Tool Approval Propagation and Agent-Oriented MCP Server Design for Large Toolsets #1203
Replies: 3 comments
-
|
Delegation chains solve the approval propagation problem described here. The pattern: the root authority (human/orchestrator) delegates to Agent A with caveats (allowed actions, cost limits, expiry). Agent A can further delegate to Agent B with narrower caveats. The proof travels with each tool call, so any MCP server can verify the full chain back to the root without external lookups. Each level can only narrow authority, never widen it. If the sub-agent tries to call We open-sourced a library that implements this for MCP:
Server-side verification is 5 lines. Full proposal for adding this to the MCP spec: #2404 Source: github.com/kanoniv/agent-auth (MIT) |
Beta Was this translation helpful? Give feedback.
-
|
delegation chain 패턴 봤는데, approval 규칙 추가할 때마다 tool chain 로직을 수정해야 하는 게 문제. strike 전에 event로 validator plugin들을 병렬 구독시키는 게 훨씬 깔끔하더라. 규칙 추가되면 base tool 손 안 댈 수 있으니까. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
Pre-submission Checklist
Question Category
Your Question
Hi all,
I'm working on a solution to mitigate the degraded reliability performance that occurs when a large number of MCP-exposed tools are available to an LLM. When too many tools are exposed to a single agent, the LLM's ability to choose the right one deteriorates, resulting in less effective behavior.
I'm exploring whether an AI orchestration framework behind an MCP server is a valid way to handle this—both from a protocol compatibility standpoint and in terms of long-term maintainability.
🧠 The Problem: LLM Confusion with Large Tool Libraries
In setups where an MCP client interacts with a single agent that has access to many MCP-backed tools, LLM performance drops. With too many options, the model becomes less consistent and often makes poor tool selection choices.
The goal is to keep the tool context lean and focused, while still supporting a broad range of capabilities.
⚙️ The Architecture: Orchestrator + Sub-Agent Model
🔁 The Challenge: Approval Propagation
Here's where things get tricky: the client only sees a single high-level tool call (to the orchestrator). That orchestrator may call other MCP-backed tools through sub-agents—but if one of those calls requires user approval, there's no clear mechanism in MCP to propagate that approval request back to the original client.
Ideally, I'd like to:
This keeps the agent chain in control, while allowing the user to stay in the loop on sensitive or consequential decisions.
❓ The Questions:
Is this a valid architectural pattern?
This seems like a clean way to balance tool breadth with clarity, but MCP doesn't appear to support approval forwarding natively. Is this just an unsupported use case—or a misapplication of the protocol?
If viable, what's the best way to implement this?
Are there other approaches to reduce tool confusion without fragmenting execution this much?
I'd love to hear from anyone who's explored similar agent-based orchestration models with MCP—or who's run into and solved LLM confusion issues in large tool contexts.
Thanks for any insight you can offer!
Beta Was this translation helpful? Give feedback.
All reactions