8 tools from the Mcp App Extension MCP Server, categorised by risk level.
View the Mcp App Extension policy →get_extension Get extension detail including manifest, permissions, and targets. Requires CLI auth. list_apps List available apps for development with IDs, names, and targets. Requires CLI auth. list_extensions List extensions under an app with status, version, and bundle URL. Requires CLI auth. list_instances List instances under an app. Requires CLI auth. list_skills List all available SDK skills with descriptions lookup_skill Look up a specific SDK skill by ID or search by keyword. Returns full skill content for ID lookup, or matching skill metadata for keyword search. 2/5 validate_manifest Validate an extension manifest.json. Checks required fields, valid permissions, targets, and allowedDomains consistency with permissions. validate_permissions Static analysis: match declared manifest permissions against actual capability and event hook usage in source files. Detects unused permissions and... The Mcp App Extension MCP server exposes 8 tools across 1 categories: Read.
Use Intercept, the open-source MCP proxy. Write YAML rules for each tool — rate limits, argument validation, or deny rules — then run Intercept in front of the Mcp App Extension server.
Mcp App Extension tools are categorised as Read (8). Each category has a recommended default policy.
Open source. One binary. Zero dependencies.
npx -y @policylayer/intercept