High-risk tools in Contracts
2 of the 24 tools in Contracts are classified as high risk. This page profiles those tools specifically, with recommended policy actions and the attack patterns that target them.
Every operation listed below is an action PolicyLayer recommends controlling at the transport layer. Open any tool to see the full profile, risk score, and YAML policy snippet.
Tools at high risk
-
cairo-accountExecute 3/5Make a custom smart contract that represents an account that can be deployed and interacted with other contracts, and can be extended to implement custom logic. An account is a ...
-
cairo-multisigExecute 3/5Make a multi-signature smart contract, requiring a quorum of registered signers to approve and collectively execute transactions. Returns the source code of the generated contr...
Attacks that target this class
High-risk tools in any server share these documented attack patterns. Each links to the full case and the defensive policy.
More on Contracts
Enforce policy on Contracts
One command generates a policy scaffold for every server in your MCP config.
npx -y @policylayer/intercept init