High-risk tools in Terminal
8 of the 15 tools in Terminal are classified as high risk. This page profiles those tools specifically, with recommended policy actions and the attack patterns that target them.
Every operation listed below is an action PolicyLayer recommends controlling at the transport layer. Open any tool to see the full profile, risk score, and YAML policy snippet.
Tools at high risk
-
terminal_diffExecute 3/5Run two commands and return a unified diff.
-
terminal_execExecute 4/5Execute a command in a terminal session and wait for it to finish.
-
terminal_retryExecute 3/5Retry a command with backoff.
-
terminal_runExecute 5/5Run a binary directly; avoid shell quoting.
-
terminal_run_pagedExecute 4/5Run a read-only command and return one page of output.
-
terminal_startExecute 4/5Start a new interactive terminal session.
-
terminal_stopExecute 3/5Stop and clean up a terminal session.
-
terminal_waitExecute 3/5Wait for a pattern to appear in terminal output.
Attacks that target this class
High-risk tools in any server share these documented attack patterns. Each links to the full case and the defensive policy.
More on Terminal
Enforce policy on Terminal
One command generates a policy scaffold for every server in your MCP config.
npx -y @policylayer/intercept init