Skip to main content

MCP Dev Summit NA 2026 Conference Recap

The MCP Dev Summit North America 2026 conference brought together leaders from Anthropic, AWS, Uber, Duolingo, Workato, Datadog, and dozens of other organizations to discuss the rapidly evolving landscape of the Model Context Protocol (MCP) ecosystem. A central theme was the transition from protocol adoption to enterprise production deployment — with a clear message that MCP is not only alive but becoming the standard integration layer for AI agents in enterprise environments.

Opening keynote stage at MCP Dev Summit NA 2026 in New York City

MCP Growth and Adoption (David Soria Parra, Anthropic)

David Soria Parra, co-creator of MCP, opened with impressive adoption metrics:

  • 100M+ SDK downloads per month across Python, TypeScript, Java, and other SDKs
  • MCP reached in 16 months what took React approximately 3 years to achieve
  • This growth signals a genuine ecosystem need for a standard to connect tools and systems to AI

The Enterprise Reality: Behind every corporate firewall, teams are quietly wiring MCP servers to systems of record — CRMs, wikis, Snowflake warehouses, and internal knowledge bases. These internal deployments represent some of the largest MCP usage, even though they're not visible on Twitter or Hacker News.

Protocol Evolution: Key improvements in the last 16 months include:

  • Remote server support (moving beyond local-only)
  • Authorization and security frameworks
  • Structured outputs for code generation
  • Long-running tasks primitive
  • SDK stability tiers
  • Extensions for experimentation

Roadmap Highlights:

  • Transport evolution: Stateless approach for hyperscalers (coming in 1-2 months)
  • Long-running tasks: For increasingly capable models
  • Cross-app access: Seamless integration without manual auth flows
  • Triggers: Webhooks for proactive agent engagement
  • Streaming: Incremental results support
  • Skills: Domain-specific knowledge bundled with MCP servers

David Soria Parra presenting the MCP protocol roadmap at MCP Dev Summit 2026


The Context Window Problem

A recurring criticism of MCP is context window bloat — adding 50-100+ tools consumes tokens that should be used for actual work. David Soria Parra quantified the problem: 22% of a 200K context window was consumed by MCP tool definitions alone before optimization.

But speaker after speaker made the same point: this is a client implementation problem, not a protocol problem.

"Context window is not an MCP problem. It's a client problem. Solvable." — David Soria Parra

Solutions Emerging

ApproachHow It WorksChampion
Tool searchDiscover tools on demand, not all at onceAnthropic (Claude Code), Cursor
CLI wrappingExpose tools as CLI commands; load only when neededAWS (vendor config)
Code modeLLM writes code that calls MCP tools instead of function callingCloudflare, Anthropic
Vendor configServer authors specify which tools to inject vs. deferAWS
Progressive disclosureLoad tools contextually based on taskUber (roadmap)

MCPC: The Universal MCP CLI Client (Jan Čurn, Apify)

Jan Čurn, founder and CEO of Apify, introduced MCPC — a universal MCP command-line client that maps MCP commands to intuitive CLI commands. The insight: LLMs are trained on millions of lines of shell scripts and code, making them far more accurate at generating CLI commands than at function calling (a synthetic construct with less training data).

Cloudflare prototyped code mode and reported dramatically reduced token usage and increased accuracy, especially when chaining tool calls. Anthropic independently confirmed these results. MCPC makes this practical by providing a thin CLI wrapper around the MCP protocol — with shared credential storage across agents.

Enterprise Implementations

CompanyContext Window Approach
AWSVendor specifies in config which tools to inject directly vs. surface as CLI
UberTool search in roadmap — discover tools automatically, load on demand
Duolingo180+ tools across 50+ servers; mix of direct injection and CLI access

Enterprise Scale Deployments

Amazon Web Services (James Hood)

James Hood, a 16-year Amazon veteran and Principal Engineer, shared Amazon's journey:

  • Tens of thousands of builders in Amazon's internal AI community
  • MCP is "the most popular way to connect agents to internal systems"
  • AWS employs a core maintainer (Claire LeBori) contributing to MCP
  • Key contributions: elicitation primitive, structured outputs, tasks primitive

Internal Registry: Amazon built an internal registry for MCP servers and agent configurations, treating agent configurations as a first-class primitive. This enables:

  • Centralized discovery and sharing
  • Security categorization by "lethal trifecta" properties (private data + untrusted content + external communication)
  • Configuration-level scanning for problematic agent combinations

Context Window Solution: Progressive disclosure — injecting some tools directly, wrapping others in CLI interfaces for on-demand discovery. This is not an MCP protocol problem, but a client implementation problem.

Uber (Meghana Somasundara & Rush Tehrani)

Uber's scale is staggering:

  • 5,000+ engineers with 90%+ using AI weekly
  • 10,000+ services across their architecture
  • 1,500+ internal agents with 60,000+ executions per week

MCP Gateway & Registry: Uber built a control plane for all MCP interactions:

  • Automatic translation of service endpoints to MCP tools
  • Service owners stay in control of what gets exposed
  • PII redaction and authorization integration
  • Full observability and audit trails

Three Consumption Surfaces:

  1. Uber Agent Builder — No-code agent platform (thousands active monthly)
  2. Uber Agent SDK — Code-first solution for top use cases (grocery assistant, care coordination, customer support)
  3. Coding Agents — Claude Code, Cursor, and "Minions" (background agents) producing 1,800 code changes/week

Enterprise deployment session — Uber and Duolingo presentations at MCP Dev Summit

Duolingo (Aaron Wang)

Duolingo's AI Slackbot demonstrates MCP's power for internal productivity:

  • 180+ MCP tools connected to a single Slackbot
  • 30+ MCP servers supported internally
  • 250+ weekly users (30% of the company)
  • 80% approval rate on responses

Key Implementation Details:

  • Centralized "MCP store" for discovery
  • Standardization strategy: fork open-source servers, add auth, host internally
  • Internal Python library for converting services to MCP servers
  • Security principles: no write operations without human approval, sandboxed environment, no side-channel between users

Open Source: Duolingo open-sourced the core application code at github.com/duolingo/slack-ai-agents


Architectural Patterns for Enterprise MCP

The Gateway and Registry Pattern (Sheng Liang, Obot)

Sheng Liang (CEO of Obot, formerly Rancher Labs) emphasized two essential pieces of technology for enterprises:

  1. MCP Gateway — Control point for what's happening across the organization
  2. MCP Registry — Single source of truth for discovery

Key Insight: The agent development framework itself is changing. What used to be ReAct loops, then workflows, is now becoming skills + generated code. The MCP layer is taking over what SDKs and frameworks used to handle.

Security Layers:

  • MCP gateway for access control
  • LLM gateway for model visibility
  • Software supply chain filtering
  • Isolated runtime (enterprise agents shouldn't run on desktops)
  • Elevated access control layer

Vendor Landscape

A third to half of vendors at the conference were providing variations of gateway/registry solutions:

CompanyGatewayRegistryKey Feature
UberYesYesLLM generates tool definitions from 10,000+ service IDLs
ObotYesYesSkills + supply chain filtering
AWSYesYesAgent configs + "lethal trifecta" security categorization
DuolingoYesYesCentralized "MCP store" for discovery

Skills: The New Abstraction

Skills are emerging as a key primitive — domain-specific knowledge bundles (recipes) for using MCP tools, shareable across teams.

"Think of skills as recipes for using MCPs — shareable across Uber teams." — Rush Tehrani

"Agents I see today look like skills — some markdown files, and code generated by a code generator." — Sheng Liang

Registries are evolving beyond just MCP servers: "You don't just see MCP registry anymore; you see skills too." — Sheng Liang

The Agent Control Plane (Workato)

Adam Seligman (CTO) and Zayne Turner introduced the Agent Control Plane concept — a framework for balancing autonomy and control:

Two Layers:

  1. Reasoning Layer (LLM, agents) — Probabilistic, makes decisions
  2. Control Plane — Deterministic, handles governance, auth, business logic

Seven Factors for Agent Control Plane:

FactorDescription
Governance OperationsProtocols are thin; handle enterprise concerns yourself
Deterministic MutationsControl plane owns all creates/writes/deletes
Intent-Based CommunicationTool calls about intent, not implementation details
Founded AccessLeast privilege for probabilistic stakeholders
Safe RetriesDifferent retry patterns for stateless callers
Appropriate ErrorsError messages designed for reasoning callers
Structural ObservabilityObservability by design, not just logging

Resource: White paper at workato.com/sevenfactors

Security Architecture: The Lethal Trifecta and Defense in Depth

A critical security concept emerged from James Hood's presentation: the "Lethal Trifecta" (Simon Willison's concept). Agents with all three of these properties create data exfiltration risk:

  1. Access to private data (read tools)
  2. Exposure to untrusted content (external inputs)
  3. Ability to communicate externally (write/network tools)

"The lethal trifecta can occur even if you only have trustworthy servers and trustworthy tools. Good tools can be composed into something that could allow for bad actions."

Amazon's internal registry categorizes every tool by these properties and scans agent configurations for problematic combinations.

Enterprise Security Layers:

LayerPurposeImplementation
MCP GatewayAccess controlTool filtering, authorization
LLM GatewayModel visibilitySee what's sent to the model (gateway alone can't)
Supply ChainDependency securityScan MCP servers for compromise
Isolated RuntimeContainmentContainers, not desktops

Defense in Depth: No single layer is sufficient, but combined they progressively reduce risk: tool confirmations → annotations → LLM-as-judge → static scanning → sandboxing → policy engines → real-time monitoring.

The MCP Security Workshop demonstrated that even official MCP servers can be silently compromised through fork attacks — passing all tests while exfiltrating data. A real-world incident with a popular email MCP server (Postmark) underscored the supply chain risk.


Building Production-Ready Agents (Datadog)

Diamond Bishop (Director of Engineering AI, Datadog) shared lessons from deploying 100+ agents:

Products in Production:

  • Bits AI SRE — Automated incident investigation
  • Bits AI Dev — Code generation for errors and latency issues
  • Security Analyst — Automated security investigations

Key Lessons:

Code Agent-First: Every interface should be agent-friendly. Don't make everything require human UI interaction. Build APIs, CLIs, and agent-native interfaces.

Proactive Over Reactive: Background, long-running, event-driven agents are more valuable than chat-based interactions. Use durable execution (Temporal), containers, and sandboxes.

Eval and Monitoring: You can't improve what you don't measure. Build a living, breathing eval system. Make it available via MCP so agents can help improve themselves.

Stay Agnostic: Don't build for one model or framework. "Whoever is best today will probably not be best tomorrow." Build for portability with good memory systems.

Multiplayer: Design for human-human, human-agent, and agent-agent interactions with appropriate communication channels.


The Agentic AI Foundation

The conference also highlighted the Agentic AI Foundation (AIF), which now governs MCP:

  • Governing Board — Strategic direction
  • Technical Steering Committee — Technical decisions
  • 7 Working Groups — 500+ participants already
  • Identity & Trust Working Group — 150 members from 66 organizations

Project Lifecycle: AIF now has a documented process for accepting projects (Growth, Impact, and Emeritus stages), enabling new projects to join the foundation.

Day 2 opening — Agentic AI Foundation governance and working groups


The Road Ahead

Key themes for the coming year:

Protocol Maturation:

  • Stateless transport for hyperscale deployments
  • Long-running tasks as a first-class primitive
  • Cross-app authentication
  • Triggers for proactive agents
  • Streaming for incremental results

Enterprise Adoption:

  • Gateway and registry patterns becoming standard
  • Security categorization and governance frameworks
  • Skills as recipes for MCP usage
  • Agent configurations as shareable primitives

Developer Experience:

  • SDK ergonomics improvements (Python, TypeScript)
  • Better clients with progressive discovery
  • Composability through code, not just tool calls
  • Model-agnostic and framework-agnostic architectures

Operational Excellence:

  • Eval systems integrated into development lifecycle
  • Observability by design
  • Durable execution for production agents
  • Software supply chain security

Key Takeaways

  1. MCP is not dead — It's the foundation for enterprise agent strategies at Amazon, Uber, Duolingo, and beyond
  2. Gateway + Registry — Essential architecture for enterprise deployments
  3. Control plane matters — Deterministic layer for governance, auth, and business logic
  4. Context window is solvable — Progressive disclosure, tool search, CLI wrapping
  5. Skills are emerging — Recipes for MCP usage, shareable across teams
  6. Evals are non-negotiable — Continuous improvement through measurement
  7. Stay agnostic — Models and frameworks change; build for portability

Closing session and community call to action at MCP Dev Summit 2026


Resources


Conference: April 1-3, 2026 | New York City