38 tools from the Scrcpy MCP Server, categorised by risk level.
View the Scrcpy policy →app_current Get the currently foregrounded app package name and activity. app_list List installed packages on the device. Optionally filter by name or restrict to system/third-party apps. clipboard_get Get the current clipboard content from the device. Uses scrcpy GET_CLIPBOARD when a session is active (works on Android 10+), falls back to ADB cli... device_info Get detailed info about a device: model, Android version, screen size, SDK level, battery level device_list List all connected Android devices with their serial numbers, state, and model file_list List directory contents on the device. 2/5 screenshot Take a screenshot of the Android device screen. Returns the image as base64. ui_find_element Find UI elements on screen by text, resource ID, class name, or content description. Returns matching elements with their tap coordinates. At least... app_install Install an APK file on the device from the host machine. 2/5 clipboard_set Set the clipboard content on the device. Uses scrcpy SET_CLIPBOARD when a session is active (with optional paste flag), falls back to ADB clipboard... 2/5 collapse_panels Collapse all open panels (notification, settings) (requires active scrcpy session) 2/5 connect_wifi Enable WiFi ADB and connect to the device wirelessly. Returns the connection address. 2/5 disconnect_wifi Disconnect from a wireless ADB device 2/5 drag_drop Perform a drag and drop gesture from one point to another. Uses input draganddrop on Android 8.0+ (API 26), falls back to swipe on older versions. 2/5 expand_notifications Expand the notification panel (requires active scrcpy session) 2/5 expand_settings Expand the quick settings panel (requires active scrcpy session) 2/5 file_pull Pull a file from the device to the host machine. 2/5 file_push Push a file from the host machine to the device. 2/5 input_text Type text into the currently focused input field 2/5 key_event Send a key event to the device. Supports keycodes like HOME, BACK, ENTER, VOLUME_UP, etc. 2/5 long_press Perform a long press at the specified coordinates 2/5 rotate_device Rotate the device screen (requires active scrcpy session) 2/5 screen_off Turn the device screen off 2/5 screen_on Wake the device screen (turn screen on) 2/5 scroll Scroll at the specified position. dx and dy are scroll amounts (-1 to 1 range approximated for ADB). 2/5 swipe Perform a swipe gesture from one point to another 2/5 tap Tap at the specified screen coordinates 2/5 ui_dump Dump the full UI hierarchy of the current screen as XML. Useful for understanding screen structure before using ui_find_element. 2/5 app_start Launch an app on the device. Uses scrcpy START_APP when a session is active for faster launch, falls back to ADB `am start`. Supports force-stop pr... 3/5 app_stop Force-stop an app on the device. 3/5 screen_record_start Start recording the screen. Recording continues until screen_record_stop is called. 3/5 screen_record_stop Stop screen recording and optionally pull the file to the host. 3/5 shell_exec Execute an arbitrary ADB shell command on the device and return the output. Use this for any device operation not covered by other tools. 4/5 start_session Start a scrcpy session for fast input control and screenshots. When a session is active, tap/swipe/text/screenshot are 10-50x faster. Requires scrc... 3/5 start_video_stream Start an HTTP MJPEG video stream of the device screen. Opens a native ffplay window that connects to the stream URL. Requires an active scrcpy sess... 3/5 stop_session Stop the active scrcpy session. Tools will fall back to ADB commands. 3/5 stop_video_stream Stop the HTTP MJPEG video stream and close the viewer window for a device. 3/5 The Scrcpy MCP server exposes 38 tools across 4 categories: Read, Write, Destructive, Execute.
Use Intercept, the open-source MCP proxy. Write YAML rules for each tool — rate limits, argument validation, or deny rules — then run Intercept in front of the Scrcpy server.
Scrcpy tools are categorised as Read (8), Write (20), Destructive (1), Execute (9). Each category has a recommended default policy.
Open source. One binary. Zero dependencies.
npx -y @policylayer/intercept