2 tools from the SecDim Secure Coding Labs MCP Server, categorised by risk level.
View the SecDim Secure Coding Labs policy →get_learning_pathway
Return a personalized secure code learning pathway based on github or secdim profile context.
Use this tool to:
- Analyze GitHub prof... get_vulnerable_practice_labs
Return a list of hands-on SecDim secure coding labs related to a detected or suspected vulnerability.
Use this tool to:
- Find secure... The SecDim Secure Coding Labs MCP server exposes 2 tools across 1 categories: Read.
Use Intercept, the open-source MCP proxy. Write YAML rules for each tool — rate limits, argument validation, or deny rules — then run Intercept in front of the SecDim Secure Coding Labs server.
SecDim Secure Coding Labs tools are categorised as Read (2). Each category has a recommended default policy.
Open source. One binary. Zero dependencies.
npx -y @policylayer/intercept