- Kulkan Newsletter
- Posts
- Assessing the Attack Surface of Remote MCP Servers
Assessing the Attack Surface of Remote MCP Servers
This edition dives into our latest analysis of remote MCP servers and how integrations expand the attack surface for LLM-based systems. We also share quick updates from our recent K-Talks session, industry events, and why feedback plays a key role in delivering stronger pentesting assessments.
š Latest from Our Blog:
MCP (Model Context Protocol) defines how LLMs interact with external data sources and tools. However, more reach and integrations equals more surface, where the usual vulnerability categories show up. Matias Forti explores how MCPās architecture impacts pentesting workflows, why conventional tools struggle to keep up, and how frameworks like MCP Inspector and NCCās HTTP Bridge can help overcome these challenges. | ![]() |
![]() | ā Highlight:āWhile the MCP specification brings a novel interface for integrating LLMs with external systems, it also introduces familiar risks in a new format. Remote MCP servers present a clear attack surface that mirrors traditional web application vulnerabilities like command injection, SSRF, and IDOR.āMatĆas Forti - Technical Lead |
šļø K-Talks:
In our Kulkan Talks space, our team shares techniques and findings that help strengthen upcoming assessments. In the latest session, Agustin Dendarys and Matias Forti walked the team through our wireless security testing methodology.

At Kulkan, continuous learning and collaborative knowledge sharing is what drives our ability to deliver robust security assessments.
šļø Key Industry Events:
Lucas Lavarello, Kulkanās CEO, joined a panel alongside other cybersecurity leaders at the āTecweek Emprendeā event, where he shared lessons learned and practical advice for founders building secure startups.

Held in Buenos Aires, the event offered a strong platform to highlight how early-stage companies can gain a significant advantage by fostering a culture of open communication and basic security hygiene.
š” Kulkanner Insight:
![]() | How do We Handle Feedback?By Agustin Dendarys. At Kulkan, feedback in one of our most powerful tools. Itās not only about giving feedback, itās about communicating it correctly. Receiving and acting on feedback is just as important; which is why we proactively ask our customers for input right after every project we deliver⦠|
Ready to strengthen your security posture?
If youāre planning upcoming penetration testing initiatives, letās start the conversation and explore how our attacker-led approach can help secure your business and support its growth.


