34 tools from the Appium MCP Server, categorised by risk level.
View the Appium policy →appium_documentation_query Query Appium documentation for help 2/5 appium_element_screenshot Take a screenshot of a specific element 2/5 appium_find_element Find an element using various locator strategies 2/5 appium_get_contexts Get all available contexts in the current session 2/5 appium_get_orientation Get the current device screen orientation 2/5 appium_get_page_source Get the page source XML from the current screen 2/5 appium_get_text Get text content from a UI element 2/5 appium_is_app_installed Check whether an app is installed on the device 2/5 appium_list_apps List all installed apps on the device 2/5 appium_screenshot Take a screenshot of the current screen 2/5 generate_locators Generate intelligent locators for interactive elements 2/5 appium_generate_tests Generate automated test code from natural language 3/5 appium_installApp Install an app on the device 5/5 appium_set_orientation Set the device screen orientation 2/5 appium_set_value Enter text into an input field on the device 4/5 appium_switch_context Switch between native and webview contexts 3/5 create_session Create a new mobile automation session 3/5 install_wda Install and launch WebDriverAgent on a simulator 4/5 select_device Select a specific device for automation 2/5 select_platform Choose between Android or iOS platform 2/5 setup_wda Download and set up WebDriverAgent for iOS 4/5 appium_activate_app Activate or launch a specified app on the device 4/5 appium_click Click on a UI element 3/5 appium_double_tap Perform a double tap on an element 3/5 appium_drag_and_drop Perform a drag and drop gesture 3/5 appium_handle_alert Accept or dismiss alerts and dialogs 4/5 appium_long_press Perform a long press gesture on an element 3/5 appium_scroll Scroll the device screen vertically 2/5 appium_scroll_to_element Scroll until an element becomes visible 2/5 appium_swipe Swipe the device screen in a direction 2/5 appium_terminateApp Terminate a running app on the device 4/5 boot_simulator Boot an iOS simulator 3/5 The Appium MCP server exposes 34 tools across 4 categories: Read, Write, Destructive, Execute.
Use Intercept, the open-source MCP proxy. Write YAML rules for each tool — rate limits, argument validation, or deny rules — then run Intercept in front of the Appium server.
Appium tools are categorised as Read (11), Write (10), Destructive (2), Execute (11). Each category has a recommended default policy.
Open source. One binary. Zero dependencies.
npx -y @policylayer/intercept