24 tools from the Bright Data MCP Server, categorised by risk level.
View the Bright Data policy →extract AI-assisted data extraction from web pages 2/5 scrape_as_html Scrape webpage as raw HTML 2/5 scrape_as_markdown Convert any webpage to clean markdown 2/5 scrape_batch Batch scrape multiple webpages 3/5 scraping_browser_screenshot Take a screenshot of a browser session 2/5 scraping_browser_snapshot Take a snapshot of a browser session 2/5 search_engine Web search with AI-optimised results 2/5 search_engine_batch Batch web search for multiple queries 2/5 web_data_amazon_product Get Amazon product data 2/5 web_data_apple_app_store Get Apple App Store app data 2/5 web_data_booking_hotel_listings Get Booking.com hotel listing data 2/5 web_data_crunchbase_company Get Crunchbase company data 2/5 web_data_github_repository_file Get GitHub repository file data 2/5 web_data_google_play_store Get Google Play Store app data 2/5 web_data_google_shopping Get Google Shopping data 2/5 web_data_linkedin_posts Get LinkedIn posts data 2/5 web_data_reuter_news Get Reuters news data 2/5 web_data_tiktok_posts Get TikTok posts data 2/5 web_data_walmart_product Get Walmart product data 2/5 web_data_yahoo_finance_business Get Yahoo Finance business data 2/5 web_data_youtube_videos Get YouTube video data 2/5 web_data_zillow_properties_listing Get Zillow property listing data 2/5 web_data_zoominfo_company_profile Get ZoomInfo company profile data 2/5 The Bright Data MCP server exposes 24 tools across 2 categories: Read, Execute.
Use Intercept, the open-source MCP proxy. Write YAML rules for each tool — rate limits, argument validation, or deny rules — then run Intercept in front of the Bright Data server.
Bright Data tools are categorised as Read (23), Execute (1). Each category has a recommended default policy.
Open source. One binary. Zero dependencies.
npx -y @policylayer/intercept