26 tools from the RunPod MCP Server, categorised by risk level.
View the RunPod policy →get-container-registry-auth get-container-registry-auth get-endpoint get-endpoint get-network-volume get-network-volume get-pod get-pod get-template get-template list-container-registry-auths list-container-registry-auths list-endpoints list-endpoints list-network-volumes list-network-volumes list-pods list-pods list-templates list-templates create-container-registry-auth create-container-registry-auth 3/5 create-endpoint create-endpoint 2/5 create-network-volume create-network-volume 2/5 create-pod create-pod 2/5 create-template create-template 2/5 update-endpoint update-endpoint 2/5 update-network-volume update-network-volume 2/5 update-pod update-pod 2/5 update-template update-template 2/5 The RunPod MCP server exposes 26 tools across 4 categories: Read, Write, Destructive, Execute.
Use Intercept, the open-source MCP proxy. Write YAML rules for each tool — rate limits, argument validation, or deny rules — then run Intercept in front of the RunPod server.
RunPod tools are categorised as Read (10), Write (9), Destructive (5), Execute (2). Each category has a recommended default policy.
Open source. One binary. Zero dependencies.
npx -y @policylayer/intercept