1 tools. 1 can modify or destroy data without limits.
1 destructive tool with no built-in limits. Policy required.
Last updated:
Financial operations (refund_eligibility) can move real money. An agent caught in a loop could drain accounts before anyone notices.
Intercept sits between your agent and Subscription Refunds. Every tool call checked against your policy before it executes — so your agent can do its job without breaking things.
npx -y @policylayer/intercept scan -- npx -y @refund-decide/notary refund_eligibility:
rules:
- action: deny Financial tools should be explicitly enabled per use case, not open by default.
Yes. The Subscription Refunds server exposes 1 financial tools including refund_eligibility. Without a policy, an autonomous agent can call these with no spend caps, no rate limits, and no approval flow. Intercept lets you block financial tools by default or set per-tool rate limits.
1 tools across 1 categories: Financial. 0 are read-only. 1 can modify, create, or delete data.
One line change. Instead of running the Subscription Refunds server directly, prefix it with Intercept: intercept -c refund-decide-notary.yaml -- npx -y @refund-decide/notary. Download a pre-built policy from policylayer.com/policies/refund-decide-notary and adjust the limits to match your use case.
Starter policies available for each. Same risk classification, same one-command setup.
Set budgets, approvals, and hard limits across MCP servers.
npx -y @policylayer/intercept init