Does the description disclose side effects, auth requirements, rate limits, or destructive behavior?
Annotations indicate this is a non-readOnly, non-destructive, non-idempotent, open-world operation. The description adds that it's an authorization action for security group ingress, implying it modifies network access rules, which aligns with annotations. However, it doesn't disclose critical behavioral details like permission requirements, potential side effects on existing rules, or rate limits, leaving gaps despite annotations.
Agents need to know what a tool does to the world before calling it. Descriptions should go beyond structured annotations to explain consequences.