MCP's semantics gap
In plain MCP, get_user and drop_database are structurally identical. The only clue about safety
or intent is the human-written description field.
MCP-AQL adds semantic routing on top of MCP transport, so operation intent is explicit at the protocol layer instead of buried in tool descriptions. Clients can distinguish safe reads from destructive deletes by endpoint alone, while cutting tool-definition token overhead by about 85-96%.
MCP-AQL makes operation intent visible at the protocol layer, keeps discovery runtime-driven, and gives clients enough structure to reason about safety without guessing from prose.
In plain MCP, get_user and drop_database are structurally identical. The only clue about safety
or intent is the human-written description field.
In MCP-AQL, routing an operation to READ guarantees side-effect-free intent, while routing to
DELETE declares destructive intent at the protocol layer.
Clients, LLMs, and policy systems can make decisions from the endpoint alone instead of burning tokens trying to infer behavior from descriptive text.
The fastest way to understand why the protocol exists is to look at the registration footprint. MCP-AQL moves capability discovery to runtime, so clients do not pay the full schema cost up front for operations they may never use.
| Configuration | Approximate token cost | Reduction | What the client gets |
|---|---|---|---|
| Discrete tools (50+) | ~30,000 tokens | Baseline | Every tool definition loaded up front |
| CRUDE mode (5 endpoints) | ~4,500 tokens | ~85% | Semantic endpoints plus runtime discovery |
| Single mode (1 endpoint) | ~1,100 tokens | ~96% | One routed entrypoint plus runtime discovery |
The deeper discovery math lives in the spec too: the introspection guide models a typical path dropping from about 29,600 tokens for discrete tools to about 2,600 total for MCP-AQL plus on-demand introspection over ten operations.
Start here for the shortest path from the core idea to the draft spec, operational rules, and current launch posture.
Start with the semantics gap, token-efficiency story, and introspection-first request flow before dropping into the full draft.
Read the public summaries for semantic routing, structured errors, safety controls, and conformance boundaries.
Use the launch and roadmap pages to see what is publish-ready versus what is still explicitly open in the spec.
Explore the protocol by core behavior, safety model, validation surface, implementation guidance, and ecosystem reference material.
See where MCP-AQL aligns with familiar patterns, and where its semantic routing and runtime discovery make it different.
MCP-AQL is a protocol layer on top of MCP transport, not a replacement. The difference is semantic endpoints, runtime discovery, and built-in safety classification instead of prose-only intent.
Read the guided explanationBoth use runtime discovery, but GraphQL requires a schema language and type system. MCP-AQL keeps the existing MCP transport and adds semantic routing without introducing a new SDL.
Open the comparison guideREST uses HTTP verbs for semantics. MCP-AQL applies a similar idea to the MCP tool layer, where HTTP verbs do not exist, so intent stays visible even when everything would otherwise look like an undifferentiated tool call.
See the detailed comparisonRead the canonical spec material on-site, with the same navigation and search used across the rest of the documentation portal.
MCPAQL/spec/docs.Reference adapter architecture, runtime, testing, and ADR material are available on-site alongside the protocol docs.
These live spec issues still shape compatibility claims, launch language, and what the public draft can promise today.
Each repository has a specific role in the protocol, reference implementations, tooling, and launch readiness work.
Normative protocol text, schemas, and versioned draft authority.
Open RepositorySchema-driven dispatch, runtime architecture, and plugin contracts in practice.
Open Adapter DocsPattern examples and candidate public adapters for launch-phase demonstration.
Open RepositoryOutput policy, provenance, and generation constraints for derived adapters.
Open RepositoryConformance CLI and on-spec validator workstream for third-party implementations.
Open RepositoryPublic-facing browse and search layer for protocol launch and post-launch evolution.
Open RepositoryStart from the adapter-pattern hub, then move into the specific environment pages that match the target system you are adapting.
Top-level guide to choosing the right target-system pattern before diving into the child pages.
Native MCP server consolidation patterns.
Permission-aware local execution boundaries.
Application APIs mapped into semantic operations.
External API adaptation with quota and resilience posture.
Web retrieval and action orchestration guidance.