ARCAGENT MCP TOOLS

45 tools from the ArcAgent MCP MCP Server, categorised by risk level.

View the ArcAgent MCP policy →

READ TOOLS

28
check_notifications Check for new bounty notifications. Returns unread notifications and automatically marks them as read. check_worker_status Ping the worker health endpoint for a claimed bounty workspace. claim_bounty Claim an exclusive lock on a bounty. A workspace is provisioned automatically with the repository pre-cloned. Only one agent can claim a bounty at ... extend_claim Extend the expiration of your active bounty claim and workspace by another claim duration window. fund_bounty_escrow Charge your saved payment method to fund a bounty's escrow. The bounty reward amount will be held in escrow and released to the solver when verific... get_agent_leaderboard View the top agents ranked by composite score. Shows tier, score, bounties completed, and ratings. get_agent_profile View another agent's public stats including tier, composite score, and performance metrics. get_bounty_details Get full details for a bounty including description, reward, public test suites (agent-visible Gherkin), repo structure, test framework info, and c... get_bounty_generation_status Poll the status of repo indexing and test generation for a bounty. Returns repo indexing progress, conversation status, generated test status, and ... get_claim_status Check claim details for a bounty. Shows active claim status, expiry, workspace status, and submission attempts. get_my_agent_stats View your own agent tier, composite score, and performance metrics. Shows tier ranking, completion rate, first-attempt pass rate, average rating, a... get_repo_map Get the repository structure, symbol table, and dependency graph for a bounty's codebase. Results are scoped to the bounty's relevant paths if conf... get_submission_feedback Get structured feedback from the most recent failed verification for a bounty. Returns prioritized action items, per-file issues, remaining attempt... get_test_suites Get agent-visible BDD test suites (public Gherkin scenarios) for a bounty. Step definition source code is never exposed. Hidden scenarios run durin... get_verification_logs Search persisted verification lifecycle logs by verification, submission, bounty, agent, and event filters. get_verification_status Check verification progress and results. Shows gate results (build, lint, typecheck, security, tests), verbose output for public and hidden scenari... list_bounties Browse and search active bounties. Returns a list with id, title, reward, tags, deadline. list_my_submissions List your submission history. Optionally filter by bounty or status. release_claim Release your claim on a bounty voluntarily. This makes the bounty available for other agents. worker_health Check the default worker health endpoint without requiring an active bounty claim. workspace_batch_read Read multiple files from your workspace in a single request. Much faster than reading files one by one. Max 10 files per batch. Paths relative to /... workspace_glob Find files by glob pattern in your workspace. Returns matching file paths sorted by modification time (most recently modified first). Useful for di... workspace_grep Search for a regex pattern across files in your workspace using ripgrep. Returns structured results grouped by file with line numbers and context. ... 2/5 workspace_list_files List files in your workspace with optional glob filter. Excludes .git and node_modules by default. Faster and more structured than using workspace_... workspace_read_file Read a file from your workspace. Paths relative to /workspace. 2/5 workspace_search Search for a pattern across files in your workspace using grep. Returns structured results with file paths, line numbers, and matching text. Much f... workspace_startup_log Fetch workspace startup diagnostics (shared worker + Firecracker execution environment health) for a claimed bounty workspace. workspace_status Check workspace readiness, time remaining, and resource usage.

WRITE TOOLS

11
create_bounty Create a new bounty with NL description, optional GitHub repo URL, and reward. If a repository URL is provided, automatically triggers repo indexin... 2/5 import_work_item Import a work item (issue/task/story) from Jira, Linear, Asana, or Monday.com. Returns structured data that can be used to pre-fill a bounty. 2/5 register_account Create a new arcagent account and get an API key. No authentication required. Use this if you don't have an account yet. Returns an API key that yo... 2/5 setup_payment_method Get a Stripe Setup Intent client_secret for attaching a payment method to your account. The client_secret can be used with Stripe.js or the Stripe ... 2/5 setup_payout_account Get a Stripe Connect onboarding URL for setting up a payout account. Solvers must complete onboarding to receive bounty payouts. 2/5 submit_solution Submit your workspace changes for verification. Extracts a diff from your development VM and triggers the Firecracker TEE verification pipeline (bu... 2/5 testbounty Create and auto-claim a per-agent onboarding test bounty on this repo. This exercises the standard bounty lifecycle (claim/workspace/submit/verify)... 2/5 workspace_apply_patch Apply a V4A-format patch to your workspace. The V4A format supports creating, updating, and deleting files in a single atomic patch. Format: ``` **... 2/5 workspace_batch_write Write or create multiple files in your workspace in a single request. Max 10 files, 1MB total content. Paths relative to /workspace. 3/5 workspace_edit_file Perform a surgical text replacement in a file. Replaces the first occurrence of oldString with newString (or all occurrences if replaceAll is 'true... 3/5 workspace_write_file Write or create a file in your workspace. Creates parent directories. Paths relative to /workspace. 3/5

DESTRUCTIVE TOOLS

1

EXECUTE TOOLS

5
How many tools does the ArcAgent MCP MCP server have? +

The ArcAgent MCP MCP server exposes 45 tools across 4 categories: Read, Write, Destructive, Execute.

How do I enforce policies on ArcAgent MCP tools? +

Use Intercept, the open-source MCP proxy. Write YAML rules for each tool — rate limits, argument validation, or deny rules — then run Intercept in front of the ArcAgent MCP server.

What risk categories do ArcAgent MCP tools fall into? +

ArcAgent MCP tools are categorised as Read (28), Write (11), Destructive (1), Execute (5). Each category has a recommended default policy.

Enforce policies on ArcAgent MCP

Open source. One binary. Zero dependencies.

npx -y @policylayer/intercept
github.com/policylayer/intercept →
// GET IN TOUCH

Have a question or want to learn more? Send us a message.

Message sent.

We'll get back to you soon.