4 tools from the Aikido MCP Server, categorised by risk level.
View the Aikido policy →aikido_analyze Scan an Aiken smart contract project for security vulnerabilities. Returns findings with severity, location, CWC classification, and evidence. Exit... aikido_cwc_lookup Search the Cardano Weakness Classification (CWC) registry. Look up by CWC ID, severity, detector name, or keyword. Returns vulnerability descriptio... 2/5 aikido_explain Get a detailed explanation of a specific Aikido security detector, including what it checks, why it matters, and remediation guidance. aikido_list_rules List all 75 Aikido security detectors with severity, category, CWE mapping, and reliability tier. The Aikido MCP server exposes 4 tools across 1 categories: Read.
Use Intercept, the open-source MCP proxy. Write YAML rules for each tool — rate limits, argument validation, or deny rules — then run Intercept in front of the Aikido server.
Aikido tools are categorised as Read (4). Each category has a recommended default policy.
Open source. One binary. Zero dependencies.
npx -y @policylayer/intercept