13 tools from the Cuba Memorys MCP Server, categorised by risk level.
View the Cuba Memorys policy →cuba_alarma Report errors immediately. Auto-detects patterns (≥3 similar = warning). Hebbian: similar errors get boosted for easier retrieval. cuba_alma CRUD knowledge graph entities (concepts, projects, technologies, patterns, people). Auto-boosts neighbors on access. For transient info use cuba_cr... cuba_cronica Attach facts/lessons/decisions to entities. Auto-creates entity if not found. Dedup gate blocks near-duplicates. Contradictions auto-supersede old ... cuba_decreto Record and query architecture/design decisions. 2/5 cuba_eco RLHF feedback: positive boosts importance (Oja's rule), negative decreases, correct updates content. cuba_expediente Search past errors/solutions. Use 'proposed_action' as anti-repetition guard: warns if similar approach previously failed. 2/5 cuba_faro Search memory BEFORE answering to ground responses. Returns grounding scores. Mode 'verify' checks claims against evidence (confidence: verified/pa... 2/5 cuba_jornada Track working sessions with goals and outcomes. cuba_remedio Mark an error as resolved with solution. Cross-references similar unresolved errors. cuba_vigia Knowledge graph analytics: summary (counts + token estimate), health (staleness, entropy, DB size), drift (chi-squared on errors), communities (Lei... cuba_forget GDPR Right to Erasure: cascading hard-delete of an entity and ALL references across observations, relations, errors, and sessions. IRREVERSIBLE. Re... 4/5 cuba_zafra Memory maintenance: decay (exponential, halflife=30d), prune (remove low-importance), merge (deduplicate), summarize (compress observations), pager... 4/5 The Cuba Memorys MCP server exposes 13 tools across 3 categories: Read, Write, Destructive.
Use Intercept, the open-source MCP proxy. Write YAML rules for each tool — rate limits, argument validation, or deny rules — then run Intercept in front of the Cuba Memorys server.
Cuba Memorys tools are categorised as Read (10), Write (1), Destructive (2). Each category has a recommended default policy.
Open source. One binary. Zero dependencies.
npx -y @policylayer/intercept