High-risk tools in Appium
11 of the 34 tools in Appium are classified as high risk. This page profiles those tools specifically, with recommended policy actions and the attack patterns that target them.
Every operation listed below is an action PolicyLayer recommends controlling at the transport layer. Open any tool to see the full profile, risk score, and YAML policy snippet.
Tools at high risk
-
appium_activate_appExecute 4/5Activate or launch a specified app on the device
-
appium_clickExecute 3/5Click on a UI element
-
appium_double_tapExecute 3/5Perform a double tap on an element
-
appium_drag_and_dropExecute 3/5Perform a drag and drop gesture
-
appium_handle_alertExecute 4/5Accept or dismiss alerts and dialogs
-
appium_long_pressExecute 3/5Perform a long press gesture on an element
-
appium_scrollExecute 2/5Scroll the device screen vertically
-
appium_scroll_to_elementExecute 2/5Scroll until an element becomes visible
-
appium_swipeExecute 2/5Swipe the device screen in a direction
-
appium_terminateAppExecute 4/5Terminate a running app on the device
-
boot_simulatorExecute 3/5Boot an iOS simulator
Attacks that target this class
High-risk tools in any server share these documented attack patterns. Each links to the full case and the defensive policy.
More on Appium
Enforce policy on Appium
One command generates a policy scaffold for every server in your MCP config.
npx -y @policylayer/intercept init