
blog.trailofbits.com/2025/04/29/deceiving-users-with-ansi-terminal-codes-in-mcp
Preview meta tags from the blog.trailofbits.com website.
Linked Hostnames
7- 12 links toblog.trailofbits.com
- 2 links togithub.com
- 1 link togohugo.io
- 1 link toinfosec.exchange
- 1 link tolinkedin.com
- 1 link tonews.ycombinator.com
- 1 link totwitter.com
Thumbnail

Search Engine Appearance
https://blog.trailofbits.com/2025/04/29/deceiving-users-with-ansi-terminal-codes-in-mcp
Deceiving users with ANSI terminal codes in MCP
This post describes attacks using ANSI terminal code escape sequences to hide malicious instructions to the LLM, leveraging the line jumping vulnerability we discovered in MCP.
Bing
Deceiving users with ANSI terminal codes in MCP
https://blog.trailofbits.com/2025/04/29/deceiving-users-with-ansi-terminal-codes-in-mcp
This post describes attacks using ANSI terminal code escape sequences to hide malicious instructions to the LLM, leveraging the line jumping vulnerability we discovered in MCP.
DuckDuckGo

Deceiving users with ANSI terminal codes in MCP
This post describes attacks using ANSI terminal code escape sequences to hide malicious instructions to the LLM, leveraging the line jumping vulnerability we discovered in MCP.
General Meta Tags
7- titleDeceiving users with ANSI terminal codes in MCP - The Trail of Bits Blog
- charsetUTF-8
- viewportwidth=device-width,initial-scale=1
- description
- article:sectionposts
Open Graph Meta Tags
7- og:urlhttps://blog.trailofbits.com/2025/04/29/deceiving-users-with-ansi-terminal-codes-in-mcp/
- og:site_nameThe Trail of Bits Blog
- og:titleDeceiving users with ANSI terminal codes in MCP
- og:descriptionThis post describes attacks using ANSI terminal code escape sequences to hide malicious instructions to the LLM, leveraging the line jumping vulnerability we discovered in MCP.
og:locale
en_us
Twitter Meta Tags
4- twitter:cardsummary_large_image
- twitter:imagehttps://blog.trailofbits.com/img/mcp-series/mcp-02-1.png
- twitter:titleDeceiving users with ANSI terminal codes in MCP
- twitter:descriptionThis post describes attacks using ANSI terminal code escape sequences to hide malicious instructions to the LLM, leveraging the line jumping vulnerability we discovered in MCP.
Link Tags
11- dns-prefetch//fonts.googleapis.com
- dns-prefetch//fonts.gstatic.com
- preconnecthttps://fonts.gstatic.com
- preload stylesheet/css/syntax.css
- shortcut icon/favicon.png
Links
19- https://blog.trailofbits.com
- https://blog.trailofbits.com/2025/04/21/jumping-the-line-how-mcp-servers-can-attack-you-before-you-ever-use-them
- https://blog.trailofbits.com/2025/04/23/how-mcp-servers-can-steal-your-conversation-history
- https://blog.trailofbits.com/2025/05/01/making-pypis-test-suite-81-faster
- https://blog.trailofbits.com/2025/05/02/datasig-fingerprinting-ai/ml-datasets-to-stop-data-borne-attacks