Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      The AI productivity paradox in software engineering: Balancing efficiency and human skill retention

      July 2, 2025

      The impact of gray work on software development

      July 2, 2025

      CSS Intelligence: Speculating On The Future Of A Smarter Language

      July 2, 2025

      Hallucinated code, real threat: How slopsquatting targets AI-assisted development

      July 1, 2025

      Xbox is cancelling Rare’s ‘Everwild’ and ZeniMax’s new MMORPG IP as part of broader cuts — with ‘Perfect Dark’ impacted as well

      July 2, 2025

      Microsoft is closing down Xbox studio The Initiative, with Perfect Dark killed as well — joining Everwild and ZeniMax’s new IP, and other unannounced projects

      July 2, 2025

      No, Microsoft and Xbox’s Phil Spencer isn’t stepping down any time soon — here’s the truth

      July 2, 2025

      Everwild’s cancellation has me worried for one of my favorite dev teams and Xbox itself — It needs creative new games to thrive and refresh its identity

      July 2, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Trust but Verify: The Curious Case of AI Hallucinations

      July 2, 2025
      Recent

      Trust but Verify: The Curious Case of AI Hallucinations

      July 2, 2025

      From Flow to Fabric: Connecting Power Automate to Microsoft Fabric

      July 2, 2025

      Flutter Web Hot Reload Has Landed – No More Refreshes!

      July 2, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Xbox is cancelling Rare’s ‘Everwild’ and ZeniMax’s new MMORPG IP as part of broader cuts — with ‘Perfect Dark’ impacted as well

      July 2, 2025
      Recent

      Xbox is cancelling Rare’s ‘Everwild’ and ZeniMax’s new MMORPG IP as part of broader cuts — with ‘Perfect Dark’ impacted as well

      July 2, 2025

      Microsoft is closing down Xbox studio The Initiative, with Perfect Dark killed as well — joining Everwild and ZeniMax’s new IP, and other unannounced projects

      July 2, 2025

      No, Microsoft and Xbox’s Phil Spencer isn’t stepping down any time soon — here’s the truth

      July 2, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»News & Updates»5 ways to transform your workflow using GitHub Copilot and MCP

    5 ways to transform your workflow using GitHub Copilot and MCP

    July 2, 2025

    Traditional AI coding assistants typically operate in isolation, limited to the code in your current workspace. Now with the introduction of the Model Context Protocol (MCP), AI development workflows are further evolving to incorporate more tools and context. 

    MCP can enable AI assistants to interact with external systems like knowledge bases, data stores, and testing applications.

    What is MCP, anyway?

    The Model Context Protocol (MCP) is an open standard developed by Anthropic that helps AI assistants like GitHub Copilot securely connect to external data sources and tools. MCP addresses a common challenge with Large Language Models (LLMs): providing the right context to generate accurate and useful responses. MCP standardizes how AI tools access external context—such as your codebase, documentation, or design specifications—and makes it easier to bring this context into your development workflow. For a deeper dive into MCP and why it’s gaining popularity, check out Cassidy Williams’s article on the GitHub Blog.

    The real value of MCP integration is that you can now perform tasks that previously required multiple tools, context switching, and manual effort—all directly in your IDE. That means you can save time, maintain focus, and ship code faster.

    In this article, we’ll explore five practical ways MCP integrations with GitHub Copilot can streamline your workflow. We’ll follow a realistic scenario: implementing a secure JWT (JSON Web Token) authentication system for a web application, illustrating an end-to-end workflow with MCP.

    Let’s jump in. 

    1. Using MCP to bridge design and development with Figma 

    The gap between design and development has long been a source of friction in product teams. MCP provides a standardized way for GitHub Copilot to securely access and interpret design specifications directly. 

    Instead of manually translating design details into code, MCP enables Copilot to automatically retrieve exact design parameters—such as colors, spacing, typography, and component states—and generate accurate, ready-to-use code. This integration reduces guesswork and streamlines the handoff between designers and developers.

    Explore GitHub Copilot’s agentic capabilities

    GitHub Copilot comes with two powerful agentic workflows that can be used with MCP:

    • Agent mode (in your IDE): Turn Copilot Chat into a real-time collaborator that works with you. Give it a goal (“add OAuth & tests”), and it plans, edits files, runs the suite, reads failures, fixes them, and loops until everything is green—all right in front of you, with the option to pause or steer at any step.
    • Coding agent (in your GitHub projects): Hand an Issue to Copilot and walk away. It spins up a protected workspace with GitHub Actions, writes code, runs linters/tests, and opens a pull request for you to review. Perfect for well-scoped tickets you’d give a junior dev (docs, tests, small refactors) while you stay focused elsewhere. 

    TL;DR: Think of Agent mode as a co-driver at your keyboard; the Coding agent is the valet that brings the finished work to your repo.

    Learn more >

    We’ll start developing our new JWT authentication system by taking a look at the user-facing side. Let’s say the design team updated the authentication UI components in Figma, including login forms, error states, loading spinners, and success messages. Now, you need to implement these changes to match the new design system.

    Start by asking Copilot, “What are the latest design updates for the login form and authentication components?” It will then retrieve specs for the elements that need to change. Then you can prompt it to create React components for each element:

    • LoginForm with exact spacing, colors, typography
    • AuthErrorMessage component with proper error styling
    • TokenRefreshNotification component

    Copilot will then give you ready-to-use code that maintains consistency with the design specifications from Figma.

    Learn more about Figma’s MCP server beta >

    2. Tap into your Obsidian knowledge base with MCP

    When implementing complex features like JWT authentication, you often need to reference past decisions, architectural notes, and research findings scattered across your knowledge base. The unofficial, community-maintained Obsidian MCP server bridges this gap by connecting GitHub Copilot directly to your Obsidian vault.

    Let’s say you’re implementing JWT token validation and need to understand your team’s previous security decisions. You tell Copilot: “Search for all files where JWT or token validation is mentioned and explain the context.”

    With that, Copilot can:

    • Search across all Markdown files in your vault for relevant security patterns
    • Retrieve contents from specific architecture decision records (ADR)
    • Access meeting notes from previous security reviews
    • Pull implementation guidelines from your team’s coding standards

    You might follow up with the following prompt: “Get the contents of the last architecture call note about authentication and summarize the key decisions.” Copilot will locate the relevant file and extract the critical information you need to inform your implementation approach.

    Once you’ve gathered the necessary context, you can ask Copilot to synthesize this information: “Create a new note called ‘jwt-implementation-summary.md’ that combines our authentication standards with the new JWT approach.” Copilot will create this documentation directly in your vault, helping maintain your team’s knowledge base.

    Setup note: This integration requires the community “Obsidian Local REST API” plugin and an API key.

    With your research complete and documented, you can proceed to test your application.

    Learn more about accessing Obsidian through MCP >

    3. Test your code with Playwright

    Integrating MCP with Playwright transforms test creation from a manual, error-prone process into a simple, guided experience.

    Modern web applications often involve complex user journeys, asynchronous operations, and dynamic content. Authentication flows are particularly challenging to test comprehensively.

    Continuing with our JWT authentication system, you need to test the complete authentication flow including login, token refresh, and secure route access. To do this, you’ll start by giving Copilot a prompt like this: “Test the JWT authentication flow including login, automatic token refresh, and access to protected routes.”

    From there, Copilot will analyze your authentication implementation and generate comprehensive test coverage. But it doesn’t stop there. Copilot then runs the tests with Playwright and provides immediate feedback on failures, suggesting fixes for common issues, like timing problems or selector changes.

    Learn more about the Playwright MCP server >

    4. File pull requests faster

    Pull requests are the cornerstone of collaborative development. GitHub’s remote MCP server, now in public beta for VS Code or Visual Studio, helps transform the process into an intelligent, automated workflow.

    Turning back to our JWT authentication example, you can prompt Copilot: “Create a pull request for my authentication feature changes”

    Copilot will then analyze:

    • Code changes across multiple files  
    • Related issues and project context  
    • Team review patterns and expertise areas  
    • Previous similar implementations

    Copilot returns Markdown with an overview, changes made, a testing strategy, and even related issues.

    It will then suggest appropriate reviewers for each aspect of the change based on code ownership, expertise mapping, and current workload.

    Once your application is deployed, you can move on to monitoring it.

    Get started with GitHub’s MCP server >

    5. Monitor application performance

    With the core authentication logic handled, now it’s time to ensure that our application performs well by monitoring how it behaves in production. Using MCP to connect to Grafana through the open-source Grafana MCP server makes this easier—though setup requires a few configuration steps.

    Let’s say you need to analyze the JWT authentication system’s latency metrics and error rates. You tell Copilot: “Show me auth latency and error-rate panels for the auth-service dashboard for the last 6 hours.”

    After configuring the Grafana MCP server with your API key and host URL, Copilot can then query your Grafana instance to:

    • Examine authentication latency metrics and p95 response times
    • Analyze error rates for login endpoints over time
    • Review existing alert rules for authentication services
    • Identify patterns in failed authentication attempts

    Copilot returns panel data as base64-encoded images and can extract raw time-series data when needed. If you need a longer time range, you can specify: “Show me the same metrics for the last 24 hours” and Copilot will adjust the query parameters accordingly.

    For more advanced monitoring workflows, you can enable write operations by launching the server with the --enable-write flag and an Editor-role API key. This allows Copilot to create new alert rules or modify dashboard configurations based on your authentication metrics analysis.

    Learn more about the Grafana MCP server >

    What’s next?

    Before diving into these powerful integrations, you’ll need to configure your development environment. Here’s how:

    1. Install MCP extensions: Enable MCP support in your IDE through official extensions
    2. Configure API access: Set up authentication for each service (GitHub, Obsidian, Figma, etc.)
    3. Define context boundaries: Establish what information should be accessible to AI
    4. Security considerations: Implement proper access controls and data privacy measures

    A few best practices:

    • Start small: Begin with one integration and gradually expand your usage
    • Maintain documentation: Keep your knowledge bases and documentation current for optimal AI assistance
    • Regularly review Copilot’s outputs: Periodically audit AI-generated suggestions to ensure quality and security
    • Build team alignment: Ensure your team understands and adopts consistent MCP usage patterns

    The five integration patterns we’ve explored represent just the beginning of what’s possible. As MCP’s ecosystem grows, new tools and integrations will continue to expand what’s possible.

    Get started with our remote MCP server >

    The post 5 ways to transform your workflow using GitHub Copilot and MCP appeared first on The GitHub Blog.

    Source: Read More 

    Facebook Twitter Reddit Email Copy Link
    Previous Articlefnt – apt for fonts
    Next Article ddotlp – smart power management

    Related Posts

    News & Updates

    Xbox is cancelling Rare’s ‘Everwild’ and ZeniMax’s new MMORPG IP as part of broader cuts — with ‘Perfect Dark’ impacted as well

    July 2, 2025
    News & Updates

    Microsoft is closing down Xbox studio The Initiative, with Perfect Dark killed as well — joining Everwild and ZeniMax’s new IP, and other unannounced projects

    July 2, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    CVE-2025-20666 – “Modem Rogue Base Station Denial of Service Vulnerability”

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-52486 – DNN TokenReplace URL Sanitation Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-47096 – Adobe Experience Manager Arbitrary Code Execution Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Google Chrome 0-Day Vulnerability Exploited in the Wild to Execute Arbitrary Code

    Security

    Highlights

    CVE-2024-48905 – Sematell ReplyOne Authentication Bypass

    May 1, 2025

    CVE ID : CVE-2024-48905

    Published : May 1, 2025, 9:15 p.m. | 2 hours, 11 minutes ago

    Description : Sematell ReplyOne 7.4.3.0 has Insecure Permissions for the /rest/sessions endpoint.

    Severity: 0.0 | NA

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    runrestic is a wrapper script for restic

    April 16, 2025

    Critical RCE in MCP Inspector Exposes AI Devs to Web-Based Exploits (CVE-2025-49596)

    June 30, 2025

    BorgWarehouse is a fast and modern WebUI for BorgBackup

    May 2, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.