CHROME TOOLS

23 tools from the Chrome MCP Server, categorised by risk level.

View the Chrome policy →

READ TOOLS

8

WRITE TOOLS

10
click Click an element by ref, CSS selector, or viewport coordinates. Dispatches real CDP mouse events (mouseMoved/mousePressed/mouseReleased). For canva... 2/5 configure_session View/set session defaults for recurring parameters (tab, timeout, etc.). Without params: show current defaults and auto-promote suggestions. With a... 2/5 drag Drag an element via native CDP mouse events (mousePressed → interpolated mouseMoved with buttons:1 → mouseReleased). Works for CSS-driven drag: sli... 2/5 file_upload Upload file(s) to a file input element. Provide ref or CSS selector to identify the <input type='file'>, and absolute path(s) to the file(s). 3/5 fill_form Fill a complete form with one call — the preferred way to submit any form with 2+ fields. Each field needs ref or CSS selector plus value. Supports... 2/5 handle_dialog Configure browser dialog handling (alerts, confirms, prompts). Pre-configure BEFORE triggering actions that may show dialogs. Replaces evaluate-bas... 2/5 press_key Press a keyboard key or shortcut. Optionally focus an element first via ref/selector. Use for Enter, Escape, Tab, arrows, shortcuts (Ctrl+K). 2/5 scroll Scroll the page, a container, or an element into view. Returns position and content-growth tracking (scrollHeight grew by Npx — useful for detectin... 2/5 switch_tab Open a new tab, switch to an existing tab by ID (from virtual_desk), or close a tab. Prefer 'open' over navigate when you don't want to touch the u... 2/5 type Type text into an input field identified by ref or CSS selector. For multiple fields in the same form, prefer fill_form — it handles text inputs, <... 2/5

DESTRUCTIVE TOOLS

1

EXECUTE TOOLS

4
How many tools does the Chrome MCP server have? +

The Chrome MCP server exposes 23 tools across 4 categories: Read, Write, Destructive, Execute.

How do I enforce policies on Chrome tools? +

Use Intercept, the open-source MCP proxy. Write YAML rules for each tool — rate limits, argument validation, or deny rules — then run Intercept in front of the Chrome server.

What risk categories do Chrome tools fall into? +

Chrome tools are categorised as Read (8), Write (10), Destructive (1), Execute (4). Each category has a recommended default policy.

Enforce policies on Chrome

Open source. One binary. Zero dependencies.

npx -y @policylayer/intercept
github.com/policylayer/intercept →
// GET IN TOUCH

Have a question or want to learn more? Send us a message.

Message sent.

We'll get back to you soon.