6 tools from the Automotive Cybersecurity MCP Server, categorised by risk level.
View the Automotive Cybersecurity policy →about Server metadata, dataset statistics, freshness, and provenance. Call this to verify data coverage, currency, and content basis before relying on re... get_requirement Retrieve a specific regulation article or standard clause. For regulations (UNECE R155/R156), returns full text. For standards (ISO 21434), returns... list_sources List available automotive cybersecurity regulations and standards. Returns metadata including version, type (regulation/standard), item counts, and... list_work_products List ISO 21434 work products (deliverables) required for cybersecurity engineering. Shows which artifacts to produce for each clause, whether CAL-d... search_requirements Full-text search across all regulations and standards using FTS5 with BM25 ranking. Search regulations (UNECE R155/R156 full text) and standards (I... 2/5 The Automotive Cybersecurity MCP server exposes 6 tools across 2 categories: Read, Write.
Use Intercept, the open-source MCP proxy. Write YAML rules for each tool — rate limits, argument validation, or deny rules — then run Intercept in front of the Automotive Cybersecurity server.
Automotive Cybersecurity tools are categorised as Read (5), Write (1). Each category has a recommended default policy.
Open source. One binary. Zero dependencies.
npx -y @policylayer/intercept