Critical-risk tools in Taskflow
5 of the 50 tools in Taskflow are classified as critical risk. This page profiles those tools specifically, with recommended policy actions and the attack patterns that target them.
Every operation listed below is an action PolicyLayer recommends controlling at the transport layer. Open any tool to see the full profile, risk score, and YAML policy snippet.
Tools at critical risk
-
clear_activity_logDestructive 4/5Delete all activity log entries. Use with caution — this is irreversible.
-
clear_dataDestructive 4/5Delete ALL tasks, projects, sessions, notifications, and activity logs. Settings are preserved. Use with extreme caution — this is irreversible.
-
clear_notificationsDestructive 4/5Delete all notifications. Use with caution — this is irreversible.
-
delete_projectDestructive 4/5Delete a project by ID. Tasks under this project will be unlinked (project_id set to NULL), not deleted.
-
delete_taskDestructive 4/5Delete a task by ID. Use sparingly — prefer updating status to "done" instead of deleting.
Attacks that target this class
Critical-risk tools in any server share these documented attack patterns. Each links to the full case and the defensive policy.
More on Taskflow
Enforce policy on Taskflow
One command generates a policy scaffold for every server in your MCP config.
npx -y @policylayer/intercept init