4 tools from the Context Engineering MCP Server, categorised by risk level.
View the Context Engineering policy →The Context Engineering MCP server exposes 4 tools across 3 categories: Read, Write, Execute.
Use Intercept, the open-source MCP proxy. Write YAML rules for each tool — rate limits, argument validation, or deny rules — then run Intercept in front of the Context Engineering server.
Context Engineering tools are categorised as Read (2), Write (1), Execute (1). Each category has a recommended default policy.
Open source. One binary. Zero dependencies.
npx -y @policylayer/intercept