In this article, I demonstrate the threats posed by malicious MCP servers from a developer's perspective and ways to mitigate them. A hands-on example is provided by building a simple, prompt-injecting MCP server.