High-risk tools in Build
8 of the 9 tools in Build are classified as high risk. This page profiles those tools specifically, with recommended policy actions and the attack patterns that target them.
Every operation listed below is an action PolicyLayer recommends controlling at the transport layer. Open any tool to see the full profile, risk score, and YAML policy snippet.
Tools at high risk
-
buildExecute 4/5Runs a build command and returns structured success/failure with errors and warnings. Allowed commands: ant, bazel, bun, bunx, cargo, cmake, dotnet, esbuild, go, gradle, gradlew...
-
esbuildExecute 3/5Runs the esbuild bundler and returns structured errors, warnings, and output files.
-
lernaExecute 4/5Runs Lerna monorepo commands (list, run, changed, version) and returns structured package information.
-
nxExecute 3/5Runs Nx workspace commands and returns structured per-project task results with cache status.
-
rollupExecute 3/5Runs Rollup bundler and returns structured bundle output with errors and warnings.
-
turboExecute 3/5Runs Turborepo tasks and returns structured per-package results with cache hit/miss info.
-
vite-buildExecute 4/5Runs Vite production build and returns structured output files with sizes.
-
webpackExecute 4/5Runs webpack build with JSON stats output and returns structured assets, errors, and warnings.
Attacks that target this class
High-risk tools in any server share these documented attack patterns. Each links to the full case and the defensive policy.
More on Build
Enforce policy on Build
One command generates a policy scaffold for every server in your MCP config.
npx -y @policylayer/intercept init