8 tools from the Exa MCP Server, categorised by risk level.
View the Exa policy →company_research_exa Research companies for business information 2/5 crawling_exa Read a webpage's full content as clean markdown. Use after web_search_exa when highlights are insufficient or to read any URL.
Best for: Extractin... deep_researcher_check Check status of a deep research task 2/5 get_code_context_exa Find code examples, documentation, and programming solutions.
Best for: Any programming question - API usage, library examples, code snippets, de... 2/5 people_search_exa Find people and professional profiles 2/5 web_search_advanced_exa Advanced web search with domain filters 2/5 web_search_exa Search the web for any topic and get clean, ready-to-use content.
Best for: Finding current information, news, facts, or answering questions about... 2/5 The Exa MCP server exposes 8 tools across 2 categories: Read, Execute.
Use Intercept, the open-source MCP proxy. Write YAML rules for each tool — rate limits, argument validation, or deny rules — then run Intercept in front of the Exa server.
Exa tools are categorised as Read (7), Execute (1). Each category has a recommended default policy.
Open source. One binary. Zero dependencies.
npx -y @policylayer/intercept