The AbraFlexi MCP server exposes tools that can move money, delete data, or destroy resources. Without policy enforcement, an autonomous agent has unrestricted access to every one of them.
Financial operations (bank_transaction_create, invoice_issued_create) can move real money. An agent caught in a loop could drain accounts before anyone notices.
Destructive tools (contact_delete, evidence_delete, invoice_issued_delete) permanently delete resources. There is no undo. An agent calling these in a retry loop causes irreversible damage.
Write operations (contact_create, contact_update, evidence_create) modify state. Without rate limits, an agent can make hundreds of changes in seconds -- faster than any human can review or revert.
These AbraFlexi tools can modify, create, or destroy resources. Without a policy, your agent has unrestricted access to all of them.
contact_create Create new contact records Write contact_update Update existing contact records Write evidence_create Create a record in any evidence type Write evidence_update Update a record in any evidence type Write invoice_issued_update Update existing issued invoices Write invoice_received_create Create new received invoice records Write product_create Create new products in the price list Write product_update Update existing product details Write bank_transaction_create Create new bank transaction records Financial invoice_issued_create Create and issue new invoices Financial contact_delete Delete contact records permanently Destructive evidence_delete Delete a record from any evidence type Destructive invoice_issued_delete Delete issued invoices permanently Destructive product_delete Delete products from the price list Destructive These rules are based on the tool categories exposed by the AbraFlexi MCP server. Adjust the limits to match your use case.
bank_transaction_create:
rules:
- action: deny
on_deny: "Financial operations require approval" Financial tools should be explicitly enabled per use case, not open by default.
contact_delete:
rules:
- action: deny
on_deny: "Destructive operations blocked by policy" Destructive tools should never be available to autonomous agents without human approval.
contact_create:
rules:
- name: "write-rate-limit"
rate_limit: 30/hour
on_deny: "Write rate limit reached" Prevents bulk unintended modifications from agents caught in loops.
bank_transaction_get:
rules:
- action: allow
rate_limit: 60/minute Controls API costs and prevents retry loops from exhausting upstream rate limits.
This is the complete policy file for AbraFlexi. It lists every tool with suggested default rules. Download it, adjust the limits, and run with Intercept.
version: "1" default: "deny" tools: contact_delete: rules: - action: deny on_deny: "Destructive operation blocked by policy" evidence_delete: rules: - action: deny on_deny: "Destructive operation blocked by policy" invoice_issued_delete: rules: - action: deny on_deny: "Destructive operation blocked by policy" product_delete: rules: - action: deny on_deny: "Destructive operation blocked by policy" bank_transaction_create: rules: - action: deny on_deny: "Financial operation requires approval" invoice_issued_create: rules: - action: deny on_deny: "Financial operation requires approval" bank_transaction_get: rules: - action: allow rate_limit: 60/minute contact_get: rules: - action: allow rate_limit: 60/minute evidence_get: rules: - action: allow rate_limit: 60/minute evidence_list: rules: - action: allow rate_limit: 60/minute invoice_issued_get: rules: - action: allow rate_limit: 60/minute invoice_received_get: rules: - action: allow rate_limit: 60/minute product_get: rules: - action: allow rate_limit: 60/minute contact_create: rules: - action: allow rate_limit: 30/hour contact_update: rules: - action: allow rate_limit: 30/hour evidence_create: rules: - action: allow rate_limit: 30/hour evidence_update: rules: - action: allow rate_limit: 30/hour invoice_issued_update: rules: - action: allow rate_limit: 30/hour invoice_received_create: rules: - action: allow rate_limit: 30/hour product_create: rules: - action: allow rate_limit: 30/hour product_update: rules: - action: allow rate_limit: 30/hour
Download the policy
curl -o abraflexi.yaml https://raw.githubusercontent.com/policylayer/intercept/main/policies/abraflexi.yaml
Run Intercept in front of the server
intercept -c abraflexi.yaml -- npx -y @abraflexi-mcp-server
Works with any MCP client:
Every tool call is now checked against your policy before it reaches AbraFlexi. Denied calls are blocked and logged. Allowed calls pass through with no latency impact.
Open source. One binary. Zero dependencies.
npx -y @policylayer/intercept