MUND TOOLS

23 tools from the Mund MCP Server, categorised by risk level.

View the Mund policy →

READ TOOLS

15
mund_acknowledge_alert Mark a security event/alert as acknowledged. Args: - event_id (string): ID of the event to acknowledge - acknowledged_by (string): Optional na... mund_audit_mcp_permissions Analyze the permission scope and capabilities of an MCP server's tools. Identifies network access, filesystem operations, command execution, and ot... mund_check_typosquatting Check if an MCP server name is potentially typosquatting a known legitimate server. Compares against a list of official and common MCP servers. mund_check_url Check if a URL is safe to access. Validates URLs against known dangerous patterns including: - Data exfiltration services (webhook.site, requestbi... mund_get_events Retrieve recent security events from the Mund monitoring system. Supports filtering and pagination for efficient event retrieval. Args: - limit... mund_get_status Get the current status of the Mund monitoring system. Returns information about: - Active analyzers and their status - Number of rules loaded - Co... mund_intel_status Get threat intelligence health status including source coverage, pattern counts by category, and MITRE ATT&CK technique coverage. mund_list_intel_sources List all configured threat intelligence sources with their status, update intervals, and pattern counts. mund_list_patterns Browse threat detection patterns by source, category, or enabled status. mund_list_rules List all configured detection rules. Args: - type: Optional filter by detection type - enabled_only: Only show enabled rules (default: false) ... mund_scan_content Scan text or code content for security vulnerabilities, secrets, PII, and other issues. This tool analyzes the provided content using multiple sec... mund_scan_mcp_server Scan an MCP server manifest (server.json) for security issues before installation. Detects prompt injection in tool descriptions, typosquatting, em... mund_threat_scan Scan content using threat intelligence patterns. Returns findings with MITRE ATT&CK technique mappings. mund_toggle_pattern Enable or disable a specific threat detection pattern. mund_validate_command Validate a shell command for safety before execution. Checks for dangerous patterns including: - Destructive commands (rm -rf, format, etc.) - Pri... 2/5

WRITE TOOLS

6

DESTRUCTIVE TOOLS

2
How many tools does the Mund MCP server have? +

The Mund MCP server exposes 23 tools across 3 categories: Read, Write, Destructive.

How do I enforce policies on Mund tools? +

Use Intercept, the open-source MCP proxy. Write YAML rules for each tool — rate limits, argument validation, or deny rules — then run Intercept in front of the Mund server.

What risk categories do Mund tools fall into? +

Mund tools are categorised as Read (15), Write (6), Destructive (2). Each category has a recommended default policy.

Enforce policies on Mund

Open source. One binary. Zero dependencies.

npx -y @policylayer/intercept
github.com/policylayer/intercept →
// GET IN TOUCH

Have a question or want to learn more? Send us a message.

Message sent.

We'll get back to you soon.