9 tools from the Chictr MCP Server, categorised by risk level.
View the Chictr policy →get_access_state 获取访问状态机信息(NORMAL/SUSPECTED/CHALLENGED/COOLDOWN/RECOVERY) get_cache_stats 获取缓存统计信息,包括搜索缓存和详情缓存的命中率等 get_cache_stats_v2 获取双层缓存统计(L1内存 + L2 SQLite) get_runtime_metrics 获取运行时编排指标(请求总数、重试次数、挑战次数等) get_trial_detail 根据注册号查询临床试验的完整详细信息 prepare_verification_session 创建人工验证会话(用于挑战后人工恢复流程) search_trials 搜索ChiCTR临床试验。支持按标题关键词、注册号、年份进行搜索,返回试验列表。 The Chictr MCP server exposes 9 tools across 3 categories: Read, Write, Destructive.
Use Intercept, the open-source MCP proxy. Write YAML rules for each tool — rate limits, argument validation, or deny rules — then run Intercept in front of the Chictr server.
Chictr tools are categorised as Read (7), Write (1), Destructive (1). Each category has a recommended default policy.
Open source. One binary. Zero dependencies.
npx -y @policylayer/intercept