39 tools from the Coolify MCP Server, categorised by risk level.
View the Coolify policy →application_logs Get application logs 2/5 Context-Optimized Optimised response format for context efficiency 2/5 diagnose_app Get app diagnostics including status and logs 3/5 diagnose_server Get server diagnostics and resource status 3/5 find_issues Scan infrastructure for unhealthy resources 3/5 get_application Get application details 2/5 get_database Get database details 2/5 get_infrastructure_overview Get overview of all infrastructure 2/5 get_mcp_version Get Coolify MCP server version 2/5 get_server Get server details 2/5 get_service Get service details 2/5 get_version Get Coolify API version 2/5 list_applications List all Coolify applications 2/5 list_databases List all Coolify databases 2/5 list_deployments List running deployments 2/5 list_servers List all Coolify servers 2/5 list_services List all Coolify services 2/5 search_docs Search Coolify documentation 2/5 server_domains Get domains configured on a server 2/5 server_resources Get resources running on a server 2/5 teams List and view team information 2/5 validate_server Validate server connection 2/5 application Create, update, or delete applications 5/5 cloud_tokens Manage cloud provider tokens (CRUD) 5/5 database Create or delete databases 5/5 database_backups Manage database backup schedules 5/5 deployment Manage deployments (get, cancel, list) 4/5 env_vars Manage environment variables (CRUD) 5/5 environments Manage environments (list, get, create, delete) 5/5 github_apps Manage GitHub App integrations (CRUD) 5/5 private_keys Manage SSH keys (CRUD) 5/5 projects Manage projects (list, get, create, update, delete) 5/5 service Create, update, or delete services 5/5 The Coolify MCP server exposes 39 tools across 4 categories: Read, Write, Destructive, Execute.
Use Intercept, the open-source MCP proxy. Write YAML rules for each tool — rate limits, argument validation, or deny rules — then run Intercept in front of the Coolify server.
Coolify tools are categorised as Read (22), Write (1), Destructive (11), Execute (5). Each category has a recommended default policy.
Open source. One binary. Zero dependencies.
npx -y @policylayer/intercept