Low Risk

adjust-reporting

Adjust reporting

High parameter count (13 properties)

Part of the Adjust Reporting Server MCP server. Enforce policies on this tool with Intercept, the open-source MCP proxy.

AI agents call adjust-reporting to perform operations in Adjust Reporting Server. While the risk category is not fully classified, applying a rate limit gives you visibility into how often the tool is called and prevents unexpected bursts of activity from autonomous agents.

Applying a policy to adjust-reporting gives you an audit trail of every call an AI agent makes. Even for low-risk tools, visibility into agent behaviour helps you debug issues, optimise workflows, and maintain compliance with your organisation's security requirements.

Apply a rate limit to control usage and monitor for unexpected behaviour.

bitscorp-mcp-mcp-adjust.yaml
tools:
  adjust-reporting:
    rules:
      - action: allow
        rate_limit:
          max: 60
          window: 60

See the full Adjust Reporting Server policy for all 2 tools.

Tool Name adjust-reporting
Category Other
Risk Level Low

Agents calling other-class tools like adjust-reporting have been implicated in these attack patterns. Read the full case and prevention policy for each:

Browse the full MCP Attack Database →

Other tools in the Other risk category across the catalogue. The same policy patterns (rate-limit, validate) apply to each.

What does the adjust-reporting tool do? +

Adjust reporting. It is categorised as a Other tool in the Adjust Reporting Server MCP Server, which means it performs auxiliary operations.

How do I enforce a policy on adjust-reporting? +

Add a rule in your Intercept YAML policy under the tools section for adjust-reporting. You can allow, deny, rate-limit, or validate arguments. Then run Intercept as a proxy in front of the Adjust Reporting Server MCP server.

What risk level is adjust-reporting? +

adjust-reporting is a Other tool with low risk. Read-only tools are generally safe to allow by default.

Can I rate-limit adjust-reporting? +

Yes. Add a rate_limit block to the adjust-reporting rule in your Intercept policy. For example, setting max: 10 and window: 60 limits the tool to 10 calls per minute. Rate limits are tracked per agent session and reset automatically.

How do I block adjust-reporting completely? +

Set action: deny in the Intercept policy for adjust-reporting. The AI agent will receive a policy violation error and cannot call the tool. You can also include a reason field to explain why the tool is blocked.

What MCP server provides adjust-reporting? +

adjust-reporting is provided by the Adjust Reporting Server MCP server (bitscorp-mcp/mcp-adjust). Intercept sits as a proxy in front of this server to enforce policies before tool calls reach the server.

Let agents act without letting them run wild.

Deterministic policy on every MCP tool call. Per-identity grants. Full audit log.

Currently onboarding teams running MCP in production.
// GET IN TOUCH

Have a question or want to learn more? Send us a message.

Message sent.

We'll get back to you soon.

// REQUEST EARLY ACCESS

We're letting people in as fast as we can.

You're in the queue.

We'll be in touch as soon as we can let you in.