GNETiX Docs
Mcp servers

Tool Catalog

Managing and securing MCP tools

The Tool Catalog is GNETiX's central registry of all tools available across your MCP servers. It provides visibility into what tools exist, who can use them, and a full audit trail of every invocation.

Syncing Tools

When you add or update an MCP server, you need to sync its tools into the catalog. Syncing connects to the live MCP server, pulls all tool definitions (name, description, input schema), and stores them in the database.

To sync:

  1. Navigate to MCP Servers in the portal
  2. Select the server
  3. Click Sync Tools

GNETiX compares the live tools with the catalog and adds new tools, updates changed descriptions/schemas, and marks removed tools as inactive.

Tools in the catalog are what the Director sees. If a tool exists on the MCP server but has not been synced, the Director cannot discover or call it.

Tag-Based Access Control

GNETiX uses a tag-based RBAC system to control which users can invoke which tools. The model is simple:

  1. Create tags (e.g., network, kubernetes, read-only, senior-engineer)
  2. Assign tags to tools -- each tool can have one or more tags
  3. Assign tags to users -- each user can have one or more tags
  4. A user can invoke a tool only if they share at least one tag with that tool

Example

EntityTags
Tool: show_interface_statusnetwork
Tool: restart_podkubernetes, senior-engineer
User: Alicenetwork, kubernetes
User: Bobnetwork
  • Alice can call show_interface_status (shares network) and restart_pod (shares kubernetes)
  • Bob can call show_interface_status (shares network) but not restart_pod (no matching tag)

Tag Groups

Tags can be organized into tag groups for easier management. For example, a "Department" group might contain network, security, and cloud tags. Groups are purely organizational -- the access control logic operates on individual tags.

Default Deny Mode

By default, untagged tools are callable by any authenticated user. For stricter security, enable tools_default_deny mode at the org level:

  • Default deny OFF (default): Untagged tools are available to all users
  • Default deny ON: Untagged tools are blocked. Every tool must have at least one tag, and users must have a matching tag to call it

Enabling default deny will immediately block access to any untagged tools. Make sure all tools are properly tagged before turning this on.

Audit Log

Every tool invocation is logged with:

FieldDescription
TimestampWhen the tool was called
UserWho triggered the request (directly or via chat)
ToolThe tool name and MCP server
InputThe parameters passed to the tool
OutputThe tool's response (or error)
LatencyHow long the invocation took
Trace IDLink to the Pipeline Monitor trace

Access the audit log from MCP Servers > Audit Log in the portal, or query it via the API at /api/tool-logs.

The audit log is essential for compliance, debugging, and understanding how the AI is interacting with your infrastructure.