High-risk tools in DataGen
4 of the 20 tools in DataGen are classified as high risk. This page profiles those tools specifically, with recommended policy actions and the attack patterns that target them.
Every operation listed below is an action PolicyLayer recommends controlling at the transport layer. Open any tool to see the full profile, risk score, and YAML policy snippet.
Tools at high risk
-
asyncExecuteCodeExecute 4/5Execute Python code asynchronously for long-running operations. This tool starts Python code execution in the background and returns immediately with an execution UUID. Use...
-
deployCodeExecute 4/5Deploys working Python code as a DataGen standalone deployment. This tool orchestrates the complete workflow: takes your Python code, tests it, and creates a standalone...
-
executeCodeExecute 4/5Execute Python code with full access to MCP tools and data processing libraries. This is your Python sandbox for building workflows, processing data, and integrating multip...
-
ReAuthRemoteMcpServerExecute 3/5🔄 Reauthenticate an existing remote MCP server connection. When an existing remote MCP server's OAuth tokens have expired or become invalid, use this tool to initiate a ...
Attacks that target this class
High-risk tools in any server share these documented attack patterns. Each links to the full case and the defensive policy.
More on DataGen
Enforce policy on DataGen
One command generates a policy scaffold for every server in your MCP config.
npx -y @policylayer/intercept init