sophisticated enterprise IT organizations would not expose MCP admin endpoints publicly — this is a Security 101 failure that enterprise security reviews would catch before Cowork deployment. The most severe documented exploits required specific configuration choices (public MCP server bindings, third-party plugin installation without vetting) that careful IT governance would prevent. Anthropic's 3-month CVE-to-patch window is comparable to industry norms for complex vulnerabilities. The EU AI Act collision risk is real but primarily affects organizations that are already misconfiguring their deployments. For organizations with standard enterprise security practices, the actual risk profile may be lower than the security research community's 'crisis' framing suggests.
What This Means for Practitioners
Enterprise Security Teams (CISOs, AppSec): Do not approve Cowork enterprise deployment until Anthropic ships the four security requirements above. Current deployment is defensible only for internal use with vetted, localhost-bound MCP servers (127.0.0.1, not 0.0.0.0). Third-party marketplace plugins require explicit security review — treat them as code review, not app installation. If your organization operates in the EU, conduct Article 5 compliance assessment before Cowork deployment in data-processing contexts.
Regulated Industries (Finance, Healthcare, Legal): MCP's current architecture violates high-risk AI system requirements for audit trails and explainability. Wait for Anthropic to ship cryptographic tool attestation and sandboxed execution. Timeline: 6-12 months pending architectural changes. In the interim, request an audit trail commitment in writing from Anthropic before any Cowork deployment.
Product Teams Integrating Cowork: If you're embedding Cowork's agentic capabilities into products, inventory which MCP connectors you're using. Map them against known CVE databases. Use only official Anthropic plugins or plugins with verified security certifications. Do not distribute third-party marketplace plugins through your product supply chain without explicit security review.
Developers Using Cowork Personally: The risk profile is lower for personal/single-user deployments. Standard security practices apply: keep localhost MCP bindings, use only plugins you trust, and assume MCP server outputs could contain prompt injection attempts. Do not grant Cowork access to sensitive directories (SSH keys, cloud credentials, customer data) without understanding the trust model of the plugins you install.