AUTODOCK TOOLS

27 tools from the Autodock MCP Server, categorised by risk level.

View the Autodock policy →

READ TOOLS

14
account.info Return information about the currently authenticated Autodock user account.list_api_keys List your API keys (shows prefix only, not full key) browser.poll Retrieve captured browser events from a listener session. Returns console logs, network requests, and errors captured from the browser. Also retur... 2/5 browser.shot Request a screenshot from the browser. The screenshot will be captured asynchronously by the browser. IMPORTANT: Screenshots can take 10-15 second... 2/5 browser.stop Stop a browser listener session. This will signal the browser to stop capturing and clean up server resources. The user can also stop from the bro... env.extend Extend the auto-stop timer for a running environment. Resets the idle timer and sets a new auto-stop duration. env.launch Launch a new Autodock environment. Typically takes 1-2 minutes. env.list List environments for the authenticated user env.listExposed List exposed ports for an environment env.observe Get Loki query commands for observing logs on an Autodock environment. Returns SSH+curl commands for querying the local Loki instance. Does NOT fe... 2/5 env.reserve Preview the cost of reserving an environment for 30 days ($149). Reserved environments do not auto-stop and do not count against your concurrent en... env.reserve_confirm Confirm reservation and process $149 payment. Environment will not auto-stop for 30 days after reservation. Payment is charged immediately to your ... env.save Get templates for saving session setup to AUTODOCK.md. Returns environment details, exposed ports, and command templates for documentation. If en... env.status Fetch a specific environment by ID

WRITE TOOLS

3

DESTRUCTIVE TOOLS

3

EXECUTE TOOLS

7
How many tools does the Autodock MCP server have? +

The Autodock MCP server exposes 27 tools across 4 categories: Read, Write, Destructive, Execute.

How do I enforce policies on Autodock tools? +

Use Intercept, the open-source MCP proxy. Write YAML rules for each tool — rate limits, argument validation, or deny rules — then run Intercept in front of the Autodock server.

What risk categories do Autodock tools fall into? +

Autodock tools are categorised as Read (14), Write (3), Destructive (3), Execute (7). Each category has a recommended default policy.

Enforce policies on Autodock

Open source. One binary. Zero dependencies.

npx -y @policylayer/intercept
github.com/policylayer/intercept →
// GET IN TOUCH

Have a question or want to learn more? Send us a message.

Message sent.

We'll get back to you soon.