Skip to content
Security Brief Security and Governance Security Boundaries for Enterprise AI

Why MCP Is a Trust-Boundary Problem

The problem is not connector count. It is identity, scope, trust boundaries, and what the runtime is allowed to do.

7 min

Risk brief

What matters, what breaks, and what to pay attention to.

The problem is not connector count. It is identity, scope, trust boundaries, and what the runtime is allowed to do.

MCP expands capability, but also widens the trust boundary.

Identity and scoped permissions matter more than connector count.

Prompt injection turns tool access into an execution-risk surface.

MCP is often introduced as a cleaner interface for tool access. That is true, but it understates the real design problem. Once agents can discover and invoke tools, the security question shifts from whether the connector works to whether the access model is coherent.

Trust boundaries, not just connectors

Every MCP integration creates a trust boundary. Who is the agent acting as? Which scopes are attached? What data can be read? What actions can be taken? What must remain approval-gated?

Prompt injection makes this more serious, not less. When instructions and data live in the same context window, the runtime needs stronger boundaries than simple tool availability. It needs scoped identity, constrained actions, and clear separation between observation and execution.

A useful mental model is to treat MCP like internal platform infrastructure, not a plugin directory. That means authentication, authorization, input controls, output validation, audit logging, and revocation paths all matter.

Where teams get this wrong

The failure mode is not that an agent cannot connect to a tool. The failure mode is that it connects too broadly, moves too much context, or takes action with a level of authority no human would have approved in that moment.

That is why I think of MCP primarily as a trust-boundary problem. The connector is the easy part. The security model is the actual product.

Discussion

Responses, reactions, and open questions.

The article stays static. The conversation sits underneath it. Sign in with your email, react to the argument, and join the discussion.

0 published comments0 total reactions

Join the discussion

Use your email to get a one-time sign-in code. First comments may wait in moderation before they appear publicly.

Loading discussion…

A related video version of the idea.

Related ideas from the same body of work.