How to secure GhostQA →

GhostQA MCP Policy

Enforce policies on every tool call to the GhostQA MCP Server. 3 tools with suggested default rules ready to customise.

Last updated:

0 can modify or destroy data
3 read-only
3 tools total
Read (3) Write / Execute (0) Destructive / Financial (0)

This policy includes sensible default rules. Download it, adjust the limits to match your use case, and run with Intercept.

terminal

# Download policy with default rules

curl -o ghostqa.yaml https://raw.githubusercontent.com/policylayer/intercept/main/policies/ghostqa.yaml

# Run with Intercept

intercept --policy ghostqa.yaml -- npx -y @ghostqa

This policy includes suggested default rules for common use cases. Adjust rate limits, add argument validation, or remove rules you don't need.

ghostqa.yaml
version: "1"
description: "Policy for ghostqa"
# Set to "deny" to reject tool calls not listed below
default: "allow"

tools:
    # -- Read Tools ----------------------------------------
    # Multi-platform: Multi-platform testing support
    Multi-platform:
        rules:
          - action: allow
            rate_limit: 60/minute
    # Vision-powered: AI-powered visual testing without selectors
    Vision-powered:
        rules:
          - action: allow
            rate_limit: 60/minute
    # YAML-configured: YAML-based test configuration
    YAML-configured:
        rules:
          - action: allow
            rate_limit: 60/minute
Is the GhostQA MCP server safe to use without restrictions? +

The GhostQA server is primarily read-only with 3 read tools. While it cannot modify data, an agent in a retry loop can make thousands of API calls per minute, exhausting rate limits and running up costs. Rate limiting is still recommended.

How many tools does the GhostQA MCP server expose? +

3 tools across 1 categories: Read. 3 are read-only. 0 can modify, create, or delete data.

How do I add Intercept to my GhostQA setup? +

One line change. Instead of running the GhostQA server directly, prefix it with Intercept: intercept -c ghostqa.yaml -- npx -y @ghostqa. Download a pre-built policy from policylayer.com/policies/ghostqa and adjust the limits to match your use case.

Enforce policies on GhostQA

Open source. One binary. Zero dependencies.

npx -y @policylayer/intercept
github.com/policylayer/intercept →
// GET IN TOUCH

Have a question or want to learn more? Send us a message.

Message sent.

We'll get back to you soon.