assess_ai_risk
Assess AI system risks using ISO 42001 Annex B methodology. Identify, analyze, and evaluate risks across all categories for compliance documentation.
Instructions
Perform ISO 42001 Annex B risk assessment for AI systems.
Comprehensive AI risk assessment covering risk criteria establishment, risk identification across all Annex B categories, risk analysis (likelihood and impact), and risk evaluation against organizational risk criteria. Follows the ISO 42001 Annex B guidance structure.
Args: system_description: Detailed description of the AI system including purpose, data, deployment context, and affected populations. system_name: Name of the AI system. risk_criteria: Organization's risk acceptance criteria description. caller: Caller identifier for rate limiting. tier: Pricing tier ('free' or 'pro').
Returns: Complete Annex B risk assessment with identified risks, analysis, and evaluation results.
Behavior: This tool is read-only and stateless — it produces analysis output without modifying any external systems, databases, or files. Safe to call repeatedly with identical inputs (idempotent). Free tier: 10/day rate limit. Pro tier: unlimited. No authentication required for basic usage.
When to use: Use this tool when you need to assess, audit, or verify compliance requirements. Ideal for gap analysis, readiness checks, and generating compliance documentation.
When NOT to use: Do not use as a substitute for qualified legal counsel. This tool provides technical compliance guidance, not legal advice. Behavioral Transparency: - Side Effects: This tool is read-only and produces no side effects. It does not modify any external state, databases, or files. All output is computed in-memory and returned directly to the caller. - Authentication: No authentication required for basic usage. Pro/Enterprise tiers require a valid MEOK API key passed via the MEOK_API_KEY environment variable. - Rate Limits: Free tier: 10 calls/day. Pro tier: unlimited. Rate limit headers are included in responses (X-RateLimit-Remaining, X-RateLimit-Reset). - Error Handling: Returns structured error objects with 'error' key on failure. Never raises unhandled exceptions. Invalid inputs return descriptive validation errors. - Idempotency: Fully idempotent — calling with the same inputs always produces the same output. Safe to retry on timeout or transient failure. - Data Privacy: No input data is stored, logged, or transmitted to external services. All processing happens locally within the MCP server process.
Input Schema
| Name | Required | Description | Default |
|---|---|---|---|
| system_description | Yes | ||
| system_name | No | AI System | |
| risk_criteria | No | ||
| caller | No | anonymous | |
| tier | No | free | |
| api_key | No |