14 tools from the Python MCP Server, categorised by risk level.
View the Python policy →black Runs Black code formatter and returns structured results (files changed, unchanged, would reformat). 2/5 mypy Runs mypy and returns structured type-check diagnostics (file, line, severity, message, code). 2/5 pip-audit Runs pip-audit and returns a structured vulnerability report. 2/5 pip-list Runs pip list and returns a structured list of installed packages. 2/5 pip-show Runs pip show and returns structured package metadata (name, version, summary, dependencies). Supports multiple packages in a single call. pyenv Manages Python versions via pyenv. 2/5 pytest Runs pytest and returns structured test results (passed, failed, errors, skipped, failures). 2/5 ruff-check Runs ruff check and returns structured lint diagnostics (file, line, code, message). 2/5 ruff-format Runs ruff format and returns structured results (files changed, file list). 2/5 The Python MCP server exposes 14 tools across 4 categories: Read, Write, Destructive, Execute.
Use Intercept, the open-source MCP proxy. Write YAML rules for each tool — rate limits, argument validation, or deny rules — then run Intercept in front of the Python server.
Python tools are categorised as Read (9), Write (2), Destructive (2), Execute (1). Each category has a recommended default policy.
Open source. One binary. Zero dependencies.
npx -y @policylayer/intercept