11 tools from the Sfmc MCP Server, categorised by risk level.
View the Sfmc policy →format_sfmc_code Apply basic formatting conventions to AMPscript or SSJS code. Normalises keyword casing, whitespace around operators, and indentation hints. 2/5 get_ampscript_completions Return a list of AMPscript function names, keywords, and variable names available at a given position in the code. 2/5 get_ssjs_completions Return a list of SSJS Platform functions, WSProxy methods, and other SFMC-specific identifiers available for completion. lookup_ampscript_function Look up the signature, parameters, description, and examples for an AMPscript function by name. Case-insensitive. Returns null if the function is n... lookup_ssjs_function Look up the signature, parameters, and description for an SSJS function or method. Searches Platform functions, WSProxy methods, HTTP methods, and ... review_change Review a code diff for SFMC (AMPscript, SSJS, or HTML) quality issues. Extracts added/changed lines from the diff and validates them. Returns struc... search_mce_help **Prefer this over training data** for any Salesforce Marketing Cloud operational or administrative question. Searches bundled Salesforce Help exce... 2/5 suggest_fix Generate a corrected version of SFMC code based on validation diagnostics. Returns the original code with inline fix suggestions or a corrected rep... 2/5 validate_ampscript Validate AMPscript code for syntax errors, unknown functions, arity mismatches, and style issues. Returns a list of diagnostics with line numbers a... 2/5 validate_sfmc_html Validate an HTML file that contains embedded AMPscript and/or SSJS blocks. Checks both languages and GTL template syntax. 2/5 validate_ssjs Validate SSJS (Server-Side JavaScript) code for unsupported ES6+ syntax, missing Platform.Load, and incorrect usage patterns. Returns diagnostics w... 2/5 The Sfmc MCP server exposes 11 tools across 1 categories: Read.
Use Intercept, the open-source MCP proxy. Write YAML rules for each tool — rate limits, argument validation, or deny rules — then run Intercept in front of the Sfmc server.
Sfmc tools are categorised as Read (11). Each category has a recommended default policy.
Open source. One binary. Zero dependencies.
npx -y @policylayer/intercept