Security Advisory: Systematic MCP Server Forking as a Supply-Chain Attack Vector
Published: 2026-03-23
Severity: High
Affected Ecosystem: Model Context Protocol (MCP) servers -- npm, PyPI, and third-party marketplaces
Affected Package (example): @iflow-mcp/cscsoftware-aidex-mcp (v1.9.0, published by chatflowdev) -- an unauthorized republication of aidex-mcp
Original Repository: CSCSoftware/AiDex
Summary
We have identified a systematic campaign in which an organization operating under the name "iflow-mcp" (associated with the domain platform.iflow.cn) is forking hundreds of open-source MCP servers on GitHub, republishing them under their own npm scope (@iflow-mcp/) and on PyPI, and distributing them through their own marketplace -- all without contacting or notifying the original authors.
While forking open-source software is permitted by most licenses, republishing MCP servers through an unvetted third-party pipeline creates a critical supply-chain attack surface that the MCP ecosystem is not yet equipped to handle.
This advisory explains why this practice is dangerous, how it affects end users, and what both developers and users should do to protect themselves.
Why MCP Servers Are Not Ordinary Plugins
MCP servers are fundamentally different from typical npm packages or browser extensions. By design, they operate with deep, privileged access to the user's environment:
- Filesystem Access: MCP servers read source code, navigate directories, and retrieve file contents. They can access
.env files, API keys, SSH keys, credentials, and proprietary code.
- Direct AI Communication: They communicate via stdio directly with the AI client (Claude, Cursor, VS Code, etc.) and can manipulate tool responses in ways the user cannot easily detect.
- User-Level Permissions: They run with the same OS permissions as the user who started them -- no sandboxing, no permission prompts, no isolation.
- Implicit Trust: Users install MCP servers specifically because they want the AI to use them. Every tool call the AI makes to the server is executed automatically.
What a Trojanized MCP Server Could Do
A malicious actor who modifies an MCP server's code before republishing it could:
- Exfiltrate sensitive data -- API keys, credentials, source code, database connection strings -- while appearing to perform normal indexing or file analysis operations.
- Feed the AI false information -- suggest insecure code patterns, hide vulnerabilities in search results, redirect the AI to wrong files, or suppress warnings.
- Inject malicious code -- instruct the AI to write backdoors, vulnerable dependencies, or data-leaking code into the user's project.
- Persist silently -- since MCP servers run as long-lived processes, a compromised server has continuous access for the entire session.
None of this requires sophisticated exploitation. A few lines of code added to an otherwise legitimate MCP server is enough.
The Broken Trust Chain
The core problem is a broken chain of trust:
- Developer A publishes an MCP server as open source on GitHub and npm.
- Organization X forks the repository, republishes it under their own npm scope or on their marketplace.
- User finds the package in X's marketplace, recognizes the familiar name, and installs it -- believing it to be the original or an officially endorsed version.
- Nothing prevents Organization X from modifying the code before publishing. There is no signature verification, no reproducible build pipeline, and no way for the user to confirm the published package matches the original source.
The user's trust in Developer A is silently transferred to Organization X -- an entity the user knows nothing about and the developer never authorized.
Specific Case: AiDex MCP Server
AiDex is a code indexing MCP server published at:
Without any contact or notification, the following unauthorized copy appeared:
- npm:
@iflow-mcp/cscsoftware-aidex-mcp (version 1.9.0)
- Published by:
chatflowdev
- Marketplace:
platform.iflow.cn
We have not yet confirmed whether the republished version contains any modifications beyond repackaging. However, the mere existence of an unvetted republication pipeline for security-critical software is the vulnerability -- whether or not it has been exploited yet.
This is not an isolated case. The same organization has forked and republished hundreds of MCP servers using the same pattern.
Recommendations
For MCP Server Developers
- Monitor for unauthorized republications. Regularly search npm (
@iflow-mcp/<your-name>), PyPI, and third-party marketplaces for copies of your packages.
- Add a clear notice to your README stating the only official distribution channels (your npm package name, your GitHub repo).
- Consider adding a startup verification check that warns users if the package name or distribution channel does not match the expected values.
- Sign your releases where possible. Use npm provenance (
--provenance flag) to create a verifiable link between your GitHub source and the published package.
- Document your package's expected behavior so users can recognize deviations.
For MCP Server Users
- Only install MCP servers from their original, documented source. Always verify the npm package name, GitHub repository, and author before installing.
- Never install MCP servers from third-party "marketplaces" or aggregators unless you can independently verify the package integrity against the original.
- Be suspicious of scoped packages (
@organization/package-name) that mirror the name of a well-known unscoped package -- especially if the scope belongs to an unfamiliar organization.
- Check the publisher. On npm, verify who published the package. If the publisher is not the original author, treat it as untrusted.
- Audit MCP server behavior. If an MCP server makes unexpected network requests, accesses files outside its documented scope, or produces unusual tool responses, investigate immediately.
- Keep MCP servers updated from the original source. Do not rely on third-party forks for updates.
For the MCP Ecosystem (Claude/Anthropic, Tool Vendors, Registry Operators)
- Implement a verified publisher program for MCP servers, similar to verified extensions in VS Code or verified publishers on npm.
- Add provenance metadata to MCP server registries -- link each published package to its source repository with cryptographic verification.
- Warn users when installing MCP servers from unverified or third-party sources.
- Consider sandboxing MCP server filesystem and network access with explicit permission grants.
Timeline
| Date |
Event |
| 2025 |
AiDex MCP Server published on GitHub and npm |
| 2026-03 |
Unauthorized republication discovered under @iflow-mcp/cscsoftware-aidex-mcp |
| 2026-03-23 |
This security advisory published |
References
Contact
If you have discovered additional unauthorized republications of MCP servers, or if you have evidence of modified code in any republished package, please open an issue on the AiDex repository or contact us at u.chalas@csc-software.de.
This advisory is provided in the interest of ecosystem security. It is not a legal claim regarding licensing but a warning about supply-chain risk. The MCP ecosystem is young, and the tooling for verifying package integrity does not yet exist at the level required for software with this degree of system access.
Security Advisory: Systematic MCP Server Forking as a Supply-Chain Attack Vector
Published: 2026-03-23
Severity: High
Affected Ecosystem: Model Context Protocol (MCP) servers -- npm, PyPI, and third-party marketplaces
Affected Package (example):
@iflow-mcp/cscsoftware-aidex-mcp(v1.9.0, published bychatflowdev) -- an unauthorized republication ofaidex-mcpOriginal Repository: CSCSoftware/AiDex
Summary
We have identified a systematic campaign in which an organization operating under the name "iflow-mcp" (associated with the domain
platform.iflow.cn) is forking hundreds of open-source MCP servers on GitHub, republishing them under their own npm scope (@iflow-mcp/) and on PyPI, and distributing them through their own marketplace -- all without contacting or notifying the original authors.While forking open-source software is permitted by most licenses, republishing MCP servers through an unvetted third-party pipeline creates a critical supply-chain attack surface that the MCP ecosystem is not yet equipped to handle.
This advisory explains why this practice is dangerous, how it affects end users, and what both developers and users should do to protect themselves.
Why MCP Servers Are Not Ordinary Plugins
MCP servers are fundamentally different from typical npm packages or browser extensions. By design, they operate with deep, privileged access to the user's environment:
.envfiles, API keys, SSH keys, credentials, and proprietary code.What a Trojanized MCP Server Could Do
A malicious actor who modifies an MCP server's code before republishing it could:
None of this requires sophisticated exploitation. A few lines of code added to an otherwise legitimate MCP server is enough.
The Broken Trust Chain
The core problem is a broken chain of trust:
The user's trust in Developer A is silently transferred to Organization X -- an entity the user knows nothing about and the developer never authorized.
Specific Case: AiDex MCP Server
AiDex is a code indexing MCP server published at:
aidex-mcpWithout any contact or notification, the following unauthorized copy appeared:
@iflow-mcp/cscsoftware-aidex-mcp(version 1.9.0)chatflowdevplatform.iflow.cnWe have not yet confirmed whether the republished version contains any modifications beyond repackaging. However, the mere existence of an unvetted republication pipeline for security-critical software is the vulnerability -- whether or not it has been exploited yet.
This is not an isolated case. The same organization has forked and republished hundreds of MCP servers using the same pattern.
Recommendations
For MCP Server Developers
@iflow-mcp/<your-name>), PyPI, and third-party marketplaces for copies of your packages.--provenanceflag) to create a verifiable link between your GitHub source and the published package.For MCP Server Users
@organization/package-name) that mirror the name of a well-known unscoped package -- especially if the scope belongs to an unfamiliar organization.For the MCP Ecosystem (Claude/Anthropic, Tool Vendors, Registry Operators)
Timeline
@iflow-mcp/cscsoftware-aidex-mcpReferences
Contact
If you have discovered additional unauthorized republications of MCP servers, or if you have evidence of modified code in any republished package, please open an issue on the AiDex repository or contact us at u.chalas@csc-software.de.
This advisory is provided in the interest of ecosystem security. It is not a legal claim regarding licensing but a warning about supply-chain risk. The MCP ecosystem is young, and the tooling for verifying package integrity does not yet exist at the level required for software with this degree of system access.