Comment by lll-o-lll

6 days ago

Cool cool. Except.

What about auth? Authn and authz. Agent should be you always? If not, every API supports keys? If so, no fears about context poisoned agents leaking those keys?

One thing an MCP (server) gives you is a middleware layer to control agent access. Whether you need that is use-case dependent.

Also resources - which are by far the coolest part of MCP. Prompts? Elicitation? Resource templates? If you think of MCP as only a replacement for tool calls I can see the argument but it's much more than that.

That's not a limitation of CLIs, they can work with a different auth as well.

they are just a superior tool to MCP because the agent can write code that invokes, pipes and do many other things with the tool

> If not, every API supports keys?

How would MCP help you if the API does not support keys?

But that's not the point. The agent calls CLI tools, which reads secrets from somewhere where the agent cannot even access. How can agent leak the keys it does not have access to?

You ARE running your agents in containers, right?

  • > How would MCP help you if the API does not support keys?

    Kerberos, OAuth, Basic Auth (username/password), PKI. MCP can be a wrapper (like any middleware).

    > But that's not the point. The agent calls CLI tools, which reads secrets from somewhere where the agent cannot even access. How can agent leak the keys it does not have access to?

    If the cli can access the secrets, the agent can just reverse it and get the secret itself.

    > You ARE running your agents in containers, right?

    Do you inject your keys into the container?

    • > If the cli can access the secrets, the agent can just reverse it and get the secret itself.

      What do you mean by this? How "reverse it"? The CLI tool can access the secure storage, but that does not mean there is any CLI interface in the tool for the LLM to call and get the secret printed into the console.

      4 replies →