CLASSIC MAC TOOLS

23 tools from the Classic Mac MCP Server, categorised by risk level.

View the Classic Mac policy →

READ TOOLS

13
classic_mac_get_about Get system information about a Classic Mac target: OS version, machine type, RAM, free memory, AgentBridge uptime. Requires AgentBridge. classic_mac_get_clipboard Read the clipboard (scrap) contents as text. Requires AgentBridge. classic_mac_get_front_window Get detailed info about the frontmost window: title, app, bounds. Requires AgentBridge. classic_mac_get_menu_items Get all items in a specific menu, including enabled/disabled state and keyboard shortcuts. Requires AgentBridge. classic_mac_get_volumes List mounted volumes (disks) with free and total space. Requires AgentBridge. classic_mac_heartbeat Read the heartbeat status of a Classic Mac target. Returns uptime, front app, free memory, and whether the bridge is alive. classic_mac_list_folder List contents of a folder on the Classic Mac. Returns file names, types, creator codes, and sizes. Path uses ':' as separator (e.g. 'Macintosh HD:D... 2/5 classic_mac_list_menus List the menu bar contents for the frontmost application. Returns menu titles. Requires AgentBridge. classic_mac_list_processes List running applications on a Classic Mac target. Returns app name, creator code, PID, and memory partition. Requires AgentBridge. classic_mac_list_targets List all Classic Mac targets in the fleet with their current status, including architecture, OS version, and whether AgentBridge is alive. classic_mac_list_windows List all visible windows on a Classic Mac target. Returns window title, owning application, screen bounds, and layer order. Requires AgentBridge. classic_mac_ping Ping a Classic Mac target to check if AgentBridge is responding. classic_mac_quit_app Quit a running application by name. Requires AgentBridge.

WRITE TOOLS

9

EXECUTE TOOLS

1
How many tools does the Classic Mac MCP server have? +

The Classic Mac MCP server exposes 23 tools across 3 categories: Read, Write, Execute.

How do I enforce policies on Classic Mac tools? +

Use Intercept, the open-source MCP proxy. Write YAML rules for each tool — rate limits, argument validation, or deny rules — then run Intercept in front of the Classic Mac server.

What risk categories do Classic Mac tools fall into? +

Classic Mac tools are categorised as Read (13), Write (9), Execute (1). Each category has a recommended default policy.

Enforce policies on Classic Mac

Open source. One binary. Zero dependencies.

npx -y @policylayer/intercept
github.com/policylayer/intercept →
// GET IN TOUCH

Have a question or want to learn more? Send us a message.

Message sent.

We'll get back to you soon.