12 tools from the Cargo MCP Server, categorised by risk level.
View the Cargo policy →audit Runs cargo audit and returns structured vulnerability data. 3/5 build Runs cargo build and returns structured diagnostics (file, line, code, severity, message). 4/5 clippy Runs cargo clippy and returns structured lint diagnostics. 3/5 doc Generates Rust documentation and returns structured output with warning count. 3/5 fmt Checks or fixes Rust formatting and returns structured output. 3/5 run Runs a cargo binary and returns structured output (exit code, stdout, stderr). 4/5 tree Displays the dependency tree for a Rust project. 3/5 The Cargo MCP server exposes 12 tools across 4 categories: Read, Write, Destructive, Execute.
Use Intercept, the open-source MCP proxy. Write YAML rules for each tool — rate limits, argument validation, or deny rules — then run Intercept in front of the Cargo server.
Cargo tools are categorised as Read (2), Write (2), Destructive (1), Execute (7). Each category has a recommended default policy.
Open source. One binary. Zero dependencies.
npx -y @policylayer/intercept