Problem
The REST API has slowapi rate limiting (#4, done). The MCP server has no rate limiting. An agent in a tight loop — or a malicious actor on the demo site — could hammer the server with unlimited requests. This blocks the demo site and any public-facing deployment.
Solution
Add rate limiting to MCP tool handlers, reusing the tier-based approach from the REST API.
Configuration
```yaml
pyrite.yaml
mcp: rate_limits: read: 100/minute # search, get, list operations write: 30/minute # create, update, bulk_create admin: 10/minute # kb_manage, kb_commit, kb_push ```Implementation
Demo Site Specifics
Prerequisites
Success Criteria
Launch Context
Blocker for demo site. Small effort — patterns already exist in the REST API layer. Just needs to be applied to MCP tool handlers.