Skip to content
AZURE-SAMPLES / SHERPA

MCP Security Summit Workshop

Secure MCP servers in Azure through hands-on exploitation and remediation. Break things, fix them, ship production-ready code.

MCP Security Summit Workshop

Why This Workshop

  • Learn by Breaking


    Exploit intentionally vulnerable servers, then fix them with Azure-native security — the vulnerable → exploit → fix → validate methodology.

  • Azure-Native Security


    Entra ID, Key Vault, API Management, AI Content Safety, and Log Analytics — production services, not toy demos.

  • OWASP-Aligned


    Every technique maps to the OWASP MCP Azure Security Guide for industry-standard coverage.


The Expedition Route

Each camp builds on the last — from unauthenticated MCP servers to enterprise-grade defense-in-depth.


Quick Start

From clone to running lab in under ten minutes.

1. Clone the repository

git clone https://github.com/Azure-Samples/sherpa.git
cd sherpa

2. Install dependencies & verify

curl -LsSf https://astral.sh/uv/install.sh | sh
python --version  # 3.10+
az account show   # logged in

3. Start at Base Camp

Open the Base Camp guide and follow along. The docs tell you when to deploy and test code from the repo.

First time?

Check the Prerequisites for full setup instructions and system requirements. No security expertise required — if you can write Python and navigate the Azure Portal, you're ready.


References

OWASP MCP Azure Security Guide — Companion guide referenced throughout
MCP Specification — Official protocol documentation
FastMCP Framework — Python framework used in this workshop


The mountain doesn't care about your excuses. Prepare well, climb smart, reach the summit. 🏔️