ExecutionGateway — Dynamic MCP with Policy-Filtered Discovery and Zero-Trust Execution #594
Replies: 1 comment
-
|
This resonates. A gateway/proxy layer that authenticates each call, evaluates deterministic policy rules on tool name + arguments + caller roles, and keeps a full audit trail already gives least‑privilege enforcement and real visibility. One open question I’d love to see clarified in the proposal is how |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
Pre-submission Checklist
Your Idea
Proposal: ExecutionGateway — Dynamic MCP with Policy-Filtered Discovery and Zero-Trust Execution
Problem it solves
Current MCP servers expose all available tools dynamically, making governance and compliance difficult.
Organizations need a way to filter, audit, and control which tools are visible and executable by AI agents — without modifying every backend service.
Today, most implementations:
Idea summary
Introduce an ExecutionGateway pattern — a lightweight MCP-compatible proxy that brings Zero-Trust governance to dynamic MCP environments.
Core features
/.well-known/mcpor generated from OpenAPI)policy.jsonArchitecture overview
Result
policy.json)Security guarantees
policy.jsonpageSize)Who benefits
Who benefits
How it could be implemented
/.well-known/mcp(policy-filtered)/execute/{tool}endpoint with validationpolicy.json(local or remote)Alignment with existing discussions
/.well-known/mcp)Example project (reference implementation)
A working .NET implementation is available here: static-secure-mcp demo repository
It demonstrates:
TL;DR
Scope
Beta Was this translation helpful? Give feedback.
All reactions