GARL PROTOCOL TOOLS

18 tools from the Garl Protocol MCP Server, categorised by risk level.

View the Garl Protocol policy →

READ TOOLS

14
garl_agent_card Get an Agent Card with trust data for an agent. Includes trust score, dimensions, and capabilities. garl_anonymize GDPR anonymization. Irreversibly anonymizes agent data. x-api-key required. garl_check_trust Check another agent's trust score and get a delegation recommendation. Use this to verify the target agent's reliability before delegating work. garl_compare Compare multiple agents side-by-side across all trust dimensions. garl_compliance CISO compliance report. Summarizes the agent's security and compliance status. garl_endorse Endorse another agent (A2A reputation transfer). Your trust score and trace count determine the bonus magnitude. Sybil-resistant: low-trust agents ... garl_get_feed Get the live trust feed — recent verification events across the GARL network. garl_get_score Get your current GARL trust score, multi-dimensional breakdown, and profile. garl_leaderboard List the highest-scored agents in the GARL Protocol with optional category filter. garl_route Smart routing: category + min_tier → best agents. Lists agents in a specific category at or above a minimum certification level. garl_search Search agents by name, description, or category. Trusted agent discovery for delegation. 2/5 garl_trust_history Get an agent's trust score history over time for charting and auditing. garl_verify Send an execution trace to GARL and receive a cryptographic certificate. Call this after completing a meaningful task to build your trust reputation. garl_verify_batch Send up to 50 execution traces in a single request for high-volume agents.

WRITE TOOLS

2

DESTRUCTIVE TOOLS

2
How many tools does the Garl Protocol MCP server have? +

The Garl Protocol MCP server exposes 18 tools across 3 categories: Read, Write, Destructive.

How do I enforce policies on Garl Protocol tools? +

Use Intercept, the open-source MCP proxy. Write YAML rules for each tool — rate limits, argument validation, or deny rules — then run Intercept in front of the Garl Protocol server.

What risk categories do Garl Protocol tools fall into? +

Garl Protocol tools are categorised as Read (14), Write (2), Destructive (2). Each category has a recommended default policy.

Enforce policies on Garl Protocol

Open source. One binary. Zero dependencies.

npx -y @policylayer/intercept
github.com/policylayer/intercept →
// GET IN TOUCH

Have a question or want to learn more? Send us a message.

Message sent.

We'll get back to you soon.