43 tools. 25 can modify or destroy data without limits.
8 destructive tools with no built-in limits. Policy required.
Last updated:
Destructive tools (n8n_delete_credential, n8n_delete_datatable_rows, n8n_delete_execution) permanently delete resources. There is no undo. An agent calling these in a retry loop causes irreversible damage.
Write operations (n8n_activate_workflow, n8n_create_credential, n8n_create_datatable) modify state. Without rate limits, an agent can make hundreds of changes in seconds — faster than any human can review or revert.
Execute tools (n8n_execute_workflow, n8n_trigger_webhook) trigger processes with side effects. Builds, notifications, workflows — all fired without throttling.
Intercept sits between your agent and n8n MCP Server. Every tool call checked against your policy before it executes — so your agent can do its job without breaking things.
npx -y @policylayer/intercept scan -- npx -y @nextoolsolutions/mcp-n8n n8n_delete_credential:
rules:
- action: deny Destructive tools should never be available to autonomous agents without human approval.
n8n_activate_workflow:
rules:
- rate_limit: 30/hour Prevents bulk unintended modifications from agents caught in loops.
n8n_deactivate_workflow:
rules:
- rate_limit: 60/minute Controls API costs and prevents retry loops from exhausting upstream rate limits.
Yes. The n8n MCP Server server exposes 8 destructive tools including n8n_delete_credential, n8n_delete_datatable_rows, n8n_delete_execution. These permanently remove resources with no undo. Intercept blocks destructive tools by default so they never reach the upstream server.
The n8n MCP Server server has 15 write tools including n8n_activate_workflow, n8n_create_credential, n8n_create_datatable. Set rate limits in your policy file -- for example, rate_limit: 10/hour prevents an agent from making more than 10 modifications per hour. Intercept enforces this at the transport layer.
43 tools across 4 categories: Destructive, Execute, Read, Write. 18 are read-only. 25 can modify, create, or delete data.
One line change. Instead of running the n8n MCP Server server directly, prefix it with Intercept: intercept -c n8n-mcp-server.yaml -- npx -y @@nextoolsolutions/mcp-n8n. Download a pre-built policy from policylayer.com/policies/n8n-mcp-server and adjust the limits to match your use case.
Starter policies available for each. Same risk classification, same one-command setup.
Set budgets, approvals, and hard limits across MCP servers.
npx -y @policylayer/intercept init