3 tools from the Xcomet MCP Server, categorised by risk level.
View the Xcomet policy →The Xcomet MCP server exposes 3 tools across 3 categories: Read, Write, Execute.
Use Intercept, the open-source MCP proxy. Write YAML rules for each tool — rate limits, argument validation, or deny rules — then run Intercept in front of the Xcomet server.
Xcomet tools are categorised as Read (1), Write (1), Execute (1). Each category has a recommended default policy.
Open source. One binary. Zero dependencies.
npx -y @policylayer/intercept