Nihal2000 commited on
Commit
8c7eda6
·
1 Parent(s): e2c22a2

deleted privous vector stores

Browse files
app.py CHANGED
@@ -535,4 +535,4 @@ def create_gradio_interface():
535
 
536
  if __name__ == "__main__":
537
  gradio_interface = create_gradio_interface()
538
- gradio_interface.launch(mcp_server=True)
 
535
 
536
  if __name__ == "__main__":
537
  gradio_interface = create_gradio_interface()
538
+ gradio_interface.launch(server_name="0.0.0.0", server_port=8080, mcp_server=True, ssr_mode=False)
data/documents/content/0e22c68a-134e-4474-af0d-1c119b576bec.txt DELETED
@@ -1,21 +0,0 @@
1
- # MCP Chatbot
2
-
3
- 1. Give me a list of tools you provide (in `connect_to_server_and_run`)
4
-
5
- ## ListToolsRequest
6
-
7
- ### MCP Client
8
-
9
- 3. Tool definitions are exposed to the LLM (in `process_query`)
10
-
11
- ### ListToolsResult
12
-
13
- 2. Here are the tools I can run
14
-
15
- ![img-0.jpeg](img-0.jpeg)
16
-
17
- ![img-1.jpeg](img-1.jpeg)
18
-
19
- ![img-2.jpeg](img-2.jpeg)
20
-
21
- ![img-3.jpeg](img-3.jpeg)
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
data/documents/content/b229c249-b844-4579-beb1-2d4185eeb732.txt DELETED
@@ -1,977 +0,0 @@
1
- --- Page 1 ---
2
- Model Context Protocol (MCP): Landscape, Security Threats,
3
- and Future Research Directions
4
- XINYI HOU, Huazhong University of Science and Technology, China
5
- YANJIE ZHAO, Huazhong University of Science and Technology, China
6
- SHENAO WANG, Huazhong University of Science and Technology, China
7
- HAOYU WANG∗,Huazhong University of Science and Technology, China
8
- The Model Context Protocol (MCP) is a standardized interface designed to enable seamless interaction between
9
- AI models and external tools and resources, breaking down data silos and facilitating interoperability across
10
- diverse systems. This paper provides a comprehensive overview of MCP, focusing on its core components,
11
- workflow, and the lifecycle of MCP servers, which consists of three key phases: creation, operation, and update.
12
- We analyze the security and privacy risks associated with each phase and propose strategies to mitigate
13
- potential threats. The paper also examines the current MCP landscape, including its adoption by industry
14
- leaders and various use cases, as well as the tools and platforms supporting its integration. We explore future
15
- directions for MCP, highlighting the challenges and opportunities that will influence its adoption and evolution
16
- within the broader AI ecosystem. Finally, we offer recommendations for MCP stakeholders to ensure its secure
17
- and sustainable development as the AI landscape continues to evolve.
18
- CCS Concepts: •General and reference →Surveys and overviews ;•Security and privacy →Software
19
- and application security ;•Computing methodologies →Artificial intelligence .
20
- Additional Key Words and Phrases: Model Context Protocol, MCP, Vision paper, Security
21
- ACM Reference Format:
22
- Xinyi Hou, Yanjie Zhao, Shenao Wang, and Haoyu Wang. 2025. Model Context Protocol (MCP): Landscape,
23
- Security Threats, and Future Research Directions. 1, 1 (April 2025), 20 pages. https://doi.org/10.1145/nnnnnnn.
24
- nnnnnnn
25
- 1 INTRODUCTION
26
- In recent years, the vision of autonomous AI agents capable of interacting with a wide range of
27
- tools and data sources has gained significant momentum. This progress accelerated in 2023 with the
28
- introduction of function calling by OpenAI, which allowed language models to invoke external
29
- APIs in a structured way [ 38]. This advancement expanded the capabilities of LLMs, enabling
30
- them to retrieve real-time data, perform computations, and interact with external systems. As
31
- function calling gained adoption, an ecosystem formed around it. OpenAI introduced the ChatGPT
32
- plugin [37], allowing developers to build callable tools for ChatGPT. LLM app stores such as Coze [ 4]
33
- and Yuanqi [ 50] have launched their plugin stores , supporting tools specifically designed for
34
- ∗Haoyu Wang is the corresponding author (haoyuwang@hust.edu.cn).
35
- Authors’ addresses: Xinyi Hou, xinyihou@hust.edu.cn, Huazhong University of Science and Technology, Wuhan, China;
36
- Yanjie Zhao, yanjie_zhao@hust.edu.cn, Huazhong University of Science and Technology, Wuhan, China; Shenao Wang,
37
- shenaowang@hust.edu.cn, Huazhong University of Science and Technology, Wuhan, China; Haoyu Wang, haoyuwang@
38
- hust.edu.cn, Huazhong University of Science and Technology, Wuhan, China.
39
- Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee
40
- provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the
41
- full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored.
42
- Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires
43
- prior specific permission and/or a fee. Request permissions from permissions@acm.org.
44
- ©2025 Copyright held by the owner/author(s). Publication rights licensed to ACM.
45
- ACM XXXX-XXXX/2025/4-ART
46
- https://doi.org/10.1145/nnnnnnn.nnnnnnn
47
- , Vol. 1, No. 1, Article . Publication date: April 2025.arXiv:2503.23278v2 [cs.CR] 6 Apr 2025
48
-
49
- --- Page 2 ---
50
- 2 X Hou, Y Zhao, S Wang, and H Wang
51
- their platforms. Frameworks like LangChain [ 26] and LlamaIndex [ 29] provided standardized tool
52
- interfaces , making it easier to integrate LLMs with external services. Other AI providers, including
53
- Anthropic, Google, and Meta, introduced similar mechanisms, further driving adoption. Despite
54
- these advancements, integrating tools remains fragmented . Developers must manually define
55
- interfaces, manage authentication, and handle execution logic for each service. Function calling
56
- mechanisms vary across platforms, requiring redundant implementations. Additionally, current
57
- approaches rely on predefined workflows, limiting AI agents’ flexibility in dynamically
58
- discovering and orchestrating tools .
59
- In late 2024, Anthropic introduced the Model Context Protocol (MCP)[ 3], a general-purpose pro-
60
- tocol standardizing AI-tool interactions. Inspired by the Language Server Protocol (LSP) [ 22], MCP
61
- provides a flexible framework for AI applications to communicate with external tools dynamically.
62
- Instead of relying on predefined tool mappings, MCP allows AI agents to autonomously discover,
63
- select, and orchestrate tools based on task context. It also supports human-in-the-loop mechanisms,
64
- enabling users to inject data or approve actions as needed. By unifying interfaces, MCP simplifies
65
- the development of AI applications and improves their flexibility in handling complex workflows.
66
- Since its release, MCP has rapidly grown from a niche protocol to a key foundation for AI-native
67
- application development. A thriving ecosystem has emerged, with thousands of community-driven
68
- MCP servers enabling model access to systems like GitHub [ 41], Slack [ 42], and even 3D design tools
69
- like Blender [ 1]. Tools like Cursor [ 12] and Claude Desktop [ 2] demonstrate how MCP clients can
70
- extend their capabilities by installing new servers, turning developer tools, productivity platforms,
71
- and creative environments alike into multi-modal AI agents.
72
- Despite the rapid adoption of MCP, its ecosystem is still in the early stages, with key areas such
73
- as security, tool discoverability, and remote deployment lacking comprehensive solutions. These
74
- issues present untapped opportunities for further research and development. Although MCP is
75
- widely recognized for its potential in the industry, it has not yet been extensively analyzed in
76
- academic research. This gap in research motivates this paper, which provides the first analysis of
77
- the MCP ecosystem, examining its architecture and workflow, defining the lifecycle of MCP servers,
78
- and identifying potential security risks at each stage, such as installer spoofing and tool name
79
- conflict. Through this study, we present a thorough exploration of MCP’s current landscape and
80
- offer a forward-looking vision that highlights key implications, outlines future research directions,
81
- and addresses the challenges that must be overcome to ensure its sustainable growth.
82
- Our contributions are as follows:
83
- (1)We provide the first analysis of the MCP ecosystem, detailing its architecture, components,
84
- and workflow.
85
- (2)We identify the key components of MCP servers and define their lifecycle, encompassing the
86
- stages of creation, operation, and update. We also highlight potential security risks associated
87
- with each phase, offering insights into safeguarding AI-to-tool interactions.
88
- (3)We examine the current MCP ecosystem landscape, analyzing the adoption, diversity, and
89
- use cases across various industries and platforms.
90
- (4)We discuss the implications of MCP’s rapid adoption, identifying key challenges for stake-
91
- holders, and outline future research directions on security, scalability, and governance to
92
- ensure its sustainable growth.
93
- The remainder of this paper is structured as follows: § 2 compares tool invocation with and
94
- without MCP, highlighting the motivation for this study. § 3 outlines the architecture of MCP,
95
- detailing the roles of the MCP host, client, and server, as well as the lifecycle of the MCP server.
96
- § 4 examines the current MCP landscape, focusing on key industry players and adoption trends.
97
- § 5 analyzes security and privacy risks across the MCP server lifecycle and proposes mitigation
98
- , Vol. 1, No. 1, Article . Publication date: April 2025.
99
-
100
- --- Page 3 ---
101
- Model Context Protocol (MCP): Landscape, Security Threats, and Future Research Directions 3
102
- strategies. § 6 explores implications, future challenges, and recommendations to enhance MCP’s
103
- scalability and security in dynamic AI environments. § 7 reviews prior work on tool integration
104
- and security in LLM applications. Finally, § 8 concludes the whole paper.
105
- 2 BACKGROUND AND MOTIVATION
106
- 2.1 AI Tooling
107
- Before the introduction of MCP, AI applications relied on various methods, such as manual API
108
- wiring, plugin-based interfaces, and agent frameworks, to interact with external tools. As shown in
109
- Figure 1, these approaches required integrating each external service with a specific API, leading to
110
- increased complexity and limited scalability. MCP addresses these challenges by providing a
111
- standardized protocol that enables seamless and flexible interaction with multiple tools.
112
- AIApplication
113
- External Tools and ResourcesSpecific APISpecific APISpecific APIWeb ServicesMCPServerAIApplication(MCPClient)Model Context Protocolvs.WithoutMCPWithMCP
114
- Database
115
- LocalFiles
116
- Specific APISpecific APISpecific APIExternal Tools and ResourcesWeb Services
117
- Database
118
- LocalFiles
119
- Fig. 1. Tool invocation with and without MCP.
120
- 2.1.1 Manual API Wiring. In traditional implementations, developers had to establish manual API
121
- connections for each tool or service that an AI application interacted with. This process required
122
- custom authentication, data transformation, and error handling for every integration . As
123
- the number of APIs increased, the maintenance burden became significant, often leading to tightly
124
- coupled and fragile systems that were difficult to scale or modify. MCP eliminates this complexity
125
- by offering a unified interface, allowing AI models to connect with multiple tools dynamically
126
- without the need for custom API wiring.
127
- 2.1.2 Standardized Plugin Interfaces. To reduce the complexity of manual wiring, plugin-based
128
- interfaces such as OpenAI ChatGPT Plugins, introduced in November 2023 [ 37], allowed AI models
129
- to connect with external tools through standardized API schemas like OpenAPI. For example, in
130
- the OpenAI Plugin ecosystem, plugins like Zapier allowed models to perform predefined actions,
131
- such as sending emails or updating CRM records. However, these interactions were often one-
132
- directional and could not maintain state or coordinate multiple steps in a task . New LLM
133
- app stores [ 62] such as ByteDance Coze [ 4] and Tencent Yuanqi [ 50] have also emerged, offering a
134
- plugin store for web services. While these platforms expanded available tool options, they created
135
- isolated ecosystems where plugins are platform-specific , limiting cross-platform compatibility
136
- and requiring duplicate maintenance efforts. MCP stands out by being open-source and platform-
137
- agnostic, enabling AI applications to engage in rich two-way interactions with external tools,
138
- facilitating complex workflows.
139
- 2.1.3 AI Agent Tool Integration. The emergence of AI agent frameworks like LangChain [ 26] and
140
- similar tool orchestration frameworks provided a structured way for models to invoke external tools
141
- through predefined interfaces, improving automation and adaptability [ 55]. However, integrating
142
- and maintaining these tools remained largely manual, requiring custom implementations and
143
- , Vol. 1, No. 1, Article . Publication date: April 2025.
144
-
145
- --- Page 4 ---
146
- 4 X Hou, Y Zhao, S Wang, and H Wang
147
- increasing complexity as the number of tools grew. MCP simplifies this process by offering a
148
- standardized protocol that enables AI agents to seamlessly invoke, interact with, and
149
- chain multiple tools through a unified interface . This reduces manual configuration and
150
- enhances task flexibility, allowing agents to perform complex operations without extensive custom
151
- integration.
152
- 2.1.4 Retrieval-Augmented Generation (RAG) and Vector Database. Contextual information retrieval
153
- methods, such as RAG, leverage vector-based search to retrieve relevant knowledge from databases
154
- or knowledge bases, enabling models to supplement responses with up-to-date information [ 11,16].
155
- While this approach addressed the problem of knowledge cutoff and improved model accuracy, it
156
- was limited to passive retrieval of information . It did not inherently allow models to perform
157
- active operations, such as modifying data or triggering workflows. For example, a RAG-based
158
- system could retrieve relevant sections from a product documentation database to assist a customer
159
- support AI. However, if the AI needed to update customer records or escalate an issue to human
160
- support, it could not take action beyond providing textual responses. MCP extends beyond passive
161
- information retrieval by enabling AI models to interact with external data sources and tools actively,
162
- facilitating both retrieval and action in a unified workflow.
163
- 2.2 Motivation
164
- MCP has rapidly gained traction in the AI community due to its ability to standardize how AI
165
- models interact with external tools, fetch data, and execute operations. By addressing the limitations
166
- of manual API wiring, plugin interfaces, and agent frameworks, MCP has the potential to redefine
167
- AI-to-tool interactions and enable more autonomous and intelligent agent workflows. Despite
168
- its growing adoption and promising potential, MCP is still in its early stages, with an evolving
169
- ecosystem that remains incomplete. Many key aspects, such as security and tool discoverability,
170
- are yet to be fully addressed, leaving ample room for future research and improvement. Moreover,
171
- while MCP has gained rapid adoption in the industry, it is still largely unexplored in academia.
172
- Motivated by this gap, this paper is the first to analyze the current MCP landscape, examine
173
- its emerging ecosystem, and identify potential security risks . Additionally, we outline a
174
- vision for MCP’s future development and highlight the key challenges that must be addressed to
175
- support its long-term success.
176
- 3 MCP ARCHITECTURE
177
- 3.1 Core Components
178
- The MCP architecture is composed of three core components: MCP host ,MCP client , and MCP
179
- server . These components collaborate to facilitate seamless communication between AI applications,
180
- external tools, and data sources, ensuring that operations are secure and properly managed. As
181
- shown in Figure 2, in a typical workflow, the user sends a prompt to the MCP client, which analyzes
182
- the intent ,selects the appropriate tools via the MCP server, and invokes external APIs to
183
- retrieve and process the required information before notifying the user of the results.
184
- 3.1.1 MCP Host. The MCP host is an AI application that provides the environment for executing
185
- AI-based tasks while running the MCP client. It integrates interactive tools and data to enable
186
- smooth communication with external services. Examples include Claude Desktop for AI-assisted
187
- content creation, Cursor, an AI-powered IDE for code completion and software development, and
188
- AI agents that function as autonomous systems for executing complex tasks. The MCP host hosts
189
- the MCP client and ensures communication with external MCP servers.
190
- , Vol. 1, No. 1, Article . Publication date: April 2025.
191
-
192
- --- Page 5 ---
193
- Model Context Protocol (MCP): Landscape, Security Threats, and Future Research Directions 5
194
- MCP ClientsPrompt:“Can you please fetch the latest stock price of AAPL and notify me via email?”MCP Servers
195
- CapabilitiesToolsResourcesPrompts
196
- ②InitialResponse③Notification①InitialRequestTransferLayerDataSourceWeb Services
197
- Database
198
- LocalFiles
199
- Tool Selection
200
- API Invocation
201
- IntentAnalysisNotificationSampling
202
- Orchestration
203
- UserMCP Workflow
204
- (ChatApps,IDEs,···,AI Agents)MCPHosts
205
- 1:1Client
206
- Server
207
- Fig. 2. The workflow of MCP.
208
- 3.1.2 MCP Client. The MCP client acts as an intermediary within the host environment, managing
209
- communication between the MCP host and one or more MCP servers. It initiates requests to MCP
210
- servers, queries available functions, and retrieves responses that describe the server’s capabilities.
211
- This ensures seamless interaction between the host and external tools. In addition to managing
212
- requests and responses, the MCP client processes notifications from MCP servers, providing
213
- real-time updates about task progress and system status. It also performs sampling to gather data
214
- on tool usage and performance, enabling optimization and informed decision-making. The MCP
215
- client communicates through the transport layer with MCP servers, facilitating secure, reliable
216
- data exchange and smooth interaction between the host and external resources.
217
- 3.1.3 MCP Server. The MCP server enables the MCP host and client to access external systems
218
- and execute operations, offering three core capabilities: tools, resources, and prompts .
219
- •Tools: Enabling external operations . Tools allow the MCP server to invoke external services
220
- and APIs to execute operations on behalf of AI models. When the client requests an operation, the
221
- MCP server identifies the appropriate tool, interacts with the service, and returns the result. For
222
- instance, if an AI model requires real-time weather data or sentiment analysis, the MCP server
223
- connects to the relevant API, retrieves the data, and delivers it to the host. Unlike traditional
224
- function calling, which requires multiple steps and separates invocation from execution, Tools of
225
- MCP servers streamline this process by allowing the model to autonomously select and invoke
226
- the appropriate tool based on context. Once configured, these tools follow a standardized supply-
227
- and-consume model, making them modular, reusable, and easily accessible to other applications,
228
- enhancing system efficiency and flexibility.
229
- •Resources: Exposing data to AI models . Resources provide access to structured and unstruc-
230
- tured datasets that the MCP server can expose to AI models. These datasets may come from
231
- local storage, databases, or cloud platforms. When an AI model requests specific data, the MCP
232
- server retrieves and processes the relevant information, enabling the model to make data-driven
233
- decisions. For example, a recommendation system may access customer interaction logs, or a
234
- document summarization task may query a text repository.
235
- •Prompts: Reusable templates for workflow optimization . Prompts are predefined templates
236
- and workflows that the MCP server generates and maintains to optimize AI responses and
237
- streamline repetitive tasks. They ensure consistency in responses and improve task execution
238
- efficiency. For instance, a customer support chatbot may use prompt templates to provide uniform
239
- , Vol. 1, No. 1, Article . Publication date: April 2025.
240
-
241
- --- Page 6 ---
242
- 6 X Hou, Y Zhao, S Wang, and H Wang
243
- and accurate responses, while an annotation task may rely on predefined prompts to maintain
244
- consistency in data labeling.
245
- 3.2 Transport Layer and Communication
246
- The transport layer ensures secure, bidirectional communication, allowing for real-time interaction
247
- and efficient data exchange between the host environment and external systems. The transport
248
- layer manages the transmission of initial requests from the client, the delivery of server responses
249
- detailing available capabilities, and the exchange of notifications that keep the client informed of
250
- ongoing updates. Communication between the MCP client and the MCP server follows a structured
251
- process, beginning with an initial request from the client to query the server’s functionalities.
252
- Upon receiving the request, the server responds with an initial response listing the available
253
- tools, resources, and prompts the client can leverage. Once the connection is established, the
254
- system maintains a continuous exchange of notifications to ensure that changes in server status
255
- or updates are communicated back to the client in real time. This structured communication
256
- ensures high-performance interactions and keeps AI models synchronized with external resources,
257
- enhancing the effectiveness of AI applications.
258
- 3.3 MCP Server Lifecycle
259
- The MCP server lifecycle as shown in Figure 3 consists of three key phases: creation ,operation ,
260
- andupdate . Each phase defines critical activities that ensure the secure and efficient functioning
261
- of the MCP server, enabling seamless interaction between AI models and external tools, resources,
262
- and prompts.
263
- CreationMCPServerComponentsConfigurationSource CodeConfig FilesManifest
264
- MetadataNameDescriptionVersion
265
- Tool ListTool NameDescriptionPermissions
266
- Resources ListData SourcesEndpointsPermissions
267
- PromptsTemplatesWorkflowsMetadata
268
- Server Registration → Name CollisionInstaller Deployment → Installer SpoofingCode Integrity Verification → BackdoorOperationTool Execution → Tool Name ConflictSlash Command → Command OverlapSandbox Mechanism → Sandbox EscapeUpdateAuthorization → Privilege PersistenceVersion Control → Vulnerable VersionsOld Version → Configuration DriftMCPServer Lifecycle
269
- Fig. 3. MCP servers components and lifecycle.
270
- 3.3.1 MCP Server Components. The MCP server is responsible for managing external tools, data
271
- sources, and workflows, providing AI models with the necessary resources to perform tasks
272
- efficiently and securely. It comprises several key components that ensure smooth and effective
273
- operations. Metadata includes essential information about the server, such as its name, version, and
274
- description, allowing clients to identify and interact with the appropriate server. Configuration
275
- involves the source code, configuration files, and manifest, which define the server’s operational
276
- parameters, environment settings, and security policies. Tool list stores a catalog of available tools,
277
- detailing their functionalities, input-output formats, and access permissions, ensuring proper tool
278
- , Vol. 1, No. 1, Article . Publication date: April 2025.
279
-
280
- --- Page 7 ---
281
- Model Context Protocol (MCP): Landscape, Security Threats, and Future Research Directions 7
282
- management and security. Resources list governs access to external data sources, including web
283
- APIs, databases, and local files, specifying allowed endpoints and their associated permissions.
284
- Finally, Prompts and Templates include pre-configured task templates and workflows that
285
- enhance the efficiency of AI models in executing complex operations. Together, these components
286
- enable MCP servers to provide seamless tool integration, data retrieval, and task orchestration for
287
- AI-powered applications.
288
- 3.3.2 Creation Phase. The creation phase is the initial stage of the MCP server lifecycle, where the
289
- server is registered, configured, and prepared for operation. This phase involves three key steps.
290
- Server registration assigns a unique name and identity to the MCP server, allowing clients to
291
- discover and connect to the appropriate server instance. Installer deployment involves installing
292
- the MCP server and its associated components, ensuring that the correct configuration files, source
293
- code, and manifests are in place. Code integrity verification validates the integrity of the server’s
294
- codebase to prevent unauthorized modifications or tampering before the server becomes operational.
295
- Successful completion of the creation phase ensures that the MCP server is ready to handle requests
296
- and interact securely with external tools and data sources.
297
- 3.3.3 Operation Phase. The operation phase is where the MCP server actively processes requests,
298
- executes tool invocations, and facilitates seamless interaction between AI applications and external
299
- resources. Tool execution allows the MCP server to invoke the appropriate tools based on the AI
300
- application’s requests, ensuring that the selected tools perform their intended operations. Slash
301
- command handling enables the server to interpret and execute multiple commands, including
302
- those issued through user interfaces or AI agents, while managing potential command overlaps to
303
- prevent conflicts. Sandbox mechanism enforcement ensures that the execution environment is
304
- isolated and secure, preventing unauthorized access and mitigating potential risks. Throughout the
305
- operation phase, the MCP server maintains a stable and controlled environment, enabling reliable
306
- and secure task execution.
307
- 3.3.4 Update Phase. The update phase ensures that the MCP server remains secure, up-to-date, and
308
- capable of adapting to evolving requirements. This phase includes three key tasks. Authorization
309
- management verifies that post-update access permissions remain valid, preventing unauthorized
310
- use of server resources after updates. Version control maintains consistency between different
311
- server versions, ensuring that new updates do not introduce vulnerabilities or conflicts. Old version
312
- management deactivates or removes outdated versions to prevent attackers from exploiting known
313
- vulnerabilities in previous versions.
314
- Understanding the MCP server lifecycle is essential for identifying potential vulnerabilities
315
- and designing effective security measures. Each phase introduces distinct challenges that must
316
- be carefully addressed to maintain the security, efficiency, and adaptability of the MCP server in
317
- dynamic AI environments.
318
- 4 CURRENT LANDSCAPE
319
- 4.1 Ecosystem Overview
320
- 4.1.1 Key Adopters. Table 1 demonstrates how MCP has gained significant traction across diverse
321
- sectors, signaling its growing importance in enabling seamless AI-to-tool interactions. Notably,
322
- leading AI companies such as Anthropic [ 2] and OpenAI [ 39] have integrated MCP to enhance
323
- agent capabilities and improve multi-step task execution. This adoption by industry pioneers
324
- has set a precedent, encouraging other major players to follow suit. Chinese tech giants like
325
- Baidu [ 31] have also incorporated MCP into their ecosystems, highlighting the protocol’s potential
326
- to standardize AI workflows across global markets. Developer tools and IDEs, including Replit [ 43],
327
- , Vol. 1, No. 1, Article . Publication date: April 2025.
328
-
329
- --- Page 8 ---
330
- 8 X Hou, Y Zhao, S Wang, and H Wang
331
- Table 1. Overview of MCP ecosystem adoption.
332
- Category Company/Product Key Features or Use Cases
333
- Anthropic (Claude) [2] Full MCP support in the desktop version, enabling interaction with external tools.
334
- AI Models and Frameworks OpenAI [39] MCP support in Agent SDK and API for seamless integration.
335
- Baidu Maps [31] API integration using MCP to access geolocation services.
336
- Blender MCP [33] Enables Blender and Unity 3D model generation via natural language commands.
337
- Replit [43] AI-assisted development environment with MCP tool integration.
338
- Microsoft Copilot Studio [49] Extends Copilot Studio with MCP-based tool integration.
339
- Developer Tools Sourcegraph Cody [10] Implements MCP through OpenCTX for resource integration.
340
- Codeium [9] Adds MCP support for coding assistants to facilitate cross-system tasks.
341
- Cursor [12] MCP tool integration in Cursor Composer for seamless code execution.
342
- Cline [7] VS Code coding agent that manages MCP tools and servers.
343
- Zed [60] Provides slash commands and tool integration based on MCP.
344
- JetBrains [24] Integrates MCP for IDE-based AI tooling.
345
- IDEs/Editors Windsurf Editor [14] AI-assisted IDE with MCP tool interaction.
346
- TheiaAI/TheiaIDE [52] Enables MCP server interaction for AI-powered tools.
347
- Emacs MCP [32] Enhances AI functionality in Emacs by supporting MCP tool invocation.
348
- OpenSumi [40] Supports MCP tools in IDEs and enables seamless AI tool integration.
349
- Cloudflare [8] Provides remote MCP server hosting and OAuth integration.
350
- Cloud Platforms and Services Block (Square) [47] Uses MCP to enhance data processing efficiency for financial platforms.
351
- Stripe [48] Exposes payment APIs via MCP for seamless AI integration.
352
- Apify MCP Tester [51] Connects to any MCP server using SSE for API testing.
353
- Web Automation and Data LibreChat [28] Extends the current tool ecosystem through MCP integration.
354
- Goose [21] Allows building AI agents with integrated MCP server functionality.
355
- Microsoft Copilot Studio [ 49], JetBrains [ 24], and TheiaIDE [ 52], leverage MCP to facilitate agentic
356
- workflows and streamline cross-platform operations. This trend indicates a shift toward embedding
357
- MCP in developer environments to enhance productivity and reduce manual integration efforts.
358
- Furthermore, cloud platforms like Cloudflare [ 8] and financial service providers such as Block
359
- (Square) [ 47] and Stripe [ 48] are exploring MCP to improve security, scalability, and governance
360
- in multi-tenant environments. The widespread adoption of MCP by these industry leaders not
361
- only highlights its growing relevance but also points to its potential as a foundational layer in
362
- AI-powered ecosystems. As more companies integrate MCP into their operations, the protocol is
363
- set to play a central role in shaping the future of AI tool integration. Looking ahead, MCP is poised
364
- to become a key enabler of AI-driven workflows, driving more secure, scalable, and efficient AI
365
- ecosystems across industries.
366
- 4.1.2 Community-Driven MCP Servers. Anthropic has not yet released an official MCP marketplace,
367
- but the vibrant MCP community has stepped in to fill this gap by creating numerous independent
368
- server collections and platforms. As shown in Table 2, platforms such as MCP.so [ 35], Glama [ 20],
369
- and PulseMCP [ 15] host thousands of servers, allowing users to discover and integrate a wide
370
- range of tools and services. These community-driven platforms have significantly accelerated the
371
- adoption of MCP by providing accessible repositories where developers can publish, manage, and
372
- share their MCP servers. Desktop-based solutions like Dockmaster [ 34] and Toolbase [ 19] further
373
- enhance local MCP deployment capabilities, empowering developers to manage and experiment
374
- with servers in isolated environments. The rise of community-driven MCP server ecosystems
375
- reflects the growing enthusiasm for MCP and highlights the need for a formalized marketplace.
376
- 4.1.3 SDKs and Tools. With the continuous growth of community-driven tools and official SDKs,
377
- the MCP ecosystem is becoming increasingly accessible, allowing developers to integrate MCP into
378
- various applications and workflows efficiently. Official SDKs are available in multiple languages,
379
- including TypeScript ,Python ,Java ,Kotlin , and C#, providing developers with versatile options
380
- to implement MCP in different environments. In addition to official SDKs, the community has
381
- contributed numerous frameworks and utilities that simplify MCP server development. Tools such
382
- , Vol. 1, No. 1, Article . Publication date: April 2025.
383
-
384
- --- Page 9 ---
385
- Model Context Protocol (MCP): Landscape, Security Threats, and Future Research Directions 9
386
- Table 2. Overview of MCP server collections and deployment modes (As of March 27, 2025).
387
- Collection Author Mode # Servers URL
388
- MCP.so mcp.so Website 4774 mcp.so
389
- Glama glama.ai Website 3356 glama.ai
390
- PulseMCP Antanavicius et al. Website 3164 pulsemcp.com
391
- Smithery Henry Mao Website 2942 smithery.ai
392
- Dockmaster mcp-dockmaster Desktop App 517 mcp-dockmaster.com
393
- Official Collection Anthropic GitHub Repo 320 modelcontextprotocol/servers
394
- AiMCP Hekmon Website 313 aimcp.info
395
- MCP.run mcp.run Website 114 mcp.run
396
- Awesome MCP Servers Stephen Akinyemi GitHub Repo 88 appcypher/mcp-servers
397
- mcp-get registry Michael Latman Website 59 mcp-get.com
398
- Awesome MCP Servers wong2 Website 34 mcpservers.org
399
- OpenTools opentoolsteam Website 25 opentools.com
400
- Toolbase gching Desktop App 24 gettoolbase.ai
401
- make inference mkinf Website 20 mkinf.io
402
- Awesome Crypto MCP Servers Luke Fan GitHub Repo 13 badkk/crypto-mcp-servers
403
- asEasyMCP andFastMCP offer lightweight TypeScript-based solutions for quickly building MCP
404
- servers, while FastAPI to MCP Auto Generator enables the seamless exposure of FastAPI endpoints
405
- as MCP tools. For more complex scenarios, Foxy Contexts provides a Golang-based library to
406
- build MCP servers, and Higress MCP Server Hosting extends the API Gateway (based on Envoy)
407
- to host MCP servers with wasm plugins. Server generation and management platforms such as
408
- Mintlify ,Speakeasy , and Stainless further enhance the ecosystem by automating MCP server
409
- generation , providing curated MCP server lists, and enabling faster deployment with minimal
410
- manual intervention. These platforms empower organizations to rapidly create and manage secure
411
- and well-documented MCP servers.
412
- 4.2 Use Cases
413
- MCP has become a vital tool for AI applications to effectively communicate with external tools,
414
- APIs, and systems. By standardizing interactions, MCP simplifies complex workflows, boosting the
415
- efficiency of AI-driven applications. Below, we explore three key platforms (i.e., OpenAI, Cursor,
416
- and Cloudflare) that have successfully integrated MCP, highlighting their distinct use cases.
417
- 4.2.1 OpenAI: MCP Integration in AI Agents and SDKs. OpenAI has adopted MCP to standardize
418
- AI-to-tool communication, recognizing its potential to enhance integration with external tools.
419
- Recently, OpenAI introduced MCP support in its Agent SDK, enabling developers to create AI
420
- agents that seamlessly interact with external tools. In a typical workflow, developers use the Agent
421
- SDK to define tasks that require external tool invocation. When an AI agent encounters a task
422
- like retrieving data from an API or querying a database, the SDK routes the request through an
423
- MCP server. The request is transmitted via the MCP protocol, ensuring proper formatting and
424
- real-time response delivery to the agent. OpenAI’s plan to integrate MCP into the Responses API
425
- will streamline AI-to-tool communication, allowing AI models like ChatGPT to interact with tools
426
- dynamically without extra configuration. Additionally, OpenAI aims to extend MCP support to
427
- ChatGPT desktop applications, enabling AI assistants to handle various user tasks by connecting
428
- to remote MCP servers, further bridging the gap between AI models and external systems.
429
- 4.2.2 Cursor: Enhancing Software Development with MCP-Powered Code Assistants. Cursor uses
430
- MCP to enhance software development by enabling AI-powered code assistants that automate
431
- complex tasks. With MCP, Cursor allows AI agents to interact with external APIs, access code
432
- , Vol. 1, No. 1, Article . Publication date: April 2025.
433
-
434
- --- Page 10 ---
435
- 10 X Hou, Y Zhao, S Wang, and H Wang
436
- repositories, and automate workflows directly within the integrated development environment.
437
- When a developer issues a command within the IDE, the AI agent evaluates whether external tools
438
- are needed. If so, the agent sends a request to an MCP server, which identifies the appropriate
439
- tool and processes the task, such as running API tests, modifying files, or analyzing code. The
440
- results are then returned to the agent for further action. This integration helps automate repetitive
441
- tasks, minimizing errors and enhancing overall development efficiency. By simplifying complex
442
- processes, Cursor boosts both productivity and accuracy, allowing developers to execute multi-step
443
- operations effortlessly.
444
- 4.2.3 Cloudflare: Remote MCP Server Hosting and Scalability. Cloudflare has played a pivotal role
445
- in transforming MCP from a local deployment model to a cloud-hosted architecture by introducing
446
- remote MCP server hosting. This approach eliminates the complexities associated with configuring
447
- MCP servers locally, allowing clients to connect to secure, cloud-hosted MCP servers seamlessly.
448
- The workflow begins with Cloudflare hosting MCP servers in secure cloud environments that are
449
- accessible via authenticated API calls. AI agents initiate requests to the Cloudflare MCP server
450
- using OAuth-based authentication, ensuring that only authorized entities can access the server.
451
- Once authenticated, the agent dynamically invokes external tools and APIs through the MCP server,
452
- executing tasks such as data retrieval, document processing, or API integration. This approach
453
- not only reduces the risk of misconfiguration but also ensures seamless execution of AI-powered
454
- workflows across distributed environments. Furthermore, Cloudflare’s multi-tenant architecture
455
- allows multiple users to securely access and manage their own MCP instances, ensuring isolation
456
- and preventing data leakage. Cloudflare’s solution thus extends MCP’s capabilities by enabling
457
- enterprise-grade scalability and secure multi-device interoperability.
458
- The adoption of MCP by platforms like OpenAI, Cursor, and Cloudflare highlights its flexibility
459
- and growing role in AI-driven workflows, enhancing efficiency, adaptability, and scalability across
460
- development tools, enterprise applications, and cloud services.
461
- 5 SECURITY AND PRIVACY ANALYSIS
462
- MCP servers, as open and extensible platforms, introduce various security risks throughout their
463
- lifecycle. In this section, we analyze security threats across different phases: creation ,operation ,
464
- andupdate . Each phase of the MCP server lifecycle presents unique challenges that, if not properly
465
- mitigated, can compromise system integrity, data security, and user privacy.
466
- 5.1 Security Risks in the Creation Phase
467
- The creation phase of an MCP server involves registering the server, deploying the installer, and
468
- verifying code integrity. This phase introduces three key risks: name collision, installer spoofing,
469
- and code injection/backdoor.
470
- 5.1.1 Name Collision. Server name collision occurs when a malicious entity registers an MCP
471
- server with an identical or deceptively similar name to a legitimate server, deceiving users during the
472
- installation phase. Since MCP clients primarily rely on the server’s name and description when
473
- selecting servers , they are vulnerable to such impersonation attacks. Once a compromised server is
474
- installed, it can mislead AI agents and clients into invoking the malicious server, potentially exposing
475
- sensitive data, executing unauthorized commands, or disrupting workflows. For example, an attacker
476
- could register a server named mcp-github that mimics the legitimate github-mcp server, allowing
477
- them to intercept and manipulate sensitive interactions between AI agents and trusted services.
478
- Although MCP currently operates primarily in local environments, future adoption in multi-
479
- tenant environments introduces additional risks of name collision. In these scenarios, where
480
- multiple organizations or users might register servers with similar names, the lack of centralized
481
- , Vol. 1, No. 1, Article . Publication date: April 2025.
482
-
483
- --- Page 11 ---
484
- Model Context Protocol (MCP): Landscape, Security Threats, and Future Research Directions 11
485
- naming control can increase the likelihood of confusion and impersonation attacks. Additionally,
486
- asMCP marketplaces grow to support public server listings, supply chain attacks may
487
- become a critical concern , where malicious servers can replace legitimate ones. To mitigate
488
- these risks, future research can focus on establishing strict namespace policies, implementing
489
- cryptographic server verification, and designing reputation-based trust systems to secure MCP
490
- server registrations.
491
- 5.1.2 Installer Spoofing. Installer spoofing occurs when attackers distribute modified MCP server
492
- installers that introduce malicious code or backdoors during the installation process. Each MCP
493
- server requires a unique configuration that users must manually set up in their local environments
494
- before the client can invoke the server. This manual configuration process creates a barrier for
495
- less technical users, prompting the emergence of unofficial auto-installers that automate the
496
- setup process. As shown in Table 3, tools such as Smithery-CLI ,mcp-get , and mcp-installer
497
- streamline the installation process, allowing users to quickly configure MCP servers without dealing
498
- with intricate server settings.
499
- Table 3. Unofficial MCP auto installers (As of March 27, 2025).
500
- Tool Author # Stars # Servers URL
501
- Smithery CLI Henry Mao 170 2942 smithery.ai
502
- mcp.run Dylibso / 118 docs.mcp.run
503
- mcp-get Michael Latman 318 59 mcp-get.com
504
- Toolbase gching / 24 gettoolbase.ai
505
- mcp-installer Ani Betts 767 NL1mcp-installer
506
- 1Enables MCP server installation through natural language interaction with the
507
- client.
508
- However, while these auto-installers enhance usability, they also introduce new attack surfaces
509
- by potentially distributing compromised packages. Since these unofficial installers are often sourced
510
- from unverified repositories or community-driven platforms, they may inadvertently expose users
511
- to security risks such as installing tampered servers or misconfigured environments. Attackers
512
- canexploit these auto-installers by embedding malware that grants unauthorized access,
513
- modifies system configurations, or creates persistent backdoors . Moreover, most users
514
- who opt for one-click installations rarely review the underlying code for potential security
515
- vulnerabilities, making it easier for attackers to distribute compromised versions undetected.
516
- Addressing these challenges requires developing a standardized, secure installation framework
517
- for MCP servers, enforcing package integrity checks, and establishing reputation-based trust
518
- mechanisms to assess the credibility of auto-installers in the MCP ecosystem.
519
- 5.1.3 Code Injection/Backdoor. Code injection attacks occur when malicious code is surreptitiously
520
- embedded into the MCP server’s codebase during the creation phase, often bypassing traditional
521
- security checks. It targets the server’s source code or configuration files, embedding hidden back-
522
- doors that persist even after updates or security patches. These backdoors allow attackers to
523
- silently maintain control over the server, enabling actions such as unauthorized data exfiltration,
524
- privilege escalation, or command manipulation. Code injection is particularly insidious because
525
- it can be introduced by compromised dependencies, vulnerable build pipelines, or unauthorized
526
- modifications to the server’s source code. Since MCP servers often rely on community-maintained
527
- components and open-source libraries, ensuring the integrity of these dependencies is critical.
528
- To mitigate this risk, rigorous code integrity verification, strict dependency management,
529
- and regular security audits should be implemented to detect unauthorized modifications
530
- , Vol. 1, No. 1, Article . Publication date: April 2025.
531
-
532
- --- Page 12 ---
533
- 12 X Hou, Y Zhao, S Wang, and H Wang
534
- and prevent the introduction of malicious code . Additionally, adopting reproducible builds
535
- and enforcing checksum validation during deployment can further safeguard MCP servers from
536
- injection-based threats.
537
- 5.2 Security Risks in the Operation Phase
538
- The operation phase is when the MCP server actively executes tools, processes slash commands,
539
- and interacts with external APIs. This phase introduces three major risks: tool name conflicts, slash
540
- command overlap, and sandbox escape.
541
- 5.2.1 Tool Name Conflicts. Tool name conflicts arise when multiple tools within the MCP ecosystem
542
- share identical or similar names, leading to ambiguity and confusion during tool selection and
543
- execution. This can result in AI applications inadvertently invoking the wrong tool, potentially
544
- executing malicious commands or leaking sensitive information. A common attack scenario involves
545
- a malicious actor registering a tool named send_email that mimics a legitimate email-sending tool.
546
- If the MCP client invokes the malicious version, sensitive information intended for trusted recipients
547
- may be redirected to an attacker-controlled endpoint, compromising data confidentiality. Beyond
548
- name similarity, our experiments revealed that malicious actors can further manipulate tool
549
- selection by embedding deceptive phrases in tool descriptions. Specifically, we observed that if a
550
- tool’s description explicitly contains directives like “this tool should be prioritized” or “prefer using
551
- this tool first”, the MCP client is more likely to select that tool, even when its functionality is inferior
552
- or potentially harmful. This introduces a severe risk of toolflow hijacking , where attackers can
553
- leverage misleading descriptions to influence tool selection and gain control over critical workflows.
554
- This underscores the need for researchers to develop advanced validation and anomaly detection
555
- techniques to identify and mitigate deceptive tool descriptions, ensuring accurate and secure AI
556
- tool selection.
557
- 5.2.2 Slash Command Overlap. Slash command overlap occurs when multiple tools define identical
558
- or similar commands, leading to ambiguity during command execution. This overlap introduces
559
- the risk of executing unintended actions, especially when AI applications dynamically select and
560
- invoke tools based on contextual cues. Malicious actors can exploit this ambiguity by introducing
561
- conflicting commands that manipulate tool behavior, potentially compromising system integrity or
562
- exposing sensitive data. For instance, if one tool registers a /delete command to remove temporary
563
- files while another uses the same command to erase critical system logs, an AI application may
564
- mistakenly execute the incorrect command, potentially causing data loss or system instability.
565
- Similar issues have been observed in team chat systems such as Slack, where overlapping command
566
- registrations allowed unauthorized tools to hijack legitimate invocations, resulting in security
567
- breaches and operational disruptions [ 61]. Since slash commands are often surfaced as user-
568
- facing shortcuts in client interfaces, misinterpreted or conflicting commands can lead to
569
- dangerous outcomes , especially in multi-tool environments. To minimize this risk, MCP clients
570
- should establish context-aware command resolution, apply command disambiguation techniques,
571
- and prioritize execution based on verified tool metadata.
572
- 5.2.3 Sandbox Escape. Sandboxing isolates the execution environment of MCP tools, restricting
573
- their access to critical system resources and protecting the host system from potentially harmful
574
- operations. However, sandbox escape vulnerabilities arise when attackers exploit flaws in the
575
- sandbox implementation, enabling them to break out of the restricted environment and gain
576
- unauthorized access to the host system. Once outside the sandbox, attackers can execute arbitrary
577
- code, manipulate sensitive data, or escalate privileges, compromising the security and stability of the
578
- MCP ecosystem. Common attack vectors include exploiting weaknesses in system calls, improperly
579
- , Vol. 1, No. 1, Article . Publication date: April 2025.
580
-
581
- --- Page 13 ---
582
- Model Context Protocol (MCP): Landscape, Security Threats, and Future Research Directions 13
583
- handled exceptions, and vulnerabilities in third-party libraries. For instance, a malicious MCP tool
584
- could exploit unpatched vulnerabilities in the underlying container runtime to bypass confinement
585
- and execute commands with elevated privileges. Similarly, side-channel attacks may allow attackers
586
- to extract sensitive data, undermining the intended isolation of the sandbox. Examining real-world
587
- sandbox escape scenarios in MCP environments can provide valuable insights for strengthening
588
- sandbox security and preventing future exploitation.
589
- 5.3 Security Risks in the Update Phase
590
- The update phase involves managing server versions, modifying configurations, and adjusting
591
- access controls. This phase introduces three critical risks: post-update privilege persistence, re-
592
- deployment of vulnerable versions, and configuration drift.
593
- 5.3.1 Post-Update Privilege Persistence. Post-update privilege persistence occurs when outdated
594
- or revoked privileges remain active after an MCP server update, allowing previously authorized
595
- users or malicious actors to retain elevated privileges. This vulnerability arises when privilege
596
- modifications, such as API key revocations or permission changes, are not properly synchro-
597
- nized or invalidated following server updates . If these outdated privileges persist, attackers
598
- may exploit them to maintain unauthorized access to sensitive resources or perform malicious
599
- operations. For example, in API-driven environments like GitHub or AWS, privilege persistence
600
- has been observed when outdated OAuth tokens or IAM session tokens remain valid after privilege
601
- revocation. Similarly, in MCP ecosystems, if a revoked API key or modified role configuration is
602
- not promptly invalidated after an update, an attacker could continue invoking privileged actions,
603
- potentially compromising the integrity of the system. Enforcing strict privilege revocation policies,
604
- ensuring privilege changes propagate consistently across all server instances, and implementing
605
- automatic expiration for API keys and session tokens are essential to reducing the likelihood
606
- of privilege persistence. Comprehensive logging and auditing of privilege modifications further
607
- enhance visibility and help detect inconsistencies that could indicate privilege persistence.
608
- 5.3.2 Re-deployment of Vulnerable Versions. MCP servers, being open-source and maintained by
609
- individual developers or community contributors , lack a centralized platform for auditing
610
- and enforcing security updates. Users typically download MCP server packages from repositories
611
- like GitHub, npm, or PyPi and configure them locally, often without formal review processes.
612
- This decentralized model increases the risk of re-deploying vulnerable versions, either due to
613
- delayed updates, version rollbacks, or reliance on unverified package sources. When users update
614
- MCP servers, they may unintentionally roll back to older, vulnerable versions to address compat-
615
- ibility issues or maintain stability. Additionally, unofficial auto-installers, such as mcp-get and
616
- mcp-installer , which streamline server installation, may default to cached or outdated versions,
617
- exposing systems to previously patched vulnerabilities. Since these tools often prioritize ease of
618
- use over security , they may lack version verification or fail to notify users about critical updates.
619
- Because security patches in the MCP ecosystem rely on community-driven maintenance, delays
620
- between vulnerability disclosure and patch availability are common . Users who do not
621
- actively track updates or security advisories may unknowingly continue using vulnerable versions,
622
- creating opportunities for attackers to exploit known flaws. For example, an attacker could exploit
623
- an outdated MCP server to gain unauthorized access or manipulate server operations. From a
624
- research perspective, analyzing version management practices in MCP environments can identify
625
- potential gaps and highlight the need for automated vulnerability detection and mitigation. On the
626
- other hand, there is also a pressing need to establish an official package management system
627
- with a standardized packaging format for MCP servers and a centralized server registry to
628
- facilitate secure discovery and verification of available MCP servers.
629
- , Vol. 1, No. 1, Article . Publication date: April 2025.
630
-
631
- --- Page 14 ---
632
- 14 X Hou, Y Zhao, S Wang, and H Wang
633
- 5.3.3 Configuration Drift. Configuration drift occurs when unintended changes accumulate in
634
- the system configuration over time, deviating from the original security baseline. These devia-
635
- tions often arise due to manual adjustments, overlooked updates, or conflicting modifications
636
- made by different tools or users. In MCP environments, where servers are typically configured
637
- and maintained locally by end-users, such inconsistencies can introduce exploitable gaps and
638
- undermine the overall security posture. With the emergence of remote MCP server support, such
639
- as Cloudflare’s hosted MCP environments, configuration drift becomes an even more pressing
640
- concern. Unlike local MCP deployments, where configuration issues may only affect a single user’s
641
- environment, configuration drift in remote or cloud-based MCP servers can impact multiple users
642
- or organizations simultaneously. Misconfigurations in multi-tenant environments may expose
643
- sensitive data, lead to privilege escalation, or inadvertently grant malicious actors broader access
644
- than intended. Addressing this issue requires the implementation of automated configuration
645
- validation mechanisms and regular consistency checks to ensure that both local and remote MCP
646
- environments adhere to secure baseline configurations.
647
- 6 DISCUSSION
648
- 6.1 Implications
649
- The rapid adoption of MCP is transforming the AI application ecosystem, introducing new oppor-
650
- tunities and challenges that have significant implications for developers, users, MCP ecosystem
651
- maintainers, and the broader AI community.
652
- For developers , MCP reduces the complexity of integrating external tools, enabling the creation
653
- of more versatile and capable AI agents that can perform complex, multi-step tasks. By providing a
654
- standardized interface for invoking tools, MCP shifts the focus from managing intricate integrations
655
- to enhancing agent logic and functionality. However, this increased efficiency comes with the
656
- responsibility to ensure that MCP implementations are secure, version-controlled, and aligned with
657
- best practices. Developers must remain vigilant about maintaining secure tool configurations and
658
- preventing potential misconfigurations that could expose systems to vulnerabilities.
659
- For users , MCP enhances the experience by enabling seamless interactions between AI agents and
660
- external tools, automating workflows across platforms such as enterprise data management and IoT
661
- integration. It reduces the need for manual operations and improves efficiency in handling complex
662
- tasks. However, as MCP servers gain deeper access to sensitive data and critical operations, users
663
- must remain vigilant about the risks posed by unverified tools and misconfigured servers. Careless
664
- installation or untrusted sources may cause data leaks, unauthorized actions, or system instability.
665
- For MCP ecosystem maintainers , the decentralized nature of MCP server development and
666
- distribution introduces a fragmented security landscape. MCP servers are often hosted on open-
667
- source platforms, where updates and patches are community-driven and may vary in quality and
668
- frequency. Without centralized oversight, inconsistencies in server configurations and outdated
669
- versions can introduce potential vulnerabilities. As the MCP ecosystem evolves to support remote
670
- hosting and multi-tenant environments, maintainers must remain attentive to potential risks
671
- associated with configuration drift, privilege persistence, and re-deployment of vulnerable versions.
672
- For the broader AI community , MCP unlocks new possibilities by enhancing agentic workflows
673
- through cross-system coordination, dynamic tool invocation, and collaborative multi-agent systems.
674
- MCP’s ability to standardize interactions between agents and tools has the potential to accelerate AI
675
- adoption across industries, driving innovation in fields such as healthcare, finance, and enterprise
676
- automation. However, as MCP adoption grows, the AI community must address emerging ethical
677
- and operational concerns, such as ensuring fair and unbiased tool selection, safeguarding sensitive
678
- user data, and preventing potential misuse of AI capabilities. Balancing these considerations will be
679
- , Vol. 1, No. 1, Article . Publication date: April 2025.
680
-
681
- --- Page 15 ---
682
- Model Context Protocol (MCP): Landscape, Security Threats, and Future Research Directions 15
683
- essential to ensuring that MCP’s benefits are widely distributed while maintaining accountability
684
- and trust within the AI ecosystem.
685
- 6.2 Challenges
686
- Despite its potential, MCP’s adoption brings forth a range of challenges that need to be addressed
687
- to ensure its sustainable growth and responsible development:
688
- Lack of centralized security oversight. Since MCP servers are managed by independent develop-
689
- ers and contributors, there is no centralized platform to audit, enforce, or validate security standards.
690
- This decentralized model increases the likelihood of inconsistencies in security practices, making it
691
- difficult to ensure that all MCP servers adhere to secure development principles. Moreover, the
692
- absence of a unified package management system for MCP servers complicates the installation and
693
- maintenance process, increasing the likelihood of deploying outdated or misconfigured versions.
694
- The use of unofficial installation tools across different MCP clients further introduces variability in
695
- server deployment, making it harder to maintain consistent security standards.
696
- Authentication and authorization gaps. MCP currently lacks a standardized framework for
697
- managing authentication and authorization across different clients and servers. Without a unified
698
- mechanism to verify identities and regulate access, it becomes difficult to enforce granular permis-
699
- sions, especially in multi-tenant environments where multiple users and agents may interact with
700
- the same MCP server. The absence of robust authentication protocols increases the risk of unautho-
701
- rized tool invocation and exposes sensitive data to malicious actors. Moreover, inconsistencies in
702
- how different MCP clients handle user credentials further exacerbate these security challenges,
703
- making it difficult to maintain a consistent access control policy across deployments.
704
- Insufficient debugging and monitoring mechanisms. MCP lacks comprehensive debugging
705
- and monitoring mechanisms, making it difficult for developers to diagnose errors, trace tool
706
- interactions, and assess system behavior during tool invocation. Since MCP clients and servers
707
- operate independently, inconsistencies in error handling and logging can obscure critical security
708
- events or operational failures. Without robust monitoring frameworks and standardized logging
709
- mechanisms, identifying anomalies, preventing system failures, and mitigating potential security
710
- incidents becomes challenging, hindering the development of more resilient MCP ecosystems.
711
- Maintaining consistency in multi-step, cross-system workflows. MCP allows AI agents to
712
- execute multi-step workflows by invoking multiple tools across different systems through a unified
713
- interface. Ensuring consistent context across successive tool interactions is inherently difficult
714
- due to the distributed nature of these systems. Without effective state management and error
715
- recovery mechanisms, MCP risks propagating errors or losing intermediate results, leading to
716
- incomplete or inconsistent workflows. Additionally, dynamic coordination across diverse platforms
717
- can introduce delays and conflicts, further complicating the seamless execution of workflows within
718
- MCP environments.
719
- Scalability challenges in multi-tenant environments. As MCP evolves to support remote server
720
- hosting and multi-tenant environments, maintaining consistent performance, security, and tenant
721
- isolation becomes increasingly complex. Without robust mechanisms for resource management
722
- and tenant-specific configuration policies, misconfigurations can lead to data leakage, performance
723
- issues, and privilege escalation. Ensuring scalability and isolation is critical for MCP’s reliability in
724
- enterprise deployments.
725
- Challenges in embedding MCP in smart environments. Integrating MCP into smart environ-
726
- ments, such as smart homes, industrial IoT systems, or enterprise automation platforms, introduces
727
- unique challenges related to real-time responsiveness, interoperability, and security. MCP servers
728
- in these environments must handle continuous streams of data from multiple sensors and devices
729
- while maintaining low-latency responses. Moreover, ensuring seamless interaction between AI
730
- , Vol. 1, No. 1, Article . Publication date: April 2025.
731
-
732
- --- Page 16 ---
733
- 16 X Hou, Y Zhao, S Wang, and H Wang
734
- agents and heterogeneous device ecosystems often requires custom adaptations, increasing devel-
735
- opment complexity. Compromised MCP servers in smart environments can lead to unauthorized
736
- control over critical systems, threatening both safety and data integrity.
737
- 6.3 Recommendations for MCP stakeholders
738
- To safeguard the long-term success and security of MCP, all stakeholders, including MCP main-
739
- tainers, developers, researchers, and end-users, should implement best practices and proactively
740
- address evolving challenges within the ecosystem.
741
- Recommendations for MCP maintainers. MCP maintainers play a critical role in establishing
742
- security standards, improving version control, and ensuring ecosystem stability. To reduce the
743
- risk of security vulnerabilities, maintainers should establish a formal package management system
744
- that enforces strict version control and ensures that only verified updates are distributed to users.
745
- Additionally, introducing a centralized server registry would enable users to discover and validate
746
- MCP servers more securely, reducing the risk of interacting with malicious or misconfigured
747
- servers. To further enhance security, maintainers should promote the adoption of cryptographic
748
- signatures for verifying MCP packages and encourage periodic security audits to identify and
749
- mitigate vulnerabilities. Moreover, implementing a secure sandboxing framework can help prevent
750
- privilege escalation and protect host environments from malicious tool executions.
751
- Recommendations for developers. Developers integrating MCP into AI applications should
752
- prioritize security and resilience by adhering to secure coding practices and maintaining thorough
753
- documentation. Enforcing version management policies can prevent rollbacks to vulnerable versions,
754
- while thorough testing ensures reliable MCP integrations before deployment. To mitigate configura-
755
- tion drift, developers should automate configuration management and adopt infrastructure-as-code
756
- (IaC) practices. Additionally, implementing robust tool name validation and disambiguation tech-
757
- niques can prevent conflicts that lead to unintended behavior. Leveraging runtime monitoring and
758
- logging helps track tool invocations, detect anomalies, and mitigate threats effectively.
759
- Recommendations for researchers. Given the decentralized nature of MCP server deployment
760
- and the evolving threat landscape, researchers should focus on conducting systematic security
761
- analyses to uncover potential vulnerabilities in tool invocation, sandbox implementations, and
762
- privilege management. Exploring techniques to enhance sandbox security, mitigate privilege
763
- persistence, and prevent configuration drift can significantly strengthen MCP’s security posture. In
764
- addition, researchers should investigate more effective approaches for version control and package
765
- management in decentralized ecosystems to reduce the likelihood of re-deploying vulnerable
766
- versions. Researchers can help MCP maintainers and developers stay ahead of emerging threats
767
- by developing automated vulnerability detection methods and proposing secure update pipelines.
768
- Another critical area for research is the exploration of context-aware agent orchestration in multi-
769
- tool environments. As MCP increasingly supports multi-step, cross-system workflows, ensuring
770
- state consistency and preventing tool invocation conflicts becomes paramount. Researchers can
771
- explore techniques for dynamic state management, error recovery, and workflow validation to
772
- ensure seamless operation in complex environments.
773
- Recommendations for end-users. End-users should remain vigilant about security risks and
774
- adopt practices to safeguard their environments. They should prioritize using verified MCP servers
775
- and avoid unofficial installers that may introduce vulnerabilities. Regularly updating MCP servers
776
- and monitoring configuration changes can prevent misconfigurations and reduce exposure to
777
- known exploits. Properly configuring access control policies helps prevent privilege escalation
778
- and unauthorized tool usage. For users relying on remote MCP servers, choosing providers that
779
- follow strict security standards can minimize risks in multi-tenant environments. Promoting user
780
- awareness and encouraging best practices will enhance overall security and resilience.
781
- , Vol. 1, No. 1, Article . Publication date: April 2025.
782
-
783
- --- Page 17 ---
784
- Model Context Protocol (MCP): Landscape, Security Threats, and Future Research Directions 17
785
- 7 RELATED WORK
786
- 7.1 Tool Integration in LLM Applications
787
- Equipping LLMs with external tools has become a key paradigm for enhancing their capabilities
788
- in real-world tasks. This approach enables LLMs to transcend the limitations of static knowledge
789
- and interact dynamically with external systems. Recent studies have proposed frameworks to
790
- support such integration, focusing on tool representation, selection, invocation, and reasoning.
791
- Shen et al.[ 44] provide a comprehensive survey outlining a standard LLM-tool integration paradigm,
792
- identifying key challenges in user intent understanding, tool selection, and execution planning.
793
- Building on this, AutoTools[45, 46] introduces an automated framework that transforms raw tool
794
- documentation into executable functions, reducing reliance on manual engineering. EasyTool [ 59]
795
- further streamlines this process by distilling diverse and verbose tool documentation into concise
796
- and unified instructions, improving tool usability and efficiency. From an evaluation perspective,
797
- several benchmarks have emerged. ToolSandbox [ 30] emphasizes stateful and interactive tool usage
798
- with implicit dependencies, while UltraTool [ 23] focuses on complex, multi-step tasks involving
799
- planning, creation, and execution. These efforts reveal significant performance gaps and motivate
800
- better evaluations for LLM-agent capabilities. To improve agent decision-making and prompt
801
- quality, AvaTaR [ 54] proposes contrastive reasoning techniques, while Toolken+[ 56] incorporates
802
- reranking and rejection mechanisms for more precise tool use. Additionally, some works explore
803
- LLMs not just as tool users but as tool creators—ToolMaker[ 53] autonomously converts code
804
- repositories into callable tools, moving toward fully automated agents. To unify this expanding
805
- landscape, Li [ 27] proposes a taxonomy that situates tool use alongside planning and feedback
806
- learning as three core agent paradigms.
807
- As tool-augmented LLMs continue to evolve, the lack of a standardized, secure, and extensible
808
- context protocol has become a key bottleneck. MCP, with its potential to unify tool interaction across
809
- diverse systems, is poised to become the foundational layer for next-generation LLM applications,
810
- making it critical to examine its landscape, limitations, and risks.
811
- 7.2 Security Risks in LLM-Tool Interactions
812
- The integration of tool-use capabilities into LLM agents significantly expands their functionality,
813
- but also introduces new and more severe security risks. Fu et al. [ 17] demonstrate that obfuscated
814
- adversarial prompts can lead LLM agents to misuse tools, enabling attacks such as data exfiltration
815
- and unauthorized command execution. These vulnerabilities are particularly concerning as they
816
- generalize across models and modalities. A growing body of work has begun to categorize and
817
- analyze these risks. Gan et al.[ 18] and Yu et al.[ 58] propose taxonomies for threats across agent
818
- components and stages, while the OWASP Agentic Security Initiative [ 25] provides practical threat
819
- modeling frameworks. To support detection and mitigation, Chen et al.[ 5] introduce AgentGuard,
820
- which automatically discovers unsafe workflows and generates safety constraints, and ToolFuzz[ 36]
821
- identifies failures stemming from ambiguous or underspecified tool documentation. On the align-
822
- ment front, Chen et al.[ 6] propose the H2A principle, which encourages LLMs to behave with
823
- helpfulness, harmlessness, and autonomy, and introduce the ToolAlign dataset to guide safer tool
824
- usage. Ye et al.[ 57] further analyze safety risks throughout the tool-use pipeline, including malicious
825
- queries, execution misdirection, and unsafe outputs. Deng et al. [ 13] highlight broader systemic
826
- risks such as unpredictable inputs, environmental variability, and untrusted tool endpoints.
827
- These security threats may be mitigated through the structured design of MCP, but they can also
828
- persist or even evolve under this new integration paradigm. As MCP simplifies tool orchestration
829
- in LLM applications, it simultaneously introduces new potential attack surfaces, warranting deeper
830
- investigation into its security implications.
831
- , Vol. 1, No. 1, Article . Publication date: April 2025.
832
-
833
- --- Page 18 ---
834
- 18 X Hou, Y Zhao, S Wang, and H Wang
835
- 8 CONCLUSION
836
- This paper presents the first comprehensive analysis of the MCP ecosystem landscape. We examine
837
- its architecture, core components, operational workflows, and server lifecycle stages. Furthermore,
838
- we explore the adoption, diversity, and use cases, while identifying potential security threats
839
- throughout the creation, operation, and update phases. We also highlight the implications and
840
- risks associated with MCP adoption and propose actionable recommendations for stakeholders
841
- to enhance security and governance. Additionally, we outline future research directions to tackle
842
- emerging risks and improve MCP’s resilience. As MCP continues to gain traction with industry
843
- leaders such as OpenAI and Cloudflare, addressing these challenges is key to its long-term success
844
- and to enabling secure, efficient interaction with diverse external tools and services.
845
- REFERENCES
846
- [1]ahujasid. 2025. BlenderMCP - Blender Model Context Protocol Integration. https://github.com/ahujasid/blender-mcp.
847
- [2] Anthropic. 2024. For Claude Desktop Users. https://modelcontextprotocol.io/quickstart/user.
848
- [3]Anthropic. 2024. Introducing the Model Context Protocol. https://www.anthropic.com/news/model-context-protocol.
849
- [4] ByteDance. 2024. Coze plugin store. https://www.coze.com/store/plugin.
850
- [5]Jizhou Chen and Samuel Lee Cong. 2025. AgentGuard: Repurposing Agentic Orchestrator for Safety Evaluation of
851
- Tool Orchestration. CoRR abs/2502.09809 (2025). https://doi.org/10.48550/ARXIV.2502.09809 arXiv:2502.09809
852
- [6]Zhi-Yuan Chen, Shiqi Shen, Guangyao Shen, Gong Zhi, Xu Chen, and Yankai Lin. 2024. Towards Tool Use Alignment
853
- of Large Language Models. In Proceedings of the 2024 Conference on Empirical Methods in Natural Language Processing .
854
- 1382–1400.
855
- [7] Cline. 2025. Cline. https://github.com/cline/cline.
856
- [8] Cloudflare. 2025. Cloudflare. https://www.cloudflare.com.
857
- [9] Codeium. 2025. Codeium. https://codeium.com.
858
- [10] Sourcegraph Cody. 2025. Cody supports additional context through Anthropic’s Model Context Protocol. https:
859
- //sourcegraph.com/blog/cody-supports-anthropic-model-context-protocol.
860
- [11] Florin Cuconasu, Giovanni Trappolini, Federico Siciliano, Simone Filice, Cesare Campagnano, Yoelle Maarek, Nicola
861
- Tonellotto, and Fabrizio Silvestri. 2024. The Power of Noise: Redefining Retrieval for RAG Systems. CoRR abs/2401.14887
862
- (2024). https://doi.org/10.48550/ARXIV.2401.14887 arXiv:2401.14887
863
- [12] Cursor. 2025. Learn how to add and use custom MCP tools within Cursor. https://docs.cursor.com/context/model-
864
- context-protocol.
865
- [13] Zehang Deng, Yongjian Guo, Changzhou Han, Wanlun Ma, Junwu Xiong, Sheng Wen, and Yang Xiang. 2024. AI
866
- Agents Under Threat: A Survey of Key Security Challenges and Future Pathways. CoRR abs/2406.02630 (2024).
867
- https://doi.org/10.48550/ARXIV.2406.02630 arXiv:2406.02630
868
- [14] Windsurf Editor. 2025. Windsurf Editor. https://windsurf.com.
869
- [15] Antanavicius et al. 2025. PulseMCP. https://www.pulsemcp.com.
870
- [16] Wenqi Fan, Yujuan Ding, Liangbo Ning, Shijie Wang, Hengyun Li, Dawei Yin, Tat-Seng Chua, and Qing Li. 2024. A
871
- Survey on RAG Meeting LLMs: Towards Retrieval-Augmented Large Language Models. In Proceedings of the 30th ACM
872
- SIGKDD Conference on Knowledge Discovery and Data Mining, KDD 2024, Barcelona, Spain, August 25-29, 2024 , Ricardo
873
- Baeza-Yates and Francesco Bonchi (Eds.). ACM, 6491–6501. https://doi.org/10.1145/3637528.3671470
874
- [17] Xiaohan Fu, Shuheng Li, Zihan Wang, Yihao Liu, Rajesh K. Gupta, Taylor Berg-Kirkpatrick, and Earlence Fernandes.
875
- 2024. Imprompter: Tricking LLM Agents into Improper Tool Use. CoRR abs/2410.14923 (2024). https://doi.org/10.
876
- 48550/ARXIV.2410.14923 arXiv:2410.14923
877
- [18] Yuyou Gan, Yong Yang, Zhe Ma, Ping He, Rui Zeng, Yiming Wang, Qingming Li, Chunyi Zhou, Songze Li, Ting Wang,
878
- Yunjun Gao, Yingcai Wu, and Shouling Ji. 2024. Navigating the Risks: A Survey of Security, Privacy, and Ethics Threats
879
- in LLM-Based Agents. CoRR abs/2411.09523 (2024). https://doi.org/10.48550/ARXIV.2411.09523 arXiv:2411.09523
880
- [19] gching. 2025. Toolbase. https://gettoolbase.ai.
881
- [20] glama.ai. 2025. Glama MCP Servers. https://glama.ai/mcp/servers.
882
- [21] Goose. 2025. Goose. https://goose.ai.
883
- [22] Nadeeshaan Gunasinghe and Nipuna Marcus. 2021. Language Server Protocol and Implementation . Springer.
884
- [23] Shijue Huang, Wanjun Zhong, Jianqiao Lu, Qi Zhu, Jiahui Gao, Weiwen Liu, Yutai Hou, Xingshan Zeng, Yasheng
885
- Wang, Lifeng Shang, Xin Jiang, Ruifeng Xu, and Qun Liu. 2024. Planning, Creation, Usage: Benchmarking LLMs for
886
- Comprehensive Tool Utilization in Real-World Complex Scenarios. CoRR abs/2401.17167 (2024). https://doi.org/10.
887
- 48550/ARXIV.2401.17167 arXiv:2401.17167
888
- , Vol. 1, No. 1, Article . Publication date: April 2025.
889
-
890
- --- Page 19 ---
891
- Model Context Protocol (MCP): Landscape, Security Threats, and Future Research Directions 19
892
- [24] JetBrains. 2025. JetBrains MCP Server. https://plugins.jetbrains.com/plugin/26071-mcp-server.
893
- [25] Sotiropoulos John, Rosario Ron F Del, Kokuykin Evgeniy, Oakley Helen, Habler Idan, Underkoffler Kayla, Huang Ken,
894
- Steffensen Peter, Aralimatti Rakshith, Bitton Ron, et al .2025. OWASP Top 10 for LLM Apps & Gen AI Agentic Security
895
- Initiative . Ph. D. Dissertation. OWASP.
896
- [26] LangChain. 2022. LangChain: Framework for developing applications powered by language models. https://github.
897
- com/langchain-ai/langchain.
898
- [27] Xinzhe Li. 2025. A Review of Prominent Paradigms for LLM-Based Agents: Tool Use, Planning (Including RAG),
899
- and Feedback Learning. In Proceedings of the 31st International Conference on Computational Linguistics, COLING
900
- 2025, Abu Dhabi, UAE, January 19-24, 2025 , Owen Rambow, Leo Wanner, Marianna Apidianaki, Hend Al-Khalifa,
901
- Barbara Di Eugenio, and Steven Schockaert (Eds.). Association for Computational Linguistics, 9760–9779. https:
902
- //aclanthology.org/2025.coling-main.652/
903
- [28] LibreChat. 2025. LibreChat. https://librechat.ai.
904
- [29] Jerry Liu. 2022. LlamaIndex: A data framework for LLM applications. https://github.com/run-llama/llama_index.
905
- [30] Jiarui Lu, Thomas Holleis, Yizhe Zhang, Bernhard Aumayer, Feng Nan, Felix Bai, Shuang Ma, Shen Ma, Mengyu Li,
906
- Guoli Yin, Zirui Wang, and Ruoming Pang. 2024. ToolSandbox: A Stateful, Conversational, Interactive Evaluation
907
- Benchmark for LLM Tool Use Capabilities. CoRR abs/2408.04682 (2024). https://doi.org/10.48550/ARXIV.2408.04682
908
- arXiv:2408.04682
909
- [31] Baidu Maps. 2025. Baidu Maps MCP Servers. https://lbs.baidu.com/faq/api?title=mcpserver/base.
910
- [32] Emacs MCP. 2025. Emacs MCP. https://github.com/lizqwerscott/mcp.el.
911
- [33] Tripo3D MCP. 2025. Tripo3D MCP. https://blender-mcp.com/.
912
- [34] mcp dockmater. 2025. Dockmaster. https://mcp-dockmaster.com.
913
- [35] mcp.so. 2025. MCP.so. https://mcp.so/.
914
- [36] Ivan Milev, Mislav Balunović, Maximilian Baader, and Martin Vechev. 2025. ToolFuzz–Automated Agent Tool Testing.
915
- arXiv preprint arXiv:2503.04479 (2025).
916
- [37] OpenAI. 2023. ChatGPT plugins. https://openai.com/index/chatgpt-plugins/.
917
- [38] OpenAI. 2023. Funcation Calling. https://platform.openai.com/docs/guides/function-calling?api-mode=responses.
918
- [39] OpenAI. 2025. OpenAI Agents SDK - Model context protocol (MCP). https://openai.github.io/openai-agents-python/
919
- mcp/.
920
- [40] OpenSumi. 2025. OpenSumi. https://github.com/opensumi/core.
921
- [41] Model Context Protocol. 2024. GitHub MCP Server. https://github.com/modelcontextprotocol/servers/tree/main/src/
922
- github.
923
- [42] Model Context Protocol. 2024. Slack MCP Server. https://github.com/modelcontextprotocol/servers/tree/main/src/
924
- slack.
925
- [43] Replit. 2025. Replit. https://replit.com.
926
- [44] Zhuocheng Shen. 2024. LLM With Tools: A Survey. CoRR abs/2409.18807 (2024). https://doi.org/10.48550/ARXIV.2409.
927
- 18807 arXiv:2409.18807
928
- [45] Zhengliang Shi, Shen Gao, Xiuyi Chen, Yue Feng, Lingyong Yan, Haibo Shi, Dawei Yin, Zhumin Chen, Suzan Ver-
929
- berne, and Zhaochun Ren. 2024. Chain of Tools: Large Language Model is an Automatic Multi-tool Learner. CoRR
930
- abs/2405.16533 (2024). https://doi.org/10.48550/ARXIV.2405.16533 arXiv:2405.16533
931
- [46] Zhengliang Shi, Shen Gao, Lingyong Yan, Yue Feng, Xiuyi Chen, Zhumin Chen, Dawei Yin, Suzan Verberne, and
932
- Zhaochun Ren. 2025. Tool Learning in the Wild: Empowering Language Models as Automatic Tool Agents. In THE
933
- WEB CONFERENCE 2025 . https://openreview.net/forum?id=T4wMdeFEjX
934
- [47] Block (Square). 2025. Block (Square). https://glama.ai/mcp/servers/atblock/square-mcp/tools/team.
935
- [48] Stripe. 2025. Stripe. https://stripe.com.
936
- [49] Microsoft Copilot Studio. 2025. Introducing Model Context Protocol (MCP) in Copilot Studio: Simplified Integration
937
- with AI Apps and Agents. https://www.microsoft.com/en-us/microsoft-copilot/blog/copilot-studio/introducing-model-
938
- context-protocol-mcp-in-copilot-studio-simplified-integration-with-ai-apps-and-agents/.
939
- [50] Tencent. 2024. Tencent plugin shop. https://yuanqi.tencent.com/plugin-shop.
940
- [51] Apify MCP Tester. 2025. Apify MCP Tester. https://apify.com/jiri.spilka/tester-mcp-client.
941
- [52] TheiaAI/TheiaIDE. 2025. TheiaAI/TheiaIDE. https://theia-ide.org/docs/user_ai/.
942
- [53] Georg Wölflein, Dyke Ferber, Daniel Truhn, Ognjen Arandjelovic, and Jakob Nikolas Kather. 2025. LLM Agents Making
943
- Agent Tools. CoRR abs/2502.11705 (2025). https://doi.org/10.48550/ARXIV.2502.11705 arXiv:2502.11705
944
- [54] Shirley Wu, Shiyu Zhao, Qian Huang, Kexin Huang, Michihiro Yasunaga, Kaidi Cao, Vassilis N. Ioannidis, Karthik
945
- Subbian, Jure Leskovec, and James Y. Zou. 2024. AvaTaR: Optimizing LLM Agents for Tool Usage via Contrastive
946
- Reasoning. In Advances in Neural Information Processing Systems 38: Annual Conference on Neural Information Processing
947
- Systems 2024, NeurIPS 2024, Vancouver, BC, Canada, December 10 - 15, 2024 , Amir Globersons, Lester Mackey, Danielle
948
- Belgrave, Angela Fan, Ulrich Paquet, Jakub M. Tomczak, and Cheng Zhang (Eds.). http://papers.nips.cc/paper_files/
949
- , Vol. 1, No. 1, Article . Publication date: April 2025.
950
-
951
- --- Page 20 ---
952
- 20 X Hou, Y Zhao, S Wang, and H Wang
953
- paper/2024/hash/2db8ce969b000fe0b3fb172490c33ce8-Abstract-Conference.html
954
- [55] Zhiheng Xi, Wenxiang Chen, Xin Guo, Wei He, Yiwen Ding, Boyang Hong, Ming Zhang, Junzhe Wang, Senjie Jin,
955
- Enyu Zhou, Rui Zheng, Xiaoran Fan, Xiao Wang, Limao Xiong, Yuhao Zhou, Weiran Wang, Changhao Jiang, Yicheng
956
- Zou, Xiangyang Liu, Zhangyue Yin, Shihan Dou, Rongxiang Weng, Wensen Cheng, Qi Zhang, Wenjuan Qin, Yongyan
957
- Zheng, Xipeng Qiu, Xuanjing Huang, and Tao Gui. 2023. The Rise and Potential of Large Language Model Based
958
- Agents: A Survey. CoRR abs/2309.07864 (2023). https://doi.org/10.48550/ARXIV.2309.07864 arXiv:2309.07864
959
- [56] Konstantin Yakovlev, Sergey I. Nikolenko, and Andrey Bout. 2024. Toolken+: Improving LLM Tool Usage with Reranking
960
- and a Reject Option. CoRR abs/2410.12004 (2024). https://doi.org/10.48550/ARXIV.2410.12004 arXiv:2410.12004
961
- [57] Junjie Ye, Sixian Li, Guanyu Li, Caishuang Huang, Songyang Gao, Yilong Wu, Qi Zhang, Tao Gui, and Xuanjing Huang.
962
- 2024. ToolSword: Unveiling Safety Issues of Large Language Models in Tool Learning Across Three Stages. CoRR
963
- abs/2402.10753 (2024). https://doi.org/10.48550/ARXIV.2402.10753 arXiv:2402.10753
964
- [58] Miao Yu, Fanci Meng, Xinyun Zhou, Shilong Wang, Junyuan Mao, Linsey Pang, Tianlong Chen, Kun Wang, Xinfeng
965
- Li, Yongfeng Zhang, et al .2025. A Survey on Trustworthy LLM Agents: Threats and Countermeasures. arXiv preprint
966
- arXiv:2503.09648 (2025).
967
- [59] Siyu Yuan, Kaitao Song, Jiangjie Chen, Xu Tan, Yongliang Shen, Kan Ren, Dongsheng Li, and Deqing Yang. 2024.
968
- EASYTOOL: Enhancing LLM-based Agents with Concise Tool Instruction. CoRR abs/2401.06201 (2024). https:
969
- //doi.org/10.48550/ARXIV.2401.06201 arXiv:2401.06201
970
- [60] Zed. 2025. Zed - Model Context Protocol. https://zed.dev/docs/assistant/model-context-protocol.
971
- [61] Mingming Zha, Jice Wang, Yuhong Nan, Xiaofeng Wang, Yuqing Zhang, and Zelin Yang. 2022. Hazard Integrated:
972
- Understanding Security Risks in App Extensions to Team Chat Systems. In 29th Annual Network and Distributed System
973
- Security Symposium, NDSS 2022, San Diego, California, USA, April 24-28, 2022 . The Internet Society. https://www.ndss-
974
- symposium.org/ndss-paper/auto-draft-262/
975
- [62] Yanjie Zhao, Xinyi Hou, Shenao Wang, and Haoyu Wang. 2024. LLM App Store Analysis: A Vision and Roadmap.
976
- CoRR abs/2404.12737 (2024). https://doi.org/10.48550/ARXIV.2404.12737 arXiv:2404.12737
977
- , Vol. 1, No. 1, Article . Publication date: April 2025.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
data/documents/content/b3d0767c-1dd8-4f05-a9f8-d69d82f2abde.txt DELETED
@@ -1,1137 +0,0 @@
1
- --- Page 1 ---
2
- A Study on the MCP × A2A Framework for Enhancing
3
- Interoperability of LLM -based Autonomous Agents
4
- Cheonsu Jeong
5
- Hyper Automation Team, SAMSUNG SDS, Seoul , 05510 , South Korea
6
-
7
-
8
- I. INTRODUCTION
9
- ECENT advancements in artificial intelligence (AI) have highlighted
10
- the importance of large language models (LLMs) across various
11
- domains [1]. Generative AI, which can create new content such as text,
12
- images, audio, and video based on extensive training data, en ables
13
- users to leverage AI services with ease [1],[2]. In particular, the
14
- development of AI has led to a growing utilization of autonomous
15
- agents —AI systems capable of independently performing tasks,
16
- solving problems, and supporting decision -making based o n user
17
- inputs. However, complex real -world problems often exceed the
18
- capabilities of a single agent. This has given rise to the necessity of
19
- multi -agent systems (MAS), where multiple agents collaborate to
20
- overcome such limitations. With the emergence of LL Ms, LLM -based
21
- MASs have gained attention as a new paradigm [4]. Unlike traditional
22
- MASs, these systems enable more flexible and adaptive collaboration
23
- through natural language processing. Each agent can specialize in a
24
- specific domain while coordinating co mplex tasks through natural
25
- language interaction [5].
26
- For agents to be effectively utilized in real -world environments,
27
- seamless integration with external tools, APIs, and databa ses is
28
- critical. To address this, Anthropic released the Model Context
29
- Protocol (MCP) as open source in November 2024 [6]. Similarly,
30
- efficient communication and collaboration among agents is a
31
- prerequisite for successful MAS deployment. However, agent sys tems
32
- developed by different frameworks and vendors have faced
33
- interoperability limitations. To resolve this, Google released the
34
- Agent -to-Agent (A2A) protocol as an open source project in April 2025
35
- [7]. A2A provides a standardized communication framework for
36
- agents to collaborate across different environments, while MCP
37
- offers a structured I/O system that enables agents to interact with external tools and resources [8]. Although these protocols function
38
- independently, they serve complementary roles and for m a
39
- foundational basis for building practical agent ecosystems.
40
- This paper analyzes the technical architecture and operational
41
- principles of A2A and MCP, exploring how they synergistically
42
- contribute to constructing scalable and interoperable agent
43
- ecosystems. By presenting an integrated architecture using
44
- LangGraph an d detailing key implementation logic, we demonstrate
45
- how theoretical concepts are translated into real -world applications.
46
- Through this combined use of A2A and MCP, we propose a practical
47
- approach to enhancing interoperability and development efficiency
48
- of LLM-based agent systems across various enterprise environments,
49
- thereby unlocking the potential to transition agent technologies from
50
- experimental stages to fully deployed services.
51
- II. RELATED WORK
52
- A. Concept and Evolution of Autonomous Agents
53
- An automation age nt refers to more than just a task executor —it
54
- is an intelligent software robot that integrates AI technologies to
55
- perceive complex situations, analyze data, interact with users, and
56
- even improve its performance through learning [9]. Autonomous
57
- agents are systems that perceive their environment, autonomously
58
- set goals or formulate plans to achieve predefined objectives, and
59
- make decisions and act independently by learning and adapting [10],
60
- [11]. These agents can respond flexibly to unpredictable or dynamic
61
- environments, solving problems on their own as needed. The recent
62
- advancement of large language models (LLMs) has significantly
63
- expanded the capabilities and application areas of autonomous
64
- agents. They are now widely used in information retrieval, data
65
- analysis, decision support, and task automation, and are increasingly
66
- being adopted as productivity tools in enterprise environments.
67
- Autonomous agents possess several key characteristics, as
68
- summarized in Table 1: R ABSTRACT
69
- This paper provides an in -depth technical analysis and implementation methodology of the open -source
70
- Agent -to-Agent (A2A) protocol developed by Google and the Model Context Protocol (MCP) introduced by
71
- Anthropic. While the evolution of LLM -based autonomous agents is rapidly accelerating, efficient interactions
72
- among these agents and their integration with external systems remain significant challenges. In modern AI
73
- systems, collaboration between autonomous agents and integration with external tool s have become
74
- essential elements for building practical AI applications. A2A offers a standardized communication method
75
- that enables agents developed in heterogeneous environments to collaborate effectively, while MCP provides
76
- a structured I/O framework fo r agents to connect with external tools and resources. Prior studies have focused
77
- primarily on the features and applications of either A2A or MCP individually. In contrast, this study takes an
78
- integrated approach, exploring how the two protocols can comple ment each other to address interoperability
79
- issues and facilitate efficient collaboration within complex agent ecosystems. KEYWORDS
80
- Agent -to-Agent (A2A),
81
- Model Context Protocol
82
- (MCP), Multi -Agent
83
- System ( MAS),
84
- Autonomous Agent,
85
- Agent Collaboration.
86
- * Corresponding authors:
87
- E-mail address: csu.jeong@samsung.com (C . Jeong).
88
-
89
- --- Page 2 ---
90
-
91
- TABLE I. KEY CHARACTERISTICS OF AUTONOMOU S AGENTS
92
- Item Description
93
- Autonomy The ability to operate independently without
94
- external intervention.
95
- Goal -Oriented The ability to formulate and execute plans to
96
- achieve specific objectives.
97
- Adaptability The capability to adjust behavior in response to
98
- environmental changes.
99
- Social Ability The ability to interact with other agents or
100
- users.
101
-
102
- However, due to constraints in knowledge, functionality, and
103
- resources, a single agent often faces limitations in solving complex
104
- problems. To overcome these limitations, Multi -Agent Systems (MAS)
105
- have emerged, where multiple agents collaborate toward a shared
106
- goal.
107
-
108
- B. Necessity of Multi -Agent Systems (MAS)
109
- A MAS is a framework in which multiple autonomous agents
110
- collaborate to solve complex problems. Each agent is assigned a
111
- specific role and area of expertise, and their cooperation enables the
112
- resolution of problems that would be infeasible for a single age nt
113
- alone [1].
114
- The main advantages of MAS include:
115
- 1. Distributed Problem Solving: Complex problems are
116
- decomposed into sub -problems, with each agent addressing a
117
- specific domain.
118
- 2. Scalability: System functionality can be expanded by adding or
119
- modifying agents.
120
- 3. Robustness: System functionality is maintained even if some
121
- agents fail.
122
- 4. Diverse Perspectives: Agents with different expertise analyze
123
- problems from varied angles.
124
-
125
- However, effe ctive MAS operation requires seamless
126
- communication and collaboration among agents, necessitating
127
- standardized communication protocols and collaboration
128
- mechanisms.
129
-
130
- C. Importance of Agent Communication Protocols
131
- Agent communication protocols define how agent s exchange
132
- messages, including the format, communication rules, and semantic
133
- interpretation. Communication is fundamental to MAS, enabling
134
- autonomous entities to coordinate and collaborate in solving complex
135
- problems [12].
136
- An effective communication proto col must satisfy the following
137
- requirements:
138
- 1. Interoperability: Support communication between agents
139
- developed on different platforms and frameworks.
140
- 2. Extensibility: Accommodate new functions and requirements.
141
- 3. Security: Provide mechanisms for secu re communication.
142
- 4. Efficiency: Minimize communication overhead and support
143
- efficient message exchange.
144
- 5. Standardization: Offer standardized formats and rules for
145
- broad adoption.
146
- Fig. 1 . Integrated Implementation Architecture Concept
147
-
148
- D. Technical Analysis of the A2A Protocol
149
- 1. Concept and Structure of A2A Protocol
150
- Only two levels of headings should be numbered. Lower level
151
- headings remain unnumbered; they are formatted as run -in headings.
152
- The A2A protocol is a standardized communication framework
153
- designed to enable effective collaboration among autonomous
154
- agents developed in diverse environments. Released as open -source
155
- by Google, it abstracts the complexity of agent communication and
156
- provides a consistent interface to ensure interoperability [8].
157
-
158
- Fig. 2 . Open Standard A2A Protocol Concept Diagram [7]
159
-
160
- The core structure of the A2A protocol consists of:
161
- 1. Agent Card: Metadata in JSON format specifying an agent’s
162
- functions, roles, and capabilities, enabling other agents to
163
- discover and determine appropriate collaboration methods.
164
- 2. Message Format: Defines a structured format for agent
165
- communication, including headers, body, and parts, supporting
166
- various content types (text, images, structured data).
167
- 3. Task Management: Adopts a task -based communi cation model,
168
- tracking task status, progress, and outcomes.
169
- 4. Artifacts: Standardized data structures representing task
170
- outcomes, such as documents, code, or images.
171
- The A2A protocol achieves loose coupling and high cohesion,
172
- enhancing the flexibility and scalability of agent systems.
173
- 2. Core Functions of the A2A Protocol
174
- A2A supports a range of core functionalities that enable
175
- collaborative operations among agents:
176
-
177
-
178
- --- Page 3 ---
179
-
180
- 1. Capability Discovery: Agents advertise their capabilities using
181
- an “Agent Card” in JSON for mat. This mechanism functions
182
- similarly to service registries in Service -Oriented Architecture
183
- (SOA), allowing for dynamic discovery and coordination [8].
184
- Each Agent Card includes essential information such as agent ID,
185
- name, description, supported functio ns, input/output formats,
186
- authentication requirements, and version information. This
187
- mechanism supports dynamic expansion of the agent
188
- ecosystem, enabling existing agents to recognize and
189
- collaborate with newly added agents automatically.
190
- 2. Task and State Management: A2A structures agent
191
- communication around tasks, each with a unique identifier and
192
- life cycle states (e.g., created, in -progress, completed, failed).
193
- Results are returned as standardized artifacts [8]. This task -
194
- oriented design supports asynch ronous processing, real -time
195
- monitoring, task interruption and resumption, and consistent
196
- handling of results. It facilitates coordination in complex
197
- collaboration scenarios and provides a foundation for recovery
198
- strategies in case of failure.
199
- 3. Secure Co llaboration: A2A includes mechanisms to ensure
200
- secure communication between agents. It supports enterprise -
201
- grade authentication and OpenAPI -based authorization,
202
- enabling safe exchanges of context, responses, artifacts, and
203
- user directives [8], [13], [14]. Key security elements include
204
- authentication, authorization, encryption, access control, and
205
- audit trails. These features allow for secure inter -agent
206
- communication while maintaining data protection, which is
207
- essential for enterprise use cases.
208
- 4. User Exp erience Negotiation: Each A2A message can include
209
- fully composed “parts” that represent complete content
210
- blocks —such as formatted text, images, or interactive elements.
211
- The protocol supports negotiation for user interface elements,
212
- enhancing user experienc e consistency across different clients
213
- [8]. This feature provides benefits such as multimodal content
214
- support, consistent UX delivery, adaptation to various client
215
- environments, and standardized representation of interactive
216
- content. It ensures consistent rendering of agent -generated
217
- content across interfaces.
218
- 3. Technical Advantages of the A2A Protocol
219
- The A2A protocol provides the following technical advantages:
220
- 1. Standardized Communication: Standardizes communication
221
- among agents developed in different frameworks and vendors,
222
- ensuring interoperability [8], [13].
223
- 2. Loose Coupling: Agents can collaborate without knowledge of
224
- each other’s internal implementation, enhancing system
225
- flexibility and scalability.
226
- 3. Dynamic Discovery: Dynamic capability discovery through
227
- agent cards enables easy integration of new agents and
228
- functionaliti es.
229
- 4. Multimodal Communication: Supports exchange of various
230
- types of content, including text, images, and structured data.
231
- 5. Extensible Design: JSON -based message format and modular
232
- structure allow easy accommodation of new requirements and
233
- functionalit ies.
234
- 6. Enterprise Support: Provides essential security features such as
235
- authentication, authorization, and auditing for enterprise
236
- environments.
237
- These technical advantages significantly reduce the development
238
- and deployment costs of agent systems and impr ove collaboration efficiency among diverse agents.
239
-
240
- E. Technical Analysis of the Model Context Protocol (MCP)
241
- 1. Concept and Structure of MCP
242
- The MCP is a standardized protocol designed to enable AI agents
243
- to connect effectively with external tools, APIs, and re sources [14]. As
244
- a core component enhancing agent practicality, MCP establishes a
245
- structured input/output framework that facilitates seamless
246
- interactions between agents and diverse external resources [8].
247
- The primary structural elements of MCP include:
248
- 1. Context Definition: Specifies the context in which the agent
249
- interacts with external tools, including tool functionalities, input
250
- parameters, and output formats.
251
- 2. Schema -Based Interface: Uses JSON Schema to clearly
252
- define the input and output types for each tool. This allows the agent
253
- to understand the tool’s interface and provide appropriate input.
254
- 3. Function Calling Mechanism: Provides a standardized
255
- mechanism for agents to invoke external tool functions and retrieve
256
- their results.
257
- 4. State Management : Maintains state information during tool
258
- usage, supporting complex multi -step interactions.
259
- The structure of MCP balances clearly defined boundaries between
260
- agents and tools with the flexibility necessary for dynamic interaction.
261
-
262
- 2. Concept and Structure of MCP
263
- MCP provides various core functions for agents to interact
264
- effectively with external tools:
265
- 1. Tool Discovery and Description: MCP provides a mechanism to
266
- clearly describe tool functionality and usage. This is achieved
267
- through JSON schema -based tool d escriptions, which include
268
- tool name and description, list of supported functions, input
269
- parameters and types, output formats and types, examples, and
270
- usage instructions [8]. This tool discovery mechanism enables
271
- agents to dynamically discover available to ols and select
272
- appropriate tools to perform tasks.
273
- 2. Function Calling and Result Handling: MCP provides a
274
- standardized way for agents to call functions of external tools
275
- and handle results. This process consists of the following steps
276
- [8]:
277
- ─ Function Selection: The agent analyzes the user’s request
278
- and selects an appropriate function.
279
- ─ Parameter Construction: The agent constructs the
280
- parameters required for function execution.
281
- ─ Function Call: The agent calls the function with the
282
- constructed paramete rs.
283
- ─ Result Reception: The agent receives the result of the
284
- function execution.
285
- ─ Result Interpretation: The agent interprets the received
286
- result and provides it to the user or uses it for subsequent
287
- tasks.
288
- This function calling mechanism enables agents t o utilize
289
- various external tools an d APIs to perform actual tasks.
290
-
291
- --- Page 4 ---
292
-
293
- 3. Context Management: MCP provides functions to effectively
294
- manage context during interaction between agents and tools.
295
- This includes session management, state tracking, context
296
- propagation, and memory management [8]. These context
297
- management functions enable agents to maintain consistent
298
- state and interact with tools during complex multi -step tasks.
299
- 4. Error Handling and Recovery: MCP provides mechanisms to
300
- handle and recover from errors that may occur during tool
301
- usage. This includes standardization of error codes and
302
- messages, retry strategies, fallback paths, and graceful
303
- degradation [8]. These error handling mechanisms enable
304
- agents to operate robustly even in unexpected situations.
305
- 3. Technical Advantages of MCP
306
- MCP provides the following technical advantages:
307
- 1. Stand ardized Tool Integration: Enables consistent integration
308
- of various tools and APIs, making it easy to extend agent
309
- functionality.
310
- 2. Type Safety: JSON schema -based interfaces ensure type safety,
311
- reducing errors in agent -tool interaction.
312
- 3. Self-documentin g: Tool descriptions are included as part of the
313
- protocol, allowing tool usage to be understood without
314
- separate documentation. 4. Extensible Design: Provides an extensible structure for easily
315
- adding new tools and functionalities.
316
- 5. Language and Platform Independence: Adopts an open
317
- standard that can be implemented in various programming
318
- languages and platforms.
319
- 6. Developer -friendly Interface: Provides an intuitive interface
320
- that is easy for developers to understand and implement.
321
- These technical advanta ges significantly expand the practical
322
- utility and scope of agents and make it easier for developers to build
323
- and extend agent systems.
324
-
325
- F. Comparison of MCP, A2A, and API
326
- The main characteristics of MCP , A2A, and general APIs are
327
- compared in Table 2.
328
- This co mparison table shows the main characteristics and
329
- differences of each protocol/interface. MCP focuses on enabling
330
- agents to interact effectively with external tools, A2A facilitates
331
- collaboration among agents, and general APIs provide a standard
332
- interface for data exchange between services. These three
333
- approaches are complementary and, when used together, can build a TABLE 2. COMPARISON OF MCP, A2A, AND GENERAL API
334
- Feature MCP A2A General API
335
- Primary Purpose Connecting agents to external
336
- tools/services Communication and
337
- collaboration between agents Data exchange between client
338
- and server
339
- Communication
340
- Direction Agent → Tool Agent ↔ Agent Client ↔ Server
341
- Message Format JSON Schema -based Structured messages (Header,
342
- Body, Parts) Varies: REST, SOAP, etc.
343
- State Management Context -based state tracking Task -based state management Stateless or session -based
344
- Discovery Mechanism Tool Descriptions Agent Cards API documentation, OpenAPI
345
- specs
346
- Authentication Method Supports various mechanisms Enterprise authentication,
347
- OpenAPI -based Varies: API Key, OAuth, etc.
348
- Error Handling Standardized error codes and
349
- recovery strategies Task failure handling and
350
- recovery HTTP status codes, error
351
- responses
352
- Scalability Easy integration of new tools Easy integration of new agents Scalable through endpoint
353
- expansion
354
- Implementation
355
- Complexity Moderate High Low to moderate
356
- Multimodal Support Limited Comprehensive (Text, Image,
357
- Structured Data) Limited
358
- Level of Standardization Emerging standard Emerging standard Widely varied
359
- Developer Experience Self-descriptive, schema -based Discovery via Agent Cards Highly documentation -
360
- dependent
361
- Real -time Interaction Limited Supported Depends on API design
362
- Security Model Tool -specific access control Inter -agent authentication and
363
- authorization Endpoint -specific access control
364
- Typical Use Cases Tool/API connection, automation
365
- via function calls Collaborative problem solving,
366
- long -running coordination Information retrieval, command
367
- dispatch
368
-
369
-
370
- --- Page 5 ---
371
-
372
- powerful agent eco system.
373
-
374
- III. MCP –A2A INTEGRATED IMPLEMENTATION METHODOLOGY
375
- A. Implementation Architecture Overview
376
- To implement MCP and A2A in real systems, a systematic
377
- architectural design is required. This section explains the architectural
378
- components and design principles for effectively implementing both
379
- protocols.
380
- The integrated implementation architecture of MCP and A2A
381
- consists of the following main layers (Fig. 2) :
382
- 1. User Interface Layer: Responsible for interaction between users
383
- and the agent system, handling user re quests and displaying
384
- results. This layer provides a consistent user experience across
385
- diverse client environments and effectively represents
386
- multimodal content using A2A’s user experience negotiation
387
- features.
388
- 2. Agent Management Layer: Manages the lifecy cle, state, and
389
- functionality of agents, including creation and management of
390
- agent cards and coordination of agent communication.
391
- According to Habler et al. [13], this layer creates a flexible
392
- collaboration environment through dynamic agent discovery
393
- and capability negotiation.
394
- 3. Core Protocol Layer: Implements the basic protocol
395
- specifications of A2A and MCP, providing core functions such as
396
- message formats, communication rules, and error handling.
397
- This layer ensures protocol compliance and enables consi stent
398
- implementation across diverse environments.
399
- 4. Tool Integration Layer: Integrates external tools and APIs
400
- through MCP, managing tool descriptions and processing function calls. According to the latest specification of the MCP
401
- [14], this layer provide s type safety and self -documenting
402
- features through JSON schema -based interfaces.
403
- 5. Security and Authentication Layer: Responsible for securing
404
- agent communication and tool usage, handling authentication,
405
- authorization, and data encryption. According to C loud Security
406
- Alliance [15], this layer builds a secure agent collaboration
407
- environment using OAuth 2.0 -based authorization mechanisms
408
- and end -to-end encryption.
409
- This layered architecture improves system maintainability and
410
- scalability through separation o f concerns. Each layer can be
411
- developed and tested independently and can be extended or
412
- replaced as needed, allowing the architecture to evolve flexibly with
413
- the agent system.
414
-
415
- B. A2A Implementation Procedure
416
- The implementation of the A2A protocol involves a structured
417
- sequence of steps, including the definition of agent metadata, the
418
- setup of communication logic, and task management. These steps
419
- ensure that agents can interact effectively in a standardized and
420
- interoperable manner.
421
- 1. Agent Card Definition
422
- An ag ent card is JSON -formatted metadata that specifies an
423
- agent’s functionality and role. Agent card definition consists of the
424
- following steps [8]:
425
- 1. Define Agent Identifier and Basic Information: Define basic
426
- information such as agent ID, name, description, and version.
427
- 2. Define Capabilities: Define the list of functions provided by the
428
- agent, including parameters and return values for each function.
429
- 3. Define Authentication Requirements: Define authentication
430
- Fig. 2. The MCP×A2A Framework integrates agent -to-agent communication with tool connectivity in a layered architecture
431
-
432
-
433
- --- Page 6 ---
434
-
435
- methods and permission scopes required for agen t usage.
436
- 4. Add Metadata: Define additional metadata such as agent
437
- category, tags, and creator information.
438
- Agent cards, as JSON -formatted metadata, define agent ID,
439
- function list, and authentication requirements, enabling other agents
440
- to discover and util ize them [8]. According to Salimbeni [16],
441
- standardized agent cards support the dynamic scalability of the agent
442
- ecosystem, allowing existing agents to automatically recognize and
443
- collaborate with new agents added to the system.
444
- 2. Message Processing Implemen tation
445
- A2A message processing is implemented through the following
446
- steps [8]:
447
- 1. Message Reception: Receive messages from other agents
448
- through various communication channels such as HTTP
449
- requests, message queues, or WebSocket.
450
- 2. Message Parsing: Parse the received message to extract
451
- headers, bodies, and parts. A2A messages are structured in
452
- JSON format, making parsing easy.
453
- 3. Message Validation: Validate the message format and content,
454
- including schema validation, signature verification, and
455
- permission ch ecks.
456
- 4. Message Processing: Perform appropriate tasks according to
457
- the message content, including function execution, state
458
- updates, and information provision.
459
- 5. Response Generation: Generate a response message according
460
- to the task result. The response must comply with the A2A
461
- message format and include all necessary information.
462
- 6. Response Transmission: Send the generated response to the
463
- original message sender through the same communication
464
- channel used for the original request.
465
- This message processing can be performed asynchronously, and
466
- additional messages may be exchanged to update the status of long -
467
- running tasks. According to Habler et al. [13], the asynchronous
468
- nature of A2A message processing enables effective agent
469
- coordin ation in complex collaboration scenarios.
470
- 3. Task Management Implementation
471
- A2A task management is implemented with the following
472
- elements [8]:
473
- 1. Task Creation: Create a new task according to the client’s
474
- request. Each task has a unique identifier and includ es
475
- information such as task type, parameters, and status.
476
- 2. Task Status Tracking: Track and update task progress. Task
477
- status can be created, in progress, completed, or failed, and
478
- timestamps are recorded for status changes.
479
- 3. Task Result Management: Man age the results (artifacts) when
480
- a task is completed. Results can be in various forms (documents,
481
- code, images, etc.) and are stored with metadata.
482
- 4. Task Error Handling: Manage error information and execute
483
- appropriate recovery strategies in case of task failure. Error
484
- information may include error codes, messages, and stack
485
- traces.
486
- Task management implementation enables effective coordination
487
- and management of long -running tasks among agents. According to
488
- Pajo P. [20], the task management mechanism of A2 A facilitates agent
489
- coordination in complex collaboration scenarios and provides a
490
- foundation for implementing recovery strategies in case of task
491
- failure. C. MCP Implementation Procedure
492
- The implementation of the MCP involves defining tool
493
- specifications, ha ndling function invocations, and managing
494
- interactions between agents and external tools. The following
495
- outlines the major stages of MCP implementation.
496
- 1. Tool Description Definition
497
- In MCP, tool descriptions are defined using JSON schema. Tool
498
- description d efinition consists of the following steps [8], [14]:
499
- 1. Define Tool Basic Information: Define basic information such as
500
- tool name, description, and version.
501
- 2. Define Function List: Define the list of functions provided by the
502
- tool, including description, parameters, and return values for
503
- each function.
504
- 3. Define Parameter Schema: Define JSON schema for each
505
- function’s parameters, including type, constraints, and required
506
- status.
507
- 4. Define Return Value Schema: Define JSON schema for each
508
- function’s return value, including type, structure, and expected
509
- values.
510
- These tool descriptions provide a foundation for agents to
511
- understand and utilize tool functionality and usage. According to
512
- Schmid [21], the self -documen ting nature of MCP enables developers
513
- to understand tool usage without separate documentation,
514
- significantly improving development productivity.
515
- 2. Function Call Processing Implementation
516
- MCP function call processing is implemented through the following
517
- steps [8, 14]:
518
- 1. Function Call Request Reception: Receive function call requests
519
- from agents in various forms such as HTTP requests or RPC calls.
520
- 2. Parameter Validation: Validate that the requested parameters
521
- match the schema defined in the tool description, including
522
- type checks, required parameter checks, and value range
523
- validation.
524
- 3. Function Execution: Execute the actual function using the
525
- validated parameters, which may include internal logic
526
- execution, external API calls, or database queries.
527
- 4. Result Conversion: Convert the function execution result to the
528
- return format defined in the tool description, including data
529
- format conversion, field mapping, and error handling.
530
- 5. Response Return: Return the converted result to the agent in
531
- the form of an HTTP response, RPC response, etc.
532
- This function call processing implementation enables agents to
533
- effectively utilize external tools and APIs. According to KeywordsAI
534
- [22], the type safety and schema -based validation of MCP significantly
535
- reduce errors in agent -tool interaction, improving system stability
536
- and reliability.
537
-
538
- D. Integrated Implementation of A2A and MCP
539
- Integrating the A2A and MCP protocols enables the development
540
- of highly interoperable and extensible agent systems that combine
541
- inter -agent collaboratio n with structured tool interaction. The
542
- following subsections present a step -by-step methodology for
543
- implementing such an integrated system.
544
- 1. Integrated Architecture Design
545
- The integrated architecture of A2A and MCP can be designed with
546
- the following compon ents [7], [14]:
547
-
548
- --- Page 7 ---
549
-
550
- 1. A2A Communication Module: Responsible for agent -to-agent
551
- communication, implementing the A2A protocol to handle
552
- message exchange, task management, and agent card
553
- processing.
554
- 2. MCP Tool Module: Responsible for connecting with external
555
- tools, implementing the MCP protocol to manage tool
556
- descriptions, function call processing, and result conversion.
557
- 3. Agent Core: Implements the core logic of the agent, handling
558
- user request processing, task planning, and decision -making.
559
- 4. Context Manager : Manages the state and context of the agent,
560
- including session management, state tracking, and memory
561
- management.
562
- 5. Security Manager: Responsible for authentication and
563
- authorization, including user authentication, agent -to-agent
564
- authentication, and tool access control.
565
- This modular design improves system maintainability and
566
- scalability through separation of concerns. Each module can be
567
- developed and tested independently and can be extended or
568
- replaced as needed.
569
- 2. Utilizing Google ADK (Agent Developer Kit)
570
- Google’s ADK (Agent Developer Kit) provides tools and libraries for
571
- easily implementing A2A and MCP. Implementation using ADK
572
- consists of the following steps [8]:
573
- 1. ADK Installation: Install and configure Google ADK, which
574
- supports various programming la nguages such as Python,
575
- JavaScript, and Java.
576
- 2. Agent Definition: Define an agent compliant with the A2A
577
- protocol, including writing agent cards, implementing message
578
- processing logic, and setting up task management.
579
- 3. Tool Integration: Integrate externa l tools using MCP, including
580
- writing tool descriptions, implementing functions, and setting
581
- up error handling logic.
582
- 4. Agent Deployment: Deploy and test the implemented agent.
583
- ADK supports various deployment options such as local
584
- development environments and cloud environments.
585
- ADK abstracts the complexity of A2A and MCP, allowing
586
- developers to focus on core agent functionality. According to Pajo P.
587
- [20], using ADK can reduce agent development time by up to 60% and
588
- significantly improve code quality and st andard compliance.
589
- 3. Implementation Strategy Using LangGraph
590
- LangGraph can be utilized to construct multi -agent workflows,
591
- enabling the definition of flows that include cycles —an essential
592
- feature for most agent architectures [23], [24]. LangGraph is an agen t
593
- framework that supports the A2A protocol and enables integrated
594
- implementation of A2A and MCP. As shown in Figure 3, using the
595
- LangChain MCP adapter library makes it possible to connect to
596
- multiple MCP servers and load tools from those servers [25].
597
-
598
-
599
- Fig. 3. LangChain MCP Adapters MCP tools can be converted into LangChain tools and used with
600
- LangGraph agents, and a client implementation that connects to
601
- multiple MCP servers and loads tools from them is feasible.
602
- LangGraph can be used to implement agen ts compliant with the A2A
603
- protocol and integrate tools such as currency exchange rate lookup
604
- tools via MCP. The agent processes user requests and, as needed,
605
- calls the currency exchange rate lookup tool via MCP to return results.
606
- Through this process, the integrated use of A2A and MCP enables the
607
- extension of agent functionality and the standardization of
608
- connections with external tools.
609
-
610
- E. Implementation Considerations
611
- When implementing an integrated agent system using A2A and
612
- MCP, several key factors must be considered to ensure security,
613
- scalability, reliability, and maintainability. This section outlines the
614
- primary technical considerations and recommended best practices.
615
- 1. Security and Authentication: Appropriate authentication and
616
- authorization mechani sms must be implemented to secure
617
- agent communication and tool usage. According to Cloud
618
- Security Alliance [15], security implementation for A2A and
619
- MCP should utilize standard technologies such as OAuth 2.0,
620
- JWT, and TLS.
621
- 2. Scalability: The system must b e designed to accommodate
622
- increasing loads and new requirements. This can be achieved
623
- through horizontal scaling, asynchronous processing, and
624
- caching.
625
- 3. Error Handling: Mechanisms must be implemented to
626
- appropriately handle various error situations such as
627
- communication errors and tool failures. This can be achieved
628
- through strategies such as retry, fallback paths, and graceful
629
- degradation.
630
- 4. Performance Optimization: Strategies to minimize latency in
631
- agent communication and tool usage should be applied. This
632
- can be achieved through connection pooling, batch processing,
633
- and asynchronous I/O.
634
- 5. Monitoring and Logging: Logging mechanisms must be
635
- implemented to monitor system operation and diagnose
636
- problems. This can be achieved through structured logging,
637
- distributed tracing, and metric collection.
638
- Implementation that appropriately reflects these considerations
639
- can significantly improve the stability, security, and scalability of
640
- agent systems. According to Habler et al. [13], implementation of A2A
641
- and MCP that incorporates these considerations is a key factor in
642
- promoting the actual adoption of agent technol ogy in enterprise
643
- environments.
644
- IV. USE CASES OF A2A AND MCP
645
- A. Application Areas in Enterprise Environments
646
- A2A and MCP can be utilized in various ways in ent erprise
647
- environments. This section examines various use cases of how these
648
- two protocols can be applied in real business settings.
649
- 1. Recruitment Process Automation
650
- As demonstrated in Google’s official demo [7], A2A and MCP can
651
- be effectively leveraged to aut omate the recruitment pipeline. The
652
- following agents collaborate across various stages of the hiring
653
- process:
654
- 1. Candidate Screening Agent: Analyzes resumes and evaluates
655
- basic qualifications. This agent connects via MCP to resume
656
-
657
-
658
- --- Page 8 ---
659
-
660
- parsing tools and qualifi cation databases to perform efficient
661
- screening.
662
- 2. Interview Scheduling Agent: Coordinates schedules between
663
- interviewers and candidates and schedules interviews.
664
- According to Salimbeni [16], this agent connects via MCP to
665
- calendar APIs and email systems to automate complex
666
- scheduling tasks.
667
- 3. Interview Preparation Agent: Prepares customized interview
668
- questions based on the candidate’s background. This agent
669
- receives candidate information from the screening agent via
670
- A2A and generates appropriate question s.
671
- 4. Feedback Collection Agent: Collects and summarizes feedback
672
- from interviewers after interviews. This agent connects via MCP
673
- to feedback forms and evaluation systems to collect structured
674
- feedback.
675
- These agents communicate with each other via the A2A protocol
676
- and connect to external tools such as email systems, calendar
677
- management tools, and HR management systems via MCP. According
678
- to Pajo P. [20], such automation systems can improve recruitment
679
- process efficiency by up to 40% and significantly enhance candidate
680
- experience. For example, in a company processing 1,000 candidates,
681
- a system based on A2A and MCP reduced average processing time
682
- from 15 to 9 days and achieved an ROI of 120% within 3 months. Initial
683
- development required about 2 weeks for API in tegration and agent
684
- setup, but maintenance costs were kept below $5,000 per month
685
- thanks to standardized protocols.
686
- 2. Customer Support System
687
- A2A and MCP also offer substantial benefits in modernizing
688
- customer support systems. The following agent roles are typically
689
- involved [8]:
690
- 1. Initial Response Agent: Receives customer inquiries and
691
- collects basic information. This agent connects via MCP to
692
- customer databases and previous inquiry history to understand
693
- customer context.
694
- 2. Problem Diagnosis Agent: Analyz es and diagnoses customer
695
- problems. According to Habler et al. [13], this agent receives
696
- customer information and problem descriptions from the initial
697
- response agent via A2A and performs accurate diagnosis.
698
- 3. Solution Proposal Agent: Proposes appropriate solutions based
699
- on diagnosis results. This agent connects via MCP to knowledge
700
- bases and product information systems to provide customized
701
- solutions.
702
- 4.Escalation Agent: Escalates complex problems to human agents.
703
- This agent collaborates with other agent s via A2A to determine
704
- the need for escalation and connects via MCP to ticketing
705
- systems for smooth handover.
706
- These agents collaborate via A2A and connect to external tools
707
- such as CRM systems, knowledge bases, and ticketing systems via
708
- MCP. According to C loud Security Alliance [15], such systems can
709
- reduce average inquiry resolution time by 60% and increase first
710
- contact resolution rate by more than 25%.
711
- 3. Code Review and Quality Management
712
- A2A and MCP can be applied to automate code review and
713
- software qual ity assurance tasks. The following agents participate in
714
- this workflow [7]:
715
- 1. Code Analysis Agent: Analyzes code structure, complexity, and
716
- coding standard compliance. This agent connects via MCP to
717
- static analysis tools and code metric systems to perform in-
718
- depth code analysis. 2. Security Review Agent: Checks code for security vulnerabilities.
719
- According to KeywordsAI [22], this agent connects via MCP to
720
- security scanners and vulnerability databases to identify
721
- potential security risks.
722
- 3. Performance Opt imization Agent: Identifies performance
723
- bottlenecks and suggests optimization strategies. This agent
724
- collaborates with the code analysis agent via A2A to identify
725
- performance issues and connects via MCP to profiling tools to
726
- provide specific optimization s trategies.
727
- 4. Documentation Support Agent: Evaluates code documentation
728
- quality and suggests improvements. This agent connects via
729
- MCP to documentation generation tools and API
730
- documentation systems to support effective documentation.
731
- These agents collabor ate via A2A and connect to development
732
- tools such as version control systems, CI/CD pipelines, and issue
733
- trackers via MCP. According to Schmid [21], such systems can improve
734
- code quality by an average of 35% and increase developer
735
- productivity by more than 20%.
736
- 4. Developer Support System
737
- In developer enablement, A2A and MCP can be used to construct
738
- intelligent assistants that automate routine development tasks [8]:
739
- 1. Code Generation Agent: Generates code according to
740
- developer requirements. This agent connec ts via MCP to code
741
- repositories and API documentation to generate code
742
- appropriate for the project context.
743
- 2. Debugging Support Agent: Analyzes the cause of errors and
744
- suggests solutions. According to the Model Context Protocol
745
- specification [14], this ag ent connects via MCP to log systems,
746
- debuggers, and error databases to support effective debugging.
747
- 3. Learning Material Provision Agent: Provides developers with
748
- necessary learning materials and documentation. This agent
749
- collaborates with other agents via A2A to understand the
750
- developer’s current task context and connects via MCP to
751
- documentation systems and learning platforms to provide
752
- customized learning materials.
753
- 4. Task Management Agent: Tracks developer tasks and manages
754
- schedules. This agent connec ts via MCP to project management
755
- tools and scheduling systems to support efficient task
756
- management.
757
- These agents collaborate via A2A and connect to tools such as IDEs,
758
- documentation systems, and project management tools via MCP.
759
- According to Pajo P. [20], such systems can improve developer
760
- productivity by up to 50% and significantly improve code quality and
761
- documentation standards.
762
-
763
- B. Implementation Case Study: Stock Information System
764
- This section introduces a practical application case that applies the
765
- impl ementation methodology of A2A and MCP described in Chapter
766
- 3. This case uses LangChain and LangGraph to build a system that
767
- retrieves and analyzes various stock information, with multiple
768
- specialized agents collaborating to process users’ complex financial
769
- information requests. In Korea, there has been a recent surge in
770
- interest in the U.S. stock market, accompanied by a significant
771
- increase in the demand for related research and information [17],
772
- [18]. The widespread public interest in stock investment transcends
773
- age and gender, yet individuals with limited expertise in the stock
774
- market often encounter difficulties in searching for and interpreting
775
- relevant information [19]. To effectively address thes e challenges, the
776
- Stock Information System has been developed to provide users with
777
-
778
- --- Page 9 ---
779
-
780
- systematic and useful information through a question -and-answer
781
- function based on natural language processing, leveraging the
782
- capabilities of various agents.
783
- The case syste m is designed so that when a user asks a question
784
- about stock or company information in natural language, multiple
785
- specialized agents collaborate to provide a comprehensive answer.
786
- The system uses A2A protocol -based agent communication and MCP -
787
- based extern al tool access as core technologies. Main functions
788
- include:
789
- 1. Stock Price Lookup: Provides basic stock information such as
790
- current price, change rate, and trading volume for a specific
791
- company.
792
- 2. Listed Company News Lookup: Collects the latest news and
793
- disclosure information related to the company.
794
- 3. Listed Company Status Lookup: Provides basic information,
795
- financial statements, and key indicators of the company.
796
- 4. Company Analysis: Integrates collected information to prov ide
797
- SWOT analysis and investment perspective analysis.
798
- 1. System Architecture
799
- The system strictly follows the layered structure presented in
800
- Chapter 3 and consists of the following main layers:
801
- 1. User Interface Layer: User interface and multilingual support.
802
- 2. Agent Management Layer: Agent orchestration and workflow
803
- management.
804
- 3. Core Protocol Layer: Implementation of A2A and MCP
805
- protocols.
806
- 4. Tool Integration Layer: Integration with external data sources
807
- and APIs.
808
- 5. Security Layer: Authentication and auth orization management.
809
-
810
- The system follows a multi -layered architecture, as shown in Figure 4 .
811
-
812
-
813
- Fig. 4. Project Source Structure – Multi -Layer Architecture for Stock
814
- Information System
815
- The user interface layer includes a multilingual input module. The
816
- agent management layer is a LangGraph -based workflow manager.
817
- The core protocol layer includes an A2A message handler and an MCP
818
- tool call module. The tool integration layer includes financial APIs and
819
- news scrapers. The security layer includes an OAuth 2.0 -based
820
- authentication module.
821
- 2. System Implementation
822
- 1. A2A Module Implementation
823
- The A2A protocol was implemented in the LangChain and
824
- LangGraph environment. Agent communication follows a
825
- standardized JSON message format, and each agent has a unique ID
826
- and role.
827
- a. Agent Card Definition
828
- Each agent is defined by a JSON -formatted “agent card,” which
829
- specifies the agent’s metadata and functionality. Figure 5 shows an
830
- example of a stock price lookup agent card.
831
-
832
-
833
- Fig. 5. Example of Stock Price Lookup Agent Card
834
-
835
- b. A2A Message Structure and Agent Registry
836
- Agent communication follows a standardized message structure,
837
- and the system supports agent searc h and function lookup through
838
- an agent registry that manages agent cards. Figure 6 shows part of
839
- the code for the A2AMessage class, which defines methods for
840
- serializing and deserializing message objects in JSON format, used to
841
- implement the A2A protocol. This code enables conversion of
842
- messages to standardized JSON format for agent communication and
843
- restoration of JSON data to message objects.
844
-
845
-
846
- Fig. 6. A2A Message Structure and Agent Registry Sample Code
847
-
848
-
849
-
850
- --- Page 10 ---
851
-
852
- 2. MCP Module Implementation
853
- Each agent can call one or more independent modules according
854
- to the MCP method to connect with external data sources and
855
- perform preprocessing and analysis. In this system, tools such as stock
856
- data, news scraping, company information, financial data, and
857
- analysis engines ar e integrated via MCP.
858
- a. stock_data – Stock Price Lookup Module: Returns real -time
859
- price data for a specific stock via financial data APIs (e.g., Yahoo
860
- Finance, Alpha Vantage).
861
- b. web_scraper – Listed Company News Collection Module:
862
- Operates as a simple we b crawler to collect news article headlines
863
- based on company names. Can also be linked to disclosure
864
- information APIs as needed.
865
- c. financial_data – Financial Information Lookup Module: Parses
866
- and returns key data from financial statements based on K -IFRS
867
- standards. This module is linked to the company status lookup agent.
868
- d. analysis_engine – Integrated Analysis Module: Uses LangChain -
869
- based LLM to generate text -based insights. Integrates company status
870
- and news data to derive future outlook for the company .
871
- Each tool is defined by a JSON -formatted description file that
872
- specifies the tool’s functionality and parameters. Figure 7 shows
873
- sample code for the stock_data module, where the MCP client loads
874
- the tool description and processes function calls. The prov ided code
875
- includes the extract_tickers function, which extracts stock tickers
876
- from user input strings. This function handles tickers in various
877
- formats (English tickers, Korean stock codes, company names, etc.)
878
- and is used in the stock information system b ased on the A2A and
879
- MCP framework described in Section IV .C of the paper, integrating
880
- with external financial data sources (e.g., yfinance).
881
-
882
-
883
- Fig. 7. Sample Code for stock_data – Stock Price Lookup Module
884
-
885
- 3. LangGraph -based Workflow Implementation
886
- The system uses LangGraph to manage workflows among agents.
887
- Workflow state and workflow graph definitions are implemented. The
888
- orchestrator agent analyzes user requests and calls appropriate
889
- agents in sequence to ge nerate comprehensive responses.
890
- The code in Figure 8 is the _create_workflow method that defines
891
- the workflow for the stock information system using LangGraph. This
892
- method creates a state -based workflow for processing user requests
893
- in a multi -agent system based on the A2A protocol and MCP.
894
- Fig. 8. Sample Code Defining Workflow for Stock Information System
895
- Using LangGraph
896
-
897
- 4. User Query Processing Flow
898
- The following is an actual example of how the system processes
899
- user queries:
900
- a. User asks: “Please provide the recent stock price, news, and
901
- investment perspective analysis for Samsung Electronics.”
902
- b. Orchestrator agent analyzes the query and plans to call stock
903
- price lookup, news, company information, financial information, and
904
- analysis agents in sequence.
905
- (1) Requests stock price information from the stock price lookup agent.
906
- (2) Requests recent news from the news agent.
907
- (3) Requests company information from the company information agent.
908
- (4) Requests financial data from the financial information agent.
909
- (5) Requests integrated analysis from t he analysis agent.
910
- c. Each agent accesses the necessary tools via MCP to collect data.
911
- d. Analysis agent performs investment perspective analysis by
912
- integrating collected information.
913
- e. Orchestrator generates a final response and delivers it to the
914
- user.
915
- 3. Implementation Results Analysis
916
- The implementation results of the LangGraph example show the
917
- following characteristics:
918
- 1. Concise Implementation: The complexity of A2A and MCP is
919
- abstracted by the framework, allowing developers to focus on
920
- core agent func tionality. According to Salimbeni [16],
921
- implementation using LangGraph can reduce code volume by
922
- more than 70% compared to traditional methods.
923
- 2. Standard Compliance: Implemented agents comply with A2A
924
- protocol standards and can be easily integrated with other A2A -
925
- compatible agents, greatly improving ecosystem scalability and
926
- interoperability.
927
- 3. Easy Tool Integration: Connection with external APIs is
928
- simplified via MC P, making it easy to integrate various tools and
929
-
930
-
931
- --- Page 11 ---
932
-
933
- services. According to the MCP specification [14], MCP’s
934
- standardized interface reduces tool integration time by an
935
- average of 65%.
936
- 4. Scalability: The basic example can be easily extended to more
937
- complex fu nctionalities and multi -agent systems. According to
938
- Habler et al. [13], LangGraph -based systems maintain stable
939
- performance even when scaled to dozens of agents.
940
-
941
- C. Implications of Application Areas and Implementation
942
- Cases
943
- The various application areas and implementation cases of A2A
944
- and MCP provide the following implications:
945
- 1. Importance of Agent Collaboration: Collaboration among
946
- multiple specialized agents is essential for solving complex
947
- problems, and A2A effectively supports this. According to Pajo
948
- P. [20], collaborative agent systems have problem -solving
949
- capabilities more than three times higher than single agents on
950
- average.
951
- 2. Need for Tool Integration: Practical agent systems must be
952
- connected to external tools, and MCP supports this in a
953
- standardi zed way. According to the MCP specification [14], tool
954
- integration via MCP is a key factor in enhancing the practical
955
- value of agents.
956
- 3. Value of Standardization: Standardized protocols facilitate
957
- integration of diverse agents and tools, greatly improving
958
- ecosystem scalability. According to Schmid [21], standardized
959
- protocols can reduce agent development costs by up to 60%
960
- and shorten time to market by 40%.
961
- 4. Importance of Practical Implementation: Beyond theoretical
962
- concepts, providing practical implemen tation methodologies
963
- and tools accelerates the actual adoption of agent technology.
964
- According to Habler et al. [13], developer -friendly tools and
965
- clear implementation guidelines can increase adoption rates of
966
- agent technology by more than three times.
967
- Thes e implications demonstrate that A2A and MCP are not just
968
- technical protocols but core elements for building practical agent
969
- ecosystems. The integrated use of these two protocols is expected to
970
- play an important role in advancing agent technology from the
971
- experimental stage to actual service application.
972
- V. DISCUSSION AND CONCLUSION
973
- A. Summary and Conclusion
974
- This paper systematically analyzed the technical structure and
975
- operational principles of Google’s A2A protocol and Anthropic’s MCP,
976
- and explored how these two protocols complement each other to
977
- build a practical agent ecosystem. A2A enables standardized
978
- communication and collaboration among heterogeneous agents,
979
- while MCP is a standardized protocol designed to allow agents to
980
- securely connect with various exter nal tools, APIs, and resources.
981
- A2A enhances interoperability and collaboration efficiency among
982
- agents through mechanisms such as agent cards, structured
983
- messages, and task management. MCP enables agents to
984
- interactively integrate with external resources through JSON schema -
985
- based tool descriptions, function calling, and context management.
986
- These two protocols operate independently but, when used together,
987
- form the foundation for building practical and scalable multi -agent -
988
- based AI systems. From an implemen tation perspective, the case
989
- study using LangGraph and other frameworks detailed the process of translating theoretical concepts into real -world applications. Practical
990
- approaches for securing interoperability and improving development
991
- efficiency for LLM -based autonomous agent systems in various
992
- enterprise environments were suggested through the
993
- complementary use of A2A and MCP. Use cases such as recruitment
994
- automation, customer support, code review, and developer support
995
- demonstrated the practical applicab ility of the proposed approach. In
996
- particular, the stock information system implementation case
997
- demonstrated that the integrated use of A2A and MCP is applicable
998
- to complex real -world scenarios.
999
- This analysis and case study suggest that A2A and MCP are not just
1000
- technical protocols but core elements for building practical agent
1001
- ecosystems. The introduction of standardized protocols can
1002
- significantly reduce the development and deployment costs of agent
1003
- systems and greatly improve interoperability and scalabil ity.
1004
- B. Significance and Limitations of the Study
1005
- The significance of this study lies in its systematic analysis of the
1006
- technical structure and operational principles of A2A and MCP, which
1007
- provided essential knowledge for understanding and practically
1008
- impleme nting these protocols. Practical implementation case studies
1009
- and methodologies offered actionable guidelines for developers and
1010
- enterprises to integrate agent technology into real -world services.
1011
- Various use cases demonstrated that A2A and MCP can facilita te the
1012
- transition of agent technology from experimental applications to
1013
- practical, real -world services.
1014
- However, the study is not without limitations. Both A2A and MCP
1015
- are relatively new protocols, having been released in 2024 –2025, and
1016
- their long -term sta bility in large -scale production environments, such
1017
- as medical data processing, remains untested. The implementation
1018
- cases primarily focused on stock information systems, leaving the
1019
- applicability of these protocols to other industries, such as complex
1020
- supply chain management or multi -modal processing (e.g., voice and
1021
- video), largely unexplored. Additionally, the study’s analysis of
1022
- security and privacy aspects was insufficient, necessitating further
1023
- research to ensure safety in actual deployment scenarios.
1024
- C. Future Research Directions
1025
- Future research should focus on enhancing the practicality and
1026
- scalability of A2A and MCP. First, scalability issues such as
1027
- performance bottlenecks, message routing, and state management in
1028
- systems with hundreds or thousands of collaborating agents must be
1029
- addressed. Second, research is needed to strengthen security,
1030
- including encryption, authentication, access control, and audit trails
1031
- for agent communication. Third, industry -specific architectures and
1032
- application cases for fin ance, healthcare, manufacturing, etc., should
1033
- be explored. Fourth, an open governance model should be
1034
- established through collaboration with standardization bodies and
1035
- stakeholders for the long -term development of the protocols. Finally,
1036
- research on agent systems that process not only text but also images,
1037
- voice, and video (multi -modal data) is required. These directions will
1038
- contribute to advancing A2A and MCP as practical solutions in diverse
1039
- environments.
1040
-
1041
-
1042
-
1043
-
1044
-
1045
-
1046
-
1047
-
1048
- --- Page 12 ---
1049
-
1050
- REFERENCES
1051
- [1] C., Jeong, “Beyond Text: Implementing Multimodal Large Language
1052
- Model -Powered Multi -Agent Systems Using a No -Code Platform,”
1053
- Journal of Intelligence and Inform ation Systems , 31(1), 2025, pp. 191 –
1054
- 231. doi:10.13088/jiis.2025.31.1.191
1055
- [2] C., Jeong, “A Study on the Implementation of Generative AI Services
1056
- Using an Enterprise Data -Based LLM Application Architecture,” Advances
1057
- in Artificial Intelligence and Machine Learn ing, 3(4), 2023, pp. 1588 –1618.
1058
- doi: 10.54364/AAIML.2023.1191
1059
- [3] C., Jeong, “Generative AI service implementation using LLM application
1060
- architecture: based on RAG model and LangChain framework,” Journal
1061
- of Intelligence and Information Systems , 19(4), 2023, pp. 129 –164. doi:
1062
- 10.13088/jiis.2023.29.4.129
1063
- [4] S., Yang, O., Nachum, Y., Du, J., Wei, P., Abbeel, D., Schuurmans,
1064
- “Foundation models for decision making: Problems, methods, and
1065
- opportunities,” arXiv preprint arXiv:2303.04129, 2023.
1066
- [5] E., Karpas , et al., “AgentBench: Evaluating LLMs as Agents,” arXiv
1067
- preprint arXiv:2308.03688, 2023.
1068
- [6] Anthropic, “Introducing the Model Context Protocol,” 2025. Accessed:
1069
- May 31, 2025. [Online]. Available:
1070
- https://www.anthropic.com/news/model -context -protocol
1071
- [7] Google, “Announcing the Agent2Agent Protocol (A2A),” Google
1072
- Developers Blog, 2025. Accessed: May 31, 2025. [Online]. Available:
1073
- https://developers.googleblog.com/en/a2a -a-new -era-of-agent -
1074
- interoperability/
1075
- [8] Google, “Agent2Agent (A2A) Protocol Specification,” 2025. Accessed:
1076
- May 31, 2025. [Online]. Available:
1077
- https://google.github.io/A2A/specification/
1078
- [9] C., Jeong, S., Sim, H., Cho, S., Kim, B., Shin, “E2E Process Automation
1079
- Leveraging Generative AI and IDP -Based Automation Agent: A Case Study
1080
- on Corporate Expense Proc essing,” arXiv preprint arXiv:2505.20733,
1081
- 2025.
1082
- [10] R., Margaret, M., Natalie, “Techopedia, Autonomous Agent,” 2025.
1083
- Accessed: May 31, 2025. [Online]. Available:
1084
- https://www.techopedia.com/definition/autonomous -agent, last
1085
- [11] Salesforce, “What are Autonomous Ag ents? A Complete Guide,” 2025.
1086
- Accessed: May 31, 2025. [Online]. Available:
1087
- https://www.salesforce.com/eu/agentforce/ai -agents/autonomous -
1088
- agents/
1089
- [12] T., Finin, R., Fritzson, D., McKay, R., McEntire, “KQML as an agent
1090
- communication language,” in Proceedings o f the third international
1091
- conference on Information and knowledge management , 1994, pp. 456 –
1092
- 463.
1093
- [13] I., Habler, K., Huang, V. S., Narajala, P., Kulkarni, “Building a secure
1094
- agentic AI application leveraging A2A protocol,” arXiv preprint
1095
- arXiv:2504.16902, 2025 .
1096
- [14] Model Context Protocol, “Model Context Protocol Specification,” 2025.
1097
- Accessed: May 31, 2025. [Online]. Available:
1098
- https://modelcontextprotocol.io/specification/2025 -03-26
1099
- [15] Cloud Security Alliance, “Threat Modeling Google's A2A Protocol with
1100
- the MAESTRO Framework,” 2025. Accessed: May 31, 2025. [Online].
1101
- Available: https://cloudsecurityalliance.org/blog/2025/04/30/threat -
1102
- modeling -google -s-a2a-protocol -with -the-maestro -framework
1103
- [16] G., Salimbeni, “Understanding Google’s A2A Protocol: Why We Need a
1104
- Standard f or AI Agent Communication,” 2025. Accessed: May 31, 2025.
1105
- [Online]. Available: https://guido -
1106
- salimbeni.medium.com/understanding -googles -a2a-protocol -why-we-
1107
- need -a-standard -for-ai-agent-communication -ac9188adb0cc
1108
- [17] H., Jo, J., Choi, J., Seo, “OAR algorithm te chnology based on opinion
1109
- mining utilizing stock news contents,” Journal of KIIT , 13(3), 2015, pp.
1110
- 111–119. doi: 10.14801/jkiit.2015.13.3.111
1111
- [18] J. H., Moon, J. J., Sohn, S. J., Yu, “Stock portfolio analysis and visualization
1112
- services using gamification,” Journal of KIIT , 20(1), 2022, pp. 191 –198.
1113
- doi: 10.14801/jkiit.2022.20.1.191
1114
- [19] N., Kim, S., Yu, “Stock information retrieval and analysis techniques using
1115
- Korean text queries,” Journal of the Korea Institute of Information
1116
- Technology , 20(9), 2022, pp. 13 –18.
1117
- [20] P., Pajo, “Comprehensive Analysis of Google's Agent2Agent (A2A) Protocol: Technical Architecture, Enterprise Use Cases, and Long -Term
1118
- Implications for AI Collaboration,” 2025. Accessed: May 31, 2025.
1119
- [Online]. Available:
1120
- https://www.researchgate.net/publ ication/390694531_Comprehensive
1121
- _Analysis_of_Google's_Agent2Agent_A2A_Protocol_Technical_Architec
1122
- ture_Enterprise_Use_Cases_and_Long -
1123
- Term_Imp lications_for_AI_Collaboration
1124
- [21] P., Schmid, “Model Context Protocol (MCP) an overview,” 2025 Accessed:
1125
- May 31, 2025. [ Online]. Available: https://www.philschmid.de/mcp -
1126
- introduction1
1127
- [22] KeywordsAI, “A Complete Guide to the Model Context Protocol (MCP) in
1128
- 2025,” 2025. Accessed: May 31, 2025. [Online]. Available:
1129
- https://www.keywords ai.co/blog/introduction -to-mcp
1130
- [23] C., Jeong, “A Graph -Agent -Based Approach to Enhancing Knowledge -
1131
- Based QA with Advanced RAG,” Knowledge Management Research ,
1132
- 25(3), 2024, pp. 99 –119. doi: 10.15813/kmr.2024.25.3.005
1133
- [24] LangGraph, 2025. Accessed: May 31, 2025. [Online]. Available:
1134
- https://lan gchain -ai.github .io/langgraph/
1135
- [25] Langchain, “LangChain MCP Adapters,” 2025. Accessed: May 31, 2025.
1136
- [Online]. Available: https://github.com/langc hain -ai/langchain -mcp -
1137
- adapters
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
data/documents/content/e3591269-f449-4f88-8185-7d98ef4c4845.txt DELETED
The diff for this file is too large to render. See raw diff
 
data/documents/metadata/0e22c68a-134e-4474-af0d-1c119b576bec.json DELETED
@@ -1,17 +0,0 @@
1
- {
2
- "id": "0e22c68a-134e-4474-af0d-1c119b576bec",
3
- "filename": "tools_discovery.png",
4
- "doc_type": "image",
5
- "file_size": 78410,
6
- "created_at": "2025-07-08T12:16:07.737267",
7
- "metadata": {
8
- "file_extension": ".png",
9
- "content_length": 350,
10
- "word_count": 43
11
- },
12
- "tags": [],
13
- "summary": null,
14
- "category": null,
15
- "language": null,
16
- "content_length": 350
17
- }
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
data/documents/metadata/b229c249-b844-4579-beb1-2d4185eeb732.json DELETED
@@ -1,17 +0,0 @@
1
- {
2
- "id": "b229c249-b844-4579-beb1-2d4185eeb732",
3
- "filename": "Model Context Protocol MCPLandscapeSecurityThreats.pdf",
4
- "doc_type": "pdf",
5
- "file_size": 1108266,
6
- "created_at": "2025-07-08T12:16:21.530542",
7
- "metadata": {
8
- "file_extension": ".pdf",
9
- "content_length": 80288,
10
- "word_count": 10899
11
- },
12
- "tags": [],
13
- "summary": null,
14
- "category": null,
15
- "language": null,
16
- "content_length": 80288
17
- }
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
data/documents/metadata/b3d0767c-1dd8-4f05-a9f8-d69d82f2abde.json DELETED
@@ -1,17 +0,0 @@
1
- {
2
- "id": "b3d0767c-1dd8-4f05-a9f8-d69d82f2abde",
3
- "filename": "A Study on the MCP A2A Framework.pdf",
4
- "doc_type": "pdf",
5
- "file_size": 1109775,
6
- "created_at": "2025-07-08T12:58:00.140462",
7
- "metadata": {
8
- "file_extension": ".pdf",
9
- "content_length": 60652,
10
- "word_count": 8322
11
- },
12
- "tags": [],
13
- "summary": null,
14
- "category": null,
15
- "language": null,
16
- "content_length": 60652
17
- }
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
data/documents/metadata/e3591269-f449-4f88-8185-7d98ef4c4845.json DELETED
@@ -1,17 +0,0 @@
1
- {
2
- "id": "e3591269-f449-4f88-8185-7d98ef4c4845",
3
- "filename": "A Comprehensive Overview of Large Language Models.pdf",
4
- "doc_type": "pdf",
5
- "file_size": 1814502,
6
- "created_at": "2025-07-08T12:30:52.899470",
7
- "metadata": {
8
- "file_extension": ".pdf",
9
- "content_length": 277778,
10
- "word_count": 42622
11
- },
12
- "tags": [],
13
- "summary": null,
14
- "category": null,
15
- "language": null,
16
- "content_length": 277778
17
- }
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
data/vector_store/content_index.index DELETED
@@ -1,3 +0,0 @@
1
- version https://git-lfs.github.com/spec/v1
2
- oid sha256:a4c8c6524348ec9e7e2e23bf1061354fd46ad4f61558c404b1766864fb69fe2f
3
- size 1439277
 
 
 
 
data/vector_store/content_index_metadata.json DELETED
The diff for this file is too large to render. See raw diff