Enforce policies on every tool call to the GhostQA MCP Server. 3 tools with suggested default rules ready to customise.
Last updated:
This policy includes sensible default rules. Download it, adjust the limits to match your use case, and run with Intercept.
# Download policy with default rules
curl -o ghostqa.yaml https://raw.githubusercontent.com/policylayer/intercept/main/policies/ghostqa.yaml # Run with Intercept
intercept --policy ghostqa.yaml -- npx -y @ghostqa Server documentation: https://github.com/SyncTek-LLC/ghostqa
This policy includes suggested default rules for common use cases. Adjust rate limits, add argument validation, or remove rules you don't need.
version: "1" description: "Policy for ghostqa" # Set to "deny" to reject tool calls not listed below default: "allow" tools: # -- Read Tools ---------------------------------------- # Multi-platform: Multi-platform testing support Multi-platform: rules: - action: allow rate_limit: 60/minute # Vision-powered: AI-powered visual testing without selectors Vision-powered: rules: - action: allow rate_limit: 60/minute # YAML-configured: YAML-based test configuration YAML-configured: rules: - action: allow rate_limit: 60/minute
The GhostQA server is primarily read-only with 3 read tools. While it cannot modify data, an agent in a retry loop can make thousands of API calls per minute, exhausting rate limits and running up costs. Rate limiting is still recommended.
3 tools across 1 categories: Read. 3 are read-only. 0 can modify, create, or delete data.
One line change. Instead of running the GhostQA server directly, prefix it with Intercept: intercept -c ghostqa.yaml -- npx -y @ghostqa. Download a pre-built policy from policylayer.com/policies/ghostqa and adjust the limits to match your use case.
Open source. One binary. Zero dependencies.
npx -y @policylayer/intercept