7 tools from the Firecrawl MCP Server, categorised by risk level.
View the Firecrawl policy →firecrawl_agent Handle multi-source research tasks 3/5 firecrawl_batch_scrape Batch scrape multiple URLs 3/5 firecrawl_crawl Extract content from site sections 3/5 firecrawl_map Map website structure by discovering URLs 2/5 firecrawl_scrape Extract content from a single URL 2/5 firecrawl_search Search the web for information 2/5 The Firecrawl MCP server exposes 7 tools across 2 categories: Read, Execute.
Use Intercept, the open-source MCP proxy. Write YAML rules for each tool — rate limits, argument validation, or deny rules — then run Intercept in front of the Firecrawl server.
Firecrawl tools are categorised as Read (6), Execute (1). Each category has a recommended default policy.
Open source. One binary. Zero dependencies.
npx -y @policylayer/intercept