New agent gateway to mitigate shadow MCP risk

Issue 6 2025 AI & Data Analytics

Tray.ai, a platform for building smart, secure AI agents at scale, has announced Agent Gateway, a new capability in the Tray AI Orchestration platform. IT teams use Agent Gateway to build governed, maintainable MCP (Model Context Protocol) servers and MCP tools on Tray, and publish them via MCP for stable, secure agent use across their stack. (The Model Context Protocol is an open standard that enables developers to build secure, two-way connections between their data sources and AI-powered tools. See more at https://tinyurl.com/yc679fvk – Ed.)

As enterprises race to extend agents with new capabilities, shadow MCP servers and tools are being developed in JavaScript, Python and with ad hoc scripts and services, often without IT visibility or required guardrails. As Gartner noted in its September 2025 report, Innovation Insight: MCP Gateways1, “Enterprises are left trying to balance the enthusiasm for adopting MCP, at the cost of governance, against a more risk-averse approach to adoption, at the risk of missing the innovation boat.”

Tray Agent Gateway provides a managed environment for creating MCP servers and tools with defined policies, permissions and versioning, so IT can maintain security and compliance, reduce shadow MCP development and prepare the agent ecosystem for emerging standards like A2A (Agent-to-Agent).

“Unmanaged MCP use looks a lot like the API sprawl we saw in the early days of the cloud era,” said Alistair Russell, co-founder and CTO of Tray.ai. “API management centralised and enforced governance across APIs, including policies, permissions and versioning. Tray Agent Gateway does the same for MCP. Now, developers and business teams can quickly build MCP tools using a unified IDE for transparency, collaboration and maintenance. With Agent Gateway and our Enterprise Core working together, MCP servers and tools are all governed, instrumented and versioned for maximum control.”

Governance for evolving AI standards

• Agent Gateway provides interoperability with MCP and other emerging protocols that IT teams use to bring rigour, governance, and observability to the enterprise agent stack. Teams can define, test, version and document MCP services, apply scope and guardrails and share them selectively across their agent landscape.

Three core ways to use MCP are supported by Agent Gateway:

• Build composite MCP tools: Teams can create sophisticated composite tools in Merlin Agent Builder and publish them as MCP services. These tools can perform complex tasks or entire processes end-to-end and connect to and take action across any system, from apps to other AI services. Tray Guardian embeds guardrails, enabling users to mitigate unpredictable agent behaviour by encoding business rules for consistent, auditable outcomes.

• Publish connector-backed MCP tools: Tray’s library of 700+ managed connectors can now be published as MCP tools, instantly giving MCP-enabled agents secure reach across CRM, ERP, HR, analytics and other apps, all with the governance enterprises expect.

• Consume external MCP servers: Tray Agents can securely consume external MCP servers while IT gains centralised visibility, logging and auditability.

“AI agents will only scale when enterprises standardise how capabilities are added and governed,” said Rich Waldron, co-founder and CEO of Tray.ai. “Tray Agent Gateway gives IT a single way to set policy, permissions and versioning so teams can reuse trusted tools instead of rebuilding them. The result is lower risk, lower cost and an operating model that can adapt as standards like MCP and A2A mature.”

Agent Gateway gives IT centralised command over Tray-built MCP servers and tools developed across the organisation. By defining MCP servers within Tray Workspaces and Projects, teams can decide which MCP tools are exposed and under what conditions. Hence, each MCP deployment aligns with enterprise policies and security scope.

Every MCP tool and execution is instrumented in Tray Insights Hub, logged and versioned for traceability. This creates a complete audit trail that can be streamed to observability platforms such as Datadog or Splunk, giving IT clear oversight without slowing delivery. With clearly defined ownership, version control and documentation, IT can maintain governance across hundreds of agents and tools, replacing fragmented, ad hoc development with a single managed environment.

Together, Tray Agent Hub and Tray Agent Gateway are part of Merlin Agent Builder, creating a single environment for teams to build, govern and scale enterprise agents. Agent Hub provides the composable building blocks for agent creation, while Agent Gateway delivers governance and control over how those tools are developed, shared and maintained. With both capabilities in one experience, Merlin Agent Builder is now the one-stop environment for designing, deploying and managing agents securely at enterprise scale.

Future-proof architecture for multi-agent interoperability

Agent Gateway is built as a multi-protocol capability, supporting MCP today and engineered for Google’s A2A and future agent-to-agent interoperability standards. With this architecture, Tray Agents can communicate, delegate and collaborate with third-party agents while maintaining enterprise consistency and control.

By unifying governance across protocols, Agent Gateway future-proofs the enterprise tech stack, giving teams confidence that their AI orchestration strategy will remain compatible as new standards emerge.

For more information, go to www.tray.ai

[1] Gartner, “Innovation Insight: MCP Gateways,” Keith Guttridge, Andrew Humphreys, Gary Olliffe, Aaron Lord, 2 September 2025.


AI connector could be abused by cyberattackers


Source: Gemini.

Kaspersky has found that the Model Context Protocol (MCP) could be weaponised by cybercriminals as a supply chain attack vector, potentially leading to harmful impacts, including, but not limited to, the leakage of passwords, credit card numbers, cryptowallets, and other types of data. In its new research, Kaspersky experts show the concept of an attack and share mitigation measures for businesses that integrate AI tools into their workflows.

Open-sourced by Anthropic in 2024, the MCP is a standard that gives AI systems, especially LLM-based apps, a consistent way to connect to external tools and services. For instance, organisations may use it to let LLMs search and update documents, manage code repositories and APIs, or access CRM, financial, and cloud data.

Like any open-source tool, MCP can be abused by cybercriminals. In its new research, the Kaspersky Emergency Response Team experts built a proof-of-concept to simulate how attackers might abuse an MCP server. This was to demonstrate how supply chain attacks can unfold through the protocol and to showcase the potential harm that might come from running such tools without proper auditing. Performing a controlled security lab test, they simulated a developer workstation with a rogue MCP server installed, ultimately harvesting such sensitive data types as:

• Browser passwords.

• Credit card data.

• Cryptocurrency wallet files.

• API tokens and certificates.

• Cloud configurations and more.

During the simulated attack, a ‘victim’ only sees the legitimate output. Kaspersky has not yet observed this vector in the wild and warns that it may be used by cybercriminals not only to extract sensitive data, but also to cause other harmful impacts, such as executing malicious code, installing backdoors, and deploying ransomware.

“Supply chain attacks remain one of the most pressing threats in the cybersecurity space, and the potential weaponisation of MCP we demonstrated follows this trend. With the current hype around AI and the race to integrate these tools into workflows, businesses may lower their guard and, by adopting a seemingly legitimate, but unproven custom MCP, perhaps posted on Reddit or similar platforms, end up suffering a data breach. This underscores the importance of a strong security posture,” says Mohamed Ghobashy, incident response specialist in the Kaspersky Global Emergency Response Team.

To manage the risks associated with MCP abuse attacks, Kaspersky experts suggest that users:

• Check the MCP before installation. Submit every new server to a process that scans, reviews, and approves it before production use. Maintain a whitelist of approved servers so anything new stands out immediately.

• Lock it down. Run servers in containers or virtual machines with access limited to only the folders they require, and isolate networks so development environments cannot reach production or other sensitive systems.

• Monitor for odd behaviour and anomalies. Log every prompt and response so that hidden instructions or unusual tool calls can be spotted in the transcript. Keep an eye out for suspicious prompts, unexpected SQL commands, or unusual data flows, like outbound traffic triggered by agents outside standard workflows.

• Adopt managed security services. They help protect against evasive cyberattacks, investigate incidents, and gain additional expertise, even if a company lacks cybersecurity workers.

Learn more at www.kaspersky.co.za




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Securing a South African healthcare network
Surveillance Healthcare (Industry) AI & Data Analytics
VIVOTEK partnered with local integrator Chase Networks and distributor Rectron to deliver a fully integrated security ecosystem, providing PathCare with a centralised view of all facilities, simplifying monitoring of sensitive laboratory areas, and ensuring SOP compliance.

Read more...
DeepAlert appoints Howard Harrison as CEO
DeepAlert News & Events AI & Data Analytics
DeepAlert has appointed Howard Harrison as chief executive officer. DeepAlert’s founder and CEO of the past six years, Dr Jasper Horrell, will transition into a newly created role as chief innovation officer.

Read more...
The year of the agent
Information Security AI & Data Analytics
The dominant attack patterns in Q4 2025 included system-prompt extraction attempts, subtle content-safety bypasses, and exploratory probing. Indirect attacks required fewer attempts than direct injections, making untrusted external sources a primary risk vector heading into 2026.

Read more...
AI agent suite for control rooms
Milestone Systems News & Events Surveillance AI & Data Analytics
Visionplatform.ai announced the public launch of its new visionplatform.ai Agent Suite for Milestone XProtect, adding reasoning, context and assisted decision-making on top of existing video analytics and events — without sending video to the cloud.

Read more...
AI cybersecurity predictions for 2026
AI & Data Analytics Information Security
The rapid development of AI is reshaping the cybersecurity landscape in 2026, for both individual users and businesses. Large language models (LLMs) are influencing defensive capabilities while simultaneously expanding opportunities for threat actors.

Read more...
The year of machine deception
Security Services & Risk Management AI & Data Analytics
The AU10TIX Global Fraud Report, Signals for 2026, warns of the looming agentic AI and quantum risk, leading to a surge in adaptive, self-learning fraud, and outlines how early warning systems are fighting back.

Read more...
Dahua showcases smart city solutions
AI & Data Analytics Fire & Safety IoT & Automation
Dahua showcased its smart city solutions at the Smart City Expo World Congress in Barcelona, Spain, which brought together experts, innovators, and city leaders from around the globe to explore the future of urban transformation.

Read more...
What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
IQ and AI
Leaderware Editor's Choice Surveillance AI & Data Analytics
Following his presentation at the Estate Security Conference in October, Craig Donald delves into the challenge of balancing human operator ‘IQ’ and AI system detection within CCTV control rooms.

Read more...
AI and automation are rewriting the cloud security playbook
Technews Publishing AI & Data Analytics
Old-school security relied on rules-based systems that flagged only what was already known. AI flips the script: it analyses massive volumes of data in real-time, spotting anomalies that humans or static rules would miss.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.