Critical-risk tools in Airtable User MCP
4 of the 37 tools in Airtable User MCP are classified as critical risk. This page profiles those tools specifically, with recommended policy actions and the attack patterns that target them.
Every operation listed below is an action PolicyLayer recommends controlling at the transport layer. Open any tool to see the full profile, risk score, and YAML policy snippet.
Tools at critical risk
-
delete_fieldDestructive 4/5Delete a field from an Airtable table. Requires both fieldId AND the expected field name as a safety guard. First checks for downstream dependencies — if found, returns dependen...
-
delete_tableDestructive 4/5Delete a table from an Airtable base. Requires both tableId AND the expected table name as a safety guard — refuses to delete if the name does not match. Airtable rejects deleti...
-
delete_viewDestructive 4/5Delete a view from a table. Cannot delete the last remaining view in a table.
-
remove_extensionDestructive 4/5Remove an installed extension from a dashboard.
Attacks that target this class
Critical-risk tools in any server share these documented attack patterns. Each links to the full case and the defensive policy.
More on Airtable User MCP
Enforce policy on Airtable User MCP
One command generates a policy scaffold for every server in your MCP config.
npx -y @policylayer/intercept init