Frequently Asked Questions

About MCPwned: The Model Context Protocol Security CTF

What is MCPwned and why did Cymulate create it?

MCPwned is a multi-stage Capture the Flag (CTF) competition launched by Cymulate to challenge participants on securing the Model Context Protocol (MCP)—a new attack surface emerging as AI agents gain real-world privileges. The competition is designed to help both offensive security professionals and defenders explore, exploit, and secure vulnerabilities in AI-driven systems, reflecting Cymulate's mission to continuously validate exposure and close security gaps before attackers find them.

What is the Model Context Protocol (MCP) and why is it important for AI security?

The Model Context Protocol (MCP) enables AI systems to interact with external resources such as filesystems, databases, APIs, and external tools. This power introduces new security challenges, including elevated privileges, complex tool chaining, and dynamic request patterns that can bypass traditional controls. MCPwned focuses on these risks to help participants understand and secure this emerging attack surface.

How does the MCPwned competition work?

MCPwned consists of five stages. Stages 1-4 open on July 9, 2025, and are judged on fastest overall time and best technical write-up. Stage 5 opens August 3, 2025, at Black Hat USA, with the winner determined by the fastest completion time. To win Stage 5, participants must attend Black Hat USA at Booth #1640 and have their badge scanned. Winners are announced the week after Black Hat USA, no later than August 15, 2025.

Who won the MCPwned competition in 2025?

For Stages 1-4, the winner was Nick Terziev (Username: L3G5). The best technical write-up was awarded to Kai Xuan (Username: TheMythologist), and the Stage 5 winner was also Kai Xuan. You can read the winning write-ups on Medium (Part 1) and Medium (Part 2).

What are the cash prizes for MCPwned?

The cash prizes for MCPwned are: 0 for the fastest competitor across the first four online stages, ,000 for the best technical write-up, and 0 for the fastest competitor to complete Stage 5 live at Black Hat USA. Prizes are paid within 30 days of winner announcement, subject to eligibility verification and required documentation.

What are the eligibility requirements for participating in MCPwned?

MCPwned is open to individual participants worldwide, except where prohibited by local laws or regulations. Participants must be 18 years or older at the time of entry. Employees of Cymulate, its affiliates, and immediate family members are not eligible to win cash prizes but may participate for fun. All participants must comply with local laws regarding contest participation and prize receipt.

How are winners selected and what are the judging criteria?

Winners are selected based on fastest overall completion time for each stage and the quality of technical write-ups. The best technical write-up is judged by the Cymulate security research team for clarity, creativity, depth of analysis, and educational value. All judging decisions are final and not subject to appeal or dispute.

How and when are MCPwned prizes paid out?

Cash prizes are awarded within 30 days of winner announcement, subject to completion of all required documentation, eligibility verification, and submission of a valid payment method. Payment is made via bank transfer, PayPal, or another method at Cymulate’s discretion and may be subject to taxes and reporting requirements in the winner’s jurisdiction.

What are the rules regarding intellectual property for technical write-ups submitted to MCPwned?

By submitting a technical write-up, participants grant Cymulate full ownership and a worldwide, royalty-free, non-exclusive license to use, reproduce, modify, publish, and distribute the write-up with appropriate attribution. Submissions must be original, not infringe on third-party rights, and not have been previously published or submitted elsewhere. Participants agree to indemnify Cymulate against any claims arising from breaches of these representations.

What legal terms and limitations of liability apply to MCPwned participants?

Cymulate is not liable for any direct, indirect, incidental, or consequential damages arising from participation in MCPwned, including technical failures, data loss, or service interruptions. Participation is at each individual’s own risk. The contest is governed by the laws of the State of Israel, with exclusive jurisdiction in the courts of Tel Aviv, Israel.

Is MCPwned a skill-based contest or a game of chance?

MCPwned is a skill-based contest. Chance plays no role in determining the winners. No purchase or payment is required to enter or win. The contest is open to eligible individuals worldwide, except where prohibited or restricted by local laws.

How does MCPwned relate to Cymulate’s mission and platform?

MCPwned extends Cymulate’s mission of continuous exposure validation into the AI-driven ecosystem, helping participants understand and secure new attack surfaces created by AI agents. The competition demonstrates Cymulate’s commitment to proactive security validation and education for the cybersecurity community.

Where can I get started with MCPwned?

You can get started with MCPwned by visiting the official competition platform.

Are you ready to get MCPwned?

Watch the official video: Are you ready to get MCPwned? video

Cymulate Platform, Features & Security

What are the key capabilities of the Cymulate platform?

Cymulate offers continuous threat validation, a unified platform combining Breach and Attack Simulation (BAS), Continuous Automated Red Teaming (CART), and Exposure Analytics, attack path discovery, automated mitigation, AI-powered optimization, complete kill chain coverage, ease of use, and an extensive threat library with over 100,000 attack actions updated daily. These features help organizations improve security posture, operational efficiency, and threat resilience. Learn more.

What security and compliance certifications does Cymulate hold?

Cymulate holds SOC2 Type II, ISO 27001:2013, ISO 27701, ISO 27017, and CSA STAR Level 1 certifications. These cover security, availability, confidentiality, privacy, and cloud service controls, ensuring robust security and compliance standards. Details here.

How does Cymulate ensure data security and privacy?

Cymulate ensures data security through encryption in transit (TLS 1.2+) and at rest (AES-256), secure AWS-hosted data centers, a tested disaster recovery plan, and GDPR compliance. The platform includes 2-Factor Authentication, Role-Based Access Controls, and IP address restrictions. Learn more.

What integrations does Cymulate support?

Cymulate integrates with a wide range of security technologies, including Akamai Guardicore, AWS GuardDuty, BlackBerry Cylance OPTICS, Carbon Black EDR, Check Point CloudGuard, Cisco Secure Endpoint, CrowdStrike Falcon, Wiz, SentinelOne, and more. For a full list, visit our Partnerships and Integrations page.

How easy is it to implement Cymulate?

Cymulate is designed for quick, agentless deployment with no need for additional hardware or complex configurations. Customers can start running simulations almost immediately, with support available via email, chat, and a comprehensive knowledge base. Schedule a demo.

What feedback have customers given about Cymulate’s ease of use?

Customers consistently praise Cymulate for its intuitive, user-friendly interface and actionable insights. Testimonials highlight easy implementation, accessible support, and immediate value in identifying security gaps. For example, Raphael Ferreira, Cybersecurity Manager, noted, “Cymulate is easy to implement and use—all you need to do is click a few buttons, and you receive a lot of practical insights.” Read more customer stories.

What is Cymulate’s pricing model?

Cymulate uses a subscription-based pricing model tailored to each organization’s needs. Pricing depends on the chosen package, number of assets, and selected scenarios. For a personalized quote, schedule a demo with the Cymulate team.

How does Cymulate compare to other security validation platforms?

Cymulate stands out with its unified platform combining BAS, CART, and Exposure Analytics, continuous 24/7 threat validation, AI-powered optimization, and an extensive, frequently updated threat library. It is recognized for ease of use, measurable outcomes (such as up to 81% reduction in cyber risk), and tailored solutions for different security roles. See comparisons.

Who is the target audience for Cymulate’s platform?

Cymulate is designed for CISOs and security leaders, SecOps teams, Red Teams, and Vulnerability Management teams in organizations of all sizes and industries, including finance, healthcare, retail, media, transportation, and manufacturing. Learn more about roles.

Use Cases, Benefits & Customer Success

What core problems does Cymulate solve for security teams?

Cymulate addresses overwhelming threat volumes, lack of visibility, unclear risk prioritization, resource constraints, and fragmented security tools. It provides continuous threat validation, exposure prioritization, improved resilience, operational efficiency, and collaboration across teams. More info.

What are some real-world case studies demonstrating Cymulate’s impact?

Hertz Israel reduced cyber risk by 81% in four months using Cymulate. A sustainable energy company scaled penetration testing cost-effectively, and Nemours Children’s Health improved detection in hybrid and cloud environments. See more case studies at Cymulate Customers.

How does Cymulate address pain points for different security personas?

Cymulate tailors solutions for CISOs (risk communication and prioritization), SecOps (operational efficiency), Red Teams (automated offensive testing), and Vulnerability Management (validation and prioritization). Each role benefits from features and metrics relevant to their responsibilities. Learn more.

What measurable outcomes have Cymulate customers achieved?

Customers have reported up to a 52% reduction in critical exposures, a 60% increase in team efficiency, and an 81% reduction in cyber risk within four months. These outcomes are supported by customer case studies and testimonials. See results.

What are the main pain points Cymulate helps organizations solve?

Cymulate helps organizations address fragmented security tools, resource constraints, unclear risk prioritization, cloud complexity, communication barriers, inadequate threat simulation, operational inefficiencies in vulnerability management, and post-breach recovery challenges. Learn more.

What is Cymulate’s overarching vision and mission?

Cymulate’s vision is to transform cybersecurity by enabling organizations to proactively validate defenses, identify vulnerabilities, and optimize security posture. The mission is to provide tools for continuous threat validation and exposure management, fostering collaboration and measurable improvements in resilience and efficiency. About Cymulate.

Resources, Support & Community

Where can I find Cymulate’s blog, newsroom, and resource hub?

Cymulate’s blog covers the latest threats and research, the newsroom features media mentions and press releases, and the Resource Hub offers whitepapers, product info, and thought leadership articles.

Does Cymulate provide educational resources like a glossary or webinars?

Yes, Cymulate offers a cybersecurity glossary, webinars, e-books, and a knowledge base with technical articles and videos to help users stay informed and optimize their security validation practices.

Where can I find news, events, and blog posts from Cymulate?

Stay up-to-date with Cymulate through the blog, newsroom, and events & webinars page.

Do you have a blog post about preventing lateral movement attacks?

Yes, Cymulate has a blog post titled 'Stopping Attackers in Their Tracks' discussing lateral movement attacks and prevention strategies. Read it on our blog.

How can I contact Cymulate for support or sales inquiries?

You can contact Cymulate for support via email at [email protected], through chat support, or by visiting the Contact Us page for sales and general inquiries.

Where can I find a central hub for Cymulate’s insights, thought leadership, and product information?

All resources, including insights, thought leadership, and product information, are available in Cymulate’s Resource Hub.

New: 2026 Gartner® Market Guide for Adversarial Exposure Validation
Learn More
Cymulate named a Customers' Choice in 2025 Gartner® Peer Insights™
Learn More
New Research: Azure Arc Privilege Escalation & Identity Takeover
Learn More
An Inside Look at the Technology Behind Cymulate
Learn More

Get Ready to Get MCPwned — Cymulate’s Elite CTF on Securing the Model Context Protocol

By: Justin Carter

Last Updated: September 10, 2025

MCPwned: The Model Context Protocol Security Challenge

When AI agents meet the real world, every protocol becomes a potential attack vector.

That’s the big idea behind MCPwned, the brand new multi-stage Capture the Flag competition launching this summer from Cymulate. As artificial intelligence rapidly gains real-world privileges — reading files, querying databases, chaining external tools — a new frontier of security risks is emerging. The Model Context Protocol (MCP) is at the heart of this shift, enabling AI systems to seamlessly interact with external resources.

But what happens when that power is abused?

Introducing MCPwned: The Model Context Protocol Security Challenge

MCPwned is more than your standard CTF. It’s a hands-on opportunity to explore, exploit and secure the next big attack surface: the Model Context Protocol. Participants will tackle real-world vulnerabilities discovered by security researchers, dive into advanced exploitation techniques and learn firsthand how AI-driven systems can dramatically reshape threat landscapes.

We’ve designed MCPwned to challenge both offensive security pros and defenders. Think like a malicious actor. Think like a researcher. Either way, you’ll deepen your understanding of what happens when the AI you trust gets connected to the systems you protect.

And yes — winners take home $600 each in cash and serious bragging rights.

How the Competition Works

Stages 1-4

Opens July 9, 2025

Winner Criteria:

  • Fastest Overall Time
  • Best Technical Write-Up

Stage 5

Opens August 3, 2025, at Black Hat USA

Winner Criteria

  • Fastest Overall Time for only Stage 5
  • Participants must come to the Cymulate at Black Hat #1640 and have their conference badge scanned to be eligible to win.

Our Winners

Stage 1-4 Winner: Nick Terziev
Username: L3G5

Best Technical Write-Up: Kai Xuan
Username: TheMythologist
Cymulate Capture The Flag (CTF) — MCPwned Writeup
Cymulate Capture The Flag (CTF) — MCPwned Writeup Part 2

Stage 5 Winner: Kai Xuan
Username: TheMythologist

The Cash Prizes

$400 for the fastest competitor across the first four online stages.

$1,000 for the best technical write-up published on your personal blog or LinkedIn detailing your approach to the challenges.

  • Judging will be performed by the Cymulate security research team, at its sole discretion, based on clarity, creativity, depth of analysis and educational value. All judging decisions are final and not subject to appeal or dispute.

$600 for the fastest competitor to complete Stage 5 live at Black Hat.

  • Winners will be announced the week after Black Hat USA, no later than August 15, 2025.
  • MCPwned is open to individual participants worldwide, except where prohibited by local laws or regulations.  It is the sole responsibility of each participant to ensure that their participation and potential receipt of prizes is not prohibited under the laws of their country or jurisdiction.
  • Participants must be 18 years or older at the time of entry.
  • Employees of Cymulate, its affiliates and immediate family members are not eligible to win cash prizes but are welcome to participate for fun.

Prize Payment

Cash prizes will be awarded within 30 days of winner announcement, subject to completion of all required documentation, including verification of eligibility and submission of a valid payment method. Payment will be made via bank transfer, PayPal, or another method at Cymulate’s sole discretion, and may be subject to applicable taxes and reporting requirements in the winner’s jurisdiction.

Prize awards are subject to identity verification, compliance with all official rules, and submission of a completed prize acceptance form. Cymulate reserves the right to withhold or revoke a prize in cases of suspected fraud, rule violations, or any misconduct that may compromise the integrity of the competition.

Why Focus on MCP?

The Model Context Protocol represents a fundamental shift. It’s how modern AI agents gain the power to:

  • Read and write files through filesystem servers.
  • Execute privileged database queries.
  • Access APIs and external services dynamically.
  • Chain multiple tools together for complex workflows.

This power introduces entirely new security challenges:

  • Elevated privileges and broad scopes become commonplace.
  • Complex tool chaining can slip past traditional security controls.
  • AI’s dynamic, creative request patterns can find exploits humans miss.

Through MCPwned, we’re bringing these risks to life in a controlled environment so you can understand them — and be ready to secure them.

Join the Hunt

Think you can outpace the attackers? Or publish the sharpest write-up dissecting every vulnerability?
Starting July 9, you’ll have your chance.

Then, at Black Hat USA 2025 (August 2-7 at Booth #1640), watch the final Stage 5 unfold — or jump in yourself for the ultimate showdown.

Publicity & Name Use

By participating, winners agree that Cymulate may publish their name, country, picture, and submitted technical write-up (if applicable) for promotional and marketing purposes in any media, without further compensation.

Intellectual Property – Write-Up Content 

By submitting such content, participants grant Cymulate the fully ownership of any submitted technical write-up, inclusing a worldwide, royalty-free, non-exclusive license to use, reproduce, modify, publish, and distribute the write-up with appropriate attribution. By submitting any content as part of the MCPwned competition (including technical write-ups), each participant represents and warrants that the submission is their own original work, does not infringe upon the intellectual property rights, privacy rights, or any other rights of any third party, and has not been previously published or submitted to any other contest. Participants further agree to indemnify and hold harmless Cymulate from any claims, damages, or liabilities arising from any breach of this representation.

Limitation of Liability

Cymulate shall not be held liable for any direct, indirect, incidental, or consequential damages arising from or relating to participation in MCPwned, including but not limited to technical failures, data loss, or service interruptions. Participation is at each individual’s own risk.

Governing Law & Jurisdiction

This contest and any related disputes shall be governed by the laws of the State of Israel, without regard to its conflict of law principles. The competent courts of Tel Aviv, Israel, shall have exclusive jurisdiction over any such disputes.

This is a skill-based contest. Chance plays no role in determining the winners. No purchase or payment is required to enter or win. The contest is open to eligible individuals worldwide, except where prohibited or restricted by local laws.

Participation in the final on-site stage at Black Hat USA 2025 is subject to conference rules and badge scanning requirements as set by Black Hat. Cymulate has coordinated this activity in accordance with Black Hat exhibitor policies and guidelines.Let’s Validate Exposure Together

At Cymulate, our mission is simple: continuously validate your exposure, so you can close security gaps before attackers find them. MCPwned is our way of pushing that mission even further — into the emerging AI-driven ecosystem where tomorrow’s attacks are already taking shape.

We can’t wait to see how you tackle it.
Get ready. Get MCPwned.

Get started here

Cymulate Exposure Validation makes advanced security testing fast and easy. When it comes to building custom attack chains, it's all right in front of you in one place.
Mike Humbert, Cybersecurity Engineer
DARLING INGREDIENTS INC.
Learn More
Book a Demo