
Summary
The 'MCP Sensitive System File Search' detection rule is designed to identify attempts made by adversaries or malicious insiders to search for files containing sensitive information such as passwords, API keys, credentials, and other confidential configuration files within the MCP (Machine Code Program) environment. It leverages various MCP filesystem methods, including `read_file`, `search_files`, and related commands to look for patterns indicative of sensitive data. To function correctly, the detection relies on logs generated by MCP servers and applies a complex search query that checks for file paths and parameters associated with confidential information. Within its implementation, the rule can categorize search attempts into different types such as PATH_ACCESS, PATTERN_SEARCH, and DIRECTORY_ENUM, providing detailed analytics through aggregated statistics and time frames. The false positives expected mainly arise from legitimate developer activities such as searching for configuration files as part of standard coding practices or security audits. This rule could be integrated into Splunk with necessary configurations to normalize the search operations through the MCP Technology Add-on, thus enabling effective monitoring of sensitive file searches.
Categories
- Cloud
- Web
- Application
- Endpoint
Data Sources
- Malware Repository
- User Account
- Malware Repository
- Process
ATT&CK Techniques
- T1552.001
Created: 2026-02-05