Runlayer named to Rising in Cyber 2026 List by Morgan Stanley →
Tal Peretz
Why production AI systems need MCP gateways

Why production AI systems need MCP gateways

We’ve all heard of API gateways, and by now, most people are also familiar with LLM gateways. But what are MCP gateways and what critical problems can they help solve for companies using AI across their production tech stack?

What are MCP gateways and how do they differ from LLM gateways?

An MCP gateway acts as a centralized channel through which an organization’s agents interact with external data sources and tools. All communications flow through this channel, creating a single plane that can handle tool discovery and access, authentication/authorization, and tracing/logging. If an organization has X agents connecting to Y MCP servers, the gateway turns that X*Y mesh of direct, unmanaged connections into a single X+Y hub-and-spoke model where each agent connects once to the gateway and the gateway manages the connections to each MCP server.

MCP gateways differ from LLM gateways in that an LLM gateway manages your connection to an AI model (Claude Opus, Codex) while the MCP gateway manages the connection between an agent you deploy and the tools and data it accesses. LLM gateways cover things like token optimization, rate limiting, and request routing. MCP gateways cover things like tracking which of your agents requested a set of data at what time, and whether a certain agent is allowed to send an email from a service account. Both are required for a well-functioning AI ecosystem, but they each serve different purposes in different parts of the stack.

The need for a proxy layer

The “lethal trifecta”, a term coined by security researcher Simon Willison, outlines the three critical conditions required for an agentic system to be vulnerable to attack. An agent must 1) be able to access sensitive data, 2) have exposure to any form of untrusted content (ex: a public feed, external input, or even untrusted tool definition) and 3) be able to externally communicate. AI agents are powerful because they can take in our natural language instructions and turn them into a set of steps that are actioned upon. However, this ability also makes them extremely vulnerable to attack if guardrails aren’t present. If an agent has access to external content, it can’t independently discern useful content from instructions to invoke data exfiltration. With the right access and communication ability, the agent could then pull sensitive data and expose it to an attacker. The data exfiltration risk isn’t theoretical: in 2025, this attack was actually executed against Github’s MCP server.

Beyond protecting against data exfiltration, a proxy layer also facilitates audit trails, performance improvements, and identity and access management (IAM). Together, these capabilities transform the proxy layer from a simple communication channel to the backbone of a production-grade agentic system, fitted with security, compliance, and performance functionality.

Core MCP gateway capabilities

Tool governance and discovery

Depending on level of closeness to agentic development, employees in your organization may have varying levels of familiarity with what tools are available to them. Because of its hub-and-spoke nature, a centralized gateway enables a centralized registry of tools that can be discovered and connected to immediately. Organizations can vet every new tool and update prior to it entering the registry and enforce shadow MCP detection to detect unapproved tools through existing mobile device management (MDM) software on each device. Without a registry, if a tool’s provider were to come out with an update, any agent connected to that tool may be able download the update without knowing whether it breaks existing dependences or is a trusted version. In addition to native MCP servers, the gateway can also wrap REST APIs, legacy SOAP services, databases, and other internal functions as MCP tools and introduce them to the registry.

Beyond discovery, a gateway also allows for granularity in tool access. Consider a database MCP server that exposes both read and write tools across multiple tables. A business intelligence role requires a different set of tools from an engineering contractor role. While the table scope for the engineering contractor is more limited, they might need write permissions on some tables. On the other hand, the BI role wouldn’t need any write capability, but may need broader read access. Gateways allow organizations to segment a single MCP server's toolset and grant access at the role or individual agent level.

Input/output filtering and sanitization

This is where MCP gateways break the lethal trifecta. Any external data entering an agentic system passes through the gateway prior to any agent reading it. Beyond straightforward sanitization, a robust gateway (like Runlayer’s) enforces MCP-specific threat detection on every call by scanning for tool poisoning, tool shadowing, and command injection that generic prompt-level guardrails won't catch. A similar inspection is performed prior to output. Before an agent's output reaches an external endpoint, the gateway inspects outbound content for data loss risks, matching against known sensitive patterns like credentials and PII and blocking any call going to an untrusted or unapproved endpoint.

Authentication and authorization

When it comes to internal systems and production data, it’s critical to verify both the identity of the requesting entity and that they have the adequate permissions to access a specific resource. For identity verification, MCP gateways integrate with existing IdP providers (Okta, Entra, etc.) so that permission sets can be continuously synced from existing systems and don’t need to be managed separately. Beyond human identity, each agent should also have a verifiable identity so that every tool call can be attributed to a specific agent, not just the user or role behind it.

As AI systems become more sophisticated, so do the attacks on them. Regarding access management, role-based access controls (RBAC) are simply not enough anymore to protect against malicious actors. A production-grade gateway should employ policy-based access controls (PBAC) that consider the full request context at runtime, including tool arguments, request metadata, subject attributes, and network origin. For tool calls that touch particularly sensitive resources, a gateway can also require human approval prior to execution, ensuring a person consciously gives the go ahead on the given action.

Traffic management and scale

As a company’s number of agents and/or tool calls scale, an MCP gateway can also help optimize performance and prevent service degradation. During traffic spikes, the gateway could queue requests to smooth out load and pool connections to prevent backend services from being overwhelmed. It could also handle caching to prevent redundant tool discovery and rate limiting to ensure no one agent or workflow is monopolizing shared resources. Performance issues may not impact development environments, but as a company deploys more agentic workflows to production, managing traffic and resource availability goes from a nice-to-have to a critical piece of functionality.

Observability and auditability

If your organization maintains compliance certifications (SOC 2, HIPAA, ISO 27001, etc.), keeping an accurate record of data access is paramount. Logs construct an auditable trail of every tool call made (with full request/response traces, timestamps, data access records, and requesting entity), making debugging, incident response, and auditing infinitely easier. Because all calls flow through one endpoint, tracing actions happens without blind spots.

Deploying MCP gateways in production

Organizations across a variety of industries have already begun using gateways in their production environments to achieve some or all of the functionality above. Some examples:

  • Caching high-demand queries: Multiple individuals across sales and marketing teams at a company need to access quarterly profitability data for automated lead generation workflows. The gateway caches this query to improve response time and cost per request. The gateway also enforces identity verification for both the employees and the agents executing the workflows.
  • Seamless compliance: A healthcare startup is is preparing for a HIPAA audit and requires detailed logs of PHI access across the audit period. A single query into their gateway's audit logs allows them to pull every instance of autonomous data access marked with timestamps, identities, and other relevant metadata.

These are two examples of a much broader set of use cases. As agentic systems become a standard part of enterprise infrastructure, the gateway layer will become as foundational as the firewall and control plane for organizations looking to secure their data and scale autonomous operations.

May 11, 2026
 • 
Tal Peretz
Read more
Runlayer named to Rising in Cyber 2026

Runlayer named to Rising in Cyber 2026

Runlayer was named to Notable Capital & Morgan Stanley's 2026 Rising in Cyber list, voted on by 150 sitting CISOs. Andy Berman on why the recognition matters, and what it signals about how AI-native companies are getting built.
May 12, 2026
 • 
Andy Berman
The MCP STDIO RCE class, and why Runlayer doesn't run what the LLM asks it to

The MCP STDIO RCE class, and why Runlayer doesn't run what the LLM asks it to

OX Security found a design-level flaw in Anthropic's Model Context Protocol. MCP's STDIO transport turns a config file into a command executor. Here's how Runlayer's control plane breaks each of the four attack vectors.
Apr 22, 2026
 • 
Alex Frazer
Runlayer and AARM Partner to Secure Enterprise Agents

Runlayer and AARM Partner to Secure Enterprise Agents

Runlayer achieves AARM Extended Conformance (R1–R9), partnering with the Vanta-backed open specification to define how enterprises secure AI agents at runtime.
Apr 15, 2026
 • 
Tal Peretz
What Project Glasswing means for enterprise security

What Project Glasswing means for enterprise security

What Project Glasswing and Claude Mythos mean for enterprise security teams, and why your patch workflows, dependency management, and MCP governance need to evolve now.
Apr 11, 2026
 • 
Tal Peretz
The Danger of Fake MCP Servers

The Danger of Fake MCP Servers

Fake MCP servers pose a growing security risk, enabling data leaks, tool poisoning, and compromised AI behavior. Learn how these attacks work and how organizations can prevent them with proper controls and monitoring.
Apr 7, 2026
 • 
Tal Peretz
Runlayer + 1Password: Secure Credential Access for AI Agents

Runlayer + 1Password: Secure Credential Access for AI Agents

Runlayer and 1Password partner to bring secure, auditable credential access to autonomous AI agents. The integration lets enterprises inject secrets from 1Password vaults into agent sessions managed by Runlayer, replacing plaintext .env files with centralized governance, real-time retrieval, and full audit logging across human and non-human identities.
Mar 17, 2026
 • 
Tal Peretz
Honestly, MCP doesn’t “suck”

Honestly, MCP doesn’t “suck”

Garry Tan recently argued that MCP “sucks,” citing context-window bloat and weak authentication. This article breaks down why those criticisms miss the mark—and why MCP remains the better foundation for agents operating at enterprise scale.
Mar 12, 2026
 • 
Vitor Balocco
FGA is not enough for your agent authorization

FGA is not enough for your agent authorization

PBAC beats FGA for agent authorization — context-aware, auditable, asymmetric access control without graph complexity.
Mar 9, 2026
 • 
Alvaro Inckot
Scale MCP with Dynamic Tool use

Scale MCP with Dynamic Tool use

Dynamic tool use cuts token waste from MCP by replacing bulk tool loading with lightweight search, saving cost without custom implementation.
Feb 20, 2026
 • 
Vitor Balocco
OpenAI Agent Builder’s MCP Problem

OpenAI Agent Builder’s MCP Problem

OpenAI AgentKit/Agent Builder launched in Oct 2025 but, despite early hype, its limited integrations and weak security (e.g., unverified MCP servers, no namespace isolation, insufficient guardrails) create a large enterprise attack surface—prompting calls for controls like a trusted MCP catalog, tool gateway auditing, RBAC/least privilege, and stronger governance (e.g., via Runlayer).
Feb 19, 2026
 • 
Tal Peretz
Pwning OpenClaw in 50 Messages: Social Engineering Claude Opus Into Handing Over the Keys

Pwning OpenClaw in 50 Messages: Social Engineering Claude Opus Into Handing Over the Keys

A Claude Opus–powered OpenClaw agent with Slack and shell access was social-engineered in ~50 messages to rebind its UI, install ngrok, expose the dashboard publicly, reveal its gateway token, and approve the attacker’s device.
Feb 16, 2026
 • 
Alex Frazer
Unpacking the OWASP Top 10 for MCP

Unpacking the OWASP Top 10 for MCP

An overview of the OWASP MCP Top 10, highlighting the biggest security risks in MCP-enabled AI systems and the key safeguards teams can use to prevent them.
Feb 10, 2026
 • 
Alex Frazer
MCP Apps highlight the power of protocol governance

MCP Apps highlight the power of protocol governance

MCP Apps let tools render interactive UIs directly in chat via the same MCP protocol—not a new execution path. With Runlayer intercepting tool calls, resource fetches, and auth headers, existing MCP security controls apply from day one.
Jan 30, 2026
 • 
Tal Peretz
Announcing Box and Runlayer's partnership on Enterprise MCP

Announcing Box and Runlayer's partnership on Enterprise MCP

Connect AI agents to Box content with enterprise security. The official Box MCP server is live in the Runlayer marketplace, with identity enforcement, audit logging, and threat detection built in. Box customers can find Runlayer in the Box Integrations Center. Setup takes minutes.
Jan 27, 2026
 • 
Aidan Sochowski
MCP vs CLI Tools: Which is best for production applications?

MCP vs CLI Tools: Which is best for production applications?

CLI tools feel familiar to AI agents, but they break down in production due to brittle syntax, poor state management, and dangerous security assumptions. This post explains why CLI-based agent workflows fail and how a single-tool MCP using a known programming language offers a more reliable and secure alternative.
Jan 25, 2026
 • 
Vitor Balocco
Runlayer Product Update: 1.25.0

Runlayer Product Update: 1.25.0

This update is about momentum: moving faster in the CLI, getting clearer visibility into what’s running, and debugging with less friction. Expect smoother workflows, better control, and fewer surprises as you build and ship.
Jan 23, 2026
 • 
Engineering
MCP Prompt Injection Attacks: How to Protect Your AI Agents

MCP Prompt Injection Attacks: How to Protect Your AI Agents

Two near-invisible prompt injection attacks showed how attackers can bypass default enterprise guardrails and trigger silent, ongoing data exfiltration by exploiting user and model trust. Runlayer blocks these attacks by treating every input as untrusted until it passes continuously updated security models trained on the latest real-world exploits.
Jan 19, 2026
 • 
Jake Moghtader
Cursor Hooks + MCP Security: Official Runlayer Partnership Announcement

Cursor Hooks + MCP Security: Official Runlayer Partnership Announcement

Runlayer is an official Cursor Hooks launch partner. With Cursor Hooks, securely allow or deny MCP tool calls with Runlayer's enterprise MCP platform.
Dec 18, 2025
 • 
Marcin Jan Puhacz
The main takeaways from GitHub’s MCP Vulnerability

The main takeaways from GitHub’s MCP Vulnerability

GitHub’s MCP vulnerability revealed how AI agents can be weaponized through poisoned context in public repositories. This post analyzes the exploit, explains why permissions alone aren’t enough, and shares practical guardrails for preventing and mitigating agent-driven data exfiltration.
Dec 16, 2025
 • 
Vitor Balocco
Runlayer Joins Anthropic, OpenAI, & Google as AAIF Founding Member

Runlayer Joins Anthropic, OpenAI, & Google as AAIF Founding Member

The Linux Foundation has launched the Agentic Artificial Intelligence Foundation (AAIF), with Runlayer joining sponsors Anthropic, OpenAI, Google, AWS, Microsoft. AAIF now oversees the Model Context Protocol (MCP), reinforcing MCP as a rising standard for AI agent integration. Runlayer supports AAIF’s open, secure, and scalable AI development mission.
Dec 9, 2025
 • 
Andy Berman
Runlayer Raises $11M to Scale Enterprise MCP Infrastructure

Runlayer Raises $11M to Scale Enterprise MCP Infrastructure

Nov 17, 2025
 • 
Andy Berman
MCP Security Risks: Your AI Agent is Probably Leaking Data Right Now

MCP Security Risks: Your AI Agent is Probably Leaking Data Right Now

MCP adoption is accelerating across major platforms, but security risks—like malicious servers, prompt injection, and tool-level exploits—are growing just as fast. This post breaks down real attack scenarios that show how easily data can leak when MCP implementations are trusted by default. It also outlines practical defenses for users and builders, plus why companies need audited MCP catalogs, gateway proxies, and sandboxing to stay secure at scale.
Nov 12, 2025
 • 
Vitor Balocco
Why MCP builders are transitioning from DCR to OAuth CIMD

Why MCP builders are transitioning from DCR to OAuth CIMD

Over the last year, MCP has surged in adoption. To little surprise, this has introduced some scaling issues. One of these is client registration; previously, systems were rigged together by humans. Today, AI agents discover and interface with MCP servers freely, requiring a new paradigm for client communications.
Nov 7, 2025
 • 
Vitor Balocco
What is Dynamic Client Registration?

What is Dynamic Client Registration?

Tired of manually registering every AI agent with every OAuth server? Dynamic Client Registration (DCR) lets your agents authenticate with MCP servers at runtime, no human clicks required. Learn how DCR works, when to use it over traditional OAuth, and why it's becoming essential for scalable agentic systems.
Nov 6, 2025
 • 
Vitor Balocco