Analyze the blast radius, excessive agency, and local asset compromise, identifying malicious supply chain servers while providing policies that can be implemented across all MCP connections to prevent credential leakage and destructive capabilities before they escalate to costly breaches or operational disruption.