3/16/2026 at 3:44:52 PM
I'm getting tired of everyone saying "MCP is dead, use CLIs!".Yes, MCP eats up context windows, but agents can also be smarter about how they load the MCP context in the first place, using similar strategy to skills.
The problem with tossing it out entirely is that it leaves a lot more questions for handling security.
When using skills, there's no implicit way to be able to apply policies in the sane way across many different servers.
MCP gives us a registry such that we can enforce MCP chain policies, i.e. no doing web search after viewing financials.
Doing the same with skills is not possible in a programatic and deterministic way.
There needs to be a middle ground instead of throwing out MCP entirely.
by caust1c
3/16/2026 at 8:02:51 PM
IMO if you want a metadata registry of how actions work so you can make complicated, fragile, ACL rule systems of actions, then make that. That doesn't need to be loaded into a context window to make that work and can be expanded to general API usage, tool usage, cli usage, and so on. You can load a gh cli metadata description system and so on.MCPs are clunky, difficult to work with and token inefficient and security orgs often have bad incentive design to mostly ignore what the business and devs need to actually do their job, leading to "endpoint management" systems that eat half the system resources and a lot of fig leaf security theatre to systematically disable whatever those systems are doing so people can do their job in an IT equivalent that feels like the TSA.
Thank god we moving away from giving security orgs these fragile tools to attach ball and chains to everyone.
by novok
3/16/2026 at 6:23:27 PM
I feel like I don't fully understand mcp. I've done research on it but I definitely couldn't explain it. I get lost on the fact that to my knowledge it's a server with API endpoints that are well defined into a json schema then sent the to LLM and the LLM parses that and decides which endpoints to hit (I'm aware some llms use smart calling now so they load the tool name and description but nothing else until it's called). How exactly are you doing the process of stopping the LLM from using web search after it hits a certain endpoint in your MCP server? Or is this referring strictly to when you own the whole workflow where you can then deny websearch capabilities on the next LLM step?Are there any good docs youve liked to learn about it, or good open source projects you used to get familiar? I would like to learn more
by ewild
3/16/2026 at 4:02:19 PM
It is a weird trend. I see the appeal of Skills over MCP when you are just a solo dev doing your work. MCP is incredibly useful in an organization context when you need to add controls and process. Both are useful. I feel like the anti-MCP push is coming from people who don't need to work in a large org.by yoyohello13
3/16/2026 at 5:14:46 PM
Not sure. Our big org, banned MCPs because they are unsafe, and they have no way to enforce only certain MCPs (in github copilot).by krzyk
3/16/2026 at 5:25:15 PM
But skills where you tell the LLM to shell out to some random command are safe? I'm not sure I understand the logic.by thenewnewguy
3/16/2026 at 6:10:06 PM
You can control an execution context in a superior manner than a rando MCP server.MCP Security 2026: 30 CVEs in 60 Days - https://news.ycombinator.com/item?id=47356600 - March 2026
(securing this use case is a component of my work in a regulated industry and enterprise)
by toomuchtodo
3/16/2026 at 6:35:03 PM
I think big companies already protect against random commands causing damage. Work laptops are tightly controlled for both networking and software.by newswasboring
3/16/2026 at 6:30:58 PM
Shameless plug: im working on a product that aims to solve this: https://www.gatana.ai/by thecopy
3/16/2026 at 6:09:34 PM
Isn’t it possible to proxy LLM communication and strip out unwanted MCP tool calls from conversations? I mean if you’re going to ban MCPs, you’re probably banning any CLI tooling too, right?by mbreese
3/16/2026 at 6:15:16 PM
Maybe https://usepec.eu ?by systima
3/16/2026 at 5:36:40 PM
We only allow custom MCP servers.by yoyohello13
3/16/2026 at 5:17:08 PM
> I feel like the anti-MCP push is coming from people who don't need to work in a large org.Any kind of social push like that is always understood to be something to ignore if you understand why you need to ignore it. Do you agree that a typical solo dev caught in the MCP hype should run the other way, even if it is beneficial to your unique situation?
by 9rx
3/16/2026 at 5:40:07 PM
Id agree solo devs can lean toward skills. I liken skills to a sort of bash scripts directory. And for personal stuff I generally use skills only.by yoyohello13
3/16/2026 at 6:56:18 PM
> I'm getting tired of everyone saying "MCP is dead, use CLIs!".The people saying this and attacking it should first agree about the question.
Are you combining a few tools in the training set into a logical unit to make a cohesive tool-suite, say for reverse engineering or network-debugging? Low stakes for errors, not much on-going development? Great, you just need a thin layer of intelligence on top of stack-overflow and blog-posts, and CLI will probably do it.
Are you trying to weld together basically an AI front-end for an existing internal library or service? Is it something complex enough that you need to scale out and have modular access to? Is it already something you need to deploy/develop/test independently? Oops, there's nothing quite like that in the training set, and you probably want some guarantees. You need a schema, obviously. You can sort of jam that into prompts and prayers, hope for the best with skills, skip validation and risk annotations being ignored, trust that future opaque model-change will be backwards compatible with how skills are even selected/dispatched. Or.. you can use MCP.
Advocating really hard for one or the other in general is just kind of naive.
by robot-wrangler
3/16/2026 at 4:22:44 PM
Skills are just prompts, so policy doesn't apply there. MCP isn't giving you any special policy control there, it's just a capability border. You could do the same thing with a service mesh or any other capability compartmentalization technique.The only value in MCP is that it's intended "for agents" and it has traction.
by CuriouslyC
3/16/2026 at 4:27:58 PM
> Yes, MCP eats up context windows, but agents can also be smarter about how they load the MCP context in the first place, using similar strategy to skills.I have been keeping an eye on MCP context usage with Claude Code's /context command.
When I ran it a couple months ago, supabase used 13.2k tokens all the time, with the search_docs tool using 8k! So, I disabled that tool in my config.
I just ran /context now, and when not being used it uses only ~300 tokens.
I have a question. Does anyone know a good way to benchmark actual MCP context usage in Claude Code now? I just tried a few different things and none of them worked.
by consumer451
3/16/2026 at 4:08:58 PM
Towards the end of the article, they do write about some things that MCP does better.by skybrian
3/16/2026 at 4:17:06 PM
Tool search pretty much completely negates the MCP context window argument.by il
3/16/2026 at 7:45:57 PM
Evidence?by siva7
3/16/2026 at 4:06:36 PM
I agree, and it's context-dependent when to use what (the author mentions use cases for other solutions). I'm glad there are multiple solutions to choose from.by mvrckhckr
3/16/2026 at 6:50:36 PM
This is the right framing. The chain policy problem is what happens when you ask the registry to be the entitlement layer.Here's a longer piece on why the trust boundary has to live at the runtime level, not the interface level, and what that means for MCP's actual job: https://forestmars.substack.com/p/twilight-of-the-mcp-idols
by polynomial
3/16/2026 at 3:57:13 PM
MCPs are handy in their place. Agents calling CLI locally is much more efficient.by j45
3/16/2026 at 4:10:18 PM
[dead]by amzil