
Summary
The MCP GitHub Suspicious Operation rule aims to detect potentially malicious activities on the MCP GitHub server. It monitors various interactions, including secret hunting, organization, and repository reconnaissance, branch protection abuse, CI/CD workflow manipulation, sensitive file access, and vulnerability intelligence gathering. These behaviors can indicate supply chain attacks, credential harvesting, or reconnaissance leading to potential attacks. The rule uses a comprehensive search query approach that evaluates incoming connections to identify patterns that match suspicious activities. Each suspicious activity is categorized into specific attack types for better analysis and response. By leveraging the capabilities of the MCP Technology Add-on and ensuring proper logging configurations, users can enforce this rule effectively.
Categories
- Web
- Application
Data Sources
- Malware Repository
ATT&CK Techniques
- T1552.001
Created: 2026-02-05