4 tools from the Apideck MCP Server MCP Server, categorised by risk level.
View the Apideck MCP Server policy →describe_tool_input Get the input schema for one or more tools. It is a good idea to call this tool first to understand how to successfully call execute_tool. list_scopes List the scopes available on this server.
Scopes are categories that group related tools together.
They can be used as search terms when filtering ... list_tools List available tools. Optionally filter by search terms that match against tool name, description, and scopes. The Apideck MCP Server MCP server exposes 4 tools across 2 categories: Read, Execute.
Use Intercept, the open-source MCP proxy. Write YAML rules for each tool — rate limits, argument validation, or deny rules — then run Intercept in front of the Apideck MCP Server server.
Apideck MCP Server tools are categorised as Read (3), Execute (1). Each category has a recommended default policy.
Open source. One binary. Zero dependencies.
npx -y @policylayer/intercept