Visible over MCP
{
"service": "github",
"allowedDomains": ["api.github.com"],
"permittedOperations": ["http.get"],
"userContext": "Human explanation",
"llmContext": "Use for repo metadata and rate-limit reads"
}
MCP behavior
KeyLore works well with MCP-style interactions because MCP clients often need a structured way to discover resources and invoke tools. In this model, credentials are not dumped into process environment state for the agent to read.
Model-visible contract
MCP clients are especially sensitive to interface design. If the only interface to credentials is a flat list of env vars, the agent must infer intent from weak signals. KeyLore gives that interaction a better structure: searchable metadata for discovery, brokered access for use, and a clearer separation between model context and secret material.
{
"service": "github",
"allowedDomains": ["api.github.com"],
"permittedOperations": ["http.get"],
"userContext": "Human explanation",
"llmContext": "Use for repo metadata and rate-limit reads"
}
{
"rawToken": "not exposed",
"secretBinding": "not exposed",
"envDump": "not part of the flow"
}