5 tools from the ToolTrust Scanner MCP Server, categorised by risk level.
View the ToolTrust Scanner policy →tooltrust_list_rules Returns the full catalog of security rules used by the ToolTrust scanner, including rule IDs, titles, and descriptions. Useful for understanding wh... tooltrust_lookup Look up historical security risk grades for an MCP server from the public ToolTrust Directory. Accepts the kebab-case name of the server and return... tooltrust_scan_config Reads the user's Claude Code MCP configuration and scans all configured servers in parallel. Searches for .mcp.json in the current directory, then ... tooltrust_scan_server Connects to a live MCP server via standard input/output (stdio), parses its tools, and scans them for prompt injection, data exfiltration, and priv... 2/5 tooltrust_scanner_scan Scan a list of AI agent tool definitions for security risks. Accepts an MCP tools/list JSON payload and returns a risk report with gateway policies... The ToolTrust Scanner MCP server exposes 5 tools across 1 categories: Read.
Use Intercept, the open-source MCP proxy. Write YAML rules for each tool — rate limits, argument validation, or deny rules — then run Intercept in front of the ToolTrust Scanner server.
ToolTrust Scanner tools are categorised as Read (5). Each category has a recommended default policy.
Open source. One binary. Zero dependencies.
npx -y @policylayer/intercept