MCPMay 11, 2026 · 6 min read

MCP Tool Search for database agents: discovery is not permission design

MCP Tool Search is a useful correction to one of the first production problems teams hit with agents: too many tools in context.

Instead of loading every tool definition into every conversation, the client can discover relevant tools on demand. That reduces token waste, lowers confusion, and makes large tool catalogs more practical.

But for database-connected agents, discovery is only half the problem.

The harder question is not “can the model find the right tool?” It is “what is the tool allowed to do once it is found?”

Tool discovery changes the failure mode

Without Tool Search, a model can be overwhelmed by dozens or hundreds of tool definitions. It may pick the wrong operation, miss a relevant tool, or spend too much of the context window reading schemas instead of solving the user’s task.

With Tool Search, the agent can retrieve a smaller set of relevant tools. That is better.

But it also means tool metadata becomes part of the discovery layer. Names, descriptions, tags, and schemas influence which capabilities appear in front of the model.

If those descriptions are vague, overly broad, or missing risk signals, the agent may still discover the wrong thing at the wrong moment.

Related: MCP tool descriptions are a security boundary.

Database tools should be discoverable by workflow, not table

A common mistake is exposing database access around raw technical objects:

  • run_sql
  • query_table
  • get_rows
  • execute_statement

Those tools are easy to build, but they force the model to reason from an overly broad action space.

For production workflows, database MCP tools should be organized around business-safe operations:

  • get_monthly_revenue_summary
  • list_overdue_invoices
  • find_customers_with_usage_drop
  • get_support_escalation_context

The difference matters. Tool Search can help the model find a relevant capability, but the capability itself should already be constrained.

A discovered tool should not become a shortcut around the permission model.

Permission design still happens outside the prompt

Prompts can guide behavior. They should not be the only control.

For database MCP servers, permissions should be enforced outside the model:

  • read-only roles by default,
  • approved views instead of raw production tables,
  • row limits and timeouts enforced by the server,
  • field-level redaction where needed,
  • separate tools for read, draft, approve, and write actions,
  • audit logs for every tool call.

Discovery should reveal only tools the user, workflow, and environment are allowed to use.

Related: Secure AI database access checklist.

Good tool search needs good metadata

Tool Search depends on metadata quality. That means MCP servers should treat tool names and descriptions like production interfaces.

Useful metadata answers questions such as:

  • What business question does this tool answer?
  • Is it read-only, write-capable, or approval-gated?
  • Which data source or approved view does it use?
  • What limits are enforced?
  • When should the model not use it?

This is not fluff. It helps the agent select the right capability and helps humans review the exposed surface area.

Related: MCP vs REST API for AI agents.

Where Conexor fits

Conexor is MCP infrastructure for AI-ready engineering teams. It connects databases and APIs to MCP-compatible clients like Claude, ChatGPT, Cursor, n8n, Continue, and others.

For teams moving MCP into production, Tool Search can make large environments easier to use. But the foundation still matters: narrow tools, scoped credentials, explicit metadata, and reviewable audit trails.

Discovery should make safe capabilities easier to find. It should not make unsafe capabilities easier to reach.

Explore MCP server setup →

Relay

Quick questions

Relay

Quick questions

Ask me