4 tools from the Piqrypt MCP Server, categorised by risk level.
View the Piqrypt policy →piqrypt_search_events Search audit trail using fast SQLite index. Filter by event type, date range, or agent ID. piqrypt_stamp_event Sign an AI decision with PiQrypt for cryptographic audit trail. Creates AISS-1.0 signed event with Ed25519 or AISS-2.0 with Dilithium3 (post-quantum). piqrypt_verify_chain Verify integrity of PiQrypt event chain. Validates signatures, hash chain, and detects tampering or forks. The Piqrypt MCP server exposes 4 tools across 2 categories: Read, Write.
Use Intercept, the open-source MCP proxy. Write YAML rules for each tool — rate limits, argument validation, or deny rules — then run Intercept in front of the Piqrypt server.
Piqrypt tools are categorised as Read (3), Write (1). Each category has a recommended default policy.
Open source. One binary. Zero dependencies.
npx -y @policylayer/intercept