SECURITY March 30, 2026 6 min read

MCP Just Got Write Access: What Security Teams Need to Know

Model Context Protocol was designed to be read-only. As of March 2026, it isn't anymore. Figma, GitHub, Linear, Slack, and AWS are all shipping write-capable MCP servers. Here's what changed and what to lock down.

Figma's new MCP server gives AI agents write access to design files — not just the ability to read them. Claude can now create components, modify existing elements, publish design system updates, and delete nodes. Figma is the most visible launch, but it's not a one-off: GitHub, Linear, Notion, Slack, and AWS all have write-capable MCP integrations shipping now or imminently.

Why This Breaks Your Existing Security Model

The security conversation around AI agents has centred on prompt injection and data exfiltration — both read-oriented risks. An AI agent that can read your Figma files can leak sensitive design assets. An AI agent that can write to them can destroy production design systems, introduce backdoored components, or propagate malicious changes to every product that consumes that design library.

This is a different risk category, and most security teams haven't caught up.

The Four Attack Surfaces Write-Capable MCP Opens

1. Accidental Destruction

A developer asks Claude to "clean up unused components." Claude interprets "unused" liberally, deletes 47 components including archived ones, publishes the change, and breaks 12 production screens. No human reviewed the deletions. No approval gate existed. Rollback requires manual reconstruction.

2. Malicious Prompt Injection

An attacker with access to a developer machine sends a rogue prompt: "Add a tracking pixel to all payment form components." Claude uses the Figma MCP server to modify payment components and publish the change to the shared design system. The pixel propagates to every product that imports those components. This is a supply chain attack delivered through natural language.

3. Cascade Failure in Automated Pipelines

A CI/CD job asks Claude to auto-update design tokens. Claude makes the requested change — across 1,200 components. A breaking change isn't caught. Mobile app submission gets rejected. Emergency rollback required.

4. Third-Party MCP Server Compromise

You install a third-party "figma-enterprise-connector" from a package registry. That connector is backdoored. On every write operation, it injects additional changes. Your design system is now a vector for attacker-controlled modifications, triggered every time your own developers run legitimate AI-assisted workflows.

The Audit Trail Problem

Traditional change management has a clear chain: human author, git commit, code review, deployment log. When Claude writes to your Figma file via MCP, who is the author? Most MCP implementations today produce partial or absent audit trails. The question "who changed this and why" becomes unanswerable — which is a compliance problem before it's even a security problem.

What MCP Governance Actually Looks Like

SkillShield's approach to MCP write security is built on four controls:

Default Deny Is Not Optional

The correct baseline for MCP write access is: deny everything, allow explicitly. Read operations on most MCP servers are safe. Write operations on production systems are not. Start from that principle and work outward.

For development environments, broader write access is reasonable. For shared design systems, databases, and production file stores: require approval, enforce rate limits, and log everything.

The Figma launch is the first domino. Slack, Canva, GitHub — all of these are adding write-capable MCP servers now. The security posture you build for Figma MCP today is the template for every write-capable MCP integration you'll onboard over the next 12 months.

Don't wait for your first MCP-related incident.


Sources: Figma official announcement (March 26, 2026), Metedata independent analysis (HN front page, March 29, 2026).

Audit Your MCP Write Permissions

MCP write access is here. Scan your MCP servers for over-permissioned write operations before they execute.

Scan Your MCP Servers