Skip to main content
Glama

Server Details

Hunt zero-days by talking to binaries. 40+ tools. Hosted, OAuth + SSO, invite: hi@byteray.ai

Status
Unhealthy
Last Tested
Transport
Streamable HTTP
URL

Glama MCP Gateway

Connect through Glama MCP Gateway for full control over tool access and complete visibility into every call.

MCP client
Glama
MCP server

Full call logging

Every tool call is logged with complete inputs and outputs, so you can debug issues and audit what your agents are doing.

Tool access control

Enable or disable individual tools per connector, so you decide what your agents can and cannot do.

Managed credentials

Glama handles OAuth flows, token storage, and automatic rotation, so credentials never expire on your clients.

Usage analytics

See which tools your agents call, how often, and when, so you can understand usage patterns and catch anomalies.

100% free. Your data is private.
Tool DescriptionsA

Average 3.8/5 across 43 of 43 tools scored. Lowest: 3.1/5.

Server CoherenceA
Disambiguation3/5

The tool set has clear distinct purposes for most tools, but there is notable overlap in some areas. For example, 'get_references_from' and 'get_references_to' are distinct, but 'get_call_tree', 'what_calls', and 'who_calls' all relate to call relationships and could cause confusion. Similarly, 'read_assembly', 'read_pseudocode', 'read_lifted_il', and 'read_ssa_form' all provide code views with subtle differences that might be hard for an agent to distinguish without deep domain knowledge.

Naming Consistency4/5

Tool names follow a consistent verb_noun pattern with minor deviations. Most tools use clear verbs like 'get_', 'list_', 'read_', 'trace_', etc., but there are a few inconsistencies such as 'ask_ai' (verb_abbreviation), 'goto_address' (verb_noun but 'goto' is less common), and 'navigate_cfg' (verb_abbreviation). Overall, the naming is predictable and readable, with only slight variations.

Tool Count2/5

With 43 tools, the count is excessive for a reverse engineering server, leading to potential overwhelm and redundancy. While the domain is complex, many tools could be consolidated (e.g., multiple code view tools or call analysis tools) without losing functionality. This high number may hinder agent usability and efficiency in selecting the right tool.

Completeness5/5

The tool set provides comprehensive coverage for binary analysis, including loading binaries (upload, fetch, open), navigation (goto, inspect), code examination (assembly, pseudocode, CFG), data flow (trace, SSA), vulnerability detection (attack surface, sanitization), and utility functions (hashes, strings). There are no obvious gaps; it supports full CRUD-like operations and advanced analysis workflows in the domain.

Discussions

No comments yet. Be the first to start the discussion!

Try in Browser

Your Connectors

Sign in to create a connector for this server.

Resources