169 tools. 153 can modify or destroy data without limits.
1 destructive tool with no built-in limits. Policy required.
Last updated:
Destructive tools (il_image_morph_bottom_hat) permanently delete resources. There is no undo. An agent calling these in a retry loop causes irreversible damage.
Write operations (display_blob_analysis, display_circle_detector, display_line_detector) modify state. Without rate limits, an agent can make hundreds of changes in seconds — faster than any human can review or revert.
Execute tools (edge_filter_new, il_annulus_sector_region, il_blob_analysis) trigger processes with side effects. Builds, notifications, workflows — all fired without throttling.
il_image_morph_bottom_hat:
rules:
- action: deny Destructive tools should never be available to autonomous agents without human approval.
display_blob_analysis:
rules:
- rate_limit: 30/hour Prevents bulk unintended modifications from agents caught in loops.
get_tool_tree:
rules:
- rate_limit: 60/minute Controls API costs and prevents retry loops from exhausting upstream rate limits.
Yes. The Leaper Vision Toolkit server exposes 1 destructive tools including il_image_morph_bottom_hat. These permanently remove resources with no undo. Intercept blocks destructive tools by default so they never reach the upstream server.
The Leaper Vision Toolkit server has 137 write tools including display_blob_analysis, display_circle_detector, display_line_detector. Set rate limits in your policy file -- for example, rate_limit: 10/hour prevents an agent from making more than 10 modifications per hour. Intercept enforces this at the transport layer.
169 tools across 4 categories: Destructive, Execute, Read, Write. 16 are read-only. 153 can modify, create, or delete data.
One line change. Instead of running the Leaper Vision Toolkit server directly, prefix it with Intercept: intercept -c leaper-mcp-leaper-mcp-proxy.yaml -- npx -y @leaper-mcp/leaper-mcp-proxy. Download a pre-built policy from policylayer.com/policies/leaper-mcp-leaper-mcp-proxy and adjust the limits to match your use case.
Starter policies available for each. Same risk classification, same one-command setup.
Deterministic policy on every MCP tool call. Per-identity grants. Full audit log.