Evan__Harris Profile Banner
Evan Harris Profile
Evan Harris

@Evan__Harris

Followers
706
Following
10K
Media
97
Statuses
11K

Agentic systems engineer. Securing MCP integrations. Building dev tools & Obsidian plugins.

Security Research ➡️
Joined October 2017
Don't wanna be here? Send us removal request.
@Evan__Harris
Evan Harris
1 month
Your vulnerability scan results could leak to attackers via DNS rebinding. CVE-2025-59163 affects SafeDep Vet MCP Server running SSE transport. The attack: A single website visit. The payload: Your entire package vulnerability database. The fix: Already shipped. Here's how it
1
0
4
@Evan__Harris
Evan Harris
23 days
This incident is a reminder of the security challenges posed by locally exposed developer tools. Robust Host header validation and CSRF protections are crucial. For a full technical breakdown, read the advisory: https://t.co/aMnkVJJDq7
mcpsec.dev
A DNS rebinding vulnerability in the Neo4j MCP Cypher Server allows remote attackers to execute arbitrary Cypher queries against a user’s database, leading to potential data theft, modification, and...
0
0
2
@Evan__Harris
Evan Harris
23 days
Shoutout to the @neo4j security team for a stellar communication and a quick turn around time on a security patch. I am grateful for their excellent triaging.
1
0
2
@Evan__Harris
Evan Harris
23 days
If you are using Neo4j MCP Cypher Server versions 0.2.2 through 0.3.1, you are vulnerable. An immediate update to the patched version, v0.4.0, is recommended.
1
0
0
@Evan__Harris
Evan Harris
23 days
The attack works when a user with a vulnerable server running locally visits a malicious webpage. The page performs the DNS rebind, tricking the browser into communicating directly with the local Neo4j service on the attacker's behalf.
1
0
0
@Evan__Harris
Evan Harris
23 days
An attacker can execute Cypher queries to exfiltrate, modify, or delete all data within the user's local Neo4j database. Neo4j rated this vulnerability as CVSS 4.0 High severity (7.4).
1
0
0
@Evan__Harris
Evan Harris
23 days
The Cypher MCP Server provides a local HTTP endpoint to run Cypher queries. The vulnerability allows a malicious website to send arbitrary queries to this endpoint.
1
0
0
@Evan__Harris
Evan Harris
23 days
New Security Advisory: A High severity DNS rebinding vulnerability (CVE-2025-10193) in the Neo4j MCP Cypher Server allows for complete database takeover by remote attackers. The breakdown:
1
0
2
@Evan__Harris
Evan Harris
26 days
Some companies are friendly to submit disclosures to. Others are so abrasive I do not expect to ever have another positive word to say about them. There may be many downstream users of the second batch of companies. However, the pain of helping them is not worth it. Sorry.
0
0
1
@Evan__Harris
Evan Harris
29 days
Evals Evals Evals I am on Day 5 of AI Evals for Engineers & I am having a blast I learned about: - Axial Coding - Open Coding - LLM as Judge - Error Analysis - Golden Datasets - Perturbing Traces - Guardrails Versus Evals - Programmatic Evaluators What will next week hold?
0
0
2
@Evan__Harris
Evan Harris
30 days
CC always leading the pack
@claudeai
Claude
30 days
Today we’re introducing Claude Code Plugins in public beta. Plugins allow you to install and share curated collections of slash commands, agents, MCP servers, and hooks directly within Claude Code.
0
0
1
@Evan__Harris
Evan Harris
30 days
What is your favorite type of programming? Mine is deleting a feature someone thought would be useful. But the data shows that no one wants it. Less maintenance work. More time to focus on value delivery.
0
0
3
@Evan__Harris
Evan Harris
1 month
AI Evals for Engineers & PMs - Day 3 This course is high value. I had no expectations. I have already been blown away. Feeling blessed be in Oct cohort as the infinite repeats will be my play. The community questions really drive much of my learning.
0
0
2
@Evan__Harris
Evan Harris
1 month
Not your keys not your crypto is a common saying. The new attack vectors via MCP servers add a new layer to this. Use of your keys, by the software you give too much trust to, again leads to the scenario of: Not your crypto.
1
0
2
@Evan__Harris
Evan Harris
1 month
Important lesson for MCP server developers - network-based transports need careful HTTP security header validation. Default to: - localhost binding - stdio transport when possible - Host/Origin validation for SSE/HTTP
1
0
2
@Evan__Harris
Evan Harris
1 month
SafeDep's response was 10 / 10 Aug 30: Report submitted Sep 01: Acknowledged Sep 02: PR raised with fix Sep 05: v1.12.5 released (5 days!) Sep 29: GHSA published v1.12.5 adds Host/Origin header validation. Update now!
1
0
2
@Evan__Harris
Evan Harris
1 month
Despite data exfiltration potential, it's rated Low (CVSS 2.1) because: - Victim must visit malicious site while MCP server is running - SSE transport must be explicitly enabled (not default) - Requires browser with EventSource support - Timing window needed
1
0
1
@Evan__Harris
Evan Harris
1 month
What gets exfiltrated? - Package names & versions in your projects - Known CVEs affecting your dependencies - Vulnerability severity scores - Supply chain intelligence Perfect recon for targeted attacks against your infrastructure.
1
0
1
@Evan__Harris
Evan Harris
1 month
Vet's SSE transport mode lacked Host/Origin header validation. When running vet server mcp --server-type sse, an attacker could: - Establish an MCP session via DNS rebinding - Invoke the sql_query tool - Execute arbitrary READ queries against your scan database
1
0
1
@Evan__Harris
Evan Harris
1 month
DNS rebinding is a clever trick: 1. Victim visits attacker(.)com 2. DNS initially points to attacker's server 3. After browser caches the origin, DNS changes to localhost 4. Now attacker(.)com JS talks to victim's localhost 5. Browser's Same-Origin Policy is bypassed
1
0
1