Critical-risk tools in Coolify
11 of the 39 tools in Coolify are classified as critical risk. This page profiles those tools specifically, with recommended policy actions and the attack patterns that target them.
Every operation listed below is an action PolicyLayer recommends controlling at the transport layer. Open any tool to see the full profile, risk score, and YAML policy snippet.
Tools at critical risk
-
applicationDestructive 5/5Create, update, or delete applications
-
cloud_tokensDestructive 5/5Manage cloud provider tokens (CRUD)
-
databaseDestructive 5/5Create or delete databases
-
database_backupsDestructive 5/5Manage database backup schedules
-
deploymentDestructive 4/5Manage deployments (get, cancel, list)
-
env_varsDestructive 5/5Manage environment variables (CRUD)
-
environmentsDestructive 5/5Manage environments (list, get, create, delete)
-
github_appsDestructive 5/5Manage GitHub App integrations (CRUD)
-
private_keysDestructive 5/5Manage SSH keys (CRUD)
-
projectsDestructive 5/5Manage projects (list, get, create, update, delete)
-
serviceDestructive 5/5Create, update, or delete services
Attacks that target this class
Critical-risk tools in any server share these documented attack patterns. Each links to the full case and the defensive policy.
More on Coolify
Enforce policy on Coolify
One command generates a policy scaffold for every server in your MCP config.
npx -y @policylayer/intercept init