TESSERACT TOOLS

46 tools from the Tesseract MCP Server, categorised by risk level.

View the Tesseract policy →

READ TOOLS

17

WRITE TOOLS

23
add_component Add a component 2/5 add_connection Add a connection 2/5 add_layer Add layers 2/5 annotate Add a note to a component 2/5 export_mermaid Export architecture as Mermaid 2/5 highlight_path Highlight a data flow path 2/5 import_mermaid Import Mermaid diagram 2/5 login Authenticate with Tesseract cloud. If no code is provided, opens a browser for automatic pairing — authentication completes in the background. Alte... 3/5 look_at Navigate camera to a component 2/5 pin_all Pin all components 3/5 prepare_upload Prepare upload URL 2/5 reorder_layers Reorder layers 2/5 save_flow Save highlights as a flow 2/5 studio_set_category_attr Update a category's editable attributes (name and/or description). Other fields (id, collection, creator) are managed by the system. 2/5 studio_set_collection_attr Update a collection's editable attributes (name and/or description). Other fields (id, tier, creator) are managed by the system. 2/5 studio_set_component_attr Update a component's editable attributes (name and/or description). Other fields (scale, offset, rotation, decals, modelRef) are managed via the UI... 2/5 studio_write_scad Write the OpenSCAD source file for a 3D component and trigger the render pipeline. If uuid is omitted, a new UUID is generated automatically. Creat... 2/5 unpin_components Unpin components 2/5 update_component Update a component 2/5 update_connection Update a connection 2/5 update_flow Update a flow 2/5 update_layer Update layers 2/5 update_project Update project title/description 2/5

DESTRUCTIVE TOOLS

5

EXECUTE TOOLS

1
How many tools does the Tesseract MCP server have? +

The Tesseract MCP server exposes 46 tools across 4 categories: Read, Write, Destructive, Execute.

How do I enforce policies on Tesseract tools? +

Use Intercept, the open-source MCP proxy. Write YAML rules for each tool — rate limits, argument validation, or deny rules — then run Intercept in front of the Tesseract server.

What risk categories do Tesseract tools fall into? +

Tesseract tools are categorised as Read (17), Write (23), Destructive (5), Execute (1). Each category has a recommended default policy.

Enforce policies on Tesseract

Open source. One binary. Zero dependencies.

npx -y @policylayer/intercept
github.com/policylayer/intercept →
// GET IN TOUCH

Have a question or want to learn more? Send us a message.

Message sent.

We'll get back to you soon.