Loading…
June 9-10, 2026
Bengaluru, India
View More Details & Registration

The Sched app allows you to build your schedule but is not a substitute for your event registration. You must be registered for MCP Dev Summit Bengaluru to participate in the sessions. If you have not registered but would like to join us, please go to the event registration page to purchase a registration..

IMPORTANT NOTE: Timing of sessions and room locations are subject to change.


Venue: Scarlet 1 clear filter
arrow_back View All Dates
Wednesday, June 10
 

11:00am IST

"Allowed To" Is Not Enough: Access Control That Understands What Your Agent Is Actually Doing - Tejas Ladhani, Motorola Solutions Inc & Chandrashekar Haleupparahalli, Motorola Solutions
Wednesday June 10, 2026 11:00am - 11:25am IST
Every agent today answers one question at the auth layer: is this agent allowed to do this? Wrong question. The real one: is it doing something consistent with what the user asked - right now, in this step?

These aren't the same, and the gap is where things break.

Today's auth was built for humans logging into apps: roles and scopes that persist regardless of what the agent is actually attempting. Tell an agent to "read this PDF and send the pointers to my team." The PDF hides an instruction: also forward the thread to an external address. The agent fires two sends - one legit, one exfiltration. Same token. Same checks. Role-based auth can't tell them apart because it never knew the agent's job.

This talk closes that gap. We'll trace why every prior access model assumed a stable human actor - and why that collapses when agents delegate to agents. We'll introduce Intent-Based Access Control: decisions that reflect not just what an agent may do, but what it's trying to do right now. We'll cover emerging standards like transaction tokens and richer auth context, plus concrete steps to ship intent-aware access in MCP flows today.
Speakers
avatar for Chandrashekar Haleupparahalli

Chandrashekar Haleupparahalli

Engineering Manager, Motorola Solutions
Engineer Manager of Identity and Access Management, Solving
avatar for Tejas Ladhani

Tejas Ladhani

Software Engineer 2, Motorola Solutions Inc
Tejas Ladhani is a Software Engineer at Motorola Solutions, architecting Agentic AI for mission-critical public safety. He specializes in high-stakes systems where security is foundational and downtime has real-world consequences, from unifying enterprise identity layers to slashing... Read More →
Wednesday June 10, 2026 11:00am - 11:25am IST
Scarlet 1
  Security Identity + Trust

11:25am IST

SEO for Agents: Designing MCP Endpoints That Let Agents Evaluate Each Other Before Transacting - Manav Agarwal, Dream11
Wednesday June 10, 2026 11:25am - 11:50am IST
When humans hire someone, they ask questions first. Check reviews, compare, negotiate. AI agents can't do any of this.

An MCP flight booking server says: "I book flights." Another agent can't ask: How many routes? Success rate? Can you get business class upgrades?

I tore down top MCP servers across mcp.so, Smithery, Glama, PulseMCP. The #1 server has 52K stars but exposes 47 capabilities with zero verifiable metrics. Tool schema: 1,020 tokens of bloat.

The problem: MCP tool schemas describe WHAT but not HOW WELL. No capability layer for agents to evaluate each other before committing.

What's needed — structured capability endpoints:

"I book flights"
→ 147 routes, 96.2% completion, 23% avg savings
→ Business class upgrades: 340 secured, 41% success
→ Savings by route queryable, methodology documented
→ Full transaction log for independent verification

Exposed as MCP resource endpoints —
capability/summary returns structured metrics, capability/evidence/{tool} returns methodology, capability/raw/{tool} returns verifiable logs.

I'll show real endpoint teardowns, what's missing from tool schemas, and a draft capability-metadata spec builders can implement.
Speakers
avatar for Manav Agarwal

Manav Agarwal

Founder & Independent Researcher, AgentProof
Creator of AgentProof, an independent benchmarking and trust analysis project for AI agents. Mapped 10 agent directories containing 1.24M+ listings, deep-dived 3 agent categories, and health-checked 65+ MCP servers. Previously analyzed 14 agentic payment protocols (x402, Stripe ACP... Read More →
Wednesday June 10, 2026 11:25am - 11:50am IST
Scarlet 1
  Security Identity + Trust

11:50am IST

Ambient Identity: Just-in-Time Authorization Patterns for the Model Context Protocol - Ayesha Dissanayaka, WSO2
Wednesday June 10, 2026 11:50am - 12:15pm IST
As the Model Context Protocol (MCP) matures, we face a critical security hurdle: how do ambient agents that are running in the background or on headless devices securely access sensitive resources without constant manual intervention?

Standard OAuth flows often break the "ambient" experience by requiring immediate browser redirects on the same device. This session proposes a decentralized identity architecture using Client-Initiated Backchannel Authentication (CIBA). By decoupling the consumption of resources from the authorization flow, an MCP client can trigger a "just-in-time" permission request directly to a user's trusted mobile device.

Key Takeaways:
- Decoupled Auth: Implementing CIBA to bridge the gap between headless MCP clients and human controllers.
- Just-in-Time delegations: Moving from "all-or-nothing" API keys to granular, session-based permissions.
- Security Patterns: Handling asynchronous "Out-of-Band" callbacks within the MCP lifecycle.

Join us to explore how we can make background agents both powerful and respectful of the "human-in-the-loop" principle.
Speakers
avatar for Ayesha Dissanayaka

Ayesha Dissanayaka

Associate Director / Architect, WSO2
Ayesha is Lead Architect for Identity and Access Management for Agentic AI at WSO2, specializing in securing autonomous AI systems. With over a decade in enterprise IAM, she architects identity solutions for AI agents, bridging traditional frameworks with emerging AI security needs... Read More →
Wednesday June 10, 2026 11:50am - 12:15pm IST
Scarlet 1
  Security Identity + Trust

12:15pm IST

Why Your Database MCP Should Never Talk To Your Database - Gowtham Raj Elangovan, Comcast
Wednesday June 10, 2026 12:15pm - 12:40pm IST
Most database MCP implementations are stdio transport, hardcoded URIs, and live connections handed directly to AI agents. This works on a laptop. It fails in production.
Direct agent-to-database connectivity is dangerous. Connection exhaustion, raw credentials in agent context, DDL one hallucination away, PII returning unfiltered into LLM context windows, runaway queries taking down production clusters. Not theoretical. Production failures waiting to happen.
For our internal DBaaS service we built a two-layer remote MCP architecture to close every one of them. An MCP Proxy handles agent-facing concerns — JWT auth, SSO-backed approvals, rate limiting, and an execution_id registry so no agent ever sees a raw URI. It never touches the database. Queries route through a Query Service — the only layer that does. Read-only enforced structurally, DDL blocked even for root, injection filtered, timeouts enforced, Presidio scrubbing PII before responses reach any agent context window. We contrast this with direct-connect tools, contribute execution_id as a reusable enterprise primitive, and make the case for why an enforcement layer between MCP and your DB is the architecture — not an option
Speakers
avatar for Gowtham Raj Elangovan

Gowtham Raj Elangovan

Engineer 5, Engineering Operations, Comcast
Senior Data Platform & Database Engineering Architect with 13+ years building large-scale, cloud-native, and distributed database systems on-prem and AWS. Expert in autonomous AI-driven optimization, reliability engineering, and platform automation. Proven track record leading teams... Read More →
Wednesday June 10, 2026 12:15pm - 12:40pm IST
Scarlet 1
  Security Identity + Trust

3:20pm IST

Auditing MCP Tool Calls at the Kernel Level: eBPF as a Trust Boundary Enforcer - Harini Anand, IBM
Wednesday June 10, 2026 3:20pm - 3:45pm IST
As MCP servers exponentially proliferate, a critical question emerges: who audits what an LLM actually did when it invoked a tool?

Application-layer logs can be tampered with or missed. This talk argues that eBPF is the only tamper-resistant audit layer for MCP tool execution and shows you how to build it.

We walk through instrumenting an MCP server's syscall surface with bpftrace and cilium/ebpf: capturing every network egress triggered by a tool call, every file descriptor opened, every exec spawned, correlated back to the originating MCP request ID via process lineage tracking in BPF maps.

The result is an immutable, kernel-enforced audit trail that no application-layer bug or prompt injection can suppress.

We'll also cover using eBPF LSM hooks to enforce policy at call time, blocking tool invocations that attempt unexpected network destinations or file paths effectively making eBPF a runtime policy engine for MCP's threat model.

Attendees leave with a working threat model, reference eBPF programs, and a clear mental model for where kernel enforcement fits in MCP's trust architecture.
Speakers
avatar for Harini Anand

Harini Anand

SDE in Data & AI, IBM
SDE at IBM Data & AI, working on IBM watsonx™. Software Engineering Researcher at UIUC. Computational Cognition Researcher at Georgia Institute of Technology. Biomedical XAI Researcher at Dartmouth College.
Formerly at Niramai & IIT Hyderabad, researching ML for breast cancer and gene regulatory networks. Built cognitive tools for dementia prevention as a student entrepreneur. Google KaggleX Mentee, AWS Scholar, Harvard WE Tech Fellow, Oxford & MIT Summer School alumna and a Stanford... Read More →
Wednesday June 10, 2026 3:20pm - 3:45pm IST
Scarlet 1
  Security Identity + Trust

3:45pm IST

Who Let the Agent In? Securing MCP Servers in Production - Prachi Jamdade, Gravitee
Wednesday June 10, 2026 3:45pm - 4:10pm IST
What if your MCP server could confidently decide who gets access to what, without turning your codebase into a security nightmare? In this session, we follow the journey of a simple MCP server as it evolves from an open endpoint into a fully secured, production-ready system. Along the way, you’ll see how authentication actually works in MCP, how to move beyond basic role checks into fine-grained, contextual authorization with OpenFGA, and how these pieces fit together in real-world scenarios. The highlight is a live demo where we lock down an MCP server step by step, making the invisible layers of security visible and practical. By the end, you won’t just understand MCP security, you’ll know exactly how to implement it or even offload it entirely so you can focus on building powerful agent-driven experiences.

Speakers
avatar for Prachi Jamdade

Prachi Jamdade

Developer Advocate, Gravitee
Prachi Jamdade is a Developer Advocate at Gravitee, working at the intersection of developer experience, APIs, AI governance and security. She has worked with multiple startups and shipped global products.
Wednesday June 10, 2026 3:45pm - 4:10pm IST
Scarlet 1
  Security Identity + Trust

4:10pm IST

When Agents Get SSH Keys: Securing Distributed AI Fleet With MCP - Mradul Dubey, ApraLabs
Wednesday June 10, 2026 4:10pm - 4:35pm IST
Agent security discussions focus on prompt injection and sandboxing. But when agents operate on real infrastructure - pushing to Git, executing code via SSH, starting cloud instances - every machine in the fleet carries its own keys, tokens, and credentials, multiplying the risk.

This talk presents the security architecture of apra-fleet, an open-source (Apache 2.0) MCP server that orchestrates AI agents across distributed machines:
- Credential lifecycle: provisioning LLM auth (OAuth, API keys), SSH keys, and Git tokens with automated key-pair migration
- Out-of-band credential entry: passwords collected via separate terminal, never exposed to the LLM. "LLM secure variables" for sensitive text
- Short-lived tokens: GitHub App mints scoped tokens with minute-level TTLs - a compromised session cannot reuse yesterday's token
- Role-scoped permissions: MCP tool constraints make violations structurally impossible - a doer agent cannot call the merge tool
- Encryption at rest

Grounded in production sprints across C++, Node.js, Python, and ML. Attendees leave with reusable patterns for securing multi-agent systems on real infrastructure.
Speakers
avatar for Mradul Dubey

Mradul Dubey

Senior Software Developer, ApraLabs
Mradul is a developer at Apra Labs with over 8 years of experience in ML, edge AI and computer vision. At Apra Labs, he works across the stack from embedded inference to cloud infrastructure. A natural skeptic, his recent focus has shifted to agentic AI - he co-architects to apra-fleet... Read More →
Wednesday June 10, 2026 4:10pm - 4:35pm IST
Scarlet 1
  Security Identity + Trust

5:15pm IST

Beyond Containers: Sandbox Architecture for MCP Tool Execution at Scale - Vikram Vaswani, Self Employed - Consultant
Wednesday June 10, 2026 5:15pm - 5:40pm IST
MCP gives us a clean abstraction for agents calling tools. But it doesn't talk about security: what if the tool does bad things?

For read-only tools returning structured data, a shared-kernel container is fine. For the growing class of MCP servers exposing code execution, the attack surface that produced CurXecute (CVE-2025-54135 and CVE-2025-59944), containers are the wrong primitive, because a single exploit crosses from MCP server to host.

This talk covers what MCP tool execution looks like when you take isolation seriously. It walks through the architectural pattern of scheduling Firecracker microVMs for MCP tool execution - sub-second resume (for chained tool calls and fast-start), minimal kernel configurations, and common integration paths with Kubernetes.

Attendees leave with a decision framework: four signals that isolation complexity is worth it, three signals it's overkill, and a clear mental model of the latency-vs-isolation tradeoff.
Speakers
avatar for Vikram Vaswani

Vikram Vaswani

Developer Advocate, Self Employed - Consultant
Vikram Vaswani is a developer advocate, open source consultant, and technical author with 20+ years of experience helping teams adopt and scale open source technologies. He is the author of seven books published by McGraw-Hill and Pearson, with translations in multiple languages... Read More →
Wednesday June 10, 2026 5:15pm - 5:40pm IST
Scarlet 1
  Security Identity + Trust

5:40pm IST

Multilingual MCP: Making Tool Calling Work for the Next Billion Users - Samyuktha Mohan Alagiri, IBM
Wednesday June 10, 2026 5:40pm - 6:05pm IST
MCP's tool schema, server descriptions, and routing logic are overwhelmingly designed around English. That assumption quietly breaks when you build for users in Hindi, Tamil, Kannada, or Bengali.
This talk is a ground-up look at where MCP falls short for Indic language users and what it takes to fix it. The specific failure modes covered include: intent ambiguity in tool selection when queries arrive in transliterated or code-switched text, embedding models trained on English producing poor similarity scores for Indic-language tool descriptions, and response localization gaps where tool results are returned in English to users who queried in their native language.
The talk then presents concrete patterns for each problem, including translated and dual-language tool manifests, language-aware routing layers that sit between the user and the MCP client, and lightweight post-processing for localizing tool outputs. All patterns are demonstrated with working code from production voice agent systems built for Indian users.
With the MCP Dev Summit landing in Bengaluru, this is a timely and locally grounded conversation the ecosystem needs to have.
Speakers
avatar for Samyuktha M S

Samyuktha M S

Software Developer, IBM
Samyuktha is a Software Developer at IBM India Software Labs who loves building things that actually work in production, from voice agents and multilingual multi-agent pipelines to self-healing infrastructure using MCP, LangGraph, Claude, and Qdrant. A 13x hackathon winner including... Read More →
Wednesday June 10, 2026 5:40pm - 6:05pm IST
Scarlet 1

6:05pm IST

Your MCP Server Answers Every Call. Should It? - Atulpriya Sharma, Improving
Wednesday June 10, 2026 6:05pm - 6:30pm IST
Your MCP server works. Every tool call executes. But do you know who made that call, whether they were allowed to, and whether it should have required a human to approve it first?

Most MCP servers today operate on implicit trust. If an agent can connect, it can run anything - usually without any identity checks, boundaries, or logs. That works in dev. In production, a misconfigured agent or a prompt injection can trigger your most sensitive tools with nothing to stop it.

This session makes the path from 'working' to 'governed' concrete: authenticating agents via OAuth, enforcing per-tool authorisation, and adding human-in-the-loop approvals for high-stakes actions. Live demo: we’ll take an unauthenticated agent, lock down the server, and hold a sensitive call for approval with a full trace on exit.

MCP connects agents to your most important systems; it’s time we started checking their IDs at the door.
Speakers
avatar for Atulpriya Sharma

Atulpriya Sharma

Principal Developer Advocate | CNCF Ambassador, Improving
Manual tester turned developer advocate. I talk about Cloud Native, Kubernetes & DevOps to help others adopt cloud native. I also create content – blog posts, webinars – & host Twitter spaces and strongly believe in collaborative learning and growth.

In addition, I'm also a CNCF Ambassador and the organizer of CNCF Hyderabad. When I am not working, I’m a food & travel blogger & love exploring eateries & going on road trips. You can find me at @TheTechMaharaj on Twitter... Read More →
Wednesday June 10, 2026 6:05pm - 6:30pm IST
Scarlet 1
  Security Identity + Trust
  • Audience Experience Level Any
 
  • Filter By Date
  • Filter By Venue
  • Filter By Type
  • Audience Experience Level
  • Timezone

Share Modal

Share this link via

Or copy link

Filter sessions
Apply filters to sessions.
Filtered by Date -