Critical-risk tools in Name Whisper
4 of the 34 tools in Name Whisper are classified as critical risk. This page profiles those tools specifically, with recommended policy actions and the attack patterns that target them.
Every operation listed below is an action PolicyLayer recommends controlling at the transport layer. Open any tool to see the full profile, risk score, and YAML policy snippet.
Tools at critical risk
-
manage_fusesDestructive 4/5Manage fuses on a wrapped ENS name. Fuses are permission bits that can be permanently burned to restrict what can be done with a name. Three modes: 1. **read** — Check which fu...
-
wrap_nameDestructive 4/5Wrap an unwrapped .eth name into the ENS NameWrapper contract. Wrapping converts the name from an ERC-721 token (BaseRegistrar) to an ERC-1155 token (NameWrapper). This enables...
-
bulk_transfer_ens_namesFinancial 5/5Transfer multiple ENS names in a single transaction via Multicall3 — bulk send. Much cheaper and faster than transferring names one at a time. Supports up to 20 names per batch...
-
transfer_ens_nameFinancial 5/5Transfer ownership of an ENS name to another wallet address. Automatically detects whether the name is wrapped (NameWrapper/ERC-1155) or unwrapped (BaseRegistrar/ERC-721) and b...
Attacks that target this class
Critical-risk tools in any server share these documented attack patterns. Each links to the full case and the defensive policy.
More on Name Whisper
Enforce policy on Name Whisper
One command generates a policy scaffold for every server in your MCP config.
npx -y @policylayer/intercept init