Related: Endpoint Tool Generation, Filtering Endpoints
Two strategies when sanitized names collide:
| Mode | Example |
|---|---|
| suffix | _2, _3 appended |
| hash | _a1b2c3 (stable 6-char SHA256) |
Hash mode reduces drift if operation order changes.
Next: Credential Store.