deleted privous vector stores
Browse files- app.py +1 -1
- data/documents/content/0e22c68a-134e-4474-af0d-1c119b576bec.txt +0 -21
- data/documents/content/b229c249-b844-4579-beb1-2d4185eeb732.txt +0 -977
- data/documents/content/b3d0767c-1dd8-4f05-a9f8-d69d82f2abde.txt +0 -1137
- data/documents/content/e3591269-f449-4f88-8185-7d98ef4c4845.txt +0 -0
- data/documents/metadata/0e22c68a-134e-4474-af0d-1c119b576bec.json +0 -17
- data/documents/metadata/b229c249-b844-4579-beb1-2d4185eeb732.json +0 -17
- data/documents/metadata/b3d0767c-1dd8-4f05-a9f8-d69d82f2abde.json +0 -17
- data/documents/metadata/e3591269-f449-4f88-8185-7d98ef4c4845.json +0 -17
- data/vector_store/content_index.index +0 -3
- data/vector_store/content_index_metadata.json +0 -0
app.py
CHANGED
|
@@ -535,4 +535,4 @@ def create_gradio_interface():
|
|
| 535 |
|
| 536 |
if __name__ == "__main__":
|
| 537 |
gradio_interface = create_gradio_interface()
|
| 538 |
-
gradio_interface.launch(mcp_server=True)
|
|
|
|
| 535 |
|
| 536 |
if __name__ == "__main__":
|
| 537 |
gradio_interface = create_gradio_interface()
|
| 538 |
+
gradio_interface.launch(server_name="0.0.0.0", server_port=8080, mcp_server=True, ssr_mode=False)
|
data/documents/content/0e22c68a-134e-4474-af0d-1c119b576bec.txt
DELETED
|
@@ -1,21 +0,0 @@
|
|
| 1 |
-
# MCP Chatbot
|
| 2 |
-
|
| 3 |
-
1. Give me a list of tools you provide (in `connect_to_server_and_run`)
|
| 4 |
-
|
| 5 |
-
## ListToolsRequest
|
| 6 |
-
|
| 7 |
-
### MCP Client
|
| 8 |
-
|
| 9 |
-
3. Tool definitions are exposed to the LLM (in `process_query`)
|
| 10 |
-
|
| 11 |
-
### ListToolsResult
|
| 12 |
-
|
| 13 |
-
2. Here are the tools I can run
|
| 14 |
-
|
| 15 |
-

|
| 16 |
-
|
| 17 |
-

|
| 18 |
-
|
| 19 |
-

|
| 20 |
-
|
| 21 |
-

|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
data/documents/content/b229c249-b844-4579-beb1-2d4185eeb732.txt
DELETED
|
@@ -1,977 +0,0 @@
|
|
| 1 |
-
--- Page 1 ---
|
| 2 |
-
Model Context Protocol (MCP): Landscape, Security Threats,
|
| 3 |
-
and Future Research Directions
|
| 4 |
-
XINYI HOU, Huazhong University of Science and Technology, China
|
| 5 |
-
YANJIE ZHAO, Huazhong University of Science and Technology, China
|
| 6 |
-
SHENAO WANG, Huazhong University of Science and Technology, China
|
| 7 |
-
HAOYU WANG∗,Huazhong University of Science and Technology, China
|
| 8 |
-
The Model Context Protocol (MCP) is a standardized interface designed to enable seamless interaction between
|
| 9 |
-
AI models and external tools and resources, breaking down data silos and facilitating interoperability across
|
| 10 |
-
diverse systems. This paper provides a comprehensive overview of MCP, focusing on its core components,
|
| 11 |
-
workflow, and the lifecycle of MCP servers, which consists of three key phases: creation, operation, and update.
|
| 12 |
-
We analyze the security and privacy risks associated with each phase and propose strategies to mitigate
|
| 13 |
-
potential threats. The paper also examines the current MCP landscape, including its adoption by industry
|
| 14 |
-
leaders and various use cases, as well as the tools and platforms supporting its integration. We explore future
|
| 15 |
-
directions for MCP, highlighting the challenges and opportunities that will influence its adoption and evolution
|
| 16 |
-
within the broader AI ecosystem. Finally, we offer recommendations for MCP stakeholders to ensure its secure
|
| 17 |
-
and sustainable development as the AI landscape continues to evolve.
|
| 18 |
-
CCS Concepts: •General and reference →Surveys and overviews ;•Security and privacy →Software
|
| 19 |
-
and application security ;•Computing methodologies →Artificial intelligence .
|
| 20 |
-
Additional Key Words and Phrases: Model Context Protocol, MCP, Vision paper, Security
|
| 21 |
-
ACM Reference Format:
|
| 22 |
-
Xinyi Hou, Yanjie Zhao, Shenao Wang, and Haoyu Wang. 2025. Model Context Protocol (MCP): Landscape,
|
| 23 |
-
Security Threats, and Future Research Directions. 1, 1 (April 2025), 20 pages. https://doi.org/10.1145/nnnnnnn.
|
| 24 |
-
nnnnnnn
|
| 25 |
-
1 INTRODUCTION
|
| 26 |
-
In recent years, the vision of autonomous AI agents capable of interacting with a wide range of
|
| 27 |
-
tools and data sources has gained significant momentum. This progress accelerated in 2023 with the
|
| 28 |
-
introduction of function calling by OpenAI, which allowed language models to invoke external
|
| 29 |
-
APIs in a structured way [ 38]. This advancement expanded the capabilities of LLMs, enabling
|
| 30 |
-
them to retrieve real-time data, perform computations, and interact with external systems. As
|
| 31 |
-
function calling gained adoption, an ecosystem formed around it. OpenAI introduced the ChatGPT
|
| 32 |
-
plugin [37], allowing developers to build callable tools for ChatGPT. LLM app stores such as Coze [ 4]
|
| 33 |
-
and Yuanqi [ 50] have launched their plugin stores , supporting tools specifically designed for
|
| 34 |
-
∗Haoyu Wang is the corresponding author (haoyuwang@hust.edu.cn).
|
| 35 |
-
Authors’ addresses: Xinyi Hou, xinyihou@hust.edu.cn, Huazhong University of Science and Technology, Wuhan, China;
|
| 36 |
-
Yanjie Zhao, yanjie_zhao@hust.edu.cn, Huazhong University of Science and Technology, Wuhan, China; Shenao Wang,
|
| 37 |
-
shenaowang@hust.edu.cn, Huazhong University of Science and Technology, Wuhan, China; Haoyu Wang, haoyuwang@
|
| 38 |
-
hust.edu.cn, Huazhong University of Science and Technology, Wuhan, China.
|
| 39 |
-
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee
|
| 40 |
-
provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the
|
| 41 |
-
full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored.
|
| 42 |
-
Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires
|
| 43 |
-
prior specific permission and/or a fee. Request permissions from permissions@acm.org.
|
| 44 |
-
©2025 Copyright held by the owner/author(s). Publication rights licensed to ACM.
|
| 45 |
-
ACM XXXX-XXXX/2025/4-ART
|
| 46 |
-
https://doi.org/10.1145/nnnnnnn.nnnnnnn
|
| 47 |
-
, Vol. 1, No. 1, Article . Publication date: April 2025.arXiv:2503.23278v2 [cs.CR] 6 Apr 2025
|
| 48 |
-
|
| 49 |
-
--- Page 2 ---
|
| 50 |
-
2 X Hou, Y Zhao, S Wang, and H Wang
|
| 51 |
-
their platforms. Frameworks like LangChain [ 26] and LlamaIndex [ 29] provided standardized tool
|
| 52 |
-
interfaces , making it easier to integrate LLMs with external services. Other AI providers, including
|
| 53 |
-
Anthropic, Google, and Meta, introduced similar mechanisms, further driving adoption. Despite
|
| 54 |
-
these advancements, integrating tools remains fragmented . Developers must manually define
|
| 55 |
-
interfaces, manage authentication, and handle execution logic for each service. Function calling
|
| 56 |
-
mechanisms vary across platforms, requiring redundant implementations. Additionally, current
|
| 57 |
-
approaches rely on predefined workflows, limiting AI agents’ flexibility in dynamically
|
| 58 |
-
discovering and orchestrating tools .
|
| 59 |
-
In late 2024, Anthropic introduced the Model Context Protocol (MCP)[ 3], a general-purpose pro-
|
| 60 |
-
tocol standardizing AI-tool interactions. Inspired by the Language Server Protocol (LSP) [ 22], MCP
|
| 61 |
-
provides a flexible framework for AI applications to communicate with external tools dynamically.
|
| 62 |
-
Instead of relying on predefined tool mappings, MCP allows AI agents to autonomously discover,
|
| 63 |
-
select, and orchestrate tools based on task context. It also supports human-in-the-loop mechanisms,
|
| 64 |
-
enabling users to inject data or approve actions as needed. By unifying interfaces, MCP simplifies
|
| 65 |
-
the development of AI applications and improves their flexibility in handling complex workflows.
|
| 66 |
-
Since its release, MCP has rapidly grown from a niche protocol to a key foundation for AI-native
|
| 67 |
-
application development. A thriving ecosystem has emerged, with thousands of community-driven
|
| 68 |
-
MCP servers enabling model access to systems like GitHub [ 41], Slack [ 42], and even 3D design tools
|
| 69 |
-
like Blender [ 1]. Tools like Cursor [ 12] and Claude Desktop [ 2] demonstrate how MCP clients can
|
| 70 |
-
extend their capabilities by installing new servers, turning developer tools, productivity platforms,
|
| 71 |
-
and creative environments alike into multi-modal AI agents.
|
| 72 |
-
Despite the rapid adoption of MCP, its ecosystem is still in the early stages, with key areas such
|
| 73 |
-
as security, tool discoverability, and remote deployment lacking comprehensive solutions. These
|
| 74 |
-
issues present untapped opportunities for further research and development. Although MCP is
|
| 75 |
-
widely recognized for its potential in the industry, it has not yet been extensively analyzed in
|
| 76 |
-
academic research. This gap in research motivates this paper, which provides the first analysis of
|
| 77 |
-
the MCP ecosystem, examining its architecture and workflow, defining the lifecycle of MCP servers,
|
| 78 |
-
and identifying potential security risks at each stage, such as installer spoofing and tool name
|
| 79 |
-
conflict. Through this study, we present a thorough exploration of MCP’s current landscape and
|
| 80 |
-
offer a forward-looking vision that highlights key implications, outlines future research directions,
|
| 81 |
-
and addresses the challenges that must be overcome to ensure its sustainable growth.
|
| 82 |
-
Our contributions are as follows:
|
| 83 |
-
(1)We provide the first analysis of the MCP ecosystem, detailing its architecture, components,
|
| 84 |
-
and workflow.
|
| 85 |
-
(2)We identify the key components of MCP servers and define their lifecycle, encompassing the
|
| 86 |
-
stages of creation, operation, and update. We also highlight potential security risks associated
|
| 87 |
-
with each phase, offering insights into safeguarding AI-to-tool interactions.
|
| 88 |
-
(3)We examine the current MCP ecosystem landscape, analyzing the adoption, diversity, and
|
| 89 |
-
use cases across various industries and platforms.
|
| 90 |
-
(4)We discuss the implications of MCP’s rapid adoption, identifying key challenges for stake-
|
| 91 |
-
holders, and outline future research directions on security, scalability, and governance to
|
| 92 |
-
ensure its sustainable growth.
|
| 93 |
-
The remainder of this paper is structured as follows: § 2 compares tool invocation with and
|
| 94 |
-
without MCP, highlighting the motivation for this study. § 3 outlines the architecture of MCP,
|
| 95 |
-
detailing the roles of the MCP host, client, and server, as well as the lifecycle of the MCP server.
|
| 96 |
-
§ 4 examines the current MCP landscape, focusing on key industry players and adoption trends.
|
| 97 |
-
§ 5 analyzes security and privacy risks across the MCP server lifecycle and proposes mitigation
|
| 98 |
-
, Vol. 1, No. 1, Article . Publication date: April 2025.
|
| 99 |
-
|
| 100 |
-
--- Page 3 ---
|
| 101 |
-
Model Context Protocol (MCP): Landscape, Security Threats, and Future Research Directions 3
|
| 102 |
-
strategies. § 6 explores implications, future challenges, and recommendations to enhance MCP’s
|
| 103 |
-
scalability and security in dynamic AI environments. § 7 reviews prior work on tool integration
|
| 104 |
-
and security in LLM applications. Finally, § 8 concludes the whole paper.
|
| 105 |
-
2 BACKGROUND AND MOTIVATION
|
| 106 |
-
2.1 AI Tooling
|
| 107 |
-
Before the introduction of MCP, AI applications relied on various methods, such as manual API
|
| 108 |
-
wiring, plugin-based interfaces, and agent frameworks, to interact with external tools. As shown in
|
| 109 |
-
Figure 1, these approaches required integrating each external service with a specific API, leading to
|
| 110 |
-
increased complexity and limited scalability. MCP addresses these challenges by providing a
|
| 111 |
-
standardized protocol that enables seamless and flexible interaction with multiple tools.
|
| 112 |
-
AIApplication
|
| 113 |
-
External Tools and ResourcesSpecific APISpecific APISpecific APIWeb ServicesMCPServerAIApplication(MCPClient)Model Context Protocolvs.WithoutMCPWithMCP
|
| 114 |
-
Database
|
| 115 |
-
LocalFiles
|
| 116 |
-
Specific APISpecific APISpecific APIExternal Tools and ResourcesWeb Services
|
| 117 |
-
Database
|
| 118 |
-
LocalFiles
|
| 119 |
-
Fig. 1. Tool invocation with and without MCP.
|
| 120 |
-
2.1.1 Manual API Wiring. In traditional implementations, developers had to establish manual API
|
| 121 |
-
connections for each tool or service that an AI application interacted with. This process required
|
| 122 |
-
custom authentication, data transformation, and error handling for every integration . As
|
| 123 |
-
the number of APIs increased, the maintenance burden became significant, often leading to tightly
|
| 124 |
-
coupled and fragile systems that were difficult to scale or modify. MCP eliminates this complexity
|
| 125 |
-
by offering a unified interface, allowing AI models to connect with multiple tools dynamically
|
| 126 |
-
without the need for custom API wiring.
|
| 127 |
-
2.1.2 Standardized Plugin Interfaces. To reduce the complexity of manual wiring, plugin-based
|
| 128 |
-
interfaces such as OpenAI ChatGPT Plugins, introduced in November 2023 [ 37], allowed AI models
|
| 129 |
-
to connect with external tools through standardized API schemas like OpenAPI. For example, in
|
| 130 |
-
the OpenAI Plugin ecosystem, plugins like Zapier allowed models to perform predefined actions,
|
| 131 |
-
such as sending emails or updating CRM records. However, these interactions were often one-
|
| 132 |
-
directional and could not maintain state or coordinate multiple steps in a task . New LLM
|
| 133 |
-
app stores [ 62] such as ByteDance Coze [ 4] and Tencent Yuanqi [ 50] have also emerged, offering a
|
| 134 |
-
plugin store for web services. While these platforms expanded available tool options, they created
|
| 135 |
-
isolated ecosystems where plugins are platform-specific , limiting cross-platform compatibility
|
| 136 |
-
and requiring duplicate maintenance efforts. MCP stands out by being open-source and platform-
|
| 137 |
-
agnostic, enabling AI applications to engage in rich two-way interactions with external tools,
|
| 138 |
-
facilitating complex workflows.
|
| 139 |
-
2.1.3 AI Agent Tool Integration. The emergence of AI agent frameworks like LangChain [ 26] and
|
| 140 |
-
similar tool orchestration frameworks provided a structured way for models to invoke external tools
|
| 141 |
-
through predefined interfaces, improving automation and adaptability [ 55]. However, integrating
|
| 142 |
-
and maintaining these tools remained largely manual, requiring custom implementations and
|
| 143 |
-
, Vol. 1, No. 1, Article . Publication date: April 2025.
|
| 144 |
-
|
| 145 |
-
--- Page 4 ---
|
| 146 |
-
4 X Hou, Y Zhao, S Wang, and H Wang
|
| 147 |
-
increasing complexity as the number of tools grew. MCP simplifies this process by offering a
|
| 148 |
-
standardized protocol that enables AI agents to seamlessly invoke, interact with, and
|
| 149 |
-
chain multiple tools through a unified interface . This reduces manual configuration and
|
| 150 |
-
enhances task flexibility, allowing agents to perform complex operations without extensive custom
|
| 151 |
-
integration.
|
| 152 |
-
2.1.4 Retrieval-Augmented Generation (RAG) and Vector Database. Contextual information retrieval
|
| 153 |
-
methods, such as RAG, leverage vector-based search to retrieve relevant knowledge from databases
|
| 154 |
-
or knowledge bases, enabling models to supplement responses with up-to-date information [ 11,16].
|
| 155 |
-
While this approach addressed the problem of knowledge cutoff and improved model accuracy, it
|
| 156 |
-
was limited to passive retrieval of information . It did not inherently allow models to perform
|
| 157 |
-
active operations, such as modifying data or triggering workflows. For example, a RAG-based
|
| 158 |
-
system could retrieve relevant sections from a product documentation database to assist a customer
|
| 159 |
-
support AI. However, if the AI needed to update customer records or escalate an issue to human
|
| 160 |
-
support, it could not take action beyond providing textual responses. MCP extends beyond passive
|
| 161 |
-
information retrieval by enabling AI models to interact with external data sources and tools actively,
|
| 162 |
-
facilitating both retrieval and action in a unified workflow.
|
| 163 |
-
2.2 Motivation
|
| 164 |
-
MCP has rapidly gained traction in the AI community due to its ability to standardize how AI
|
| 165 |
-
models interact with external tools, fetch data, and execute operations. By addressing the limitations
|
| 166 |
-
of manual API wiring, plugin interfaces, and agent frameworks, MCP has the potential to redefine
|
| 167 |
-
AI-to-tool interactions and enable more autonomous and intelligent agent workflows. Despite
|
| 168 |
-
its growing adoption and promising potential, MCP is still in its early stages, with an evolving
|
| 169 |
-
ecosystem that remains incomplete. Many key aspects, such as security and tool discoverability,
|
| 170 |
-
are yet to be fully addressed, leaving ample room for future research and improvement. Moreover,
|
| 171 |
-
while MCP has gained rapid adoption in the industry, it is still largely unexplored in academia.
|
| 172 |
-
Motivated by this gap, this paper is the first to analyze the current MCP landscape, examine
|
| 173 |
-
its emerging ecosystem, and identify potential security risks . Additionally, we outline a
|
| 174 |
-
vision for MCP’s future development and highlight the key challenges that must be addressed to
|
| 175 |
-
support its long-term success.
|
| 176 |
-
3 MCP ARCHITECTURE
|
| 177 |
-
3.1 Core Components
|
| 178 |
-
The MCP architecture is composed of three core components: MCP host ,MCP client , and MCP
|
| 179 |
-
server . These components collaborate to facilitate seamless communication between AI applications,
|
| 180 |
-
external tools, and data sources, ensuring that operations are secure and properly managed. As
|
| 181 |
-
shown in Figure 2, in a typical workflow, the user sends a prompt to the MCP client, which analyzes
|
| 182 |
-
the intent ,selects the appropriate tools via the MCP server, and invokes external APIs to
|
| 183 |
-
retrieve and process the required information before notifying the user of the results.
|
| 184 |
-
3.1.1 MCP Host. The MCP host is an AI application that provides the environment for executing
|
| 185 |
-
AI-based tasks while running the MCP client. It integrates interactive tools and data to enable
|
| 186 |
-
smooth communication with external services. Examples include Claude Desktop for AI-assisted
|
| 187 |
-
content creation, Cursor, an AI-powered IDE for code completion and software development, and
|
| 188 |
-
AI agents that function as autonomous systems for executing complex tasks. The MCP host hosts
|
| 189 |
-
the MCP client and ensures communication with external MCP servers.
|
| 190 |
-
, Vol. 1, No. 1, Article . Publication date: April 2025.
|
| 191 |
-
|
| 192 |
-
--- Page 5 ---
|
| 193 |
-
Model Context Protocol (MCP): Landscape, Security Threats, and Future Research Directions 5
|
| 194 |
-
MCP ClientsPrompt:“Can you please fetch the latest stock price of AAPL and notify me via email?”MCP Servers
|
| 195 |
-
CapabilitiesToolsResourcesPrompts
|
| 196 |
-
②InitialResponse③Notification①InitialRequestTransferLayerDataSourceWeb Services
|
| 197 |
-
Database
|
| 198 |
-
LocalFiles
|
| 199 |
-
Tool Selection
|
| 200 |
-
API Invocation
|
| 201 |
-
IntentAnalysisNotificationSampling
|
| 202 |
-
Orchestration
|
| 203 |
-
UserMCP Workflow
|
| 204 |
-
(ChatApps,IDEs,···,AI Agents)MCPHosts
|
| 205 |
-
1:1Client
|
| 206 |
-
Server
|
| 207 |
-
Fig. 2. The workflow of MCP.
|
| 208 |
-
3.1.2 MCP Client. The MCP client acts as an intermediary within the host environment, managing
|
| 209 |
-
communication between the MCP host and one or more MCP servers. It initiates requests to MCP
|
| 210 |
-
servers, queries available functions, and retrieves responses that describe the server’s capabilities.
|
| 211 |
-
This ensures seamless interaction between the host and external tools. In addition to managing
|
| 212 |
-
requests and responses, the MCP client processes notifications from MCP servers, providing
|
| 213 |
-
real-time updates about task progress and system status. It also performs sampling to gather data
|
| 214 |
-
on tool usage and performance, enabling optimization and informed decision-making. The MCP
|
| 215 |
-
client communicates through the transport layer with MCP servers, facilitating secure, reliable
|
| 216 |
-
data exchange and smooth interaction between the host and external resources.
|
| 217 |
-
3.1.3 MCP Server. The MCP server enables the MCP host and client to access external systems
|
| 218 |
-
and execute operations, offering three core capabilities: tools, resources, and prompts .
|
| 219 |
-
•Tools: Enabling external operations . Tools allow the MCP server to invoke external services
|
| 220 |
-
and APIs to execute operations on behalf of AI models. When the client requests an operation, the
|
| 221 |
-
MCP server identifies the appropriate tool, interacts with the service, and returns the result. For
|
| 222 |
-
instance, if an AI model requires real-time weather data or sentiment analysis, the MCP server
|
| 223 |
-
connects to the relevant API, retrieves the data, and delivers it to the host. Unlike traditional
|
| 224 |
-
function calling, which requires multiple steps and separates invocation from execution, Tools of
|
| 225 |
-
MCP servers streamline this process by allowing the model to autonomously select and invoke
|
| 226 |
-
the appropriate tool based on context. Once configured, these tools follow a standardized supply-
|
| 227 |
-
and-consume model, making them modular, reusable, and easily accessible to other applications,
|
| 228 |
-
enhancing system efficiency and flexibility.
|
| 229 |
-
•Resources: Exposing data to AI models . Resources provide access to structured and unstruc-
|
| 230 |
-
tured datasets that the MCP server can expose to AI models. These datasets may come from
|
| 231 |
-
local storage, databases, or cloud platforms. When an AI model requests specific data, the MCP
|
| 232 |
-
server retrieves and processes the relevant information, enabling the model to make data-driven
|
| 233 |
-
decisions. For example, a recommendation system may access customer interaction logs, or a
|
| 234 |
-
document summarization task may query a text repository.
|
| 235 |
-
•Prompts: Reusable templates for workflow optimization . Prompts are predefined templates
|
| 236 |
-
and workflows that the MCP server generates and maintains to optimize AI responses and
|
| 237 |
-
streamline repetitive tasks. They ensure consistency in responses and improve task execution
|
| 238 |
-
efficiency. For instance, a customer support chatbot may use prompt templates to provide uniform
|
| 239 |
-
, Vol. 1, No. 1, Article . Publication date: April 2025.
|
| 240 |
-
|
| 241 |
-
--- Page 6 ---
|
| 242 |
-
6 X Hou, Y Zhao, S Wang, and H Wang
|
| 243 |
-
and accurate responses, while an annotation task may rely on predefined prompts to maintain
|
| 244 |
-
consistency in data labeling.
|
| 245 |
-
3.2 Transport Layer and Communication
|
| 246 |
-
The transport layer ensures secure, bidirectional communication, allowing for real-time interaction
|
| 247 |
-
and efficient data exchange between the host environment and external systems. The transport
|
| 248 |
-
layer manages the transmission of initial requests from the client, the delivery of server responses
|
| 249 |
-
detailing available capabilities, and the exchange of notifications that keep the client informed of
|
| 250 |
-
ongoing updates. Communication between the MCP client and the MCP server follows a structured
|
| 251 |
-
process, beginning with an initial request from the client to query the server’s functionalities.
|
| 252 |
-
Upon receiving the request, the server responds with an initial response listing the available
|
| 253 |
-
tools, resources, and prompts the client can leverage. Once the connection is established, the
|
| 254 |
-
system maintains a continuous exchange of notifications to ensure that changes in server status
|
| 255 |
-
or updates are communicated back to the client in real time. This structured communication
|
| 256 |
-
ensures high-performance interactions and keeps AI models synchronized with external resources,
|
| 257 |
-
enhancing the effectiveness of AI applications.
|
| 258 |
-
3.3 MCP Server Lifecycle
|
| 259 |
-
The MCP server lifecycle as shown in Figure 3 consists of three key phases: creation ,operation ,
|
| 260 |
-
andupdate . Each phase defines critical activities that ensure the secure and efficient functioning
|
| 261 |
-
of the MCP server, enabling seamless interaction between AI models and external tools, resources,
|
| 262 |
-
and prompts.
|
| 263 |
-
CreationMCPServerComponentsConfigurationSource CodeConfig FilesManifest
|
| 264 |
-
MetadataNameDescriptionVersion
|
| 265 |
-
Tool ListTool NameDescriptionPermissions
|
| 266 |
-
Resources ListData SourcesEndpointsPermissions
|
| 267 |
-
PromptsTemplatesWorkflowsMetadata
|
| 268 |
-
Server Registration → Name CollisionInstaller Deployment → Installer SpoofingCode Integrity Verification → BackdoorOperationTool Execution → Tool Name ConflictSlash Command → Command OverlapSandbox Mechanism → Sandbox EscapeUpdateAuthorization → Privilege PersistenceVersion Control → Vulnerable VersionsOld Version → Configuration DriftMCPServer Lifecycle
|
| 269 |
-
Fig. 3. MCP servers components and lifecycle.
|
| 270 |
-
3.3.1 MCP Server Components. The MCP server is responsible for managing external tools, data
|
| 271 |
-
sources, and workflows, providing AI models with the necessary resources to perform tasks
|
| 272 |
-
efficiently and securely. It comprises several key components that ensure smooth and effective
|
| 273 |
-
operations. Metadata includes essential information about the server, such as its name, version, and
|
| 274 |
-
description, allowing clients to identify and interact with the appropriate server. Configuration
|
| 275 |
-
involves the source code, configuration files, and manifest, which define the server’s operational
|
| 276 |
-
parameters, environment settings, and security policies. Tool list stores a catalog of available tools,
|
| 277 |
-
detailing their functionalities, input-output formats, and access permissions, ensuring proper tool
|
| 278 |
-
, Vol. 1, No. 1, Article . Publication date: April 2025.
|
| 279 |
-
|
| 280 |
-
--- Page 7 ---
|
| 281 |
-
Model Context Protocol (MCP): Landscape, Security Threats, and Future Research Directions 7
|
| 282 |
-
management and security. Resources list governs access to external data sources, including web
|
| 283 |
-
APIs, databases, and local files, specifying allowed endpoints and their associated permissions.
|
| 284 |
-
Finally, Prompts and Templates include pre-configured task templates and workflows that
|
| 285 |
-
enhance the efficiency of AI models in executing complex operations. Together, these components
|
| 286 |
-
enable MCP servers to provide seamless tool integration, data retrieval, and task orchestration for
|
| 287 |
-
AI-powered applications.
|
| 288 |
-
3.3.2 Creation Phase. The creation phase is the initial stage of the MCP server lifecycle, where the
|
| 289 |
-
server is registered, configured, and prepared for operation. This phase involves three key steps.
|
| 290 |
-
Server registration assigns a unique name and identity to the MCP server, allowing clients to
|
| 291 |
-
discover and connect to the appropriate server instance. Installer deployment involves installing
|
| 292 |
-
the MCP server and its associated components, ensuring that the correct configuration files, source
|
| 293 |
-
code, and manifests are in place. Code integrity verification validates the integrity of the server’s
|
| 294 |
-
codebase to prevent unauthorized modifications or tampering before the server becomes operational.
|
| 295 |
-
Successful completion of the creation phase ensures that the MCP server is ready to handle requests
|
| 296 |
-
and interact securely with external tools and data sources.
|
| 297 |
-
3.3.3 Operation Phase. The operation phase is where the MCP server actively processes requests,
|
| 298 |
-
executes tool invocations, and facilitates seamless interaction between AI applications and external
|
| 299 |
-
resources. Tool execution allows the MCP server to invoke the appropriate tools based on the AI
|
| 300 |
-
application’s requests, ensuring that the selected tools perform their intended operations. Slash
|
| 301 |
-
command handling enables the server to interpret and execute multiple commands, including
|
| 302 |
-
those issued through user interfaces or AI agents, while managing potential command overlaps to
|
| 303 |
-
prevent conflicts. Sandbox mechanism enforcement ensures that the execution environment is
|
| 304 |
-
isolated and secure, preventing unauthorized access and mitigating potential risks. Throughout the
|
| 305 |
-
operation phase, the MCP server maintains a stable and controlled environment, enabling reliable
|
| 306 |
-
and secure task execution.
|
| 307 |
-
3.3.4 Update Phase. The update phase ensures that the MCP server remains secure, up-to-date, and
|
| 308 |
-
capable of adapting to evolving requirements. This phase includes three key tasks. Authorization
|
| 309 |
-
management verifies that post-update access permissions remain valid, preventing unauthorized
|
| 310 |
-
use of server resources after updates. Version control maintains consistency between different
|
| 311 |
-
server versions, ensuring that new updates do not introduce vulnerabilities or conflicts. Old version
|
| 312 |
-
management deactivates or removes outdated versions to prevent attackers from exploiting known
|
| 313 |
-
vulnerabilities in previous versions.
|
| 314 |
-
Understanding the MCP server lifecycle is essential for identifying potential vulnerabilities
|
| 315 |
-
and designing effective security measures. Each phase introduces distinct challenges that must
|
| 316 |
-
be carefully addressed to maintain the security, efficiency, and adaptability of the MCP server in
|
| 317 |
-
dynamic AI environments.
|
| 318 |
-
4 CURRENT LANDSCAPE
|
| 319 |
-
4.1 Ecosystem Overview
|
| 320 |
-
4.1.1 Key Adopters. Table 1 demonstrates how MCP has gained significant traction across diverse
|
| 321 |
-
sectors, signaling its growing importance in enabling seamless AI-to-tool interactions. Notably,
|
| 322 |
-
leading AI companies such as Anthropic [ 2] and OpenAI [ 39] have integrated MCP to enhance
|
| 323 |
-
agent capabilities and improve multi-step task execution. This adoption by industry pioneers
|
| 324 |
-
has set a precedent, encouraging other major players to follow suit. Chinese tech giants like
|
| 325 |
-
Baidu [ 31] have also incorporated MCP into their ecosystems, highlighting the protocol’s potential
|
| 326 |
-
to standardize AI workflows across global markets. Developer tools and IDEs, including Replit [ 43],
|
| 327 |
-
, Vol. 1, No. 1, Article . Publication date: April 2025.
|
| 328 |
-
|
| 329 |
-
--- Page 8 ---
|
| 330 |
-
8 X Hou, Y Zhao, S Wang, and H Wang
|
| 331 |
-
Table 1. Overview of MCP ecosystem adoption.
|
| 332 |
-
Category Company/Product Key Features or Use Cases
|
| 333 |
-
Anthropic (Claude) [2] Full MCP support in the desktop version, enabling interaction with external tools.
|
| 334 |
-
AI Models and Frameworks OpenAI [39] MCP support in Agent SDK and API for seamless integration.
|
| 335 |
-
Baidu Maps [31] API integration using MCP to access geolocation services.
|
| 336 |
-
Blender MCP [33] Enables Blender and Unity 3D model generation via natural language commands.
|
| 337 |
-
Replit [43] AI-assisted development environment with MCP tool integration.
|
| 338 |
-
Microsoft Copilot Studio [49] Extends Copilot Studio with MCP-based tool integration.
|
| 339 |
-
Developer Tools Sourcegraph Cody [10] Implements MCP through OpenCTX for resource integration.
|
| 340 |
-
Codeium [9] Adds MCP support for coding assistants to facilitate cross-system tasks.
|
| 341 |
-
Cursor [12] MCP tool integration in Cursor Composer for seamless code execution.
|
| 342 |
-
Cline [7] VS Code coding agent that manages MCP tools and servers.
|
| 343 |
-
Zed [60] Provides slash commands and tool integration based on MCP.
|
| 344 |
-
JetBrains [24] Integrates MCP for IDE-based AI tooling.
|
| 345 |
-
IDEs/Editors Windsurf Editor [14] AI-assisted IDE with MCP tool interaction.
|
| 346 |
-
TheiaAI/TheiaIDE [52] Enables MCP server interaction for AI-powered tools.
|
| 347 |
-
Emacs MCP [32] Enhances AI functionality in Emacs by supporting MCP tool invocation.
|
| 348 |
-
OpenSumi [40] Supports MCP tools in IDEs and enables seamless AI tool integration.
|
| 349 |
-
Cloudflare [8] Provides remote MCP server hosting and OAuth integration.
|
| 350 |
-
Cloud Platforms and Services Block (Square) [47] Uses MCP to enhance data processing efficiency for financial platforms.
|
| 351 |
-
Stripe [48] Exposes payment APIs via MCP for seamless AI integration.
|
| 352 |
-
Apify MCP Tester [51] Connects to any MCP server using SSE for API testing.
|
| 353 |
-
Web Automation and Data LibreChat [28] Extends the current tool ecosystem through MCP integration.
|
| 354 |
-
Goose [21] Allows building AI agents with integrated MCP server functionality.
|
| 355 |
-
Microsoft Copilot Studio [ 49], JetBrains [ 24], and TheiaIDE [ 52], leverage MCP to facilitate agentic
|
| 356 |
-
workflows and streamline cross-platform operations. This trend indicates a shift toward embedding
|
| 357 |
-
MCP in developer environments to enhance productivity and reduce manual integration efforts.
|
| 358 |
-
Furthermore, cloud platforms like Cloudflare [ 8] and financial service providers such as Block
|
| 359 |
-
(Square) [ 47] and Stripe [ 48] are exploring MCP to improve security, scalability, and governance
|
| 360 |
-
in multi-tenant environments. The widespread adoption of MCP by these industry leaders not
|
| 361 |
-
only highlights its growing relevance but also points to its potential as a foundational layer in
|
| 362 |
-
AI-powered ecosystems. As more companies integrate MCP into their operations, the protocol is
|
| 363 |
-
set to play a central role in shaping the future of AI tool integration. Looking ahead, MCP is poised
|
| 364 |
-
to become a key enabler of AI-driven workflows, driving more secure, scalable, and efficient AI
|
| 365 |
-
ecosystems across industries.
|
| 366 |
-
4.1.2 Community-Driven MCP Servers. Anthropic has not yet released an official MCP marketplace,
|
| 367 |
-
but the vibrant MCP community has stepped in to fill this gap by creating numerous independent
|
| 368 |
-
server collections and platforms. As shown in Table 2, platforms such as MCP.so [ 35], Glama [ 20],
|
| 369 |
-
and PulseMCP [ 15] host thousands of servers, allowing users to discover and integrate a wide
|
| 370 |
-
range of tools and services. These community-driven platforms have significantly accelerated the
|
| 371 |
-
adoption of MCP by providing accessible repositories where developers can publish, manage, and
|
| 372 |
-
share their MCP servers. Desktop-based solutions like Dockmaster [ 34] and Toolbase [ 19] further
|
| 373 |
-
enhance local MCP deployment capabilities, empowering developers to manage and experiment
|
| 374 |
-
with servers in isolated environments. The rise of community-driven MCP server ecosystems
|
| 375 |
-
reflects the growing enthusiasm for MCP and highlights the need for a formalized marketplace.
|
| 376 |
-
4.1.3 SDKs and Tools. With the continuous growth of community-driven tools and official SDKs,
|
| 377 |
-
the MCP ecosystem is becoming increasingly accessible, allowing developers to integrate MCP into
|
| 378 |
-
various applications and workflows efficiently. Official SDKs are available in multiple languages,
|
| 379 |
-
including TypeScript ,Python ,Java ,Kotlin , and C#, providing developers with versatile options
|
| 380 |
-
to implement MCP in different environments. In addition to official SDKs, the community has
|
| 381 |
-
contributed numerous frameworks and utilities that simplify MCP server development. Tools such
|
| 382 |
-
, Vol. 1, No. 1, Article . Publication date: April 2025.
|
| 383 |
-
|
| 384 |
-
--- Page 9 ---
|
| 385 |
-
Model Context Protocol (MCP): Landscape, Security Threats, and Future Research Directions 9
|
| 386 |
-
Table 2. Overview of MCP server collections and deployment modes (As of March 27, 2025).
|
| 387 |
-
Collection Author Mode # Servers URL
|
| 388 |
-
MCP.so mcp.so Website 4774 mcp.so
|
| 389 |
-
Glama glama.ai Website 3356 glama.ai
|
| 390 |
-
PulseMCP Antanavicius et al. Website 3164 pulsemcp.com
|
| 391 |
-
Smithery Henry Mao Website 2942 smithery.ai
|
| 392 |
-
Dockmaster mcp-dockmaster Desktop App 517 mcp-dockmaster.com
|
| 393 |
-
Official Collection Anthropic GitHub Repo 320 modelcontextprotocol/servers
|
| 394 |
-
AiMCP Hekmon Website 313 aimcp.info
|
| 395 |
-
MCP.run mcp.run Website 114 mcp.run
|
| 396 |
-
Awesome MCP Servers Stephen Akinyemi GitHub Repo 88 appcypher/mcp-servers
|
| 397 |
-
mcp-get registry Michael Latman Website 59 mcp-get.com
|
| 398 |
-
Awesome MCP Servers wong2 Website 34 mcpservers.org
|
| 399 |
-
OpenTools opentoolsteam Website 25 opentools.com
|
| 400 |
-
Toolbase gching Desktop App 24 gettoolbase.ai
|
| 401 |
-
make inference mkinf Website 20 mkinf.io
|
| 402 |
-
Awesome Crypto MCP Servers Luke Fan GitHub Repo 13 badkk/crypto-mcp-servers
|
| 403 |
-
asEasyMCP andFastMCP offer lightweight TypeScript-based solutions for quickly building MCP
|
| 404 |
-
servers, while FastAPI to MCP Auto Generator enables the seamless exposure of FastAPI endpoints
|
| 405 |
-
as MCP tools. For more complex scenarios, Foxy Contexts provides a Golang-based library to
|
| 406 |
-
build MCP servers, and Higress MCP Server Hosting extends the API Gateway (based on Envoy)
|
| 407 |
-
to host MCP servers with wasm plugins. Server generation and management platforms such as
|
| 408 |
-
Mintlify ,Speakeasy , and Stainless further enhance the ecosystem by automating MCP server
|
| 409 |
-
generation , providing curated MCP server lists, and enabling faster deployment with minimal
|
| 410 |
-
manual intervention. These platforms empower organizations to rapidly create and manage secure
|
| 411 |
-
and well-documented MCP servers.
|
| 412 |
-
4.2 Use Cases
|
| 413 |
-
MCP has become a vital tool for AI applications to effectively communicate with external tools,
|
| 414 |
-
APIs, and systems. By standardizing interactions, MCP simplifies complex workflows, boosting the
|
| 415 |
-
efficiency of AI-driven applications. Below, we explore three key platforms (i.e., OpenAI, Cursor,
|
| 416 |
-
and Cloudflare) that have successfully integrated MCP, highlighting their distinct use cases.
|
| 417 |
-
4.2.1 OpenAI: MCP Integration in AI Agents and SDKs. OpenAI has adopted MCP to standardize
|
| 418 |
-
AI-to-tool communication, recognizing its potential to enhance integration with external tools.
|
| 419 |
-
Recently, OpenAI introduced MCP support in its Agent SDK, enabling developers to create AI
|
| 420 |
-
agents that seamlessly interact with external tools. In a typical workflow, developers use the Agent
|
| 421 |
-
SDK to define tasks that require external tool invocation. When an AI agent encounters a task
|
| 422 |
-
like retrieving data from an API or querying a database, the SDK routes the request through an
|
| 423 |
-
MCP server. The request is transmitted via the MCP protocol, ensuring proper formatting and
|
| 424 |
-
real-time response delivery to the agent. OpenAI’s plan to integrate MCP into the Responses API
|
| 425 |
-
will streamline AI-to-tool communication, allowing AI models like ChatGPT to interact with tools
|
| 426 |
-
dynamically without extra configuration. Additionally, OpenAI aims to extend MCP support to
|
| 427 |
-
ChatGPT desktop applications, enabling AI assistants to handle various user tasks by connecting
|
| 428 |
-
to remote MCP servers, further bridging the gap between AI models and external systems.
|
| 429 |
-
4.2.2 Cursor: Enhancing Software Development with MCP-Powered Code Assistants. Cursor uses
|
| 430 |
-
MCP to enhance software development by enabling AI-powered code assistants that automate
|
| 431 |
-
complex tasks. With MCP, Cursor allows AI agents to interact with external APIs, access code
|
| 432 |
-
, Vol. 1, No. 1, Article . Publication date: April 2025.
|
| 433 |
-
|
| 434 |
-
--- Page 10 ---
|
| 435 |
-
10 X Hou, Y Zhao, S Wang, and H Wang
|
| 436 |
-
repositories, and automate workflows directly within the integrated development environment.
|
| 437 |
-
When a developer issues a command within the IDE, the AI agent evaluates whether external tools
|
| 438 |
-
are needed. If so, the agent sends a request to an MCP server, which identifies the appropriate
|
| 439 |
-
tool and processes the task, such as running API tests, modifying files, or analyzing code. The
|
| 440 |
-
results are then returned to the agent for further action. This integration helps automate repetitive
|
| 441 |
-
tasks, minimizing errors and enhancing overall development efficiency. By simplifying complex
|
| 442 |
-
processes, Cursor boosts both productivity and accuracy, allowing developers to execute multi-step
|
| 443 |
-
operations effortlessly.
|
| 444 |
-
4.2.3 Cloudflare: Remote MCP Server Hosting and Scalability. Cloudflare has played a pivotal role
|
| 445 |
-
in transforming MCP from a local deployment model to a cloud-hosted architecture by introducing
|
| 446 |
-
remote MCP server hosting. This approach eliminates the complexities associated with configuring
|
| 447 |
-
MCP servers locally, allowing clients to connect to secure, cloud-hosted MCP servers seamlessly.
|
| 448 |
-
The workflow begins with Cloudflare hosting MCP servers in secure cloud environments that are
|
| 449 |
-
accessible via authenticated API calls. AI agents initiate requests to the Cloudflare MCP server
|
| 450 |
-
using OAuth-based authentication, ensuring that only authorized entities can access the server.
|
| 451 |
-
Once authenticated, the agent dynamically invokes external tools and APIs through the MCP server,
|
| 452 |
-
executing tasks such as data retrieval, document processing, or API integration. This approach
|
| 453 |
-
not only reduces the risk of misconfiguration but also ensures seamless execution of AI-powered
|
| 454 |
-
workflows across distributed environments. Furthermore, Cloudflare’s multi-tenant architecture
|
| 455 |
-
allows multiple users to securely access and manage their own MCP instances, ensuring isolation
|
| 456 |
-
and preventing data leakage. Cloudflare’s solution thus extends MCP’s capabilities by enabling
|
| 457 |
-
enterprise-grade scalability and secure multi-device interoperability.
|
| 458 |
-
The adoption of MCP by platforms like OpenAI, Cursor, and Cloudflare highlights its flexibility
|
| 459 |
-
and growing role in AI-driven workflows, enhancing efficiency, adaptability, and scalability across
|
| 460 |
-
development tools, enterprise applications, and cloud services.
|
| 461 |
-
5 SECURITY AND PRIVACY ANALYSIS
|
| 462 |
-
MCP servers, as open and extensible platforms, introduce various security risks throughout their
|
| 463 |
-
lifecycle. In this section, we analyze security threats across different phases: creation ,operation ,
|
| 464 |
-
andupdate . Each phase of the MCP server lifecycle presents unique challenges that, if not properly
|
| 465 |
-
mitigated, can compromise system integrity, data security, and user privacy.
|
| 466 |
-
5.1 Security Risks in the Creation Phase
|
| 467 |
-
The creation phase of an MCP server involves registering the server, deploying the installer, and
|
| 468 |
-
verifying code integrity. This phase introduces three key risks: name collision, installer spoofing,
|
| 469 |
-
and code injection/backdoor.
|
| 470 |
-
5.1.1 Name Collision. Server name collision occurs when a malicious entity registers an MCP
|
| 471 |
-
server with an identical or deceptively similar name to a legitimate server, deceiving users during the
|
| 472 |
-
installation phase. Since MCP clients primarily rely on the server’s name and description when
|
| 473 |
-
selecting servers , they are vulnerable to such impersonation attacks. Once a compromised server is
|
| 474 |
-
installed, it can mislead AI agents and clients into invoking the malicious server, potentially exposing
|
| 475 |
-
sensitive data, executing unauthorized commands, or disrupting workflows. For example, an attacker
|
| 476 |
-
could register a server named mcp-github that mimics the legitimate github-mcp server, allowing
|
| 477 |
-
them to intercept and manipulate sensitive interactions between AI agents and trusted services.
|
| 478 |
-
Although MCP currently operates primarily in local environments, future adoption in multi-
|
| 479 |
-
tenant environments introduces additional risks of name collision. In these scenarios, where
|
| 480 |
-
multiple organizations or users might register servers with similar names, the lack of centralized
|
| 481 |
-
, Vol. 1, No. 1, Article . Publication date: April 2025.
|
| 482 |
-
|
| 483 |
-
--- Page 11 ---
|
| 484 |
-
Model Context Protocol (MCP): Landscape, Security Threats, and Future Research Directions 11
|
| 485 |
-
naming control can increase the likelihood of confusion and impersonation attacks. Additionally,
|
| 486 |
-
asMCP marketplaces grow to support public server listings, supply chain attacks may
|
| 487 |
-
become a critical concern , where malicious servers can replace legitimate ones. To mitigate
|
| 488 |
-
these risks, future research can focus on establishing strict namespace policies, implementing
|
| 489 |
-
cryptographic server verification, and designing reputation-based trust systems to secure MCP
|
| 490 |
-
server registrations.
|
| 491 |
-
5.1.2 Installer Spoofing. Installer spoofing occurs when attackers distribute modified MCP server
|
| 492 |
-
installers that introduce malicious code or backdoors during the installation process. Each MCP
|
| 493 |
-
server requires a unique configuration that users must manually set up in their local environments
|
| 494 |
-
before the client can invoke the server. This manual configuration process creates a barrier for
|
| 495 |
-
less technical users, prompting the emergence of unofficial auto-installers that automate the
|
| 496 |
-
setup process. As shown in Table 3, tools such as Smithery-CLI ,mcp-get , and mcp-installer
|
| 497 |
-
streamline the installation process, allowing users to quickly configure MCP servers without dealing
|
| 498 |
-
with intricate server settings.
|
| 499 |
-
Table 3. Unofficial MCP auto installers (As of March 27, 2025).
|
| 500 |
-
Tool Author # Stars # Servers URL
|
| 501 |
-
Smithery CLI Henry Mao 170 2942 smithery.ai
|
| 502 |
-
mcp.run Dylibso / 118 docs.mcp.run
|
| 503 |
-
mcp-get Michael Latman 318 59 mcp-get.com
|
| 504 |
-
Toolbase gching / 24 gettoolbase.ai
|
| 505 |
-
mcp-installer Ani Betts 767 NL1mcp-installer
|
| 506 |
-
1Enables MCP server installation through natural language interaction with the
|
| 507 |
-
client.
|
| 508 |
-
However, while these auto-installers enhance usability, they also introduce new attack surfaces
|
| 509 |
-
by potentially distributing compromised packages. Since these unofficial installers are often sourced
|
| 510 |
-
from unverified repositories or community-driven platforms, they may inadvertently expose users
|
| 511 |
-
to security risks such as installing tampered servers or misconfigured environments. Attackers
|
| 512 |
-
canexploit these auto-installers by embedding malware that grants unauthorized access,
|
| 513 |
-
modifies system configurations, or creates persistent backdoors . Moreover, most users
|
| 514 |
-
who opt for one-click installations rarely review the underlying code for potential security
|
| 515 |
-
vulnerabilities, making it easier for attackers to distribute compromised versions undetected.
|
| 516 |
-
Addressing these challenges requires developing a standardized, secure installation framework
|
| 517 |
-
for MCP servers, enforcing package integrity checks, and establishing reputation-based trust
|
| 518 |
-
mechanisms to assess the credibility of auto-installers in the MCP ecosystem.
|
| 519 |
-
5.1.3 Code Injection/Backdoor. Code injection attacks occur when malicious code is surreptitiously
|
| 520 |
-
embedded into the MCP server’s codebase during the creation phase, often bypassing traditional
|
| 521 |
-
security checks. It targets the server’s source code or configuration files, embedding hidden back-
|
| 522 |
-
doors that persist even after updates or security patches. These backdoors allow attackers to
|
| 523 |
-
silently maintain control over the server, enabling actions such as unauthorized data exfiltration,
|
| 524 |
-
privilege escalation, or command manipulation. Code injection is particularly insidious because
|
| 525 |
-
it can be introduced by compromised dependencies, vulnerable build pipelines, or unauthorized
|
| 526 |
-
modifications to the server’s source code. Since MCP servers often rely on community-maintained
|
| 527 |
-
components and open-source libraries, ensuring the integrity of these dependencies is critical.
|
| 528 |
-
To mitigate this risk, rigorous code integrity verification, strict dependency management,
|
| 529 |
-
and regular security audits should be implemented to detect unauthorized modifications
|
| 530 |
-
, Vol. 1, No. 1, Article . Publication date: April 2025.
|
| 531 |
-
|
| 532 |
-
--- Page 12 ---
|
| 533 |
-
12 X Hou, Y Zhao, S Wang, and H Wang
|
| 534 |
-
and prevent the introduction of malicious code . Additionally, adopting reproducible builds
|
| 535 |
-
and enforcing checksum validation during deployment can further safeguard MCP servers from
|
| 536 |
-
injection-based threats.
|
| 537 |
-
5.2 Security Risks in the Operation Phase
|
| 538 |
-
The operation phase is when the MCP server actively executes tools, processes slash commands,
|
| 539 |
-
and interacts with external APIs. This phase introduces three major risks: tool name conflicts, slash
|
| 540 |
-
command overlap, and sandbox escape.
|
| 541 |
-
5.2.1 Tool Name Conflicts. Tool name conflicts arise when multiple tools within the MCP ecosystem
|
| 542 |
-
share identical or similar names, leading to ambiguity and confusion during tool selection and
|
| 543 |
-
execution. This can result in AI applications inadvertently invoking the wrong tool, potentially
|
| 544 |
-
executing malicious commands or leaking sensitive information. A common attack scenario involves
|
| 545 |
-
a malicious actor registering a tool named send_email that mimics a legitimate email-sending tool.
|
| 546 |
-
If the MCP client invokes the malicious version, sensitive information intended for trusted recipients
|
| 547 |
-
may be redirected to an attacker-controlled endpoint, compromising data confidentiality. Beyond
|
| 548 |
-
name similarity, our experiments revealed that malicious actors can further manipulate tool
|
| 549 |
-
selection by embedding deceptive phrases in tool descriptions. Specifically, we observed that if a
|
| 550 |
-
tool’s description explicitly contains directives like “this tool should be prioritized” or “prefer using
|
| 551 |
-
this tool first”, the MCP client is more likely to select that tool, even when its functionality is inferior
|
| 552 |
-
or potentially harmful. This introduces a severe risk of toolflow hijacking , where attackers can
|
| 553 |
-
leverage misleading descriptions to influence tool selection and gain control over critical workflows.
|
| 554 |
-
This underscores the need for researchers to develop advanced validation and anomaly detection
|
| 555 |
-
techniques to identify and mitigate deceptive tool descriptions, ensuring accurate and secure AI
|
| 556 |
-
tool selection.
|
| 557 |
-
5.2.2 Slash Command Overlap. Slash command overlap occurs when multiple tools define identical
|
| 558 |
-
or similar commands, leading to ambiguity during command execution. This overlap introduces
|
| 559 |
-
the risk of executing unintended actions, especially when AI applications dynamically select and
|
| 560 |
-
invoke tools based on contextual cues. Malicious actors can exploit this ambiguity by introducing
|
| 561 |
-
conflicting commands that manipulate tool behavior, potentially compromising system integrity or
|
| 562 |
-
exposing sensitive data. For instance, if one tool registers a /delete command to remove temporary
|
| 563 |
-
files while another uses the same command to erase critical system logs, an AI application may
|
| 564 |
-
mistakenly execute the incorrect command, potentially causing data loss or system instability.
|
| 565 |
-
Similar issues have been observed in team chat systems such as Slack, where overlapping command
|
| 566 |
-
registrations allowed unauthorized tools to hijack legitimate invocations, resulting in security
|
| 567 |
-
breaches and operational disruptions [ 61]. Since slash commands are often surfaced as user-
|
| 568 |
-
facing shortcuts in client interfaces, misinterpreted or conflicting commands can lead to
|
| 569 |
-
dangerous outcomes , especially in multi-tool environments. To minimize this risk, MCP clients
|
| 570 |
-
should establish context-aware command resolution, apply command disambiguation techniques,
|
| 571 |
-
and prioritize execution based on verified tool metadata.
|
| 572 |
-
5.2.3 Sandbox Escape. Sandboxing isolates the execution environment of MCP tools, restricting
|
| 573 |
-
their access to critical system resources and protecting the host system from potentially harmful
|
| 574 |
-
operations. However, sandbox escape vulnerabilities arise when attackers exploit flaws in the
|
| 575 |
-
sandbox implementation, enabling them to break out of the restricted environment and gain
|
| 576 |
-
unauthorized access to the host system. Once outside the sandbox, attackers can execute arbitrary
|
| 577 |
-
code, manipulate sensitive data, or escalate privileges, compromising the security and stability of the
|
| 578 |
-
MCP ecosystem. Common attack vectors include exploiting weaknesses in system calls, improperly
|
| 579 |
-
, Vol. 1, No. 1, Article . Publication date: April 2025.
|
| 580 |
-
|
| 581 |
-
--- Page 13 ---
|
| 582 |
-
Model Context Protocol (MCP): Landscape, Security Threats, and Future Research Directions 13
|
| 583 |
-
handled exceptions, and vulnerabilities in third-party libraries. For instance, a malicious MCP tool
|
| 584 |
-
could exploit unpatched vulnerabilities in the underlying container runtime to bypass confinement
|
| 585 |
-
and execute commands with elevated privileges. Similarly, side-channel attacks may allow attackers
|
| 586 |
-
to extract sensitive data, undermining the intended isolation of the sandbox. Examining real-world
|
| 587 |
-
sandbox escape scenarios in MCP environments can provide valuable insights for strengthening
|
| 588 |
-
sandbox security and preventing future exploitation.
|
| 589 |
-
5.3 Security Risks in the Update Phase
|
| 590 |
-
The update phase involves managing server versions, modifying configurations, and adjusting
|
| 591 |
-
access controls. This phase introduces three critical risks: post-update privilege persistence, re-
|
| 592 |
-
deployment of vulnerable versions, and configuration drift.
|
| 593 |
-
5.3.1 Post-Update Privilege Persistence. Post-update privilege persistence occurs when outdated
|
| 594 |
-
or revoked privileges remain active after an MCP server update, allowing previously authorized
|
| 595 |
-
users or malicious actors to retain elevated privileges. This vulnerability arises when privilege
|
| 596 |
-
modifications, such as API key revocations or permission changes, are not properly synchro-
|
| 597 |
-
nized or invalidated following server updates . If these outdated privileges persist, attackers
|
| 598 |
-
may exploit them to maintain unauthorized access to sensitive resources or perform malicious
|
| 599 |
-
operations. For example, in API-driven environments like GitHub or AWS, privilege persistence
|
| 600 |
-
has been observed when outdated OAuth tokens or IAM session tokens remain valid after privilege
|
| 601 |
-
revocation. Similarly, in MCP ecosystems, if a revoked API key or modified role configuration is
|
| 602 |
-
not promptly invalidated after an update, an attacker could continue invoking privileged actions,
|
| 603 |
-
potentially compromising the integrity of the system. Enforcing strict privilege revocation policies,
|
| 604 |
-
ensuring privilege changes propagate consistently across all server instances, and implementing
|
| 605 |
-
automatic expiration for API keys and session tokens are essential to reducing the likelihood
|
| 606 |
-
of privilege persistence. Comprehensive logging and auditing of privilege modifications further
|
| 607 |
-
enhance visibility and help detect inconsistencies that could indicate privilege persistence.
|
| 608 |
-
5.3.2 Re-deployment of Vulnerable Versions. MCP servers, being open-source and maintained by
|
| 609 |
-
individual developers or community contributors , lack a centralized platform for auditing
|
| 610 |
-
and enforcing security updates. Users typically download MCP server packages from repositories
|
| 611 |
-
like GitHub, npm, or PyPi and configure them locally, often without formal review processes.
|
| 612 |
-
This decentralized model increases the risk of re-deploying vulnerable versions, either due to
|
| 613 |
-
delayed updates, version rollbacks, or reliance on unverified package sources. When users update
|
| 614 |
-
MCP servers, they may unintentionally roll back to older, vulnerable versions to address compat-
|
| 615 |
-
ibility issues or maintain stability. Additionally, unofficial auto-installers, such as mcp-get and
|
| 616 |
-
mcp-installer , which streamline server installation, may default to cached or outdated versions,
|
| 617 |
-
exposing systems to previously patched vulnerabilities. Since these tools often prioritize ease of
|
| 618 |
-
use over security , they may lack version verification or fail to notify users about critical updates.
|
| 619 |
-
Because security patches in the MCP ecosystem rely on community-driven maintenance, delays
|
| 620 |
-
between vulnerability disclosure and patch availability are common . Users who do not
|
| 621 |
-
actively track updates or security advisories may unknowingly continue using vulnerable versions,
|
| 622 |
-
creating opportunities for attackers to exploit known flaws. For example, an attacker could exploit
|
| 623 |
-
an outdated MCP server to gain unauthorized access or manipulate server operations. From a
|
| 624 |
-
research perspective, analyzing version management practices in MCP environments can identify
|
| 625 |
-
potential gaps and highlight the need for automated vulnerability detection and mitigation. On the
|
| 626 |
-
other hand, there is also a pressing need to establish an official package management system
|
| 627 |
-
with a standardized packaging format for MCP servers and a centralized server registry to
|
| 628 |
-
facilitate secure discovery and verification of available MCP servers.
|
| 629 |
-
, Vol. 1, No. 1, Article . Publication date: April 2025.
|
| 630 |
-
|
| 631 |
-
--- Page 14 ---
|
| 632 |
-
14 X Hou, Y Zhao, S Wang, and H Wang
|
| 633 |
-
5.3.3 Configuration Drift. Configuration drift occurs when unintended changes accumulate in
|
| 634 |
-
the system configuration over time, deviating from the original security baseline. These devia-
|
| 635 |
-
tions often arise due to manual adjustments, overlooked updates, or conflicting modifications
|
| 636 |
-
made by different tools or users. In MCP environments, where servers are typically configured
|
| 637 |
-
and maintained locally by end-users, such inconsistencies can introduce exploitable gaps and
|
| 638 |
-
undermine the overall security posture. With the emergence of remote MCP server support, such
|
| 639 |
-
as Cloudflare’s hosted MCP environments, configuration drift becomes an even more pressing
|
| 640 |
-
concern. Unlike local MCP deployments, where configuration issues may only affect a single user’s
|
| 641 |
-
environment, configuration drift in remote or cloud-based MCP servers can impact multiple users
|
| 642 |
-
or organizations simultaneously. Misconfigurations in multi-tenant environments may expose
|
| 643 |
-
sensitive data, lead to privilege escalation, or inadvertently grant malicious actors broader access
|
| 644 |
-
than intended. Addressing this issue requires the implementation of automated configuration
|
| 645 |
-
validation mechanisms and regular consistency checks to ensure that both local and remote MCP
|
| 646 |
-
environments adhere to secure baseline configurations.
|
| 647 |
-
6 DISCUSSION
|
| 648 |
-
6.1 Implications
|
| 649 |
-
The rapid adoption of MCP is transforming the AI application ecosystem, introducing new oppor-
|
| 650 |
-
tunities and challenges that have significant implications for developers, users, MCP ecosystem
|
| 651 |
-
maintainers, and the broader AI community.
|
| 652 |
-
For developers , MCP reduces the complexity of integrating external tools, enabling the creation
|
| 653 |
-
of more versatile and capable AI agents that can perform complex, multi-step tasks. By providing a
|
| 654 |
-
standardized interface for invoking tools, MCP shifts the focus from managing intricate integrations
|
| 655 |
-
to enhancing agent logic and functionality. However, this increased efficiency comes with the
|
| 656 |
-
responsibility to ensure that MCP implementations are secure, version-controlled, and aligned with
|
| 657 |
-
best practices. Developers must remain vigilant about maintaining secure tool configurations and
|
| 658 |
-
preventing potential misconfigurations that could expose systems to vulnerabilities.
|
| 659 |
-
For users , MCP enhances the experience by enabling seamless interactions between AI agents and
|
| 660 |
-
external tools, automating workflows across platforms such as enterprise data management and IoT
|
| 661 |
-
integration. It reduces the need for manual operations and improves efficiency in handling complex
|
| 662 |
-
tasks. However, as MCP servers gain deeper access to sensitive data and critical operations, users
|
| 663 |
-
must remain vigilant about the risks posed by unverified tools and misconfigured servers. Careless
|
| 664 |
-
installation or untrusted sources may cause data leaks, unauthorized actions, or system instability.
|
| 665 |
-
For MCP ecosystem maintainers , the decentralized nature of MCP server development and
|
| 666 |
-
distribution introduces a fragmented security landscape. MCP servers are often hosted on open-
|
| 667 |
-
source platforms, where updates and patches are community-driven and may vary in quality and
|
| 668 |
-
frequency. Without centralized oversight, inconsistencies in server configurations and outdated
|
| 669 |
-
versions can introduce potential vulnerabilities. As the MCP ecosystem evolves to support remote
|
| 670 |
-
hosting and multi-tenant environments, maintainers must remain attentive to potential risks
|
| 671 |
-
associated with configuration drift, privilege persistence, and re-deployment of vulnerable versions.
|
| 672 |
-
For the broader AI community , MCP unlocks new possibilities by enhancing agentic workflows
|
| 673 |
-
through cross-system coordination, dynamic tool invocation, and collaborative multi-agent systems.
|
| 674 |
-
MCP’s ability to standardize interactions between agents and tools has the potential to accelerate AI
|
| 675 |
-
adoption across industries, driving innovation in fields such as healthcare, finance, and enterprise
|
| 676 |
-
automation. However, as MCP adoption grows, the AI community must address emerging ethical
|
| 677 |
-
and operational concerns, such as ensuring fair and unbiased tool selection, safeguarding sensitive
|
| 678 |
-
user data, and preventing potential misuse of AI capabilities. Balancing these considerations will be
|
| 679 |
-
, Vol. 1, No. 1, Article . Publication date: April 2025.
|
| 680 |
-
|
| 681 |
-
--- Page 15 ---
|
| 682 |
-
Model Context Protocol (MCP): Landscape, Security Threats, and Future Research Directions 15
|
| 683 |
-
essential to ensuring that MCP’s benefits are widely distributed while maintaining accountability
|
| 684 |
-
and trust within the AI ecosystem.
|
| 685 |
-
6.2 Challenges
|
| 686 |
-
Despite its potential, MCP’s adoption brings forth a range of challenges that need to be addressed
|
| 687 |
-
to ensure its sustainable growth and responsible development:
|
| 688 |
-
Lack of centralized security oversight. Since MCP servers are managed by independent develop-
|
| 689 |
-
ers and contributors, there is no centralized platform to audit, enforce, or validate security standards.
|
| 690 |
-
This decentralized model increases the likelihood of inconsistencies in security practices, making it
|
| 691 |
-
difficult to ensure that all MCP servers adhere to secure development principles. Moreover, the
|
| 692 |
-
absence of a unified package management system for MCP servers complicates the installation and
|
| 693 |
-
maintenance process, increasing the likelihood of deploying outdated or misconfigured versions.
|
| 694 |
-
The use of unofficial installation tools across different MCP clients further introduces variability in
|
| 695 |
-
server deployment, making it harder to maintain consistent security standards.
|
| 696 |
-
Authentication and authorization gaps. MCP currently lacks a standardized framework for
|
| 697 |
-
managing authentication and authorization across different clients and servers. Without a unified
|
| 698 |
-
mechanism to verify identities and regulate access, it becomes difficult to enforce granular permis-
|
| 699 |
-
sions, especially in multi-tenant environments where multiple users and agents may interact with
|
| 700 |
-
the same MCP server. The absence of robust authentication protocols increases the risk of unautho-
|
| 701 |
-
rized tool invocation and exposes sensitive data to malicious actors. Moreover, inconsistencies in
|
| 702 |
-
how different MCP clients handle user credentials further exacerbate these security challenges,
|
| 703 |
-
making it difficult to maintain a consistent access control policy across deployments.
|
| 704 |
-
Insufficient debugging and monitoring mechanisms. MCP lacks comprehensive debugging
|
| 705 |
-
and monitoring mechanisms, making it difficult for developers to diagnose errors, trace tool
|
| 706 |
-
interactions, and assess system behavior during tool invocation. Since MCP clients and servers
|
| 707 |
-
operate independently, inconsistencies in error handling and logging can obscure critical security
|
| 708 |
-
events or operational failures. Without robust monitoring frameworks and standardized logging
|
| 709 |
-
mechanisms, identifying anomalies, preventing system failures, and mitigating potential security
|
| 710 |
-
incidents becomes challenging, hindering the development of more resilient MCP ecosystems.
|
| 711 |
-
Maintaining consistency in multi-step, cross-system workflows. MCP allows AI agents to
|
| 712 |
-
execute multi-step workflows by invoking multiple tools across different systems through a unified
|
| 713 |
-
interface. Ensuring consistent context across successive tool interactions is inherently difficult
|
| 714 |
-
due to the distributed nature of these systems. Without effective state management and error
|
| 715 |
-
recovery mechanisms, MCP risks propagating errors or losing intermediate results, leading to
|
| 716 |
-
incomplete or inconsistent workflows. Additionally, dynamic coordination across diverse platforms
|
| 717 |
-
can introduce delays and conflicts, further complicating the seamless execution of workflows within
|
| 718 |
-
MCP environments.
|
| 719 |
-
Scalability challenges in multi-tenant environments. As MCP evolves to support remote server
|
| 720 |
-
hosting and multi-tenant environments, maintaining consistent performance, security, and tenant
|
| 721 |
-
isolation becomes increasingly complex. Without robust mechanisms for resource management
|
| 722 |
-
and tenant-specific configuration policies, misconfigurations can lead to data leakage, performance
|
| 723 |
-
issues, and privilege escalation. Ensuring scalability and isolation is critical for MCP’s reliability in
|
| 724 |
-
enterprise deployments.
|
| 725 |
-
Challenges in embedding MCP in smart environments. Integrating MCP into smart environ-
|
| 726 |
-
ments, such as smart homes, industrial IoT systems, or enterprise automation platforms, introduces
|
| 727 |
-
unique challenges related to real-time responsiveness, interoperability, and security. MCP servers
|
| 728 |
-
in these environments must handle continuous streams of data from multiple sensors and devices
|
| 729 |
-
while maintaining low-latency responses. Moreover, ensuring seamless interaction between AI
|
| 730 |
-
, Vol. 1, No. 1, Article . Publication date: April 2025.
|
| 731 |
-
|
| 732 |
-
--- Page 16 ---
|
| 733 |
-
16 X Hou, Y Zhao, S Wang, and H Wang
|
| 734 |
-
agents and heterogeneous device ecosystems often requires custom adaptations, increasing devel-
|
| 735 |
-
opment complexity. Compromised MCP servers in smart environments can lead to unauthorized
|
| 736 |
-
control over critical systems, threatening both safety and data integrity.
|
| 737 |
-
6.3 Recommendations for MCP stakeholders
|
| 738 |
-
To safeguard the long-term success and security of MCP, all stakeholders, including MCP main-
|
| 739 |
-
tainers, developers, researchers, and end-users, should implement best practices and proactively
|
| 740 |
-
address evolving challenges within the ecosystem.
|
| 741 |
-
Recommendations for MCP maintainers. MCP maintainers play a critical role in establishing
|
| 742 |
-
security standards, improving version control, and ensuring ecosystem stability. To reduce the
|
| 743 |
-
risk of security vulnerabilities, maintainers should establish a formal package management system
|
| 744 |
-
that enforces strict version control and ensures that only verified updates are distributed to users.
|
| 745 |
-
Additionally, introducing a centralized server registry would enable users to discover and validate
|
| 746 |
-
MCP servers more securely, reducing the risk of interacting with malicious or misconfigured
|
| 747 |
-
servers. To further enhance security, maintainers should promote the adoption of cryptographic
|
| 748 |
-
signatures for verifying MCP packages and encourage periodic security audits to identify and
|
| 749 |
-
mitigate vulnerabilities. Moreover, implementing a secure sandboxing framework can help prevent
|
| 750 |
-
privilege escalation and protect host environments from malicious tool executions.
|
| 751 |
-
Recommendations for developers. Developers integrating MCP into AI applications should
|
| 752 |
-
prioritize security and resilience by adhering to secure coding practices and maintaining thorough
|
| 753 |
-
documentation. Enforcing version management policies can prevent rollbacks to vulnerable versions,
|
| 754 |
-
while thorough testing ensures reliable MCP integrations before deployment. To mitigate configura-
|
| 755 |
-
tion drift, developers should automate configuration management and adopt infrastructure-as-code
|
| 756 |
-
(IaC) practices. Additionally, implementing robust tool name validation and disambiguation tech-
|
| 757 |
-
niques can prevent conflicts that lead to unintended behavior. Leveraging runtime monitoring and
|
| 758 |
-
logging helps track tool invocations, detect anomalies, and mitigate threats effectively.
|
| 759 |
-
Recommendations for researchers. Given the decentralized nature of MCP server deployment
|
| 760 |
-
and the evolving threat landscape, researchers should focus on conducting systematic security
|
| 761 |
-
analyses to uncover potential vulnerabilities in tool invocation, sandbox implementations, and
|
| 762 |
-
privilege management. Exploring techniques to enhance sandbox security, mitigate privilege
|
| 763 |
-
persistence, and prevent configuration drift can significantly strengthen MCP’s security posture. In
|
| 764 |
-
addition, researchers should investigate more effective approaches for version control and package
|
| 765 |
-
management in decentralized ecosystems to reduce the likelihood of re-deploying vulnerable
|
| 766 |
-
versions. Researchers can help MCP maintainers and developers stay ahead of emerging threats
|
| 767 |
-
by developing automated vulnerability detection methods and proposing secure update pipelines.
|
| 768 |
-
Another critical area for research is the exploration of context-aware agent orchestration in multi-
|
| 769 |
-
tool environments. As MCP increasingly supports multi-step, cross-system workflows, ensuring
|
| 770 |
-
state consistency and preventing tool invocation conflicts becomes paramount. Researchers can
|
| 771 |
-
explore techniques for dynamic state management, error recovery, and workflow validation to
|
| 772 |
-
ensure seamless operation in complex environments.
|
| 773 |
-
Recommendations for end-users. End-users should remain vigilant about security risks and
|
| 774 |
-
adopt practices to safeguard their environments. They should prioritize using verified MCP servers
|
| 775 |
-
and avoid unofficial installers that may introduce vulnerabilities. Regularly updating MCP servers
|
| 776 |
-
and monitoring configuration changes can prevent misconfigurations and reduce exposure to
|
| 777 |
-
known exploits. Properly configuring access control policies helps prevent privilege escalation
|
| 778 |
-
and unauthorized tool usage. For users relying on remote MCP servers, choosing providers that
|
| 779 |
-
follow strict security standards can minimize risks in multi-tenant environments. Promoting user
|
| 780 |
-
awareness and encouraging best practices will enhance overall security and resilience.
|
| 781 |
-
, Vol. 1, No. 1, Article . Publication date: April 2025.
|
| 782 |
-
|
| 783 |
-
--- Page 17 ---
|
| 784 |
-
Model Context Protocol (MCP): Landscape, Security Threats, and Future Research Directions 17
|
| 785 |
-
7 RELATED WORK
|
| 786 |
-
7.1 Tool Integration in LLM Applications
|
| 787 |
-
Equipping LLMs with external tools has become a key paradigm for enhancing their capabilities
|
| 788 |
-
in real-world tasks. This approach enables LLMs to transcend the limitations of static knowledge
|
| 789 |
-
and interact dynamically with external systems. Recent studies have proposed frameworks to
|
| 790 |
-
support such integration, focusing on tool representation, selection, invocation, and reasoning.
|
| 791 |
-
Shen et al.[ 44] provide a comprehensive survey outlining a standard LLM-tool integration paradigm,
|
| 792 |
-
identifying key challenges in user intent understanding, tool selection, and execution planning.
|
| 793 |
-
Building on this, AutoTools[45, 46] introduces an automated framework that transforms raw tool
|
| 794 |
-
documentation into executable functions, reducing reliance on manual engineering. EasyTool [ 59]
|
| 795 |
-
further streamlines this process by distilling diverse and verbose tool documentation into concise
|
| 796 |
-
and unified instructions, improving tool usability and efficiency. From an evaluation perspective,
|
| 797 |
-
several benchmarks have emerged. ToolSandbox [ 30] emphasizes stateful and interactive tool usage
|
| 798 |
-
with implicit dependencies, while UltraTool [ 23] focuses on complex, multi-step tasks involving
|
| 799 |
-
planning, creation, and execution. These efforts reveal significant performance gaps and motivate
|
| 800 |
-
better evaluations for LLM-agent capabilities. To improve agent decision-making and prompt
|
| 801 |
-
quality, AvaTaR [ 54] proposes contrastive reasoning techniques, while Toolken+[ 56] incorporates
|
| 802 |
-
reranking and rejection mechanisms for more precise tool use. Additionally, some works explore
|
| 803 |
-
LLMs not just as tool users but as tool creators—ToolMaker[ 53] autonomously converts code
|
| 804 |
-
repositories into callable tools, moving toward fully automated agents. To unify this expanding
|
| 805 |
-
landscape, Li [ 27] proposes a taxonomy that situates tool use alongside planning and feedback
|
| 806 |
-
learning as three core agent paradigms.
|
| 807 |
-
As tool-augmented LLMs continue to evolve, the lack of a standardized, secure, and extensible
|
| 808 |
-
context protocol has become a key bottleneck. MCP, with its potential to unify tool interaction across
|
| 809 |
-
diverse systems, is poised to become the foundational layer for next-generation LLM applications,
|
| 810 |
-
making it critical to examine its landscape, limitations, and risks.
|
| 811 |
-
7.2 Security Risks in LLM-Tool Interactions
|
| 812 |
-
The integration of tool-use capabilities into LLM agents significantly expands their functionality,
|
| 813 |
-
but also introduces new and more severe security risks. Fu et al. [ 17] demonstrate that obfuscated
|
| 814 |
-
adversarial prompts can lead LLM agents to misuse tools, enabling attacks such as data exfiltration
|
| 815 |
-
and unauthorized command execution. These vulnerabilities are particularly concerning as they
|
| 816 |
-
generalize across models and modalities. A growing body of work has begun to categorize and
|
| 817 |
-
analyze these risks. Gan et al.[ 18] and Yu et al.[ 58] propose taxonomies for threats across agent
|
| 818 |
-
components and stages, while the OWASP Agentic Security Initiative [ 25] provides practical threat
|
| 819 |
-
modeling frameworks. To support detection and mitigation, Chen et al.[ 5] introduce AgentGuard,
|
| 820 |
-
which automatically discovers unsafe workflows and generates safety constraints, and ToolFuzz[ 36]
|
| 821 |
-
identifies failures stemming from ambiguous or underspecified tool documentation. On the align-
|
| 822 |
-
ment front, Chen et al.[ 6] propose the H2A principle, which encourages LLMs to behave with
|
| 823 |
-
helpfulness, harmlessness, and autonomy, and introduce the ToolAlign dataset to guide safer tool
|
| 824 |
-
usage. Ye et al.[ 57] further analyze safety risks throughout the tool-use pipeline, including malicious
|
| 825 |
-
queries, execution misdirection, and unsafe outputs. Deng et al. [ 13] highlight broader systemic
|
| 826 |
-
risks such as unpredictable inputs, environmental variability, and untrusted tool endpoints.
|
| 827 |
-
These security threats may be mitigated through the structured design of MCP, but they can also
|
| 828 |
-
persist or even evolve under this new integration paradigm. As MCP simplifies tool orchestration
|
| 829 |
-
in LLM applications, it simultaneously introduces new potential attack surfaces, warranting deeper
|
| 830 |
-
investigation into its security implications.
|
| 831 |
-
, Vol. 1, No. 1, Article . Publication date: April 2025.
|
| 832 |
-
|
| 833 |
-
--- Page 18 ---
|
| 834 |
-
18 X Hou, Y Zhao, S Wang, and H Wang
|
| 835 |
-
8 CONCLUSION
|
| 836 |
-
This paper presents the first comprehensive analysis of the MCP ecosystem landscape. We examine
|
| 837 |
-
its architecture, core components, operational workflows, and server lifecycle stages. Furthermore,
|
| 838 |
-
we explore the adoption, diversity, and use cases, while identifying potential security threats
|
| 839 |
-
throughout the creation, operation, and update phases. We also highlight the implications and
|
| 840 |
-
risks associated with MCP adoption and propose actionable recommendations for stakeholders
|
| 841 |
-
to enhance security and governance. Additionally, we outline future research directions to tackle
|
| 842 |
-
emerging risks and improve MCP’s resilience. As MCP continues to gain traction with industry
|
| 843 |
-
leaders such as OpenAI and Cloudflare, addressing these challenges is key to its long-term success
|
| 844 |
-
and to enabling secure, efficient interaction with diverse external tools and services.
|
| 845 |
-
REFERENCES
|
| 846 |
-
[1]ahujasid. 2025. BlenderMCP - Blender Model Context Protocol Integration. https://github.com/ahujasid/blender-mcp.
|
| 847 |
-
[2] Anthropic. 2024. For Claude Desktop Users. https://modelcontextprotocol.io/quickstart/user.
|
| 848 |
-
[3]Anthropic. 2024. Introducing the Model Context Protocol. https://www.anthropic.com/news/model-context-protocol.
|
| 849 |
-
[4] ByteDance. 2024. Coze plugin store. https://www.coze.com/store/plugin.
|
| 850 |
-
[5]Jizhou Chen and Samuel Lee Cong. 2025. AgentGuard: Repurposing Agentic Orchestrator for Safety Evaluation of
|
| 851 |
-
Tool Orchestration. CoRR abs/2502.09809 (2025). https://doi.org/10.48550/ARXIV.2502.09809 arXiv:2502.09809
|
| 852 |
-
[6]Zhi-Yuan Chen, Shiqi Shen, Guangyao Shen, Gong Zhi, Xu Chen, and Yankai Lin. 2024. Towards Tool Use Alignment
|
| 853 |
-
of Large Language Models. In Proceedings of the 2024 Conference on Empirical Methods in Natural Language Processing .
|
| 854 |
-
1382–1400.
|
| 855 |
-
[7] Cline. 2025. Cline. https://github.com/cline/cline.
|
| 856 |
-
[8] Cloudflare. 2025. Cloudflare. https://www.cloudflare.com.
|
| 857 |
-
[9] Codeium. 2025. Codeium. https://codeium.com.
|
| 858 |
-
[10] Sourcegraph Cody. 2025. Cody supports additional context through Anthropic’s Model Context Protocol. https:
|
| 859 |
-
//sourcegraph.com/blog/cody-supports-anthropic-model-context-protocol.
|
| 860 |
-
[11] Florin Cuconasu, Giovanni Trappolini, Federico Siciliano, Simone Filice, Cesare Campagnano, Yoelle Maarek, Nicola
|
| 861 |
-
Tonellotto, and Fabrizio Silvestri. 2024. The Power of Noise: Redefining Retrieval for RAG Systems. CoRR abs/2401.14887
|
| 862 |
-
(2024). https://doi.org/10.48550/ARXIV.2401.14887 arXiv:2401.14887
|
| 863 |
-
[12] Cursor. 2025. Learn how to add and use custom MCP tools within Cursor. https://docs.cursor.com/context/model-
|
| 864 |
-
context-protocol.
|
| 865 |
-
[13] Zehang Deng, Yongjian Guo, Changzhou Han, Wanlun Ma, Junwu Xiong, Sheng Wen, and Yang Xiang. 2024. AI
|
| 866 |
-
Agents Under Threat: A Survey of Key Security Challenges and Future Pathways. CoRR abs/2406.02630 (2024).
|
| 867 |
-
https://doi.org/10.48550/ARXIV.2406.02630 arXiv:2406.02630
|
| 868 |
-
[14] Windsurf Editor. 2025. Windsurf Editor. https://windsurf.com.
|
| 869 |
-
[15] Antanavicius et al. 2025. PulseMCP. https://www.pulsemcp.com.
|
| 870 |
-
[16] Wenqi Fan, Yujuan Ding, Liangbo Ning, Shijie Wang, Hengyun Li, Dawei Yin, Tat-Seng Chua, and Qing Li. 2024. A
|
| 871 |
-
Survey on RAG Meeting LLMs: Towards Retrieval-Augmented Large Language Models. In Proceedings of the 30th ACM
|
| 872 |
-
SIGKDD Conference on Knowledge Discovery and Data Mining, KDD 2024, Barcelona, Spain, August 25-29, 2024 , Ricardo
|
| 873 |
-
Baeza-Yates and Francesco Bonchi (Eds.). ACM, 6491–6501. https://doi.org/10.1145/3637528.3671470
|
| 874 |
-
[17] Xiaohan Fu, Shuheng Li, Zihan Wang, Yihao Liu, Rajesh K. Gupta, Taylor Berg-Kirkpatrick, and Earlence Fernandes.
|
| 875 |
-
2024. Imprompter: Tricking LLM Agents into Improper Tool Use. CoRR abs/2410.14923 (2024). https://doi.org/10.
|
| 876 |
-
48550/ARXIV.2410.14923 arXiv:2410.14923
|
| 877 |
-
[18] Yuyou Gan, Yong Yang, Zhe Ma, Ping He, Rui Zeng, Yiming Wang, Qingming Li, Chunyi Zhou, Songze Li, Ting Wang,
|
| 878 |
-
Yunjun Gao, Yingcai Wu, and Shouling Ji. 2024. Navigating the Risks: A Survey of Security, Privacy, and Ethics Threats
|
| 879 |
-
in LLM-Based Agents. CoRR abs/2411.09523 (2024). https://doi.org/10.48550/ARXIV.2411.09523 arXiv:2411.09523
|
| 880 |
-
[19] gching. 2025. Toolbase. https://gettoolbase.ai.
|
| 881 |
-
[20] glama.ai. 2025. Glama MCP Servers. https://glama.ai/mcp/servers.
|
| 882 |
-
[21] Goose. 2025. Goose. https://goose.ai.
|
| 883 |
-
[22] Nadeeshaan Gunasinghe and Nipuna Marcus. 2021. Language Server Protocol and Implementation . Springer.
|
| 884 |
-
[23] Shijue Huang, Wanjun Zhong, Jianqiao Lu, Qi Zhu, Jiahui Gao, Weiwen Liu, Yutai Hou, Xingshan Zeng, Yasheng
|
| 885 |
-
Wang, Lifeng Shang, Xin Jiang, Ruifeng Xu, and Qun Liu. 2024. Planning, Creation, Usage: Benchmarking LLMs for
|
| 886 |
-
Comprehensive Tool Utilization in Real-World Complex Scenarios. CoRR abs/2401.17167 (2024). https://doi.org/10.
|
| 887 |
-
48550/ARXIV.2401.17167 arXiv:2401.17167
|
| 888 |
-
, Vol. 1, No. 1, Article . Publication date: April 2025.
|
| 889 |
-
|
| 890 |
-
--- Page 19 ---
|
| 891 |
-
Model Context Protocol (MCP): Landscape, Security Threats, and Future Research Directions 19
|
| 892 |
-
[24] JetBrains. 2025. JetBrains MCP Server. https://plugins.jetbrains.com/plugin/26071-mcp-server.
|
| 893 |
-
[25] Sotiropoulos John, Rosario Ron F Del, Kokuykin Evgeniy, Oakley Helen, Habler Idan, Underkoffler Kayla, Huang Ken,
|
| 894 |
-
Steffensen Peter, Aralimatti Rakshith, Bitton Ron, et al .2025. OWASP Top 10 for LLM Apps & Gen AI Agentic Security
|
| 895 |
-
Initiative . Ph. D. Dissertation. OWASP.
|
| 896 |
-
[26] LangChain. 2022. LangChain: Framework for developing applications powered by language models. https://github.
|
| 897 |
-
com/langchain-ai/langchain.
|
| 898 |
-
[27] Xinzhe Li. 2025. A Review of Prominent Paradigms for LLM-Based Agents: Tool Use, Planning (Including RAG),
|
| 899 |
-
and Feedback Learning. In Proceedings of the 31st International Conference on Computational Linguistics, COLING
|
| 900 |
-
2025, Abu Dhabi, UAE, January 19-24, 2025 , Owen Rambow, Leo Wanner, Marianna Apidianaki, Hend Al-Khalifa,
|
| 901 |
-
Barbara Di Eugenio, and Steven Schockaert (Eds.). Association for Computational Linguistics, 9760–9779. https:
|
| 902 |
-
//aclanthology.org/2025.coling-main.652/
|
| 903 |
-
[28] LibreChat. 2025. LibreChat. https://librechat.ai.
|
| 904 |
-
[29] Jerry Liu. 2022. LlamaIndex: A data framework for LLM applications. https://github.com/run-llama/llama_index.
|
| 905 |
-
[30] Jiarui Lu, Thomas Holleis, Yizhe Zhang, Bernhard Aumayer, Feng Nan, Felix Bai, Shuang Ma, Shen Ma, Mengyu Li,
|
| 906 |
-
Guoli Yin, Zirui Wang, and Ruoming Pang. 2024. ToolSandbox: A Stateful, Conversational, Interactive Evaluation
|
| 907 |
-
Benchmark for LLM Tool Use Capabilities. CoRR abs/2408.04682 (2024). https://doi.org/10.48550/ARXIV.2408.04682
|
| 908 |
-
arXiv:2408.04682
|
| 909 |
-
[31] Baidu Maps. 2025. Baidu Maps MCP Servers. https://lbs.baidu.com/faq/api?title=mcpserver/base.
|
| 910 |
-
[32] Emacs MCP. 2025. Emacs MCP. https://github.com/lizqwerscott/mcp.el.
|
| 911 |
-
[33] Tripo3D MCP. 2025. Tripo3D MCP. https://blender-mcp.com/.
|
| 912 |
-
[34] mcp dockmater. 2025. Dockmaster. https://mcp-dockmaster.com.
|
| 913 |
-
[35] mcp.so. 2025. MCP.so. https://mcp.so/.
|
| 914 |
-
[36] Ivan Milev, Mislav Balunović, Maximilian Baader, and Martin Vechev. 2025. ToolFuzz–Automated Agent Tool Testing.
|
| 915 |
-
arXiv preprint arXiv:2503.04479 (2025).
|
| 916 |
-
[37] OpenAI. 2023. ChatGPT plugins. https://openai.com/index/chatgpt-plugins/.
|
| 917 |
-
[38] OpenAI. 2023. Funcation Calling. https://platform.openai.com/docs/guides/function-calling?api-mode=responses.
|
| 918 |
-
[39] OpenAI. 2025. OpenAI Agents SDK - Model context protocol (MCP). https://openai.github.io/openai-agents-python/
|
| 919 |
-
mcp/.
|
| 920 |
-
[40] OpenSumi. 2025. OpenSumi. https://github.com/opensumi/core.
|
| 921 |
-
[41] Model Context Protocol. 2024. GitHub MCP Server. https://github.com/modelcontextprotocol/servers/tree/main/src/
|
| 922 |
-
github.
|
| 923 |
-
[42] Model Context Protocol. 2024. Slack MCP Server. https://github.com/modelcontextprotocol/servers/tree/main/src/
|
| 924 |
-
slack.
|
| 925 |
-
[43] Replit. 2025. Replit. https://replit.com.
|
| 926 |
-
[44] Zhuocheng Shen. 2024. LLM With Tools: A Survey. CoRR abs/2409.18807 (2024). https://doi.org/10.48550/ARXIV.2409.
|
| 927 |
-
18807 arXiv:2409.18807
|
| 928 |
-
[45] Zhengliang Shi, Shen Gao, Xiuyi Chen, Yue Feng, Lingyong Yan, Haibo Shi, Dawei Yin, Zhumin Chen, Suzan Ver-
|
| 929 |
-
berne, and Zhaochun Ren. 2024. Chain of Tools: Large Language Model is an Automatic Multi-tool Learner. CoRR
|
| 930 |
-
abs/2405.16533 (2024). https://doi.org/10.48550/ARXIV.2405.16533 arXiv:2405.16533
|
| 931 |
-
[46] Zhengliang Shi, Shen Gao, Lingyong Yan, Yue Feng, Xiuyi Chen, Zhumin Chen, Dawei Yin, Suzan Verberne, and
|
| 932 |
-
Zhaochun Ren. 2025. Tool Learning in the Wild: Empowering Language Models as Automatic Tool Agents. In THE
|
| 933 |
-
WEB CONFERENCE 2025 . https://openreview.net/forum?id=T4wMdeFEjX
|
| 934 |
-
[47] Block (Square). 2025. Block (Square). https://glama.ai/mcp/servers/atblock/square-mcp/tools/team.
|
| 935 |
-
[48] Stripe. 2025. Stripe. https://stripe.com.
|
| 936 |
-
[49] Microsoft Copilot Studio. 2025. Introducing Model Context Protocol (MCP) in Copilot Studio: Simplified Integration
|
| 937 |
-
with AI Apps and Agents. https://www.microsoft.com/en-us/microsoft-copilot/blog/copilot-studio/introducing-model-
|
| 938 |
-
context-protocol-mcp-in-copilot-studio-simplified-integration-with-ai-apps-and-agents/.
|
| 939 |
-
[50] Tencent. 2024. Tencent plugin shop. https://yuanqi.tencent.com/plugin-shop.
|
| 940 |
-
[51] Apify MCP Tester. 2025. Apify MCP Tester. https://apify.com/jiri.spilka/tester-mcp-client.
|
| 941 |
-
[52] TheiaAI/TheiaIDE. 2025. TheiaAI/TheiaIDE. https://theia-ide.org/docs/user_ai/.
|
| 942 |
-
[53] Georg Wölflein, Dyke Ferber, Daniel Truhn, Ognjen Arandjelovic, and Jakob Nikolas Kather. 2025. LLM Agents Making
|
| 943 |
-
Agent Tools. CoRR abs/2502.11705 (2025). https://doi.org/10.48550/ARXIV.2502.11705 arXiv:2502.11705
|
| 944 |
-
[54] Shirley Wu, Shiyu Zhao, Qian Huang, Kexin Huang, Michihiro Yasunaga, Kaidi Cao, Vassilis N. Ioannidis, Karthik
|
| 945 |
-
Subbian, Jure Leskovec, and James Y. Zou. 2024. AvaTaR: Optimizing LLM Agents for Tool Usage via Contrastive
|
| 946 |
-
Reasoning. In Advances in Neural Information Processing Systems 38: Annual Conference on Neural Information Processing
|
| 947 |
-
Systems 2024, NeurIPS 2024, Vancouver, BC, Canada, December 10 - 15, 2024 , Amir Globersons, Lester Mackey, Danielle
|
| 948 |
-
Belgrave, Angela Fan, Ulrich Paquet, Jakub M. Tomczak, and Cheng Zhang (Eds.). http://papers.nips.cc/paper_files/
|
| 949 |
-
, Vol. 1, No. 1, Article . Publication date: April 2025.
|
| 950 |
-
|
| 951 |
-
--- Page 20 ---
|
| 952 |
-
20 X Hou, Y Zhao, S Wang, and H Wang
|
| 953 |
-
paper/2024/hash/2db8ce969b000fe0b3fb172490c33ce8-Abstract-Conference.html
|
| 954 |
-
[55] Zhiheng Xi, Wenxiang Chen, Xin Guo, Wei He, Yiwen Ding, Boyang Hong, Ming Zhang, Junzhe Wang, Senjie Jin,
|
| 955 |
-
Enyu Zhou, Rui Zheng, Xiaoran Fan, Xiao Wang, Limao Xiong, Yuhao Zhou, Weiran Wang, Changhao Jiang, Yicheng
|
| 956 |
-
Zou, Xiangyang Liu, Zhangyue Yin, Shihan Dou, Rongxiang Weng, Wensen Cheng, Qi Zhang, Wenjuan Qin, Yongyan
|
| 957 |
-
Zheng, Xipeng Qiu, Xuanjing Huang, and Tao Gui. 2023. The Rise and Potential of Large Language Model Based
|
| 958 |
-
Agents: A Survey. CoRR abs/2309.07864 (2023). https://doi.org/10.48550/ARXIV.2309.07864 arXiv:2309.07864
|
| 959 |
-
[56] Konstantin Yakovlev, Sergey I. Nikolenko, and Andrey Bout. 2024. Toolken+: Improving LLM Tool Usage with Reranking
|
| 960 |
-
and a Reject Option. CoRR abs/2410.12004 (2024). https://doi.org/10.48550/ARXIV.2410.12004 arXiv:2410.12004
|
| 961 |
-
[57] Junjie Ye, Sixian Li, Guanyu Li, Caishuang Huang, Songyang Gao, Yilong Wu, Qi Zhang, Tao Gui, and Xuanjing Huang.
|
| 962 |
-
2024. ToolSword: Unveiling Safety Issues of Large Language Models in Tool Learning Across Three Stages. CoRR
|
| 963 |
-
abs/2402.10753 (2024). https://doi.org/10.48550/ARXIV.2402.10753 arXiv:2402.10753
|
| 964 |
-
[58] Miao Yu, Fanci Meng, Xinyun Zhou, Shilong Wang, Junyuan Mao, Linsey Pang, Tianlong Chen, Kun Wang, Xinfeng
|
| 965 |
-
Li, Yongfeng Zhang, et al .2025. A Survey on Trustworthy LLM Agents: Threats and Countermeasures. arXiv preprint
|
| 966 |
-
arXiv:2503.09648 (2025).
|
| 967 |
-
[59] Siyu Yuan, Kaitao Song, Jiangjie Chen, Xu Tan, Yongliang Shen, Kan Ren, Dongsheng Li, and Deqing Yang. 2024.
|
| 968 |
-
EASYTOOL: Enhancing LLM-based Agents with Concise Tool Instruction. CoRR abs/2401.06201 (2024). https:
|
| 969 |
-
//doi.org/10.48550/ARXIV.2401.06201 arXiv:2401.06201
|
| 970 |
-
[60] Zed. 2025. Zed - Model Context Protocol. https://zed.dev/docs/assistant/model-context-protocol.
|
| 971 |
-
[61] Mingming Zha, Jice Wang, Yuhong Nan, Xiaofeng Wang, Yuqing Zhang, and Zelin Yang. 2022. Hazard Integrated:
|
| 972 |
-
Understanding Security Risks in App Extensions to Team Chat Systems. In 29th Annual Network and Distributed System
|
| 973 |
-
Security Symposium, NDSS 2022, San Diego, California, USA, April 24-28, 2022 . The Internet Society. https://www.ndss-
|
| 974 |
-
symposium.org/ndss-paper/auto-draft-262/
|
| 975 |
-
[62] Yanjie Zhao, Xinyi Hou, Shenao Wang, and Haoyu Wang. 2024. LLM App Store Analysis: A Vision and Roadmap.
|
| 976 |
-
CoRR abs/2404.12737 (2024). https://doi.org/10.48550/ARXIV.2404.12737 arXiv:2404.12737
|
| 977 |
-
, Vol. 1, No. 1, Article . Publication date: April 2025.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
data/documents/content/b3d0767c-1dd8-4f05-a9f8-d69d82f2abde.txt
DELETED
|
@@ -1,1137 +0,0 @@
|
|
| 1 |
-
--- Page 1 ---
|
| 2 |
-
A Study on the MCP × A2A Framework for Enhancing
|
| 3 |
-
Interoperability of LLM -based Autonomous Agents
|
| 4 |
-
Cheonsu Jeong
|
| 5 |
-
Hyper Automation Team, SAMSUNG SDS, Seoul , 05510 , South Korea
|
| 6 |
-
|
| 7 |
-
|
| 8 |
-
I. INTRODUCTION
|
| 9 |
-
ECENT advancements in artificial intelligence (AI) have highlighted
|
| 10 |
-
the importance of large language models (LLMs) across various
|
| 11 |
-
domains [1]. Generative AI, which can create new content such as text,
|
| 12 |
-
images, audio, and video based on extensive training data, en ables
|
| 13 |
-
users to leverage AI services with ease [1],[2]. In particular, the
|
| 14 |
-
development of AI has led to a growing utilization of autonomous
|
| 15 |
-
agents —AI systems capable of independently performing tasks,
|
| 16 |
-
solving problems, and supporting decision -making based o n user
|
| 17 |
-
inputs. However, complex real -world problems often exceed the
|
| 18 |
-
capabilities of a single agent. This has given rise to the necessity of
|
| 19 |
-
multi -agent systems (MAS), where multiple agents collaborate to
|
| 20 |
-
overcome such limitations. With the emergence of LL Ms, LLM -based
|
| 21 |
-
MASs have gained attention as a new paradigm [4]. Unlike traditional
|
| 22 |
-
MASs, these systems enable more flexible and adaptive collaboration
|
| 23 |
-
through natural language processing. Each agent can specialize in a
|
| 24 |
-
specific domain while coordinating co mplex tasks through natural
|
| 25 |
-
language interaction [5].
|
| 26 |
-
For agents to be effectively utilized in real -world environments,
|
| 27 |
-
seamless integration with external tools, APIs, and databa ses is
|
| 28 |
-
critical. To address this, Anthropic released the Model Context
|
| 29 |
-
Protocol (MCP) as open source in November 2024 [6]. Similarly,
|
| 30 |
-
efficient communication and collaboration among agents is a
|
| 31 |
-
prerequisite for successful MAS deployment. However, agent sys tems
|
| 32 |
-
developed by different frameworks and vendors have faced
|
| 33 |
-
interoperability limitations. To resolve this, Google released the
|
| 34 |
-
Agent -to-Agent (A2A) protocol as an open source project in April 2025
|
| 35 |
-
[7]. A2A provides a standardized communication framework for
|
| 36 |
-
agents to collaborate across different environments, while MCP
|
| 37 |
-
offers a structured I/O system that enables agents to interact with external tools and resources [8]. Although these protocols function
|
| 38 |
-
independently, they serve complementary roles and for m a
|
| 39 |
-
foundational basis for building practical agent ecosystems.
|
| 40 |
-
This paper analyzes the technical architecture and operational
|
| 41 |
-
principles of A2A and MCP, exploring how they synergistically
|
| 42 |
-
contribute to constructing scalable and interoperable agent
|
| 43 |
-
ecosystems. By presenting an integrated architecture using
|
| 44 |
-
LangGraph an d detailing key implementation logic, we demonstrate
|
| 45 |
-
how theoretical concepts are translated into real -world applications.
|
| 46 |
-
Through this combined use of A2A and MCP, we propose a practical
|
| 47 |
-
approach to enhancing interoperability and development efficiency
|
| 48 |
-
of LLM-based agent systems across various enterprise environments,
|
| 49 |
-
thereby unlocking the potential to transition agent technologies from
|
| 50 |
-
experimental stages to fully deployed services.
|
| 51 |
-
II. RELATED WORK
|
| 52 |
-
A. Concept and Evolution of Autonomous Agents
|
| 53 |
-
An automation age nt refers to more than just a task executor —it
|
| 54 |
-
is an intelligent software robot that integrates AI technologies to
|
| 55 |
-
perceive complex situations, analyze data, interact with users, and
|
| 56 |
-
even improve its performance through learning [9]. Autonomous
|
| 57 |
-
agents are systems that perceive their environment, autonomously
|
| 58 |
-
set goals or formulate plans to achieve predefined objectives, and
|
| 59 |
-
make decisions and act independently by learning and adapting [10],
|
| 60 |
-
[11]. These agents can respond flexibly to unpredictable or dynamic
|
| 61 |
-
environments, solving problems on their own as needed. The recent
|
| 62 |
-
advancement of large language models (LLMs) has significantly
|
| 63 |
-
expanded the capabilities and application areas of autonomous
|
| 64 |
-
agents. They are now widely used in information retrieval, data
|
| 65 |
-
analysis, decision support, and task automation, and are increasingly
|
| 66 |
-
being adopted as productivity tools in enterprise environments.
|
| 67 |
-
Autonomous agents possess several key characteristics, as
|
| 68 |
-
summarized in Table 1: R ABSTRACT
|
| 69 |
-
This paper provides an in -depth technical analysis and implementation methodology of the open -source
|
| 70 |
-
Agent -to-Agent (A2A) protocol developed by Google and the Model Context Protocol (MCP) introduced by
|
| 71 |
-
Anthropic. While the evolution of LLM -based autonomous agents is rapidly accelerating, efficient interactions
|
| 72 |
-
among these agents and their integration with external systems remain significant challenges. In modern AI
|
| 73 |
-
systems, collaboration between autonomous agents and integration with external tool s have become
|
| 74 |
-
essential elements for building practical AI applications. A2A offers a standardized communication method
|
| 75 |
-
that enables agents developed in heterogeneous environments to collaborate effectively, while MCP provides
|
| 76 |
-
a structured I/O framework fo r agents to connect with external tools and resources. Prior studies have focused
|
| 77 |
-
primarily on the features and applications of either A2A or MCP individually. In contrast, this study takes an
|
| 78 |
-
integrated approach, exploring how the two protocols can comple ment each other to address interoperability
|
| 79 |
-
issues and facilitate efficient collaboration within complex agent ecosystems. KEYWORDS
|
| 80 |
-
Agent -to-Agent (A2A),
|
| 81 |
-
Model Context Protocol
|
| 82 |
-
(MCP), Multi -Agent
|
| 83 |
-
System ( MAS),
|
| 84 |
-
Autonomous Agent,
|
| 85 |
-
Agent Collaboration.
|
| 86 |
-
* Corresponding authors:
|
| 87 |
-
E-mail address: csu.jeong@samsung.com (C . Jeong).
|
| 88 |
-
|
| 89 |
-
--- Page 2 ---
|
| 90 |
-
|
| 91 |
-
TABLE I. KEY CHARACTERISTICS OF AUTONOMOU S AGENTS
|
| 92 |
-
Item Description
|
| 93 |
-
Autonomy The ability to operate independently without
|
| 94 |
-
external intervention.
|
| 95 |
-
Goal -Oriented The ability to formulate and execute plans to
|
| 96 |
-
achieve specific objectives.
|
| 97 |
-
Adaptability The capability to adjust behavior in response to
|
| 98 |
-
environmental changes.
|
| 99 |
-
Social Ability The ability to interact with other agents or
|
| 100 |
-
users.
|
| 101 |
-
|
| 102 |
-
However, due to constraints in knowledge, functionality, and
|
| 103 |
-
resources, a single agent often faces limitations in solving complex
|
| 104 |
-
problems. To overcome these limitations, Multi -Agent Systems (MAS)
|
| 105 |
-
have emerged, where multiple agents collaborate toward a shared
|
| 106 |
-
goal.
|
| 107 |
-
|
| 108 |
-
B. Necessity of Multi -Agent Systems (MAS)
|
| 109 |
-
A MAS is a framework in which multiple autonomous agents
|
| 110 |
-
collaborate to solve complex problems. Each agent is assigned a
|
| 111 |
-
specific role and area of expertise, and their cooperation enables the
|
| 112 |
-
resolution of problems that would be infeasible for a single age nt
|
| 113 |
-
alone [1].
|
| 114 |
-
The main advantages of MAS include:
|
| 115 |
-
1. Distributed Problem Solving: Complex problems are
|
| 116 |
-
decomposed into sub -problems, with each agent addressing a
|
| 117 |
-
specific domain.
|
| 118 |
-
2. Scalability: System functionality can be expanded by adding or
|
| 119 |
-
modifying agents.
|
| 120 |
-
3. Robustness: System functionality is maintained even if some
|
| 121 |
-
agents fail.
|
| 122 |
-
4. Diverse Perspectives: Agents with different expertise analyze
|
| 123 |
-
problems from varied angles.
|
| 124 |
-
|
| 125 |
-
However, effe ctive MAS operation requires seamless
|
| 126 |
-
communication and collaboration among agents, necessitating
|
| 127 |
-
standardized communication protocols and collaboration
|
| 128 |
-
mechanisms.
|
| 129 |
-
|
| 130 |
-
C. Importance of Agent Communication Protocols
|
| 131 |
-
Agent communication protocols define how agent s exchange
|
| 132 |
-
messages, including the format, communication rules, and semantic
|
| 133 |
-
interpretation. Communication is fundamental to MAS, enabling
|
| 134 |
-
autonomous entities to coordinate and collaborate in solving complex
|
| 135 |
-
problems [12].
|
| 136 |
-
An effective communication proto col must satisfy the following
|
| 137 |
-
requirements:
|
| 138 |
-
1. Interoperability: Support communication between agents
|
| 139 |
-
developed on different platforms and frameworks.
|
| 140 |
-
2. Extensibility: Accommodate new functions and requirements.
|
| 141 |
-
3. Security: Provide mechanisms for secu re communication.
|
| 142 |
-
4. Efficiency: Minimize communication overhead and support
|
| 143 |
-
efficient message exchange.
|
| 144 |
-
5. Standardization: Offer standardized formats and rules for
|
| 145 |
-
broad adoption.
|
| 146 |
-
Fig. 1 . Integrated Implementation Architecture Concept
|
| 147 |
-
|
| 148 |
-
D. Technical Analysis of the A2A Protocol
|
| 149 |
-
1. Concept and Structure of A2A Protocol
|
| 150 |
-
Only two levels of headings should be numbered. Lower level
|
| 151 |
-
headings remain unnumbered; they are formatted as run -in headings.
|
| 152 |
-
The A2A protocol is a standardized communication framework
|
| 153 |
-
designed to enable effective collaboration among autonomous
|
| 154 |
-
agents developed in diverse environments. Released as open -source
|
| 155 |
-
by Google, it abstracts the complexity of agent communication and
|
| 156 |
-
provides a consistent interface to ensure interoperability [8].
|
| 157 |
-
|
| 158 |
-
Fig. 2 . Open Standard A2A Protocol Concept Diagram [7]
|
| 159 |
-
|
| 160 |
-
The core structure of the A2A protocol consists of:
|
| 161 |
-
1. Agent Card: Metadata in JSON format specifying an agent’s
|
| 162 |
-
functions, roles, and capabilities, enabling other agents to
|
| 163 |
-
discover and determine appropriate collaboration methods.
|
| 164 |
-
2. Message Format: Defines a structured format for agent
|
| 165 |
-
communication, including headers, body, and parts, supporting
|
| 166 |
-
various content types (text, images, structured data).
|
| 167 |
-
3. Task Management: Adopts a task -based communi cation model,
|
| 168 |
-
tracking task status, progress, and outcomes.
|
| 169 |
-
4. Artifacts: Standardized data structures representing task
|
| 170 |
-
outcomes, such as documents, code, or images.
|
| 171 |
-
The A2A protocol achieves loose coupling and high cohesion,
|
| 172 |
-
enhancing the flexibility and scalability of agent systems.
|
| 173 |
-
2. Core Functions of the A2A Protocol
|
| 174 |
-
A2A supports a range of core functionalities that enable
|
| 175 |
-
collaborative operations among agents:
|
| 176 |
-
|
| 177 |
-
|
| 178 |
-
--- Page 3 ---
|
| 179 |
-
|
| 180 |
-
1. Capability Discovery: Agents advertise their capabilities using
|
| 181 |
-
an “Agent Card” in JSON for mat. This mechanism functions
|
| 182 |
-
similarly to service registries in Service -Oriented Architecture
|
| 183 |
-
(SOA), allowing for dynamic discovery and coordination [8].
|
| 184 |
-
Each Agent Card includes essential information such as agent ID,
|
| 185 |
-
name, description, supported functio ns, input/output formats,
|
| 186 |
-
authentication requirements, and version information. This
|
| 187 |
-
mechanism supports dynamic expansion of the agent
|
| 188 |
-
ecosystem, enabling existing agents to recognize and
|
| 189 |
-
collaborate with newly added agents automatically.
|
| 190 |
-
2. Task and State Management: A2A structures agent
|
| 191 |
-
communication around tasks, each with a unique identifier and
|
| 192 |
-
life cycle states (e.g., created, in -progress, completed, failed).
|
| 193 |
-
Results are returned as standardized artifacts [8]. This task -
|
| 194 |
-
oriented design supports asynch ronous processing, real -time
|
| 195 |
-
monitoring, task interruption and resumption, and consistent
|
| 196 |
-
handling of results. It facilitates coordination in complex
|
| 197 |
-
collaboration scenarios and provides a foundation for recovery
|
| 198 |
-
strategies in case of failure.
|
| 199 |
-
3. Secure Co llaboration: A2A includes mechanisms to ensure
|
| 200 |
-
secure communication between agents. It supports enterprise -
|
| 201 |
-
grade authentication and OpenAPI -based authorization,
|
| 202 |
-
enabling safe exchanges of context, responses, artifacts, and
|
| 203 |
-
user directives [8], [13], [14]. Key security elements include
|
| 204 |
-
authentication, authorization, encryption, access control, and
|
| 205 |
-
audit trails. These features allow for secure inter -agent
|
| 206 |
-
communication while maintaining data protection, which is
|
| 207 |
-
essential for enterprise use cases.
|
| 208 |
-
4. User Exp erience Negotiation: Each A2A message can include
|
| 209 |
-
fully composed “parts” that represent complete content
|
| 210 |
-
blocks —such as formatted text, images, or interactive elements.
|
| 211 |
-
The protocol supports negotiation for user interface elements,
|
| 212 |
-
enhancing user experienc e consistency across different clients
|
| 213 |
-
[8]. This feature provides benefits such as multimodal content
|
| 214 |
-
support, consistent UX delivery, adaptation to various client
|
| 215 |
-
environments, and standardized representation of interactive
|
| 216 |
-
content. It ensures consistent rendering of agent -generated
|
| 217 |
-
content across interfaces.
|
| 218 |
-
3. Technical Advantages of the A2A Protocol
|
| 219 |
-
The A2A protocol provides the following technical advantages:
|
| 220 |
-
1. Standardized Communication: Standardizes communication
|
| 221 |
-
among agents developed in different frameworks and vendors,
|
| 222 |
-
ensuring interoperability [8], [13].
|
| 223 |
-
2. Loose Coupling: Agents can collaborate without knowledge of
|
| 224 |
-
each other’s internal implementation, enhancing system
|
| 225 |
-
flexibility and scalability.
|
| 226 |
-
3. Dynamic Discovery: Dynamic capability discovery through
|
| 227 |
-
agent cards enables easy integration of new agents and
|
| 228 |
-
functionaliti es.
|
| 229 |
-
4. Multimodal Communication: Supports exchange of various
|
| 230 |
-
types of content, including text, images, and structured data.
|
| 231 |
-
5. Extensible Design: JSON -based message format and modular
|
| 232 |
-
structure allow easy accommodation of new requirements and
|
| 233 |
-
functionalit ies.
|
| 234 |
-
6. Enterprise Support: Provides essential security features such as
|
| 235 |
-
authentication, authorization, and auditing for enterprise
|
| 236 |
-
environments.
|
| 237 |
-
These technical advantages significantly reduce the development
|
| 238 |
-
and deployment costs of agent systems and impr ove collaboration efficiency among diverse agents.
|
| 239 |
-
|
| 240 |
-
E. Technical Analysis of the Model Context Protocol (MCP)
|
| 241 |
-
1. Concept and Structure of MCP
|
| 242 |
-
The MCP is a standardized protocol designed to enable AI agents
|
| 243 |
-
to connect effectively with external tools, APIs, and re sources [14]. As
|
| 244 |
-
a core component enhancing agent practicality, MCP establishes a
|
| 245 |
-
structured input/output framework that facilitates seamless
|
| 246 |
-
interactions between agents and diverse external resources [8].
|
| 247 |
-
The primary structural elements of MCP include:
|
| 248 |
-
1. Context Definition: Specifies the context in which the agent
|
| 249 |
-
interacts with external tools, including tool functionalities, input
|
| 250 |
-
parameters, and output formats.
|
| 251 |
-
2. Schema -Based Interface: Uses JSON Schema to clearly
|
| 252 |
-
define the input and output types for each tool. This allows the agent
|
| 253 |
-
to understand the tool’s interface and provide appropriate input.
|
| 254 |
-
3. Function Calling Mechanism: Provides a standardized
|
| 255 |
-
mechanism for agents to invoke external tool functions and retrieve
|
| 256 |
-
their results.
|
| 257 |
-
4. State Management : Maintains state information during tool
|
| 258 |
-
usage, supporting complex multi -step interactions.
|
| 259 |
-
The structure of MCP balances clearly defined boundaries between
|
| 260 |
-
agents and tools with the flexibility necessary for dynamic interaction.
|
| 261 |
-
|
| 262 |
-
2. Concept and Structure of MCP
|
| 263 |
-
MCP provides various core functions for agents to interact
|
| 264 |
-
effectively with external tools:
|
| 265 |
-
1. Tool Discovery and Description: MCP provides a mechanism to
|
| 266 |
-
clearly describe tool functionality and usage. This is achieved
|
| 267 |
-
through JSON schema -based tool d escriptions, which include
|
| 268 |
-
tool name and description, list of supported functions, input
|
| 269 |
-
parameters and types, output formats and types, examples, and
|
| 270 |
-
usage instructions [8]. This tool discovery mechanism enables
|
| 271 |
-
agents to dynamically discover available to ols and select
|
| 272 |
-
appropriate tools to perform tasks.
|
| 273 |
-
2. Function Calling and Result Handling: MCP provides a
|
| 274 |
-
standardized way for agents to call functions of external tools
|
| 275 |
-
and handle results. This process consists of the following steps
|
| 276 |
-
[8]:
|
| 277 |
-
─ Function Selection: The agent analyzes the user’s request
|
| 278 |
-
and selects an appropriate function.
|
| 279 |
-
─ Parameter Construction: The agent constructs the
|
| 280 |
-
parameters required for function execution.
|
| 281 |
-
─ Function Call: The agent calls the function with the
|
| 282 |
-
constructed paramete rs.
|
| 283 |
-
─ Result Reception: The agent receives the result of the
|
| 284 |
-
function execution.
|
| 285 |
-
─ Result Interpretation: The agent interprets the received
|
| 286 |
-
result and provides it to the user or uses it for subsequent
|
| 287 |
-
tasks.
|
| 288 |
-
This function calling mechanism enables agents t o utilize
|
| 289 |
-
various external tools an d APIs to perform actual tasks.
|
| 290 |
-
|
| 291 |
-
--- Page 4 ---
|
| 292 |
-
|
| 293 |
-
3. Context Management: MCP provides functions to effectively
|
| 294 |
-
manage context during interaction between agents and tools.
|
| 295 |
-
This includes session management, state tracking, context
|
| 296 |
-
propagation, and memory management [8]. These context
|
| 297 |
-
management functions enable agents to maintain consistent
|
| 298 |
-
state and interact with tools during complex multi -step tasks.
|
| 299 |
-
4. Error Handling and Recovery: MCP provides mechanisms to
|
| 300 |
-
handle and recover from errors that may occur during tool
|
| 301 |
-
usage. This includes standardization of error codes and
|
| 302 |
-
messages, retry strategies, fallback paths, and graceful
|
| 303 |
-
degradation [8]. These error handling mechanisms enable
|
| 304 |
-
agents to operate robustly even in unexpected situations.
|
| 305 |
-
3. Technical Advantages of MCP
|
| 306 |
-
MCP provides the following technical advantages:
|
| 307 |
-
1. Stand ardized Tool Integration: Enables consistent integration
|
| 308 |
-
of various tools and APIs, making it easy to extend agent
|
| 309 |
-
functionality.
|
| 310 |
-
2. Type Safety: JSON schema -based interfaces ensure type safety,
|
| 311 |
-
reducing errors in agent -tool interaction.
|
| 312 |
-
3. Self-documentin g: Tool descriptions are included as part of the
|
| 313 |
-
protocol, allowing tool usage to be understood without
|
| 314 |
-
separate documentation. 4. Extensible Design: Provides an extensible structure for easily
|
| 315 |
-
adding new tools and functionalities.
|
| 316 |
-
5. Language and Platform Independence: Adopts an open
|
| 317 |
-
standard that can be implemented in various programming
|
| 318 |
-
languages and platforms.
|
| 319 |
-
6. Developer -friendly Interface: Provides an intuitive interface
|
| 320 |
-
that is easy for developers to understand and implement.
|
| 321 |
-
These technical advanta ges significantly expand the practical
|
| 322 |
-
utility and scope of agents and make it easier for developers to build
|
| 323 |
-
and extend agent systems.
|
| 324 |
-
|
| 325 |
-
F. Comparison of MCP, A2A, and API
|
| 326 |
-
The main characteristics of MCP , A2A, and general APIs are
|
| 327 |
-
compared in Table 2.
|
| 328 |
-
This co mparison table shows the main characteristics and
|
| 329 |
-
differences of each protocol/interface. MCP focuses on enabling
|
| 330 |
-
agents to interact effectively with external tools, A2A facilitates
|
| 331 |
-
collaboration among agents, and general APIs provide a standard
|
| 332 |
-
interface for data exchange between services. These three
|
| 333 |
-
approaches are complementary and, when used together, can build a TABLE 2. COMPARISON OF MCP, A2A, AND GENERAL API
|
| 334 |
-
Feature MCP A2A General API
|
| 335 |
-
Primary Purpose Connecting agents to external
|
| 336 |
-
tools/services Communication and
|
| 337 |
-
collaboration between agents Data exchange between client
|
| 338 |
-
and server
|
| 339 |
-
Communication
|
| 340 |
-
Direction Agent → Tool Agent ↔ Agent Client ↔ Server
|
| 341 |
-
Message Format JSON Schema -based Structured messages (Header,
|
| 342 |
-
Body, Parts) Varies: REST, SOAP, etc.
|
| 343 |
-
State Management Context -based state tracking Task -based state management Stateless or session -based
|
| 344 |
-
Discovery Mechanism Tool Descriptions Agent Cards API documentation, OpenAPI
|
| 345 |
-
specs
|
| 346 |
-
Authentication Method Supports various mechanisms Enterprise authentication,
|
| 347 |
-
OpenAPI -based Varies: API Key, OAuth, etc.
|
| 348 |
-
Error Handling Standardized error codes and
|
| 349 |
-
recovery strategies Task failure handling and
|
| 350 |
-
recovery HTTP status codes, error
|
| 351 |
-
responses
|
| 352 |
-
Scalability Easy integration of new tools Easy integration of new agents Scalable through endpoint
|
| 353 |
-
expansion
|
| 354 |
-
Implementation
|
| 355 |
-
Complexity Moderate High Low to moderate
|
| 356 |
-
Multimodal Support Limited Comprehensive (Text, Image,
|
| 357 |
-
Structured Data) Limited
|
| 358 |
-
Level of Standardization Emerging standard Emerging standard Widely varied
|
| 359 |
-
Developer Experience Self-descriptive, schema -based Discovery via Agent Cards Highly documentation -
|
| 360 |
-
dependent
|
| 361 |
-
Real -time Interaction Limited Supported Depends on API design
|
| 362 |
-
Security Model Tool -specific access control Inter -agent authentication and
|
| 363 |
-
authorization Endpoint -specific access control
|
| 364 |
-
Typical Use Cases Tool/API connection, automation
|
| 365 |
-
via function calls Collaborative problem solving,
|
| 366 |
-
long -running coordination Information retrieval, command
|
| 367 |
-
dispatch
|
| 368 |
-
|
| 369 |
-
|
| 370 |
-
--- Page 5 ---
|
| 371 |
-
|
| 372 |
-
powerful agent eco system.
|
| 373 |
-
|
| 374 |
-
III. MCP –A2A INTEGRATED IMPLEMENTATION METHODOLOGY
|
| 375 |
-
A. Implementation Architecture Overview
|
| 376 |
-
To implement MCP and A2A in real systems, a systematic
|
| 377 |
-
architectural design is required. This section explains the architectural
|
| 378 |
-
components and design principles for effectively implementing both
|
| 379 |
-
protocols.
|
| 380 |
-
The integrated implementation architecture of MCP and A2A
|
| 381 |
-
consists of the following main layers (Fig. 2) :
|
| 382 |
-
1. User Interface Layer: Responsible for interaction between users
|
| 383 |
-
and the agent system, handling user re quests and displaying
|
| 384 |
-
results. This layer provides a consistent user experience across
|
| 385 |
-
diverse client environments and effectively represents
|
| 386 |
-
multimodal content using A2A’s user experience negotiation
|
| 387 |
-
features.
|
| 388 |
-
2. Agent Management Layer: Manages the lifecy cle, state, and
|
| 389 |
-
functionality of agents, including creation and management of
|
| 390 |
-
agent cards and coordination of agent communication.
|
| 391 |
-
According to Habler et al. [13], this layer creates a flexible
|
| 392 |
-
collaboration environment through dynamic agent discovery
|
| 393 |
-
and capability negotiation.
|
| 394 |
-
3. Core Protocol Layer: Implements the basic protocol
|
| 395 |
-
specifications of A2A and MCP, providing core functions such as
|
| 396 |
-
message formats, communication rules, and error handling.
|
| 397 |
-
This layer ensures protocol compliance and enables consi stent
|
| 398 |
-
implementation across diverse environments.
|
| 399 |
-
4. Tool Integration Layer: Integrates external tools and APIs
|
| 400 |
-
through MCP, managing tool descriptions and processing function calls. According to the latest specification of the MCP
|
| 401 |
-
[14], this layer provide s type safety and self -documenting
|
| 402 |
-
features through JSON schema -based interfaces.
|
| 403 |
-
5. Security and Authentication Layer: Responsible for securing
|
| 404 |
-
agent communication and tool usage, handling authentication,
|
| 405 |
-
authorization, and data encryption. According to C loud Security
|
| 406 |
-
Alliance [15], this layer builds a secure agent collaboration
|
| 407 |
-
environment using OAuth 2.0 -based authorization mechanisms
|
| 408 |
-
and end -to-end encryption.
|
| 409 |
-
This layered architecture improves system maintainability and
|
| 410 |
-
scalability through separation o f concerns. Each layer can be
|
| 411 |
-
developed and tested independently and can be extended or
|
| 412 |
-
replaced as needed, allowing the architecture to evolve flexibly with
|
| 413 |
-
the agent system.
|
| 414 |
-
|
| 415 |
-
B. A2A Implementation Procedure
|
| 416 |
-
The implementation of the A2A protocol involves a structured
|
| 417 |
-
sequence of steps, including the definition of agent metadata, the
|
| 418 |
-
setup of communication logic, and task management. These steps
|
| 419 |
-
ensure that agents can interact effectively in a standardized and
|
| 420 |
-
interoperable manner.
|
| 421 |
-
1. Agent Card Definition
|
| 422 |
-
An ag ent card is JSON -formatted metadata that specifies an
|
| 423 |
-
agent’s functionality and role. Agent card definition consists of the
|
| 424 |
-
following steps [8]:
|
| 425 |
-
1. Define Agent Identifier and Basic Information: Define basic
|
| 426 |
-
information such as agent ID, name, description, and version.
|
| 427 |
-
2. Define Capabilities: Define the list of functions provided by the
|
| 428 |
-
agent, including parameters and return values for each function.
|
| 429 |
-
3. Define Authentication Requirements: Define authentication
|
| 430 |
-
Fig. 2. The MCP×A2A Framework integrates agent -to-agent communication with tool connectivity in a layered architecture
|
| 431 |
-
|
| 432 |
-
|
| 433 |
-
--- Page 6 ---
|
| 434 |
-
|
| 435 |
-
methods and permission scopes required for agen t usage.
|
| 436 |
-
4. Add Metadata: Define additional metadata such as agent
|
| 437 |
-
category, tags, and creator information.
|
| 438 |
-
Agent cards, as JSON -formatted metadata, define agent ID,
|
| 439 |
-
function list, and authentication requirements, enabling other agents
|
| 440 |
-
to discover and util ize them [8]. According to Salimbeni [16],
|
| 441 |
-
standardized agent cards support the dynamic scalability of the agent
|
| 442 |
-
ecosystem, allowing existing agents to automatically recognize and
|
| 443 |
-
collaborate with new agents added to the system.
|
| 444 |
-
2. Message Processing Implemen tation
|
| 445 |
-
A2A message processing is implemented through the following
|
| 446 |
-
steps [8]:
|
| 447 |
-
1. Message Reception: Receive messages from other agents
|
| 448 |
-
through various communication channels such as HTTP
|
| 449 |
-
requests, message queues, or WebSocket.
|
| 450 |
-
2. Message Parsing: Parse the received message to extract
|
| 451 |
-
headers, bodies, and parts. A2A messages are structured in
|
| 452 |
-
JSON format, making parsing easy.
|
| 453 |
-
3. Message Validation: Validate the message format and content,
|
| 454 |
-
including schema validation, signature verification, and
|
| 455 |
-
permission ch ecks.
|
| 456 |
-
4. Message Processing: Perform appropriate tasks according to
|
| 457 |
-
the message content, including function execution, state
|
| 458 |
-
updates, and information provision.
|
| 459 |
-
5. Response Generation: Generate a response message according
|
| 460 |
-
to the task result. The response must comply with the A2A
|
| 461 |
-
message format and include all necessary information.
|
| 462 |
-
6. Response Transmission: Send the generated response to the
|
| 463 |
-
original message sender through the same communication
|
| 464 |
-
channel used for the original request.
|
| 465 |
-
This message processing can be performed asynchronously, and
|
| 466 |
-
additional messages may be exchanged to update the status of long -
|
| 467 |
-
running tasks. According to Habler et al. [13], the asynchronous
|
| 468 |
-
nature of A2A message processing enables effective agent
|
| 469 |
-
coordin ation in complex collaboration scenarios.
|
| 470 |
-
3. Task Management Implementation
|
| 471 |
-
A2A task management is implemented with the following
|
| 472 |
-
elements [8]:
|
| 473 |
-
1. Task Creation: Create a new task according to the client’s
|
| 474 |
-
request. Each task has a unique identifier and includ es
|
| 475 |
-
information such as task type, parameters, and status.
|
| 476 |
-
2. Task Status Tracking: Track and update task progress. Task
|
| 477 |
-
status can be created, in progress, completed, or failed, and
|
| 478 |
-
timestamps are recorded for status changes.
|
| 479 |
-
3. Task Result Management: Man age the results (artifacts) when
|
| 480 |
-
a task is completed. Results can be in various forms (documents,
|
| 481 |
-
code, images, etc.) and are stored with metadata.
|
| 482 |
-
4. Task Error Handling: Manage error information and execute
|
| 483 |
-
appropriate recovery strategies in case of task failure. Error
|
| 484 |
-
information may include error codes, messages, and stack
|
| 485 |
-
traces.
|
| 486 |
-
Task management implementation enables effective coordination
|
| 487 |
-
and management of long -running tasks among agents. According to
|
| 488 |
-
Pajo P. [20], the task management mechanism of A2 A facilitates agent
|
| 489 |
-
coordination in complex collaboration scenarios and provides a
|
| 490 |
-
foundation for implementing recovery strategies in case of task
|
| 491 |
-
failure. C. MCP Implementation Procedure
|
| 492 |
-
The implementation of the MCP involves defining tool
|
| 493 |
-
specifications, ha ndling function invocations, and managing
|
| 494 |
-
interactions between agents and external tools. The following
|
| 495 |
-
outlines the major stages of MCP implementation.
|
| 496 |
-
1. Tool Description Definition
|
| 497 |
-
In MCP, tool descriptions are defined using JSON schema. Tool
|
| 498 |
-
description d efinition consists of the following steps [8], [14]:
|
| 499 |
-
1. Define Tool Basic Information: Define basic information such as
|
| 500 |
-
tool name, description, and version.
|
| 501 |
-
2. Define Function List: Define the list of functions provided by the
|
| 502 |
-
tool, including description, parameters, and return values for
|
| 503 |
-
each function.
|
| 504 |
-
3. Define Parameter Schema: Define JSON schema for each
|
| 505 |
-
function’s parameters, including type, constraints, and required
|
| 506 |
-
status.
|
| 507 |
-
4. Define Return Value Schema: Define JSON schema for each
|
| 508 |
-
function’s return value, including type, structure, and expected
|
| 509 |
-
values.
|
| 510 |
-
These tool descriptions provide a foundation for agents to
|
| 511 |
-
understand and utilize tool functionality and usage. According to
|
| 512 |
-
Schmid [21], the self -documen ting nature of MCP enables developers
|
| 513 |
-
to understand tool usage without separate documentation,
|
| 514 |
-
significantly improving development productivity.
|
| 515 |
-
2. Function Call Processing Implementation
|
| 516 |
-
MCP function call processing is implemented through the following
|
| 517 |
-
steps [8, 14]:
|
| 518 |
-
1. Function Call Request Reception: Receive function call requests
|
| 519 |
-
from agents in various forms such as HTTP requests or RPC calls.
|
| 520 |
-
2. Parameter Validation: Validate that the requested parameters
|
| 521 |
-
match the schema defined in the tool description, including
|
| 522 |
-
type checks, required parameter checks, and value range
|
| 523 |
-
validation.
|
| 524 |
-
3. Function Execution: Execute the actual function using the
|
| 525 |
-
validated parameters, which may include internal logic
|
| 526 |
-
execution, external API calls, or database queries.
|
| 527 |
-
4. Result Conversion: Convert the function execution result to the
|
| 528 |
-
return format defined in the tool description, including data
|
| 529 |
-
format conversion, field mapping, and error handling.
|
| 530 |
-
5. Response Return: Return the converted result to the agent in
|
| 531 |
-
the form of an HTTP response, RPC response, etc.
|
| 532 |
-
This function call processing implementation enables agents to
|
| 533 |
-
effectively utilize external tools and APIs. According to KeywordsAI
|
| 534 |
-
[22], the type safety and schema -based validation of MCP significantly
|
| 535 |
-
reduce errors in agent -tool interaction, improving system stability
|
| 536 |
-
and reliability.
|
| 537 |
-
|
| 538 |
-
D. Integrated Implementation of A2A and MCP
|
| 539 |
-
Integrating the A2A and MCP protocols enables the development
|
| 540 |
-
of highly interoperable and extensible agent systems that combine
|
| 541 |
-
inter -agent collaboratio n with structured tool interaction. The
|
| 542 |
-
following subsections present a step -by-step methodology for
|
| 543 |
-
implementing such an integrated system.
|
| 544 |
-
1. Integrated Architecture Design
|
| 545 |
-
The integrated architecture of A2A and MCP can be designed with
|
| 546 |
-
the following compon ents [7], [14]:
|
| 547 |
-
|
| 548 |
-
--- Page 7 ---
|
| 549 |
-
|
| 550 |
-
1. A2A Communication Module: Responsible for agent -to-agent
|
| 551 |
-
communication, implementing the A2A protocol to handle
|
| 552 |
-
message exchange, task management, and agent card
|
| 553 |
-
processing.
|
| 554 |
-
2. MCP Tool Module: Responsible for connecting with external
|
| 555 |
-
tools, implementing the MCP protocol to manage tool
|
| 556 |
-
descriptions, function call processing, and result conversion.
|
| 557 |
-
3. Agent Core: Implements the core logic of the agent, handling
|
| 558 |
-
user request processing, task planning, and decision -making.
|
| 559 |
-
4. Context Manager : Manages the state and context of the agent,
|
| 560 |
-
including session management, state tracking, and memory
|
| 561 |
-
management.
|
| 562 |
-
5. Security Manager: Responsible for authentication and
|
| 563 |
-
authorization, including user authentication, agent -to-agent
|
| 564 |
-
authentication, and tool access control.
|
| 565 |
-
This modular design improves system maintainability and
|
| 566 |
-
scalability through separation of concerns. Each module can be
|
| 567 |
-
developed and tested independently and can be extended or
|
| 568 |
-
replaced as needed.
|
| 569 |
-
2. Utilizing Google ADK (Agent Developer Kit)
|
| 570 |
-
Google’s ADK (Agent Developer Kit) provides tools and libraries for
|
| 571 |
-
easily implementing A2A and MCP. Implementation using ADK
|
| 572 |
-
consists of the following steps [8]:
|
| 573 |
-
1. ADK Installation: Install and configure Google ADK, which
|
| 574 |
-
supports various programming la nguages such as Python,
|
| 575 |
-
JavaScript, and Java.
|
| 576 |
-
2. Agent Definition: Define an agent compliant with the A2A
|
| 577 |
-
protocol, including writing agent cards, implementing message
|
| 578 |
-
processing logic, and setting up task management.
|
| 579 |
-
3. Tool Integration: Integrate externa l tools using MCP, including
|
| 580 |
-
writing tool descriptions, implementing functions, and setting
|
| 581 |
-
up error handling logic.
|
| 582 |
-
4. Agent Deployment: Deploy and test the implemented agent.
|
| 583 |
-
ADK supports various deployment options such as local
|
| 584 |
-
development environments and cloud environments.
|
| 585 |
-
ADK abstracts the complexity of A2A and MCP, allowing
|
| 586 |
-
developers to focus on core agent functionality. According to Pajo P.
|
| 587 |
-
[20], using ADK can reduce agent development time by up to 60% and
|
| 588 |
-
significantly improve code quality and st andard compliance.
|
| 589 |
-
3. Implementation Strategy Using LangGraph
|
| 590 |
-
LangGraph can be utilized to construct multi -agent workflows,
|
| 591 |
-
enabling the definition of flows that include cycles —an essential
|
| 592 |
-
feature for most agent architectures [23], [24]. LangGraph is an agen t
|
| 593 |
-
framework that supports the A2A protocol and enables integrated
|
| 594 |
-
implementation of A2A and MCP. As shown in Figure 3, using the
|
| 595 |
-
LangChain MCP adapter library makes it possible to connect to
|
| 596 |
-
multiple MCP servers and load tools from those servers [25].
|
| 597 |
-
|
| 598 |
-
|
| 599 |
-
Fig. 3. LangChain MCP Adapters MCP tools can be converted into LangChain tools and used with
|
| 600 |
-
LangGraph agents, and a client implementation that connects to
|
| 601 |
-
multiple MCP servers and loads tools from them is feasible.
|
| 602 |
-
LangGraph can be used to implement agen ts compliant with the A2A
|
| 603 |
-
protocol and integrate tools such as currency exchange rate lookup
|
| 604 |
-
tools via MCP. The agent processes user requests and, as needed,
|
| 605 |
-
calls the currency exchange rate lookup tool via MCP to return results.
|
| 606 |
-
Through this process, the integrated use of A2A and MCP enables the
|
| 607 |
-
extension of agent functionality and the standardization of
|
| 608 |
-
connections with external tools.
|
| 609 |
-
|
| 610 |
-
E. Implementation Considerations
|
| 611 |
-
When implementing an integrated agent system using A2A and
|
| 612 |
-
MCP, several key factors must be considered to ensure security,
|
| 613 |
-
scalability, reliability, and maintainability. This section outlines the
|
| 614 |
-
primary technical considerations and recommended best practices.
|
| 615 |
-
1. Security and Authentication: Appropriate authentication and
|
| 616 |
-
authorization mechani sms must be implemented to secure
|
| 617 |
-
agent communication and tool usage. According to Cloud
|
| 618 |
-
Security Alliance [15], security implementation for A2A and
|
| 619 |
-
MCP should utilize standard technologies such as OAuth 2.0,
|
| 620 |
-
JWT, and TLS.
|
| 621 |
-
2. Scalability: The system must b e designed to accommodate
|
| 622 |
-
increasing loads and new requirements. This can be achieved
|
| 623 |
-
through horizontal scaling, asynchronous processing, and
|
| 624 |
-
caching.
|
| 625 |
-
3. Error Handling: Mechanisms must be implemented to
|
| 626 |
-
appropriately handle various error situations such as
|
| 627 |
-
communication errors and tool failures. This can be achieved
|
| 628 |
-
through strategies such as retry, fallback paths, and graceful
|
| 629 |
-
degradation.
|
| 630 |
-
4. Performance Optimization: Strategies to minimize latency in
|
| 631 |
-
agent communication and tool usage should be applied. This
|
| 632 |
-
can be achieved through connection pooling, batch processing,
|
| 633 |
-
and asynchronous I/O.
|
| 634 |
-
5. Monitoring and Logging: Logging mechanisms must be
|
| 635 |
-
implemented to monitor system operation and diagnose
|
| 636 |
-
problems. This can be achieved through structured logging,
|
| 637 |
-
distributed tracing, and metric collection.
|
| 638 |
-
Implementation that appropriately reflects these considerations
|
| 639 |
-
can significantly improve the stability, security, and scalability of
|
| 640 |
-
agent systems. According to Habler et al. [13], implementation of A2A
|
| 641 |
-
and MCP that incorporates these considerations is a key factor in
|
| 642 |
-
promoting the actual adoption of agent technol ogy in enterprise
|
| 643 |
-
environments.
|
| 644 |
-
IV. USE CASES OF A2A AND MCP
|
| 645 |
-
A. Application Areas in Enterprise Environments
|
| 646 |
-
A2A and MCP can be utilized in various ways in ent erprise
|
| 647 |
-
environments. This section examines various use cases of how these
|
| 648 |
-
two protocols can be applied in real business settings.
|
| 649 |
-
1. Recruitment Process Automation
|
| 650 |
-
As demonstrated in Google’s official demo [7], A2A and MCP can
|
| 651 |
-
be effectively leveraged to aut omate the recruitment pipeline. The
|
| 652 |
-
following agents collaborate across various stages of the hiring
|
| 653 |
-
process:
|
| 654 |
-
1. Candidate Screening Agent: Analyzes resumes and evaluates
|
| 655 |
-
basic qualifications. This agent connects via MCP to resume
|
| 656 |
-
|
| 657 |
-
|
| 658 |
-
--- Page 8 ---
|
| 659 |
-
|
| 660 |
-
parsing tools and qualifi cation databases to perform efficient
|
| 661 |
-
screening.
|
| 662 |
-
2. Interview Scheduling Agent: Coordinates schedules between
|
| 663 |
-
interviewers and candidates and schedules interviews.
|
| 664 |
-
According to Salimbeni [16], this agent connects via MCP to
|
| 665 |
-
calendar APIs and email systems to automate complex
|
| 666 |
-
scheduling tasks.
|
| 667 |
-
3. Interview Preparation Agent: Prepares customized interview
|
| 668 |
-
questions based on the candidate’s background. This agent
|
| 669 |
-
receives candidate information from the screening agent via
|
| 670 |
-
A2A and generates appropriate question s.
|
| 671 |
-
4. Feedback Collection Agent: Collects and summarizes feedback
|
| 672 |
-
from interviewers after interviews. This agent connects via MCP
|
| 673 |
-
to feedback forms and evaluation systems to collect structured
|
| 674 |
-
feedback.
|
| 675 |
-
These agents communicate with each other via the A2A protocol
|
| 676 |
-
and connect to external tools such as email systems, calendar
|
| 677 |
-
management tools, and HR management systems via MCP. According
|
| 678 |
-
to Pajo P. [20], such automation systems can improve recruitment
|
| 679 |
-
process efficiency by up to 40% and significantly enhance candidate
|
| 680 |
-
experience. For example, in a company processing 1,000 candidates,
|
| 681 |
-
a system based on A2A and MCP reduced average processing time
|
| 682 |
-
from 15 to 9 days and achieved an ROI of 120% within 3 months. Initial
|
| 683 |
-
development required about 2 weeks for API in tegration and agent
|
| 684 |
-
setup, but maintenance costs were kept below $5,000 per month
|
| 685 |
-
thanks to standardized protocols.
|
| 686 |
-
2. Customer Support System
|
| 687 |
-
A2A and MCP also offer substantial benefits in modernizing
|
| 688 |
-
customer support systems. The following agent roles are typically
|
| 689 |
-
involved [8]:
|
| 690 |
-
1. Initial Response Agent: Receives customer inquiries and
|
| 691 |
-
collects basic information. This agent connects via MCP to
|
| 692 |
-
customer databases and previous inquiry history to understand
|
| 693 |
-
customer context.
|
| 694 |
-
2. Problem Diagnosis Agent: Analyz es and diagnoses customer
|
| 695 |
-
problems. According to Habler et al. [13], this agent receives
|
| 696 |
-
customer information and problem descriptions from the initial
|
| 697 |
-
response agent via A2A and performs accurate diagnosis.
|
| 698 |
-
3. Solution Proposal Agent: Proposes appropriate solutions based
|
| 699 |
-
on diagnosis results. This agent connects via MCP to knowledge
|
| 700 |
-
bases and product information systems to provide customized
|
| 701 |
-
solutions.
|
| 702 |
-
4.Escalation Agent: Escalates complex problems to human agents.
|
| 703 |
-
This agent collaborates with other agent s via A2A to determine
|
| 704 |
-
the need for escalation and connects via MCP to ticketing
|
| 705 |
-
systems for smooth handover.
|
| 706 |
-
These agents collaborate via A2A and connect to external tools
|
| 707 |
-
such as CRM systems, knowledge bases, and ticketing systems via
|
| 708 |
-
MCP. According to C loud Security Alliance [15], such systems can
|
| 709 |
-
reduce average inquiry resolution time by 60% and increase first
|
| 710 |
-
contact resolution rate by more than 25%.
|
| 711 |
-
3. Code Review and Quality Management
|
| 712 |
-
A2A and MCP can be applied to automate code review and
|
| 713 |
-
software qual ity assurance tasks. The following agents participate in
|
| 714 |
-
this workflow [7]:
|
| 715 |
-
1. Code Analysis Agent: Analyzes code structure, complexity, and
|
| 716 |
-
coding standard compliance. This agent connects via MCP to
|
| 717 |
-
static analysis tools and code metric systems to perform in-
|
| 718 |
-
depth code analysis. 2. Security Review Agent: Checks code for security vulnerabilities.
|
| 719 |
-
According to KeywordsAI [22], this agent connects via MCP to
|
| 720 |
-
security scanners and vulnerability databases to identify
|
| 721 |
-
potential security risks.
|
| 722 |
-
3. Performance Opt imization Agent: Identifies performance
|
| 723 |
-
bottlenecks and suggests optimization strategies. This agent
|
| 724 |
-
collaborates with the code analysis agent via A2A to identify
|
| 725 |
-
performance issues and connects via MCP to profiling tools to
|
| 726 |
-
provide specific optimization s trategies.
|
| 727 |
-
4. Documentation Support Agent: Evaluates code documentation
|
| 728 |
-
quality and suggests improvements. This agent connects via
|
| 729 |
-
MCP to documentation generation tools and API
|
| 730 |
-
documentation systems to support effective documentation.
|
| 731 |
-
These agents collabor ate via A2A and connect to development
|
| 732 |
-
tools such as version control systems, CI/CD pipelines, and issue
|
| 733 |
-
trackers via MCP. According to Schmid [21], such systems can improve
|
| 734 |
-
code quality by an average of 35% and increase developer
|
| 735 |
-
productivity by more than 20%.
|
| 736 |
-
4. Developer Support System
|
| 737 |
-
In developer enablement, A2A and MCP can be used to construct
|
| 738 |
-
intelligent assistants that automate routine development tasks [8]:
|
| 739 |
-
1. Code Generation Agent: Generates code according to
|
| 740 |
-
developer requirements. This agent connec ts via MCP to code
|
| 741 |
-
repositories and API documentation to generate code
|
| 742 |
-
appropriate for the project context.
|
| 743 |
-
2. Debugging Support Agent: Analyzes the cause of errors and
|
| 744 |
-
suggests solutions. According to the Model Context Protocol
|
| 745 |
-
specification [14], this ag ent connects via MCP to log systems,
|
| 746 |
-
debuggers, and error databases to support effective debugging.
|
| 747 |
-
3. Learning Material Provision Agent: Provides developers with
|
| 748 |
-
necessary learning materials and documentation. This agent
|
| 749 |
-
collaborates with other agents via A2A to understand the
|
| 750 |
-
developer’s current task context and connects via MCP to
|
| 751 |
-
documentation systems and learning platforms to provide
|
| 752 |
-
customized learning materials.
|
| 753 |
-
4. Task Management Agent: Tracks developer tasks and manages
|
| 754 |
-
schedules. This agent connec ts via MCP to project management
|
| 755 |
-
tools and scheduling systems to support efficient task
|
| 756 |
-
management.
|
| 757 |
-
These agents collaborate via A2A and connect to tools such as IDEs,
|
| 758 |
-
documentation systems, and project management tools via MCP.
|
| 759 |
-
According to Pajo P. [20], such systems can improve developer
|
| 760 |
-
productivity by up to 50% and significantly improve code quality and
|
| 761 |
-
documentation standards.
|
| 762 |
-
|
| 763 |
-
B. Implementation Case Study: Stock Information System
|
| 764 |
-
This section introduces a practical application case that applies the
|
| 765 |
-
impl ementation methodology of A2A and MCP described in Chapter
|
| 766 |
-
3. This case uses LangChain and LangGraph to build a system that
|
| 767 |
-
retrieves and analyzes various stock information, with multiple
|
| 768 |
-
specialized agents collaborating to process users’ complex financial
|
| 769 |
-
information requests. In Korea, there has been a recent surge in
|
| 770 |
-
interest in the U.S. stock market, accompanied by a significant
|
| 771 |
-
increase in the demand for related research and information [17],
|
| 772 |
-
[18]. The widespread public interest in stock investment transcends
|
| 773 |
-
age and gender, yet individuals with limited expertise in the stock
|
| 774 |
-
market often encounter difficulties in searching for and interpreting
|
| 775 |
-
relevant information [19]. To effectively address thes e challenges, the
|
| 776 |
-
Stock Information System has been developed to provide users with
|
| 777 |
-
|
| 778 |
-
--- Page 9 ---
|
| 779 |
-
|
| 780 |
-
systematic and useful information through a question -and-answer
|
| 781 |
-
function based on natural language processing, leveraging the
|
| 782 |
-
capabilities of various agents.
|
| 783 |
-
The case syste m is designed so that when a user asks a question
|
| 784 |
-
about stock or company information in natural language, multiple
|
| 785 |
-
specialized agents collaborate to provide a comprehensive answer.
|
| 786 |
-
The system uses A2A protocol -based agent communication and MCP -
|
| 787 |
-
based extern al tool access as core technologies. Main functions
|
| 788 |
-
include:
|
| 789 |
-
1. Stock Price Lookup: Provides basic stock information such as
|
| 790 |
-
current price, change rate, and trading volume for a specific
|
| 791 |
-
company.
|
| 792 |
-
2. Listed Company News Lookup: Collects the latest news and
|
| 793 |
-
disclosure information related to the company.
|
| 794 |
-
3. Listed Company Status Lookup: Provides basic information,
|
| 795 |
-
financial statements, and key indicators of the company.
|
| 796 |
-
4. Company Analysis: Integrates collected information to prov ide
|
| 797 |
-
SWOT analysis and investment perspective analysis.
|
| 798 |
-
1. System Architecture
|
| 799 |
-
The system strictly follows the layered structure presented in
|
| 800 |
-
Chapter 3 and consists of the following main layers:
|
| 801 |
-
1. User Interface Layer: User interface and multilingual support.
|
| 802 |
-
2. Agent Management Layer: Agent orchestration and workflow
|
| 803 |
-
management.
|
| 804 |
-
3. Core Protocol Layer: Implementation of A2A and MCP
|
| 805 |
-
protocols.
|
| 806 |
-
4. Tool Integration Layer: Integration with external data sources
|
| 807 |
-
and APIs.
|
| 808 |
-
5. Security Layer: Authentication and auth orization management.
|
| 809 |
-
|
| 810 |
-
The system follows a multi -layered architecture, as shown in Figure 4 .
|
| 811 |
-
|
| 812 |
-
|
| 813 |
-
Fig. 4. Project Source Structure – Multi -Layer Architecture for Stock
|
| 814 |
-
Information System
|
| 815 |
-
The user interface layer includes a multilingual input module. The
|
| 816 |
-
agent management layer is a LangGraph -based workflow manager.
|
| 817 |
-
The core protocol layer includes an A2A message handler and an MCP
|
| 818 |
-
tool call module. The tool integration layer includes financial APIs and
|
| 819 |
-
news scrapers. The security layer includes an OAuth 2.0 -based
|
| 820 |
-
authentication module.
|
| 821 |
-
2. System Implementation
|
| 822 |
-
1. A2A Module Implementation
|
| 823 |
-
The A2A protocol was implemented in the LangChain and
|
| 824 |
-
LangGraph environment. Agent communication follows a
|
| 825 |
-
standardized JSON message format, and each agent has a unique ID
|
| 826 |
-
and role.
|
| 827 |
-
a. Agent Card Definition
|
| 828 |
-
Each agent is defined by a JSON -formatted “agent card,” which
|
| 829 |
-
specifies the agent’s metadata and functionality. Figure 5 shows an
|
| 830 |
-
example of a stock price lookup agent card.
|
| 831 |
-
|
| 832 |
-
|
| 833 |
-
Fig. 5. Example of Stock Price Lookup Agent Card
|
| 834 |
-
|
| 835 |
-
b. A2A Message Structure and Agent Registry
|
| 836 |
-
Agent communication follows a standardized message structure,
|
| 837 |
-
and the system supports agent searc h and function lookup through
|
| 838 |
-
an agent registry that manages agent cards. Figure 6 shows part of
|
| 839 |
-
the code for the A2AMessage class, which defines methods for
|
| 840 |
-
serializing and deserializing message objects in JSON format, used to
|
| 841 |
-
implement the A2A protocol. This code enables conversion of
|
| 842 |
-
messages to standardized JSON format for agent communication and
|
| 843 |
-
restoration of JSON data to message objects.
|
| 844 |
-
|
| 845 |
-
|
| 846 |
-
Fig. 6. A2A Message Structure and Agent Registry Sample Code
|
| 847 |
-
|
| 848 |
-
|
| 849 |
-
|
| 850 |
-
--- Page 10 ---
|
| 851 |
-
|
| 852 |
-
2. MCP Module Implementation
|
| 853 |
-
Each agent can call one or more independent modules according
|
| 854 |
-
to the MCP method to connect with external data sources and
|
| 855 |
-
perform preprocessing and analysis. In this system, tools such as stock
|
| 856 |
-
data, news scraping, company information, financial data, and
|
| 857 |
-
analysis engines ar e integrated via MCP.
|
| 858 |
-
a. stock_data – Stock Price Lookup Module: Returns real -time
|
| 859 |
-
price data for a specific stock via financial data APIs (e.g., Yahoo
|
| 860 |
-
Finance, Alpha Vantage).
|
| 861 |
-
b. web_scraper – Listed Company News Collection Module:
|
| 862 |
-
Operates as a simple we b crawler to collect news article headlines
|
| 863 |
-
based on company names. Can also be linked to disclosure
|
| 864 |
-
information APIs as needed.
|
| 865 |
-
c. financial_data – Financial Information Lookup Module: Parses
|
| 866 |
-
and returns key data from financial statements based on K -IFRS
|
| 867 |
-
standards. This module is linked to the company status lookup agent.
|
| 868 |
-
d. analysis_engine – Integrated Analysis Module: Uses LangChain -
|
| 869 |
-
based LLM to generate text -based insights. Integrates company status
|
| 870 |
-
and news data to derive future outlook for the company .
|
| 871 |
-
Each tool is defined by a JSON -formatted description file that
|
| 872 |
-
specifies the tool’s functionality and parameters. Figure 7 shows
|
| 873 |
-
sample code for the stock_data module, where the MCP client loads
|
| 874 |
-
the tool description and processes function calls. The prov ided code
|
| 875 |
-
includes the extract_tickers function, which extracts stock tickers
|
| 876 |
-
from user input strings. This function handles tickers in various
|
| 877 |
-
formats (English tickers, Korean stock codes, company names, etc.)
|
| 878 |
-
and is used in the stock information system b ased on the A2A and
|
| 879 |
-
MCP framework described in Section IV .C of the paper, integrating
|
| 880 |
-
with external financial data sources (e.g., yfinance).
|
| 881 |
-
|
| 882 |
-
|
| 883 |
-
Fig. 7. Sample Code for stock_data – Stock Price Lookup Module
|
| 884 |
-
|
| 885 |
-
3. LangGraph -based Workflow Implementation
|
| 886 |
-
The system uses LangGraph to manage workflows among agents.
|
| 887 |
-
Workflow state and workflow graph definitions are implemented. The
|
| 888 |
-
orchestrator agent analyzes user requests and calls appropriate
|
| 889 |
-
agents in sequence to ge nerate comprehensive responses.
|
| 890 |
-
The code in Figure 8 is the _create_workflow method that defines
|
| 891 |
-
the workflow for the stock information system using LangGraph. This
|
| 892 |
-
method creates a state -based workflow for processing user requests
|
| 893 |
-
in a multi -agent system based on the A2A protocol and MCP.
|
| 894 |
-
Fig. 8. Sample Code Defining Workflow for Stock Information System
|
| 895 |
-
Using LangGraph
|
| 896 |
-
|
| 897 |
-
4. User Query Processing Flow
|
| 898 |
-
The following is an actual example of how the system processes
|
| 899 |
-
user queries:
|
| 900 |
-
a. User asks: “Please provide the recent stock price, news, and
|
| 901 |
-
investment perspective analysis for Samsung Electronics.”
|
| 902 |
-
b. Orchestrator agent analyzes the query and plans to call stock
|
| 903 |
-
price lookup, news, company information, financial information, and
|
| 904 |
-
analysis agents in sequence.
|
| 905 |
-
(1) Requests stock price information from the stock price lookup agent.
|
| 906 |
-
(2) Requests recent news from the news agent.
|
| 907 |
-
(3) Requests company information from the company information agent.
|
| 908 |
-
(4) Requests financial data from the financial information agent.
|
| 909 |
-
(5) Requests integrated analysis from t he analysis agent.
|
| 910 |
-
c. Each agent accesses the necessary tools via MCP to collect data.
|
| 911 |
-
d. Analysis agent performs investment perspective analysis by
|
| 912 |
-
integrating collected information.
|
| 913 |
-
e. Orchestrator generates a final response and delivers it to the
|
| 914 |
-
user.
|
| 915 |
-
3. Implementation Results Analysis
|
| 916 |
-
The implementation results of the LangGraph example show the
|
| 917 |
-
following characteristics:
|
| 918 |
-
1. Concise Implementation: The complexity of A2A and MCP is
|
| 919 |
-
abstracted by the framework, allowing developers to focus on
|
| 920 |
-
core agent func tionality. According to Salimbeni [16],
|
| 921 |
-
implementation using LangGraph can reduce code volume by
|
| 922 |
-
more than 70% compared to traditional methods.
|
| 923 |
-
2. Standard Compliance: Implemented agents comply with A2A
|
| 924 |
-
protocol standards and can be easily integrated with other A2A -
|
| 925 |
-
compatible agents, greatly improving ecosystem scalability and
|
| 926 |
-
interoperability.
|
| 927 |
-
3. Easy Tool Integration: Connection with external APIs is
|
| 928 |
-
simplified via MC P, making it easy to integrate various tools and
|
| 929 |
-
|
| 930 |
-
|
| 931 |
-
--- Page 11 ---
|
| 932 |
-
|
| 933 |
-
services. According to the MCP specification [14], MCP’s
|
| 934 |
-
standardized interface reduces tool integration time by an
|
| 935 |
-
average of 65%.
|
| 936 |
-
4. Scalability: The basic example can be easily extended to more
|
| 937 |
-
complex fu nctionalities and multi -agent systems. According to
|
| 938 |
-
Habler et al. [13], LangGraph -based systems maintain stable
|
| 939 |
-
performance even when scaled to dozens of agents.
|
| 940 |
-
|
| 941 |
-
C. Implications of Application Areas and Implementation
|
| 942 |
-
Cases
|
| 943 |
-
The various application areas and implementation cases of A2A
|
| 944 |
-
and MCP provide the following implications:
|
| 945 |
-
1. Importance of Agent Collaboration: Collaboration among
|
| 946 |
-
multiple specialized agents is essential for solving complex
|
| 947 |
-
problems, and A2A effectively supports this. According to Pajo
|
| 948 |
-
P. [20], collaborative agent systems have problem -solving
|
| 949 |
-
capabilities more than three times higher than single agents on
|
| 950 |
-
average.
|
| 951 |
-
2. Need for Tool Integration: Practical agent systems must be
|
| 952 |
-
connected to external tools, and MCP supports this in a
|
| 953 |
-
standardi zed way. According to the MCP specification [14], tool
|
| 954 |
-
integration via MCP is a key factor in enhancing the practical
|
| 955 |
-
value of agents.
|
| 956 |
-
3. Value of Standardization: Standardized protocols facilitate
|
| 957 |
-
integration of diverse agents and tools, greatly improving
|
| 958 |
-
ecosystem scalability. According to Schmid [21], standardized
|
| 959 |
-
protocols can reduce agent development costs by up to 60%
|
| 960 |
-
and shorten time to market by 40%.
|
| 961 |
-
4. Importance of Practical Implementation: Beyond theoretical
|
| 962 |
-
concepts, providing practical implemen tation methodologies
|
| 963 |
-
and tools accelerates the actual adoption of agent technology.
|
| 964 |
-
According to Habler et al. [13], developer -friendly tools and
|
| 965 |
-
clear implementation guidelines can increase adoption rates of
|
| 966 |
-
agent technology by more than three times.
|
| 967 |
-
Thes e implications demonstrate that A2A and MCP are not just
|
| 968 |
-
technical protocols but core elements for building practical agent
|
| 969 |
-
ecosystems. The integrated use of these two protocols is expected to
|
| 970 |
-
play an important role in advancing agent technology from the
|
| 971 |
-
experimental stage to actual service application.
|
| 972 |
-
V. DISCUSSION AND CONCLUSION
|
| 973 |
-
A. Summary and Conclusion
|
| 974 |
-
This paper systematically analyzed the technical structure and
|
| 975 |
-
operational principles of Google’s A2A protocol and Anthropic’s MCP,
|
| 976 |
-
and explored how these two protocols complement each other to
|
| 977 |
-
build a practical agent ecosystem. A2A enables standardized
|
| 978 |
-
communication and collaboration among heterogeneous agents,
|
| 979 |
-
while MCP is a standardized protocol designed to allow agents to
|
| 980 |
-
securely connect with various exter nal tools, APIs, and resources.
|
| 981 |
-
A2A enhances interoperability and collaboration efficiency among
|
| 982 |
-
agents through mechanisms such as agent cards, structured
|
| 983 |
-
messages, and task management. MCP enables agents to
|
| 984 |
-
interactively integrate with external resources through JSON schema -
|
| 985 |
-
based tool descriptions, function calling, and context management.
|
| 986 |
-
These two protocols operate independently but, when used together,
|
| 987 |
-
form the foundation for building practical and scalable multi -agent -
|
| 988 |
-
based AI systems. From an implemen tation perspective, the case
|
| 989 |
-
study using LangGraph and other frameworks detailed the process of translating theoretical concepts into real -world applications. Practical
|
| 990 |
-
approaches for securing interoperability and improving development
|
| 991 |
-
efficiency for LLM -based autonomous agent systems in various
|
| 992 |
-
enterprise environments were suggested through the
|
| 993 |
-
complementary use of A2A and MCP. Use cases such as recruitment
|
| 994 |
-
automation, customer support, code review, and developer support
|
| 995 |
-
demonstrated the practical applicab ility of the proposed approach. In
|
| 996 |
-
particular, the stock information system implementation case
|
| 997 |
-
demonstrated that the integrated use of A2A and MCP is applicable
|
| 998 |
-
to complex real -world scenarios.
|
| 999 |
-
This analysis and case study suggest that A2A and MCP are not just
|
| 1000 |
-
technical protocols but core elements for building practical agent
|
| 1001 |
-
ecosystems. The introduction of standardized protocols can
|
| 1002 |
-
significantly reduce the development and deployment costs of agent
|
| 1003 |
-
systems and greatly improve interoperability and scalabil ity.
|
| 1004 |
-
B. Significance and Limitations of the Study
|
| 1005 |
-
The significance of this study lies in its systematic analysis of the
|
| 1006 |
-
technical structure and operational principles of A2A and MCP, which
|
| 1007 |
-
provided essential knowledge for understanding and practically
|
| 1008 |
-
impleme nting these protocols. Practical implementation case studies
|
| 1009 |
-
and methodologies offered actionable guidelines for developers and
|
| 1010 |
-
enterprises to integrate agent technology into real -world services.
|
| 1011 |
-
Various use cases demonstrated that A2A and MCP can facilita te the
|
| 1012 |
-
transition of agent technology from experimental applications to
|
| 1013 |
-
practical, real -world services.
|
| 1014 |
-
However, the study is not without limitations. Both A2A and MCP
|
| 1015 |
-
are relatively new protocols, having been released in 2024 –2025, and
|
| 1016 |
-
their long -term sta bility in large -scale production environments, such
|
| 1017 |
-
as medical data processing, remains untested. The implementation
|
| 1018 |
-
cases primarily focused on stock information systems, leaving the
|
| 1019 |
-
applicability of these protocols to other industries, such as complex
|
| 1020 |
-
supply chain management or multi -modal processing (e.g., voice and
|
| 1021 |
-
video), largely unexplored. Additionally, the study’s analysis of
|
| 1022 |
-
security and privacy aspects was insufficient, necessitating further
|
| 1023 |
-
research to ensure safety in actual deployment scenarios.
|
| 1024 |
-
C. Future Research Directions
|
| 1025 |
-
Future research should focus on enhancing the practicality and
|
| 1026 |
-
scalability of A2A and MCP. First, scalability issues such as
|
| 1027 |
-
performance bottlenecks, message routing, and state management in
|
| 1028 |
-
systems with hundreds or thousands of collaborating agents must be
|
| 1029 |
-
addressed. Second, research is needed to strengthen security,
|
| 1030 |
-
including encryption, authentication, access control, and audit trails
|
| 1031 |
-
for agent communication. Third, industry -specific architectures and
|
| 1032 |
-
application cases for fin ance, healthcare, manufacturing, etc., should
|
| 1033 |
-
be explored. Fourth, an open governance model should be
|
| 1034 |
-
established through collaboration with standardization bodies and
|
| 1035 |
-
stakeholders for the long -term development of the protocols. Finally,
|
| 1036 |
-
research on agent systems that process not only text but also images,
|
| 1037 |
-
voice, and video (multi -modal data) is required. These directions will
|
| 1038 |
-
contribute to advancing A2A and MCP as practical solutions in diverse
|
| 1039 |
-
environments.
|
| 1040 |
-
|
| 1041 |
-
|
| 1042 |
-
|
| 1043 |
-
|
| 1044 |
-
|
| 1045 |
-
|
| 1046 |
-
|
| 1047 |
-
|
| 1048 |
-
--- Page 12 ---
|
| 1049 |
-
|
| 1050 |
-
REFERENCES
|
| 1051 |
-
[1] C., Jeong, “Beyond Text: Implementing Multimodal Large Language
|
| 1052 |
-
Model -Powered Multi -Agent Systems Using a No -Code Platform,”
|
| 1053 |
-
Journal of Intelligence and Inform ation Systems , 31(1), 2025, pp. 191 –
|
| 1054 |
-
231. doi:10.13088/jiis.2025.31.1.191
|
| 1055 |
-
[2] C., Jeong, “A Study on the Implementation of Generative AI Services
|
| 1056 |
-
Using an Enterprise Data -Based LLM Application Architecture,” Advances
|
| 1057 |
-
in Artificial Intelligence and Machine Learn ing, 3(4), 2023, pp. 1588 –1618.
|
| 1058 |
-
doi: 10.54364/AAIML.2023.1191
|
| 1059 |
-
[3] C., Jeong, “Generative AI service implementation using LLM application
|
| 1060 |
-
architecture: based on RAG model and LangChain framework,” Journal
|
| 1061 |
-
of Intelligence and Information Systems , 19(4), 2023, pp. 129 –164. doi:
|
| 1062 |
-
10.13088/jiis.2023.29.4.129
|
| 1063 |
-
[4] S., Yang, O., Nachum, Y., Du, J., Wei, P., Abbeel, D., Schuurmans,
|
| 1064 |
-
“Foundation models for decision making: Problems, methods, and
|
| 1065 |
-
opportunities,” arXiv preprint arXiv:2303.04129, 2023.
|
| 1066 |
-
[5] E., Karpas , et al., “AgentBench: Evaluating LLMs as Agents,” arXiv
|
| 1067 |
-
preprint arXiv:2308.03688, 2023.
|
| 1068 |
-
[6] Anthropic, “Introducing the Model Context Protocol,” 2025. Accessed:
|
| 1069 |
-
May 31, 2025. [Online]. Available:
|
| 1070 |
-
https://www.anthropic.com/news/model -context -protocol
|
| 1071 |
-
[7] Google, “Announcing the Agent2Agent Protocol (A2A),” Google
|
| 1072 |
-
Developers Blog, 2025. Accessed: May 31, 2025. [Online]. Available:
|
| 1073 |
-
https://developers.googleblog.com/en/a2a -a-new -era-of-agent -
|
| 1074 |
-
interoperability/
|
| 1075 |
-
[8] Google, “Agent2Agent (A2A) Protocol Specification,” 2025. Accessed:
|
| 1076 |
-
May 31, 2025. [Online]. Available:
|
| 1077 |
-
https://google.github.io/A2A/specification/
|
| 1078 |
-
[9] C., Jeong, S., Sim, H., Cho, S., Kim, B., Shin, “E2E Process Automation
|
| 1079 |
-
Leveraging Generative AI and IDP -Based Automation Agent: A Case Study
|
| 1080 |
-
on Corporate Expense Proc essing,” arXiv preprint arXiv:2505.20733,
|
| 1081 |
-
2025.
|
| 1082 |
-
[10] R., Margaret, M., Natalie, “Techopedia, Autonomous Agent,” 2025.
|
| 1083 |
-
Accessed: May 31, 2025. [Online]. Available:
|
| 1084 |
-
https://www.techopedia.com/definition/autonomous -agent, last
|
| 1085 |
-
[11] Salesforce, “What are Autonomous Ag ents? A Complete Guide,” 2025.
|
| 1086 |
-
Accessed: May 31, 2025. [Online]. Available:
|
| 1087 |
-
https://www.salesforce.com/eu/agentforce/ai -agents/autonomous -
|
| 1088 |
-
agents/
|
| 1089 |
-
[12] T., Finin, R., Fritzson, D., McKay, R., McEntire, “KQML as an agent
|
| 1090 |
-
communication language,” in Proceedings o f the third international
|
| 1091 |
-
conference on Information and knowledge management , 1994, pp. 456 –
|
| 1092 |
-
463.
|
| 1093 |
-
[13] I., Habler, K., Huang, V. S., Narajala, P., Kulkarni, “Building a secure
|
| 1094 |
-
agentic AI application leveraging A2A protocol,” arXiv preprint
|
| 1095 |
-
arXiv:2504.16902, 2025 .
|
| 1096 |
-
[14] Model Context Protocol, “Model Context Protocol Specification,” 2025.
|
| 1097 |
-
Accessed: May 31, 2025. [Online]. Available:
|
| 1098 |
-
https://modelcontextprotocol.io/specification/2025 -03-26
|
| 1099 |
-
[15] Cloud Security Alliance, “Threat Modeling Google's A2A Protocol with
|
| 1100 |
-
the MAESTRO Framework,” 2025. Accessed: May 31, 2025. [Online].
|
| 1101 |
-
Available: https://cloudsecurityalliance.org/blog/2025/04/30/threat -
|
| 1102 |
-
modeling -google -s-a2a-protocol -with -the-maestro -framework
|
| 1103 |
-
[16] G., Salimbeni, “Understanding Google’s A2A Protocol: Why We Need a
|
| 1104 |
-
Standard f or AI Agent Communication,” 2025. Accessed: May 31, 2025.
|
| 1105 |
-
[Online]. Available: https://guido -
|
| 1106 |
-
salimbeni.medium.com/understanding -googles -a2a-protocol -why-we-
|
| 1107 |
-
need -a-standard -for-ai-agent-communication -ac9188adb0cc
|
| 1108 |
-
[17] H., Jo, J., Choi, J., Seo, “OAR algorithm te chnology based on opinion
|
| 1109 |
-
mining utilizing stock news contents,” Journal of KIIT , 13(3), 2015, pp.
|
| 1110 |
-
111–119. doi: 10.14801/jkiit.2015.13.3.111
|
| 1111 |
-
[18] J. H., Moon, J. J., Sohn, S. J., Yu, “Stock portfolio analysis and visualization
|
| 1112 |
-
services using gamification,” Journal of KIIT , 20(1), 2022, pp. 191 –198.
|
| 1113 |
-
doi: 10.14801/jkiit.2022.20.1.191
|
| 1114 |
-
[19] N., Kim, S., Yu, “Stock information retrieval and analysis techniques using
|
| 1115 |
-
Korean text queries,” Journal of the Korea Institute of Information
|
| 1116 |
-
Technology , 20(9), 2022, pp. 13 –18.
|
| 1117 |
-
[20] P., Pajo, “Comprehensive Analysis of Google's Agent2Agent (A2A) Protocol: Technical Architecture, Enterprise Use Cases, and Long -Term
|
| 1118 |
-
Implications for AI Collaboration,” 2025. Accessed: May 31, 2025.
|
| 1119 |
-
[Online]. Available:
|
| 1120 |
-
https://www.researchgate.net/publ ication/390694531_Comprehensive
|
| 1121 |
-
_Analysis_of_Google's_Agent2Agent_A2A_Protocol_Technical_Architec
|
| 1122 |
-
ture_Enterprise_Use_Cases_and_Long -
|
| 1123 |
-
Term_Imp lications_for_AI_Collaboration
|
| 1124 |
-
[21] P., Schmid, “Model Context Protocol (MCP) an overview,” 2025 Accessed:
|
| 1125 |
-
May 31, 2025. [ Online]. Available: https://www.philschmid.de/mcp -
|
| 1126 |
-
introduction1
|
| 1127 |
-
[22] KeywordsAI, “A Complete Guide to the Model Context Protocol (MCP) in
|
| 1128 |
-
2025,” 2025. Accessed: May 31, 2025. [Online]. Available:
|
| 1129 |
-
https://www.keywords ai.co/blog/introduction -to-mcp
|
| 1130 |
-
[23] C., Jeong, “A Graph -Agent -Based Approach to Enhancing Knowledge -
|
| 1131 |
-
Based QA with Advanced RAG,” Knowledge Management Research ,
|
| 1132 |
-
25(3), 2024, pp. 99 –119. doi: 10.15813/kmr.2024.25.3.005
|
| 1133 |
-
[24] LangGraph, 2025. Accessed: May 31, 2025. [Online]. Available:
|
| 1134 |
-
https://lan gchain -ai.github .io/langgraph/
|
| 1135 |
-
[25] Langchain, “LangChain MCP Adapters,” 2025. Accessed: May 31, 2025.
|
| 1136 |
-
[Online]. Available: https://github.com/langc hain -ai/langchain -mcp -
|
| 1137 |
-
adapters
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
data/documents/content/e3591269-f449-4f88-8185-7d98ef4c4845.txt
DELETED
|
The diff for this file is too large to render.
See raw diff
|
|
|
data/documents/metadata/0e22c68a-134e-4474-af0d-1c119b576bec.json
DELETED
|
@@ -1,17 +0,0 @@
|
|
| 1 |
-
{
|
| 2 |
-
"id": "0e22c68a-134e-4474-af0d-1c119b576bec",
|
| 3 |
-
"filename": "tools_discovery.png",
|
| 4 |
-
"doc_type": "image",
|
| 5 |
-
"file_size": 78410,
|
| 6 |
-
"created_at": "2025-07-08T12:16:07.737267",
|
| 7 |
-
"metadata": {
|
| 8 |
-
"file_extension": ".png",
|
| 9 |
-
"content_length": 350,
|
| 10 |
-
"word_count": 43
|
| 11 |
-
},
|
| 12 |
-
"tags": [],
|
| 13 |
-
"summary": null,
|
| 14 |
-
"category": null,
|
| 15 |
-
"language": null,
|
| 16 |
-
"content_length": 350
|
| 17 |
-
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
data/documents/metadata/b229c249-b844-4579-beb1-2d4185eeb732.json
DELETED
|
@@ -1,17 +0,0 @@
|
|
| 1 |
-
{
|
| 2 |
-
"id": "b229c249-b844-4579-beb1-2d4185eeb732",
|
| 3 |
-
"filename": "Model Context Protocol MCPLandscapeSecurityThreats.pdf",
|
| 4 |
-
"doc_type": "pdf",
|
| 5 |
-
"file_size": 1108266,
|
| 6 |
-
"created_at": "2025-07-08T12:16:21.530542",
|
| 7 |
-
"metadata": {
|
| 8 |
-
"file_extension": ".pdf",
|
| 9 |
-
"content_length": 80288,
|
| 10 |
-
"word_count": 10899
|
| 11 |
-
},
|
| 12 |
-
"tags": [],
|
| 13 |
-
"summary": null,
|
| 14 |
-
"category": null,
|
| 15 |
-
"language": null,
|
| 16 |
-
"content_length": 80288
|
| 17 |
-
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
data/documents/metadata/b3d0767c-1dd8-4f05-a9f8-d69d82f2abde.json
DELETED
|
@@ -1,17 +0,0 @@
|
|
| 1 |
-
{
|
| 2 |
-
"id": "b3d0767c-1dd8-4f05-a9f8-d69d82f2abde",
|
| 3 |
-
"filename": "A Study on the MCP A2A Framework.pdf",
|
| 4 |
-
"doc_type": "pdf",
|
| 5 |
-
"file_size": 1109775,
|
| 6 |
-
"created_at": "2025-07-08T12:58:00.140462",
|
| 7 |
-
"metadata": {
|
| 8 |
-
"file_extension": ".pdf",
|
| 9 |
-
"content_length": 60652,
|
| 10 |
-
"word_count": 8322
|
| 11 |
-
},
|
| 12 |
-
"tags": [],
|
| 13 |
-
"summary": null,
|
| 14 |
-
"category": null,
|
| 15 |
-
"language": null,
|
| 16 |
-
"content_length": 60652
|
| 17 |
-
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
data/documents/metadata/e3591269-f449-4f88-8185-7d98ef4c4845.json
DELETED
|
@@ -1,17 +0,0 @@
|
|
| 1 |
-
{
|
| 2 |
-
"id": "e3591269-f449-4f88-8185-7d98ef4c4845",
|
| 3 |
-
"filename": "A Comprehensive Overview of Large Language Models.pdf",
|
| 4 |
-
"doc_type": "pdf",
|
| 5 |
-
"file_size": 1814502,
|
| 6 |
-
"created_at": "2025-07-08T12:30:52.899470",
|
| 7 |
-
"metadata": {
|
| 8 |
-
"file_extension": ".pdf",
|
| 9 |
-
"content_length": 277778,
|
| 10 |
-
"word_count": 42622
|
| 11 |
-
},
|
| 12 |
-
"tags": [],
|
| 13 |
-
"summary": null,
|
| 14 |
-
"category": null,
|
| 15 |
-
"language": null,
|
| 16 |
-
"content_length": 277778
|
| 17 |
-
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
data/vector_store/content_index.index
DELETED
|
@@ -1,3 +0,0 @@
|
|
| 1 |
-
version https://git-lfs.github.com/spec/v1
|
| 2 |
-
oid sha256:a4c8c6524348ec9e7e2e23bf1061354fd46ad4f61558c404b1766864fb69fe2f
|
| 3 |
-
size 1439277
|
|
|
|
|
|
|
|
|
|
|
|
data/vector_store/content_index_metadata.json
DELETED
|
The diff for this file is too large to render.
See raw diff
|
|
|