FILESYSTEM TOOLS

14 tools from the Filesystem MCP Server, categorised by risk level.

View the Filesystem policy →

READ TOOLS

10
directory_tree Get a recursive tree view of files and directories as a JSON structure. Each entry includes 'name', 'type' (file/directory), and 'children' for dir... 2/5 get_file_info Retrieve detailed metadata about a file or directory. Returns comprehensive information including size, creation time, last modified time, permissi... 2/5 list_allowed_directories Returns the list of directories that this server is allowed to access. Subdirectories within these allowed directories are also accessible. Use thi... list_directory Get a detailed listing of all files and directories in a specified path. Results clearly distinguish between files and directories with [FILE] and ... 2/5 list_directory_with_sizes Get a detailed listing of all files and directories in a specified path, including sizes. Results clearly distinguish between files and directories... 2/5 read_file Read the complete contents of a file as text. DEPRECATED: Use read_text_file instead. 2/5 read_media_file Read an image or audio file. Returns the base64 encoded data and MIME type. Only works within allowed directories. 2/5 read_multiple_files Read the contents of multiple files simultaneously. This is more efficient than reading files one by one when you need to analyze or compare multip... 2/5 read_text_file Read the complete contents of a file from the file system as text. Handles various text encodings and provides detailed error messages if the file ... search_files Recursively search for files and directories matching a pattern. The patterns should be glob-style patterns that match paths relative to the workin... 2/5

WRITE TOOLS

4
How many tools does the Filesystem MCP server have? +

The Filesystem MCP server exposes 14 tools across 2 categories: Read, Write.

How do I enforce policies on Filesystem tools? +

Use Intercept, the open-source MCP proxy. Write YAML rules for each tool — rate limits, argument validation, or deny rules — then run Intercept in front of the Filesystem server.

What risk categories do Filesystem tools fall into? +

Filesystem tools are categorised as Read (10), Write (4). Each category has a recommended default policy.

Enforce policies on Filesystem

Open source. One binary. Zero dependencies.

npx -y @policylayer/intercept
github.com/policylayer/intercept →
// GET IN TOUCH

Have a question or want to learn more? Send us a message.

Message sent.

We'll get back to you soon.