21 tools from the Sshmcp MCP Server, categorised by risk level.
View the Sshmcp policy →download_directory Download remote directory (remote compress → download → local extract. Use async for large dirs) download_file Download file from remote server (use async mode for large files) get_server View server configuration details list_proxies List all configured SOCKS proxies list_servers List all configured servers and active connections read_file Read remote file content (supports line range, suitable for logs and config files) test_connection Test server connectivity (does not affect existing connections) transfer_status Check background transfer task progress (use with async_transfer=true) add_proxy Add or update SOCKS proxy preset 3/5 add_server Add or update server configuration 3/5 connect Manually connect to server (usually not needed, tools auto-connect) 2/5 disconnect Disconnect from server 2/5 quick_connect Temporary server connection (not saved). Returns host:port as server_id for subsequent operations 3/5 rename_server Rename server ID (alias) 2/5 update_server Update server configuration (only pass fields to change, rest unchanged) 3/5 upload_directory Upload local directory to remote server (auto compress, transfer, and extract. Use async for large dirs) 2/5 upload_file Upload local file to remote server (path-based, zero token cost. Use async mode for large files) 2/5 write_file Write content to remote file (overwrite) 2/5 The Sshmcp MCP server exposes 21 tools across 4 categories: Read, Write, Destructive, Execute.
Use Intercept, the open-source MCP proxy. Write YAML rules for each tool — rate limits, argument validation, or deny rules — then run Intercept in front of the Sshmcp server.
Sshmcp tools are categorised as Read (8), Write (10), Destructive (2), Execute (1). Each category has a recommended default policy.
Open source. One binary. Zero dependencies.
npx -y @policylayer/intercept