INVARIUM TOOLS

19 tools from the Invarium MCP Server, categorised by risk level.

View the Invarium policy →

READ TOOLS

9
invarium_get_agent Get detailed information about a specific agent. Returns tools, constraints, AQS score, recent test runs, and a dashboard link. WHEN TO USE: Phas... invarium_get_audit Retrieve the latest static audit results for your agent. Shows the Agent Readiness Score (ARS), per-category breakdown, and findings grouped by se... invarium_get_test_run Get detailed test run results including individual test case outcomes. Retrieves the run summary and a paginated list of test case results, with o... invarium_get_tests Retrieve test cases for your agent. If generation_id is provided, checks that specific generation's status and returns results when ready. Otherwi... invarium_get_workflow Get the complete Invarium QA workflow or a specific phase. MUST be called before starting any work with Invarium tools. Returns step-by-step instr... invarium_list_agents List all agents registered in your Invarium workspace. Shows each agent's name, status, AQS (Agent Quality Score), scenario count, and when the ag... invarium_list_scenarios List test scenarios for an agent. Shows each scenario's title, ID, status, active state, complexity, and test case count. Args: agent_name: N... invarium_list_test_runs List test runs for an agent or across all agents. Shows run status, pass rate, source, and date. Use this to see what test runs have been executed... invarium_usage Show your current plan usage and remaining limits. Displays how many agents, test generations, simulation runs, and API keys you've used this mont...

WRITE TOOLS

5

DESTRUCTIVE TOOLS

2

EXECUTE TOOLS

3
How many tools does the Invarium MCP server have? +

The Invarium MCP server exposes 19 tools across 4 categories: Read, Write, Destructive, Execute.

How do I enforce policies on Invarium tools? +

Use Intercept, the open-source MCP proxy. Write YAML rules for each tool — rate limits, argument validation, or deny rules — then run Intercept in front of the Invarium server.

What risk categories do Invarium tools fall into? +

Invarium tools are categorised as Read (9), Write (5), Destructive (2), Execute (3). Each category has a recommended default policy.

Enforce policies on Invarium

Open source. One binary. Zero dependencies.

npx -y @policylayer/intercept
github.com/policylayer/intercept →
// GET IN TOUCH

Have a question or want to learn more? Send us a message.

Message sent.

We'll get back to you soon.