3 tools from the SiftDB MCP Server, categorised by risk level.
View the SiftDB policy →list_collections
List all available collections.
Returns:
List of available collections with their paths
search_code
Search the codebase for patterns.
Args:
query: Search query (e.g., 'async def', 'TODO')
limit: Maximum number of results (default: 50)
... 2/5 view_file
View file content from the collection.
Args:
path: File path in the collection
start_line: Start line (1-based, default: 1)
end_line:... 2/5 The SiftDB MCP server exposes 3 tools across 1 categories: Read.
Use Intercept, the open-source MCP proxy. Write YAML rules for each tool — rate limits, argument validation, or deny rules — then run Intercept in front of the SiftDB server.
SiftDB tools are categorised as Read (3). Each category has a recommended default policy.
Open source. One binary. Zero dependencies.
npx -y @policylayer/intercept