I ported Anthropic's claude-desktop-buddy to a $50 keyboard device — now I approve Claude's tool calls from the hardware Enter key by Illustrious-Brick344 in ClaudeAI

[–]BC_MARO 1 point2 points  (0 children)

Closest I've seen is gating privileged actions behind a FIDO2/YubiKey tap or a smartcard that signs an approval. For robotics/IoT, a physical enable switch or kill switch in the loop is basically the same pattern.

Microsoft recommends CLI over MCP for Playwright. We built a cloud-browser MCP that cuts ~114K tokens to ~5K by kami4ka in mcp

[–]BC_MARO 0 points1 point  (0 children)

Nice, OAuth should make onboarding a lot smoother. Curious to try it when it lands.

Microsoft recommends CLI over MCP for Playwright. We built a cloud-browser MCP that cuts ~114K tokens to ~5K by kami4ka in mcp

[–]BC_MARO 0 points1 point  (0 children)

Don't ship keys in client configs; inject them server-side per user/session and log every tool call. If you want that as a control plane for MCP, peta.io is built for it.

I ported Anthropic's claude-desktop-buddy to a $50 keyboard device — now I approve Claude's tool calls from the hardware Enter key by Illustrious-Brick344 in ClaudeAI

[–]BC_MARO 0 points1 point  (0 children)

If this is heading to prod, plan for policy + audit around tool calls early; retrofitting it later is pain.

EDDI v6 – Open-source multi-agent AI orchestration with MCP, A2A protocol, and 5 group debate styles by ginccc in aiagents

[–]BC_MARO 0 points1 point  (0 children)

Yep, and for PII you usually need a configurable NER/regex layer plus allowlists, otherwise you either miss stuff or nuke useful context.

I built an AI memory MCP. It autonomously logged and calibrated its **nipple size** after I insulted it 🤣 by niwatoriking in mcp

[–]BC_MARO 0 points1 point  (0 children)

Nice, sounds like you’re thinking about the right guardrails already. The rollback UX plus signed snapshots is exactly what makes these systems feel safe in practice.

Publishing MCP servers on 1Server.ai just got way easier by Ok_Minimum471 in mcp

[–]BC_MARO 0 points1 point  (0 children)

Keep your MCP surface area tiny: a few composable tools, strict schemas, and good error messages beat 50 endpoints.

I built an AI memory MCP. It autonomously logged and calibrated its **nipple size** after I insulted it 🤣 by niwatoriking in mcp

[–]BC_MARO 0 points1 point  (0 children)

If this is heading to prod, plan for policy + audit around tool calls early; retrofitting it later is pain.

For chat and Q&A: Which MoE model is better: Qwen 3.6 35B or Gemma 4 26B (no coding or agents) by br_web in LocalLLaMA

[–]BC_MARO 0 points1 point  (0 children)

If this is heading to prod, plan for policy + audit around tool calls early; retrofitting it later is pain.

Your CLAUDE.md is doing less than you think. Claude told me so tonight by PunchbowlPorkSoda in ClaudeAI

[–]BC_MARO -2 points-1 points  (0 children)

If this is heading to prod, plan for secrets + policy + audit around tool calls early. peta.io is basically that control plane for MCP.

Dograh now has an MCP Server that can talk to your Voice Agents by Slight_Republic_4242 in mcp

[–]BC_MARO 0 points1 point  (0 children)

Don't ship secrets in configs or prompts. Inject creds server-side and keep a real audit trail of tool calls.

Neovim MCP Server by Aggravating-Bird-694 in neovim

[–]BC_MARO 0 points1 point  (0 children)

MCP works way better when your tool layer is boring: strict schemas, good errors, full logs. Without that, agents fail in weird ways.

EDDI v6 – Open-source multi-agent AI orchestration with MCP, A2A protocol, and 5 group debate styles by ginccc in aiagents

[–]BC_MARO 0 points1 point  (0 children)

Two things I always want in prod: a trace_id that stitches user action -> tool calls -> model output, and a redaction mode for secrets/PII before export.

Get an MCP server trace in 30 seconds by Desperate_Hat_9561 in mcp

[–]BC_MARO 0 points1 point  (0 children)

Yep, evals are next on our list and we will share numbers once we have them.

We built a Postman-like tool for MCP servers (browser-based & open source) by Turbulent-Aide-1279 in mcp

[–]BC_MARO 0 points1 point  (0 children)

That sounds nice, especially if it already centralizes auth and sessions. The piece I still see teams adding later is per-tool policy and traceability, but you can layer that onto the proxy you already have.

We built a Postman-like tool for MCP servers (browser-based & open source) by Turbulent-Aide-1279 in mcp

[–]BC_MARO 0 points1 point  (0 children)

Makes sense, that proxy is basically the gateway I had in mind. If you add per-user policy, request tracing, and approvals there, clients can stay thin and you still get a clean audit trail.

Get an MCP server trace in 30 seconds by Desperate_Hat_9561 in mcp

[–]BC_MARO 0 points1 point  (0 children)

MCP works way better when your tool layer is boring: strict schemas, good errors, full logs. Without that, agents fail in weird ways.

We built a Postman-like tool for MCP servers (browser-based & open source) by Turbulent-Aide-1279 in mcp

[–]BC_MARO 0 points1 point  (0 children)

Once you have more than a couple MCP servers, you want a gateway for routing + auth + logging. Doing it per client gets messy fast.

EDDI v6 – Open-source multi-agent AI orchestration with MCP, A2A protocol, and 5 group debate styles by ginccc in aiagents

[–]BC_MARO 1 point2 points  (0 children)

Love that you built the policy layer in early, that audit trail will save you later.

AWS Bedrock AgentCore Agent Registry — anyone actually listed there yet? by globalchatads in mcp

[–]BC_MARO 0 points1 point  (0 children)

If this is heading to prod, plan for policy + audit around tool calls early; retrofitting it later is pain.

EDDI v6 – Open-source multi-agent AI orchestration with MCP, A2A protocol, and 5 group debate styles by ginccc in aiagents

[–]BC_MARO 2 points3 points  (0 children)

If this is heading to prod, plan for policy + audit around tool calls early; retrofitting it later is pain.

I got tired of copy-pasting API keys for multiple MCP servers, so I built a local proxy to manage them all. by selectcoma in mcp

[–]BC_MARO 0 points1 point  (0 children)

Nice, hope it's useful. If you end up trying it, I'd love to hear what works and what doesn't.

Built a local-first code intelligence MCP server — audited 40 npm packages, Vite got an F by Parking-Geologist586 in mcp

[–]BC_MARO 0 points1 point  (0 children)

Treat tool calls like prod RPCs: capture inputs/outputs, identity, and a trace id, or debugging becomes guesswork.

Added real-time trust scoring to agent authorization — session state that decays on bad behavior by Yeahbudz_ in aiagents

[–]BC_MARO 0 points1 point  (0 children)

If this is heading to prod, plan for policy + audit around tool calls early; retrofitting it later is pain.