High-risk tools in Edict Lang
15 of the 22 tools in Edict Lang are classified as high risk. This page profiles those tools specifically, with recommended policy actions and the attack patterns that target them.
Every operation listed below is an action PolicyLayer recommends controlling at the transport layer. Open any tool to see the full profile, risk score, and YAML policy snippet.
Tools at high risk
-
edict_compileExecute 3/5Compile a semantically valid Edict AST into a WebAssembly module. Returns the WASM binary encoded as a base64 string. Supports single module (ast) or multi-module (modules array...
-
edict_composeExecute 2/5Compose multiple Edict program fragments into a single module. Fragments declare what they provide and require, enabling independent validation and incremental program generation.
-
edict_debugExecute 3/5Execute an Edict program with debug instrumentation. Compiles the AST with call-stack tracing, runs it, and returns structured crash diagnostics including call stack at crash ti...
-
edict_deployExecute 3/5Deploy an Edict program to a target. Runs the full pipeline (validate → check → compile) then packages for the specified target. Targets: 'wasm_binary' (returns WASM + metadata)...
-
edict_errorsExecute 3/5edict_errors
-
edict_examplesExecute 3/5edict_examples
-
edict_explainExecute 3/5Given a structured error, returns enriched repair context: pipeline stage, field metadata, example ASTs, and repair strategy.
-
edict_invokeExecute 3/5Invoke a deployed Edict WASM service via HTTP. Sends a request to the given URL with optional input and returns the structured result. Completes the deploy → invoke round-trip.
-
edict_invoke_skillExecute 3/5Execute a packaged Edict skill — load WASM from a SkillPackage, verify integrity checksum, and run it. Returns structured output with exit code and return value.
-
edict_lintExecute 3/5Run non-blocking lint analysis on an Edict AST. Returns quality warnings (unused variables, missing contracts, oversized functions, redundant effects, etc.) without blocking com...
-
edict_packageExecute 3/5Package a compiled Edict module + WASM binary into a portable SkillPackage. Input: the module AST (same one sent to edict_compile) + the base64 WASM string returned by edict_com...
-
edict_replayExecute 3/5Re-execute a WASM module using a previously recorded replay token for deterministic reproduction of runtime behavior. All non-deterministic host responses (random values, timest...
-
edict_runExecute 3/5Execute a compiled WebAssembly module (provided as base64) in a sandboxed runtime. The WASM VM has no ambient authority — filesystem, network, and crypto access are provided exc...
-
edict_schemaExecute 3/5Return the JSON Schema defining valid Edict AST programs. Use format 'agent' for one-call bootstrapping (minimal schema + compact maps + builtins + effects).
-
edict_versionExecute 3/5edict_version
Attacks that target this class
High-risk tools in any server share these documented attack patterns. Each links to the full case and the defensive policy.
More on Edict Lang
Enforce policy on Edict Lang
One command generates a policy scaffold for every server in your MCP config.
npx -y @policylayer/intercept init