CONFIGCAT TOOLS

72 tools from the ConfigCat MCP Server, categorised by risk level.

View the ConfigCat policy →

READ TOOLS

34
get-code-references Get code references for feature flags 2/5 get-config Get specific config details 2/5 get-environment Get specific environment details 2/5 get-integration Get integration details 2/5 get-permission-group Get permission group details 2/5 get-product Get specific product details 2/5 get-product-preferences Get product preferences 2/5 get-sdk-keys Get SDK keys for config/environment 3/5 get-segment Get specific segment details 2/5 get-setting Get specific feature flag details 2/5 get-setting-value Get feature flag value in an environment 2/5 get-setting-values Get multiple feature flag values 2/5 get-tag Get specific tag details 2/5 get-webhook Get webhook details 2/5 get-webhook-signing-keys List webhook signing keys 3/5 list-auditlogs Get product audit logs 2/5 list-configs List configs for a product 2/5 list-environments List environments for a product 2/5 list-integrations List integrations 2/5 list-organization-auditlogs Get organisation audit logs 2/5 list-organization-members List organisation members 2/5 list-organizations List all organisations 2/5 list-pending-invitations List pending invitations 2/5 list-pending-invitations-org List organisation pending invitations 2/5 list-permission-groups List permission groups 2/5 list-product-members List product members 2/5 list-products List all products 2/5 list-segments List user segments 2/5 list-settings List feature flags for a config 2/5 list-settings-by-tag Get feature flags by tag 2/5 list-staleflags Get stale feature flags report 2/5 list-tags List tags for a product 2/5 list-webhooks List webhooks 2/5 update-sdk-documentation Get SDK documentation and code examples 2/5

WRITE TOOLS

26

DESTRUCTIVE TOOLS

12
How many tools does the ConfigCat MCP server have? +

The ConfigCat MCP server exposes 72 tools across 3 categories: Read, Write, Destructive.

How do I enforce policies on ConfigCat tools? +

Use Intercept, the open-source MCP proxy. Write YAML rules for each tool — rate limits, argument validation, or deny rules — then run Intercept in front of the ConfigCat server.

What risk categories do ConfigCat tools fall into? +

ConfigCat tools are categorised as Read (34), Write (26), Destructive (12). Each category has a recommended default policy.

Enforce policies on ConfigCat

Open source. One binary. Zero dependencies.

npx -y @policylayer/intercept
github.com/policylayer/intercept →
// GET IN TOUCH

Have a question or want to learn more? Send us a message.

Message sent.

We'll get back to you soon.