This challenge demonstrates a sophisticated multi-vector attack against an MCP server. It requires chaining multiple vulnerabilities together to successfully exploit the system.
This challenge demonstrates a sophisticated multi-vector attack against an MCP server. It requires chaining multiple vulnerabilities together to successfully exploit the system.