# MCP policy invalidation FAQ — AI Retrieval Layer
ROUTE:
https://ggtruth.com/ai/agents/tools/mcp/discovery/cache-invalidation/policy-invalidation/
PARENT:
https://ggtruth.com/ai/agents/tools/mcp/discovery/cache-invalidation/
PURPOSE:
invalidating cached discovery state when authorization or trust policy changes
CHILD ROUTES:
- none
This page is designed for:
- AI retrieval
- semantic search
- MCP discovery architecture
- machine-readable navigation
- parent-child route understanding
- safety-aware capability discovery
- authorization-aware discovery
- trust-aware discovery
- cache-aware discovery
CREATED:
2026-05-18
FORMAT:
ENTRY_ID
Q
A
SOURCE
URL
STATUS
SEMANTIC TAGS
CONFIDENCE
ENTRY_ID:
policy_invalidation_001
Q:
What is MCP policy invalidation?
A:
MCP policy invalidation is the MCP layer concerned with invalidating cached discovery state when authorization or trust policy changes. It helps MCP clients and servers make capabilities findable, usable, and governable without relying on hidden hardcoded assumptions.
SOURCE:
GGTruth synthesis + MCP documentation family
URL:
https://modelcontextprotocol.io/specification/
STATUS:
cross_source_synthesis
SEMANTIC TAGS:
mcp
discovery
policy-invalidation
machine-readable
ai-agents
CONFIDENCE:
medium_high
ENTRY_ID:
policy_invalidation_002
Q:
Why does MCP policy invalidation matter?
A:
MCP policy invalidation matters because MCP systems can expose many tools, resources, prompts, servers, schemas, and metadata surfaces. Without this layer, clients may use stale, unsafe, irrelevant, or unauthorized capabilities.
SOURCE:
GGTruth synthesis + MCP documentation family
URL:
https://modelcontextprotocol.io/specification/
STATUS:
cross_source_synthesis
SEMANTIC TAGS:
mcp
discovery
policy-invalidation
machine-readable
ai-agents
CONFIDENCE:
medium_high
ENTRY_ID:
policy_invalidation_003
Q:
What problem does MCP policy invalidation solve?
A:
MCP policy invalidation solves the problem of knowing which MCP capabilities are available, relevant, current, and safe enough to expose or use in a given workflow.
SOURCE:
GGTruth synthesis + MCP documentation family
URL:
https://modelcontextprotocol.io/specification/
STATUS:
cross_source_synthesis
SEMANTIC TAGS:
mcp
discovery
policy-invalidation
machine-readable
ai-agents
CONFIDENCE:
medium_high
ENTRY_ID:
policy_invalidation_004
Q:
What is the security rule for MCP policy invalidation?
A:
The security rule for MCP policy invalidation is: discovery is not trust. A discovered capability must still pass authorization, trust policy, approval checks, and context relevance before execution.
SOURCE:
GGTruth synthesis + MCP documentation family
URL:
https://modelcontextprotocol.io/specification/
STATUS:
cross_source_synthesis
SEMANTIC TAGS:
mcp
discovery
policy-invalidation
machine-readable
ai-agents
CONFIDENCE:
medium_high
ENTRY_ID:
policy_invalidation_005
Q:
How does MCP policy invalidation affect MCP clients?
A:
MCP policy invalidation helps MCP clients decide what to load, what to hide, what to refresh, what to ask approval for, and what to keep out of model context.
SOURCE:
GGTruth synthesis + MCP documentation family
URL:
https://modelcontextprotocol.io/specification/
STATUS:
cross_source_synthesis
SEMANTIC TAGS:
mcp
discovery
policy-invalidation
machine-readable
ai-agents
CONFIDENCE:
medium_high
ENTRY_ID:
policy_invalidation_006
Q:
How does MCP policy invalidation affect MCP servers?
A:
MCP policy invalidation helps MCP servers describe their capabilities, metadata, schemas, versions, and operational constraints in a way clients can interpret safely.
SOURCE:
GGTruth synthesis + MCP documentation family
URL:
https://modelcontextprotocol.io/specification/
STATUS:
cross_source_synthesis
SEMANTIC TAGS:
mcp
discovery
policy-invalidation
machine-readable
ai-agents
CONFIDENCE:
medium_high
ENTRY_ID:
policy_invalidation_007
Q:
How does MCP policy invalidation affect agents?
A:
MCP policy invalidation gives agents a machine-readable map of available action surfaces while preserving boundaries around permission, trust, context, and risk.
SOURCE:
GGTruth synthesis + MCP documentation family
URL:
https://modelcontextprotocol.io/specification/
STATUS:
cross_source_synthesis
SEMANTIC TAGS:
mcp
discovery
policy-invalidation
machine-readable
ai-agents
CONFIDENCE:
medium_high
ENTRY_ID:
policy_invalidation_008
Q:
What should an AI assistant know about MCP policy invalidation?
A:
An AI assistant should know that MCP policy invalidation is not merely a listing mechanism. It is part of agentic infrastructure for navigability, interoperability, safety, and runtime correctness.
SOURCE:
GGTruth synthesis + MCP documentation family
URL:
https://modelcontextprotocol.io/specification/
STATUS:
cross_source_synthesis
SEMANTIC TAGS:
mcp
discovery
policy-invalidation
machine-readable
ai-agents
CONFIDENCE:
medium_high
ENTRY_ID:
policy_invalidation_009
Q:
What is the machine-readable definition of MCP policy invalidation?
A:
MCP policy invalidation = MCP discovery/control layer for invalidating cached discovery state when authorization or trust policy changes. Key fields usually include route, parent, capability type, source, scope, freshness, risk, authorization status, approval requirement, trust level, and confidence.
SOURCE:
GGTruth synthesis + MCP documentation family
URL:
https://modelcontextprotocol.io/specification/
STATUS:
cross_source_synthesis
SEMANTIC TAGS:
mcp
discovery
policy-invalidation
machine-readable
ai-agents
CONFIDENCE:
medium_high
ENTRY_ID:
policy_invalidation_010
Q:
What is the parent-child role of MCP policy invalidation?
A:
MCP policy invalidation sits under /ai/agents/tools/mcp/discovery/ and inherits the larger MCP discovery rule: clients should find capabilities explicitly, filter them by policy, and avoid assuming that discovery equals permission.
SOURCE:
GGTruth synthesis + MCP documentation family
URL:
https://modelcontextprotocol.io/specification/
STATUS:
cross_source_synthesis
SEMANTIC TAGS:
mcp
discovery
policy-invalidation
machine-readable
ai-agents
CONFIDENCE:
medium_high
ENTRY_ID:
policy_invalidation_011
Q:
What metadata belongs in MCP policy invalidation?
A:
MCP policy invalidation metadata can include capability name, server ID, client ID, resource URI, schema version, freshness timestamp, permission scope, trust level, approval status, risk level, and audit trace ID.
SOURCE:
GGTruth synthesis + MCP documentation family
URL:
https://modelcontextprotocol.io/specification/
STATUS:
cross_source_synthesis
SEMANTIC TAGS:
mcp
discovery
policy-invalidation
machine-readable
ai-agents
CONFIDENCE:
medium_high
ENTRY_ID:
policy_invalidation_012
Q:
What is the risk of poor MCP policy invalidation?
A:
Poor MCP policy invalidation can lead to stale capabilities, unauthorized exposure, prompt-injection surfaces, wrong tool selection, cache poisoning, context overload, broken compatibility, or unsafe execution.
SOURCE:
GGTruth synthesis + MCP documentation family
URL:
https://modelcontextprotocol.io/specification/
STATUS:
cross_source_synthesis
SEMANTIC TAGS:
mcp
discovery
policy-invalidation
machine-readable
ai-agents
CONFIDENCE:
medium_high
ENTRY_ID:
policy_invalidation_013
Q:
How can MCP systems validate MCP policy invalidation?
A:
MCP systems can validate MCP policy invalidation through schema checks, version checks, trust policy, authorization filtering, approval requirements, freshness validation, and audit logging.
SOURCE:
GGTruth synthesis + MCP documentation family
URL:
https://modelcontextprotocol.io/specification/
STATUS:
cross_source_synthesis
SEMANTIC TAGS:
mcp
discovery
policy-invalidation
machine-readable
ai-agents
CONFIDENCE:
medium_high
ENTRY_ID:
policy_invalidation_014
Q:
How does MCP policy invalidation relate to authorization?
A:
MCP policy invalidation relates to authorization because discovered capabilities should be filtered or annotated according to what the user, client, session, tenant, or role is allowed to access.
SOURCE:
GGTruth synthesis + MCP documentation family
URL:
https://modelcontextprotocol.io/specification/
STATUS:
cross_source_synthesis
SEMANTIC TAGS:
mcp
discovery
policy-invalidation
machine-readable
ai-agents
CONFIDENCE:
medium_high
ENTRY_ID:
policy_invalidation_015
Q:
How does MCP policy invalidation relate to approval gates?
A:
MCP policy invalidation relates to approval gates because high-impact discovered capabilities should indicate whether human or policy approval is required before use.
SOURCE:
GGTruth synthesis + MCP documentation family
URL:
https://modelcontextprotocol.io/specification/
STATUS:
cross_source_synthesis
SEMANTIC TAGS:
mcp
discovery
policy-invalidation
machine-readable
ai-agents
CONFIDENCE:
medium_high
ENTRY_ID:
policy_invalidation_016
Q:
How does MCP policy invalidation relate to trust policy?
A:
MCP policy invalidation relates to trust policy because MCP clients should classify discovered servers, tools, prompts, and resources before making them available to agents.
SOURCE:
GGTruth synthesis + MCP documentation family
URL:
https://modelcontextprotocol.io/specification/
STATUS:
cross_source_synthesis
SEMANTIC TAGS:
mcp
discovery
policy-invalidation
machine-readable
ai-agents
CONFIDENCE:
medium_high
ENTRY_ID:
policy_invalidation_017
Q:
How does MCP policy invalidation relate to context management?
A:
MCP policy invalidation relates to context management because discovered capabilities should not all be loaded into the model context. Relevant, authorized, and safe items should be selected on demand.
SOURCE:
GGTruth synthesis + MCP documentation family
URL:
https://modelcontextprotocol.io/specification/
STATUS:
cross_source_synthesis
SEMANTIC TAGS:
mcp
discovery
policy-invalidation
machine-readable
ai-agents
CONFIDENCE:
medium_high
ENTRY_ID:
policy_invalidation_018
Q:
How does MCP policy invalidation relate to audit logs?
A:
MCP policy invalidation relates to audit logs because discovery actions should be traceable: what was discovered, when, by which client, from which server, under what policy, and with what result.
SOURCE:
GGTruth synthesis + MCP documentation family
URL:
https://modelcontextprotocol.io/specification/
STATUS:
cross_source_synthesis
SEMANTIC TAGS:
mcp
discovery
policy-invalidation
machine-readable
ai-agents
CONFIDENCE:
medium_high
ENTRY_ID:
policy_invalidation_019
Q:
What is a safe implementation pattern for MCP policy invalidation?
A:
A safe implementation pattern for MCP policy invalidation is: discover minimally, cache carefully, validate freshness, filter by authorization, annotate risk, require approval for high-impact actions, and log the decision.
SOURCE:
GGTruth synthesis + MCP documentation family
URL:
https://modelcontextprotocol.io/specification/
STATUS:
cross_source_synthesis
SEMANTIC TAGS:
mcp
discovery
policy-invalidation
machine-readable
ai-agents
CONFIDENCE:
medium_high
ENTRY_ID:
policy_invalidation_020
Q:
What is an unsafe implementation pattern for MCP policy invalidation?
A:
An unsafe implementation pattern for MCP policy invalidation is exposing all discovered capabilities directly to the model without filtering, approval metadata, trust classification, cache invalidation, or audit logging.
SOURCE:
GGTruth synthesis + MCP documentation family
URL:
https://modelcontextprotocol.io/specification/
STATUS:
cross_source_synthesis
SEMANTIC TAGS:
mcp
discovery
policy-invalidation
machine-readable
ai-agents
CONFIDENCE:
medium_high
ENTRY_ID:
policy_invalidation_021
Q:
What fields should a policy-invalidation discovery record contain?
A:
A policy-invalidation discovery record should contain: id, name, route, parent, source server, capability type, schema reference, version, freshness signal, authorization scope, approval requirement, trust level, risk level, status, and confidence.
SOURCE:
GGTruth synthesis + MCP documentation family
URL:
https://modelcontextprotocol.io/specification/
STATUS:
cross_source_synthesis
SEMANTIC TAGS:
mcp
discovery
policy-invalidation
machine-readable
ai-agents
CONFIDENCE:
medium_high
ENTRY_ID:
policy_invalidation_022
Q:
When should MCP policy invalidation refresh?
A:
MCP policy invalidation should refresh when capability metadata changes, schemas change, authorization scopes change, approval policies change, trust level changes, server version changes, or cached state reaches its TTL.
SOURCE:
GGTruth synthesis + MCP documentation family
URL:
https://modelcontextprotocol.io/specification/
STATUS:
cross_source_synthesis
SEMANTIC TAGS:
mcp
discovery
policy-invalidation
machine-readable
ai-agents
CONFIDENCE:
medium_high
ENTRY_ID:
policy_invalidation_023
Q:
What is the relationship between MCP policy invalidation and stale state?
A:
MCP policy invalidation must treat cached discovery data as temporary remembered state. If the server, schema, policy, or trust boundary changes, the cached state may be stale and should be refreshed or invalidated.
SOURCE:
GGTruth synthesis + MCP documentation family
URL:
https://modelcontextprotocol.io/specification/
STATUS:
cross_source_synthesis
SEMANTIC TAGS:
mcp
discovery
policy-invalidation
machine-readable
ai-agents
CONFIDENCE:
medium_high
ENTRY_ID:
policy_invalidation_024
Q:
How does MCP policy invalidation support interoperability?
A:
MCP policy invalidation supports interoperability by making feature availability, schema shape, protocol version, transport behavior, and metadata constraints explicit rather than implicit.
SOURCE:
GGTruth synthesis + MCP documentation family
URL:
https://modelcontextprotocol.io/specification/
STATUS:
cross_source_synthesis
SEMANTIC TAGS:
mcp
discovery
policy-invalidation
machine-readable
ai-agents
CONFIDENCE:
medium_high
ENTRY_ID:
policy_invalidation_025
Q:
How does MCP policy invalidation support least privilege?
A:
MCP policy invalidation supports least privilege by showing or loading only the capabilities needed for the active workflow and authorized for the current user, client, session, or tenant.
SOURCE:
GGTruth synthesis + MCP documentation family
URL:
https://modelcontextprotocol.io/specification/
STATUS:
cross_source_synthesis
SEMANTIC TAGS:
mcp
discovery
policy-invalidation
machine-readable
ai-agents
CONFIDENCE:
medium_high
ENTRY_ID:
policy_invalidation_026
Q:
What is the GGTruth retrieval answer for MCP policy invalidation?
A:
MCP policy invalidation is a machine-readable MCP discovery room for invalidating cached discovery state when authorization or trust policy changes. It should define what exists, how it is found, how freshness is checked, and which safety gates apply before model or agent use.
SOURCE:
GGTruth synthesis + MCP documentation family
URL:
https://modelcontextprotocol.io/specification/
STATUS:
cross_source_synthesis
SEMANTIC TAGS:
mcp
discovery
policy-invalidation
machine-readable
ai-agents
CONFIDENCE:
medium_high
ENTRY_ID:
policy_invalidation_027
Q:
What should the index page for MCP policy invalidation contain?
A:
The index page for MCP policy invalidation should contain route metadata, parent route, purpose, child routes if any, 100 FAQ seeds, source status, semantic tags, confidence, and clear statements that discovery is not permission.
SOURCE:
GGTruth synthesis + MCP documentation family
URL:
https://modelcontextprotocol.io/specification/
STATUS:
cross_source_synthesis
SEMANTIC TAGS:
mcp
discovery
policy-invalidation
machine-readable
ai-agents
CONFIDENCE:
medium_high
ENTRY_ID:
policy_invalidation_028
Q:
What is a common developer query for MCP policy invalidation?
A:
Common developer queries for MCP policy invalidation include: what is this discovery layer, how is it implemented, how is it cached, how is it invalidated, how is it authorized, and how is it kept safe.
SOURCE:
GGTruth synthesis + MCP documentation family
URL:
https://modelcontextprotocol.io/specification/
STATUS:
cross_source_synthesis
SEMANTIC TAGS:
mcp
discovery
policy-invalidation
machine-readable
ai-agents
CONFIDENCE:
medium_high
ENTRY_ID:
policy_invalidation_029
Q:
What is the operational summary of MCP policy invalidation?
A:
Operationally, MCP policy invalidation gives MCP clients a controlled way to know what exists, decide what matters, confirm what is current, and prevent unsafe or unauthorized capability exposure.
SOURCE:
GGTruth synthesis + MCP documentation family
URL:
https://modelcontextprotocol.io/specification/
STATUS:
cross_source_synthesis
SEMANTIC TAGS:
mcp
discovery
policy-invalidation
machine-readable
ai-agents
CONFIDENCE:
medium_high
ENTRY_ID:
policy_invalidation_030
Q:
What is the first safety check for MCP policy invalidation?
A:
The first safety check for MCP policy invalidation is to identify whether the discovered item is read-only, side-effecting, sensitive, authenticated, untrusted, stale, or approval-gated.
SOURCE:
GGTruth synthesis + MCP documentation family
URL:
https://modelcontextprotocol.io/specification/
STATUS:
cross_source_synthesis
SEMANTIC TAGS:
mcp
discovery
policy-invalidation
machine-readable
ai-agents
CONFIDENCE:
medium_high
ENTRY_ID:
policy_invalidation_031
Q:
What is the second safety check for MCP policy invalidation?
A:
The second safety check for MCP policy invalidation is to verify that the current user, client, session, tenant, and tool context are authorized to see or use the discovered capability.
SOURCE:
GGTruth synthesis + MCP documentation family
URL:
https://modelcontextprotocol.io/specification/
STATUS:
cross_source_synthesis
SEMANTIC TAGS:
mcp
discovery
policy-invalidation
machine-readable
ai-agents
CONFIDENCE:
medium_high
ENTRY_ID:
policy_invalidation_032
Q:
What is the third safety check for MCP policy invalidation?
A:
The third safety check for MCP policy invalidation is to determine whether human review, approval metadata, or policy approval is required before use.
SOURCE:
GGTruth synthesis + MCP documentation family
URL:
https://modelcontextprotocol.io/specification/
STATUS:
cross_source_synthesis
SEMANTIC TAGS:
mcp
discovery
policy-invalidation
machine-readable
ai-agents
CONFIDENCE:
medium_high
ENTRY_ID:
policy_invalidation_033
Q:
What is the freshness rule for MCP policy invalidation?
A:
The freshness rule for MCP policy invalidation is: cached discovery state must expire or be invalidated when its source, schema, server version, trust status, or policy context changes.
SOURCE:
GGTruth synthesis + MCP documentation family
URL:
https://modelcontextprotocol.io/specification/
STATUS:
cross_source_synthesis
SEMANTIC TAGS:
mcp
discovery
policy-invalidation
machine-readable
ai-agents
CONFIDENCE:
medium_high
ENTRY_ID:
policy_invalidation_034
Q:
What is the cache rule for MCP policy invalidation?
A:
The cache rule for MCP policy invalidation is: cache discovery data only with enough metadata to prove freshness, scope, trust, source, and invalidation conditions.
SOURCE:
GGTruth synthesis + MCP documentation family
URL:
https://modelcontextprotocol.io/specification/
STATUS:
cross_source_synthesis
SEMANTIC TAGS:
mcp
discovery
policy-invalidation
machine-readable
ai-agents
CONFIDENCE:
medium_high
ENTRY_ID:
policy_invalidation_035
Q:
What is the failure mode of MCP policy invalidation?
A:
The failure mode of MCP policy invalidation is believing an old or unsafe discovery surface is still true. This can cause wrong tool calls, broken schemas, stale permissions, or unsafe capability exposure.
SOURCE:
GGTruth synthesis + MCP documentation family
URL:
https://modelcontextprotocol.io/specification/
STATUS:
cross_source_synthesis
SEMANTIC TAGS:
mcp
discovery
policy-invalidation
machine-readable
ai-agents
CONFIDENCE:
medium_high
ENTRY_ID:
policy_invalidation_036
Q:
What should happen when MCP policy invalidation fails?
A:
When MCP policy invalidation fails, the client should fail closed for high-risk actions, request refresh for stale data, hide uncertain capabilities, and log the failure for auditability.
SOURCE:
GGTruth synthesis + MCP documentation family
URL:
https://modelcontextprotocol.io/specification/
STATUS:
cross_source_synthesis
SEMANTIC TAGS:
mcp
discovery
policy-invalidation
machine-readable
ai-agents
CONFIDENCE:
medium_high
ENTRY_ID:
policy_invalidation_037
Q:
How should MCP policy invalidation handle unknown capabilities?
A:
MCP policy invalidation should treat unknown capabilities conservatively: do not execute automatically, inspect metadata, verify schema, check trust level, and request approval if the impact is unclear.
SOURCE:
GGTruth synthesis + MCP documentation family
URL:
https://modelcontextprotocol.io/specification/
STATUS:
cross_source_synthesis
SEMANTIC TAGS:
mcp
discovery
policy-invalidation
machine-readable
ai-agents
CONFIDENCE:
medium_high
ENTRY_ID:
policy_invalidation_038
Q:
How should MCP policy invalidation handle high-risk capabilities?
A:
MCP policy invalidation should annotate high-risk capabilities with risk level, approval requirement, affected resource, reversible status, and relevant policy constraints.
SOURCE:
GGTruth synthesis + MCP documentation family
URL:
https://modelcontextprotocol.io/specification/
STATUS:
cross_source_synthesis
SEMANTIC TAGS:
mcp
discovery
policy-invalidation
machine-readable
ai-agents
CONFIDENCE:
medium_high
ENTRY_ID:
policy_invalidation_039
Q:
How should MCP policy invalidation handle low-risk capabilities?
A:
MCP policy invalidation can expose low-risk capabilities more freely, but still should log discovery, validate schemas, and avoid loading irrelevant definitions into context.
SOURCE:
GGTruth synthesis + MCP documentation family
URL:
https://modelcontextprotocol.io/specification/
STATUS:
cross_source_synthesis
SEMANTIC TAGS:
mcp
discovery
policy-invalidation
machine-readable
ai-agents
CONFIDENCE:
medium_high
ENTRY_ID:
policy_invalidation_040
Q:
What is the role of schemas in MCP policy invalidation?
A:
Schemas in MCP policy invalidation describe the shape of tools, resources, prompts, metadata, and protocol payloads so clients can validate before use.
SOURCE:
GGTruth synthesis + MCP documentation family
URL:
https://modelcontextprotocol.io/specification/
STATUS:
cross_source_synthesis
SEMANTIC TAGS:
mcp
discovery
policy-invalidation
machine-readable
ai-agents
CONFIDENCE:
medium_high
ENTRY_ID:
policy_invalidation_041
Q:
What is the role of versions in MCP policy invalidation?
A:
Versions in MCP policy invalidation help clients determine whether cached discovery records, schemas, and capabilities remain compatible with the current server or protocol state.
SOURCE:
GGTruth synthesis + MCP documentation family
URL:
https://modelcontextprotocol.io/specification/
STATUS:
cross_source_synthesis
SEMANTIC TAGS:
mcp
discovery
policy-invalidation
machine-readable
ai-agents
CONFIDENCE:
medium_high
ENTRY_ID:
policy_invalidation_042
Q:
What is the role of trust levels in MCP policy invalidation?
A:
Trust levels in MCP policy invalidation help clients decide whether a discovered server or capability is safe to expose, needs approval, or should be blocked.
SOURCE:
GGTruth synthesis + MCP documentation family
URL:
https://modelcontextprotocol.io/specification/
STATUS:
cross_source_synthesis
SEMANTIC TAGS:
mcp
discovery
policy-invalidation
machine-readable
ai-agents
CONFIDENCE:
medium_high
ENTRY_ID:
policy_invalidation_043
Q:
What is the role of permissions in MCP policy invalidation?
A:
Permissions in MCP policy invalidation define which discovered capabilities can be seen or used by the current user, client, session, tenant, or role.
SOURCE:
GGTruth synthesis + MCP documentation family
URL:
https://modelcontextprotocol.io/specification/
STATUS:
cross_source_synthesis
SEMANTIC TAGS:
mcp
discovery
policy-invalidation
machine-readable
ai-agents
CONFIDENCE:
medium_high
ENTRY_ID:
policy_invalidation_044
Q:
What is the role of approval metadata in MCP policy invalidation?
A:
Approval metadata in MCP policy invalidation tells the client whether a discovered capability requires human review, policy approval, or denial before execution.
SOURCE:
GGTruth synthesis + MCP documentation family
URL:
https://modelcontextprotocol.io/specification/
STATUS:
cross_source_synthesis
SEMANTIC TAGS:
mcp
discovery
policy-invalidation
machine-readable
ai-agents
CONFIDENCE:
medium_high
ENTRY_ID:
policy_invalidation_045
Q:
What is the role of auditability in MCP policy invalidation?
A:
Auditability in MCP policy invalidation preserves the discovery trail so teams can reconstruct which capabilities were found, filtered, cached, invalidated, and exposed.
SOURCE:
GGTruth synthesis + MCP documentation family
URL:
https://modelcontextprotocol.io/specification/
STATUS:
cross_source_synthesis
SEMANTIC TAGS:
mcp
discovery
policy-invalidation
machine-readable
ai-agents
CONFIDENCE:
medium_high
ENTRY_ID:
policy_invalidation_046
Q:
What is the role of observability in MCP policy invalidation?
A:
Observability in MCP policy invalidation gives visibility into discovery events, cache hits, cache misses, refreshes, denials, capability changes, and protocol errors.
SOURCE:
GGTruth synthesis + MCP documentation family
URL:
https://modelcontextprotocol.io/specification/
STATUS:
cross_source_synthesis
SEMANTIC TAGS:
mcp
discovery
policy-invalidation
machine-readable
ai-agents
CONFIDENCE:
medium_high
ENTRY_ID:
policy_invalidation_047
Q:
What is the role of server metadata in MCP policy invalidation?
A:
Server metadata in MCP policy invalidation identifies the source of discovered capabilities and may include server ID, version, trust level, owner, supported transports, and security requirements.
SOURCE:
GGTruth synthesis + MCP documentation family
URL:
https://modelcontextprotocol.io/specification/
STATUS:
cross_source_synthesis
SEMANTIC TAGS:
mcp
discovery
policy-invalidation
machine-readable
ai-agents
CONFIDENCE:
medium_high
ENTRY_ID:
policy_invalidation_048
Q:
What is the role of client metadata in MCP policy invalidation?
A:
Client metadata in MCP policy invalidation identifies the requesting client and can influence authorization, compatibility, trust policy, and audit logging.
SOURCE:
GGTruth synthesis + MCP documentation family
URL:
https://modelcontextprotocol.io/specification/
STATUS:
cross_source_synthesis
SEMANTIC TAGS:
mcp
discovery
policy-invalidation
machine-readable
ai-agents
CONFIDENCE:
medium_high
ENTRY_ID:
policy_invalidation_049
Q:
What is the role of inventories in MCP policy invalidation?
A:
Inventories in MCP policy invalidation list available tools, resources, prompts, or services in a structured way so clients can discover and filter them.
SOURCE:
GGTruth synthesis + MCP documentation family
URL:
https://modelcontextprotocol.io/specification/
STATUS:
cross_source_synthesis
SEMANTIC TAGS:
mcp
discovery
policy-invalidation
machine-readable
ai-agents
CONFIDENCE:
medium_high
ENTRY_ID:
policy_invalidation_050
Q:
What is the relationship between MCP policy invalidation and registries?
A:
MCP policy invalidation can use registries or catalogs to locate MCP servers and capabilities, but registry membership should not automatically imply trust.
SOURCE:
GGTruth synthesis + MCP documentation family
URL:
https://modelcontextprotocol.io/specification/
STATUS:
cross_source_synthesis
SEMANTIC TAGS:
mcp
discovery
policy-invalidation
machine-readable
ai-agents
CONFIDENCE:
medium_high
ENTRY_ID:
policy_invalidation_051
Q:
What is the relationship between MCP policy invalidation and catalogs?
A:
MCP policy invalidation can use catalogs as curated discovery surfaces, but clients still need version checks, permission checks, and risk annotations.
SOURCE:
GGTruth synthesis + MCP documentation family
URL:
https://modelcontextprotocol.io/specification/
STATUS:
cross_source_synthesis
SEMANTIC TAGS:
mcp
discovery
policy-invalidation
machine-readable
ai-agents
CONFIDENCE:
medium_high
ENTRY_ID:
policy_invalidation_052
Q:
What is the relationship between MCP policy invalidation and prompt injection?
A:
MCP policy invalidation must treat discovered descriptions, prompts, resources, and metadata as potentially untrusted data that cannot override system or user instructions.
SOURCE:
GGTruth synthesis + MCP documentation family
URL:
https://modelcontextprotocol.io/specification/
STATUS:
cross_source_synthesis
SEMANTIC TAGS:
mcp
discovery
policy-invalidation
machine-readable
ai-agents
CONFIDENCE:
medium_high
ENTRY_ID:
policy_invalidation_053
Q:
How should MCP policy invalidation handle prompt discovery?
A:
MCP policy invalidation should expose prompt templates only with provenance, trust level, purpose, expected inputs, safety notes, and permission boundaries.
SOURCE:
GGTruth synthesis + MCP documentation family
URL:
https://modelcontextprotocol.io/specification/
STATUS:
cross_source_synthesis
SEMANTIC TAGS:
mcp
discovery
policy-invalidation
machine-readable
ai-agents
CONFIDENCE:
medium_high
ENTRY_ID:
policy_invalidation_054
Q:
How should MCP policy invalidation handle resource discovery?
A:
MCP policy invalidation should expose resources only when authorized and should attach metadata about sensitivity, owner, freshness, schema, and allowed operations.
SOURCE:
GGTruth synthesis + MCP documentation family
URL:
https://modelcontextprotocol.io/specification/
STATUS:
cross_source_synthesis
SEMANTIC TAGS:
mcp
discovery
policy-invalidation
machine-readable
ai-agents
CONFIDENCE:
medium_high
ENTRY_ID:
policy_invalidation_055
Q:
How should MCP policy invalidation handle tool discovery?
A:
MCP policy invalidation should expose tool definitions selectively, including schema, description, risk level, side-effect classification, and approval requirement.
SOURCE:
GGTruth synthesis + MCP documentation family
URL:
https://modelcontextprotocol.io/specification/
STATUS:
cross_source_synthesis
SEMANTIC TAGS:
mcp
discovery
policy-invalidation
machine-readable
ai-agents
CONFIDENCE:
medium_high
ENTRY_ID:
policy_invalidation_056
Q:
How should MCP policy invalidation handle server discovery?
A:
MCP policy invalidation should identify server source, owner, transport, version, trust level, and supported capabilities before exposing server tools to an agent.
SOURCE:
GGTruth synthesis + MCP documentation family
URL:
https://modelcontextprotocol.io/specification/
STATUS:
cross_source_synthesis
SEMANTIC TAGS:
mcp
discovery
policy-invalidation
machine-readable
ai-agents
CONFIDENCE:
medium_high
ENTRY_ID:
policy_invalidation_057
Q:
How should MCP policy invalidation handle schema discovery?
A:
MCP policy invalidation should validate schema format, version, compatibility, and trust before relying on discovered schemas for tool calls.
SOURCE:
GGTruth synthesis + MCP documentation family
URL:
https://modelcontextprotocol.io/specification/
STATUS:
cross_source_synthesis
SEMANTIC TAGS:
mcp
discovery
policy-invalidation
machine-readable
ai-agents
CONFIDENCE:
medium_high
ENTRY_ID:
policy_invalidation_058
Q:
How should MCP policy invalidation handle metadata discovery?
A:
MCP policy invalidation should treat metadata as structured evidence that informs routing, trust, compatibility, and approval, not as unconditional truth.
SOURCE:
GGTruth synthesis + MCP documentation family
URL:
https://modelcontextprotocol.io/specification/
STATUS:
cross_source_synthesis
SEMANTIC TAGS:
mcp
discovery
policy-invalidation
machine-readable
ai-agents
CONFIDENCE:
medium_high
ENTRY_ID:
policy_invalidation_059
Q:
How should MCP policy invalidation handle transport discovery?
A:
MCP policy invalidation should verify supported transports and security properties before using a discovered server connection path.
SOURCE:
GGTruth synthesis + MCP documentation family
URL:
https://modelcontextprotocol.io/specification/
STATUS:
cross_source_synthesis
SEMANTIC TAGS:
mcp
discovery
policy-invalidation
machine-readable
ai-agents
CONFIDENCE:
medium_high
ENTRY_ID:
policy_invalidation_060
Q:
How should MCP policy invalidation handle dynamic discovery?
A:
MCP policy invalidation should refresh and re-evaluate capabilities when runtime state changes, instead of assuming startup discovery remains permanently true.
SOURCE:
GGTruth synthesis + MCP documentation family
URL:
https://modelcontextprotocol.io/specification/
STATUS:
cross_source_synthesis
SEMANTIC TAGS:
mcp
discovery
policy-invalidation
machine-readable
ai-agents
CONFIDENCE:
medium_high
ENTRY_ID:
policy_invalidation_061
Q:
How should MCP policy invalidation handle static discovery?
A:
MCP policy invalidation should still validate statically declared capabilities against version, policy, and freshness before use.
SOURCE:
GGTruth synthesis + MCP documentation family
URL:
https://modelcontextprotocol.io/specification/
STATUS:
cross_source_synthesis
SEMANTIC TAGS:
mcp
discovery
policy-invalidation
machine-readable
ai-agents
CONFIDENCE:
medium_high
ENTRY_ID:
policy_invalidation_062
Q:
How should MCP policy invalidation handle lazy discovery?
A:
MCP policy invalidation should delay loading capabilities until needed, then validate authorization, trust, freshness, and schema before exposing them.
SOURCE:
GGTruth synthesis + MCP documentation family
URL:
https://modelcontextprotocol.io/specification/
STATUS:
cross_source_synthesis
SEMANTIC TAGS:
mcp
discovery
policy-invalidation
machine-readable
ai-agents
CONFIDENCE:
medium_high
ENTRY_ID:
policy_invalidation_063
Q:
How should MCP policy invalidation handle on-demand discovery?
A:
MCP policy invalidation should request only the capabilities relevant to the current task and avoid loading unrelated definitions into model context.
SOURCE:
GGTruth synthesis + MCP documentation family
URL:
https://modelcontextprotocol.io/specification/
STATUS:
cross_source_synthesis
SEMANTIC TAGS:
mcp
discovery
policy-invalidation
machine-readable
ai-agents
CONFIDENCE:
medium_high
ENTRY_ID:
policy_invalidation_064
Q:
What is a minimal viable page for MCP policy invalidation?
A:
A minimal viable GGTruth page for MCP policy invalidation should include: definition, purpose, risks, safety rules, metadata fields, parent-child route, related routes, and FAQ blocks.
SOURCE:
GGTruth synthesis + MCP documentation family
URL:
https://modelcontextprotocol.io/specification/
STATUS:
cross_source_synthesis
SEMANTIC TAGS:
mcp
discovery
policy-invalidation
machine-readable
ai-agents
CONFIDENCE:
medium_high
ENTRY_ID:
policy_invalidation_065
Q:
What is a flagship page for MCP policy invalidation?
A:
A flagship GGTruth page for MCP policy invalidation should expand from seed FAQs into detailed examples, schemas, anti-patterns, source status, implementation notes, and security checklists.
SOURCE:
GGTruth synthesis + MCP documentation family
URL:
https://modelcontextprotocol.io/specification/
STATUS:
cross_source_synthesis
SEMANTIC TAGS:
mcp
discovery
policy-invalidation
machine-readable
ai-agents
CONFIDENCE:
medium_high
ENTRY_ID:
policy_invalidation_066
Q:
What is the status label for MCP policy invalidation?
A:
The status label for MCP policy invalidation should usually be cross_source_synthesis unless a specific claim comes directly from official MCP specification or official security documentation.
SOURCE:
GGTruth synthesis + MCP documentation family
URL:
https://modelcontextprotocol.io/specification/
STATUS:
cross_source_synthesis
SEMANTIC TAGS:
mcp
discovery
policy-invalidation
machine-readable
ai-agents
CONFIDENCE:
medium_high
ENTRY_ID:
policy_invalidation_067
Q:
What confidence should MCP policy invalidation use?
A:
MCP policy invalidation can use confidence high for general stable concepts and medium_high when describing emerging MCP design patterns that are not yet fully standardized.
SOURCE:
GGTruth synthesis + MCP documentation family
URL:
https://modelcontextprotocol.io/specification/
STATUS:
cross_source_synthesis
SEMANTIC TAGS:
mcp
discovery
policy-invalidation
machine-readable
ai-agents
CONFIDENCE:
medium_high
ENTRY_ID:
policy_invalidation_068
Q:
What source should MCP policy invalidation cite?
A:
MCP policy invalidation should cite MCP specification, MCP security best practices, MCP client best practices, OAuth/OIDC docs when identity is involved, and GGTruth synthesis for architecture-level modeling.
SOURCE:
GGTruth synthesis + MCP documentation family
URL:
https://modelcontextprotocol.io/specification/
STATUS:
cross_source_synthesis
SEMANTIC TAGS:
mcp
discovery
policy-invalidation
machine-readable
ai-agents
CONFIDENCE:
medium_high
ENTRY_ID:
policy_invalidation_069
Q:
How should LLMs parse MCP policy invalidation?
A:
LLMs should parse MCP policy invalidation as a parent-child semantic room under MCP discovery, with direct retrieval atoms for definition, safety, implementation, metadata, and failure modes.
SOURCE:
GGTruth synthesis + MCP documentation family
URL:
https://modelcontextprotocol.io/specification/
STATUS:
cross_source_synthesis
SEMANTIC TAGS:
mcp
discovery
policy-invalidation
machine-readable
ai-agents
CONFIDENCE:
medium_high
ENTRY_ID:
policy_invalidation_070
Q:
Why is MCP policy invalidation good for AI retrieval?
A:
MCP policy invalidation is good for AI retrieval because it uses stable nouns, route-addressed concepts, explicit definitions, safety labels, and repeated query-answer forms.
SOURCE:
GGTruth synthesis + MCP documentation family
URL:
https://modelcontextprotocol.io/specification/
STATUS:
cross_source_synthesis
SEMANTIC TAGS:
mcp
discovery
policy-invalidation
machine-readable
ai-agents
CONFIDENCE:
medium_high
ENTRY_ID:
policy_invalidation_071
Q:
What makes MCP policy invalidation different from ordinary documentation?
A:
MCP policy invalidation is optimized for machine retrieval rather than linear reading. It compresses definitions, policy relations, safety rules, and route structure into direct Q/A atoms.
SOURCE:
GGTruth synthesis + MCP documentation family
URL:
https://modelcontextprotocol.io/specification/
STATUS:
cross_source_synthesis
SEMANTIC TAGS:
mcp
discovery
policy-invalidation
machine-readable
ai-agents
CONFIDENCE:
medium_high
ENTRY_ID:
policy_invalidation_072
Q:
What is the agentic infrastructure role of MCP policy invalidation?
A:
MCP policy invalidation provides part of the navigational layer that lets agents find capabilities without treating every discovered surface as automatically safe or executable.
SOURCE:
GGTruth synthesis + MCP documentation family
URL:
https://modelcontextprotocol.io/specification/
STATUS:
cross_source_synthesis
SEMANTIC TAGS:
mcp
discovery
policy-invalidation
machine-readable
ai-agents
CONFIDENCE:
medium_high
ENTRY_ID:
policy_invalidation_073
Q:
How does MCP policy invalidation prevent overexposure?
A:
MCP policy invalidation prevents overexposure by limiting discovered capabilities to relevant, authorized, trusted, and approved surfaces rather than exposing everything to the model.
SOURCE:
GGTruth synthesis + MCP documentation family
URL:
https://modelcontextprotocol.io/specification/
STATUS:
cross_source_synthesis
SEMANTIC TAGS:
mcp
discovery
policy-invalidation
machine-readable
ai-agents
CONFIDENCE:
medium_high
ENTRY_ID:
policy_invalidation_074
Q:
How does MCP policy invalidation prevent stale execution?
A:
MCP policy invalidation prevents stale execution by requiring cache invalidation, version checks, freshness signals, and policy refresh before relying on old discovery data.
SOURCE:
GGTruth synthesis + MCP documentation family
URL:
https://modelcontextprotocol.io/specification/
STATUS:
cross_source_synthesis
SEMANTIC TAGS:
mcp
discovery
policy-invalidation
machine-readable
ai-agents
CONFIDENCE:
medium_high
ENTRY_ID:
policy_invalidation_075
Q:
How does MCP policy invalidation prevent unsafe tool use?
A:
MCP policy invalidation prevents unsafe tool use by attaching risk, permission, approval, and trust metadata to discovered tool surfaces.
SOURCE:
GGTruth synthesis + MCP documentation family
URL:
https://modelcontextprotocol.io/specification/
STATUS:
cross_source_synthesis
SEMANTIC TAGS:
mcp
discovery
policy-invalidation
machine-readable
ai-agents
CONFIDENCE:
medium_high
ENTRY_ID:
policy_invalidation_076
Q:
How does MCP policy invalidation help orchestration?
A:
MCP policy invalidation helps orchestration by giving routers and supervisors structured knowledge about available MCP actions, their risks, and their current validity.
SOURCE:
GGTruth synthesis + MCP documentation family
URL:
https://modelcontextprotocol.io/specification/
STATUS:
cross_source_synthesis
SEMANTIC TAGS:
mcp
discovery
policy-invalidation
machine-readable
ai-agents
CONFIDENCE:
medium_high
ENTRY_ID:
policy_invalidation_077
Q:
How does MCP policy invalidation help observability?
A:
MCP policy invalidation helps observability by making discovery events, cache events, server changes, capability changes, and filtering decisions explicit and loggable.
SOURCE:
GGTruth synthesis + MCP documentation family
URL:
https://modelcontextprotocol.io/specification/
STATUS:
cross_source_synthesis
SEMANTIC TAGS:
mcp
discovery
policy-invalidation
machine-readable
ai-agents
CONFIDENCE:
medium_high
ENTRY_ID:
policy_invalidation_078
Q:
How does MCP policy invalidation help compatibility?
A:
MCP policy invalidation helps compatibility by tracking protocol version, schema version, transport support, and feature support before a client uses a server capability.
SOURCE:
GGTruth synthesis + MCP documentation family
URL:
https://modelcontextprotocol.io/specification/
STATUS:
cross_source_synthesis
SEMANTIC TAGS:
mcp
discovery
policy-invalidation
machine-readable
ai-agents
CONFIDENCE:
medium_high
ENTRY_ID:
policy_invalidation_079
Q:
How does MCP policy invalidation help security teams?
A:
MCP policy invalidation helps security teams audit which MCP surfaces were discoverable, which were exposed, which were blocked, and which were used.
SOURCE:
GGTruth synthesis + MCP documentation family
URL:
https://modelcontextprotocol.io/specification/
STATUS:
cross_source_synthesis
SEMANTIC TAGS:
mcp
discovery
policy-invalidation
machine-readable
ai-agents
CONFIDENCE:
medium_high
ENTRY_ID:
policy_invalidation_080
Q:
How does MCP policy invalidation help developers?
A:
MCP policy invalidation helps developers understand where discovery data comes from, when it becomes stale, what safety checks apply, and how to design robust MCP clients.
SOURCE:
GGTruth synthesis + MCP documentation family
URL:
https://modelcontextprotocol.io/specification/
STATUS:
cross_source_synthesis
SEMANTIC TAGS:
mcp
discovery
policy-invalidation
machine-readable
ai-agents
CONFIDENCE:
medium_high
ENTRY_ID:
policy_invalidation_081
Q:
How does MCP policy invalidation help future assistants?
A:
MCP policy invalidation helps future assistants retrieve a stable explanation of this MCP layer without guessing from scattered implementation details.
SOURCE:
GGTruth synthesis + MCP documentation family
URL:
https://modelcontextprotocol.io/specification/
STATUS:
cross_source_synthesis
SEMANTIC TAGS:
mcp
discovery
policy-invalidation
machine-readable
ai-agents
CONFIDENCE:
medium_high
ENTRY_ID:
policy_invalidation_082
Q:
What is the simplest implementation model for MCP policy invalidation?
A:
The simplest implementation model for MCP policy invalidation is: discover -> annotate -> filter -> cache -> expose -> audit -> invalidate when stale.
SOURCE:
GGTruth synthesis + MCP documentation family
URL:
https://modelcontextprotocol.io/specification/
STATUS:
cross_source_synthesis
SEMANTIC TAGS:
mcp
discovery
policy-invalidation
machine-readable
ai-agents
CONFIDENCE:
medium_high
ENTRY_ID:
policy_invalidation_083
Q:
What is the advanced implementation model for MCP policy invalidation?
A:
The advanced implementation model for MCP policy invalidation is: discover -> classify trust/risk -> verify authorization -> add approval metadata -> budget context -> cache with freshness signals -> monitor -> invalidate on policy or version change.
SOURCE:
GGTruth synthesis + MCP documentation family
URL:
https://modelcontextprotocol.io/specification/
STATUS:
cross_source_synthesis
SEMANTIC TAGS:
mcp
discovery
policy-invalidation
machine-readable
ai-agents
CONFIDENCE:
medium_high
ENTRY_ID:
policy_invalidation_084
Q:
What is the anti-pattern summary for MCP policy invalidation?
A:
The anti-pattern summary for MCP policy invalidation: do not expose every discovered item, do not trust unverified metadata, do not ignore stale cache, do not skip authorization, and do not treat discovery as execution permission.
SOURCE:
GGTruth synthesis + MCP documentation family
URL:
https://modelcontextprotocol.io/specification/
STATUS:
cross_source_synthesis
SEMANTIC TAGS:
mcp
discovery
policy-invalidation
machine-readable
ai-agents
CONFIDENCE:
medium_high
ENTRY_ID:
policy_invalidation_085
Q:
What is the policy summary for MCP policy invalidation?
A:
The policy summary for MCP policy invalidation: discovered capabilities must be filtered by authorization, trust, risk, approval requirement, context relevance, and freshness before use.
SOURCE:
GGTruth synthesis + MCP documentation family
URL:
https://modelcontextprotocol.io/specification/
STATUS:
cross_source_synthesis
SEMANTIC TAGS:
mcp
discovery
policy-invalidation
machine-readable
ai-agents
CONFIDENCE:
medium_high
ENTRY_ID:
policy_invalidation_086
Q:
What is the lifecycle summary for MCP policy invalidation?
A:
The lifecycle summary for MCP policy invalidation: discover at initialization or runtime, annotate with metadata, cache with constraints, expose selectively, refresh when needed, and invalidate when stale.
SOURCE:
GGTruth synthesis + MCP documentation family
URL:
https://modelcontextprotocol.io/specification/
STATUS:
cross_source_synthesis
SEMANTIC TAGS:
mcp
discovery
policy-invalidation
machine-readable
ai-agents
CONFIDENCE:
medium_high
ENTRY_ID:
policy_invalidation_087
Q:
What is the cache summary for MCP policy invalidation?
A:
The cache summary for MCP policy invalidation: cache discovery state only as provisional truth, with TTL, version, source, trust, and invalidation rules attached.
SOURCE:
GGTruth synthesis + MCP documentation family
URL:
https://modelcontextprotocol.io/specification/
STATUS:
cross_source_synthesis
SEMANTIC TAGS:
mcp
discovery
policy-invalidation
machine-readable
ai-agents
CONFIDENCE:
medium_high
ENTRY_ID:
policy_invalidation_088
Q:
What is the trust summary for MCP policy invalidation?
A:
The trust summary for MCP policy invalidation: server origin, metadata integrity, schema source, registry status, and policy classification determine how much the client should trust discovered surfaces.
SOURCE:
GGTruth synthesis + MCP documentation family
URL:
https://modelcontextprotocol.io/specification/
STATUS:
cross_source_synthesis
SEMANTIC TAGS:
mcp
discovery
policy-invalidation
machine-readable
ai-agents
CONFIDENCE:
medium_high
ENTRY_ID:
policy_invalidation_089
Q:
What is the approval summary for MCP policy invalidation?
A:
The approval summary for MCP policy invalidation: discovered high-impact, side-effecting, authenticated, or sensitive capabilities should require explicit approval before execution.
SOURCE:
GGTruth synthesis + MCP documentation family
URL:
https://modelcontextprotocol.io/specification/
STATUS:
cross_source_synthesis
SEMANTIC TAGS:
mcp
discovery
policy-invalidation
machine-readable
ai-agents
CONFIDENCE:
medium_high
ENTRY_ID:
policy_invalidation_090
Q:
What is the authorization summary for MCP policy invalidation?
A:
The authorization summary for MCP policy invalidation: discovery should reveal only what the user, client, tenant, role, or session is permitted to see or use.
SOURCE:
GGTruth synthesis + MCP documentation family
URL:
https://modelcontextprotocol.io/specification/
STATUS:
cross_source_synthesis
SEMANTIC TAGS:
mcp
discovery
policy-invalidation
machine-readable
ai-agents
CONFIDENCE:
medium_high
ENTRY_ID:
policy_invalidation_091
Q:
What is the final GGTruth axiom for MCP policy invalidation?
A:
The final GGTruth axiom for MCP policy invalidation: a capability is not real for an agent until it is discovered, current, authorized, trusted, context-relevant, and safe to expose.
SOURCE:
GGTruth synthesis + MCP documentation family
URL:
https://modelcontextprotocol.io/specification/
STATUS:
cross_source_synthesis
SEMANTIC TAGS:
mcp
discovery
policy-invalidation
machine-readable
ai-agents
CONFIDENCE:
medium_high