Critical-risk tools in Leapfrog
3 of the 37 tools in Leapfrog are classified as critical risk. This page profiles those tools specifically, with recommended policy actions and the attack patterns that target them.
Every operation listed below is an action PolicyLayer recommends controlling at the transport layer. Open any tool to see the full profile, risk score, and YAML policy snippet.
Tools at critical risk
-
network_interceptDestructive 4/5Add or remove network intercept rules. Block requests (ads, trackers), mock API responses, or log specific traffic. Use action='remove' with ruleId to remove an existing rule.
-
profile_deleteDestructive 4/5Delete a saved persistent browser profile and all its data.
-
session_destroyDestructive 4/5Close and clean up a browser session. Frees a pool slot.
Attacks that target this class
Critical-risk tools in any server share these documented attack patterns. Each links to the full case and the defensive policy.
More on Leapfrog
Enforce policy on Leapfrog
One command generates a policy scaffold for every server in your MCP config.
npx -y @policylayer/intercept init