Skip to content

Commit 760ec1f

Browse files
committed
token torching info
1 parent 094468d commit 760ec1f

File tree

1 file changed

+47
-1
lines changed

1 file changed

+47
-1
lines changed

docs/platform-services/external-mcp-server.md

Lines changed: 47 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -86,6 +86,7 @@ Investigate security incidents without leaving Slack:
8686
* **Query raw logs** for deeper investigation.
8787
* **Update insight status** directly from Slack.
8888
* **Add investigation notes** to maintain audit context.
89+
* **Get AI-powered incident response guidance** with structured recommendations for investigation, containment, and escalation.
8990
* **Execute multi-tool actions conversationally** within a single Slack thread.
9091

9192
```txt title="Slack Example 1"
@@ -243,7 +244,18 @@ Do NOT use MCP for:
243244
* Model training. Use the [Search Job API](/docs/api/search-job).
244245
* High-volume automated queries.
245246

246-
MCP interactions incur token-based LLM processing costs, which can be significant for high-volume workloads. MCP is designed for conversational, agent-level interaction. For raw data access, standard APIs remain more efficient and cost-effective.
247+
### Understanding MCP cost dynamics
248+
249+
MCP endpoints are cost-amplifying by design. A single conversational request can trigger multiple agent steps, tool calls, retries, and retrieval operations. Valid requests that appear reasonable can generate significantly higher costs than anticipated, particularly when:
250+
251+
* Queries trigger broad semantic searches with high retrieval limits.
252+
* Requests induce multi-step reasoning or planning workflows.
253+
* Tool calls fail and trigger automatic retries.
254+
* Workflows continue executing after client disconnect.
255+
256+
MCP is designed for conversational, agent-level interaction where cost per request is understood and monitored. For raw data access or high-volume operations, standard APIs remain more efficient and cost-effective.
257+
258+
For detailed guidance on securing MCP against cost-based attacks, see our blog post: [Token Torching: How I'd burn your AI budget (so you can fix it)](https://www.sumologic.com/blog/token-torching-ai-attack).
247259

248260
## Security and data governance
249261

@@ -253,6 +265,30 @@ MCP interactions incur token-based LLM processing costs, which can be significan
253265
* **Audit trails**. All MCP interactions are logged for compliance and security review.
254266
* **Multi-tenant isolation**. Tenant-level security controls are enforced at the gateway.
255267

268+
## Monitoring and cost controls
269+
270+
Implement these controls to prevent unintended or malicious cost escalation.
271+
272+
### What to monitor
273+
274+
Track these metrics per request, per identity, and per tool:
275+
276+
* Cost per request (not just request volume).
277+
* Tool calls per request.
278+
* Agent step count.
279+
* Retry frequency.
280+
* Retrieval scope (top-k values, cross-namespace queries).
281+
* Endpoints ranked by cost, not just traffic.
282+
283+
### Recommended controls
284+
285+
* **Hard budgets**. Set per-request, per-identity, per-tool, and per-tenant spending limits.
286+
* **Validation gates**. Implement authentication, input validation, size limits, and retrieval caps before LLM processing begins.
287+
* **Progressive trust**. Start with restricted capabilities for new or untrusted identities. Expand access based on usage patterns.
288+
* **Per-tool quotas**. Limit or disable expensive tools for untrusted traffic.
289+
* **Kill switches**. Maintain the ability to disable high-cost tools or operations within seconds.
290+
* **Disconnect handling**. Ensure workflows terminate when clients disconnect to prevent billing for abandoned requests.
291+
256292
## FAQ
257293

258294
<details>
@@ -294,9 +330,19 @@ Agents connected via MCP run in your own environment, not within Sumo Logic infr
294330

295331
</details>
296332

333+
<details>
334+
<summary>How do I protect against cost-based attacks?</summary>
335+
336+
MCP endpoints can be exploited to generate excessive costs through valid but expensive requests. Implement cost monitoring, set hard budgets per request and identity, apply validation before expensive operations, and ensure workflows terminate when clients disconnect.
337+
338+
For comprehensive guidance, see our blog post: [Token Torching: How I'd burn your AI budget (so you can fix it)](https://www.sumologic.com/blog/token-torching-ai-attack).
339+
340+
</details>
341+
297342
## Additional information
298343

299344
* [Dojo AI overview](#)
300345
* [Cloud SIEM](/docs/cse)
301346
* [Search Job API](/docs/api/search-job)
302347
* [Model Context Protocol specification](https://modelcontextprotocol.io/)
348+
* [Token Torching: How I'd burn your AI budget (so you can fix it)](https://www.sumologic.com/blog/token-torching-ai-attack)

0 commit comments

Comments
 (0)