Show HN: An MCP Gateway to block the lethal trifecta
(github.com)42 points by 76SlashDolphin 11 hours ago
Hi there, me and some friends were inspired by Simon Willison's recent post on the "lethal trifecta" (https://simonwillison.net/2025/Jun/16/the-lethal-trifecta/ ) and started building a gateway to defend against it.
The idea: instead of connecting an LLM directly to multiple MCP servers, you point them all through a Gateway.
The Gateway:
- Connects to each MCP server and inspects their tools + requirements
- Classifies tools along the "trifecta" axes (private data access, untrusted content, external comms)
- When all three conditions are about to align in a single session, the Gateway blocks the last step and tells the LLM to show a warning instead.
That way, before anything dangerous can happen, the user is nudged to review the situation in a web dashboard.
We'd love for the HN community to try it out: https://github.com/Edison-Watch/open-edison
Any feedback very welcome - we'll be around in the thread to answer questions.
I think the "lethal trifecta" framing is useful and glad that attempts are being made at this! But there are two big, hard-to-solve problems here:
1. The "lethal trifecta" is also the "productive trifecta" - people want to be able to use LLMs to operate in this space since that's where much of the value is; using private / proprietary data to interact with (do I/O with) the real world.
2. I worry that there will soon be (if not already) a fourth leg to the stool - latent malicious training within the LLMs themselves. I know the AI labs are working on this, but trying to ferret out Manchurian Candidates embedded within LLMs may very well be the greatest security challenge of the next few decades.