ACR — AGENT COMPOSITION RECORDS TOOLS

25 tools from the ACR — Agent Composition Records MCP Server, categorised by risk level.

View the ACR — Agent Composition Records policy →

READ TOOLS

18
check_entity Ask the ACR network what it knows about a specific skill hash, agent, or system. Returns the raw behavioral signals ACR has observed: interaction c... check_environment Check the current ACR network environment: active anomaly signals and network-level observation data. Call on startup to see the state of the broad... 2/5 get_compensation_signatures Query the compensation-signatures lens: how stereotyped is your chain-shape behavior, and which chain patterns dominate vs which are exploratory? ... 2/5 get_coverage Signal coverage: which fields you populate on your receipts and which you don't. Shows transparent rules with their conditions, observed inputs, an... get_failure_registry Failure registry: per-target breakdown of failures — status codes, error codes, categories, and median duration when failed. Shows where your inter... get_friction_report Query the friction lens of your interaction profile — one of several lenses available (more on the roadmap). The friction lens surfaces where time ... get_interaction_log View your interaction history. Use mode "list" for a scannable log, or "detail" (or provide receipt_id) for a full technical readout of a single in... get_my_agent Get your agent identity, API key, dashboard link, a health snapshot (friction, notifications, coverage), and a grouped menu of all available tools.... get_network_status Network-wide observation dashboard. Shows agent and system totals, system signal rates sorted worst-first, skills with elevated anomaly signals, an... get_notifications An anomaly signal is a behavioral pattern ACR observed across multiple unrelated agents (not a security event). Check for unread anomaly signal not... get_profile Your interaction profile: identity, composition summary, composition delta (MCP-observed vs agent-reported), receipt counts, target counts, and day... get_revealed_preference Query the revealed-preference lens: what the agent *declared* in its composition vs what it *actually called* during the window. Only ACR can see b... 2/5 get_skill_tracker Track skill adoption and anomaly signal rates across the agent population. Use without skill_hash for an overview, or with skill_hash for a deep-di... get_skill_versions Get version history for a skill. Shows how it has changed over time, whether your version is current, and how many versions behind you are. get_stable_corridors Stable corridors: interaction paths that are consistently reliable — zero failures, low latency variance, sufficient sample count. The filter thres... get_trend Trend: per-target latency and failure rate changes over time. Compares current period to previous period and shows raw deltas — no synthetic direct... search_skills Search ACR network knowledge about a skill by name, description, or capability. Returns raw signals observed by the network: adoption counts, anoma... 2/5 summarize_my_agent Single-read overview of your interaction profile across all available lenses. Fetches profile, friction summary, and coverage in one call. Use this...

WRITE TOOLS

4

DESTRUCTIVE TOOLS

1

EXECUTE TOOLS

2
How many tools does the ACR — Agent Composition Records MCP server have? +

The ACR — Agent Composition Records MCP server exposes 25 tools across 4 categories: Read, Write, Destructive, Execute.

How do I enforce policies on ACR — Agent Composition Records tools? +

Use Intercept, the open-source MCP proxy. Write YAML rules for each tool — rate limits, argument validation, or deny rules — then run Intercept in front of the ACR — Agent Composition Records server.

What risk categories do ACR — Agent Composition Records tools fall into? +

ACR — Agent Composition Records tools are categorised as Read (18), Write (4), Destructive (1), Execute (2). Each category has a recommended default policy.

Enforce policies on ACR — Agent Composition Records

Open source. One binary. Zero dependencies.

npx -y @policylayer/intercept
github.com/policylayer/intercept →
// GET IN TOUCH

Have a question or want to learn more? Send us a message.

Message sent.

We'll get back to you soon.