View full policy →

Auth0: 11 unrestricted tools

The Auth0 MCP server exposes 10 write tools alongside 10 read tools. Write operations carry risk of unintended bulk modifications.

1 execute code
10 modify data
Write / Execute (11) Destructive / Financial (0)

Write operations (auth0_create_action, auth0_create_application, auth0_create_application_grant) modify state. Without rate limits, an agent can make hundreds of changes in seconds -- faster than any human can review or revert.

Execute tools (auth0_deploy_action) trigger processes with side effects. Builds, notifications, workflows -- all fired without throttling.

These Auth0 tools can modify, create, or destroy resources. Without a policy, your agent has unrestricted access to all of them.

auth0_create_action Create a new Auth0 action Write
auth0_create_application Create a new Auth0 application Write
auth0_create_application_grant Create a client grant for API access Write
auth0_create_form Create a new Auth0 form Write
auth0_create_resource_server Create a new Auth0 resource server (API) Write
auth0_publish_form Publish an Auth0 form Write
auth0_update_action Update an Auth0 action Write
auth0_update_application Update an Auth0 application Write
auth0_update_form Update an Auth0 form Write
auth0_update_resource_server Update an Auth0 resource server Write
auth0_deploy_action Deploy an Auth0 action to production Execute

These rules are based on the tool categories exposed by the Auth0 MCP server. Adjust the limits to match your use case.

Rate limit write operations
auth0_create_action:
    rules:
      - name: "write-rate-limit"
        rate_limit: 30/hour
        on_deny: "Write rate limit reached"

Prevents bulk unintended modifications from agents caught in loops.

Cap read operations
auth0_get_action:
    rules:
      - action: allow
        rate_limit: 60/minute

Controls API costs and prevents retry loops from exhausting upstream rate limits.

This is the complete policy file for Auth0. It lists every tool with suggested default rules. Download it, adjust the limits, and run with Intercept.

auth0.yaml
version: "1"
default: "deny"

tools:
  auth0_deploy_action:
    rules:
      - action: allow
        rate_limit: 10/hour
        validate:
          required_args: true
  auth0_get_action:
    rules:
      - action: allow
        rate_limit: 60/minute
  auth0_get_application:
    rules:
      - action: allow
        rate_limit: 60/minute
  auth0_get_form:
    rules:
      - action: allow
        rate_limit: 60/minute
  auth0_get_log:
    rules:
      - action: allow
        rate_limit: 60/minute
  auth0_get_resource_server:
    rules:
      - action: allow
        rate_limit: 60/minute
  auth0_list_actions:
    rules:
      - action: allow
        rate_limit: 60/minute
  auth0_list_applications:
    rules:
      - action: allow
        rate_limit: 60/minute
  auth0_list_forms:
    rules:
      - action: allow
        rate_limit: 60/minute
  auth0_list_logs:
    rules:
      - action: allow
        rate_limit: 60/minute
  auth0_list_resource_servers:
    rules:
      - action: allow
        rate_limit: 60/minute
  auth0_create_action:
    rules:
      - action: allow
        rate_limit: 30/hour
  auth0_create_application:
    rules:
      - action: allow
        rate_limit: 30/hour
  auth0_create_application_grant:
    rules:
      - action: allow
        rate_limit: 30/hour
  auth0_create_form:
    rules:
      - action: allow
        rate_limit: 30/hour
  auth0_create_resource_server:
    rules:
      - action: allow
        rate_limit: 30/hour
  auth0_publish_form:
    rules:
      - action: allow
        rate_limit: 30/hour
  auth0_update_action:
    rules:
      - action: allow
        rate_limit: 30/hour
  auth0_update_application:
    rules:
      - action: allow
        rate_limit: 30/hour
  auth0_update_form:
    rules:
      - action: allow
        rate_limit: 30/hour
  auth0_update_resource_server:
    rules:
      - action: allow
        rate_limit: 30/hour

Two commands. Under two minutes.

01

Download the policy

curl -o auth0.yaml https://raw.githubusercontent.com/policylayer/intercept/main/policies/auth0.yaml
02

Run Intercept in front of the server

intercept -c auth0.yaml -- npx -y @@@auth0/auth0-mcp-server

Works with any MCP client:

Every tool call is now checked against your policy before it reaches Auth0. Denied calls are blocked and logged. Allowed calls pass through with no latency impact.

Enforce policies on Auth0

Open source. One binary. Zero dependencies.

npx -y @policylayer/intercept
github.com/policylayer/intercept →
// GET IN TOUCH

Have a question or want to learn more? Send us a message.

Message sent.

We'll get back to you soon.