This is the second ticket I have to open with their support in the last month alone to solve this exact problem. It's also being abused by the same well-known group of GitHub users too.
Posts by Den Delimarsky
To this day, it baffles me that @github.com cannot solve the domain squatting issue with GitHub Pages.
If you register a custom domain and set its DNS settings to point to GitHub Pages, but between that point and you setting it in the repo someone sets it to their repo... they just can do that?
A keychain that says “MCP Inside” in old-school Intel-style logo.
Ran into @aparker.io and that led to me now being a proud owner of this gem.
It’s going to be an awesome time - see you there!
A photo of New York City at night.
We’re about to kick off a whole week of MCP goodness in NYC 🗽
Bluesky is made with AI, the engineers and even some non-engineers use Claude code
Here's the best way for me to explain how fast the MCP SDK for Python is growing.
I prefer not to have my illusions bursted 😂
To this day, I am still fascinated by just how much the MCP TypeScript SDK is downloaded DAILY.
One thing I'm really proud of with MCP is that we actually document the security stuff that can go wrong instead of pretending it doesn't exist.
if you're building with MCP auth, the guide we have on the public docs is genuinely worth a read: dsc.ai/sbp
Inventing AI was worth it just for the DataDog MCP
MCP context management is a solved problem.
I mean, look at the work that we deployed for the Claude platform (it's used across Claude, Cowork, and Claude Code) and the impact it had.
👉 dsc.ai/tst
Full production release 🙌
Yes!
Ya know what makes your Monday? Claude Code now supports CIMD for MCP OAuth ✨
If your MCP server uses Client ID Metadata Documents, Claude Code discovers and handles it automatically. No funky registration dance or manual client setup!
In case you're not yet using Claude Code: dsc.ai/clc
There are two ways to get things rendered now - one which is a HTML artifact in sidebar (it produces a file for you), and another which is basically MCP Apps-generated UI based on your prompt (still HTML under the hood, but the intent is visualization). The latter we just launched.
I haven't blogged in 8 years. I broke my streak today. Have a look, if you care to do so.
brianpeek.com/ai-types-fas...
If you're building MCP clients, CIMD is worth diving into (Bluesky uses it too).
Your client hosts a JSON doc at an HTTPS URL, that URL becomes the client ID.
It eliminates the need for registration endpoints and the DCR dance. DCR is now the fallback, not the default.
Full spec: dsc.ai/mcpauth
One more about MCP (I'm on a roll today)!
MCP tool annotations are hints, not guarantees. A server can claim readOnlyHint: true and delete your files anyway.
So what are they good for?
✅ Confirmation prompts
🔍 Reasoning about tool combinations
🏢 Feeding policy engines
More details 👉 dsc.ai/mcpta
Bet you didn't know MCP supports extensions 🧩
🧱 Additive layers on top of core
🖥️ MCP Apps already GA - fun interactive UIs in the chat window
🔐 Auth extensions add Client Credentials + Enterprise-Managed Auth on top of core OAuth
🗳️ Extensions are how future spec changes get proven out
dsc.ai/mcpe
OH I MISSED THIS HAPPENING claude.com/blog/1m-cont...
didn't realise that they'd removed the premium for long context! I'd been artificially turning long context back off because I thought it was extra usage or extra expensive!
The 2026 MCP roadmap is here!
🚇 Transport scalability - horizontal scaling + .well-known discovery
🤝 Agent comms - Tasks lifecycle fixes
🏛️ Governance - contributor ladder + WG delegation
🏢 Enterprise readiness - auth, audit, gateways
Transport stuff is likely most interesting.
dsc.ai/mcpr26
It’s only MCP if it’s artisanally crafted in the Anthròpique region of France.
Otherwise it’s just a sparkling API.
Easier MCP enablement is a win in my book 🎉 Congrats on the ship, @hrcd.fr!
Love to see more and more MCP adoption across the industry.
I recorded an explainer of my brick builder MCP server (powered by MCP Apps, of course) 🧱
www.youtube.com/watch?v=voU0...
Amazing!
This is a fair assessment, but I think it also extends beyond MCP.
The same way you wouldn't "Log in with Google" to a third-party API/website you don't trust, you should not be authorizing third-party MCP servers you do not trust to handle your data in accordance with your expectations.
You're specifically looking at removing through the interactive dialog?
Welcome!