27 tools from the Vercel MCP Server, categorised by risk level.
View the Vercel policy →filterVercelProjectEnvs Retrieve project environment variables 3/5 getVercelDeployment Get a Vercel deployment by ID or URL 2/5 getVercelDeploymentEvents Get Vercel deployment events 2/5 getVercelDeploymentFileContents Get deployment file contents 3/5 getVercelDeployments List Vercel deployments 2/5 getVercelDNSRecords List DNS records for a domain 2/5 getVercelDomain Get information for a single domain 2/5 getVercelDomainConfig Get a domain's configuration 2/5 getVercelDomains List all domains 2/5 getVercelProjectDomain Get a project domain 2/5 getVercelProjectDomains Retrieve project domains 2/5 getVercelProjectEnv Retrieve decrypted environment variable 4/5 getVercelProjects Retrieve a list of projects 2/5 listVercelDeploymentFiles List files in a deployment 2/5 verifyVercelProjectDomain Verify project domain configuration 2/5 addVercelProjectDomain Add a domain to a project 4/5 createVercelDNSRecord Create a DNS record for a domain 5/5 createVercelProjectEnv Create environment variables 4/5 editVercelProjectEnv Edit an environment variable 4/5 updateVercelDNSRecord Update a DNS record 5/5 updateVercelProject Update an existing project 4/5 updateVercelProjectDomain Update a project domain 4/5 The Vercel MCP server exposes 27 tools across 3 categories: Read, Write, Destructive.
Use Intercept, the open-source MCP proxy. Write YAML rules for each tool — rate limits, argument validation, or deny rules — then run Intercept in front of the Vercel server.
Vercel tools are categorised as Read (15), Write (7), Destructive (5). Each category has a recommended default policy.
Open source. One binary. Zero dependencies.
npx -y @policylayer/intercept