According to a recent LinkedIn post from OX Security, the company’s research highlights critical vulnerabilities in two Model Context Protocol (MCP) platforms, Flowise and Upsonic, with CVSS scores of 10.0 and 9.8 respectively. The post explains that OX Security’s MCP Supply Chain Vulnerability report details how their MCP STDIO input sanitization bypass techniques exposed these weaknesses and what security teams might derive from the findings.
Claim 55% Off TipRanks
- Unlock hedge fund-level data and powerful investing tools for smarter, sharper decisions
- Discover top-performing stock ideas and upgrade to a portfolio of market leaders with Smart Investor Picks
The LinkedIn post suggests that both affected platforms followed Anthropic’s recommended input-sanitization approach, yet still left a significant exposure due to the ability to pass NPX “-c” flags that enable arbitrary command execution. According to the post, this gap could allow direct command execution on host machines, underscoring that sanitization alone may not be a sufficient risk-mitigation strategy for user inputs.
As described in the post, OX Security advocates for running MCP STDIO servers in isolated sandboxes to better contain execution, limit access to sensitive data, and reduce lateral movement risk. For investors, this emphasis on advanced research into emerging MCP supply-chain threats may reinforce OX Security’s positioning as a specialist in securing AI and developer tooling infrastructure, potentially supporting long-term demand for its products and services as these architectures gain broader enterprise adoption.
The publication of a detailed vulnerability report, as referenced in the LinkedIn content, could also enhance OX Security’s visibility among security engineers and enterprise buyers seeking guidance on MCP security design. If the report gains traction within the cybersecurity community, it may strengthen the company’s reputation for technical depth and thought leadership, factors that can be important in competitive, trust-driven security procurement cycles.

