Monday, May 11, 2026
HomeTechnologyThe Case for AI Device Registries – O’Reilly

The Case for AI Device Registries – O’Reilly

As enterprise AI agent adoption scales, the absence of centralized, organization-level software infrastructure is producing compounding prices. When adoption is constructed round optimizing for deployment pace, enterprises expose themselves to a mixture of dangers: duplicated engineering effort, safety publicity, and operational opacity.

Each enterprise wants its personal shared software registry, one which displays its particular regulatory surroundings, safety posture, and operational conventions. To be clear, this isn’t an argument for a public bundle supervisor, one thing like npm, PyPI, or Maven. The infrastructure every enterprise wants is inside; scoped to its personal groups, its personal information, its personal insurance policies, its personal area. Attempting to increase the scope past the confines of particular person organizations could be untimely standardization in a fast-moving, nascent area.

A shared enterprise software registry just isn’t an optimization or a nice-to-have. It’s foundational infrastructure as agent deployments scale past early experiments. The case for it rests on two pillars: decreasing coordination value and enabling threat administration, each for the people constructing with brokers and for the brokers themselves.

AI brokers rely on instruments that retrieve information, write data, set off workflows, and name exterior APIs. In response to McKinsey, in most massive organizations these instruments are constructed by particular person groups in an advert hoc style: undocumented, ungoverned, and invisible to the remainder of the group. This sample is acquainted to most engineering leaders, and the fragmentation it creates compounds with each new agent deployment. Groups rebuild what already exists elsewhere, safety opinions miss instruments that had been by no means registered, and when one thing breaks, nobody has an entire image of what’s working or why.

A coordination failure at infrastructure scale

The software program trade solved an identical drawback a long time in the past with bundle managers. Centralized registries gave groups a option to uncover, rely on, and govern shared code. The educational was clear: stopping duplication and inconsistency is an infrastructure drawback, not a self-discipline drawback.

The agent period presents the identical drawback in a brand new area. When Kong launched its enterprise MCP Registry in February 2026, they explicitly referred to as out the issues of guide MCP configuration, hardcoded and managed software isolation throughout groups, fragmented integrations, and restricted group visibility.

Fragmented software growth just isn’t a consequence of poor engineering follow. Moderately, it’s the predictable end result of asking groups to unravel an infrastructure drawback on the software layer.

The visibility drawback

Gravitee’s ”The State of AI Agent Safety 2026” survey quantifies what occurs when agent tooling is invisible to the individuals chargeable for securing it. The survey discovered that solely 14.4% of groups with brokers past the planning part have full safety approval, and 88% of organizations had an agent-related safety incident this 12 months. Dangerous practices like shared API keys are endemic, with solely 22% of organizations treating brokers as impartial identities. This governance hole transforms brokers from productiveness boosters into high-velocity liabilities able to executing unauthorized actions or leaking delicate information earlier than a human may even intervene.

The story is evident: adoption is outpacing governance, and in a race for pace previous classes are having to be retaught. Nearly all of deployed brokers (and the MCP servers powering them!) are working with none safety sign-off. This isn’t primarily a resourcing failure, and it’s not one thing a registry alone solves. Safety groups can not evaluate what they can’t uncover, and with out a registry, discovery is guide, incomplete, and rancid. A registry doesn’t make instruments inherently safe; relatively, it makes safety work potential by guaranteeing instruments exist not as transitory, advert hoc shims, however relatively as inventoried artifacts that audits and coverage can connect to.

It’s price revisiting public bundle managers right here. These registries haven’t been capable of remove plenty of safety issues, points similar to typosquatting, malicious packages, and dependency confusion, exhibiting clearly that centralization alone just isn’t a safety resolution. However in addition they present the converse: a registry is a precondition for safety. Quite a few neighborhood responses to breaches in these ecosystems show the facility centralization offers. Centralization doesn’t assure safety, however decentralization forfeits the means to coordinate it.

Governance requires shared context

The default posture in most agent deployments is permissive: instruments can be found until explicitly blocked. AgilityFeat’s evaluation of enterprise AI guardrails identifies the structural threat this creates, since an structure not constructed on deny-by-default will increase threat and creates maintenance prices.

Permit-by-default, replicated throughout dozens of impartial agent deployments, produces an assault floor that scales with adoption. Inverting this requires a coordination level, a shared, organization-wide context. The registry itself isn’t a governance layer, however it’s what makes governance potential. When each software an agent can use is registered with possession, model, and evaluate standing, the governance layer has one thing concrete to implement towards. With out that context, coverage must be reimplemented by each consuming group, and consistency turns into not possible.

Frontegg’s framework for AI agent governance describes what that coverage layer appears like operationally: agent actions mapped to express, granular guardrails that outline the operational boundaries for what any agent can try or execute. These guardrails dwell outdoors the registry, however they rely on it. A guardrail that references a software the safety group has by no means heard of can’t be written within the first place.

What a production-grade software catalog requires

A mature enterprise software registry has two core capabilities, discovery and versioning, and serves as the inspiration for 2 others: certification metadata and entry management. Consider it as an Inside Developer Portal (IDP) constructed for the agent period, fixing the identical coordination drawback that IDPs solved for service groups however one layer up.

Discovery permits any group constructing an agent to seek for present instruments earlier than writing new ones. With possession metadata, model historical past, and utilization metrics centralized, duplication is decreased not via mandate however via decreased friction. A well-designed catalog goes additional than a flat record: instruments needs to be grouped hierarchically by useful area in order that each people and brokers can discover related capabilities shortly.

Versioning closes a spot that neither discovery nor entry controls handle: When agent habits adjustments, why did it change? A software registry that tracks variations offers enterprises the visibility to reply that query. Was it the mannequin? A software immediate replace? An underlying API change? With out correct versioning, discovering the reply goes from a easy diff comparability to a time-consuming, guide investigation.

Certification standing (issues like safety approval, API contract validation, PII dealing with checks) is metadata that the registry surfaces, not a boundary that the registry itself enforces. The precise evaluate work occurs via the safety group’s present tooling. The registry’s contribution is making the results of that evaluate seen in the mean time a group is deciding whether or not to undertake a software, guaranteeing the evaluate really informs the choice it was meant to tell.

Entry management works the identical manner. A coverage layer enforces authorization scoped to agent id, group, surroundings, and motion sort, studying from the registry to know what instruments exist and who owns them. The registry’s centralization lets entry management be utilized persistently, relatively than forcing every group to provide you with one thing bespoke.

None of that is achievable when every group maintains its personal remoted tooling stack. Platform groups already perceive why IDPs exist. The worth of the paradigm within the agent context isn’t any totally different.

The compounding value of inaction

The price of inaction is direct, not merely operational and security-related. With no searchable, well-organized catalog of instruments, groups frequently reinvent the wheel, since it’s simpler to generate a software than to seek out one which already exists. Duplication means redundancy and technical debt. A registry, by making instruments discoverable and reusable, converts that redundant spend into capability for precise work.

For platform engineering groups, the trajectory is evident. Agent adoption is growing, software duplication is growing with it, and the shims that labored at small scale won’t maintain because the variety of brokers and instruments grows. The safety publicity documented within the Gravitee survey will widen, not slim, with out structural intervention.

The organizations that construct centralized software infrastructure now will be capable of onboard new brokers shortly, govern them persistently, and audit them when one thing goes unsuitable. People who defer will rediscover, the laborious manner, what platform groups discovered a decade in the past: coordination issues don’t resolve themselves on the software layer. They compound there.

RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Most Popular

Recent Comments