Skip to main content
Glama

Server Details

Hextrap's MCP Connector protects your LLM coding sessions from installing malicious dependencies, typosquats, unpopular packages, and enforces your strict allow and deny lists. No setup means your LLM uses MCP to configure itself to use Hextrap's proxy's automatically, enforcing your firewall rules immediately. Manage your allow and deny lists right from your favorite LLM.

Status
Healthy
Last Tested
Transport
Streamable HTTP
URL

See and control every tool call

Log every tool call with full inputs and outputs
Control which tools are enabled per connector
Manage credentials once, use from any MCP client
Monitor uptime and get alerted when servers go down

Available Tools

10 tools
add_to_allowlistTry in Inspector

Add a package to a firewall's allowlist.

ParametersJSON Schema
NameRequiredDescriptionDefault
registryYesPackage registry
firewall_idYesFirewall public ID
package_nameYesPackage name to add
add_to_denylistTry in Inspector

Add a package to a firewall's denylist.

ParametersJSON Schema
NameRequiredDescriptionDefault
registryYesPackage registry
firewall_idYesFirewall public ID
package_nameYesPackage name to add
check_packageTry in Inspector

Check if a package is allowed by a hextrap firewall and verify it is not a suspected typosquat. Call this BEFORE suggesting any npm, PyPI, or Go dependency to ensure it meets security policy.

ParametersJSON Schema
NameRequiredDescriptionDefault
nameYesPackage name to check
registryYesPackage registry
firewall_idYesFirewall public ID
create_service_credentialTry in Inspector

Create a named service credential for CI/CD pipelines. Returns proxy credentials and configuration commands to use in pipeline environment variables or config files. Each pipeline or environment should have its own credential for auditability.

ParametersJSON Schema
NameRequiredDescriptionDefault
nameYesDescriptive name for the credential (e.g. "GitHub Actions", "GitLab CI")
firewall_idYesFirewall public ID
get_activityTry in Inspector

Get recent package installation activity for a firewall.

ParametersJSON Schema
NameRequiredDescriptionDefault
limitNoMaximum number of records (default 20)
firewall_idYesFirewall public ID
get_proxy_configTry in Inspector

Get proxy credentials and package manager configuration for a firewall. If no credential exists, creates one and returns ready-to-use setup commands. If a credential already exists, returns the username and a note that the password is already configured. Call roll_proxy_credential if a new password is needed.

ParametersJSON Schema
NameRequiredDescriptionDefault
firewall_idYesFirewall public ID
list_firewallsTry in Inspector

List all firewalls the user has access to.

ParametersJSON Schema
NameRequiredDescriptionDefault

No parameters

remove_from_allowlistTry in Inspector

Remove a package from a firewall's allowlist.

ParametersJSON Schema
NameRequiredDescriptionDefault
firewall_idYesFirewall public ID
package_nameYesPackage name to remove
remove_from_denylistTry in Inspector

Remove a package from a firewall's denylist.

ParametersJSON Schema
NameRequiredDescriptionDefault
firewall_idYesFirewall public ID
package_nameYesPackage name to remove
roll_proxy_credentialTry in Inspector

Roll (regenerate) the personal proxy credential for a firewall. This invalidates the previous password and returns a new one with ready-to-use configuration commands. Only call this when the user explicitly needs new credentials — it will break any existing package manager configuration using the old password.

ParametersJSON Schema
NameRequiredDescriptionDefault
firewall_idYesFirewall public ID

Discussions

No comments yet. Be the first to start the discussion!

Try in Browser

Your Connectors

Sign in to create a connector for this server.