SCRCPY TOOLS

38 tools from the Scrcpy MCP Server, categorised by risk level.

View the Scrcpy policy →

READ TOOLS

8

WRITE TOOLS

20
app_install Install an APK file on the device from the host machine. 2/5 clipboard_set Set the clipboard content on the device. Uses scrcpy SET_CLIPBOARD when a session is active (with optional paste flag), falls back to ADB clipboard... 2/5 collapse_panels Collapse all open panels (notification, settings) (requires active scrcpy session) 2/5 connect_wifi Enable WiFi ADB and connect to the device wirelessly. Returns the connection address. 2/5 disconnect_wifi Disconnect from a wireless ADB device 2/5 drag_drop Perform a drag and drop gesture from one point to another. Uses input draganddrop on Android 8.0+ (API 26), falls back to swipe on older versions. 2/5 expand_notifications Expand the notification panel (requires active scrcpy session) 2/5 expand_settings Expand the quick settings panel (requires active scrcpy session) 2/5 file_pull Pull a file from the device to the host machine. 2/5 file_push Push a file from the host machine to the device. 2/5 input_text Type text into the currently focused input field 2/5 key_event Send a key event to the device. Supports keycodes like HOME, BACK, ENTER, VOLUME_UP, etc. 2/5 long_press Perform a long press at the specified coordinates 2/5 rotate_device Rotate the device screen (requires active scrcpy session) 2/5 screen_off Turn the device screen off 2/5 screen_on Wake the device screen (turn screen on) 2/5 scroll Scroll at the specified position. dx and dy are scroll amounts (-1 to 1 range approximated for ADB). 2/5 swipe Perform a swipe gesture from one point to another 2/5 tap Tap at the specified screen coordinates 2/5 ui_dump Dump the full UI hierarchy of the current screen as XML. Useful for understanding screen structure before using ui_find_element. 2/5

DESTRUCTIVE TOOLS

1

EXECUTE TOOLS

9
How many tools does the Scrcpy MCP server have? +

The Scrcpy MCP server exposes 38 tools across 4 categories: Read, Write, Destructive, Execute.

How do I enforce policies on Scrcpy tools? +

Use Intercept, the open-source MCP proxy. Write YAML rules for each tool — rate limits, argument validation, or deny rules — then run Intercept in front of the Scrcpy server.

What risk categories do Scrcpy tools fall into? +

Scrcpy tools are categorised as Read (8), Write (20), Destructive (1), Execute (9). Each category has a recommended default policy.

Enforce policies on Scrcpy

Open source. One binary. Zero dependencies.

npx -y @policylayer/intercept
github.com/policylayer/intercept →
// GET IN TOUCH

Have a question or want to learn more? Send us a message.

Message sent.

We'll get back to you soon.