Skip to content

MCP Policy

This document defines which MCP (Model Context Protocol) servers, tools, and operations are permitted during the Ant-Digest workflow. All MCP tool usage must pass through this policy gate before execution.

Before any MCP tool call, verify:

  1. Server is listed in the Allowed Servers section below
  2. Operation type is permitted for that server
  3. Data classification is known — what plane does the input/output belong to?
  4. No sensitive data is sent to external servers (GUARDRAILS: no PII, no secrets)
  5. Output is logged with source attribution for CRUMBLOG provenance

If any check fails, the tool call is blocked. Log the attempted call and reason for blocking.

Purpose: Fetch up-to-date library documentation and code examples.

OperationPermittedData Class
resolve-library-idYesQuery: non-sensitive library name
query-docsYesQuery: technical question, no project secrets

Output plane: B (external documentation) Logging: Log library ID + query + date

Purpose: Code review, PR analysis, custom context management.

OperationPermittedData Class
list_pull_requestsYesRepo metadata
get_merge_requestYesPR metadata + diff
list_merge_request_commentsYesReview comments
trigger_code_reviewYesSends code for review
search_greptile_commentsYesSearch review history
list_custom_contextYesOrg context
create_custom_contextRequires approvalCreates persistent org context

Output plane: B (external analysis) Logging: Log operation + PR number + date

Purpose: Browser automation for UI verification.

OperationPermittedData Class
browser_navigateYes — localhost onlyLocal URLs only
browser_snapshotYesPage accessibility tree
browser_click / browser_typeYes — localhost onlyUI interaction
browser_take_screenshotYesVisual verification
browser_console_messagesYesDebug output

Constraint: Navigation restricted to localhost URLs during development. No external site navigation without explicit user approval. Output plane: A (local verification result) Logging: Log URL + action + result summary

Purpose: Firebase project management (if applicable).

OperationPermittedData Class
All read operationsYesProject metadata
Create/modify operationsRequires approvalInfrastructure changes

Constraint: No operations permitted without an active, authenticated Firebase project. Output plane: B (external service state)

The following are never permitted regardless of server:

  • Sending PII or secrets as tool input
  • Navigating to external URLs without user approval (Playwright)
  • Creating persistent external state without user approval (Greptile custom context, Firebase resources)
  • Any operation not listed in the Allowed Servers section
Data TypeCan Send to MCP?Notes
Source code (this repo)YesPublic repo content
File pathsYesNon-sensitive
Library names / versionsYesNon-sensitive
Technical questionsYesNo project secrets embedded
SEMP event payloads (demo)YesOnly fictional demo data
PIINeverGUARDRAIL violation
API keys / secretsNeverGUARDRAIL violation
DATABASE_URLNeverGUARDRAIL violation

Every MCP tool call should be loggable in this format for CRUMBLOG provenance:

SOURCE:mcp/{server}/{tool}|QUERY:{summary}|DATE:{ISO-date}

Example:

SOURCE:mcp/context7/query-docs|QUERY:React TanStack Query setup|DATE:2026-02-04