21 tools from the Mcp Funnel MCP Server, categorised by risk level.
View the Mcp Funnel policy →alwaysVisibleTools Get always-visible tool patterns 2/5 args Get command arguments 2/5 defaultPassthroughEnv Get default passthrough env vars 3/5 defaultSecretProviders Get default secret providers 3/5 discover_tools_by_words Search for tools by keywords 2/5 env Get environment variable configuration 3/5 exposeCoreTools Get core tool exposure patterns 2/5 exposeTools Get tool exposure patterns 2/5 get_tool_schema Get input schema for a tool 2/5 github__get_team_members Get GitHub team members 2/5 hideTools Get tool hiding patterns 2/5 load_toolset Load predefined tool patterns 2/5 memory__check_database_health Check memory database health 2/5 secretProviders Get secret provider configurations 3/5 servers List MCP servers configuration 2/5 The Mcp Funnel MCP server exposes 21 tools across 4 categories: Read, Write, Destructive, Execute.
Use Intercept, the open-source MCP proxy. Write YAML rules for each tool — rate limits, argument validation, or deny rules — then run Intercept in front of the Mcp Funnel server.
Mcp Funnel tools are categorised as Read (15), Write (1), Destructive (1), Execute (4). Each category has a recommended default policy.
Open source. One binary. Zero dependencies.
npx -y @policylayer/intercept