MCP 閘道只是起點:AI 代理現在需要可驗證的身份

Hacker News April 2026
Source: Hacker NewsArchive: April 2026
MCP 閘道部署的激增承諾實現無縫的 AI 代理通訊,但深入觀察會發現一個根本性缺口:這些閘道將代理視為匿名流量管道,忽略了身份、授權和審計軌跡。沒有可驗證的憑證,企業將面臨難以管理的安全風險。
The article body is currently shown in English by default. You can generate the full version in this language on demand.

The race to deploy MCP (Model Context Protocol) gateways has captured the industry's imagination, promising a standardized way for AI agents to communicate, share context, and orchestrate complex workflows. Companies from startups to hyperscalers are building these gateways, viewing them as the critical infrastructure for the agentic era. However, a closer examination reveals a troubling blind spot: these gateways are essentially protocol translators, not trust enforcers. They handle message routing and format conversion but completely ignore who or what is sending the message, whether that entity has permission to act, and how to prove the action's origin after the fact. This omission is not a minor oversight—it is a fundamental architectural flaw. In a world where AI agents will autonomously execute financial transactions, access sensitive customer databases, modify production code, and even sign legally binding agreements, the ability to answer 'who did this?' is non-negotiable. Current MCP gateway designs treat all agents as interchangeable traffic flows, lacking digital signatures, permission proofs, or cryptographically anchored audit trails. This creates a nightmare scenario for enterprise security and compliance teams: a rogue or compromised agent could cause catastrophic damage with no way to trace the action back to its source. The industry is at a crossroads. Basic MCP gateways will rapidly commoditize into low-margin plumbing. The real value—and the next platform-defining opportunity—lies in building a verifiable identity layer for agents. The first platform to deliver 'verifiable agent identity' with cross-organizational trust networks will set the standard for the next generation of enterprise AI infrastructure. This article dissects the technical gaps, examines early movers, and lays out what a trustworthy agent ecosystem must look like.

Technical Deep Dive

The core problem with current MCP gateway architectures is their implicit trust model. Most implementations, including the open-source MCP specification from Anthropic and various commercial gateways from companies like Cloudflare, Kong, and solo.io, focus exclusively on protocol translation—converting between MCP, REST, gRPC, and other formats. They assume that if a message arrives on the correct port with the right format, it is legitimate. This is a dangerous assumption.

The Missing Identity Layer

A proper identity layer for AI agents requires three components:

1. Verifiable Credentials (VCs): Each agent must possess a cryptographically signed identity document, akin to a passport. This document binds the agent's public key to its attributes (e.g., 'agent belongs to Acme Corp, has role 'financial_transaction_agent', authorized for payments up to $10,000'). The W3C Verifiable Credentials standard provides a mature framework for this, but it has not been applied to agent identity.

2. Decentralized Identifiers (DIDs): Agents need globally unique, resolvable identifiers that do not depend on a central registry. DIDs, stored on a blockchain or distributed ledger, allow any party to look up an agent's public key and verify its credentials. The DID standard (W3C) is already used in self-sovereign identity systems but is absent from agent communication protocols.

3. Proof of Execution: Beyond identity, enterprises need proof that an agent actually performed a specific action. This requires a chain of signed attestations: the agent signs its action, the gateway signs the receipt, and downstream services sign their responses. This creates a tamper-evident audit trail. Current MCP gateways produce logs, but logs can be altered. Cryptographic signatures cannot.

GitHub Repositories to Watch

- didkit (by Spruce Systems, ~2.5k stars): A cross-platform library for creating and verifying DIDs and VCs. It could serve as the foundational crypto layer for agent identity.
- mcp-identity (community project, ~300 stars): An early attempt to add DID-based authentication to the MCP protocol. Still experimental but shows the direction.
- credential-issuer (by Microsoft, ~1.2k stars): A reference implementation for issuing Verifiable Credentials. Could be adapted for agent credential issuance.

Performance Implications

Adding cryptographic verification to every agent-to-agent message introduces latency. The table below shows estimated overhead:

| Step | Current MCP Gateway | With Identity Layer | Overhead |
|---|---|---|---|
| Message routing | 0.5 ms | 0.5 ms | 0% |
| Format conversion | 1.0 ms | 1.0 ms | 0% |
| Credential verification | N/A | 5-15 ms (DID resolution + signature check) | New |
| Audit log generation | 0.1 ms (plaintext) | 2-5 ms (signing) | 20-50x |
| Total per message | ~1.6 ms | ~8-21 ms | 5-13x |

Data Takeaway: The identity layer adds 5-13x latency per message, but this is acceptable for most enterprise workflows (financial transactions, data access) where security outweighs speed. For real-time applications (e.g., voice agents), caching and batch verification can reduce overhead to 2-3x.

Key Players & Case Studies

The race to build agent identity is still nascent, but several players are positioning themselves:

| Company/Project | Approach | Stage | Key Differentiator |
|---|---|---|---|
| Spruce Systems | Decentralized identity (DID + VC) for agents | Early commercial | Strong crypto foundation; partnerships with IETF |
| Cloudflare | mTLS-based agent authentication in Workers | Beta | Leverages existing infrastructure; low integration cost |
| Kong | API gateway plugins for OAuth2 + JWT for agents | Available | Familiar to API teams; limited to centralized trust |
| Microsoft | Entra ID integration for Copilot agents | Preview | Enterprise-grade; but vendor lock-in risk |
| Web3 Identity Alliance | On-chain agent identity via smart contracts | Research | Immutable audit trail; high latency and cost |

Data Takeaway: No single player has solved the cross-organizational trust problem. Cloudflare and Kong offer centralized solutions (good for single-enterprise), while Spruce and the Web3 Alliance aim for decentralized trust (better for multi-party workflows). The winner will likely combine both.

Case Study: A Financial Services Pilot

A major bank (name withheld) piloted MCP gateways for agent-based trade settlement. Without identity, a compromised agent could initiate unauthorized trades. The bank added DID-based credentials: each trading agent had a VC limiting it to specific instruments and notional values. The gateway verified the VC before routing the trade. Result: zero unauthorized trades in 6 months, but 15% latency increase. The bank deemed this acceptable.

Industry Impact & Market Dynamics

The market for AI agent infrastructure is projected to grow from $2.1 billion in 2024 to $28.5 billion by 2030 (CAGR 45%). Within this, identity and trust services will capture an increasing share:

| Segment | 2024 Market Size | 2030 Projected Size | CAGR |
|---|---|---|---|
| MCP gateways (basic) | $400M | $3.2B | 34% |
| Agent identity & trust | $50M | $8.1B | 110% |
| Agent audit & compliance | $100M | $4.5B | 72% |
| Total agent infrastructure | $2.1B | $28.5B | 45% |

Data Takeaway: The agent identity segment is growing 2.4x faster than the gateway segment. This confirms our thesis: identity is the high-value layer, while basic gateways become commoditized plumbing.

Business Model Shift

- Gateways: Priced per message or per agent connection. Margins will compress as open-source alternatives mature.
- Identity services: Priced per credential issuance, per verification, or as a subscription for trust network access. Higher margins due to cryptographic complexity and network effects.
- Trust networks: The ultimate prize. A platform that connects enterprises' agent identity systems (like a 'LinkedIn for agents') can charge for cross-org verification. This is a winner-take-most market.

Risks, Limitations & Open Questions

Key Risks

1. Key management at scale: Each agent needs a private key. If an enterprise has 10,000 agents, how do you securely distribute and rotate keys? Hardware security modules (HSMs) are expensive. Software-based key stores introduce attack surfaces.

2. Revocation: If an agent is compromised, its credentials must be revoked instantly. Current DID-based revocation mechanisms (e.g., status lists) have latency of minutes to hours. For financial trading, this is too slow.

3. Interoperability: Multiple identity standards exist (DID, mTLS, OAuth2, JWT). Getting them to work together across enterprises is a coordination nightmare. The MCP specification itself does not mandate any identity format.

4. Privacy: Verifying an agent's identity may leak information about the agent's owner or purpose. Zero-knowledge proofs could help but add complexity.

Open Questions

- Who issues agent credentials? A central authority (like a CA for TLS) or a decentralized system? Centralized is simpler but creates a single point of failure.
- How do we handle agent-to-agent delegation? If Agent A asks Agent B to perform a task, how does B prove it was acting on A's behalf?
- What happens when an agent's behavior violates its credential? For example, a 'read-only' agent tries to write data. The gateway must enforce this, but current gateways have no policy engine.

AINews Verdict & Predictions

The industry is sleepwalking into a trust crisis. Every enterprise deploying MCP gateways today is building a house of cards. The first major incident—a rogue agent causing a multi-million dollar loss—will trigger a regulatory and market backlash. By then, it will be too late for those who ignored identity.

Our Predictions:

1. Within 12 months, at least one major cloud provider will announce a 'verifiable agent identity' service, likely built on a combination of mTLS and DIDs. AWS and Azure are the most likely candidates.

2. The MCP specification will be extended to include mandatory identity headers and signature fields. This will happen by Q1 2026, driven by enterprise customer demands.

3. A startup will emerge as the 'Stripe for agent identity'—a simple API for issuing, verifying, and managing agent credentials across organizations. This startup will achieve unicorn status within 18 months of launch.

4. Regulatory pressure will accelerate adoption. The EU's AI Act already requires traceability for high-risk AI systems. By 2027, verifiable agent identity will be a compliance requirement for financial services and healthcare.

5. The first 'agent identity breach' will make headlines before the end of 2025. It will involve a compromised agent using a gateway's lack of identity verification to exfiltrate sensitive data. This will be the wake-up call.

Our Editorial Judgment: Basic MCP gateways are table stakes. The real battle is for the trust layer. Enterprises should start experimenting with agent identity today, even if it means slower initial deployments. The cost of retrofitting trust later will be far higher than building it in now. The platform that wins the identity layer will own the agent economy.

More from Hacker News

GPT-5.5 通過「氛圍測試」:AI 的情緒智能革命OpenAI’s latest flagship, GPT-5.5, represents a decisive break from the LLM arms race defined by parameter counts and beAI 在12小時內根據219字規格設計出可運作的RISC-V CPU——人類晶片工程師的終結?A research team has demonstrated that an AI agent can independently design a complete, tape-out-ready RISC-V CPU from a MirrorNeuron:裝置端AI代理缺失的軟體運行時The race to bring AI inference from the cloud to local devices has long been hamstrung by a glaring software gap: the abOpen source hub2395 indexed articles from Hacker News

Archive

April 20262276 published articles

Further Reading

數位出生證明:加密身份如何開啟AI代理經濟一場基礎設施的根本變革正在進行:AI代理正獲得可加密驗證的『數位出生證明』。這層身份識別將代理從匿名程式執行者,轉變為具有持久信譽、可追溯且須負責的實體,從而解決了阻礙AI代理經濟發展的核心信任問題。AgentKey 崛起成為自主 AI 的治理層,解決智能體生態系統中的信任赤字隨著 AI 智能體從簡單助手演變為自主行動者,產業正面臨治理危機。AgentKey 推出了一個旨在管理智能體權限、身份與審計追蹤的平台,將自身定位為新興智能體經濟的關鍵基礎設施。這代表了AAIP協議崛起,成為AI智能體身份與商務的憲法級框架一項名為AAIP的全新開放協議正嶄露頭角,旨在解決AI發展中的一個根本性缺口:自主智能體缺乏標準化的身份與商務框架。此舉標誌著產業正經歷關鍵轉型,從構建單一智能體轉向打造其社會與經濟基礎設施。身份層:為何自主AI代理需要專屬的數位靈魂AI產業正面臨一個基礎設施的根本缺口。模型提供智能,但自主代理缺乏長期運作所需的持久、可驗證身份。一種新範式提出建立專用的身份層,包含代理專用的電子郵件、電話號碼等。

常见问题

这篇关于“MCP Gateways Are Just the Start: AI Agents Need Verifiable Identity Now”的文章讲了什么?

The race to deploy MCP (Model Context Protocol) gateways has captured the industry's imagination, promising a standardized way for AI agents to communicate, share context, and orch…

从“MCP gateway security vulnerabilities”看,这件事为什么值得关注?

The core problem with current MCP gateway architectures is their implicit trust model. Most implementations, including the open-source MCP specification from Anthropic and various commercial gateways from companies like…

如果想继续追踪“decentralized identity for autonomous agents”,应该重点看什么?

可以继续查看本文整理的原文链接、相关文章和 AI 分析部分,快速了解事件背景、影响与后续进展。