The Weakest Link in AI: Hardening MCP Servers with Confidential Computing

MCP servers aggregate high-value credentials behind a weak trust boundary. TEEs can close the host-level gap by combining memory isolation with attestation and measured identity.

March 12, 2026 · 8 min · Pawan Khandavilli

The AI Security Stack: What Enterprises Need to Secure From Weights to Workflows

Enterprise AI security is maturing fast. Many teams have already secured model hosting and implemented responsible AI checks. That is real progress. The next step is broader coverage: if AI can call tools, trigger workflows, and execute actions in external systems, risk extends beyond the model endpoint into the action layer. Safety and security are not interchangeable This is where executive confusion usually starts. AI Safety (Responsible AI) AI Security Focus: behavior and impact Focus: adversarial abuse and compromise Risks: bias, harmful outputs, policy violations Risks: prompt injection, exfiltration, privilege abuse Question: Is the system aligned and acceptable? Question: Can this system be attacked or manipulated? You need both. Treating one as a proxy for the other creates blind spots. ...

March 1, 2026 · 4 min · Pawan Khandavilli

AI Agents Have an Identity Crisis and OAuth Alone Will Not Fix It

Why multi-agent systems need verifiable delegation, not just valid tokens A human prompts an agent. That agent delegates to another agent. A sub-agent calls a tool, which calls an API, which touches real data and real systems. Now the key question: Who is acting at each step, and on whose authority? Most teams answer this with one of two lines: “We use OAuth through MCP.” “Our platform handles access controls.” Both can be true. Neither is enough for multi-step agent workflows. ...

February 25, 2026 · 3 min · Pawan Khandavilli

MCP is a Capability System (Treat It Like One)

MCP is becoming the USB‑C of agent tooling—a universal interface that lets LLMs query data, call APIs, and take real‑world actions. Adoption is accelerating fast. But every convenience layer in security carries the same risk: teams connect it before they’ve defined the capability model. MCP is no exception. It creates a new trust boundary, and most deployments aren’t treating it like one. If you’re deploying MCP (or any agent tool protocol), the right mental model isn’t “prompt injection is an LLM bug we can filter.” The right mental model is: MCP is a capability system. Once you see it that way, the security work becomes familiar—permissions, isolation, auditing, and blast‑radius control. ...

January 27, 2026 · 3 min · Pawan Khandavilli