23 tools from the Couchbase MCP Server, categorised by risk level.
View the Couchbase policy →get_buckets_in_cluster List all buckets in the cluster 2/5 get_cluster_health_and_services Get cluster health and running services 2/5 get_collections_in_scope List all collections in a scope 2/5 get_document_by_id Get a document by ID from a collection 2/5 get_index_advisor_recommendations Get index recommendations for a SQL++ query 2/5 get_longest_running_queries Get longest running queries by service time 2/5 get_most_frequent_queries Get most frequently executed queries 2/5 get_queries_not_selective Get queries that are not selective 2/5 get_queries_not_using_covering_index Get queries not using a covering index 2/5 get_queries_using_primary_index Get queries using a primary index 2/5 get_queries_with_large_result_count Get queries with largest result counts 2/5 get_queries_with_largest_response_sizes Get queries with largest response sizes 2/5 get_schema_for_collection Get the structure for a collection 2/5 get_scopes_and_collections_in_bucket List all scopes and collections in a bucket 2/5 get_scopes_in_bucket List all scopes in a specified bucket 2/5 get_server_configuration_status Get MCP server configuration status 2/5 list_indexes List all indexes with their definitions 2/5 test_cluster_connection Check cluster credentials by connecting 2/5 The Couchbase MCP server exposes 23 tools across 4 categories: Read, Write, Destructive, Execute.
Use Intercept, the open-source MCP proxy. Write YAML rules for each tool — rate limits, argument validation, or deny rules — then run Intercept in front of the Couchbase server.
Couchbase tools are categorised as Read (18), Write (3), Destructive (1), Execute (1). Each category has a recommended default policy.
Open source. One binary. Zero dependencies.
npx -y @policylayer/intercept