7 tools from the Tapd MCP Server, categorised by risk level.
View the Tapd policy →analyze_bug_video Download video attachment from a TAPD bug, extract key frames using ffmpeg, and return them as images for visual analysis. Useful for understanding... get_bug_detail Get full detail of a specific bug including description, comments, attachments, and all fields get_bug_workflow Get bug workflow configuration (status map, transitions) for a workspace get_bugs_list Get bug list for a TAPD workspace. Returns bug titles, status, severity, owner, etc. Use my_bugs=true to get only bugs assigned to the current logg... list_workspaces List all TAPD workspaces (projects) the current user has access to tapd-auth Login to TAPD via browser. Opens a Chromium window for you to login manually. The Tapd MCP server exposes 7 tools across 2 categories: Read, Destructive.
Use Intercept, the open-source MCP proxy. Write YAML rules for each tool — rate limits, argument validation, or deny rules — then run Intercept in front of the Tapd server.
Tapd tools are categorised as Read (6), Destructive (1). Each category has a recommended default policy.
Open source. One binary. Zero dependencies.
npx -y @policylayer/intercept