High-risk tools in Tronlink
10 of the 55 tools in Tronlink are classified as high risk. This page profiles those tools specifically, with recommended policy actions and the attack patterns that target them.
Every operation listed below is an action PolicyLayer recommends controlling at the transport layer. Open any tool to see the full profile, risk score, and YAML policy snippet.
Tools at high risk
-
tl_chain_swapExecute 3/5Estimate or execute a token swap via SunSwap V2 router.
-
tl_chain_swap_v3Execute 3/5Estimate or execute a token swap via SunSwap V3 (concentrated liquidity). Pre-checks balance before execution. Supports fee tier selection.
-
tl_evaluateExecute 4/5Execute JavaScript in the browser page context. Useful for DOM manipulation, scrolling, reading state, or any operation not covered by other tools. Returns the serialized result.
-
tl_launchExecute 3/5Launch a Chrome browser with TronLink extension. Supports fixture presets: "default" (unlocked wallet with TRX), "onboarding" (fresh install).
-
tl_navigateExecute 3/5Navigate to a TronLink screen: home, settings, send, receive, swap, assets, notification, address_book, node_management, dapp_list, or a custom URL.
-
tl_run_stepsExecute 3/5Execute multiple tool steps in sequence. Useful for complex multi-step flows.
-
tl_seed_contractExecute 3/5Deploy a smart contract: trc20, trc721, trc1155, trc10, multisig, staking, energy_rental. E2E only.
-
tl_seed_contractsExecute 3/5Deploy multiple smart contracts in sequence. E2E only.
-
tl_wait_forExecute 3/5Wait for an element to reach a state (visible/hidden/attached/detached).
-
tl_wait_for_notificationExecute 3/5Wait for TronLink notification popup (transaction confirmation, dApp connection request).
Attacks that target this class
High-risk tools in any server share these documented attack patterns. Each links to the full case and the defensive policy.
More on Tronlink
Enforce policy on Tronlink
One command generates a policy scaffold for every server in your MCP config.
npx -y @policylayer/intercept init