High-risk tools in Blinkxmcp
2 of the 12 tools in Blinkxmcp are classified as high risk. This page profiles those tools specifically, with recommended policy actions and the attack patterns that target them.
Every operation listed below is an action PolicyLayer recommends controlling at the transport layer. Open any tool to see the full profile, risk score, and YAML policy snippet.
Tools at high risk
-
run_backtestExecute 3/5Run a custom BACKTEST strategy provided by the AI agent using historical data fetched from BlinkX SmartAPI. historical data will be available in variable historical_data in form...
-
run_strategyExecute 4/5Execute a Python strategy code asynchronously. The code can: - Read live prices from LTP_STORE using: key = f"{scrip_code}_{exchange}" - Place orders using the async funct...
Attacks that target this class
High-risk tools in any server share these documented attack patterns. Each links to the full case and the defensive policy.
More on Blinkxmcp
Enforce policy on Blinkxmcp
One command generates a policy scaffold for every server in your MCP config.
npx -y @policylayer/intercept init