Review steps
- Separate read-only tools from write, execute, destructive, and financial tools.
- Require approval for tools that change external systems or move money.
- Keep a blocked list for irreversible actions until stronger controls exist.
- Attach policy output to the MCP client configuration.