A critical design flaw in the Model Context Protocol (MCP) architecture has been uncovered, allowing for remote code execution (RCE) on systems running vulnerable MCP implementations1. This vulnerability enables attackers to execute arbitrary commands, granting them direct access to compromised systems. The MCP is a crucial component in the artificial intelligence (AI) supply chain, and this weakness could have far-reaching consequences. As a result, any system relying on a vulnerable MCP implementation is potentially exposed to RCE attacks. The vulnerability is particularly concerning because it is inherent to the protocol's design, rather than a bug in a specific implementation. This means that a wide range of systems may be affected, making it a significant threat to the security of the AI supply chain. The discovery of this flaw highlights the need for thorough security audits of critical protocols like MCP, so what matters most to practitioners is promptly assessing their exposure to this vulnerability.