13 tools from the Vigil Fraud Alert MCP Server, categorised by risk level.
View the Vigil Fraud Alert policy →vigil_analyze_transaction AI-powered fraud analysis for a specific transaction vigil_authorize Authorize a transaction using GPS proximity and card mode vigil_block_transaction AI-powered decision to block a suspicious transaction vigil_confirm_transaction Manually confirm a flagged transaction vigil_get_card Get card details, GPS status, and current mode vigil_get_risk_profile Get the risk score and profile for a card vigil_list_alerts List fraud alerts for a card vigil_list_transactions List recent transactions with authorization results vigil_add_travel_plan Add a travel plan to allow foreign transactions 3/5 vigil_generate_report Generate a full fraud investigation report for a card 2/5 vigil_update_alert Acknowledge, dismiss, or escalate a fraud alert 2/5 vigil_update_card_mode Set card mode: home, travel, or lockdown 2/5 vigil_update_gps Update the GPS location for a card 2/5 The Vigil Fraud Alert MCP server exposes 13 tools across 2 categories: Read, Write.
Use Intercept, the open-source MCP proxy. Write YAML rules for each tool — rate limits, argument validation, or deny rules — then run Intercept in front of the Vigil Fraud Alert server.
Vigil Fraud Alert tools are categorised as Read (8), Write (5). Each category has a recommended default policy.
Open source. One binary. Zero dependencies.
npx -y @policylayer/intercept