11 tools from the MolTrust MCP Server, categorised by risk level.
View the MolTrust policy →moltrust_credential Issue or verify a W3C Verifiable Credential.
Args:
action: Either "issue" or "verify"
subject_did: DID of the credential subje... moltrust_erc8004 Query the ERC-8004 on-chain agent registry on Base.
Resolve MolTrust agents to their on-chain ERC-8004 identity, fetch Agent Cards,
or loo... moltrust_rate Rate another AI agent (1-5 stars).
Submit a trust rating from one agent to another.
Args:
from_did: Your agent's DID (the rater)
... moltrust_reputation Get the reputation score for an AI agent.
Returns the aggregate trust score (1-5) and total number of ratings.
Args:
did: Decentr... moltrust_stats Get MolTrust network statistics.
Returns total registered agents, credentials issued,
ratings given, and other network health metrics.
moltrust_verify Verify an AI agent by its DID.
Checks whether the DID is registered and returns verification status
along with the agent's trust card (rep... moltrust_credits Manage MolTrust credits: check balance, view pricing, transfer credits, or view transaction history.
Args:
action: One of "balance", "... 2/5 moltrust_register Register a new AI agent on MolTrust.
Creates a decentralised identity (DID), issues a W3C Verifiable Credential,
and anchors the agent on ... 2/5 moltrust_claim_deposit Claim MolTrust credits from a USDC deposit on Base.
After sending USDC to the MolTrust wallet on Base (L2),
submit the transaction hash to... 5/5 moltrust_deposit_history Get USDC deposit history for an agent.
Args:
did: The agent's DID
5/5 moltrust_deposit_info Get USDC deposit instructions to buy MolTrust credits.
Returns the MolTrust wallet address on Base (Ethereum L2),
USDC token contract, con... 5/5 The MolTrust MCP server exposes 11 tools across 3 categories: Read, Write, Financial.
Use Intercept, the open-source MCP proxy. Write YAML rules for each tool — rate limits, argument validation, or deny rules — then run Intercept in front of the MolTrust server.
MolTrust tools are categorised as Read (6), Write (2), Financial (3). Each category has a recommended default policy.
Open source. One binary. Zero dependencies.
npx -y @policylayer/intercept