Low Risk

cgm_expc_search

Search ministry law interpretations (중앙부처 1차 해석 목록 조회). Search law interpretation opinions from Korean central government ministries. Args: ministry: Ministry name in Korean. Valid values: 고용노동부, 국토교통부, 기획재정부, 해양수산부, 행정안전부, 기후...

Accepts freeform code/query input (query)

Part of the Korean Law Search MCP server. Enforce policies on this tool with Intercept, the open-source MCP proxy.

rabqatab/lexlink-ko-mcp Read Risk 2/5

AI agents call cgm_expc_search to retrieve information from Korean Law Search without modifying any data. This is common in research, monitoring, and reporting workflows where the agent needs context before taking action. Because read operations don't change state, they are generally safe to allow without restrictions -- but you may still want rate limits to control API costs.

Even though cgm_expc_search only reads data, uncontrolled read access can leak sensitive information or rack up API costs. An agent caught in a retry loop could make thousands of calls per minute. A rate limit gives you a safety net without blocking legitimate use.

Read-only tools are safe to allow by default. No rate limit needed unless you want to control costs.

rabqatab-lexlink-ko-mcp.yaml
tools:
  cgm_expc_search:
    rules:
      - action: allow

See the full Korean Law Search policy for all 54 tools.

Tool Name cgm_expc_search
Category Read
Risk Level Low

View all 54 tools →

Agents calling read-class tools like cgm_expc_search have been implicated in these attack patterns. Read the full case and prevention policy for each:

Browse the full MCP Attack Database →

Other tools in the Read risk category across the catalogue. The same policy patterns (rate-limit, allow) apply to each.

What does the cgm_expc_search tool do? +

Search ministry law interpretations (중앙부처 1차 해석 목록 조회). Search law interpretation opinions from Korean central government ministries. Args: ministry: Ministry name in Korean. Valid values: 고용노동부, 국토교통부, 기획재정부, 해양수산부, 행정안전부, 기후에너지환경부, 관세청, 국세청, 교육부, 과학기술정보통신부, 국가보훈부, 국방부, 농림축산식품부, 문화체육관광부, 법무부, 보건복지부, 산업통상부, 성평등가족부, 외교부, 중소벤처기업부, 통일부, 법제처, 식품의약품안전처, 인사혁신처, 기상청, 국가유산청, 농촌진흥청, 경찰청, 방위사업청, 병무청, 산림청, 소방청, 재외동포청, 조달청, 질병관리청, 국가데이터처, 지식재산처, 해양경찰청, 행정중심복합도시건설청 query: Search keyword (default "*") display: Number of results per page (max 100, default 20) page: Page number (1-based, default 1) oc: Optional OC override (defaults to env var) type: Response format - "JSON" (default), "XML", or "HTML" search: 1=사건명 (case name), 2=본문검색 (full text) sort: Sort order gana: Dictionary search ctx: MCP context (injected automatically) Returns: Ministry interpretation list or error Examples: Search 고용노동부 interpretations: >>> cgm_expc_search(ministry="고용노동부", query="퇴직금") . It is categorised as a Read tool in the Korean Law Search MCP Server, which means it retrieves data without modifying state.

How do I enforce a policy on cgm_expc_search? +

Add a rule in your Intercept YAML policy under the tools section for cgm_expc_search. You can allow, deny, rate-limit, or validate arguments. Then run Intercept as a proxy in front of the Korean Law Search MCP server.

What risk level is cgm_expc_search? +

cgm_expc_search is a Read tool with low risk. Read-only tools are generally safe to allow by default.

Can I rate-limit cgm_expc_search? +

Yes. Add a rate_limit block to the cgm_expc_search rule in your Intercept policy. For example, setting max: 10 and window: 60 limits the tool to 10 calls per minute. Rate limits are tracked per agent session and reset automatically.

How do I block cgm_expc_search completely? +

Set action: deny in the Intercept policy for cgm_expc_search. The AI agent will receive a policy violation error and cannot call the tool. You can also include a reason field to explain why the tool is blocked.

What MCP server provides cgm_expc_search? +

cgm_expc_search is provided by the Korean Law Search MCP server (rabqatab/lexlink-ko-mcp). Intercept sits as a proxy in front of this server to enforce policies before tool calls reach the server.

Enforce policies on Korean Law Search

Open source. One binary. Zero dependencies.

npx -y @policylayer/intercept
github.com/policylayer/intercept →
// GET IN TOUCH

Have a question or want to learn more? Send us a message.

Message sent.

We'll get back to you soon.