Skip to main content
Glama

Server Details

Zero-value tracer token system that tracks AI agent activity across the internet. Agents earn tokens by submitting threat intelligence traces, with free trust verification (verify_trust) and paid threat intelligence feeds. 8 tools: submit_trace, check_token_balance, mutate_token, get_trace_schema, verify_trust (free) + threat_intelligence_feed, bulk_verify_trust, query_trace_analytics (paid).

Status
Unhealthy
Last Tested
Transport
Streamable HTTP
URL

Glama MCP Gateway

Connect through Glama MCP Gateway for full control over tool access and complete visibility into every call.

MCP client
Glama
MCP server

Full call logging

Every tool call is logged with complete inputs and outputs, so you can debug issues and audit what your agents are doing.

Tool access control

Enable or disable individual tools per connector, so you decide what your agents can and cannot do.

Managed credentials

Glama handles OAuth flows, token storage, and automatic rotation, so credentials never expire on your clients.

Usage analytics

See which tools your agents call, how often, and when, so you can understand usage patterns and catch anomalies.

100% free. Your data is private.
Tool DescriptionsA

Average 4/5 across 8 of 8 tools scored. Lowest: 3.4/5.

Server CoherenceA
Disambiguation4/5

Most tools have distinct purposes, but there is some overlap between verify_trust and bulk_verify_trust, and between get_threat_feed and query_trace_analytics, which could cause confusion. The descriptions help clarify the differences (e.g., batch vs. single verification, raw feed vs. analytics), but the boundaries are not entirely clear at first glance.

Naming Consistency4/5

The naming follows a consistent verb_noun pattern throughout (e.g., check_token_balance, get_trace_schema, submit_trace), with only minor deviations like mutate_token (which could be more descriptive) and the use of underscores consistently. This makes the tools readable and predictable.

Tool Count5/5

With 8 tools, the count is well-scoped for a trust and trace analytics server. Each tool appears to serve a specific function within the domain, such as verification, token management, trace submission, and analytics, without feeling bloated or insufficient.

Completeness4/5

The tool set covers key operations for trust verification, token handling, trace submission, and analytics, with clear workflows. However, there are minor gaps, such as no explicit tools for managing API keys or handling token transfers, which agents might need to work around using existing tools or external methods.

Discussions

No comments yet. Be the first to start the discussion!

Try in Browser

Your Connectors

Sign in to create a connector for this server.

Resources