Local read becomes workflow reach
A tool that was acceptable for local read-only use becomes higher risk when a shared workflow can invoke it with inherited authority.
Independent research and operating notes on AI Software Delivery Control.
Reference / MCP and tool reach
If a team says, "we added MCP tools," the practical question is not whether the config exists. The question is what those tools let an agent or workflow reach, which credential context applies, which actions can change state, and what proof remains after invocation.
This page treats MCP, the Model Context Protocol, and other tool connections as part of the software delivery boundary when they are available to AI-assisted engineering workflows across repos, local development, CI/CD, issue systems, package systems, cloud APIs, or release paths.
Last updated: May 6, 2026
MCP tool risk is the risk created when an AI-assisted workflow can discover, call, or rely on tools that reach systems outside the model conversation. The risk depends on the invocation context, not only the tool name. A read-only local tool in a developer session is different from the same tool reachable from a CI workflow with write authority or secrets.
MCP and tool connections are useful because they give AI-assisted workflows context and capabilities. That same usefulness is why they need control language. A tool declaration can describe a path to an issue tracker, repository, filesystem, package registry, cloud API, or internal service. Once an agent can invoke that path, the declaration is no longer just developer setup. It is boundary metadata.
The mistake is to review only the model or only the config file. A useful review follows the full action path:
agent/workflow -> tool declaration -> credential context -> action -> target -> approval/proof
A tool that was acceptable for local read-only use becomes higher risk when a shared workflow can invoke it with inherited authority.
A declaration may be reviewed once, while later usage changes caller, credential, target, or action class.
"Issue tracker" or "repo tool" is too broad. Read, comment, label, create branch, write file, publish, and deploy are different risks.
The model trace, tool call, credential record, approval record, and target-system event may live in different places unless proof is designed up front.
A first MCP/tool inventory should be small enough for AppSec and platform teams to maintain, but specific enough to support decisions.
Do not approve every prompt. Approve the moments where tool use can change state, expand reach, or cross a sensitive boundary.
MCP/tool proof should let a reviewer reconstruct the invocation without relying on screenshots or memory.
Tool: internal-issues
Caller: AI-assisted PR workflow
Owner: Platform engineering
Credential context: repo-scoped CI token
Requested action: create issue comment
Target: issue tracker project
Policy verdict: allowed
Approval: not required for comment-only action
Evidence: tool invocation record, workflow run, credential identity, target event, outcome
The proof packet should be stronger when the action class is stronger. Read-only actions may need lightweight traceability. Write, deploy, publish, secret access, and production-adjacent actions need durable records that survive outside the originating UI.