High-risk tools in Srv D7aoqmh5pdvs7391dcqg
10 of the 70 tools in Srv D7aoqmh5pdvs7391dcqg are classified as high risk. This page profiles those tools specifically, with recommended policy actions and the attack patterns that target them.
Every operation listed below is an action PolicyLayer recommends controlling at the transport layer. Open any tool to see the full profile, risk score, and YAML policy snippet.
Tools at high risk
-
dry_runExecute 3/5Validate task feasibility without executing — safety check, confidence, duration estimate
-
execute_actionsExecute 3/5Execute a sequence of pre-computed joint action vectors on a robot
-
execute_subtaskExecute 3/5Execute a numbered subtask from a multi-step plan
-
ros2_emergency_stopExecute 3/5Emergency stop a single robot via ROS2 bridge (10ms response)
-
ros2_emergency_stop_allExecute 4/5Emergency stop ALL connected robots via ROS2 bridge
-
run_calibrationExecute 3/5Run automatic calibration on a robot (joint offset, force-torque, camera extrinsic)
-
sensor_fusionExecute 3/5Run VLA inference fusing camera + lidar + thermal + force + GPS sensor data
-
start_finetune_jobExecute 3/5Start a LoRA fine-tuning job on a base VLA model using a prepared dataset
-
start_rl_trainingExecute 3/5Start an online RL training session with custom reward configuration
-
vla_inferenceExecute 3/5Run VLA inference: send instruction + base64 images, receive joint actions
Attacks that target this class
High-risk tools in any server share these documented attack patterns. Each links to the full case and the defensive policy.
More on Srv D7aoqmh5pdvs7391dcqg
Enforce policy on Srv D7aoqmh5pdvs7391dcqg
One command generates a policy scaffold for every server in your MCP config.
npx -y @policylayer/intercept init