A short history of MCP and the shift to agentic AI
Before MCP, integrations between AI and tools were messy. Every setup was custom. If you wanted your AI to access a database or your codebase, you had to build your own connector. MCP changed that. Introduced in late 2024, it created a shared language between AI systems and external tools. Suddenly, you could plug different tools into different AI models without rewriting everything. This shift also marked the move toward agentic AI. Instead of just generating text, AI systems can now take actions. They can chain multiple steps, access live data, and execute tasks across systems. That power is exactly what makes MCP exciting. It is also what makes it risky.How MCP works under the hood
At a high level, MCP follows a client server model. You have a host application, like an IDE or a CLI tool. This host connects to MCP servers. Each server exposes capabilities in three main forms:- resources, which are data sources like files or APIs
- prompts, which define structured interactions
- tools, which are executable functions
MCP in real developer workflows (IDE, cloud, automation)
MCP is already showing up in tools like IDE assistants and cloud development environments. Inside an editor, an AI can:- read your codebase
- suggest changes
- run tests
- refactor files automatically
MCP for game developers: Unity, tooling, and real-time workflows
For game developers, MCP opens some very interesting doors, especially in the Unity ecosystem. Imagine working in Unity and having an AI that can:- inspect your scene hierarchy
- modify game objects
- adjust components and scripts
- read console logs and fix errors
What MCP solutions exist for Unity developers
If you are working with Unity, there are currently two main approaches to MCP integration: community driven tools and vendor backed solutions. Community Driven Solutions Community projects, like those from CoplayDev and CoderGamester, focus on speed and flexibility. They expose many parts of the Unity editor as MCP tools, which makes them great for experimentation and fast iteration. This freedom comes with risk. These tools often have fewer guardrails, so you need to be careful about permissions and access, especially in complex Unity projects where small automated changes can have wide impact. Vendor Backed Solutions Unity is building its own official path with the AI Gateway. It is still in beta, you can request access here. This approach focuses on stability and governance. It uses controlled components like a relay process, tool registry, and project level permissions to manage how AI interacts with the editor. This makes it a better fit for production and team environments, where predictable behavior and stricter security controls are more important than speed.Where things get risky: Why MCP expands the attack surface
The main issue with MCP is not one single vulnerability. It is the expansion of the attack surface. Before MCP, an AI could only work with what you gave it manually. Now it can:- access local files
- call external APIs
- execute commands
- interact with third party services
- the MCP servers you install
- the tools they expose
- the data they fetch
- the permissions you grant
Common MCP security risks explained simply
Let’s break down the most important risks in a developer friendly way. Prompt Injection This is when malicious input tricks the AI into doing something unintended. With MCP, this can lead to real actions, not just wrong answers. Tool Poisoning Tools can include hidden instructions in their descriptions. The AI may follow these instructions without you noticing. Over Permissioned Tools If a tool has too many permissions, the AI can perform actions that go far beyond what is needed. Data Exfiltration An AI could read sensitive files and send the data somewhere else through a tool call. Malicious MCP Servers Since many MCP servers are community built, some may contain vulnerabilities or hidden behavior.Real world vulnerabilities and what they mean for you
MCP risks are not just theoretical. Security research has already shown that many MCP servers have serious issues. These are not only AI specific problems, but also classic vulnerabilities like command injection and file system escapes. In simple terms, this means:- an attacker could run commands on your machine
- sensitive files could be read or modified
- your development environment could be compromised
| CVE | component | issue | impact |
|---|---|---|---|
| CVE-2025-6514 | mcp-remote | command injection via unvalidated parameters | full system compromise and arbitrary command execution |
| CVE-2025-53110 | filesystem mcp server | weak path validation using simple string checks | unauthorized access to files outside allowed directories |
| CVE-2025-53109 | filesystem mcp server | symlink bypass of security checks | full read and write access to host system, possible code execution |
| CVE-2025-49596 | mcp inspector | csrf vulnerability in developer tool | remote code execution through a crafted webpage |
MCP in Unity: Powerful but risky?
Back to Unity, the risks become even more interesting. Unity projects are complex systems. Assets, scenes, and scripts are all interconnected. A small change can have big consequences. With MCP, an AI can perform a sequence of actions inside the editor. If that sequence is wrong or manipulated, it can:- corrupt scene data
- break asset references
- introduce hard to debug issues
Practical security tips for developers and game dev teams
So what can you actually do? Start with the basics:- only use trusted MCP servers
- review tool permissions carefully
- avoid auto approval modes for sensitive actions
- run MCP tools in isolated environments or containers
- limit file system and network access
- use least privilege principles for tokens and APIs
- keep version control clean and frequent
- review AI generated changes before applying them
- avoid giving full project control to automated agents



