MCP Security Has Gone Mainstream

A few days ago our outside counsel forwarded me an article from Pillsbury’s Sourcing Speak blog called MCP Connectors: Mitigating the Risks of AI Agents in a Connected Architecture. It’s the third installment in a series the firm has been running on MCP, and it lays out a risk mitigation framework, based on the NIST AI Risk Management Framework, for deploying MCP connectors inside regulated enterprises.

The fact that a major law firm’s technology transactions group is publishing 12-minute risk explainers on MCP says a lot about where this conversation has moved.

A year ago, MCP was something you explained to enterprise architects from scratch. You started with what the protocol was, why agentic systems needed it, and why the connectors mattered. The audience was developers and a handful of forward-leaning platform teams.

The audience now looks different. It includes general counsel, CISOs, heads of procurement, and AI governance committees. The questions have shifted from “what is this” to “we already have this in production, our auditors are asking, what’s the control framework.” That’s the shift the Pillsbury piece is responding to, and it’s the same shift I’ve been hearing in almost every inbound conversation we’ve had at Obot over the past two quarters.

What the article gets right

The piece walks through a hypothetical mid-size investment advisory firm that wires MCP connectors into its CRM, document management system, market data feed, and HR system, using administrator service-account credentials. That’s roughly how most pilots start. The authors then trace what happens.

An overly broad document connector pulls a memo from one client’s file into another client’s letter, leaking a divestment strategy to the CEO of the company being divested from. A vague “clean up the stale records” instruction merges two married clients’ accounts, and then the same logic propagates into HR and stops an employee’s paychecks. A poisoned memo planted in the document management system triggers a prompt injection that exfiltrates client and employee data. A year-end query loop hammers the HR vendor’s rate limiter and incidentally violates the named-user provision in the license. A market data feed gets scraped for a derivative research product the license explicitly prohibits, triggering a lawsuit with uncapped IP liability.

None of these scenarios are far-fetched. We have helped customers diagnose variations of every one of them. What’s worth paying attention to in the article is not really the scenarios themselves. It’s who the article is written for. These are the failure modes that get lawyers, auditors, and procurement teams involved, and the Pillsbury authors are speaking directly to that audience in their own language.

The four themes are the right ones

The mitigation framework is organized around four themes: Map/Assess, Manage/Configure, Monitor/Measure, and Governance. That’s basically the operating discipline we’ve been arguing enterprises need for MCP. If you strip the legal framing off, you get four practical things.

First, know what your agents can reach. Before any connector goes live, classify the systems it touches by data type, sensitivity, jurisdiction, and license terms. Most MCP pilots skip this entirely.

Second, constrain what they can do. Least privilege at the connector level, scoped credentials, separate connectors for separate functions, write actions behind approval tiers, and kill switches for cascading workflows.

Third, see what they actually do. Tamper-evident logs of prompts, retrieved context, tool invocations, approvals, and outputs, captured at the connector layer and not just inside the agent.

Fourth, make someone accountable. Contracts that reflect the actual architecture, explicit allocation of liability between the model provider, the middleware, and the enterprise, and a policy framework that treats agentic AI as a distinct risk category rather than an extension of conventional software procurement.

None of this is exotic. Most of it is achievable with infrastructure that already exists. What’s been missing is the recognition that someone has to own it, and a control plane to operationalize it.

What’s changed on our side

The inbound mix at Obot has shifted noticeably over the last two quarters. The first call used to be with a platform engineer. Now it tends to be a platform engineer along with an InfoSec lead, someone from legal, and increasingly an AI governance owner. They are not theorizing. They are trying to get their hands around a real deployment that already exists.

The scope of the conversation has also expanded past MCP. Customers are asking about skills, like who can author them, which ones are approved for production, and which agent runs loaded which skills against which systems. The supply chain concern that surrounded MCP servers a year ago now applies to skills, custom prompts, and any other piece of context an agent loads at runtime.

The questions are concrete now. People want to see how dual authorization works for write actions in their CRM. They want to know where credentials live and how they are rotated. They want an audit trail that ties an action back to a specific prompt, a specific tool invocation, and a specific approver. Those are exactly the questions Pillsbury’s framework points at, and they are the questions a procurement reviewer expects clean answers to before signing.

The retrofit problem is also real. The closing line of the article is the one I would flag for anyone running a pilot right now: as connector ecosystems mature and agentic workflows embed into operations, retrofitting governance becomes exponentially harder. We are already seeing customers who have to undo connector decisions they made six months ago because they over-scoped credentials, used admin service accounts where they should have used a scoped identity, or wired a write-capable connector into a system that should have been read-only. Cleaning that up after the fact is significantly more painful than getting it right on day one.

Where this goes

MCP is no longer just a developer tooling story. It is a procurement story, a contracting story, an audit story, and a governance story. The Pillsbury piece is one of the clearer expressions I have seen of what that looks like from the legal side, and the fact that it exists at all, written by a tech transactions group that has been negotiating outsourcing and IT contracts for thirty years, is worth paying attention to on its own.

If you are standing up MCP connectors right now, read the article. Then ask honestly which of the four themes your current deployment is actually doing. If the answer is “not really any of them yet, we are moving too fast,” that is where the work is.

We are building Obot to be the operating layer that makes Map/Assess, Manage/Configure, Monitor/Measure, and Governance achievable without slowing the teams who want to ship agents. If that is the problem you are trying to solve, you can deploy your own Obot or try Obot today.

Related Articles