captcha.cc Human Verification
Server Details
Human verification CAPTCHA with visual and selective-listening audio challenges.
- Status
- Healthy
- Last Tested
- Transport
- Streamable HTTP
- URL
Glama MCP Gateway
Connect through Glama MCP Gateway for full control over tool access and complete visibility into every call.
Full call logging
Every tool call is logged with complete inputs and outputs, so you can debug issues and audit what your agents are doing.
Tool access control
Enable or disable individual tools per connector, so you decide what your agents can and cannot do.
Managed credentials
Glama handles OAuth flows, token storage, and automatic rotation, so credentials never expire on your clients.
Usage analytics
See which tools your agents call, how often, and when, so you can understand usage patterns and catch anomalies.
Tool Definition Quality
Average 3.6/5 across 3 of 3 tools scored.
Each tool has a clearly distinct purpose: create_challenge generates a captcha, make_siteverify_request handles server-side token redemption, and make_widget_snippet provides client-side integration code. There is no overlap or ambiguity between these functions.
The naming follows a consistent verb_noun pattern (create_challenge, make_siteverify_request, make_widget_snippet), with 'create' and 'make' being semantically similar but not identical. This minor deviation keeps the set mostly predictable and readable.
With 3 tools, the server is well-scoped for human verification, covering key aspects: challenge creation, server-side verification, and client-side integration. Each tool earns its place without being excessive or insufficient for the domain.
The tool set covers the core captcha workflow (create, verify, integrate), with no obvious gaps for basic operations. A minor gap might be the lack of tools for managing or listing challenges, but agents can work effectively with the provided tools.
Available Tools
3 toolscreate_challengeCreate ChallengeAInspect
Create a live captcha.cc challenge for a site key and allowed hostname. Useful for smoke tests and integration checks.
| Name | Required | Description | Default |
|---|---|---|---|
| hostname | Yes | Hostname configured on the captcha.cc site. | |
| site_key | Yes | Public captcha.cc site key. |
Tool Definition Quality
Does the description disclose side effects, auth requirements, rate limits, or destructive behavior?
Annotations already indicate this is a non-readOnly, non-destructive operation (readOnlyHint=false, destructiveHint=false). The description adds useful context about creating 'live' challenges for testing purposes, which helps the agent understand the tool's behavioral intent beyond the basic safety profile provided by annotations.
Agents need to know what a tool does to the world before calling it. Descriptions should go beyond structured annotations to explain consequences.
Is the description appropriately sized, front-loaded, and free of redundancy?
The description is extremely concise - just two sentences that directly state the tool's purpose and usage context. Every word earns its place with zero wasted text, and the most important information (what the tool does) comes first.
Shorter descriptions cost fewer tokens and are easier for agents to parse. Every sentence should earn its place.
Given the tool's complexity, does the description cover enough for an agent to succeed on first attempt?
For a creation tool with no output schema, the description provides adequate basic information about what the tool does and its testing context. However, it doesn't explain what the created challenge looks like, how it can be used, or what format the response takes, leaving some gaps in contextual understanding.
Complex tools with many parameters or behaviors need more documentation. Simple tools need less. This dimension scales expectations accordingly.
Does the description clarify parameter syntax, constraints, interactions, or defaults beyond what the schema provides?
With 100% schema description coverage, the input schema already fully documents both parameters (site_key, hostname). The description doesn't add any additional parameter semantics beyond what's in the schema, so it meets the baseline expectation but doesn't provide extra value.
Input schemas describe structure but not intent. Descriptions should explain non-obvious parameter relationships and valid value ranges.
Does the description clearly state what the tool does and how it differs from similar tools?
The description clearly states the action ('Create a live captcha.cc challenge') and the target resources ('for a site key and allowed hostname'), making the purpose immediately understandable. However, it doesn't explicitly differentiate this tool from its siblings (make_siteverify_request, make_widget_snippet), which would be needed for a perfect score.
Agents choose between tools based on descriptions. A clear purpose with a specific verb and resource helps agents select the right tool.
Does the description explain when to use this tool, when not to, or what alternatives exist?
The description provides some usage context ('Useful for smoke tests and integration checks'), which implies when this tool might be appropriate. However, it doesn't offer explicit guidance about when to use this versus the sibling tools or any prerequisites for successful invocation.
Agents often have multiple tools that could apply. Explicit usage guidance like "use X instead of Y when Z" prevents misuse.
make_siteverify_requestMake Siteverify RequestBRead-onlyIdempotentInspect
Return a server-side fetch example for redeeming a captcha.cc proof token exactly once.
| Name | Required | Description | Default |
|---|---|---|---|
| secret_env_var | No | CAPTCHA_CC_SECRET_KEY | |
| proof_token_expression | No | req.body.proofToken |
Tool Definition Quality
Does the description disclose side effects, auth requirements, rate limits, or destructive behavior?
Annotations indicate this is a read-only, non-destructive, idempotent, and closed-world operation, which the description doesn't contradict. The description adds valuable behavioral context by specifying 'exactly once' (reinforcing idempotency) and 'server-side fetch example' (implying a safe, example-based output), enhancing understanding beyond annotations. However, it doesn't detail potential errors or response formats, leaving some gaps.
Agents need to know what a tool does to the world before calling it. Descriptions should go beyond structured annotations to explain consequences.
Is the description appropriately sized, front-loaded, and free of redundancy?
The description is a single, efficient sentence that directly states the tool's function without unnecessary words. It's front-loaded with the core action and resource, making it easy to parse quickly. Every part of the sentence contributes essential information, earning a high score for conciseness.
Shorter descriptions cost fewer tokens and are easier for agents to parse. Every sentence should earn its place.
Given the tool's complexity, does the description cover enough for an agent to succeed on first attempt?
Given the tool's moderate complexity (2 parameters, no output schema), the description is partially complete. It clarifies the tool's purpose and some behavior but lacks parameter explanations and output details. Annotations provide safety and idempotency info, but without an output schema, the description should ideally hint at the return value (e.g., a fetch example format), which it doesn't, leaving room for improvement.
Complex tools with many parameters or behaviors need more documentation. Simple tools need less. This dimension scales expectations accordingly.
Does the description clarify parameter syntax, constraints, interactions, or defaults beyond what the schema provides?
With 0% schema description coverage and 2 parameters, the description fails to add meaning beyond the input schema. It doesn't explain what 'secret_env_var' or 'proof_token_expression' represent, their roles in the request, or how they interact. The schema provides defaults but no descriptions, so the description should compensate but doesn't, resulting in poor parameter clarity.
Input schemas describe structure but not intent. Descriptions should explain non-obvious parameter relationships and valid value ranges.
Does the description clearly state what the tool does and how it differs from similar tools?
The description clearly states the action ('Return a server-side fetch example') and the specific resource ('redeeming a captcha.cc proof token exactly once'), making the purpose understandable. However, it doesn't explicitly differentiate from sibling tools like 'create_challenge' or 'make_widget_snippet', which might handle different aspects of captcha processing, preventing a perfect score.
Agents choose between tools based on descriptions. A clear purpose with a specific verb and resource helps agents select the right tool.
Does the description explain when to use this tool, when not to, or what alternatives exist?
The description provides minimal guidance by implying usage for redeeming a proof token, but it lacks explicit instructions on when to use this tool versus alternatives (e.g., 'create_challenge' for generating tokens or 'make_widget_snippet' for client-side integration). No prerequisites or exclusions are mentioned, leaving the agent with insufficient context for optimal tool selection.
Agents often have multiple tools that could apply. Explicit usage guidance like "use X instead of Y when Z" prevents misuse.
make_widget_snippetMake Widget SnippetARead-onlyIdempotentInspect
Return a minimal browser SDK snippet for mounting captcha.cc and submitting the proof token to an application endpoint.
| Name | Required | Description | Default |
|---|---|---|---|
| form_id | No | Form id to attach submit handling to. | contact-form |
| site_key | Yes | Public captcha.cc site key, for example pk_live_xxx. | |
| element_id | No | DOM element id where the widget should mount. | captcha |
| submit_path | No | Application endpoint that receives the proof token. | /submit-form |
Tool Definition Quality
Does the description disclose side effects, auth requirements, rate limits, or destructive behavior?
Annotations already indicate read-only, non-destructive, and idempotent behavior, which the description does not contradict. The description adds valuable context by specifying that the snippet is for 'browser SDK' and involves 'mounting' and 'submitting,' which helps the agent understand the tool's operational scope beyond the annotations.
Agents need to know what a tool does to the world before calling it. Descriptions should go beyond structured annotations to explain consequences.
Is the description appropriately sized, front-loaded, and free of redundancy?
The description is a single, well-structured sentence that efficiently conveys the tool's purpose without unnecessary details. It is front-loaded with the core action and resource, making it easy for an agent to parse and understand quickly.
Shorter descriptions cost fewer tokens and are easier for agents to parse. Every sentence should earn its place.
Given the tool's complexity, does the description cover enough for an agent to succeed on first attempt?
Given the tool's moderate complexity, rich annotations, and full schema coverage, the description is mostly complete. It lacks details on output format or error handling, but annotations cover safety aspects, and the purpose is clear. Without an output schema, some gaps remain, but the description provides sufficient context for effective use.
Complex tools with many parameters or behaviors need more documentation. Simple tools need less. This dimension scales expectations accordingly.
Does the description clarify parameter syntax, constraints, interactions, or defaults beyond what the schema provides?
Schema description coverage is 100%, providing detailed parameter information. The description does not add specific semantics beyond the schema, such as explaining parameter interactions or usage examples. However, it implicitly references parameters like 'site_key' and 'submit_path' through context, aligning with the baseline score for high schema coverage.
Input schemas describe structure but not intent. Descriptions should explain non-obvious parameter relationships and valid value ranges.
Does the description clearly state what the tool does and how it differs from similar tools?
The description clearly states the verb 'return' and the resource 'minimal browser SDK snippet' with specific functionality for 'mounting captcha.cc and submitting the proof token to an application endpoint.' It distinguishes from siblings like 'create_challenge' and 'make_siteverify_request' by focusing on snippet generation rather than challenge creation or verification requests.
Agents choose between tools based on descriptions. A clear purpose with a specific verb and resource helps agents select the right tool.
Does the description explain when to use this tool, when not to, or what alternatives exist?
The description implies usage for generating SDK snippets in browser contexts with captcha.cc integration, but it does not explicitly state when to use this tool versus alternatives like 'create_challenge' or 'make_siteverify_request.' No exclusions or prerequisites are mentioned, leaving the agent to infer context from the tool's purpose.
Agents often have multiple tools that could apply. Explicit usage guidance like "use X instead of Y when Z" prevents misuse.
Claim this connector by publishing a /.well-known/glama.json file on your server's domain with the following structure:
{
"$schema": "https://glama.ai/mcp/schemas/connector.json",
"maintainers": [{ "email": "your-email@example.com" }]
}The email address must match the email associated with your Glama account. Once published, Glama will automatically detect and verify the file within a few minutes.
Control your server's listing on Glama, including description and metadata
Access analytics and receive server usage reports
Get monitoring and health status updates for your server
Feature your server to boost visibility and reach more users
For users:
Full audit trail – every tool call is logged with inputs and outputs for compliance and debugging
Granular tool control – enable or disable individual tools per connector to limit what your AI agents can do
Centralized credential management – store and rotate API keys and OAuth tokens in one place
Change alerts – get notified when a connector changes its schema, adds or removes tools, or updates tool definitions, so nothing breaks silently
For server owners:
Proven adoption – public usage metrics on your listing show real-world traction and build trust with prospective users
Tool-level analytics – see which tools are being used most, helping you prioritize development and documentation
Direct user feedback – users can report issues and suggest improvements through the listing, giving you a channel you would not have otherwise
The connector status is unhealthy when Glama is unable to successfully connect to the server. This can happen for several reasons:
The server is experiencing an outage
The URL of the server is wrong
Credentials required to access the server are missing or invalid
If you are the owner of this MCP connector and would like to make modifications to the listing, including providing test credentials for accessing the server, please contact support@glama.ai.
Discussions
No comments yet. Be the first to start the discussion!