Discussion about this post

User's avatar
Claudio Francesconi's avatar

I like the point of view. I am actually more interested in consequences about art.

Jason K's avatar

If only it were that tidy.

These are all RAG. Every one of them. Embedding search and retrieval doesn’t define RAG, it’s just one example of it.

MCP use exposes you to EchoLeak style compromises with no ability to even know it happened. If you don’t have a dedicated MCP security agent between your agents and third party MCP’s you might as well just resign now.

A practically useful comparison would be between MCP, Legacy Tool Calling, and Semantic Routing.

This is “I want to pretend ai know”

No posts

Ready for more?