Low Risk

search_jobs_bulk

Search job postings for multiple companies at once (여러 회사 채용공고 일괄 검색). 여러 회사명을 한 번에 입력하면 내부에서 병렬로 검색하여 결과를 반환합니다. 결과는 파일로 저장되며, 요약과 파일 경로를 반환합니다. 파일을 읽어서 상세 내용을 확인하세요. 병역특례 지정업체 목록 등 다수의 회사를 한 번에 조회할 때 사용하세요. search_jobs를 여러 번 호출하는 것보다 훨씬 빠릅니다.

Part of the Job Search MCP server. Enforce policies on this tool with Intercept, the open-source MCP proxy.

AI agents call search_jobs_bulk to retrieve information from Job Search without modifying any data. This is common in research, monitoring, and reporting workflows where the agent needs context before taking action. Because read operations don't change state, they are generally safe to allow without restrictions -- but you may still want rate limits to control API costs.

Even though search_jobs_bulk only reads data, uncontrolled read access can leak sensitive information or rack up API costs. An agent caught in a retry loop could make thousands of calls per minute. A rate limit gives you a safety net without blocking legitimate use.

Read-only tools are safe to allow by default. No rate limit needed unless you want to control costs.

io-github-pjw2004-job-search.yaml
tools:
  search_jobs_bulk:
    rules:
      - action: allow

See the full Job Search policy for all 2 tools.

Tool Name search_jobs_bulk
Category Read
Risk Level Low

Agents calling read-class tools like search_jobs_bulk have been implicated in these attack patterns. Read the full case and prevention policy for each:

Browse the full MCP Attack Database →

Other tools in the Read risk category across the catalogue. The same policy patterns (rate-limit, allow) apply to each.

What does the search_jobs_bulk tool do? +

Search job postings for multiple companies at once (여러 회사 채용공고 일괄 검색). 여러 회사명을 한 번에 입력하면 내부에서 병렬로 검색하여 결과를 반환합니다. 결과는 파일로 저장되며, 요약과 파일 경로를 반환합니다. 파일을 읽어서 상세 내용을 확인하세요. 병역특례 지정업체 목록 등 다수의 회사를 한 번에 조회할 때 사용하세요. search_jobs를 여러 번 호출하는 것보다 훨씬 빠릅니다.. It is categorised as a Read tool in the Job Search MCP Server, which means it retrieves data without modifying state.

How do I enforce a policy on search_jobs_bulk? +

Add a rule in your Intercept YAML policy under the tools section for search_jobs_bulk. You can allow, deny, rate-limit, or validate arguments. Then run Intercept as a proxy in front of the Job Search MCP server.

What risk level is search_jobs_bulk? +

search_jobs_bulk is a Read tool with low risk. Read-only tools are generally safe to allow by default.

Can I rate-limit search_jobs_bulk? +

Yes. Add a rate_limit block to the search_jobs_bulk rule in your Intercept policy. For example, setting max: 10 and window: 60 limits the tool to 10 calls per minute. Rate limits are tracked per agent session and reset automatically.

How do I block search_jobs_bulk completely? +

Set action: deny in the Intercept policy for search_jobs_bulk. The AI agent will receive a policy violation error and cannot call the tool. You can also include a reason field to explain why the tool is blocked.

What MCP server provides search_jobs_bulk? +

search_jobs_bulk is provided by the Job Search MCP server (job-search-mcp). Intercept sits as a proxy in front of this server to enforce policies before tool calls reach the server.

Enforce policies on Job Search

Open source. One binary. Zero dependencies.

npx -y @policylayer/intercept
github.com/policylayer/intercept →
// GET IN TOUCH

Have a question or want to learn more? Send us a message.

Message sent.

We'll get back to you soon.