Nextcloud MCP Server

30 tools. 16 can modify or destroy data without limits.

6 destructive tools with no built-in limits. Policy required.

Last updated:

16 can modify or destroy data
14 read-only
30 tools total
Read (14) Write / Execute (10) Destructive / Financial (6)

Destructive tools (nextcloud_calendar_delete_event, nextcloud_contacts_delete_addressbook, nextcloud_contacts_delete_contact) permanently delete resources. There is no undo. An agent calling these in a retry loop causes irreversible damage.

Write operations (nextcloud_calendar_create_event, nextcloud_calendar_update_event, nextcloud_contacts_create_addressbook) modify state. Without rate limits, an agent can make hundreds of changes in seconds — faster than any human can review or revert.

One command. Full control.

Intercept sits between your agent and Nextcloud MCP Server. Every tool call checked against your policy before it executes — so your agent can do its job without breaking things.

npx -y @policylayer/intercept scan -- npx -y @hithereiamaliff/mcp-nextcloud
Scans every tool. Generates a policy. Starts enforcing.
Works with Claude Code · Cursor · Claude Desktop · Windsurf · any MCP client
Deny destructive operations
nextcloud_calendar_delete_event:
  rules:
    - action: deny

Destructive tools should never be available to autonomous agents without human approval.

Rate limit write operations
nextcloud_calendar_create_event:
  rules:
    - rate_limit: 30/hour

Prevents bulk unintended modifications from agents caught in loops.

Cap read operations
nextcloud_calendar_get_event:
  rules:
    - rate_limit: 60/minute

Controls API costs and prevents retry loops from exhausting upstream rate limits.

Can an AI agent delete data through the Nextcloud MCP Server MCP server? +

Yes. The Nextcloud MCP Server server exposes 6 destructive tools including nextcloud_calendar_delete_event, nextcloud_contacts_delete_addressbook, nextcloud_contacts_delete_contact. These permanently remove resources with no undo. Intercept blocks destructive tools by default so they never reach the upstream server.

How do I prevent bulk modifications through Nextcloud MCP Server? +

The Nextcloud MCP Server server has 10 write tools including nextcloud_calendar_create_event, nextcloud_calendar_update_event, nextcloud_contacts_create_addressbook. Set rate limits in your policy file -- for example, rate_limit: 10/hour prevents an agent from making more than 10 modifications per hour. Intercept enforces this at the transport layer.

How many tools does the Nextcloud MCP Server MCP server expose? +

30 tools across 3 categories: Destructive, Read, Write. 14 are read-only. 16 can modify, create, or delete data.

How do I add Intercept to my Nextcloud MCP Server setup? +

One line change. Instead of running the Nextcloud MCP Server server directly, prefix it with Intercept: intercept -c hithereiamaliff-mcp-nextcloud.yaml -- npx -y @hithereiamaliff/mcp-nextcloud. Download a pre-built policy from policylayer.com/policies/hithereiamaliff-mcp-nextcloud and adjust the limits to match your use case.

Other MCP servers with similar tools.

Starter policies available for each. Same risk classification, same one-command setup.

policylayer/intercept

Control every MCP tool call
your agent makes.

Set budgets, approvals, and hard limits across MCP servers.

npx -y @policylayer/intercept init
Protect your agent in 30 seconds. Scans your MCP config and generates enforcement policies for every server.
// GET IN TOUCH

Have a question or want to learn more? Send us a message.

Message sent.

We'll get back to you soon.