High-risk tools in BrowserStack
6 of the 20 tools in BrowserStack are classified as high risk. This page profiles those tools specifically, with recommended policy actions and the attack patterns that target them.
Every operation listed below is an action PolicyLayer recommends controlling at the transport layer. Open any tool to see the full profile, risk score, and YAML policy snippet.
Tools at high risk
-
createTestRunExecute 4/5Create and start a test run
-
runAppLiveSessionExecute 4/5Start manual app testing on a real device
-
runAppTestsOnBrowserStackExecute 5/5Run automated mobile tests on real devices
-
runBrowserLiveSessionExecute 4/5Start Live session for website testing
-
setupBrowserStackAutomateTestsExecute 5/5Integrate BrowserStack SDK and run web tests
-
startAccessibilityScanExecute 3/5Start a web accessibility scan
Attacks that target this class
High-risk tools in any server share these documented attack patterns. Each links to the full case and the defensive policy.
More on BrowserStack
Enforce policy on BrowserStack
One command generates a policy scaffold for every server in your MCP config.
npx -y @policylayer/intercept init