2 tools from the Asana MCP Server, categorised by risk level.
View the Asana policy →The Asana MCP server exposes 2 tools across 2 categories: Read, Destructive.
Use Intercept, the open-source MCP proxy. Write YAML rules for each tool — rate limits, argument validation, or deny rules — then run Intercept in front of the Asana server.
Asana tools are categorised as Read (1), Destructive (1). Each category has a recommended default policy.
Deterministic policy on every MCP tool call. Per-identity grants. Full audit log.