Understanding MCP: Limitations Beyond the Protocol

F5 ADSP | June 05, 2025
By James White, VP, Engineering, F5

Model Context Protocol (MCP) is fast becoming a pillar of the agentic AI ecosystem. Designed as a standard way for AI agents to interface with tools, APIs, and external systems, MCP promises safe, scalable interoperability.

So it’s easy to understand why the major model makers and some of the world’s biggest companies support MCP as a standard for agents to interact. But for all its benefits, MCP may be solving the wrong problem at the wrong level of abstraction.

By tightly constraining agent behavior through rigid pathways and interfaces, MCP prioritizes safety, but at the cost of flexibility, adaptability, and ironically, effective oversight. In other words, it overshoots on security in ways that may limit the utility of AI agents while doing little to address actual risk in dynamic environments.

What MCP Gets Right

MCP is a step forward in AI safety. It provides a structured, transparent way for AI agents to call tools via APIs, defining clear interfaces and permissions. That’s important in a world where agents are increasingly expected to take actions like triggering workflows, moving money, or writing code.

Think of it as the protocol version of least privilege access: allow agents to perform only the operations they’ve been explicitly granted.

From a design perspective, it’s clean. From an enterprise risk perspective, it’s reassuring. But from a real-world security perspective? It’s incomplete.

The Tradeoff: Static Protocols, Dynamic Agents

MCP works well for simple, deterministic tasks. But as agents become more capable and autonomous, their decisions become more contextual. They need to adapt on the fly, chain together tools in novel ways, and handle unexpected conditions without human supervision.

In that environment, static interface schemas and rigid permission structures begin to break down. They reduce the surface area for attack but also reduce the agent’s ability to reason through complex workflows. In prioritizing safety, MCP can unintentionally reduce agents’ operational abilities – and an enterprise’s ability to innovate.

More importantly, this rigidity masks real security gaps. Just because an agent is MCP-compliant doesn’t mean it’s behaving safely. For example:

  • An agent with read-only permissions could still exfiltrate data through indirect channels
  • A narrowly scoped tool call could still be chained into a larger, emergent action with unintended consequences
  • A well-formed request doesn’t mean the agent making it has the right context or judgment to do so safely

Agentic security isn’t just about what the agent is allowed to do – it’s about what it intends to do, and how it behaves in context.

The Real Risk Isn’t Just the Protocol. It’s What It Enables.

MCP introduces a permissioned, standardized way for AI agents to act, but that doesn’t make those actions inherently safe. The protocol might enforce strict boundaries, but it doesn’t account for how agents interpret context, chain tools, or behave under pressure.

In other words, MCP secures the connection, but not the consequence. And that’s the gap enterprises need to close.

Real-world AI risk isn’t about whether an agent can call a specific API. It’s about what it chooses to do across thousands of interactions, and whether your systems can detect and respond when that behavior starts to drift.

Think Beyond a Framework

MCP represents meaningful progress in securing agent-tool interactions. But it also signals a broader truth: as agents become more powerful, traditional notions of protocol-level safety may not be enough.

Enterprise leaders need to think beyond permission frameworks. Agent behavior, context drift, emergent tool use, and chained actions all demand new approaches to oversight and control. Because the real risk isn’t in the handshake, it’s in what comes after.

Share

Related Blog Posts

Securing the public sector against Shadow AI with F5 BIG-IP SSL Orchestrator
F5 ADSP | 01/07/2026

Securing the public sector against Shadow AI with F5 BIG-IP SSL Orchestrator

Learn how state, local, and education organizations can enhance visibility and security in encrypted network traffic while addressing compliance and governance.

F5 secures today’s modern and AI applications
F5 ADSP | 12/22/2025

F5 secures today’s modern and AI applications

The F5 Application Delivery and Security Platform (ADSP) combines security with flexibility to deliver and protect any app and API and now any AI model or agent anywhere. F5 ADSP provides robust WAAP protection to defend against application-level threats, while F5 AI Guardrails secures AI interactions by enforcing controls against model and agent specific risks.

Govern your AI present and anticipate your AI future
F5 ADSP | 12/18/2025

Govern your AI present and anticipate your AI future

Learn from our field CISO, Chuck Herrin, how to prepare for the new challenge of securing AI models and agents.

New 7.0 release of F5 Distributed Cloud Services accelerates F5 ADSP adoption
F5 ADSP | 12/10/2025

New 7.0 release of F5 Distributed Cloud Services accelerates F5 ADSP adoption

Our recent 7.0 release is both a major step and strategic milestone in our journey to deliver the connectivity, security, and observability fabric that our customers need.

Stay ahead of API security risks with our latest F5 Distributed Cloud Services release
F5 ADSP | 12/10/2025

Stay ahead of API security risks with our latest F5 Distributed Cloud Services release

This release brings exciting, new API discovery options, expanded testing scenarios, and enhanced detection capabilities—all geared toward reducing API security risks while improving overall visibility and compliance.

F5 provides enhanced protections against React vulnerabilities
F5 ADSP | 12/04/2025

F5 provides enhanced protections against React vulnerabilities

Developers and organizations using React in their applications should immediately evaluate their systems as exploitation of this vulnerability could lead to compromise of affected systems.

Deliver and Secure Every App
F5 application delivery and security solutions are built to ensure that every app and API deployed anywhere is fast, available, and secure. Learn how we can partner to deliver exceptional experiences every time.
Connect With Us