3 tools from the Recon MCP Server, categorised by risk level.
View the Recon policy →osint_get_results Get paginated results from a previous OSINT search by search ID. Returns entries from a specific database and page. osint_list_databases List all databases found in a previous OSINT search by search ID. osint_search Search leaked databases for email addresses, phone numbers, usernames, domains, or other identifiers. Returns results from multiple databases with ... 2/5 The Recon MCP server exposes 3 tools across 1 categories: Read.
Use Intercept, the open-source MCP proxy. Write YAML rules for each tool — rate limits, argument validation, or deny rules — then run Intercept in front of the Recon server.
Recon tools are categorised as Read (3). Each category has a recommended default policy.
Open source. One binary. Zero dependencies.
npx -y @policylayer/intercept