Back to articles
How to Secure MCP Tool Calls in n8n Workflows
How-ToSecurity

How to Secure MCP Tool Calls in n8n Workflows

via Dev.torazashariff

n8n connects AI Agents to external tools via MCP. The tool definitions and tool call payloads flow without any integrity verification. A compromised MCP server can change a tool description between calls, inject instructions the LLM will follow, or modify parameters in transit. This isn't theoretical. The postmark-mcp attack used tool definition tampering to BCC every email to an attacker. CVE-2025-6514 (CVSS 9.6) achieved full RCE through mcp-remote. The MCPTox benchmark shows a 72.8% tool poisoning success rate across 20 LLM agents. I built an n8n community node based on MCPS (MCP Secure) -- an IETF Internet-Draft that adds a cryptographic signing layer to MCP. Same standards track as TLS and OAuth. Install npm install n8n-nodes-mcps Restart n8n. The "MCPS Security" node appears in your node library. What it does Drop it into any workflow that uses MCP tools. Select "Full Security Wrap" for one-step protection: Tool call signing -- every MCP tool call is signed with HMAC-SHA256 over

Continue reading on Dev.to

Opens in a new tab

Read Full Article
6 views

Related Articles