[mcp-analysis] MCP Structural Analysis - 2026-02-10 #14764
Closed
Replies: 1 comment
-
|
This discussion was automatically closed because it expired on 2026-02-17T11:25:10.949Z.
|
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
Analyzed 12 GitHub MCP tools for response structure and usefulness. Average rating: 4.00/5 — most tools are well-designed for agentic work. Key findings: security tools return massive payloads (95KB), some REST endpoints ignore pagination, while GraphQL-based tools deliver optimal structure. Three tools flagged for improvement.
Full Structural Analysis Report
Executive Summary
Usefulness Ratings for Agentic Work
Schema Analysis
Response Size Analysis
Tool-by-Tool Analysis
30-Day Trend Summary
Notable Changes:
list_issuestoken count increased from 650 → 1,650 (154% increase) due to richer issue body content in latest analysislist_pull_requeststoken count increased from 2,800 → 4,650 (66% increase) with full repo duplicationlist_workflowstoken count increased from 3,200 → 3,900 (22% increase)list_code_scanning_alertssaw massive increase from unmeasured → 23,800 tokens on first full testRecommendations
🟢 High-Value Tools (Rating 4-5, recommend for frequent use):
get_file_contents,list_branches,get_label— ultra-efficient, minimal contextlist_issues,list_discussions— excellent GraphQL structuresearch_repositories,list_commits— well-balanced metadata🟡 Use with Caution (Rating 3, context-heavy):
list_pull_requests— consider using minimal fields orgetsingle PR instead of listlist_workflows— pagination broken, consider filtering by namesearch_issues— preferlist_issueswith filters when possible🔴 Needs Improvement (Rating 1-2):
list_code_scanning_alerts— add filtering parameters, respect pagination, reduce payload sizeget_me— fix permissions for GitHub Actions integration context💡 Context-Efficient Alternatives:
list_pull_requests→ usesearch_pull_requestswith minimal fieldslist_code_scanning_alerts→ add severity/state filters to reduce payloadlist_workflows→ useget_workflowwhen workflow name is knownVisualizations
Response Size by Toolset
Analysis: Security toolset dominates with 23,800 tokens average. Actions and pull_requests toolsets are also heavy (3,900-4,650 tokens). Repos, discussions, and labels toolsets are highly efficient (<500 tokens average).
Usefulness Ratings by Toolset
Analysis: Most toolsets score 4+ (good to excellent). Security and context toolsets score lower due to oversized payloads and permission errors respectively. Green bars (repos, discussions, labels, issues, search) indicate excellent agentic workflow support.
Daily Token Trend (30-Day Window)
Analysis: Token usage increased significantly from Feb 6 (12,750 tokens) to Feb 10 (37,725 tokens) — a 196% increase. This reflects deeper testing including security alerts and larger issue/PR payloads. Trend suggests response sizes are growing as more complete data is returned.
Token Size vs Usefulness Scatter
Analysis: Sweet spot is top-left quadrant (low tokens, high usefulness). Most repos, search, discussions, and labels tools cluster here. Security and pull_requests tools sit in the bottom-right (high tokens, lower usefulness). Ideal tools for agents are those rated 5 with <500 tokens.
References: §21862776279
Beta Was this translation helpful? Give feedback.
All reactions