Nihal2000 commited on
Commit
e2c22a2
·
1 Parent(s): 6812446
.gitattributes CHANGED
@@ -33,3 +33,4 @@ saved_model/**/* filter=lfs diff=lfs merge=lfs -text
33
  *.zip filter=lfs diff=lfs merge=lfs -text
34
  *.zst filter=lfs diff=lfs merge=lfs -text
35
  *tfevents* filter=lfs diff=lfs merge=lfs -text
 
 
33
  *.zip filter=lfs diff=lfs merge=lfs -text
34
  *.zst filter=lfs diff=lfs merge=lfs -text
35
  *tfevents* filter=lfs diff=lfs merge=lfs -text
36
+ *.index filter=lfs diff=lfs merge=lfs -text
data/documents/content/0e22c68a-134e-4474-af0d-1c119b576bec.txt ADDED
@@ -0,0 +1,21 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ # MCP Chatbot
2
+
3
+ 1. Give me a list of tools you provide (in `connect_to_server_and_run`)
4
+
5
+ ## ListToolsRequest
6
+
7
+ ### MCP Client
8
+
9
+ 3. Tool definitions are exposed to the LLM (in `process_query`)
10
+
11
+ ### ListToolsResult
12
+
13
+ 2. Here are the tools I can run
14
+
15
+ ![img-0.jpeg](img-0.jpeg)
16
+
17
+ ![img-1.jpeg](img-1.jpeg)
18
+
19
+ ![img-2.jpeg](img-2.jpeg)
20
+
21
+ ![img-3.jpeg](img-3.jpeg)
data/documents/content/b229c249-b844-4579-beb1-2d4185eeb732.txt ADDED
@@ -0,0 +1,977 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ --- Page 1 ---
2
+ Model Context Protocol (MCP): Landscape, Security Threats,
3
+ and Future Research Directions
4
+ XINYI HOU, Huazhong University of Science and Technology, China
5
+ YANJIE ZHAO, Huazhong University of Science and Technology, China
6
+ SHENAO WANG, Huazhong University of Science and Technology, China
7
+ HAOYU WANG∗,Huazhong University of Science and Technology, China
8
+ The Model Context Protocol (MCP) is a standardized interface designed to enable seamless interaction between
9
+ AI models and external tools and resources, breaking down data silos and facilitating interoperability across
10
+ diverse systems. This paper provides a comprehensive overview of MCP, focusing on its core components,
11
+ workflow, and the lifecycle of MCP servers, which consists of three key phases: creation, operation, and update.
12
+ We analyze the security and privacy risks associated with each phase and propose strategies to mitigate
13
+ potential threats. The paper also examines the current MCP landscape, including its adoption by industry
14
+ leaders and various use cases, as well as the tools and platforms supporting its integration. We explore future
15
+ directions for MCP, highlighting the challenges and opportunities that will influence its adoption and evolution
16
+ within the broader AI ecosystem. Finally, we offer recommendations for MCP stakeholders to ensure its secure
17
+ and sustainable development as the AI landscape continues to evolve.
18
+ CCS Concepts: •General and reference →Surveys and overviews ;•Security and privacy →Software
19
+ and application security ;•Computing methodologies →Artificial intelligence .
20
+ Additional Key Words and Phrases: Model Context Protocol, MCP, Vision paper, Security
21
+ ACM Reference Format:
22
+ Xinyi Hou, Yanjie Zhao, Shenao Wang, and Haoyu Wang. 2025. Model Context Protocol (MCP): Landscape,
23
+ Security Threats, and Future Research Directions. 1, 1 (April 2025), 20 pages. https://doi.org/10.1145/nnnnnnn.
24
+ nnnnnnn
25
+ 1 INTRODUCTION
26
+ In recent years, the vision of autonomous AI agents capable of interacting with a wide range of
27
+ tools and data sources has gained significant momentum. This progress accelerated in 2023 with the
28
+ introduction of function calling by OpenAI, which allowed language models to invoke external
29
+ APIs in a structured way [ 38]. This advancement expanded the capabilities of LLMs, enabling
30
+ them to retrieve real-time data, perform computations, and interact with external systems. As
31
+ function calling gained adoption, an ecosystem formed around it. OpenAI introduced the ChatGPT
32
+ plugin [37], allowing developers to build callable tools for ChatGPT. LLM app stores such as Coze [ 4]
33
+ and Yuanqi [ 50] have launched their plugin stores , supporting tools specifically designed for
34
+ ∗Haoyu Wang is the corresponding author (haoyuwang@hust.edu.cn).
35
+ Authors’ addresses: Xinyi Hou, xinyihou@hust.edu.cn, Huazhong University of Science and Technology, Wuhan, China;
36
+ Yanjie Zhao, yanjie_zhao@hust.edu.cn, Huazhong University of Science and Technology, Wuhan, China; Shenao Wang,
37
+ shenaowang@hust.edu.cn, Huazhong University of Science and Technology, Wuhan, China; Haoyu Wang, haoyuwang@
38
+ hust.edu.cn, Huazhong University of Science and Technology, Wuhan, China.
39
+ Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee
40
+ provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the
41
+ full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored.
42
+ Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires
43
+ prior specific permission and/or a fee. Request permissions from permissions@acm.org.
44
+ ©2025 Copyright held by the owner/author(s). Publication rights licensed to ACM.
45
+ ACM XXXX-XXXX/2025/4-ART
46
+ https://doi.org/10.1145/nnnnnnn.nnnnnnn
47
+ , Vol. 1, No. 1, Article . Publication date: April 2025.arXiv:2503.23278v2 [cs.CR] 6 Apr 2025
48
+
49
+ --- Page 2 ---
50
+ 2 X Hou, Y Zhao, S Wang, and H Wang
51
+ their platforms. Frameworks like LangChain [ 26] and LlamaIndex [ 29] provided standardized tool
52
+ interfaces , making it easier to integrate LLMs with external services. Other AI providers, including
53
+ Anthropic, Google, and Meta, introduced similar mechanisms, further driving adoption. Despite
54
+ these advancements, integrating tools remains fragmented . Developers must manually define
55
+ interfaces, manage authentication, and handle execution logic for each service. Function calling
56
+ mechanisms vary across platforms, requiring redundant implementations. Additionally, current
57
+ approaches rely on predefined workflows, limiting AI agents’ flexibility in dynamically
58
+ discovering and orchestrating tools .
59
+ In late 2024, Anthropic introduced the Model Context Protocol (MCP)[ 3], a general-purpose pro-
60
+ tocol standardizing AI-tool interactions. Inspired by the Language Server Protocol (LSP) [ 22], MCP
61
+ provides a flexible framework for AI applications to communicate with external tools dynamically.
62
+ Instead of relying on predefined tool mappings, MCP allows AI agents to autonomously discover,
63
+ select, and orchestrate tools based on task context. It also supports human-in-the-loop mechanisms,
64
+ enabling users to inject data or approve actions as needed. By unifying interfaces, MCP simplifies
65
+ the development of AI applications and improves their flexibility in handling complex workflows.
66
+ Since its release, MCP has rapidly grown from a niche protocol to a key foundation for AI-native
67
+ application development. A thriving ecosystem has emerged, with thousands of community-driven
68
+ MCP servers enabling model access to systems like GitHub [ 41], Slack [ 42], and even 3D design tools
69
+ like Blender [ 1]. Tools like Cursor [ 12] and Claude Desktop [ 2] demonstrate how MCP clients can
70
+ extend their capabilities by installing new servers, turning developer tools, productivity platforms,
71
+ and creative environments alike into multi-modal AI agents.
72
+ Despite the rapid adoption of MCP, its ecosystem is still in the early stages, with key areas such
73
+ as security, tool discoverability, and remote deployment lacking comprehensive solutions. These
74
+ issues present untapped opportunities for further research and development. Although MCP is
75
+ widely recognized for its potential in the industry, it has not yet been extensively analyzed in
76
+ academic research. This gap in research motivates this paper, which provides the first analysis of
77
+ the MCP ecosystem, examining its architecture and workflow, defining the lifecycle of MCP servers,
78
+ and identifying potential security risks at each stage, such as installer spoofing and tool name
79
+ conflict. Through this study, we present a thorough exploration of MCP’s current landscape and
80
+ offer a forward-looking vision that highlights key implications, outlines future research directions,
81
+ and addresses the challenges that must be overcome to ensure its sustainable growth.
82
+ Our contributions are as follows:
83
+ (1)We provide the first analysis of the MCP ecosystem, detailing its architecture, components,
84
+ and workflow.
85
+ (2)We identify the key components of MCP servers and define their lifecycle, encompassing the
86
+ stages of creation, operation, and update. We also highlight potential security risks associated
87
+ with each phase, offering insights into safeguarding AI-to-tool interactions.
88
+ (3)We examine the current MCP ecosystem landscape, analyzing the adoption, diversity, and
89
+ use cases across various industries and platforms.
90
+ (4)We discuss the implications of MCP’s rapid adoption, identifying key challenges for stake-
91
+ holders, and outline future research directions on security, scalability, and governance to
92
+ ensure its sustainable growth.
93
+ The remainder of this paper is structured as follows: § 2 compares tool invocation with and
94
+ without MCP, highlighting the motivation for this study. § 3 outlines the architecture of MCP,
95
+ detailing the roles of the MCP host, client, and server, as well as the lifecycle of the MCP server.
96
+ § 4 examines the current MCP landscape, focusing on key industry players and adoption trends.
97
+ § 5 analyzes security and privacy risks across the MCP server lifecycle and proposes mitigation
98
+ , Vol. 1, No. 1, Article . Publication date: April 2025.
99
+
100
+ --- Page 3 ---
101
+ Model Context Protocol (MCP): Landscape, Security Threats, and Future Research Directions 3
102
+ strategies. § 6 explores implications, future challenges, and recommendations to enhance MCP’s
103
+ scalability and security in dynamic AI environments. § 7 reviews prior work on tool integration
104
+ and security in LLM applications. Finally, § 8 concludes the whole paper.
105
+ 2 BACKGROUND AND MOTIVATION
106
+ 2.1 AI Tooling
107
+ Before the introduction of MCP, AI applications relied on various methods, such as manual API
108
+ wiring, plugin-based interfaces, and agent frameworks, to interact with external tools. As shown in
109
+ Figure 1, these approaches required integrating each external service with a specific API, leading to
110
+ increased complexity and limited scalability. MCP addresses these challenges by providing a
111
+ standardized protocol that enables seamless and flexible interaction with multiple tools.
112
+ AIApplication
113
+ External Tools and ResourcesSpecific APISpecific APISpecific APIWeb ServicesMCPServerAIApplication(MCPClient)Model Context Protocolvs.WithoutMCPWithMCP
114
+ Database
115
+ LocalFiles
116
+ Specific APISpecific APISpecific APIExternal Tools and ResourcesWeb Services
117
+ Database
118
+ LocalFiles
119
+ Fig. 1. Tool invocation with and without MCP.
120
+ 2.1.1 Manual API Wiring. In traditional implementations, developers had to establish manual API
121
+ connections for each tool or service that an AI application interacted with. This process required
122
+ custom authentication, data transformation, and error handling for every integration . As
123
+ the number of APIs increased, the maintenance burden became significant, often leading to tightly
124
+ coupled and fragile systems that were difficult to scale or modify. MCP eliminates this complexity
125
+ by offering a unified interface, allowing AI models to connect with multiple tools dynamically
126
+ without the need for custom API wiring.
127
+ 2.1.2 Standardized Plugin Interfaces. To reduce the complexity of manual wiring, plugin-based
128
+ interfaces such as OpenAI ChatGPT Plugins, introduced in November 2023 [ 37], allowed AI models
129
+ to connect with external tools through standardized API schemas like OpenAPI. For example, in
130
+ the OpenAI Plugin ecosystem, plugins like Zapier allowed models to perform predefined actions,
131
+ such as sending emails or updating CRM records. However, these interactions were often one-
132
+ directional and could not maintain state or coordinate multiple steps in a task . New LLM
133
+ app stores [ 62] such as ByteDance Coze [ 4] and Tencent Yuanqi [ 50] have also emerged, offering a
134
+ plugin store for web services. While these platforms expanded available tool options, they created
135
+ isolated ecosystems where plugins are platform-specific , limiting cross-platform compatibility
136
+ and requiring duplicate maintenance efforts. MCP stands out by being open-source and platform-
137
+ agnostic, enabling AI applications to engage in rich two-way interactions with external tools,
138
+ facilitating complex workflows.
139
+ 2.1.3 AI Agent Tool Integration. The emergence of AI agent frameworks like LangChain [ 26] and
140
+ similar tool orchestration frameworks provided a structured way for models to invoke external tools
141
+ through predefined interfaces, improving automation and adaptability [ 55]. However, integrating
142
+ and maintaining these tools remained largely manual, requiring custom implementations and
143
+ , Vol. 1, No. 1, Article . Publication date: April 2025.
144
+
145
+ --- Page 4 ---
146
+ 4 X Hou, Y Zhao, S Wang, and H Wang
147
+ increasing complexity as the number of tools grew. MCP simplifies this process by offering a
148
+ standardized protocol that enables AI agents to seamlessly invoke, interact with, and
149
+ chain multiple tools through a unified interface . This reduces manual configuration and
150
+ enhances task flexibility, allowing agents to perform complex operations without extensive custom
151
+ integration.
152
+ 2.1.4 Retrieval-Augmented Generation (RAG) and Vector Database. Contextual information retrieval
153
+ methods, such as RAG, leverage vector-based search to retrieve relevant knowledge from databases
154
+ or knowledge bases, enabling models to supplement responses with up-to-date information [ 11,16].
155
+ While this approach addressed the problem of knowledge cutoff and improved model accuracy, it
156
+ was limited to passive retrieval of information . It did not inherently allow models to perform
157
+ active operations, such as modifying data or triggering workflows. For example, a RAG-based
158
+ system could retrieve relevant sections from a product documentation database to assist a customer
159
+ support AI. However, if the AI needed to update customer records or escalate an issue to human
160
+ support, it could not take action beyond providing textual responses. MCP extends beyond passive
161
+ information retrieval by enabling AI models to interact with external data sources and tools actively,
162
+ facilitating both retrieval and action in a unified workflow.
163
+ 2.2 Motivation
164
+ MCP has rapidly gained traction in the AI community due to its ability to standardize how AI
165
+ models interact with external tools, fetch data, and execute operations. By addressing the limitations
166
+ of manual API wiring, plugin interfaces, and agent frameworks, MCP has the potential to redefine
167
+ AI-to-tool interactions and enable more autonomous and intelligent agent workflows. Despite
168
+ its growing adoption and promising potential, MCP is still in its early stages, with an evolving
169
+ ecosystem that remains incomplete. Many key aspects, such as security and tool discoverability,
170
+ are yet to be fully addressed, leaving ample room for future research and improvement. Moreover,
171
+ while MCP has gained rapid adoption in the industry, it is still largely unexplored in academia.
172
+ Motivated by this gap, this paper is the first to analyze the current MCP landscape, examine
173
+ its emerging ecosystem, and identify potential security risks . Additionally, we outline a
174
+ vision for MCP’s future development and highlight the key challenges that must be addressed to
175
+ support its long-term success.
176
+ 3 MCP ARCHITECTURE
177
+ 3.1 Core Components
178
+ The MCP architecture is composed of three core components: MCP host ,MCP client , and MCP
179
+ server . These components collaborate to facilitate seamless communication between AI applications,
180
+ external tools, and data sources, ensuring that operations are secure and properly managed. As
181
+ shown in Figure 2, in a typical workflow, the user sends a prompt to the MCP client, which analyzes
182
+ the intent ,selects the appropriate tools via the MCP server, and invokes external APIs to
183
+ retrieve and process the required information before notifying the user of the results.
184
+ 3.1.1 MCP Host. The MCP host is an AI application that provides the environment for executing
185
+ AI-based tasks while running the MCP client. It integrates interactive tools and data to enable
186
+ smooth communication with external services. Examples include Claude Desktop for AI-assisted
187
+ content creation, Cursor, an AI-powered IDE for code completion and software development, and
188
+ AI agents that function as autonomous systems for executing complex tasks. The MCP host hosts
189
+ the MCP client and ensures communication with external MCP servers.
190
+ , Vol. 1, No. 1, Article . Publication date: April 2025.
191
+
192
+ --- Page 5 ---
193
+ Model Context Protocol (MCP): Landscape, Security Threats, and Future Research Directions 5
194
+ MCP ClientsPrompt:“Can you please fetch the latest stock price of AAPL and notify me via email?”MCP Servers
195
+ CapabilitiesToolsResourcesPrompts
196
+ ②InitialResponse③Notification①InitialRequestTransferLayerDataSourceWeb Services
197
+ Database
198
+ LocalFiles
199
+ Tool Selection
200
+ API Invocation
201
+ IntentAnalysisNotificationSampling
202
+ Orchestration
203
+ UserMCP Workflow
204
+ (ChatApps,IDEs,···,AI Agents)MCPHosts
205
+ 1:1Client
206
+ Server
207
+ Fig. 2. The workflow of MCP.
208
+ 3.1.2 MCP Client. The MCP client acts as an intermediary within the host environment, managing
209
+ communication between the MCP host and one or more MCP servers. It initiates requests to MCP
210
+ servers, queries available functions, and retrieves responses that describe the server’s capabilities.
211
+ This ensures seamless interaction between the host and external tools. In addition to managing
212
+ requests and responses, the MCP client processes notifications from MCP servers, providing
213
+ real-time updates about task progress and system status. It also performs sampling to gather data
214
+ on tool usage and performance, enabling optimization and informed decision-making. The MCP
215
+ client communicates through the transport layer with MCP servers, facilitating secure, reliable
216
+ data exchange and smooth interaction between the host and external resources.
217
+ 3.1.3 MCP Server. The MCP server enables the MCP host and client to access external systems
218
+ and execute operations, offering three core capabilities: tools, resources, and prompts .
219
+ •Tools: Enabling external operations . Tools allow the MCP server to invoke external services
220
+ and APIs to execute operations on behalf of AI models. When the client requests an operation, the
221
+ MCP server identifies the appropriate tool, interacts with the service, and returns the result. For
222
+ instance, if an AI model requires real-time weather data or sentiment analysis, the MCP server
223
+ connects to the relevant API, retrieves the data, and delivers it to the host. Unlike traditional
224
+ function calling, which requires multiple steps and separates invocation from execution, Tools of
225
+ MCP servers streamline this process by allowing the model to autonomously select and invoke
226
+ the appropriate tool based on context. Once configured, these tools follow a standardized supply-
227
+ and-consume model, making them modular, reusable, and easily accessible to other applications,
228
+ enhancing system efficiency and flexibility.
229
+ •Resources: Exposing data to AI models . Resources provide access to structured and unstruc-
230
+ tured datasets that the MCP server can expose to AI models. These datasets may come from
231
+ local storage, databases, or cloud platforms. When an AI model requests specific data, the MCP
232
+ server retrieves and processes the relevant information, enabling the model to make data-driven
233
+ decisions. For example, a recommendation system may access customer interaction logs, or a
234
+ document summarization task may query a text repository.
235
+ •Prompts: Reusable templates for workflow optimization . Prompts are predefined templates
236
+ and workflows that the MCP server generates and maintains to optimize AI responses and
237
+ streamline repetitive tasks. They ensure consistency in responses and improve task execution
238
+ efficiency. For instance, a customer support chatbot may use prompt templates to provide uniform
239
+ , Vol. 1, No. 1, Article . Publication date: April 2025.
240
+
241
+ --- Page 6 ---
242
+ 6 X Hou, Y Zhao, S Wang, and H Wang
243
+ and accurate responses, while an annotation task may rely on predefined prompts to maintain
244
+ consistency in data labeling.
245
+ 3.2 Transport Layer and Communication
246
+ The transport layer ensures secure, bidirectional communication, allowing for real-time interaction
247
+ and efficient data exchange between the host environment and external systems. The transport
248
+ layer manages the transmission of initial requests from the client, the delivery of server responses
249
+ detailing available capabilities, and the exchange of notifications that keep the client informed of
250
+ ongoing updates. Communication between the MCP client and the MCP server follows a structured
251
+ process, beginning with an initial request from the client to query the server’s functionalities.
252
+ Upon receiving the request, the server responds with an initial response listing the available
253
+ tools, resources, and prompts the client can leverage. Once the connection is established, the
254
+ system maintains a continuous exchange of notifications to ensure that changes in server status
255
+ or updates are communicated back to the client in real time. This structured communication
256
+ ensures high-performance interactions and keeps AI models synchronized with external resources,
257
+ enhancing the effectiveness of AI applications.
258
+ 3.3 MCP Server Lifecycle
259
+ The MCP server lifecycle as shown in Figure 3 consists of three key phases: creation ,operation ,
260
+ andupdate . Each phase defines critical activities that ensure the secure and efficient functioning
261
+ of the MCP server, enabling seamless interaction between AI models and external tools, resources,
262
+ and prompts.
263
+ CreationMCPServerComponentsConfigurationSource CodeConfig FilesManifest
264
+ MetadataNameDescriptionVersion
265
+ Tool ListTool NameDescriptionPermissions
266
+ Resources ListData SourcesEndpointsPermissions
267
+ PromptsTemplatesWorkflowsMetadata
268
+ Server Registration → Name CollisionInstaller Deployment → Installer SpoofingCode Integrity Verification → BackdoorOperationTool Execution → Tool Name ConflictSlash Command → Command OverlapSandbox Mechanism → Sandbox EscapeUpdateAuthorization → Privilege PersistenceVersion Control → Vulnerable VersionsOld Version → Configuration DriftMCPServer Lifecycle
269
+ Fig. 3. MCP servers components and lifecycle.
270
+ 3.3.1 MCP Server Components. The MCP server is responsible for managing external tools, data
271
+ sources, and workflows, providing AI models with the necessary resources to perform tasks
272
+ efficiently and securely. It comprises several key components that ensure smooth and effective
273
+ operations. Metadata includes essential information about the server, such as its name, version, and
274
+ description, allowing clients to identify and interact with the appropriate server. Configuration
275
+ involves the source code, configuration files, and manifest, which define the server’s operational
276
+ parameters, environment settings, and security policies. Tool list stores a catalog of available tools,
277
+ detailing their functionalities, input-output formats, and access permissions, ensuring proper tool
278
+ , Vol. 1, No. 1, Article . Publication date: April 2025.
279
+
280
+ --- Page 7 ---
281
+ Model Context Protocol (MCP): Landscape, Security Threats, and Future Research Directions 7
282
+ management and security. Resources list governs access to external data sources, including web
283
+ APIs, databases, and local files, specifying allowed endpoints and their associated permissions.
284
+ Finally, Prompts and Templates include pre-configured task templates and workflows that
285
+ enhance the efficiency of AI models in executing complex operations. Together, these components
286
+ enable MCP servers to provide seamless tool integration, data retrieval, and task orchestration for
287
+ AI-powered applications.
288
+ 3.3.2 Creation Phase. The creation phase is the initial stage of the MCP server lifecycle, where the
289
+ server is registered, configured, and prepared for operation. This phase involves three key steps.
290
+ Server registration assigns a unique name and identity to the MCP server, allowing clients to
291
+ discover and connect to the appropriate server instance. Installer deployment involves installing
292
+ the MCP server and its associated components, ensuring that the correct configuration files, source
293
+ code, and manifests are in place. Code integrity verification validates the integrity of the server’s
294
+ codebase to prevent unauthorized modifications or tampering before the server becomes operational.
295
+ Successful completion of the creation phase ensures that the MCP server is ready to handle requests
296
+ and interact securely with external tools and data sources.
297
+ 3.3.3 Operation Phase. The operation phase is where the MCP server actively processes requests,
298
+ executes tool invocations, and facilitates seamless interaction between AI applications and external
299
+ resources. Tool execution allows the MCP server to invoke the appropriate tools based on the AI
300
+ application’s requests, ensuring that the selected tools perform their intended operations. Slash
301
+ command handling enables the server to interpret and execute multiple commands, including
302
+ those issued through user interfaces or AI agents, while managing potential command overlaps to
303
+ prevent conflicts. Sandbox mechanism enforcement ensures that the execution environment is
304
+ isolated and secure, preventing unauthorized access and mitigating potential risks. Throughout the
305
+ operation phase, the MCP server maintains a stable and controlled environment, enabling reliable
306
+ and secure task execution.
307
+ 3.3.4 Update Phase. The update phase ensures that the MCP server remains secure, up-to-date, and
308
+ capable of adapting to evolving requirements. This phase includes three key tasks. Authorization
309
+ management verifies that post-update access permissions remain valid, preventing unauthorized
310
+ use of server resources after updates. Version control maintains consistency between different
311
+ server versions, ensuring that new updates do not introduce vulnerabilities or conflicts. Old version
312
+ management deactivates or removes outdated versions to prevent attackers from exploiting known
313
+ vulnerabilities in previous versions.
314
+ Understanding the MCP server lifecycle is essential for identifying potential vulnerabilities
315
+ and designing effective security measures. Each phase introduces distinct challenges that must
316
+ be carefully addressed to maintain the security, efficiency, and adaptability of the MCP server in
317
+ dynamic AI environments.
318
+ 4 CURRENT LANDSCAPE
319
+ 4.1 Ecosystem Overview
320
+ 4.1.1 Key Adopters. Table 1 demonstrates how MCP has gained significant traction across diverse
321
+ sectors, signaling its growing importance in enabling seamless AI-to-tool interactions. Notably,
322
+ leading AI companies such as Anthropic [ 2] and OpenAI [ 39] have integrated MCP to enhance
323
+ agent capabilities and improve multi-step task execution. This adoption by industry pioneers
324
+ has set a precedent, encouraging other major players to follow suit. Chinese tech giants like
325
+ Baidu [ 31] have also incorporated MCP into their ecosystems, highlighting the protocol’s potential
326
+ to standardize AI workflows across global markets. Developer tools and IDEs, including Replit [ 43],
327
+ , Vol. 1, No. 1, Article . Publication date: April 2025.
328
+
329
+ --- Page 8 ---
330
+ 8 X Hou, Y Zhao, S Wang, and H Wang
331
+ Table 1. Overview of MCP ecosystem adoption.
332
+ Category Company/Product Key Features or Use Cases
333
+ Anthropic (Claude) [2] Full MCP support in the desktop version, enabling interaction with external tools.
334
+ AI Models and Frameworks OpenAI [39] MCP support in Agent SDK and API for seamless integration.
335
+ Baidu Maps [31] API integration using MCP to access geolocation services.
336
+ Blender MCP [33] Enables Blender and Unity 3D model generation via natural language commands.
337
+ Replit [43] AI-assisted development environment with MCP tool integration.
338
+ Microsoft Copilot Studio [49] Extends Copilot Studio with MCP-based tool integration.
339
+ Developer Tools Sourcegraph Cody [10] Implements MCP through OpenCTX for resource integration.
340
+ Codeium [9] Adds MCP support for coding assistants to facilitate cross-system tasks.
341
+ Cursor [12] MCP tool integration in Cursor Composer for seamless code execution.
342
+ Cline [7] VS Code coding agent that manages MCP tools and servers.
343
+ Zed [60] Provides slash commands and tool integration based on MCP.
344
+ JetBrains [24] Integrates MCP for IDE-based AI tooling.
345
+ IDEs/Editors Windsurf Editor [14] AI-assisted IDE with MCP tool interaction.
346
+ TheiaAI/TheiaIDE [52] Enables MCP server interaction for AI-powered tools.
347
+ Emacs MCP [32] Enhances AI functionality in Emacs by supporting MCP tool invocation.
348
+ OpenSumi [40] Supports MCP tools in IDEs and enables seamless AI tool integration.
349
+ Cloudflare [8] Provides remote MCP server hosting and OAuth integration.
350
+ Cloud Platforms and Services Block (Square) [47] Uses MCP to enhance data processing efficiency for financial platforms.
351
+ Stripe [48] Exposes payment APIs via MCP for seamless AI integration.
352
+ Apify MCP Tester [51] Connects to any MCP server using SSE for API testing.
353
+ Web Automation and Data LibreChat [28] Extends the current tool ecosystem through MCP integration.
354
+ Goose [21] Allows building AI agents with integrated MCP server functionality.
355
+ Microsoft Copilot Studio [ 49], JetBrains [ 24], and TheiaIDE [ 52], leverage MCP to facilitate agentic
356
+ workflows and streamline cross-platform operations. This trend indicates a shift toward embedding
357
+ MCP in developer environments to enhance productivity and reduce manual integration efforts.
358
+ Furthermore, cloud platforms like Cloudflare [ 8] and financial service providers such as Block
359
+ (Square) [ 47] and Stripe [ 48] are exploring MCP to improve security, scalability, and governance
360
+ in multi-tenant environments. The widespread adoption of MCP by these industry leaders not
361
+ only highlights its growing relevance but also points to its potential as a foundational layer in
362
+ AI-powered ecosystems. As more companies integrate MCP into their operations, the protocol is
363
+ set to play a central role in shaping the future of AI tool integration. Looking ahead, MCP is poised
364
+ to become a key enabler of AI-driven workflows, driving more secure, scalable, and efficient AI
365
+ ecosystems across industries.
366
+ 4.1.2 Community-Driven MCP Servers. Anthropic has not yet released an official MCP marketplace,
367
+ but the vibrant MCP community has stepped in to fill this gap by creating numerous independent
368
+ server collections and platforms. As shown in Table 2, platforms such as MCP.so [ 35], Glama [ 20],
369
+ and PulseMCP [ 15] host thousands of servers, allowing users to discover and integrate a wide
370
+ range of tools and services. These community-driven platforms have significantly accelerated the
371
+ adoption of MCP by providing accessible repositories where developers can publish, manage, and
372
+ share their MCP servers. Desktop-based solutions like Dockmaster [ 34] and Toolbase [ 19] further
373
+ enhance local MCP deployment capabilities, empowering developers to manage and experiment
374
+ with servers in isolated environments. The rise of community-driven MCP server ecosystems
375
+ reflects the growing enthusiasm for MCP and highlights the need for a formalized marketplace.
376
+ 4.1.3 SDKs and Tools. With the continuous growth of community-driven tools and official SDKs,
377
+ the MCP ecosystem is becoming increasingly accessible, allowing developers to integrate MCP into
378
+ various applications and workflows efficiently. Official SDKs are available in multiple languages,
379
+ including TypeScript ,Python ,Java ,Kotlin , and C#, providing developers with versatile options
380
+ to implement MCP in different environments. In addition to official SDKs, the community has
381
+ contributed numerous frameworks and utilities that simplify MCP server development. Tools such
382
+ , Vol. 1, No. 1, Article . Publication date: April 2025.
383
+
384
+ --- Page 9 ---
385
+ Model Context Protocol (MCP): Landscape, Security Threats, and Future Research Directions 9
386
+ Table 2. Overview of MCP server collections and deployment modes (As of March 27, 2025).
387
+ Collection Author Mode # Servers URL
388
+ MCP.so mcp.so Website 4774 mcp.so
389
+ Glama glama.ai Website 3356 glama.ai
390
+ PulseMCP Antanavicius et al. Website 3164 pulsemcp.com
391
+ Smithery Henry Mao Website 2942 smithery.ai
392
+ Dockmaster mcp-dockmaster Desktop App 517 mcp-dockmaster.com
393
+ Official Collection Anthropic GitHub Repo 320 modelcontextprotocol/servers
394
+ AiMCP Hekmon Website 313 aimcp.info
395
+ MCP.run mcp.run Website 114 mcp.run
396
+ Awesome MCP Servers Stephen Akinyemi GitHub Repo 88 appcypher/mcp-servers
397
+ mcp-get registry Michael Latman Website 59 mcp-get.com
398
+ Awesome MCP Servers wong2 Website 34 mcpservers.org
399
+ OpenTools opentoolsteam Website 25 opentools.com
400
+ Toolbase gching Desktop App 24 gettoolbase.ai
401
+ make inference mkinf Website 20 mkinf.io
402
+ Awesome Crypto MCP Servers Luke Fan GitHub Repo 13 badkk/crypto-mcp-servers
403
+ asEasyMCP andFastMCP offer lightweight TypeScript-based solutions for quickly building MCP
404
+ servers, while FastAPI to MCP Auto Generator enables the seamless exposure of FastAPI endpoints
405
+ as MCP tools. For more complex scenarios, Foxy Contexts provides a Golang-based library to
406
+ build MCP servers, and Higress MCP Server Hosting extends the API Gateway (based on Envoy)
407
+ to host MCP servers with wasm plugins. Server generation and management platforms such as
408
+ Mintlify ,Speakeasy , and Stainless further enhance the ecosystem by automating MCP server
409
+ generation , providing curated MCP server lists, and enabling faster deployment with minimal
410
+ manual intervention. These platforms empower organizations to rapidly create and manage secure
411
+ and well-documented MCP servers.
412
+ 4.2 Use Cases
413
+ MCP has become a vital tool for AI applications to effectively communicate with external tools,
414
+ APIs, and systems. By standardizing interactions, MCP simplifies complex workflows, boosting the
415
+ efficiency of AI-driven applications. Below, we explore three key platforms (i.e., OpenAI, Cursor,
416
+ and Cloudflare) that have successfully integrated MCP, highlighting their distinct use cases.
417
+ 4.2.1 OpenAI: MCP Integration in AI Agents and SDKs. OpenAI has adopted MCP to standardize
418
+ AI-to-tool communication, recognizing its potential to enhance integration with external tools.
419
+ Recently, OpenAI introduced MCP support in its Agent SDK, enabling developers to create AI
420
+ agents that seamlessly interact with external tools. In a typical workflow, developers use the Agent
421
+ SDK to define tasks that require external tool invocation. When an AI agent encounters a task
422
+ like retrieving data from an API or querying a database, the SDK routes the request through an
423
+ MCP server. The request is transmitted via the MCP protocol, ensuring proper formatting and
424
+ real-time response delivery to the agent. OpenAI’s plan to integrate MCP into the Responses API
425
+ will streamline AI-to-tool communication, allowing AI models like ChatGPT to interact with tools
426
+ dynamically without extra configuration. Additionally, OpenAI aims to extend MCP support to
427
+ ChatGPT desktop applications, enabling AI assistants to handle various user tasks by connecting
428
+ to remote MCP servers, further bridging the gap between AI models and external systems.
429
+ 4.2.2 Cursor: Enhancing Software Development with MCP-Powered Code Assistants. Cursor uses
430
+ MCP to enhance software development by enabling AI-powered code assistants that automate
431
+ complex tasks. With MCP, Cursor allows AI agents to interact with external APIs, access code
432
+ , Vol. 1, No. 1, Article . Publication date: April 2025.
433
+
434
+ --- Page 10 ---
435
+ 10 X Hou, Y Zhao, S Wang, and H Wang
436
+ repositories, and automate workflows directly within the integrated development environment.
437
+ When a developer issues a command within the IDE, the AI agent evaluates whether external tools
438
+ are needed. If so, the agent sends a request to an MCP server, which identifies the appropriate
439
+ tool and processes the task, such as running API tests, modifying files, or analyzing code. The
440
+ results are then returned to the agent for further action. This integration helps automate repetitive
441
+ tasks, minimizing errors and enhancing overall development efficiency. By simplifying complex
442
+ processes, Cursor boosts both productivity and accuracy, allowing developers to execute multi-step
443
+ operations effortlessly.
444
+ 4.2.3 Cloudflare: Remote MCP Server Hosting and Scalability. Cloudflare has played a pivotal role
445
+ in transforming MCP from a local deployment model to a cloud-hosted architecture by introducing
446
+ remote MCP server hosting. This approach eliminates the complexities associated with configuring
447
+ MCP servers locally, allowing clients to connect to secure, cloud-hosted MCP servers seamlessly.
448
+ The workflow begins with Cloudflare hosting MCP servers in secure cloud environments that are
449
+ accessible via authenticated API calls. AI agents initiate requests to the Cloudflare MCP server
450
+ using OAuth-based authentication, ensuring that only authorized entities can access the server.
451
+ Once authenticated, the agent dynamically invokes external tools and APIs through the MCP server,
452
+ executing tasks such as data retrieval, document processing, or API integration. This approach
453
+ not only reduces the risk of misconfiguration but also ensures seamless execution of AI-powered
454
+ workflows across distributed environments. Furthermore, Cloudflare’s multi-tenant architecture
455
+ allows multiple users to securely access and manage their own MCP instances, ensuring isolation
456
+ and preventing data leakage. Cloudflare’s solution thus extends MCP’s capabilities by enabling
457
+ enterprise-grade scalability and secure multi-device interoperability.
458
+ The adoption of MCP by platforms like OpenAI, Cursor, and Cloudflare highlights its flexibility
459
+ and growing role in AI-driven workflows, enhancing efficiency, adaptability, and scalability across
460
+ development tools, enterprise applications, and cloud services.
461
+ 5 SECURITY AND PRIVACY ANALYSIS
462
+ MCP servers, as open and extensible platforms, introduce various security risks throughout their
463
+ lifecycle. In this section, we analyze security threats across different phases: creation ,operation ,
464
+ andupdate . Each phase of the MCP server lifecycle presents unique challenges that, if not properly
465
+ mitigated, can compromise system integrity, data security, and user privacy.
466
+ 5.1 Security Risks in the Creation Phase
467
+ The creation phase of an MCP server involves registering the server, deploying the installer, and
468
+ verifying code integrity. This phase introduces three key risks: name collision, installer spoofing,
469
+ and code injection/backdoor.
470
+ 5.1.1 Name Collision. Server name collision occurs when a malicious entity registers an MCP
471
+ server with an identical or deceptively similar name to a legitimate server, deceiving users during the
472
+ installation phase. Since MCP clients primarily rely on the server’s name and description when
473
+ selecting servers , they are vulnerable to such impersonation attacks. Once a compromised server is
474
+ installed, it can mislead AI agents and clients into invoking the malicious server, potentially exposing
475
+ sensitive data, executing unauthorized commands, or disrupting workflows. For example, an attacker
476
+ could register a server named mcp-github that mimics the legitimate github-mcp server, allowing
477
+ them to intercept and manipulate sensitive interactions between AI agents and trusted services.
478
+ Although MCP currently operates primarily in local environments, future adoption in multi-
479
+ tenant environments introduces additional risks of name collision. In these scenarios, where
480
+ multiple organizations or users might register servers with similar names, the lack of centralized
481
+ , Vol. 1, No. 1, Article . Publication date: April 2025.
482
+
483
+ --- Page 11 ---
484
+ Model Context Protocol (MCP): Landscape, Security Threats, and Future Research Directions 11
485
+ naming control can increase the likelihood of confusion and impersonation attacks. Additionally,
486
+ asMCP marketplaces grow to support public server listings, supply chain attacks may
487
+ become a critical concern , where malicious servers can replace legitimate ones. To mitigate
488
+ these risks, future research can focus on establishing strict namespace policies, implementing
489
+ cryptographic server verification, and designing reputation-based trust systems to secure MCP
490
+ server registrations.
491
+ 5.1.2 Installer Spoofing. Installer spoofing occurs when attackers distribute modified MCP server
492
+ installers that introduce malicious code or backdoors during the installation process. Each MCP
493
+ server requires a unique configuration that users must manually set up in their local environments
494
+ before the client can invoke the server. This manual configuration process creates a barrier for
495
+ less technical users, prompting the emergence of unofficial auto-installers that automate the
496
+ setup process. As shown in Table 3, tools such as Smithery-CLI ,mcp-get , and mcp-installer
497
+ streamline the installation process, allowing users to quickly configure MCP servers without dealing
498
+ with intricate server settings.
499
+ Table 3. Unofficial MCP auto installers (As of March 27, 2025).
500
+ Tool Author # Stars # Servers URL
501
+ Smithery CLI Henry Mao 170 2942 smithery.ai
502
+ mcp.run Dylibso / 118 docs.mcp.run
503
+ mcp-get Michael Latman 318 59 mcp-get.com
504
+ Toolbase gching / 24 gettoolbase.ai
505
+ mcp-installer Ani Betts 767 NL1mcp-installer
506
+ 1Enables MCP server installation through natural language interaction with the
507
+ client.
508
+ However, while these auto-installers enhance usability, they also introduce new attack surfaces
509
+ by potentially distributing compromised packages. Since these unofficial installers are often sourced
510
+ from unverified repositories or community-driven platforms, they may inadvertently expose users
511
+ to security risks such as installing tampered servers or misconfigured environments. Attackers
512
+ canexploit these auto-installers by embedding malware that grants unauthorized access,
513
+ modifies system configurations, or creates persistent backdoors . Moreover, most users
514
+ who opt for one-click installations rarely review the underlying code for potential security
515
+ vulnerabilities, making it easier for attackers to distribute compromised versions undetected.
516
+ Addressing these challenges requires developing a standardized, secure installation framework
517
+ for MCP servers, enforcing package integrity checks, and establishing reputation-based trust
518
+ mechanisms to assess the credibility of auto-installers in the MCP ecosystem.
519
+ 5.1.3 Code Injection/Backdoor. Code injection attacks occur when malicious code is surreptitiously
520
+ embedded into the MCP server’s codebase during the creation phase, often bypassing traditional
521
+ security checks. It targets the server’s source code or configuration files, embedding hidden back-
522
+ doors that persist even after updates or security patches. These backdoors allow attackers to
523
+ silently maintain control over the server, enabling actions such as unauthorized data exfiltration,
524
+ privilege escalation, or command manipulation. Code injection is particularly insidious because
525
+ it can be introduced by compromised dependencies, vulnerable build pipelines, or unauthorized
526
+ modifications to the server’s source code. Since MCP servers often rely on community-maintained
527
+ components and open-source libraries, ensuring the integrity of these dependencies is critical.
528
+ To mitigate this risk, rigorous code integrity verification, strict dependency management,
529
+ and regular security audits should be implemented to detect unauthorized modifications
530
+ , Vol. 1, No. 1, Article . Publication date: April 2025.
531
+
532
+ --- Page 12 ---
533
+ 12 X Hou, Y Zhao, S Wang, and H Wang
534
+ and prevent the introduction of malicious code . Additionally, adopting reproducible builds
535
+ and enforcing checksum validation during deployment can further safeguard MCP servers from
536
+ injection-based threats.
537
+ 5.2 Security Risks in the Operation Phase
538
+ The operation phase is when the MCP server actively executes tools, processes slash commands,
539
+ and interacts with external APIs. This phase introduces three major risks: tool name conflicts, slash
540
+ command overlap, and sandbox escape.
541
+ 5.2.1 Tool Name Conflicts. Tool name conflicts arise when multiple tools within the MCP ecosystem
542
+ share identical or similar names, leading to ambiguity and confusion during tool selection and
543
+ execution. This can result in AI applications inadvertently invoking the wrong tool, potentially
544
+ executing malicious commands or leaking sensitive information. A common attack scenario involves
545
+ a malicious actor registering a tool named send_email that mimics a legitimate email-sending tool.
546
+ If the MCP client invokes the malicious version, sensitive information intended for trusted recipients
547
+ may be redirected to an attacker-controlled endpoint, compromising data confidentiality. Beyond
548
+ name similarity, our experiments revealed that malicious actors can further manipulate tool
549
+ selection by embedding deceptive phrases in tool descriptions. Specifically, we observed that if a
550
+ tool’s description explicitly contains directives like “this tool should be prioritized” or “prefer using
551
+ this tool first”, the MCP client is more likely to select that tool, even when its functionality is inferior
552
+ or potentially harmful. This introduces a severe risk of toolflow hijacking , where attackers can
553
+ leverage misleading descriptions to influence tool selection and gain control over critical workflows.
554
+ This underscores the need for researchers to develop advanced validation and anomaly detection
555
+ techniques to identify and mitigate deceptive tool descriptions, ensuring accurate and secure AI
556
+ tool selection.
557
+ 5.2.2 Slash Command Overlap. Slash command overlap occurs when multiple tools define identical
558
+ or similar commands, leading to ambiguity during command execution. This overlap introduces
559
+ the risk of executing unintended actions, especially when AI applications dynamically select and
560
+ invoke tools based on contextual cues. Malicious actors can exploit this ambiguity by introducing
561
+ conflicting commands that manipulate tool behavior, potentially compromising system integrity or
562
+ exposing sensitive data. For instance, if one tool registers a /delete command to remove temporary
563
+ files while another uses the same command to erase critical system logs, an AI application may
564
+ mistakenly execute the incorrect command, potentially causing data loss or system instability.
565
+ Similar issues have been observed in team chat systems such as Slack, where overlapping command
566
+ registrations allowed unauthorized tools to hijack legitimate invocations, resulting in security
567
+ breaches and operational disruptions [ 61]. Since slash commands are often surfaced as user-
568
+ facing shortcuts in client interfaces, misinterpreted or conflicting commands can lead to
569
+ dangerous outcomes , especially in multi-tool environments. To minimize this risk, MCP clients
570
+ should establish context-aware command resolution, apply command disambiguation techniques,
571
+ and prioritize execution based on verified tool metadata.
572
+ 5.2.3 Sandbox Escape. Sandboxing isolates the execution environment of MCP tools, restricting
573
+ their access to critical system resources and protecting the host system from potentially harmful
574
+ operations. However, sandbox escape vulnerabilities arise when attackers exploit flaws in the
575
+ sandbox implementation, enabling them to break out of the restricted environment and gain
576
+ unauthorized access to the host system. Once outside the sandbox, attackers can execute arbitrary
577
+ code, manipulate sensitive data, or escalate privileges, compromising the security and stability of the
578
+ MCP ecosystem. Common attack vectors include exploiting weaknesses in system calls, improperly
579
+ , Vol. 1, No. 1, Article . Publication date: April 2025.
580
+
581
+ --- Page 13 ---
582
+ Model Context Protocol (MCP): Landscape, Security Threats, and Future Research Directions 13
583
+ handled exceptions, and vulnerabilities in third-party libraries. For instance, a malicious MCP tool
584
+ could exploit unpatched vulnerabilities in the underlying container runtime to bypass confinement
585
+ and execute commands with elevated privileges. Similarly, side-channel attacks may allow attackers
586
+ to extract sensitive data, undermining the intended isolation of the sandbox. Examining real-world
587
+ sandbox escape scenarios in MCP environments can provide valuable insights for strengthening
588
+ sandbox security and preventing future exploitation.
589
+ 5.3 Security Risks in the Update Phase
590
+ The update phase involves managing server versions, modifying configurations, and adjusting
591
+ access controls. This phase introduces three critical risks: post-update privilege persistence, re-
592
+ deployment of vulnerable versions, and configuration drift.
593
+ 5.3.1 Post-Update Privilege Persistence. Post-update privilege persistence occurs when outdated
594
+ or revoked privileges remain active after an MCP server update, allowing previously authorized
595
+ users or malicious actors to retain elevated privileges. This vulnerability arises when privilege
596
+ modifications, such as API key revocations or permission changes, are not properly synchro-
597
+ nized or invalidated following server updates . If these outdated privileges persist, attackers
598
+ may exploit them to maintain unauthorized access to sensitive resources or perform malicious
599
+ operations. For example, in API-driven environments like GitHub or AWS, privilege persistence
600
+ has been observed when outdated OAuth tokens or IAM session tokens remain valid after privilege
601
+ revocation. Similarly, in MCP ecosystems, if a revoked API key or modified role configuration is
602
+ not promptly invalidated after an update, an attacker could continue invoking privileged actions,
603
+ potentially compromising the integrity of the system. Enforcing strict privilege revocation policies,
604
+ ensuring privilege changes propagate consistently across all server instances, and implementing
605
+ automatic expiration for API keys and session tokens are essential to reducing the likelihood
606
+ of privilege persistence. Comprehensive logging and auditing of privilege modifications further
607
+ enhance visibility and help detect inconsistencies that could indicate privilege persistence.
608
+ 5.3.2 Re-deployment of Vulnerable Versions. MCP servers, being open-source and maintained by
609
+ individual developers or community contributors , lack a centralized platform for auditing
610
+ and enforcing security updates. Users typically download MCP server packages from repositories
611
+ like GitHub, npm, or PyPi and configure them locally, often without formal review processes.
612
+ This decentralized model increases the risk of re-deploying vulnerable versions, either due to
613
+ delayed updates, version rollbacks, or reliance on unverified package sources. When users update
614
+ MCP servers, they may unintentionally roll back to older, vulnerable versions to address compat-
615
+ ibility issues or maintain stability. Additionally, unofficial auto-installers, such as mcp-get and
616
+ mcp-installer , which streamline server installation, may default to cached or outdated versions,
617
+ exposing systems to previously patched vulnerabilities. Since these tools often prioritize ease of
618
+ use over security , they may lack version verification or fail to notify users about critical updates.
619
+ Because security patches in the MCP ecosystem rely on community-driven maintenance, delays
620
+ between vulnerability disclosure and patch availability are common . Users who do not
621
+ actively track updates or security advisories may unknowingly continue using vulnerable versions,
622
+ creating opportunities for attackers to exploit known flaws. For example, an attacker could exploit
623
+ an outdated MCP server to gain unauthorized access or manipulate server operations. From a
624
+ research perspective, analyzing version management practices in MCP environments can identify
625
+ potential gaps and highlight the need for automated vulnerability detection and mitigation. On the
626
+ other hand, there is also a pressing need to establish an official package management system
627
+ with a standardized packaging format for MCP servers and a centralized server registry to
628
+ facilitate secure discovery and verification of available MCP servers.
629
+ , Vol. 1, No. 1, Article . Publication date: April 2025.
630
+
631
+ --- Page 14 ---
632
+ 14 X Hou, Y Zhao, S Wang, and H Wang
633
+ 5.3.3 Configuration Drift. Configuration drift occurs when unintended changes accumulate in
634
+ the system configuration over time, deviating from the original security baseline. These devia-
635
+ tions often arise due to manual adjustments, overlooked updates, or conflicting modifications
636
+ made by different tools or users. In MCP environments, where servers are typically configured
637
+ and maintained locally by end-users, such inconsistencies can introduce exploitable gaps and
638
+ undermine the overall security posture. With the emergence of remote MCP server support, such
639
+ as Cloudflare’s hosted MCP environments, configuration drift becomes an even more pressing
640
+ concern. Unlike local MCP deployments, where configuration issues may only affect a single user’s
641
+ environment, configuration drift in remote or cloud-based MCP servers can impact multiple users
642
+ or organizations simultaneously. Misconfigurations in multi-tenant environments may expose
643
+ sensitive data, lead to privilege escalation, or inadvertently grant malicious actors broader access
644
+ than intended. Addressing this issue requires the implementation of automated configuration
645
+ validation mechanisms and regular consistency checks to ensure that both local and remote MCP
646
+ environments adhere to secure baseline configurations.
647
+ 6 DISCUSSION
648
+ 6.1 Implications
649
+ The rapid adoption of MCP is transforming the AI application ecosystem, introducing new oppor-
650
+ tunities and challenges that have significant implications for developers, users, MCP ecosystem
651
+ maintainers, and the broader AI community.
652
+ For developers , MCP reduces the complexity of integrating external tools, enabling the creation
653
+ of more versatile and capable AI agents that can perform complex, multi-step tasks. By providing a
654
+ standardized interface for invoking tools, MCP shifts the focus from managing intricate integrations
655
+ to enhancing agent logic and functionality. However, this increased efficiency comes with the
656
+ responsibility to ensure that MCP implementations are secure, version-controlled, and aligned with
657
+ best practices. Developers must remain vigilant about maintaining secure tool configurations and
658
+ preventing potential misconfigurations that could expose systems to vulnerabilities.
659
+ For users , MCP enhances the experience by enabling seamless interactions between AI agents and
660
+ external tools, automating workflows across platforms such as enterprise data management and IoT
661
+ integration. It reduces the need for manual operations and improves efficiency in handling complex
662
+ tasks. However, as MCP servers gain deeper access to sensitive data and critical operations, users
663
+ must remain vigilant about the risks posed by unverified tools and misconfigured servers. Careless
664
+ installation or untrusted sources may cause data leaks, unauthorized actions, or system instability.
665
+ For MCP ecosystem maintainers , the decentralized nature of MCP server development and
666
+ distribution introduces a fragmented security landscape. MCP servers are often hosted on open-
667
+ source platforms, where updates and patches are community-driven and may vary in quality and
668
+ frequency. Without centralized oversight, inconsistencies in server configurations and outdated
669
+ versions can introduce potential vulnerabilities. As the MCP ecosystem evolves to support remote
670
+ hosting and multi-tenant environments, maintainers must remain attentive to potential risks
671
+ associated with configuration drift, privilege persistence, and re-deployment of vulnerable versions.
672
+ For the broader AI community , MCP unlocks new possibilities by enhancing agentic workflows
673
+ through cross-system coordination, dynamic tool invocation, and collaborative multi-agent systems.
674
+ MCP’s ability to standardize interactions between agents and tools has the potential to accelerate AI
675
+ adoption across industries, driving innovation in fields such as healthcare, finance, and enterprise
676
+ automation. However, as MCP adoption grows, the AI community must address emerging ethical
677
+ and operational concerns, such as ensuring fair and unbiased tool selection, safeguarding sensitive
678
+ user data, and preventing potential misuse of AI capabilities. Balancing these considerations will be
679
+ , Vol. 1, No. 1, Article . Publication date: April 2025.
680
+
681
+ --- Page 15 ---
682
+ Model Context Protocol (MCP): Landscape, Security Threats, and Future Research Directions 15
683
+ essential to ensuring that MCP’s benefits are widely distributed while maintaining accountability
684
+ and trust within the AI ecosystem.
685
+ 6.2 Challenges
686
+ Despite its potential, MCP’s adoption brings forth a range of challenges that need to be addressed
687
+ to ensure its sustainable growth and responsible development:
688
+ Lack of centralized security oversight. Since MCP servers are managed by independent develop-
689
+ ers and contributors, there is no centralized platform to audit, enforce, or validate security standards.
690
+ This decentralized model increases the likelihood of inconsistencies in security practices, making it
691
+ difficult to ensure that all MCP servers adhere to secure development principles. Moreover, the
692
+ absence of a unified package management system for MCP servers complicates the installation and
693
+ maintenance process, increasing the likelihood of deploying outdated or misconfigured versions.
694
+ The use of unofficial installation tools across different MCP clients further introduces variability in
695
+ server deployment, making it harder to maintain consistent security standards.
696
+ Authentication and authorization gaps. MCP currently lacks a standardized framework for
697
+ managing authentication and authorization across different clients and servers. Without a unified
698
+ mechanism to verify identities and regulate access, it becomes difficult to enforce granular permis-
699
+ sions, especially in multi-tenant environments where multiple users and agents may interact with
700
+ the same MCP server. The absence of robust authentication protocols increases the risk of unautho-
701
+ rized tool invocation and exposes sensitive data to malicious actors. Moreover, inconsistencies in
702
+ how different MCP clients handle user credentials further exacerbate these security challenges,
703
+ making it difficult to maintain a consistent access control policy across deployments.
704
+ Insufficient debugging and monitoring mechanisms. MCP lacks comprehensive debugging
705
+ and monitoring mechanisms, making it difficult for developers to diagnose errors, trace tool
706
+ interactions, and assess system behavior during tool invocation. Since MCP clients and servers
707
+ operate independently, inconsistencies in error handling and logging can obscure critical security
708
+ events or operational failures. Without robust monitoring frameworks and standardized logging
709
+ mechanisms, identifying anomalies, preventing system failures, and mitigating potential security
710
+ incidents becomes challenging, hindering the development of more resilient MCP ecosystems.
711
+ Maintaining consistency in multi-step, cross-system workflows. MCP allows AI agents to
712
+ execute multi-step workflows by invoking multiple tools across different systems through a unified
713
+ interface. Ensuring consistent context across successive tool interactions is inherently difficult
714
+ due to the distributed nature of these systems. Without effective state management and error
715
+ recovery mechanisms, MCP risks propagating errors or losing intermediate results, leading to
716
+ incomplete or inconsistent workflows. Additionally, dynamic coordination across diverse platforms
717
+ can introduce delays and conflicts, further complicating the seamless execution of workflows within
718
+ MCP environments.
719
+ Scalability challenges in multi-tenant environments. As MCP evolves to support remote server
720
+ hosting and multi-tenant environments, maintaining consistent performance, security, and tenant
721
+ isolation becomes increasingly complex. Without robust mechanisms for resource management
722
+ and tenant-specific configuration policies, misconfigurations can lead to data leakage, performance
723
+ issues, and privilege escalation. Ensuring scalability and isolation is critical for MCP’s reliability in
724
+ enterprise deployments.
725
+ Challenges in embedding MCP in smart environments. Integrating MCP into smart environ-
726
+ ments, such as smart homes, industrial IoT systems, or enterprise automation platforms, introduces
727
+ unique challenges related to real-time responsiveness, interoperability, and security. MCP servers
728
+ in these environments must handle continuous streams of data from multiple sensors and devices
729
+ while maintaining low-latency responses. Moreover, ensuring seamless interaction between AI
730
+ , Vol. 1, No. 1, Article . Publication date: April 2025.
731
+
732
+ --- Page 16 ---
733
+ 16 X Hou, Y Zhao, S Wang, and H Wang
734
+ agents and heterogeneous device ecosystems often requires custom adaptations, increasing devel-
735
+ opment complexity. Compromised MCP servers in smart environments can lead to unauthorized
736
+ control over critical systems, threatening both safety and data integrity.
737
+ 6.3 Recommendations for MCP stakeholders
738
+ To safeguard the long-term success and security of MCP, all stakeholders, including MCP main-
739
+ tainers, developers, researchers, and end-users, should implement best practices and proactively
740
+ address evolving challenges within the ecosystem.
741
+ Recommendations for MCP maintainers. MCP maintainers play a critical role in establishing
742
+ security standards, improving version control, and ensuring ecosystem stability. To reduce the
743
+ risk of security vulnerabilities, maintainers should establish a formal package management system
744
+ that enforces strict version control and ensures that only verified updates are distributed to users.
745
+ Additionally, introducing a centralized server registry would enable users to discover and validate
746
+ MCP servers more securely, reducing the risk of interacting with malicious or misconfigured
747
+ servers. To further enhance security, maintainers should promote the adoption of cryptographic
748
+ signatures for verifying MCP packages and encourage periodic security audits to identify and
749
+ mitigate vulnerabilities. Moreover, implementing a secure sandboxing framework can help prevent
750
+ privilege escalation and protect host environments from malicious tool executions.
751
+ Recommendations for developers. Developers integrating MCP into AI applications should
752
+ prioritize security and resilience by adhering to secure coding practices and maintaining thorough
753
+ documentation. Enforcing version management policies can prevent rollbacks to vulnerable versions,
754
+ while thorough testing ensures reliable MCP integrations before deployment. To mitigate configura-
755
+ tion drift, developers should automate configuration management and adopt infrastructure-as-code
756
+ (IaC) practices. Additionally, implementing robust tool name validation and disambiguation tech-
757
+ niques can prevent conflicts that lead to unintended behavior. Leveraging runtime monitoring and
758
+ logging helps track tool invocations, detect anomalies, and mitigate threats effectively.
759
+ Recommendations for researchers. Given the decentralized nature of MCP server deployment
760
+ and the evolving threat landscape, researchers should focus on conducting systematic security
761
+ analyses to uncover potential vulnerabilities in tool invocation, sandbox implementations, and
762
+ privilege management. Exploring techniques to enhance sandbox security, mitigate privilege
763
+ persistence, and prevent configuration drift can significantly strengthen MCP’s security posture. In
764
+ addition, researchers should investigate more effective approaches for version control and package
765
+ management in decentralized ecosystems to reduce the likelihood of re-deploying vulnerable
766
+ versions. Researchers can help MCP maintainers and developers stay ahead of emerging threats
767
+ by developing automated vulnerability detection methods and proposing secure update pipelines.
768
+ Another critical area for research is the exploration of context-aware agent orchestration in multi-
769
+ tool environments. As MCP increasingly supports multi-step, cross-system workflows, ensuring
770
+ state consistency and preventing tool invocation conflicts becomes paramount. Researchers can
771
+ explore techniques for dynamic state management, error recovery, and workflow validation to
772
+ ensure seamless operation in complex environments.
773
+ Recommendations for end-users. End-users should remain vigilant about security risks and
774
+ adopt practices to safeguard their environments. They should prioritize using verified MCP servers
775
+ and avoid unofficial installers that may introduce vulnerabilities. Regularly updating MCP servers
776
+ and monitoring configuration changes can prevent misconfigurations and reduce exposure to
777
+ known exploits. Properly configuring access control policies helps prevent privilege escalation
778
+ and unauthorized tool usage. For users relying on remote MCP servers, choosing providers that
779
+ follow strict security standards can minimize risks in multi-tenant environments. Promoting user
780
+ awareness and encouraging best practices will enhance overall security and resilience.
781
+ , Vol. 1, No. 1, Article . Publication date: April 2025.
782
+
783
+ --- Page 17 ---
784
+ Model Context Protocol (MCP): Landscape, Security Threats, and Future Research Directions 17
785
+ 7 RELATED WORK
786
+ 7.1 Tool Integration in LLM Applications
787
+ Equipping LLMs with external tools has become a key paradigm for enhancing their capabilities
788
+ in real-world tasks. This approach enables LLMs to transcend the limitations of static knowledge
789
+ and interact dynamically with external systems. Recent studies have proposed frameworks to
790
+ support such integration, focusing on tool representation, selection, invocation, and reasoning.
791
+ Shen et al.[ 44] provide a comprehensive survey outlining a standard LLM-tool integration paradigm,
792
+ identifying key challenges in user intent understanding, tool selection, and execution planning.
793
+ Building on this, AutoTools[45, 46] introduces an automated framework that transforms raw tool
794
+ documentation into executable functions, reducing reliance on manual engineering. EasyTool [ 59]
795
+ further streamlines this process by distilling diverse and verbose tool documentation into concise
796
+ and unified instructions, improving tool usability and efficiency. From an evaluation perspective,
797
+ several benchmarks have emerged. ToolSandbox [ 30] emphasizes stateful and interactive tool usage
798
+ with implicit dependencies, while UltraTool [ 23] focuses on complex, multi-step tasks involving
799
+ planning, creation, and execution. These efforts reveal significant performance gaps and motivate
800
+ better evaluations for LLM-agent capabilities. To improve agent decision-making and prompt
801
+ quality, AvaTaR [ 54] proposes contrastive reasoning techniques, while Toolken+[ 56] incorporates
802
+ reranking and rejection mechanisms for more precise tool use. Additionally, some works explore
803
+ LLMs not just as tool users but as tool creators—ToolMaker[ 53] autonomously converts code
804
+ repositories into callable tools, moving toward fully automated agents. To unify this expanding
805
+ landscape, Li [ 27] proposes a taxonomy that situates tool use alongside planning and feedback
806
+ learning as three core agent paradigms.
807
+ As tool-augmented LLMs continue to evolve, the lack of a standardized, secure, and extensible
808
+ context protocol has become a key bottleneck. MCP, with its potential to unify tool interaction across
809
+ diverse systems, is poised to become the foundational layer for next-generation LLM applications,
810
+ making it critical to examine its landscape, limitations, and risks.
811
+ 7.2 Security Risks in LLM-Tool Interactions
812
+ The integration of tool-use capabilities into LLM agents significantly expands their functionality,
813
+ but also introduces new and more severe security risks. Fu et al. [ 17] demonstrate that obfuscated
814
+ adversarial prompts can lead LLM agents to misuse tools, enabling attacks such as data exfiltration
815
+ and unauthorized command execution. These vulnerabilities are particularly concerning as they
816
+ generalize across models and modalities. A growing body of work has begun to categorize and
817
+ analyze these risks. Gan et al.[ 18] and Yu et al.[ 58] propose taxonomies for threats across agent
818
+ components and stages, while the OWASP Agentic Security Initiative [ 25] provides practical threat
819
+ modeling frameworks. To support detection and mitigation, Chen et al.[ 5] introduce AgentGuard,
820
+ which automatically discovers unsafe workflows and generates safety constraints, and ToolFuzz[ 36]
821
+ identifies failures stemming from ambiguous or underspecified tool documentation. On the align-
822
+ ment front, Chen et al.[ 6] propose the H2A principle, which encourages LLMs to behave with
823
+ helpfulness, harmlessness, and autonomy, and introduce the ToolAlign dataset to guide safer tool
824
+ usage. Ye et al.[ 57] further analyze safety risks throughout the tool-use pipeline, including malicious
825
+ queries, execution misdirection, and unsafe outputs. Deng et al. [ 13] highlight broader systemic
826
+ risks such as unpredictable inputs, environmental variability, and untrusted tool endpoints.
827
+ These security threats may be mitigated through the structured design of MCP, but they can also
828
+ persist or even evolve under this new integration paradigm. As MCP simplifies tool orchestration
829
+ in LLM applications, it simultaneously introduces new potential attack surfaces, warranting deeper
830
+ investigation into its security implications.
831
+ , Vol. 1, No. 1, Article . Publication date: April 2025.
832
+
833
+ --- Page 18 ---
834
+ 18 X Hou, Y Zhao, S Wang, and H Wang
835
+ 8 CONCLUSION
836
+ This paper presents the first comprehensive analysis of the MCP ecosystem landscape. We examine
837
+ its architecture, core components, operational workflows, and server lifecycle stages. Furthermore,
838
+ we explore the adoption, diversity, and use cases, while identifying potential security threats
839
+ throughout the creation, operation, and update phases. We also highlight the implications and
840
+ risks associated with MCP adoption and propose actionable recommendations for stakeholders
841
+ to enhance security and governance. Additionally, we outline future research directions to tackle
842
+ emerging risks and improve MCP’s resilience. As MCP continues to gain traction with industry
843
+ leaders such as OpenAI and Cloudflare, addressing these challenges is key to its long-term success
844
+ and to enabling secure, efficient interaction with diverse external tools and services.
845
+ REFERENCES
846
+ [1]ahujasid. 2025. BlenderMCP - Blender Model Context Protocol Integration. https://github.com/ahujasid/blender-mcp.
847
+ [2] Anthropic. 2024. For Claude Desktop Users. https://modelcontextprotocol.io/quickstart/user.
848
+ [3]Anthropic. 2024. Introducing the Model Context Protocol. https://www.anthropic.com/news/model-context-protocol.
849
+ [4] ByteDance. 2024. Coze plugin store. https://www.coze.com/store/plugin.
850
+ [5]Jizhou Chen and Samuel Lee Cong. 2025. AgentGuard: Repurposing Agentic Orchestrator for Safety Evaluation of
851
+ Tool Orchestration. CoRR abs/2502.09809 (2025). https://doi.org/10.48550/ARXIV.2502.09809 arXiv:2502.09809
852
+ [6]Zhi-Yuan Chen, Shiqi Shen, Guangyao Shen, Gong Zhi, Xu Chen, and Yankai Lin. 2024. Towards Tool Use Alignment
853
+ of Large Language Models. In Proceedings of the 2024 Conference on Empirical Methods in Natural Language Processing .
854
+ 1382–1400.
855
+ [7] Cline. 2025. Cline. https://github.com/cline/cline.
856
+ [8] Cloudflare. 2025. Cloudflare. https://www.cloudflare.com.
857
+ [9] Codeium. 2025. Codeium. https://codeium.com.
858
+ [10] Sourcegraph Cody. 2025. Cody supports additional context through Anthropic’s Model Context Protocol. https:
859
+ //sourcegraph.com/blog/cody-supports-anthropic-model-context-protocol.
860
+ [11] Florin Cuconasu, Giovanni Trappolini, Federico Siciliano, Simone Filice, Cesare Campagnano, Yoelle Maarek, Nicola
861
+ Tonellotto, and Fabrizio Silvestri. 2024. The Power of Noise: Redefining Retrieval for RAG Systems. CoRR abs/2401.14887
862
+ (2024). https://doi.org/10.48550/ARXIV.2401.14887 arXiv:2401.14887
863
+ [12] Cursor. 2025. Learn how to add and use custom MCP tools within Cursor. https://docs.cursor.com/context/model-
864
+ context-protocol.
865
+ [13] Zehang Deng, Yongjian Guo, Changzhou Han, Wanlun Ma, Junwu Xiong, Sheng Wen, and Yang Xiang. 2024. AI
866
+ Agents Under Threat: A Survey of Key Security Challenges and Future Pathways. CoRR abs/2406.02630 (2024).
867
+ https://doi.org/10.48550/ARXIV.2406.02630 arXiv:2406.02630
868
+ [14] Windsurf Editor. 2025. Windsurf Editor. https://windsurf.com.
869
+ [15] Antanavicius et al. 2025. PulseMCP. https://www.pulsemcp.com.
870
+ [16] Wenqi Fan, Yujuan Ding, Liangbo Ning, Shijie Wang, Hengyun Li, Dawei Yin, Tat-Seng Chua, and Qing Li. 2024. A
871
+ Survey on RAG Meeting LLMs: Towards Retrieval-Augmented Large Language Models. In Proceedings of the 30th ACM
872
+ SIGKDD Conference on Knowledge Discovery and Data Mining, KDD 2024, Barcelona, Spain, August 25-29, 2024 , Ricardo
873
+ Baeza-Yates and Francesco Bonchi (Eds.). ACM, 6491–6501. https://doi.org/10.1145/3637528.3671470
874
+ [17] Xiaohan Fu, Shuheng Li, Zihan Wang, Yihao Liu, Rajesh K. Gupta, Taylor Berg-Kirkpatrick, and Earlence Fernandes.
875
+ 2024. Imprompter: Tricking LLM Agents into Improper Tool Use. CoRR abs/2410.14923 (2024). https://doi.org/10.
876
+ 48550/ARXIV.2410.14923 arXiv:2410.14923
877
+ [18] Yuyou Gan, Yong Yang, Zhe Ma, Ping He, Rui Zeng, Yiming Wang, Qingming Li, Chunyi Zhou, Songze Li, Ting Wang,
878
+ Yunjun Gao, Yingcai Wu, and Shouling Ji. 2024. Navigating the Risks: A Survey of Security, Privacy, and Ethics Threats
879
+ in LLM-Based Agents. CoRR abs/2411.09523 (2024). https://doi.org/10.48550/ARXIV.2411.09523 arXiv:2411.09523
880
+ [19] gching. 2025. Toolbase. https://gettoolbase.ai.
881
+ [20] glama.ai. 2025. Glama MCP Servers. https://glama.ai/mcp/servers.
882
+ [21] Goose. 2025. Goose. https://goose.ai.
883
+ [22] Nadeeshaan Gunasinghe and Nipuna Marcus. 2021. Language Server Protocol and Implementation . Springer.
884
+ [23] Shijue Huang, Wanjun Zhong, Jianqiao Lu, Qi Zhu, Jiahui Gao, Weiwen Liu, Yutai Hou, Xingshan Zeng, Yasheng
885
+ Wang, Lifeng Shang, Xin Jiang, Ruifeng Xu, and Qun Liu. 2024. Planning, Creation, Usage: Benchmarking LLMs for
886
+ Comprehensive Tool Utilization in Real-World Complex Scenarios. CoRR abs/2401.17167 (2024). https://doi.org/10.
887
+ 48550/ARXIV.2401.17167 arXiv:2401.17167
888
+ , Vol. 1, No. 1, Article . Publication date: April 2025.
889
+
890
+ --- Page 19 ---
891
+ Model Context Protocol (MCP): Landscape, Security Threats, and Future Research Directions 19
892
+ [24] JetBrains. 2025. JetBrains MCP Server. https://plugins.jetbrains.com/plugin/26071-mcp-server.
893
+ [25] Sotiropoulos John, Rosario Ron F Del, Kokuykin Evgeniy, Oakley Helen, Habler Idan, Underkoffler Kayla, Huang Ken,
894
+ Steffensen Peter, Aralimatti Rakshith, Bitton Ron, et al .2025. OWASP Top 10 for LLM Apps & Gen AI Agentic Security
895
+ Initiative . Ph. D. Dissertation. OWASP.
896
+ [26] LangChain. 2022. LangChain: Framework for developing applications powered by language models. https://github.
897
+ com/langchain-ai/langchain.
898
+ [27] Xinzhe Li. 2025. A Review of Prominent Paradigms for LLM-Based Agents: Tool Use, Planning (Including RAG),
899
+ and Feedback Learning. In Proceedings of the 31st International Conference on Computational Linguistics, COLING
900
+ 2025, Abu Dhabi, UAE, January 19-24, 2025 , Owen Rambow, Leo Wanner, Marianna Apidianaki, Hend Al-Khalifa,
901
+ Barbara Di Eugenio, and Steven Schockaert (Eds.). Association for Computational Linguistics, 9760–9779. https:
902
+ //aclanthology.org/2025.coling-main.652/
903
+ [28] LibreChat. 2025. LibreChat. https://librechat.ai.
904
+ [29] Jerry Liu. 2022. LlamaIndex: A data framework for LLM applications. https://github.com/run-llama/llama_index.
905
+ [30] Jiarui Lu, Thomas Holleis, Yizhe Zhang, Bernhard Aumayer, Feng Nan, Felix Bai, Shuang Ma, Shen Ma, Mengyu Li,
906
+ Guoli Yin, Zirui Wang, and Ruoming Pang. 2024. ToolSandbox: A Stateful, Conversational, Interactive Evaluation
907
+ Benchmark for LLM Tool Use Capabilities. CoRR abs/2408.04682 (2024). https://doi.org/10.48550/ARXIV.2408.04682
908
+ arXiv:2408.04682
909
+ [31] Baidu Maps. 2025. Baidu Maps MCP Servers. https://lbs.baidu.com/faq/api?title=mcpserver/base.
910
+ [32] Emacs MCP. 2025. Emacs MCP. https://github.com/lizqwerscott/mcp.el.
911
+ [33] Tripo3D MCP. 2025. Tripo3D MCP. https://blender-mcp.com/.
912
+ [34] mcp dockmater. 2025. Dockmaster. https://mcp-dockmaster.com.
913
+ [35] mcp.so. 2025. MCP.so. https://mcp.so/.
914
+ [36] Ivan Milev, Mislav Balunović, Maximilian Baader, and Martin Vechev. 2025. ToolFuzz–Automated Agent Tool Testing.
915
+ arXiv preprint arXiv:2503.04479 (2025).
916
+ [37] OpenAI. 2023. ChatGPT plugins. https://openai.com/index/chatgpt-plugins/.
917
+ [38] OpenAI. 2023. Funcation Calling. https://platform.openai.com/docs/guides/function-calling?api-mode=responses.
918
+ [39] OpenAI. 2025. OpenAI Agents SDK - Model context protocol (MCP). https://openai.github.io/openai-agents-python/
919
+ mcp/.
920
+ [40] OpenSumi. 2025. OpenSumi. https://github.com/opensumi/core.
921
+ [41] Model Context Protocol. 2024. GitHub MCP Server. https://github.com/modelcontextprotocol/servers/tree/main/src/
922
+ github.
923
+ [42] Model Context Protocol. 2024. Slack MCP Server. https://github.com/modelcontextprotocol/servers/tree/main/src/
924
+ slack.
925
+ [43] Replit. 2025. Replit. https://replit.com.
926
+ [44] Zhuocheng Shen. 2024. LLM With Tools: A Survey. CoRR abs/2409.18807 (2024). https://doi.org/10.48550/ARXIV.2409.
927
+ 18807 arXiv:2409.18807
928
+ [45] Zhengliang Shi, Shen Gao, Xiuyi Chen, Yue Feng, Lingyong Yan, Haibo Shi, Dawei Yin, Zhumin Chen, Suzan Ver-
929
+ berne, and Zhaochun Ren. 2024. Chain of Tools: Large Language Model is an Automatic Multi-tool Learner. CoRR
930
+ abs/2405.16533 (2024). https://doi.org/10.48550/ARXIV.2405.16533 arXiv:2405.16533
931
+ [46] Zhengliang Shi, Shen Gao, Lingyong Yan, Yue Feng, Xiuyi Chen, Zhumin Chen, Dawei Yin, Suzan Verberne, and
932
+ Zhaochun Ren. 2025. Tool Learning in the Wild: Empowering Language Models as Automatic Tool Agents. In THE
933
+ WEB CONFERENCE 2025 . https://openreview.net/forum?id=T4wMdeFEjX
934
+ [47] Block (Square). 2025. Block (Square). https://glama.ai/mcp/servers/atblock/square-mcp/tools/team.
935
+ [48] Stripe. 2025. Stripe. https://stripe.com.
936
+ [49] Microsoft Copilot Studio. 2025. Introducing Model Context Protocol (MCP) in Copilot Studio: Simplified Integration
937
+ with AI Apps and Agents. https://www.microsoft.com/en-us/microsoft-copilot/blog/copilot-studio/introducing-model-
938
+ context-protocol-mcp-in-copilot-studio-simplified-integration-with-ai-apps-and-agents/.
939
+ [50] Tencent. 2024. Tencent plugin shop. https://yuanqi.tencent.com/plugin-shop.
940
+ [51] Apify MCP Tester. 2025. Apify MCP Tester. https://apify.com/jiri.spilka/tester-mcp-client.
941
+ [52] TheiaAI/TheiaIDE. 2025. TheiaAI/TheiaIDE. https://theia-ide.org/docs/user_ai/.
942
+ [53] Georg Wölflein, Dyke Ferber, Daniel Truhn, Ognjen Arandjelovic, and Jakob Nikolas Kather. 2025. LLM Agents Making
943
+ Agent Tools. CoRR abs/2502.11705 (2025). https://doi.org/10.48550/ARXIV.2502.11705 arXiv:2502.11705
944
+ [54] Shirley Wu, Shiyu Zhao, Qian Huang, Kexin Huang, Michihiro Yasunaga, Kaidi Cao, Vassilis N. Ioannidis, Karthik
945
+ Subbian, Jure Leskovec, and James Y. Zou. 2024. AvaTaR: Optimizing LLM Agents for Tool Usage via Contrastive
946
+ Reasoning. In Advances in Neural Information Processing Systems 38: Annual Conference on Neural Information Processing
947
+ Systems 2024, NeurIPS 2024, Vancouver, BC, Canada, December 10 - 15, 2024 , Amir Globersons, Lester Mackey, Danielle
948
+ Belgrave, Angela Fan, Ulrich Paquet, Jakub M. Tomczak, and Cheng Zhang (Eds.). http://papers.nips.cc/paper_files/
949
+ , Vol. 1, No. 1, Article . Publication date: April 2025.
950
+
951
+ --- Page 20 ---
952
+ 20 X Hou, Y Zhao, S Wang, and H Wang
953
+ paper/2024/hash/2db8ce969b000fe0b3fb172490c33ce8-Abstract-Conference.html
954
+ [55] Zhiheng Xi, Wenxiang Chen, Xin Guo, Wei He, Yiwen Ding, Boyang Hong, Ming Zhang, Junzhe Wang, Senjie Jin,
955
+ Enyu Zhou, Rui Zheng, Xiaoran Fan, Xiao Wang, Limao Xiong, Yuhao Zhou, Weiran Wang, Changhao Jiang, Yicheng
956
+ Zou, Xiangyang Liu, Zhangyue Yin, Shihan Dou, Rongxiang Weng, Wensen Cheng, Qi Zhang, Wenjuan Qin, Yongyan
957
+ Zheng, Xipeng Qiu, Xuanjing Huang, and Tao Gui. 2023. The Rise and Potential of Large Language Model Based
958
+ Agents: A Survey. CoRR abs/2309.07864 (2023). https://doi.org/10.48550/ARXIV.2309.07864 arXiv:2309.07864
959
+ [56] Konstantin Yakovlev, Sergey I. Nikolenko, and Andrey Bout. 2024. Toolken+: Improving LLM Tool Usage with Reranking
960
+ and a Reject Option. CoRR abs/2410.12004 (2024). https://doi.org/10.48550/ARXIV.2410.12004 arXiv:2410.12004
961
+ [57] Junjie Ye, Sixian Li, Guanyu Li, Caishuang Huang, Songyang Gao, Yilong Wu, Qi Zhang, Tao Gui, and Xuanjing Huang.
962
+ 2024. ToolSword: Unveiling Safety Issues of Large Language Models in Tool Learning Across Three Stages. CoRR
963
+ abs/2402.10753 (2024). https://doi.org/10.48550/ARXIV.2402.10753 arXiv:2402.10753
964
+ [58] Miao Yu, Fanci Meng, Xinyun Zhou, Shilong Wang, Junyuan Mao, Linsey Pang, Tianlong Chen, Kun Wang, Xinfeng
965
+ Li, Yongfeng Zhang, et al .2025. A Survey on Trustworthy LLM Agents: Threats and Countermeasures. arXiv preprint
966
+ arXiv:2503.09648 (2025).
967
+ [59] Siyu Yuan, Kaitao Song, Jiangjie Chen, Xu Tan, Yongliang Shen, Kan Ren, Dongsheng Li, and Deqing Yang. 2024.
968
+ EASYTOOL: Enhancing LLM-based Agents with Concise Tool Instruction. CoRR abs/2401.06201 (2024). https:
969
+ //doi.org/10.48550/ARXIV.2401.06201 arXiv:2401.06201
970
+ [60] Zed. 2025. Zed - Model Context Protocol. https://zed.dev/docs/assistant/model-context-protocol.
971
+ [61] Mingming Zha, Jice Wang, Yuhong Nan, Xiaofeng Wang, Yuqing Zhang, and Zelin Yang. 2022. Hazard Integrated:
972
+ Understanding Security Risks in App Extensions to Team Chat Systems. In 29th Annual Network and Distributed System
973
+ Security Symposium, NDSS 2022, San Diego, California, USA, April 24-28, 2022 . The Internet Society. https://www.ndss-
974
+ symposium.org/ndss-paper/auto-draft-262/
975
+ [62] Yanjie Zhao, Xinyi Hou, Shenao Wang, and Haoyu Wang. 2024. LLM App Store Analysis: A Vision and Roadmap.
976
+ CoRR abs/2404.12737 (2024). https://doi.org/10.48550/ARXIV.2404.12737 arXiv:2404.12737
977
+ , Vol. 1, No. 1, Article . Publication date: April 2025.
data/documents/content/b3d0767c-1dd8-4f05-a9f8-d69d82f2abde.txt ADDED
@@ -0,0 +1,1137 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ --- Page 1 ---
2
+ A Study on the MCP × A2A Framework for Enhancing
3
+ Interoperability of LLM -based Autonomous Agents
4
+ Cheonsu Jeong
5
+ Hyper Automation Team, SAMSUNG SDS, Seoul , 05510 , South Korea
6
+
7
+
8
+ I. INTRODUCTION
9
+ ECENT advancements in artificial intelligence (AI) have highlighted
10
+ the importance of large language models (LLMs) across various
11
+ domains [1]. Generative AI, which can create new content such as text,
12
+ images, audio, and video based on extensive training data, en ables
13
+ users to leverage AI services with ease [1],[2]. In particular, the
14
+ development of AI has led to a growing utilization of autonomous
15
+ agents —AI systems capable of independently performing tasks,
16
+ solving problems, and supporting decision -making based o n user
17
+ inputs. However, complex real -world problems often exceed the
18
+ capabilities of a single agent. This has given rise to the necessity of
19
+ multi -agent systems (MAS), where multiple agents collaborate to
20
+ overcome such limitations. With the emergence of LL Ms, LLM -based
21
+ MASs have gained attention as a new paradigm [4]. Unlike traditional
22
+ MASs, these systems enable more flexible and adaptive collaboration
23
+ through natural language processing. Each agent can specialize in a
24
+ specific domain while coordinating co mplex tasks through natural
25
+ language interaction [5].
26
+ For agents to be effectively utilized in real -world environments,
27
+ seamless integration with external tools, APIs, and databa ses is
28
+ critical. To address this, Anthropic released the Model Context
29
+ Protocol (MCP) as open source in November 2024 [6]. Similarly,
30
+ efficient communication and collaboration among agents is a
31
+ prerequisite for successful MAS deployment. However, agent sys tems
32
+ developed by different frameworks and vendors have faced
33
+ interoperability limitations. To resolve this, Google released the
34
+ Agent -to-Agent (A2A) protocol as an open source project in April 2025
35
+ [7]. A2A provides a standardized communication framework for
36
+ agents to collaborate across different environments, while MCP
37
+ offers a structured I/O system that enables agents to interact with external tools and resources [8]. Although these protocols function
38
+ independently, they serve complementary roles and for m a
39
+ foundational basis for building practical agent ecosystems.
40
+ This paper analyzes the technical architecture and operational
41
+ principles of A2A and MCP, exploring how they synergistically
42
+ contribute to constructing scalable and interoperable agent
43
+ ecosystems. By presenting an integrated architecture using
44
+ LangGraph an d detailing key implementation logic, we demonstrate
45
+ how theoretical concepts are translated into real -world applications.
46
+ Through this combined use of A2A and MCP, we propose a practical
47
+ approach to enhancing interoperability and development efficiency
48
+ of LLM-based agent systems across various enterprise environments,
49
+ thereby unlocking the potential to transition agent technologies from
50
+ experimental stages to fully deployed services.
51
+ II. RELATED WORK
52
+ A. Concept and Evolution of Autonomous Agents
53
+ An automation age nt refers to more than just a task executor —it
54
+ is an intelligent software robot that integrates AI technologies to
55
+ perceive complex situations, analyze data, interact with users, and
56
+ even improve its performance through learning [9]. Autonomous
57
+ agents are systems that perceive their environment, autonomously
58
+ set goals or formulate plans to achieve predefined objectives, and
59
+ make decisions and act independently by learning and adapting [10],
60
+ [11]. These agents can respond flexibly to unpredictable or dynamic
61
+ environments, solving problems on their own as needed. The recent
62
+ advancement of large language models (LLMs) has significantly
63
+ expanded the capabilities and application areas of autonomous
64
+ agents. They are now widely used in information retrieval, data
65
+ analysis, decision support, and task automation, and are increasingly
66
+ being adopted as productivity tools in enterprise environments.
67
+ Autonomous agents possess several key characteristics, as
68
+ summarized in Table 1: R ABSTRACT
69
+ This paper provides an in -depth technical analysis and implementation methodology of the open -source
70
+ Agent -to-Agent (A2A) protocol developed by Google and the Model Context Protocol (MCP) introduced by
71
+ Anthropic. While the evolution of LLM -based autonomous agents is rapidly accelerating, efficient interactions
72
+ among these agents and their integration with external systems remain significant challenges. In modern AI
73
+ systems, collaboration between autonomous agents and integration with external tool s have become
74
+ essential elements for building practical AI applications. A2A offers a standardized communication method
75
+ that enables agents developed in heterogeneous environments to collaborate effectively, while MCP provides
76
+ a structured I/O framework fo r agents to connect with external tools and resources. Prior studies have focused
77
+ primarily on the features and applications of either A2A or MCP individually. In contrast, this study takes an
78
+ integrated approach, exploring how the two protocols can comple ment each other to address interoperability
79
+ issues and facilitate efficient collaboration within complex agent ecosystems. KEYWORDS
80
+ Agent -to-Agent (A2A),
81
+ Model Context Protocol
82
+ (MCP), Multi -Agent
83
+ System ( MAS),
84
+ Autonomous Agent,
85
+ Agent Collaboration.
86
+ * Corresponding authors:
87
+ E-mail address: csu.jeong@samsung.com (C . Jeong).
88
+
89
+ --- Page 2 ---
90
+
91
+ TABLE I. KEY CHARACTERISTICS OF AUTONOMOU S AGENTS
92
+ Item Description
93
+ Autonomy The ability to operate independently without
94
+ external intervention.
95
+ Goal -Oriented The ability to formulate and execute plans to
96
+ achieve specific objectives.
97
+ Adaptability The capability to adjust behavior in response to
98
+ environmental changes.
99
+ Social Ability The ability to interact with other agents or
100
+ users.
101
+
102
+ However, due to constraints in knowledge, functionality, and
103
+ resources, a single agent often faces limitations in solving complex
104
+ problems. To overcome these limitations, Multi -Agent Systems (MAS)
105
+ have emerged, where multiple agents collaborate toward a shared
106
+ goal.
107
+
108
+ B. Necessity of Multi -Agent Systems (MAS)
109
+ A MAS is a framework in which multiple autonomous agents
110
+ collaborate to solve complex problems. Each agent is assigned a
111
+ specific role and area of expertise, and their cooperation enables the
112
+ resolution of problems that would be infeasible for a single age nt
113
+ alone [1].
114
+ The main advantages of MAS include:
115
+ 1. Distributed Problem Solving: Complex problems are
116
+ decomposed into sub -problems, with each agent addressing a
117
+ specific domain.
118
+ 2. Scalability: System functionality can be expanded by adding or
119
+ modifying agents.
120
+ 3. Robustness: System functionality is maintained even if some
121
+ agents fail.
122
+ 4. Diverse Perspectives: Agents with different expertise analyze
123
+ problems from varied angles.
124
+
125
+ However, effe ctive MAS operation requires seamless
126
+ communication and collaboration among agents, necessitating
127
+ standardized communication protocols and collaboration
128
+ mechanisms.
129
+
130
+ C. Importance of Agent Communication Protocols
131
+ Agent communication protocols define how agent s exchange
132
+ messages, including the format, communication rules, and semantic
133
+ interpretation. Communication is fundamental to MAS, enabling
134
+ autonomous entities to coordinate and collaborate in solving complex
135
+ problems [12].
136
+ An effective communication proto col must satisfy the following
137
+ requirements:
138
+ 1. Interoperability: Support communication between agents
139
+ developed on different platforms and frameworks.
140
+ 2. Extensibility: Accommodate new functions and requirements.
141
+ 3. Security: Provide mechanisms for secu re communication.
142
+ 4. Efficiency: Minimize communication overhead and support
143
+ efficient message exchange.
144
+ 5. Standardization: Offer standardized formats and rules for
145
+ broad adoption.
146
+ Fig. 1 . Integrated Implementation Architecture Concept
147
+
148
+ D. Technical Analysis of the A2A Protocol
149
+ 1. Concept and Structure of A2A Protocol
150
+ Only two levels of headings should be numbered. Lower level
151
+ headings remain unnumbered; they are formatted as run -in headings.
152
+ The A2A protocol is a standardized communication framework
153
+ designed to enable effective collaboration among autonomous
154
+ agents developed in diverse environments. Released as open -source
155
+ by Google, it abstracts the complexity of agent communication and
156
+ provides a consistent interface to ensure interoperability [8].
157
+
158
+ Fig. 2 . Open Standard A2A Protocol Concept Diagram [7]
159
+
160
+ The core structure of the A2A protocol consists of:
161
+ 1. Agent Card: Metadata in JSON format specifying an agent’s
162
+ functions, roles, and capabilities, enabling other agents to
163
+ discover and determine appropriate collaboration methods.
164
+ 2. Message Format: Defines a structured format for agent
165
+ communication, including headers, body, and parts, supporting
166
+ various content types (text, images, structured data).
167
+ 3. Task Management: Adopts a task -based communi cation model,
168
+ tracking task status, progress, and outcomes.
169
+ 4. Artifacts: Standardized data structures representing task
170
+ outcomes, such as documents, code, or images.
171
+ The A2A protocol achieves loose coupling and high cohesion,
172
+ enhancing the flexibility and scalability of agent systems.
173
+ 2. Core Functions of the A2A Protocol
174
+ A2A supports a range of core functionalities that enable
175
+ collaborative operations among agents:
176
+
177
+
178
+ --- Page 3 ---
179
+
180
+ 1. Capability Discovery: Agents advertise their capabilities using
181
+ an “Agent Card” in JSON for mat. This mechanism functions
182
+ similarly to service registries in Service -Oriented Architecture
183
+ (SOA), allowing for dynamic discovery and coordination [8].
184
+ Each Agent Card includes essential information such as agent ID,
185
+ name, description, supported functio ns, input/output formats,
186
+ authentication requirements, and version information. This
187
+ mechanism supports dynamic expansion of the agent
188
+ ecosystem, enabling existing agents to recognize and
189
+ collaborate with newly added agents automatically.
190
+ 2. Task and State Management: A2A structures agent
191
+ communication around tasks, each with a unique identifier and
192
+ life cycle states (e.g., created, in -progress, completed, failed).
193
+ Results are returned as standardized artifacts [8]. This task -
194
+ oriented design supports asynch ronous processing, real -time
195
+ monitoring, task interruption and resumption, and consistent
196
+ handling of results. It facilitates coordination in complex
197
+ collaboration scenarios and provides a foundation for recovery
198
+ strategies in case of failure.
199
+ 3. Secure Co llaboration: A2A includes mechanisms to ensure
200
+ secure communication between agents. It supports enterprise -
201
+ grade authentication and OpenAPI -based authorization,
202
+ enabling safe exchanges of context, responses, artifacts, and
203
+ user directives [8], [13], [14]. Key security elements include
204
+ authentication, authorization, encryption, access control, and
205
+ audit trails. These features allow for secure inter -agent
206
+ communication while maintaining data protection, which is
207
+ essential for enterprise use cases.
208
+ 4. User Exp erience Negotiation: Each A2A message can include
209
+ fully composed “parts” that represent complete content
210
+ blocks —such as formatted text, images, or interactive elements.
211
+ The protocol supports negotiation for user interface elements,
212
+ enhancing user experienc e consistency across different clients
213
+ [8]. This feature provides benefits such as multimodal content
214
+ support, consistent UX delivery, adaptation to various client
215
+ environments, and standardized representation of interactive
216
+ content. It ensures consistent rendering of agent -generated
217
+ content across interfaces.
218
+ 3. Technical Advantages of the A2A Protocol
219
+ The A2A protocol provides the following technical advantages:
220
+ 1. Standardized Communication: Standardizes communication
221
+ among agents developed in different frameworks and vendors,
222
+ ensuring interoperability [8], [13].
223
+ 2. Loose Coupling: Agents can collaborate without knowledge of
224
+ each other’s internal implementation, enhancing system
225
+ flexibility and scalability.
226
+ 3. Dynamic Discovery: Dynamic capability discovery through
227
+ agent cards enables easy integration of new agents and
228
+ functionaliti es.
229
+ 4. Multimodal Communication: Supports exchange of various
230
+ types of content, including text, images, and structured data.
231
+ 5. Extensible Design: JSON -based message format and modular
232
+ structure allow easy accommodation of new requirements and
233
+ functionalit ies.
234
+ 6. Enterprise Support: Provides essential security features such as
235
+ authentication, authorization, and auditing for enterprise
236
+ environments.
237
+ These technical advantages significantly reduce the development
238
+ and deployment costs of agent systems and impr ove collaboration efficiency among diverse agents.
239
+
240
+ E. Technical Analysis of the Model Context Protocol (MCP)
241
+ 1. Concept and Structure of MCP
242
+ The MCP is a standardized protocol designed to enable AI agents
243
+ to connect effectively with external tools, APIs, and re sources [14]. As
244
+ a core component enhancing agent practicality, MCP establishes a
245
+ structured input/output framework that facilitates seamless
246
+ interactions between agents and diverse external resources [8].
247
+ The primary structural elements of MCP include:
248
+ 1. Context Definition: Specifies the context in which the agent
249
+ interacts with external tools, including tool functionalities, input
250
+ parameters, and output formats.
251
+ 2. Schema -Based Interface: Uses JSON Schema to clearly
252
+ define the input and output types for each tool. This allows the agent
253
+ to understand the tool’s interface and provide appropriate input.
254
+ 3. Function Calling Mechanism: Provides a standardized
255
+ mechanism for agents to invoke external tool functions and retrieve
256
+ their results.
257
+ 4. State Management : Maintains state information during tool
258
+ usage, supporting complex multi -step interactions.
259
+ The structure of MCP balances clearly defined boundaries between
260
+ agents and tools with the flexibility necessary for dynamic interaction.
261
+
262
+ 2. Concept and Structure of MCP
263
+ MCP provides various core functions for agents to interact
264
+ effectively with external tools:
265
+ 1. Tool Discovery and Description: MCP provides a mechanism to
266
+ clearly describe tool functionality and usage. This is achieved
267
+ through JSON schema -based tool d escriptions, which include
268
+ tool name and description, list of supported functions, input
269
+ parameters and types, output formats and types, examples, and
270
+ usage instructions [8]. This tool discovery mechanism enables
271
+ agents to dynamically discover available to ols and select
272
+ appropriate tools to perform tasks.
273
+ 2. Function Calling and Result Handling: MCP provides a
274
+ standardized way for agents to call functions of external tools
275
+ and handle results. This process consists of the following steps
276
+ [8]:
277
+ ─ Function Selection: The agent analyzes the user’s request
278
+ and selects an appropriate function.
279
+ ─ Parameter Construction: The agent constructs the
280
+ parameters required for function execution.
281
+ ─ Function Call: The agent calls the function with the
282
+ constructed paramete rs.
283
+ ─ Result Reception: The agent receives the result of the
284
+ function execution.
285
+ ─ Result Interpretation: The agent interprets the received
286
+ result and provides it to the user or uses it for subsequent
287
+ tasks.
288
+ This function calling mechanism enables agents t o utilize
289
+ various external tools an d APIs to perform actual tasks.
290
+
291
+ --- Page 4 ---
292
+
293
+ 3. Context Management: MCP provides functions to effectively
294
+ manage context during interaction between agents and tools.
295
+ This includes session management, state tracking, context
296
+ propagation, and memory management [8]. These context
297
+ management functions enable agents to maintain consistent
298
+ state and interact with tools during complex multi -step tasks.
299
+ 4. Error Handling and Recovery: MCP provides mechanisms to
300
+ handle and recover from errors that may occur during tool
301
+ usage. This includes standardization of error codes and
302
+ messages, retry strategies, fallback paths, and graceful
303
+ degradation [8]. These error handling mechanisms enable
304
+ agents to operate robustly even in unexpected situations.
305
+ 3. Technical Advantages of MCP
306
+ MCP provides the following technical advantages:
307
+ 1. Stand ardized Tool Integration: Enables consistent integration
308
+ of various tools and APIs, making it easy to extend agent
309
+ functionality.
310
+ 2. Type Safety: JSON schema -based interfaces ensure type safety,
311
+ reducing errors in agent -tool interaction.
312
+ 3. Self-documentin g: Tool descriptions are included as part of the
313
+ protocol, allowing tool usage to be understood without
314
+ separate documentation. 4. Extensible Design: Provides an extensible structure for easily
315
+ adding new tools and functionalities.
316
+ 5. Language and Platform Independence: Adopts an open
317
+ standard that can be implemented in various programming
318
+ languages and platforms.
319
+ 6. Developer -friendly Interface: Provides an intuitive interface
320
+ that is easy for developers to understand and implement.
321
+ These technical advanta ges significantly expand the practical
322
+ utility and scope of agents and make it easier for developers to build
323
+ and extend agent systems.
324
+
325
+ F. Comparison of MCP, A2A, and API
326
+ The main characteristics of MCP , A2A, and general APIs are
327
+ compared in Table 2.
328
+ This co mparison table shows the main characteristics and
329
+ differences of each protocol/interface. MCP focuses on enabling
330
+ agents to interact effectively with external tools, A2A facilitates
331
+ collaboration among agents, and general APIs provide a standard
332
+ interface for data exchange between services. These three
333
+ approaches are complementary and, when used together, can build a TABLE 2. COMPARISON OF MCP, A2A, AND GENERAL API
334
+ Feature MCP A2A General API
335
+ Primary Purpose Connecting agents to external
336
+ tools/services Communication and
337
+ collaboration between agents Data exchange between client
338
+ and server
339
+ Communication
340
+ Direction Agent → Tool Agent ↔ Agent Client ↔ Server
341
+ Message Format JSON Schema -based Structured messages (Header,
342
+ Body, Parts) Varies: REST, SOAP, etc.
343
+ State Management Context -based state tracking Task -based state management Stateless or session -based
344
+ Discovery Mechanism Tool Descriptions Agent Cards API documentation, OpenAPI
345
+ specs
346
+ Authentication Method Supports various mechanisms Enterprise authentication,
347
+ OpenAPI -based Varies: API Key, OAuth, etc.
348
+ Error Handling Standardized error codes and
349
+ recovery strategies Task failure handling and
350
+ recovery HTTP status codes, error
351
+ responses
352
+ Scalability Easy integration of new tools Easy integration of new agents Scalable through endpoint
353
+ expansion
354
+ Implementation
355
+ Complexity Moderate High Low to moderate
356
+ Multimodal Support Limited Comprehensive (Text, Image,
357
+ Structured Data) Limited
358
+ Level of Standardization Emerging standard Emerging standard Widely varied
359
+ Developer Experience Self-descriptive, schema -based Discovery via Agent Cards Highly documentation -
360
+ dependent
361
+ Real -time Interaction Limited Supported Depends on API design
362
+ Security Model Tool -specific access control Inter -agent authentication and
363
+ authorization Endpoint -specific access control
364
+ Typical Use Cases Tool/API connection, automation
365
+ via function calls Collaborative problem solving,
366
+ long -running coordination Information retrieval, command
367
+ dispatch
368
+
369
+
370
+ --- Page 5 ---
371
+
372
+ powerful agent eco system.
373
+
374
+ III. MCP –A2A INTEGRATED IMPLEMENTATION METHODOLOGY
375
+ A. Implementation Architecture Overview
376
+ To implement MCP and A2A in real systems, a systematic
377
+ architectural design is required. This section explains the architectural
378
+ components and design principles for effectively implementing both
379
+ protocols.
380
+ The integrated implementation architecture of MCP and A2A
381
+ consists of the following main layers (Fig. 2) :
382
+ 1. User Interface Layer: Responsible for interaction between users
383
+ and the agent system, handling user re quests and displaying
384
+ results. This layer provides a consistent user experience across
385
+ diverse client environments and effectively represents
386
+ multimodal content using A2A’s user experience negotiation
387
+ features.
388
+ 2. Agent Management Layer: Manages the lifecy cle, state, and
389
+ functionality of agents, including creation and management of
390
+ agent cards and coordination of agent communication.
391
+ According to Habler et al. [13], this layer creates a flexible
392
+ collaboration environment through dynamic agent discovery
393
+ and capability negotiation.
394
+ 3. Core Protocol Layer: Implements the basic protocol
395
+ specifications of A2A and MCP, providing core functions such as
396
+ message formats, communication rules, and error handling.
397
+ This layer ensures protocol compliance and enables consi stent
398
+ implementation across diverse environments.
399
+ 4. Tool Integration Layer: Integrates external tools and APIs
400
+ through MCP, managing tool descriptions and processing function calls. According to the latest specification of the MCP
401
+ [14], this layer provide s type safety and self -documenting
402
+ features through JSON schema -based interfaces.
403
+ 5. Security and Authentication Layer: Responsible for securing
404
+ agent communication and tool usage, handling authentication,
405
+ authorization, and data encryption. According to C loud Security
406
+ Alliance [15], this layer builds a secure agent collaboration
407
+ environment using OAuth 2.0 -based authorization mechanisms
408
+ and end -to-end encryption.
409
+ This layered architecture improves system maintainability and
410
+ scalability through separation o f concerns. Each layer can be
411
+ developed and tested independently and can be extended or
412
+ replaced as needed, allowing the architecture to evolve flexibly with
413
+ the agent system.
414
+
415
+ B. A2A Implementation Procedure
416
+ The implementation of the A2A protocol involves a structured
417
+ sequence of steps, including the definition of agent metadata, the
418
+ setup of communication logic, and task management. These steps
419
+ ensure that agents can interact effectively in a standardized and
420
+ interoperable manner.
421
+ 1. Agent Card Definition
422
+ An ag ent card is JSON -formatted metadata that specifies an
423
+ agent’s functionality and role. Agent card definition consists of the
424
+ following steps [8]:
425
+ 1. Define Agent Identifier and Basic Information: Define basic
426
+ information such as agent ID, name, description, and version.
427
+ 2. Define Capabilities: Define the list of functions provided by the
428
+ agent, including parameters and return values for each function.
429
+ 3. Define Authentication Requirements: Define authentication
430
+ Fig. 2. The MCP×A2A Framework integrates agent -to-agent communication with tool connectivity in a layered architecture
431
+
432
+
433
+ --- Page 6 ---
434
+
435
+ methods and permission scopes required for agen t usage.
436
+ 4. Add Metadata: Define additional metadata such as agent
437
+ category, tags, and creator information.
438
+ Agent cards, as JSON -formatted metadata, define agent ID,
439
+ function list, and authentication requirements, enabling other agents
440
+ to discover and util ize them [8]. According to Salimbeni [16],
441
+ standardized agent cards support the dynamic scalability of the agent
442
+ ecosystem, allowing existing agents to automatically recognize and
443
+ collaborate with new agents added to the system.
444
+ 2. Message Processing Implemen tation
445
+ A2A message processing is implemented through the following
446
+ steps [8]:
447
+ 1. Message Reception: Receive messages from other agents
448
+ through various communication channels such as HTTP
449
+ requests, message queues, or WebSocket.
450
+ 2. Message Parsing: Parse the received message to extract
451
+ headers, bodies, and parts. A2A messages are structured in
452
+ JSON format, making parsing easy.
453
+ 3. Message Validation: Validate the message format and content,
454
+ including schema validation, signature verification, and
455
+ permission ch ecks.
456
+ 4. Message Processing: Perform appropriate tasks according to
457
+ the message content, including function execution, state
458
+ updates, and information provision.
459
+ 5. Response Generation: Generate a response message according
460
+ to the task result. The response must comply with the A2A
461
+ message format and include all necessary information.
462
+ 6. Response Transmission: Send the generated response to the
463
+ original message sender through the same communication
464
+ channel used for the original request.
465
+ This message processing can be performed asynchronously, and
466
+ additional messages may be exchanged to update the status of long -
467
+ running tasks. According to Habler et al. [13], the asynchronous
468
+ nature of A2A message processing enables effective agent
469
+ coordin ation in complex collaboration scenarios.
470
+ 3. Task Management Implementation
471
+ A2A task management is implemented with the following
472
+ elements [8]:
473
+ 1. Task Creation: Create a new task according to the client’s
474
+ request. Each task has a unique identifier and includ es
475
+ information such as task type, parameters, and status.
476
+ 2. Task Status Tracking: Track and update task progress. Task
477
+ status can be created, in progress, completed, or failed, and
478
+ timestamps are recorded for status changes.
479
+ 3. Task Result Management: Man age the results (artifacts) when
480
+ a task is completed. Results can be in various forms (documents,
481
+ code, images, etc.) and are stored with metadata.
482
+ 4. Task Error Handling: Manage error information and execute
483
+ appropriate recovery strategies in case of task failure. Error
484
+ information may include error codes, messages, and stack
485
+ traces.
486
+ Task management implementation enables effective coordination
487
+ and management of long -running tasks among agents. According to
488
+ Pajo P. [20], the task management mechanism of A2 A facilitates agent
489
+ coordination in complex collaboration scenarios and provides a
490
+ foundation for implementing recovery strategies in case of task
491
+ failure. C. MCP Implementation Procedure
492
+ The implementation of the MCP involves defining tool
493
+ specifications, ha ndling function invocations, and managing
494
+ interactions between agents and external tools. The following
495
+ outlines the major stages of MCP implementation.
496
+ 1. Tool Description Definition
497
+ In MCP, tool descriptions are defined using JSON schema. Tool
498
+ description d efinition consists of the following steps [8], [14]:
499
+ 1. Define Tool Basic Information: Define basic information such as
500
+ tool name, description, and version.
501
+ 2. Define Function List: Define the list of functions provided by the
502
+ tool, including description, parameters, and return values for
503
+ each function.
504
+ 3. Define Parameter Schema: Define JSON schema for each
505
+ function’s parameters, including type, constraints, and required
506
+ status.
507
+ 4. Define Return Value Schema: Define JSON schema for each
508
+ function’s return value, including type, structure, and expected
509
+ values.
510
+ These tool descriptions provide a foundation for agents to
511
+ understand and utilize tool functionality and usage. According to
512
+ Schmid [21], the self -documen ting nature of MCP enables developers
513
+ to understand tool usage without separate documentation,
514
+ significantly improving development productivity.
515
+ 2. Function Call Processing Implementation
516
+ MCP function call processing is implemented through the following
517
+ steps [8, 14]:
518
+ 1. Function Call Request Reception: Receive function call requests
519
+ from agents in various forms such as HTTP requests or RPC calls.
520
+ 2. Parameter Validation: Validate that the requested parameters
521
+ match the schema defined in the tool description, including
522
+ type checks, required parameter checks, and value range
523
+ validation.
524
+ 3. Function Execution: Execute the actual function using the
525
+ validated parameters, which may include internal logic
526
+ execution, external API calls, or database queries.
527
+ 4. Result Conversion: Convert the function execution result to the
528
+ return format defined in the tool description, including data
529
+ format conversion, field mapping, and error handling.
530
+ 5. Response Return: Return the converted result to the agent in
531
+ the form of an HTTP response, RPC response, etc.
532
+ This function call processing implementation enables agents to
533
+ effectively utilize external tools and APIs. According to KeywordsAI
534
+ [22], the type safety and schema -based validation of MCP significantly
535
+ reduce errors in agent -tool interaction, improving system stability
536
+ and reliability.
537
+
538
+ D. Integrated Implementation of A2A and MCP
539
+ Integrating the A2A and MCP protocols enables the development
540
+ of highly interoperable and extensible agent systems that combine
541
+ inter -agent collaboratio n with structured tool interaction. The
542
+ following subsections present a step -by-step methodology for
543
+ implementing such an integrated system.
544
+ 1. Integrated Architecture Design
545
+ The integrated architecture of A2A and MCP can be designed with
546
+ the following compon ents [7], [14]:
547
+
548
+ --- Page 7 ---
549
+
550
+ 1. A2A Communication Module: Responsible for agent -to-agent
551
+ communication, implementing the A2A protocol to handle
552
+ message exchange, task management, and agent card
553
+ processing.
554
+ 2. MCP Tool Module: Responsible for connecting with external
555
+ tools, implementing the MCP protocol to manage tool
556
+ descriptions, function call processing, and result conversion.
557
+ 3. Agent Core: Implements the core logic of the agent, handling
558
+ user request processing, task planning, and decision -making.
559
+ 4. Context Manager : Manages the state and context of the agent,
560
+ including session management, state tracking, and memory
561
+ management.
562
+ 5. Security Manager: Responsible for authentication and
563
+ authorization, including user authentication, agent -to-agent
564
+ authentication, and tool access control.
565
+ This modular design improves system maintainability and
566
+ scalability through separation of concerns. Each module can be
567
+ developed and tested independently and can be extended or
568
+ replaced as needed.
569
+ 2. Utilizing Google ADK (Agent Developer Kit)
570
+ Google’s ADK (Agent Developer Kit) provides tools and libraries for
571
+ easily implementing A2A and MCP. Implementation using ADK
572
+ consists of the following steps [8]:
573
+ 1. ADK Installation: Install and configure Google ADK, which
574
+ supports various programming la nguages such as Python,
575
+ JavaScript, and Java.
576
+ 2. Agent Definition: Define an agent compliant with the A2A
577
+ protocol, including writing agent cards, implementing message
578
+ processing logic, and setting up task management.
579
+ 3. Tool Integration: Integrate externa l tools using MCP, including
580
+ writing tool descriptions, implementing functions, and setting
581
+ up error handling logic.
582
+ 4. Agent Deployment: Deploy and test the implemented agent.
583
+ ADK supports various deployment options such as local
584
+ development environments and cloud environments.
585
+ ADK abstracts the complexity of A2A and MCP, allowing
586
+ developers to focus on core agent functionality. According to Pajo P.
587
+ [20], using ADK can reduce agent development time by up to 60% and
588
+ significantly improve code quality and st andard compliance.
589
+ 3. Implementation Strategy Using LangGraph
590
+ LangGraph can be utilized to construct multi -agent workflows,
591
+ enabling the definition of flows that include cycles —an essential
592
+ feature for most agent architectures [23], [24]. LangGraph is an agen t
593
+ framework that supports the A2A protocol and enables integrated
594
+ implementation of A2A and MCP. As shown in Figure 3, using the
595
+ LangChain MCP adapter library makes it possible to connect to
596
+ multiple MCP servers and load tools from those servers [25].
597
+
598
+
599
+ Fig. 3. LangChain MCP Adapters MCP tools can be converted into LangChain tools and used with
600
+ LangGraph agents, and a client implementation that connects to
601
+ multiple MCP servers and loads tools from them is feasible.
602
+ LangGraph can be used to implement agen ts compliant with the A2A
603
+ protocol and integrate tools such as currency exchange rate lookup
604
+ tools via MCP. The agent processes user requests and, as needed,
605
+ calls the currency exchange rate lookup tool via MCP to return results.
606
+ Through this process, the integrated use of A2A and MCP enables the
607
+ extension of agent functionality and the standardization of
608
+ connections with external tools.
609
+
610
+ E. Implementation Considerations
611
+ When implementing an integrated agent system using A2A and
612
+ MCP, several key factors must be considered to ensure security,
613
+ scalability, reliability, and maintainability. This section outlines the
614
+ primary technical considerations and recommended best practices.
615
+ 1. Security and Authentication: Appropriate authentication and
616
+ authorization mechani sms must be implemented to secure
617
+ agent communication and tool usage. According to Cloud
618
+ Security Alliance [15], security implementation for A2A and
619
+ MCP should utilize standard technologies such as OAuth 2.0,
620
+ JWT, and TLS.
621
+ 2. Scalability: The system must b e designed to accommodate
622
+ increasing loads and new requirements. This can be achieved
623
+ through horizontal scaling, asynchronous processing, and
624
+ caching.
625
+ 3. Error Handling: Mechanisms must be implemented to
626
+ appropriately handle various error situations such as
627
+ communication errors and tool failures. This can be achieved
628
+ through strategies such as retry, fallback paths, and graceful
629
+ degradation.
630
+ 4. Performance Optimization: Strategies to minimize latency in
631
+ agent communication and tool usage should be applied. This
632
+ can be achieved through connection pooling, batch processing,
633
+ and asynchronous I/O.
634
+ 5. Monitoring and Logging: Logging mechanisms must be
635
+ implemented to monitor system operation and diagnose
636
+ problems. This can be achieved through structured logging,
637
+ distributed tracing, and metric collection.
638
+ Implementation that appropriately reflects these considerations
639
+ can significantly improve the stability, security, and scalability of
640
+ agent systems. According to Habler et al. [13], implementation of A2A
641
+ and MCP that incorporates these considerations is a key factor in
642
+ promoting the actual adoption of agent technol ogy in enterprise
643
+ environments.
644
+ IV. USE CASES OF A2A AND MCP
645
+ A. Application Areas in Enterprise Environments
646
+ A2A and MCP can be utilized in various ways in ent erprise
647
+ environments. This section examines various use cases of how these
648
+ two protocols can be applied in real business settings.
649
+ 1. Recruitment Process Automation
650
+ As demonstrated in Google’s official demo [7], A2A and MCP can
651
+ be effectively leveraged to aut omate the recruitment pipeline. The
652
+ following agents collaborate across various stages of the hiring
653
+ process:
654
+ 1. Candidate Screening Agent: Analyzes resumes and evaluates
655
+ basic qualifications. This agent connects via MCP to resume
656
+
657
+
658
+ --- Page 8 ---
659
+
660
+ parsing tools and qualifi cation databases to perform efficient
661
+ screening.
662
+ 2. Interview Scheduling Agent: Coordinates schedules between
663
+ interviewers and candidates and schedules interviews.
664
+ According to Salimbeni [16], this agent connects via MCP to
665
+ calendar APIs and email systems to automate complex
666
+ scheduling tasks.
667
+ 3. Interview Preparation Agent: Prepares customized interview
668
+ questions based on the candidate’s background. This agent
669
+ receives candidate information from the screening agent via
670
+ A2A and generates appropriate question s.
671
+ 4. Feedback Collection Agent: Collects and summarizes feedback
672
+ from interviewers after interviews. This agent connects via MCP
673
+ to feedback forms and evaluation systems to collect structured
674
+ feedback.
675
+ These agents communicate with each other via the A2A protocol
676
+ and connect to external tools such as email systems, calendar
677
+ management tools, and HR management systems via MCP. According
678
+ to Pajo P. [20], such automation systems can improve recruitment
679
+ process efficiency by up to 40% and significantly enhance candidate
680
+ experience. For example, in a company processing 1,000 candidates,
681
+ a system based on A2A and MCP reduced average processing time
682
+ from 15 to 9 days and achieved an ROI of 120% within 3 months. Initial
683
+ development required about 2 weeks for API in tegration and agent
684
+ setup, but maintenance costs were kept below $5,000 per month
685
+ thanks to standardized protocols.
686
+ 2. Customer Support System
687
+ A2A and MCP also offer substantial benefits in modernizing
688
+ customer support systems. The following agent roles are typically
689
+ involved [8]:
690
+ 1. Initial Response Agent: Receives customer inquiries and
691
+ collects basic information. This agent connects via MCP to
692
+ customer databases and previous inquiry history to understand
693
+ customer context.
694
+ 2. Problem Diagnosis Agent: Analyz es and diagnoses customer
695
+ problems. According to Habler et al. [13], this agent receives
696
+ customer information and problem descriptions from the initial
697
+ response agent via A2A and performs accurate diagnosis.
698
+ 3. Solution Proposal Agent: Proposes appropriate solutions based
699
+ on diagnosis results. This agent connects via MCP to knowledge
700
+ bases and product information systems to provide customized
701
+ solutions.
702
+ 4.Escalation Agent: Escalates complex problems to human agents.
703
+ This agent collaborates with other agent s via A2A to determine
704
+ the need for escalation and connects via MCP to ticketing
705
+ systems for smooth handover.
706
+ These agents collaborate via A2A and connect to external tools
707
+ such as CRM systems, knowledge bases, and ticketing systems via
708
+ MCP. According to C loud Security Alliance [15], such systems can
709
+ reduce average inquiry resolution time by 60% and increase first
710
+ contact resolution rate by more than 25%.
711
+ 3. Code Review and Quality Management
712
+ A2A and MCP can be applied to automate code review and
713
+ software qual ity assurance tasks. The following agents participate in
714
+ this workflow [7]:
715
+ 1. Code Analysis Agent: Analyzes code structure, complexity, and
716
+ coding standard compliance. This agent connects via MCP to
717
+ static analysis tools and code metric systems to perform in-
718
+ depth code analysis. 2. Security Review Agent: Checks code for security vulnerabilities.
719
+ According to KeywordsAI [22], this agent connects via MCP to
720
+ security scanners and vulnerability databases to identify
721
+ potential security risks.
722
+ 3. Performance Opt imization Agent: Identifies performance
723
+ bottlenecks and suggests optimization strategies. This agent
724
+ collaborates with the code analysis agent via A2A to identify
725
+ performance issues and connects via MCP to profiling tools to
726
+ provide specific optimization s trategies.
727
+ 4. Documentation Support Agent: Evaluates code documentation
728
+ quality and suggests improvements. This agent connects via
729
+ MCP to documentation generation tools and API
730
+ documentation systems to support effective documentation.
731
+ These agents collabor ate via A2A and connect to development
732
+ tools such as version control systems, CI/CD pipelines, and issue
733
+ trackers via MCP. According to Schmid [21], such systems can improve
734
+ code quality by an average of 35% and increase developer
735
+ productivity by more than 20%.
736
+ 4. Developer Support System
737
+ In developer enablement, A2A and MCP can be used to construct
738
+ intelligent assistants that automate routine development tasks [8]:
739
+ 1. Code Generation Agent: Generates code according to
740
+ developer requirements. This agent connec ts via MCP to code
741
+ repositories and API documentation to generate code
742
+ appropriate for the project context.
743
+ 2. Debugging Support Agent: Analyzes the cause of errors and
744
+ suggests solutions. According to the Model Context Protocol
745
+ specification [14], this ag ent connects via MCP to log systems,
746
+ debuggers, and error databases to support effective debugging.
747
+ 3. Learning Material Provision Agent: Provides developers with
748
+ necessary learning materials and documentation. This agent
749
+ collaborates with other agents via A2A to understand the
750
+ developer’s current task context and connects via MCP to
751
+ documentation systems and learning platforms to provide
752
+ customized learning materials.
753
+ 4. Task Management Agent: Tracks developer tasks and manages
754
+ schedules. This agent connec ts via MCP to project management
755
+ tools and scheduling systems to support efficient task
756
+ management.
757
+ These agents collaborate via A2A and connect to tools such as IDEs,
758
+ documentation systems, and project management tools via MCP.
759
+ According to Pajo P. [20], such systems can improve developer
760
+ productivity by up to 50% and significantly improve code quality and
761
+ documentation standards.
762
+
763
+ B. Implementation Case Study: Stock Information System
764
+ This section introduces a practical application case that applies the
765
+ impl ementation methodology of A2A and MCP described in Chapter
766
+ 3. This case uses LangChain and LangGraph to build a system that
767
+ retrieves and analyzes various stock information, with multiple
768
+ specialized agents collaborating to process users’ complex financial
769
+ information requests. In Korea, there has been a recent surge in
770
+ interest in the U.S. stock market, accompanied by a significant
771
+ increase in the demand for related research and information [17],
772
+ [18]. The widespread public interest in stock investment transcends
773
+ age and gender, yet individuals with limited expertise in the stock
774
+ market often encounter difficulties in searching for and interpreting
775
+ relevant information [19]. To effectively address thes e challenges, the
776
+ Stock Information System has been developed to provide users with
777
+
778
+ --- Page 9 ---
779
+
780
+ systematic and useful information through a question -and-answer
781
+ function based on natural language processing, leveraging the
782
+ capabilities of various agents.
783
+ The case syste m is designed so that when a user asks a question
784
+ about stock or company information in natural language, multiple
785
+ specialized agents collaborate to provide a comprehensive answer.
786
+ The system uses A2A protocol -based agent communication and MCP -
787
+ based extern al tool access as core technologies. Main functions
788
+ include:
789
+ 1. Stock Price Lookup: Provides basic stock information such as
790
+ current price, change rate, and trading volume for a specific
791
+ company.
792
+ 2. Listed Company News Lookup: Collects the latest news and
793
+ disclosure information related to the company.
794
+ 3. Listed Company Status Lookup: Provides basic information,
795
+ financial statements, and key indicators of the company.
796
+ 4. Company Analysis: Integrates collected information to prov ide
797
+ SWOT analysis and investment perspective analysis.
798
+ 1. System Architecture
799
+ The system strictly follows the layered structure presented in
800
+ Chapter 3 and consists of the following main layers:
801
+ 1. User Interface Layer: User interface and multilingual support.
802
+ 2. Agent Management Layer: Agent orchestration and workflow
803
+ management.
804
+ 3. Core Protocol Layer: Implementation of A2A and MCP
805
+ protocols.
806
+ 4. Tool Integration Layer: Integration with external data sources
807
+ and APIs.
808
+ 5. Security Layer: Authentication and auth orization management.
809
+
810
+ The system follows a multi -layered architecture, as shown in Figure 4 .
811
+
812
+
813
+ Fig. 4. Project Source Structure – Multi -Layer Architecture for Stock
814
+ Information System
815
+ The user interface layer includes a multilingual input module. The
816
+ agent management layer is a LangGraph -based workflow manager.
817
+ The core protocol layer includes an A2A message handler and an MCP
818
+ tool call module. The tool integration layer includes financial APIs and
819
+ news scrapers. The security layer includes an OAuth 2.0 -based
820
+ authentication module.
821
+ 2. System Implementation
822
+ 1. A2A Module Implementation
823
+ The A2A protocol was implemented in the LangChain and
824
+ LangGraph environment. Agent communication follows a
825
+ standardized JSON message format, and each agent has a unique ID
826
+ and role.
827
+ a. Agent Card Definition
828
+ Each agent is defined by a JSON -formatted “agent card,” which
829
+ specifies the agent’s metadata and functionality. Figure 5 shows an
830
+ example of a stock price lookup agent card.
831
+
832
+
833
+ Fig. 5. Example of Stock Price Lookup Agent Card
834
+
835
+ b. A2A Message Structure and Agent Registry
836
+ Agent communication follows a standardized message structure,
837
+ and the system supports agent searc h and function lookup through
838
+ an agent registry that manages agent cards. Figure 6 shows part of
839
+ the code for the A2AMessage class, which defines methods for
840
+ serializing and deserializing message objects in JSON format, used to
841
+ implement the A2A protocol. This code enables conversion of
842
+ messages to standardized JSON format for agent communication and
843
+ restoration of JSON data to message objects.
844
+
845
+
846
+ Fig. 6. A2A Message Structure and Agent Registry Sample Code
847
+
848
+
849
+
850
+ --- Page 10 ---
851
+
852
+ 2. MCP Module Implementation
853
+ Each agent can call one or more independent modules according
854
+ to the MCP method to connect with external data sources and
855
+ perform preprocessing and analysis. In this system, tools such as stock
856
+ data, news scraping, company information, financial data, and
857
+ analysis engines ar e integrated via MCP.
858
+ a. stock_data – Stock Price Lookup Module: Returns real -time
859
+ price data for a specific stock via financial data APIs (e.g., Yahoo
860
+ Finance, Alpha Vantage).
861
+ b. web_scraper – Listed Company News Collection Module:
862
+ Operates as a simple we b crawler to collect news article headlines
863
+ based on company names. Can also be linked to disclosure
864
+ information APIs as needed.
865
+ c. financial_data – Financial Information Lookup Module: Parses
866
+ and returns key data from financial statements based on K -IFRS
867
+ standards. This module is linked to the company status lookup agent.
868
+ d. analysis_engine – Integrated Analysis Module: Uses LangChain -
869
+ based LLM to generate text -based insights. Integrates company status
870
+ and news data to derive future outlook for the company .
871
+ Each tool is defined by a JSON -formatted description file that
872
+ specifies the tool’s functionality and parameters. Figure 7 shows
873
+ sample code for the stock_data module, where the MCP client loads
874
+ the tool description and processes function calls. The prov ided code
875
+ includes the extract_tickers function, which extracts stock tickers
876
+ from user input strings. This function handles tickers in various
877
+ formats (English tickers, Korean stock codes, company names, etc.)
878
+ and is used in the stock information system b ased on the A2A and
879
+ MCP framework described in Section IV .C of the paper, integrating
880
+ with external financial data sources (e.g., yfinance).
881
+
882
+
883
+ Fig. 7. Sample Code for stock_data – Stock Price Lookup Module
884
+
885
+ 3. LangGraph -based Workflow Implementation
886
+ The system uses LangGraph to manage workflows among agents.
887
+ Workflow state and workflow graph definitions are implemented. The
888
+ orchestrator agent analyzes user requests and calls appropriate
889
+ agents in sequence to ge nerate comprehensive responses.
890
+ The code in Figure 8 is the _create_workflow method that defines
891
+ the workflow for the stock information system using LangGraph. This
892
+ method creates a state -based workflow for processing user requests
893
+ in a multi -agent system based on the A2A protocol and MCP.
894
+ Fig. 8. Sample Code Defining Workflow for Stock Information System
895
+ Using LangGraph
896
+
897
+ 4. User Query Processing Flow
898
+ The following is an actual example of how the system processes
899
+ user queries:
900
+ a. User asks: “Please provide the recent stock price, news, and
901
+ investment perspective analysis for Samsung Electronics.”
902
+ b. Orchestrator agent analyzes the query and plans to call stock
903
+ price lookup, news, company information, financial information, and
904
+ analysis agents in sequence.
905
+ (1) Requests stock price information from the stock price lookup agent.
906
+ (2) Requests recent news from the news agent.
907
+ (3) Requests company information from the company information agent.
908
+ (4) Requests financial data from the financial information agent.
909
+ (5) Requests integrated analysis from t he analysis agent.
910
+ c. Each agent accesses the necessary tools via MCP to collect data.
911
+ d. Analysis agent performs investment perspective analysis by
912
+ integrating collected information.
913
+ e. Orchestrator generates a final response and delivers it to the
914
+ user.
915
+ 3. Implementation Results Analysis
916
+ The implementation results of the LangGraph example show the
917
+ following characteristics:
918
+ 1. Concise Implementation: The complexity of A2A and MCP is
919
+ abstracted by the framework, allowing developers to focus on
920
+ core agent func tionality. According to Salimbeni [16],
921
+ implementation using LangGraph can reduce code volume by
922
+ more than 70% compared to traditional methods.
923
+ 2. Standard Compliance: Implemented agents comply with A2A
924
+ protocol standards and can be easily integrated with other A2A -
925
+ compatible agents, greatly improving ecosystem scalability and
926
+ interoperability.
927
+ 3. Easy Tool Integration: Connection with external APIs is
928
+ simplified via MC P, making it easy to integrate various tools and
929
+
930
+
931
+ --- Page 11 ---
932
+
933
+ services. According to the MCP specification [14], MCP’s
934
+ standardized interface reduces tool integration time by an
935
+ average of 65%.
936
+ 4. Scalability: The basic example can be easily extended to more
937
+ complex fu nctionalities and multi -agent systems. According to
938
+ Habler et al. [13], LangGraph -based systems maintain stable
939
+ performance even when scaled to dozens of agents.
940
+
941
+ C. Implications of Application Areas and Implementation
942
+ Cases
943
+ The various application areas and implementation cases of A2A
944
+ and MCP provide the following implications:
945
+ 1. Importance of Agent Collaboration: Collaboration among
946
+ multiple specialized agents is essential for solving complex
947
+ problems, and A2A effectively supports this. According to Pajo
948
+ P. [20], collaborative agent systems have problem -solving
949
+ capabilities more than three times higher than single agents on
950
+ average.
951
+ 2. Need for Tool Integration: Practical agent systems must be
952
+ connected to external tools, and MCP supports this in a
953
+ standardi zed way. According to the MCP specification [14], tool
954
+ integration via MCP is a key factor in enhancing the practical
955
+ value of agents.
956
+ 3. Value of Standardization: Standardized protocols facilitate
957
+ integration of diverse agents and tools, greatly improving
958
+ ecosystem scalability. According to Schmid [21], standardized
959
+ protocols can reduce agent development costs by up to 60%
960
+ and shorten time to market by 40%.
961
+ 4. Importance of Practical Implementation: Beyond theoretical
962
+ concepts, providing practical implemen tation methodologies
963
+ and tools accelerates the actual adoption of agent technology.
964
+ According to Habler et al. [13], developer -friendly tools and
965
+ clear implementation guidelines can increase adoption rates of
966
+ agent technology by more than three times.
967
+ Thes e implications demonstrate that A2A and MCP are not just
968
+ technical protocols but core elements for building practical agent
969
+ ecosystems. The integrated use of these two protocols is expected to
970
+ play an important role in advancing agent technology from the
971
+ experimental stage to actual service application.
972
+ V. DISCUSSION AND CONCLUSION
973
+ A. Summary and Conclusion
974
+ This paper systematically analyzed the technical structure and
975
+ operational principles of Google’s A2A protocol and Anthropic’s MCP,
976
+ and explored how these two protocols complement each other to
977
+ build a practical agent ecosystem. A2A enables standardized
978
+ communication and collaboration among heterogeneous agents,
979
+ while MCP is a standardized protocol designed to allow agents to
980
+ securely connect with various exter nal tools, APIs, and resources.
981
+ A2A enhances interoperability and collaboration efficiency among
982
+ agents through mechanisms such as agent cards, structured
983
+ messages, and task management. MCP enables agents to
984
+ interactively integrate with external resources through JSON schema -
985
+ based tool descriptions, function calling, and context management.
986
+ These two protocols operate independently but, when used together,
987
+ form the foundation for building practical and scalable multi -agent -
988
+ based AI systems. From an implemen tation perspective, the case
989
+ study using LangGraph and other frameworks detailed the process of translating theoretical concepts into real -world applications. Practical
990
+ approaches for securing interoperability and improving development
991
+ efficiency for LLM -based autonomous agent systems in various
992
+ enterprise environments were suggested through the
993
+ complementary use of A2A and MCP. Use cases such as recruitment
994
+ automation, customer support, code review, and developer support
995
+ demonstrated the practical applicab ility of the proposed approach. In
996
+ particular, the stock information system implementation case
997
+ demonstrated that the integrated use of A2A and MCP is applicable
998
+ to complex real -world scenarios.
999
+ This analysis and case study suggest that A2A and MCP are not just
1000
+ technical protocols but core elements for building practical agent
1001
+ ecosystems. The introduction of standardized protocols can
1002
+ significantly reduce the development and deployment costs of agent
1003
+ systems and greatly improve interoperability and scalabil ity.
1004
+ B. Significance and Limitations of the Study
1005
+ The significance of this study lies in its systematic analysis of the
1006
+ technical structure and operational principles of A2A and MCP, which
1007
+ provided essential knowledge for understanding and practically
1008
+ impleme nting these protocols. Practical implementation case studies
1009
+ and methodologies offered actionable guidelines for developers and
1010
+ enterprises to integrate agent technology into real -world services.
1011
+ Various use cases demonstrated that A2A and MCP can facilita te the
1012
+ transition of agent technology from experimental applications to
1013
+ practical, real -world services.
1014
+ However, the study is not without limitations. Both A2A and MCP
1015
+ are relatively new protocols, having been released in 2024 –2025, and
1016
+ their long -term sta bility in large -scale production environments, such
1017
+ as medical data processing, remains untested. The implementation
1018
+ cases primarily focused on stock information systems, leaving the
1019
+ applicability of these protocols to other industries, such as complex
1020
+ supply chain management or multi -modal processing (e.g., voice and
1021
+ video), largely unexplored. Additionally, the study’s analysis of
1022
+ security and privacy aspects was insufficient, necessitating further
1023
+ research to ensure safety in actual deployment scenarios.
1024
+ C. Future Research Directions
1025
+ Future research should focus on enhancing the practicality and
1026
+ scalability of A2A and MCP. First, scalability issues such as
1027
+ performance bottlenecks, message routing, and state management in
1028
+ systems with hundreds or thousands of collaborating agents must be
1029
+ addressed. Second, research is needed to strengthen security,
1030
+ including encryption, authentication, access control, and audit trails
1031
+ for agent communication. Third, industry -specific architectures and
1032
+ application cases for fin ance, healthcare, manufacturing, etc., should
1033
+ be explored. Fourth, an open governance model should be
1034
+ established through collaboration with standardization bodies and
1035
+ stakeholders for the long -term development of the protocols. Finally,
1036
+ research on agent systems that process not only text but also images,
1037
+ voice, and video (multi -modal data) is required. These directions will
1038
+ contribute to advancing A2A and MCP as practical solutions in diverse
1039
+ environments.
1040
+
1041
+
1042
+
1043
+
1044
+
1045
+
1046
+
1047
+
1048
+ --- Page 12 ---
1049
+
1050
+ REFERENCES
1051
+ [1] C., Jeong, “Beyond Text: Implementing Multimodal Large Language
1052
+ Model -Powered Multi -Agent Systems Using a No -Code Platform,”
1053
+ Journal of Intelligence and Inform ation Systems , 31(1), 2025, pp. 191 –
1054
+ 231. doi:10.13088/jiis.2025.31.1.191
1055
+ [2] C., Jeong, “A Study on the Implementation of Generative AI Services
1056
+ Using an Enterprise Data -Based LLM Application Architecture,” Advances
1057
+ in Artificial Intelligence and Machine Learn ing, 3(4), 2023, pp. 1588 –1618.
1058
+ doi: 10.54364/AAIML.2023.1191
1059
+ [3] C., Jeong, “Generative AI service implementation using LLM application
1060
+ architecture: based on RAG model and LangChain framework,” Journal
1061
+ of Intelligence and Information Systems , 19(4), 2023, pp. 129 –164. doi:
1062
+ 10.13088/jiis.2023.29.4.129
1063
+ [4] S., Yang, O., Nachum, Y., Du, J., Wei, P., Abbeel, D., Schuurmans,
1064
+ “Foundation models for decision making: Problems, methods, and
1065
+ opportunities,” arXiv preprint arXiv:2303.04129, 2023.
1066
+ [5] E., Karpas , et al., “AgentBench: Evaluating LLMs as Agents,” arXiv
1067
+ preprint arXiv:2308.03688, 2023.
1068
+ [6] Anthropic, “Introducing the Model Context Protocol,” 2025. Accessed:
1069
+ May 31, 2025. [Online]. Available:
1070
+ https://www.anthropic.com/news/model -context -protocol
1071
+ [7] Google, “Announcing the Agent2Agent Protocol (A2A),” Google
1072
+ Developers Blog, 2025. Accessed: May 31, 2025. [Online]. Available:
1073
+ https://developers.googleblog.com/en/a2a -a-new -era-of-agent -
1074
+ interoperability/
1075
+ [8] Google, “Agent2Agent (A2A) Protocol Specification,” 2025. Accessed:
1076
+ May 31, 2025. [Online]. Available:
1077
+ https://google.github.io/A2A/specification/
1078
+ [9] C., Jeong, S., Sim, H., Cho, S., Kim, B., Shin, “E2E Process Automation
1079
+ Leveraging Generative AI and IDP -Based Automation Agent: A Case Study
1080
+ on Corporate Expense Proc essing,” arXiv preprint arXiv:2505.20733,
1081
+ 2025.
1082
+ [10] R., Margaret, M., Natalie, “Techopedia, Autonomous Agent,” 2025.
1083
+ Accessed: May 31, 2025. [Online]. Available:
1084
+ https://www.techopedia.com/definition/autonomous -agent, last
1085
+ [11] Salesforce, “What are Autonomous Ag ents? A Complete Guide,” 2025.
1086
+ Accessed: May 31, 2025. [Online]. Available:
1087
+ https://www.salesforce.com/eu/agentforce/ai -agents/autonomous -
1088
+ agents/
1089
+ [12] T., Finin, R., Fritzson, D., McKay, R., McEntire, “KQML as an agent
1090
+ communication language,” in Proceedings o f the third international
1091
+ conference on Information and knowledge management , 1994, pp. 456 –
1092
+ 463.
1093
+ [13] I., Habler, K., Huang, V. S., Narajala, P., Kulkarni, “Building a secure
1094
+ agentic AI application leveraging A2A protocol,” arXiv preprint
1095
+ arXiv:2504.16902, 2025 .
1096
+ [14] Model Context Protocol, “Model Context Protocol Specification,” 2025.
1097
+ Accessed: May 31, 2025. [Online]. Available:
1098
+ https://modelcontextprotocol.io/specification/2025 -03-26
1099
+ [15] Cloud Security Alliance, “Threat Modeling Google's A2A Protocol with
1100
+ the MAESTRO Framework,” 2025. Accessed: May 31, 2025. [Online].
1101
+ Available: https://cloudsecurityalliance.org/blog/2025/04/30/threat -
1102
+ modeling -google -s-a2a-protocol -with -the-maestro -framework
1103
+ [16] G., Salimbeni, “Understanding Google’s A2A Protocol: Why We Need a
1104
+ Standard f or AI Agent Communication,” 2025. Accessed: May 31, 2025.
1105
+ [Online]. Available: https://guido -
1106
+ salimbeni.medium.com/understanding -googles -a2a-protocol -why-we-
1107
+ need -a-standard -for-ai-agent-communication -ac9188adb0cc
1108
+ [17] H., Jo, J., Choi, J., Seo, “OAR algorithm te chnology based on opinion
1109
+ mining utilizing stock news contents,” Journal of KIIT , 13(3), 2015, pp.
1110
+ 111–119. doi: 10.14801/jkiit.2015.13.3.111
1111
+ [18] J. H., Moon, J. J., Sohn, S. J., Yu, “Stock portfolio analysis and visualization
1112
+ services using gamification,” Journal of KIIT , 20(1), 2022, pp. 191 –198.
1113
+ doi: 10.14801/jkiit.2022.20.1.191
1114
+ [19] N., Kim, S., Yu, “Stock information retrieval and analysis techniques using
1115
+ Korean text queries,” Journal of the Korea Institute of Information
1116
+ Technology , 20(9), 2022, pp. 13 –18.
1117
+ [20] P., Pajo, “Comprehensive Analysis of Google's Agent2Agent (A2A) Protocol: Technical Architecture, Enterprise Use Cases, and Long -Term
1118
+ Implications for AI Collaboration,” 2025. Accessed: May 31, 2025.
1119
+ [Online]. Available:
1120
+ https://www.researchgate.net/publ ication/390694531_Comprehensive
1121
+ _Analysis_of_Google's_Agent2Agent_A2A_Protocol_Technical_Architec
1122
+ ture_Enterprise_Use_Cases_and_Long -
1123
+ Term_Imp lications_for_AI_Collaboration
1124
+ [21] P., Schmid, “Model Context Protocol (MCP) an overview,” 2025 Accessed:
1125
+ May 31, 2025. [ Online]. Available: https://www.philschmid.de/mcp -
1126
+ introduction1
1127
+ [22] KeywordsAI, “A Complete Guide to the Model Context Protocol (MCP) in
1128
+ 2025,” 2025. Accessed: May 31, 2025. [Online]. Available:
1129
+ https://www.keywords ai.co/blog/introduction -to-mcp
1130
+ [23] C., Jeong, “A Graph -Agent -Based Approach to Enhancing Knowledge -
1131
+ Based QA with Advanced RAG,” Knowledge Management Research ,
1132
+ 25(3), 2024, pp. 99 –119. doi: 10.15813/kmr.2024.25.3.005
1133
+ [24] LangGraph, 2025. Accessed: May 31, 2025. [Online]. Available:
1134
+ https://lan gchain -ai.github .io/langgraph/
1135
+ [25] Langchain, “LangChain MCP Adapters,” 2025. Accessed: May 31, 2025.
1136
+ [Online]. Available: https://github.com/langc hain -ai/langchain -mcp -
1137
+ adapters
data/documents/content/e3591269-f449-4f88-8185-7d98ef4c4845.txt ADDED
The diff for this file is too large to render. See raw diff
 
data/documents/metadata/0e22c68a-134e-4474-af0d-1c119b576bec.json ADDED
@@ -0,0 +1,17 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ {
2
+ "id": "0e22c68a-134e-4474-af0d-1c119b576bec",
3
+ "filename": "tools_discovery.png",
4
+ "doc_type": "image",
5
+ "file_size": 78410,
6
+ "created_at": "2025-07-08T12:16:07.737267",
7
+ "metadata": {
8
+ "file_extension": ".png",
9
+ "content_length": 350,
10
+ "word_count": 43
11
+ },
12
+ "tags": [],
13
+ "summary": null,
14
+ "category": null,
15
+ "language": null,
16
+ "content_length": 350
17
+ }
data/documents/metadata/b229c249-b844-4579-beb1-2d4185eeb732.json ADDED
@@ -0,0 +1,17 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ {
2
+ "id": "b229c249-b844-4579-beb1-2d4185eeb732",
3
+ "filename": "Model Context Protocol MCPLandscapeSecurityThreats.pdf",
4
+ "doc_type": "pdf",
5
+ "file_size": 1108266,
6
+ "created_at": "2025-07-08T12:16:21.530542",
7
+ "metadata": {
8
+ "file_extension": ".pdf",
9
+ "content_length": 80288,
10
+ "word_count": 10899
11
+ },
12
+ "tags": [],
13
+ "summary": null,
14
+ "category": null,
15
+ "language": null,
16
+ "content_length": 80288
17
+ }
data/documents/metadata/b3d0767c-1dd8-4f05-a9f8-d69d82f2abde.json ADDED
@@ -0,0 +1,17 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ {
2
+ "id": "b3d0767c-1dd8-4f05-a9f8-d69d82f2abde",
3
+ "filename": "A Study on the MCP A2A Framework.pdf",
4
+ "doc_type": "pdf",
5
+ "file_size": 1109775,
6
+ "created_at": "2025-07-08T12:58:00.140462",
7
+ "metadata": {
8
+ "file_extension": ".pdf",
9
+ "content_length": 60652,
10
+ "word_count": 8322
11
+ },
12
+ "tags": [],
13
+ "summary": null,
14
+ "category": null,
15
+ "language": null,
16
+ "content_length": 60652
17
+ }
data/documents/metadata/e3591269-f449-4f88-8185-7d98ef4c4845.json ADDED
@@ -0,0 +1,17 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ {
2
+ "id": "e3591269-f449-4f88-8185-7d98ef4c4845",
3
+ "filename": "A Comprehensive Overview of Large Language Models.pdf",
4
+ "doc_type": "pdf",
5
+ "file_size": 1814502,
6
+ "created_at": "2025-07-08T12:30:52.899470",
7
+ "metadata": {
8
+ "file_extension": ".pdf",
9
+ "content_length": 277778,
10
+ "word_count": 42622
11
+ },
12
+ "tags": [],
13
+ "summary": null,
14
+ "category": null,
15
+ "language": null,
16
+ "content_length": 277778
17
+ }
data/vector_store/content_index.index ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:a4c8c6524348ec9e7e2e23bf1061354fd46ad4f61558c404b1766864fb69fe2f
3
+ size 1439277
data/vector_store/content_index_metadata.json ADDED
The diff for this file is too large to render. See raw diff