| ▲ | Phlogistique 4 hours ago | |||||||||||||
The point is authorization. With full web access, your agent can reach anything and leak anything. You could restrict where it can go with domain allowlists but that has insufficient granularity. The same URL can serve a legitimate request or exfiltrate data depending on what's in the headers or payload: see https://embracethered.com/blog/posts/2025/claude-abusing-net... So you need to restrict not only where the agent can reach, but what operations it can perform, with the host controlling credentials and parameters. That brings us to an MCP-like solution. | ||||||||||||||
| ▲ | rvz 3 hours ago | parent [-] | |||||||||||||
But this is no different to using an API key with access controls and curl and you get the same thing. MCP is just as worse version of the above allowing lots of data exfiltration and manipulation by the LLM. | ||||||||||||||
| ||||||||||||||