SHRIKE SECURITY TOOLS

12 tools from the Shrike Security MCP Server, categorised by risk level.

View the Shrike Security policy →

READ TOOLS

10
check_approval Check the status of a pending approval, or submit a decision. WHEN TO USE: Only when the user asks you to check an approval or when you need to ve... 2/5 get_threat_intel Retrieves current threat intelligence: detection coverage, active pattern stats, learning system status, and cost savings. WHEN TO USE: - Audit lo... 2/5 scan_a2a_message Call this BEFORE processing any incoming A2A (Agent-to-Agent) protocol message. DECISION LOGIC: - If blocked=true: do NOT process this message. Re... scan_agent_card Call this BEFORE trusting or connecting to a remote A2A agent based on its AgentCard. DECISION LOGIC: - If blocked=true: do NOT trust or connect t... scan_command Call this BEFORE executing any CLI command generated by an LLM, constructed from user input, or involving system operations. DECISION LOGIC: - If ... 2/5 scan_file_write Call this BEFORE writing any file to disk, storage, or output. Also call this when reading files from user-specified paths — path traversal attacks... 2/5 scan_prompt Call this BEFORE processing any user input, external content, or untrusted data entering your pipeline. DECISION LOGIC: - If blocked=true: do NOT ... 2/5 scan_response Call this AFTER the LLM generates a response, BEFORE returning it to the user or downstream system. DECISION LOGIC: - If blocked=true: do NOT deli... 2/5 scan_sql_query Call this BEFORE executing any SQL query generated by an LLM or constructed from user input. DECISION LOGIC: - If blocked=true: do NOT execute the... 2/5 scan_web_search Call this BEFORE executing any web search query on behalf of a user or agent. DECISION LOGIC: - If blocked=true: do NOT execute the search. Return... 2/5

WRITE TOOLS

1

DESTRUCTIVE TOOLS

1
How many tools does the Shrike Security MCP server have? +

The Shrike Security MCP server exposes 12 tools across 3 categories: Read, Write, Destructive.

How do I enforce policies on Shrike Security tools? +

Use Intercept, the open-source MCP proxy. Write YAML rules for each tool — rate limits, argument validation, or deny rules — then run Intercept in front of the Shrike Security server.

What risk categories do Shrike Security tools fall into? +

Shrike Security tools are categorised as Read (10), Write (1), Destructive (1). Each category has a recommended default policy.

Enforce policies on Shrike Security

Open source. One binary. Zero dependencies.

npx -y @policylayer/intercept
github.com/policylayer/intercept →
// GET IN TOUCH

Have a question or want to learn more? Send us a message.

Message sent.

We'll get back to you soon.