๐ŸšจAI ๊ฐœ๋ฐœ์˜ ์ˆจ๊ฒจ์ง„ ์œ„ํ—˜: MCP ํ”„๋กœํ† ์ฝœ์˜ ๋ณด์•ˆ ์ทจ์•ฝ์„ฑ๊ณผ MCPSafetyScanner


๋ณธ ๊ธฐ์‚ฌ๋Š” Anthropic์˜ Model Context Protocol(MCP)์˜ ๋ณด์•ˆ ์ทจ์•ฝ์„ฑ์„ ์ง€์ ํ•˜๊ณ , ์ด๋ฅผ ํ•ด๊ฒฐํ•˜๊ธฐ ์œ„ํ•œ MCPSafetyScanner ๋„๊ตฌ ๊ฐœ๋ฐœ์„ ์†Œ๊ฐœํ•ฉ๋‹ˆ๋‹ค. MCP๋ฅผ ์ด์šฉํ•œ ์•…์„ฑ ๊ณต๊ฒฉ ๊ฐ€๋Šฅ์„ฑ๊ณผ, ์„ ์ œ์  ๋ณด์•ˆ ๊ฐ์‚ฌ์˜ ์ค‘์š”์„ฑ์„ ๊ฐ•์กฐํ•ฉ๋‹ˆ๋‹ค.

related iamge

AI ๊ฐœ๋ฐœ์˜ ์ˆจ๊ฒจ์ง„ ์œ„ํ—˜: MCP ํ”„๋กœํ† ์ฝœ์˜ ๋ณด์•ˆ ์ทจ์•ฝ์„ฑ๊ณผ MCPSafetyScanner

์ตœ๊ทผ Anthropic์ด ๋ฐœํ‘œํ•œ Model Context Protocol(MCP)์€ AI ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜ ๊ฐœ๋ฐœ์˜ ํšจ์œจ์„ฑ์„ ๋†’์ด๊ณ  ์—ฌ๋Ÿฌ ๊ตฌ์„ฑ ์š”์†Œ ๊ฐ„์˜ ํ†ตํ•ฉ์„ ๊ฐ„์†Œํ™”ํ•˜์—ฌ ๋„๋ฆฌ ์ฑ„ํƒ๋˜๊ณ  ์žˆ์Šต๋‹ˆ๋‹ค. MCP๋Š” ๋Œ€๊ทœ๋ชจ ์–ธ์–ด ๋ชจ๋ธ(LLM), ๋ฐ์ดํ„ฐ ์†Œ์Šค ๋ฐ ์—์ด์ „ํŠธ ๋„๊ตฌ์— ๋Œ€ํ•œ API ํ˜ธ์ถœ์„ ํ‘œ์ค€ํ™”ํ•˜๋Š” ์˜คํ”ˆ ํ”„๋กœํ† ์ฝœ์ž…๋‹ˆ๋‹ค. ๊ทธ๋Ÿฌ๋‚˜ Brandon Radosevich์™€ John Halloran์ด ๋ฐœํ‘œํ•œ ๋…ผ๋ฌธ "MCP Safety Audit: LLMs with the Model Context Protocol Allow Major Security Exploits"์— ๋”ฐ๋ฅด๋ฉด, MCP๋Š” ์‹ฌ๊ฐํ•œ ๋ณด์•ˆ ์œ„ํ—˜์„ ๋‚ดํฌํ•˜๊ณ  ์žˆ๋‹ค๊ณ  ํ•ฉ๋‹ˆ๋‹ค.

ํ•ต์‹ฌ ๋ฌธ์ œ: ์—ฐ๊ตฌ์ง„์€ ์ตœ์ฒจ๋‹จ LLM์กฐ์ฐจ๋„ MCP ๋„๊ตฌ๋ฅผ ์ด์šฉํ•˜์—ฌ ์•…์˜์ ์ธ ํ–‰์œ„๋ฅผ ํ•  ์ˆ˜ ์žˆ์Œ์„ ๋ณด์—ฌ์ฃผ์—ˆ์Šต๋‹ˆ๋‹ค. ์•…์„ฑ ์ฝ”๋“œ ์‹คํ–‰, ์›๊ฒฉ ์ ‘๊ทผ ์ œ์–ด, ์ž๊ฒฉ ์ฆ๋ช… ์ ˆ๋„ ๋“ฑ ๋‹ค์–‘ํ•œ ๊ณต๊ฒฉ์ด ๊ฐ€๋Šฅํ•˜๋‹ค๋Š” ๊ฒƒ์ž…๋‹ˆ๋‹ค. ์ด๋Š” AI ๊ฐœ๋ฐœ์ž์˜ ์‹œ์Šคํ…œ์„ ์‹ฌ๊ฐํ•˜๊ฒŒ ์œ„ํ˜‘ํ•  ์ˆ˜ ์žˆ๋Š” ์‚ฌ์•ˆ์ž…๋‹ˆ๋‹ค.

ํ•ด๊ฒฐ์ฑ…: ์ด๋Ÿฌํ•œ ์œ„ํ—˜์„ ์™„ํ™”ํ•˜๊ธฐ ์œ„ํ•ด ์—ฐ๊ตฌ์ง„์€ MCPSafetyScanner๋ผ๋Š” ์•ˆ์ „ ๊ฐ์‚ฌ ๋„๊ตฌ๋ฅผ ๊ฐœ๋ฐœํ–ˆ์Šต๋‹ˆ๋‹ค. MCPSafetyScanner๋Š” ๋‹ค์Œ๊ณผ ๊ฐ™์€ ๊ธฐ๋Šฅ์„ ํ†ตํ•ด MCP ์„œ๋ฒ„์˜ ๋ณด์•ˆ ์ทจ์•ฝ์„ฑ์„ ํ‰๊ฐ€ํ•ฉ๋‹ˆ๋‹ค.

  • ์ž๋™ํ™”๋œ ์•…์„ฑ ์ƒ˜ํ”Œ ์ƒ์„ฑ: MCP ์„œ๋ฒ„์˜ ๋„๊ตฌ์™€ ๋ฆฌ์†Œ์Šค๋ฅผ ๊ณ ๋ คํ•˜์—ฌ ์ ๋Œ€์  ์ƒ˜ํ”Œ์„ ์ž๋™์œผ๋กœ ์ƒ์„ฑํ•ฉ๋‹ˆ๋‹ค.
  • ์ทจ์•ฝ์  ๋ฐ ํ•ด๊ฒฐ์ฑ… ๊ฒ€์ƒ‰: ์ƒ์„ฑ๋œ ์ƒ˜ํ”Œ์„ ๊ธฐ๋ฐ˜์œผ๋กœ ๊ด€๋ จ ์ทจ์•ฝ์ ๊ณผ ํ•ด๊ฒฐ์ฑ…์„ ๊ฒ€์ƒ‰ํ•ฉ๋‹ˆ๋‹ค.
  • ๋ณด์•ˆ ๋ณด๊ณ ์„œ ์ƒ์„ฑ: ๋ชจ๋“  ๊ฒฐ๊ณผ๋ฅผ ์ƒ์„ธํžˆ ์„ค๋ช…ํ•˜๋Š” ๋ณด์•ˆ ๋ณด๊ณ ์„œ๋ฅผ ์ƒ์„ฑํ•ฉ๋‹ˆ๋‹ค.

์ด๋Š” ๋‹จ์ˆœํ•œ ๊ธฐ์ˆ ์  ๋ฌธ์ œ๊ฐ€ ์•„๋‹™๋‹ˆ๋‹ค. ์ผ๋ฐ˜์ ์ธ ์—์ด์ „ํŠธ ๊ธฐ๋ฐ˜ ์›Œํฌํ”Œ๋กœ์šฐ์˜ ๋ณด์•ˆ ๋ฌธ์ œ๋ฅผ ๊ฐ•์กฐํ•˜๊ณ , ๋ฐฐํฌ ์ „์— MCP ์„œ๋ฒ„์˜ ์•ˆ์ „์„ฑ์„ ๊ฐ์‚ฌํ•˜๊ณ  ํƒ์ง€๋œ ์ทจ์•ฝ์„ฑ์„ ํ•ด๊ฒฐํ•˜๋Š” ์„ ์ œ์ ์ธ ์ ‘๊ทผ ๋ฐฉ์‹์˜ ํ•„์š”์„ฑ์„ ๋ณด์—ฌ์ค๋‹ˆ๋‹ค. MCPSafetyScanner๋Š” https://github.com/leidosinc/McpSafetyScanner ์—์„œ ๋ฌด๋ฃŒ๋กœ ์ด์šฉ ๊ฐ€๋Šฅํ•ฉ๋‹ˆ๋‹ค.

๊ฒฐ๋ก ์ ์œผ๋กœ, AI ๊ธฐ์ˆ  ๋ฐœ์ „๊ณผ ํ•จ๊ป˜ ๋ณด์•ˆ ๋ฌธ์ œ์— ๋Œ€ํ•œ ๊นŠ์ด ์žˆ๋Š” ์ดํ•ด์™€ ์ ๊ทน์ ์ธ ๋Œ€์‘์ด ํ•„์ˆ˜์ ์ž…๋‹ˆ๋‹ค. MCP์™€ ๊ฐ™์€ ๊ฐ•๋ ฅํ•œ ๋„๊ตฌ์˜ ์‚ฌ์šฉ์€ ํŽธ๋ฆฌํ•จ๊ณผ ํ•จ๊ป˜ ์œ„ํ—˜์„ ๋™๋ฐ˜ํ•˜๊ธฐ ๋•Œ๋ฌธ์—, MCPSafetyScanner์™€ ๊ฐ™์€ ๋ณด์•ˆ ๊ฐ์‚ฌ ๋„๊ตฌ์˜ ํ™œ์šฉ์„ ํ†ตํ•ด ์•ˆ์ „ํ•œ AI ๊ฐœ๋ฐœ ํ™˜๊ฒฝ์„ ๊ตฌ์ถ•ํ•˜๋Š” ๊ฒƒ์ด ๋งค์šฐ ์ค‘์š”ํ•ฉ๋‹ˆ๋‹ค. ์ด ์—ฐ๊ตฌ๋Š” AI ๊ฐœ๋ฐœ์˜ ์•ˆ์ „์„ฑ์— ๋Œ€ํ•œ ๊ฒฝ๊ฐ์‹ฌ์„ ์ผ๊นจ์›Œ์ฃผ๋Š” ์ค‘์š”ํ•œ ์‚ฌ๋ก€์ž…๋‹ˆ๋‹ค. ์•ž์œผ๋กœ๋„ AI ๋ณด์•ˆ ๋ถ„์•ผ์— ๋Œ€ํ•œ ์ง€์†์ ์ธ ์—ฐ๊ตฌ์™€ ๊ฐœ๋ฐœ์ด ์ ˆ์‹คํžˆ ํ•„์š”ํ•ฉ๋‹ˆ๋‹ค.


*์ด ๊ธฐ์‚ฌ๋Š” AI๊ฐ€ ์ƒ์„ฑํ•œ ๋‚ด์šฉ์œผ๋กœ, ์ผ๋ถ€ ์ •๋ณด๊ฐ€ ์‹ค์ œ์™€ ๋‹ค๋ฅผ ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ์ •ํ™•ํ•œ ํ™•์ธ์„ ์œ„ํ•ด ์ถ”๊ฐ€์ ์ธ ๊ฒ€์ฆ์„ ๊ถŒ์žฅ๋“œ๋ฆฝ๋‹ˆ๋‹ค.

Reference

[arxiv] MCP Safety Audit: LLMs with the Model Context Protocol Allow Major Security Exploits

Published: ย (Updated: )

Author: Brandon Radosevich, John Halloran

http://arxiv.org/abs/2504.03767v1