New agent gateway to mitigate shadow MCP risk

Issue 6 2025 AI & Data Analytics

Tray.ai, a platform for building smart, secure AI agents at scale, has announced Agent Gateway, a new capability in the Tray AI Orchestration platform. IT teams use Agent Gateway to build governed, maintainable MCP (Model Context Protocol) servers and MCP tools on Tray, and publish them via MCP for stable, secure agent use across their stack. (The Model Context Protocol is an open standard that enables developers to build secure, two-way connections between their data sources and AI-powered tools. See more at https://tinyurl.com/yc679fvk – Ed.)

As enterprises race to extend agents with new capabilities, shadow MCP servers and tools are being developed in JavaScript, Python and with ad hoc scripts and services, often without IT visibility or required guardrails. As Gartner noted in its September 2025 report, Innovation Insight: MCP Gateways1, “Enterprises are left trying to balance the enthusiasm for adopting MCP, at the cost of governance, against a more risk-averse approach to adoption, at the risk of missing the innovation boat.”

Tray Agent Gateway provides a managed environment for creating MCP servers and tools with defined policies, permissions and versioning, so IT can maintain security and compliance, reduce shadow MCP development and prepare the agent ecosystem for emerging standards like A2A (Agent-to-Agent).

“Unmanaged MCP use looks a lot like the API sprawl we saw in the early days of the cloud era,” said Alistair Russell, co-founder and CTO of Tray.ai. “API management centralised and enforced governance across APIs, including policies, permissions and versioning. Tray Agent Gateway does the same for MCP. Now, developers and business teams can quickly build MCP tools using a unified IDE for transparency, collaboration and maintenance. With Agent Gateway and our Enterprise Core working together, MCP servers and tools are all governed, instrumented and versioned for maximum control.”

Governance for evolving AI standards

• Agent Gateway provides interoperability with MCP and other emerging protocols that IT teams use to bring rigour, governance, and observability to the enterprise agent stack. Teams can define, test, version and document MCP services, apply scope and guardrails and share them selectively across their agent landscape.

Three core ways to use MCP are supported by Agent Gateway:

• Build composite MCP tools: Teams can create sophisticated composite tools in Merlin Agent Builder and publish them as MCP services. These tools can perform complex tasks or entire processes end-to-end and connect to and take action across any system, from apps to other AI services. Tray Guardian embeds guardrails, enabling users to mitigate unpredictable agent behaviour by encoding business rules for consistent, auditable outcomes.

• Publish connector-backed MCP tools: Tray’s library of 700+ managed connectors can now be published as MCP tools, instantly giving MCP-enabled agents secure reach across CRM, ERP, HR, analytics and other apps, all with the governance enterprises expect.

• Consume external MCP servers: Tray Agents can securely consume external MCP servers while IT gains centralised visibility, logging and auditability.

“AI agents will only scale when enterprises standardise how capabilities are added and governed,” said Rich Waldron, co-founder and CEO of Tray.ai. “Tray Agent Gateway gives IT a single way to set policy, permissions and versioning so teams can reuse trusted tools instead of rebuilding them. The result is lower risk, lower cost and an operating model that can adapt as standards like MCP and A2A mature.”

Agent Gateway gives IT centralised command over Tray-built MCP servers and tools developed across the organisation. By defining MCP servers within Tray Workspaces and Projects, teams can decide which MCP tools are exposed and under what conditions. Hence, each MCP deployment aligns with enterprise policies and security scope.

Every MCP tool and execution is instrumented in Tray Insights Hub, logged and versioned for traceability. This creates a complete audit trail that can be streamed to observability platforms such as Datadog or Splunk, giving IT clear oversight without slowing delivery. With clearly defined ownership, version control and documentation, IT can maintain governance across hundreds of agents and tools, replacing fragmented, ad hoc development with a single managed environment.

Together, Tray Agent Hub and Tray Agent Gateway are part of Merlin Agent Builder, creating a single environment for teams to build, govern and scale enterprise agents. Agent Hub provides the composable building blocks for agent creation, while Agent Gateway delivers governance and control over how those tools are developed, shared and maintained. With both capabilities in one experience, Merlin Agent Builder is now the one-stop environment for designing, deploying and managing agents securely at enterprise scale.

Future-proof architecture for multi-agent interoperability

Agent Gateway is built as a multi-protocol capability, supporting MCP today and engineered for Google’s A2A and future agent-to-agent interoperability standards. With this architecture, Tray Agents can communicate, delegate and collaborate with third-party agents while maintaining enterprise consistency and control.

By unifying governance across protocols, Agent Gateway future-proofs the enterprise tech stack, giving teams confidence that their AI orchestration strategy will remain compatible as new standards emerge.

For more information, go to www.tray.ai

[1] Gartner, “Innovation Insight: MCP Gateways,” Keith Guttridge, Andrew Humphreys, Gary Olliffe, Aaron Lord, 2 September 2025.


AI connector could be abused by cyberattackers


Source: Gemini.

Kaspersky has found that the Model Context Protocol (MCP) could be weaponised by cybercriminals as a supply chain attack vector, potentially leading to harmful impacts, including, but not limited to, the leakage of passwords, credit card numbers, cryptowallets, and other types of data. In its new research, Kaspersky experts show the concept of an attack and share mitigation measures for businesses that integrate AI tools into their workflows.

Open-sourced by Anthropic in 2024, the MCP is a standard that gives AI systems, especially LLM-based apps, a consistent way to connect to external tools and services. For instance, organisations may use it to let LLMs search and update documents, manage code repositories and APIs, or access CRM, financial, and cloud data.

Like any open-source tool, MCP can be abused by cybercriminals. In its new research, the Kaspersky Emergency Response Team experts built a proof-of-concept to simulate how attackers might abuse an MCP server. This was to demonstrate how supply chain attacks can unfold through the protocol and to showcase the potential harm that might come from running such tools without proper auditing. Performing a controlled security lab test, they simulated a developer workstation with a rogue MCP server installed, ultimately harvesting such sensitive data types as:

• Browser passwords.

• Credit card data.

• Cryptocurrency wallet files.

• API tokens and certificates.

• Cloud configurations and more.

During the simulated attack, a ‘victim’ only sees the legitimate output. Kaspersky has not yet observed this vector in the wild and warns that it may be used by cybercriminals not only to extract sensitive data, but also to cause other harmful impacts, such as executing malicious code, installing backdoors, and deploying ransomware.

“Supply chain attacks remain one of the most pressing threats in the cybersecurity space, and the potential weaponisation of MCP we demonstrated follows this trend. With the current hype around AI and the race to integrate these tools into workflows, businesses may lower their guard and, by adopting a seemingly legitimate, but unproven custom MCP, perhaps posted on Reddit or similar platforms, end up suffering a data breach. This underscores the importance of a strong security posture,” says Mohamed Ghobashy, incident response specialist in the Kaspersky Global Emergency Response Team.

To manage the risks associated with MCP abuse attacks, Kaspersky experts suggest that users:

• Check the MCP before installation. Submit every new server to a process that scans, reviews, and approves it before production use. Maintain a whitelist of approved servers so anything new stands out immediately.

• Lock it down. Run servers in containers or virtual machines with access limited to only the folders they require, and isolate networks so development environments cannot reach production or other sensitive systems.

• Monitor for odd behaviour and anomalies. Log every prompt and response so that hidden instructions or unusual tool calls can be spotted in the transcript. Keep an eye out for suspicious prompts, unexpected SQL commands, or unusual data flows, like outbound traffic triggered by agents outside standard workflows.

• Adopt managed security services. They help protect against evasive cyberattacks, investigate incidents, and gain additional expertise, even if a company lacks cybersecurity workers.

Learn more at www.kaspersky.co.za




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
IQ and AI
Leaderware Editor's Choice Surveillance AI & Data Analytics
Following his presentation at the Estate Security Conference in October, Craig Donald delves into the challenge of balancing human operator ‘IQ’ and AI system detection within CCTV control rooms.

Read more...
AI and automation are rewriting the cloud security playbook
Technews Publishing AI & Data Analytics
Old-school security relied on rules-based systems that flagged only what was already known. AI flips the script: it analyses massive volumes of data in real-time, spotting anomalies that humans or static rules would miss.

Read more...
Onsite AI avoids cloud challenges
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure AI & Data Analytics
Most AI programs today depend on constant cloud connections, which can be a liability for companies operating in secure or high-risk environments. That reliance exposes sensitive data to external networks, but also creates a single point of failure if connectivity drops.

Read more...
neaMetrics 2025: Year in review
AI & Data Analytics
With a stronger team, a broader portfolio, and a clear vision for what’s next, neaMetrics is well positioned to continue delivering smarter, more connected security solutions in 2026 and beyond.

Read more...
GenAI fraud forcing banks to shift from identity to intent
AI & Data Analytics Information Security Financial (Industry)
The complexity and velocity of modern fraud schemes, from deepfakes to fraud and scams involving social engineering, demand more than just investment in new tools; they need adaptability and expanding the security net.

Read more...
Who has access to your face?
Access Control & Identity Management AI & Data Analytics
While you may be adjusting your privacy settings on social media or thinking twice about who is recording you at public events, the reality is that your facial features may be used in other contexts.

Read more...
The impact of AI on security
Technews Publishing Information Security AI & Data Analytics
Today’s threat actors have moved away from signature-based attacks that legacy antivirus software can detect, to ‘living-off-the-land’ using legitimate system tools to move laterally through networks. This is where AI has a critical role to play.

Read more...
Who has access to your face?
Access Control & Identity Management Residential Estate (Industry) AI & Data Analytics
While you may be adjusting your privacy settings on social media or thinking twice about who is recording you at public events, the reality is that your facial features may be used in other contexts,

Read more...
Adding AI analytics to security monitoring
News & Events Perimeter Security, Alarms & Intruder Detection Residential Estate (Industry) AI & Data Analytics
SEON has announced its latest integration with Refraime, an AI-powered video analytics platform designed to elevate CCTV surveillance through real-time object detection and intelligent alerting.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.