<ul data-eligibleForWebStory="true">Attackers exploiting MCP servers prompt injection and convo history theft threats.Trail of Bits research outlines security gaps, defense strategies, and cost-based attack vectors.Practical steps include limiting resources, semantic attack detection, and cost-aware rate limiting.Follow OWASP and NIST recommendations to secure AI systems against emerging threats.