12 tools from the ADAS MCP Server, categorised by risk level.
View the ADAS policy →adas_get_examples Get complete working examples that pass validation. Study these before building your own. adas_get_solution Read solution state — definition, skills, health, status, or export. Use this to inspect deployed solutions. adas_get_spec Get the ADAS specification — schemas, validation rules, system tools, agent guides, and templates. Use this to understand how to build skills and s... adas_list_solutions List all solutions deployed in the Skill Builder. adas_validate_skill Validate a skill definition through the 5-stage ADAS validation pipeline. Returns errors and suggestions to fix. adas_validate_solution Validate a solution definition — cross-skill contracts, grant economy, handoffs, and LLM quality scoring. adas_solution_chat Send a message to the Solution Bot — an AI assistant that understands your deployed solution and can help with modifications. 2/5 adas_update Update a deployed solution or skill incrementally using PATCH. Supports dot notation for scalar fields and _push/_delete/_update for arrays. 2/5 adas_deploy_connector Deploy a connector — registers in the Skill Builder catalog and connects in ADAS Core. 3/5 adas_deploy_skill Deploy a single skill into an existing solution. 3/5 adas_deploy_solution Deploy a complete solution to ADAS Core — identity, connectors, skills. The Skill Builder auto-generates MCP servers from tool definitions. This is... 3/5 adas_redeploy Re-deploy after making updates. Regenerates MCP servers and pushes to ADAS Core. 3/5 The ADAS MCP server exposes 12 tools across 3 categories: Read, Write, Execute.
Use Intercept, the open-source MCP proxy. Write YAML rules for each tool — rate limits, argument validation, or deny rules — then run Intercept in front of the ADAS server.
ADAS tools are categorised as Read (6), Write (2), Execute (4). Each category has a recommended default policy.
Open source. One binary. Zero dependencies.
npx -y @policylayer/intercept