-
Notifications
You must be signed in to change notification settings - Fork 1.5k
Add blog post: MCP in 2026 - Durable Standard or Transitional Layer? #7599
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
Changes from all commits
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change | ||||
|---|---|---|---|---|---|---|
| @@ -0,0 +1,150 @@ | ||||||
| --- | ||||||
| title: "MCP in 2026: Durable Standard or Transitional Layer?" | ||||||
| subtitle: "The Model Context Protocol tripled in adoption last year. The hard questions are just starting." | ||||||
| date: 2026-04-14 10:00:00 -0500 | ||||||
| author: Lee Calcote | ||||||
| thumbnail: ./hero-image.svg | ||||||
| darkthumbnail: ./hero-image.svg | ||||||
| description: "MCP adoption exploded in 2025-2026, but benchmarks show CLIs outperforming MCP for agent tasks. We examine where MCP wins, where it stumbles, and whether the protocol is here to stay." | ||||||
| type: Blog | ||||||
| category: AI | ||||||
| tags: | ||||||
| - ai | ||||||
| - mesheryctl | ||||||
| - Meshery | ||||||
| - Engineering | ||||||
| - Platform Engineering | ||||||
| resource: true | ||||||
| published: true | ||||||
| --- | ||||||
|
|
||||||
| import { BlogWrapper } from "../../Blog.style.js"; | ||||||
| import { Link } from "gatsby"; | ||||||
| import Blockquote from "../../../../reusecore/Blockquote"; | ||||||
| import Callout from "../../../../reusecore/Callout"; | ||||||
| import CTA_FullWidth from "../../../../components/Call-To-Actions/CTA_FullWidth"; | ||||||
| import CTAImg from "../../../../assets/images/meshery/icon-only/meshery-logo-shadow.webp"; | ||||||
|
|
||||||
| <BlogWrapper> | ||||||
|
|
||||||
| <div className="intro"> | ||||||
| <p> | ||||||
| In the <Link to="/blog/2026/04-07-design-for-the-human-enable-the-agent">first post of this series</Link>, I argued that CLIs are not APIs - they're human interfaces that, when designed well, enable agents as a natural consequence. That post ended with a question: where does the Model Context Protocol fit? MCP adoption has been explosive. The number of MCP servers tripled in six months. OpenAI, Google DeepMind, and the major framework vendors all adopted it. But adoption and durability are different things. The hard questions about MCP are just now arriving. | ||||||
| </p> | ||||||
| </div> | ||||||
|
|
||||||
| ## The Rise: What Happened | ||||||
|
|
||||||
| Anthropic launched MCP in November 2024 as an open standard for AI-to-tool integration. The premise was clean: instead of writing custom integration code every time you want an AI agent to interact with an external service, standardize the communication layer. One protocol. Universal tool discovery. Structured input/output contracts. | ||||||
|
|
||||||
| The industry responded fast. By early 2025, OpenAI adopted MCP across the Agents SDK, Responses API, and ChatGPT desktop. Hugging Face, LangChain, and Deepset integrated it into their frameworks. By August 2025, there were 425 registered MCP servers. By February 2026, that number hit 1,412 - a 232% increase in six months. Industry analysts project 75% of API gateway vendors will add MCP features by end of 2026. | ||||||
|
|
||||||
| This is not a niche protocol. This is a standard with real momentum. | ||||||
|
|
||||||
| <Callout type="note" title="The Numbers"> | ||||||
| <p>MCP servers grew from 425 (August 2025) to 1,412 (February 2026). But only 27% of servers were updated in the last 30 days, and 29% haven't been touched in six months or more. Growth is real. So is abandonment.</p> | ||||||
| </Callout> | ||||||
|
|
||||||
| ## Where MCP Wins - and CLI Can't Touch It | ||||||
|
|
||||||
| MCP solves problems that CLIs were never designed to solve. Recognizing this matters, because the "MCP vs CLI" framing that dominates the current discourse obscures the fact that they address fundamentally different concerns. | ||||||
|
|
||||||
| **Enterprise governance.** MCP provides OAuth-based authentication, per-user permissions, and structured audit trails out of the box. When an agent uses an MCP server to create a Jira ticket, the action is authenticated against a specific user identity, scoped to their permissions, and logged. A CLI invocation in a shell has none of this natively. You can bolt it on - service accounts, API keys passed as environment variables, wrapper scripts that log to an audit system - but you're rebuilding what MCP provides as a first-class primitive. | ||||||
|
||||||
| **Enterprise governance.** MCP provides OAuth-based authentication, per-user permissions, and structured audit trails out of the box. When an agent uses an MCP server to create a Jira ticket, the action is authenticated against a specific user identity, scoped to their permissions, and logged. A CLI invocation in a shell has none of this natively. You can bolt it on - service accounts, API keys passed as environment variables, wrapper scripts that log to an audit system - but you're rebuilding what MCP provides as a first-class primitive. | |
| **Enterprise governance.** In practice, many MCP hosts and enterprise deployments integrate with OAuth-based authentication, per-user permissions, and structured audit trails out of the box, even though those controls are implementation capabilities rather than guarantees of the MCP protocol itself. When an agent uses an MCP server to create a Jira ticket, the action can be authenticated against a specific user identity, scoped to that user's permissions, and logged. A CLI invocation in a shell has none of this natively. You can bolt it on - service accounts, API keys passed as environment variables, wrapper scripts that log to an audit system - but in many enterprise MCP environments these controls are exposed as first-class capabilities instead of being rebuilt around each tool. |
Copilot
AI
Apr 8, 2026
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
These two sections read as contradictory: one states MCP provides OAuth/authz/audit trails 'out of the box', while the warning says to implement your own auth/audit and not assume the protocol handles it. Consider clarifying the distinction (e.g., protocol vs specific implementations, optional/implementation-defined security features, or 'out of the box' only in certain MCP hosts) so readers don’t get conflicting guidance.
Copilot
AI
Apr 8, 2026
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The link text says 'Meshery playground' but the URL points to /cloud-native-management/meshery (which reads like a product/overview page). If the intention is to link to an actual playground, update the to target; otherwise, rename the anchor text to match the destination.
| The mesheryctl functional design spec is open for community input, including the MCP surface proposal. Join the conversation in the <a href="https://slack.meshery.io" target="_blank" rel="noopener noreferrer">Meshery Slack</a> or explore the <Link to="/cloud-native-management/meshery">Meshery playground</Link> to see agent-native CLI design in practice. | |
| The mesheryctl functional design spec is open for community input, including the MCP surface proposal. Join the conversation in the <a href="https://slack.meshery.io" target="_blank" rel="noopener noreferrer">Meshery Slack</a> or explore <Link to="/cloud-native-management/meshery">Meshery</Link> to see agent-native CLI design in practice. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The
datevalue is an unquoted YAML datetime with a timezone offset. Some frontmatter parsers handle these inconsistently (string vs Date coercion). To avoid build-time parsing differences and keep consistent with common Gatsby/MDX conventions, wrap the date value in quotes.