Motebit

Tools

Built-in tools, MCP integration, and the trust model.

Tools give the motebit agency — the ability to read files, search the web, execute commands, and interact with external services. Every tool call passes through the policy gate before execution.

Built-in tools

Motebit ships with seven built-in tools:

ToolRiskDescription
readFileReadRead a file from allowed paths
writeFileWriteWrite a file (requires approval)
shellExecExecuteExecute a shell command (requires approval)
webSearchReadSearch the web
readUrlAnnotateFetch and read a URL
recallMemoriesReadQuery the agent's memory graph
listEventsReadBrowse the agent's event log

MCP integration

Model Context Protocol (MCP) lets your motebit connect to external tool servers. Configure MCP servers in ~/.motebit/config.json:

{
  "mcp_servers": [
    {
      "name": "filesystem",
      "transport": "stdio",
      "command": "npx",
      "args": ["-y", "@modelcontextprotocol/server-filesystem", "/home/user"],
      "trusted": true
    },
    {
      "name": "github",
      "transport": "stdio",
      "command": "npx",
      "args": ["-y", "@modelcontextprotocol/server-github"],
      "env": { "GITHUB_TOKEN": "ghp_..." },
      "trusted": false
    }
  ]
}
FieldTypeDescription
namestringServer identifier (used in tool namespacing)
transport"stdio"Transport type (stdio only for now)
commandstringCommand to launch the server
argsstring[]Command arguments
envobjectEnvironment variables for the server process
trustedbooleanIf false, all tools require per-call approval

MCP tools are namespaced to avoid collisions — format: {serverName}__{toolName} (e.g., filesystem__read_file, github__create_issue).

Trust model

Trusted vs untrusted servers

  • Trusted ("trusted": true) — Tools execute without per-call approval (still subject to risk level and operator mode)
  • Untrusted ("trusted": false) — Every tool call requires explicit user approval

Trust is managed per-server. In the CLI:

/mcp list          # Show connected servers and trust status
/mcp trust github  # Trust the github server
/mcp untrust github  # Remove trust

Risk levels still apply

Even trusted MCP tools go through risk classification. A trusted server's write_file tool still requires operator mode because it's classified as a write operation. Trust skips the per-call approval prompt, not the policy gate.

Content sanitization

All tool results — built-in and MCP — are checked for prompt injection patterns. External data is wrapped in boundary markers that delineate the trust boundary between internal and external content. If suspicious content is detected, the system flags it and notifies you.