ExecutionGateway — Dynamic MCP with Policy-Filtered Discovery and Zero-Trust Execution #594
jmfloreszazo
started this conversation in
Ideas
Replies: 0 comments
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
Pre-submission Checklist
Your Idea
Proposal: ExecutionGateway — Dynamic MCP with Policy-Filtered Discovery and Zero-Trust Execution
Problem it solves
Current MCP servers expose all available tools dynamically, making governance and compliance difficult.
Organizations need a way to filter, audit, and control which tools are visible and executable by AI agents — without modifying every backend service.
Today, most implementations:
Idea summary
Introduce an ExecutionGateway pattern — a lightweight MCP-compatible proxy that brings Zero-Trust governance to dynamic MCP environments.
Core features
/.well-known/mcpor generated from OpenAPI)policy.jsonArchitecture overview
Result
policy.json)Security guarantees
policy.jsonpageSize)Who benefits
Who benefits
How it could be implemented
/.well-known/mcp(policy-filtered)/execute/{tool}endpoint with validationpolicy.json(local or remote)Alignment with existing discussions
/.well-known/mcp)Example project (reference implementation)
A working .NET implementation is available here: static-secure-mcp demo repository
It demonstrates:
TL;DR
Scope
Beta Was this translation helpful? Give feedback.
All reactions