Hextrap MCP
Server Details
Hextrap's MCP Connector protects your LLM coding sessions from installing malicious dependencies, typosquats, unpopular packages, and enforces your strict allow and deny lists.
No setup means your LLM uses MCP to configure itself to use Hextrap's proxy's automatically, enforcing your firewall rules immediately. Manage your allow and deny lists right from your favorite LLM.
- Status
- Healthy
- Last Tested
- Transport
- Streamable HTTP
- URL
Glama MCP Gateway
Connect through Glama MCP Gateway for full control over tool access and complete visibility into every call.
Full call logging
Every tool call is logged with complete inputs and outputs, so you can debug issues and audit what your agents are doing.
Tool access control
Enable or disable individual tools per connector, so you decide what your agents can and cannot do.
Managed credentials
Glama handles OAuth flows, token storage, and automatic rotation, so credentials never expire on your clients.
Usage analytics
See which tools your agents call, how often, and when, so you can understand usage patterns and catch anomalies.
Tool Definition Quality
Average 3.6/5 across 10 of 10 tools scored. Lowest: 2.9/5.
Each tool has a clearly distinct purpose with no ambiguity: allowlist/denylist management, package checking, credential handling, activity monitoring, firewall listing, and proxy configuration. The descriptions clearly differentiate their functions, such as 'check_package' for security verification versus 'add_to_allowlist' for policy management.
All tools follow a consistent verb_noun pattern with snake_case, such as 'add_to_allowlist', 'remove_from_denylist', and 'get_proxy_config'. The naming is predictable and readable throughout the set, with no deviations in style or convention.
With 10 tools, the count is well-scoped for managing a firewall system, covering key operations like listing, checking, configuring, and maintaining security policies. Each tool earns its place without redundancy, fitting a typical range for this domain.
The tool set provides complete coverage for firewall management: CRUD operations for allowlist/denylist, package verification, credential lifecycle (create, get, roll), activity monitoring, and firewall listing. There are no obvious gaps, enabling agents to handle full workflows from setup to maintenance.
Available Tools
10 toolsadd_to_allowlistCInspect
Add a package to a firewall's allowlist.
| Name | Required | Description | Default |
|---|---|---|---|
| registry | Yes | Package registry | |
| firewall_id | Yes | Firewall public ID | |
| package_name | Yes | Package name to add |
Tool Definition Quality
Does the description disclose side effects, auth requirements, rate limits, or destructive behavior?
With no annotations provided, the description carries the full burden of behavioral disclosure but fails to specify idempotency behavior (can the same package be added twice?), propagation delays, required permissions, or what indicates success versus failure for this security-sensitive mutation operation.
Agents need to know what a tool does to the world before calling it. Descriptions should go beyond structured annotations to explain consequences.
Is the description appropriately sized, front-loaded, and free of redundancy?
The single sentence is efficiently constructed with no redundant words or tautology, presenting the core action immediately. However, given the lack of annotations and mutation nature of the tool, the brevity may be insufficient for complete understanding.
Shorter descriptions cost fewer tokens and are easier for agents to parse. Every sentence should earn its place.
Given the tool's complexity, does the description cover enough for an agent to succeed on first attempt?
Despite having well-documented parameters in the schema, the description is incomplete for a mutation tool with no annotations or output schema. It omits critical operational context such as side effects, error scenarios, and whether the operation is synchronous or requires confirmation.
Complex tools with many parameters or behaviors need more documentation. Simple tools need less. This dimension scales expectations accordingly.
Does the description clarify parameter syntax, constraints, interactions, or defaults beyond what the schema provides?
With 100% schema description coverage, parameters are fully documented in the schema (firewall_id, package_name, registry). The description adds no additional parameter context (e.g., expected formats, validation rules), which warrants the baseline score of 3 for high-coverage schemas.
Input schemas describe structure but not intent. Descriptions should explain non-obvious parameter relationships and valid value ranges.
Does the description clearly state what the tool does and how it differs from similar tools?
The description uses a specific verb ('Add') with clear resource ('package') and target ('firewall's allowlist'), accurately describing the operation. However, it does not explicitly differentiate from sibling tools like 'remove_from_allowlist' or 'add_to_denylist' within the text itself.
Agents choose between tools based on descriptions. A clear purpose with a specific verb and resource helps agents select the right tool.
Does the description explain when to use this tool, when not to, or what alternatives exist?
The description provides no information about when to use this tool versus alternatives (e.g., when to use add_to_denylist instead), prerequisites for invocation, or error conditions that might indicate a different tool is needed.
Agents often have multiple tools that could apply. Explicit usage guidance like "use X instead of Y when Z" prevents misuse.
add_to_denylistCInspect
Add a package to a firewall's denylist.
| Name | Required | Description | Default |
|---|---|---|---|
| registry | Yes | Package registry | |
| firewall_id | Yes | Firewall public ID | |
| package_name | Yes | Package name to add |
Tool Definition Quality
Does the description disclose side effects, auth requirements, rate limits, or destructive behavior?
With no annotations provided, the description carries the full burden of behavioral disclosure but fails to mention critical mutation behaviors: idempotency (what happens if the package is already denied), whether this automatically removes the package from the allowlist, side effects (immediate blocking), or required permissions.
Agents need to know what a tool does to the world before calling it. Descriptions should go beyond structured annotations to explain consequences.
Is the description appropriately sized, front-loaded, and free of redundancy?
The description is a single, efficient sentence with no wasted words. It front-loads the action and target, making it immediately scannable.
Shorter descriptions cost fewer tokens and are easier for agents to parse. Every sentence should earn its place.
Given the tool's complexity, does the description cover enough for an agent to succeed on first attempt?
For a security-sensitive mutation tool with no output schema and zero annotations, the description is incomplete. It omits behavioral consequences, success indicators, error conditions, and mutual exclusivity relationships with the allowlist system that would be necessary for safe invocation.
Complex tools with many parameters or behaviors need more documentation. Simple tools need less. This dimension scales expectations accordingly.
Does the description clarify parameter syntax, constraints, interactions, or defaults beyond what the schema provides?
With 100% schema description coverage, the structured fields already explain 'firewall_id', 'package_name', and 'registry'. The description implies the package_name is what gets added but does not add syntax details, format constraints, or examples beyond what the schema already provides.
Input schemas describe structure but not intent. Descriptions should explain non-obvious parameter relationships and valid value ranges.
Does the description clearly state what the tool does and how it differs from similar tools?
The description uses a specific verb ('Add') and clearly identifies the resource ('package') and target ('firewall's denylist'). It implicitly distinguishes from sibling tools like 'add_to_allowlist' and 'remove_from_denylist' through precise terminology, though it does not explicitly name sibling alternatives.
Agents choose between tools based on descriptions. A clear purpose with a specific verb and resource helps agents select the right tool.
Does the description explain when to use this tool, when not to, or what alternatives exist?
The description provides no guidance on when to use this tool versus alternatives (e.g., when to denylist vs. allowlist), nor does it mention prerequisites or conditions that would suggest when not to use it.
Agents often have multiple tools that could apply. Explicit usage guidance like "use X instead of Y when Z" prevents misuse.
check_packageAInspect
Check if a package is allowed by a hextrap firewall and verify it is not a suspected typosquat. Call this BEFORE suggesting any npm, PyPI, or Go dependency to ensure it meets security policy.
| Name | Required | Description | Default |
|---|---|---|---|
| name | Yes | Package name to check | |
| registry | Yes | Package registry | |
| firewall_id | Yes | Firewall public ID |
Tool Definition Quality
Does the description disclose side effects, auth requirements, rate limits, or destructive behavior?
With no annotations provided, the description carries full burden. It discloses two specific behavioral traits: firewall policy evaluation and typosquat detection. Minor gap: does not clarify if this is read-only or whether it logs audit entries, though 'check' and 'verify' imply inspection.
Agents need to know what a tool does to the world before calling it. Descriptions should go beyond structured annotations to explain consequences.
Is the description appropriately sized, front-loaded, and free of redundancy?
Two sentences with zero waste. First defines the operation; second defines the temporal protocol. Every word serves selection or invocation guidance. Appropriate length for complexity.
Shorter descriptions cost fewer tokens and are easier for agents to parse. Every sentence should earn its place.
Given the tool's complexity, does the description cover enough for an agent to succeed on first attempt?
Appropriately complete for a security validation tool. Covers the dual security checks (firewall policy and typosquatting) but could briefly indicate what constitutes a pass/fail result given the lack of output schema documentation.
Complex tools with many parameters or behaviors need more documentation. Simple tools need less. This dimension scales expectations accordingly.
Does the description clarify parameter syntax, constraints, interactions, or defaults beyond what the schema provides?
Schema has 100% coverage (baseline 3). Description adds value by mapping the 'registry' enum to concrete ecosystems ('npm, PyPI, or Go') and contextualizing 'firewall_id' as 'hextrap firewall', clarifying the security domain semantics.
Input schemas describe structure but not intent. Descriptions should explain non-obvious parameter relationships and valid value ranges.
Does the description clearly state what the tool does and how it differs from similar tools?
The description states specific verbs ('Check', 'verify') and resources ('package', 'hextrap firewall', 'typosquat'). It clearly distinguishes from siblings like add_to_allowlist or get_proxy_config by focusing on pre-installation validation of dependencies.
Agents choose between tools based on descriptions. A clear purpose with a specific verb and resource helps agents select the right tool.
Does the description explain when to use this tool, when not to, or what alternatives exist?
Provides explicit temporal guidance ('Call this BEFORE suggesting') and enumerates specific use cases ('any npm, PyPI, or Go dependency'). Uniquely clarifies the workflow integration point, ensuring agents invoke it prior to recommendation.
Agents often have multiple tools that could apply. Explicit usage guidance like "use X instead of Y when Z" prevents misuse.
create_service_credentialAInspect
Create a named service credential for CI/CD pipelines. Returns proxy credentials and configuration commands to use in pipeline environment variables or config files. Each pipeline or environment should have its own credential for auditability.
| Name | Required | Description | Default |
|---|---|---|---|
| name | Yes | Descriptive name for the credential (e.g. "GitHub Actions", "GitLab CI") | |
| firewall_id | Yes | Firewall public ID |
Tool Definition Quality
Does the description disclose side effects, auth requirements, rate limits, or destructive behavior?
No annotations provided, so description carries full burden. Adds valuable context about return values ('proxy credentials and configuration commands') and auditability traits. Missing: idempotency behavior, cleanup/deletion capability, failure modes, or side effects on existing credentials.
Agents need to know what a tool does to the world before calling it. Descriptions should go beyond structured annotations to explain consequences.
Is the description appropriately sized, front-loaded, and free of redundancy?
Three well-structured sentences with zero waste: purpose declaration, return value description, and usage guideline. Front-loaded with specific verb and resource. Every sentence earns its place.
Shorter descriptions cost fewer tokens and are easier for agents to parse. Every sentence should earn its place.
Given the tool's complexity, does the description cover enough for an agent to succeed on first attempt?
Appropriate for low complexity (2 primitive params, no nested objects). Compensates for missing output schema by describing conceptual returns. Mentions auditability constraint. Could improve by noting credential lifecycle (reversible? deletable?) but adequate for the scope.
Complex tools with many parameters or behaviors need more documentation. Simple tools need less. This dimension scales expectations accordingly.
Does the description clarify parameter syntax, constraints, interactions, or defaults beyond what the schema provides?
Schema coverage is 100% with complete descriptions for both 'name' (including CI/CD examples) and 'firewall_id'. Description reinforces the CI/CD context aligning with the name examples, but adds no additional parameter syntax or semantics beyond the schema baseline.
Input schemas describe structure but not intent. Descriptions should explain non-obvious parameter relationships and valid value ranges.
Does the description clearly state what the tool does and how it differs from similar tools?
Specific verb 'Create' with clear resource 'named service credential' and specific context 'for CI/CD pipelines'. Distinguishes from sibling roll_proxy_credential by focusing on initial creation for pipeline use cases rather than rotation.
Agents choose between tools based on descriptions. A clear purpose with a specific verb and resource helps agents select the right tool.
Does the description explain when to use this tool, when not to, or what alternatives exist?
Provides explicit best practice: 'Each pipeline or environment should have its own credential for auditability'. Clear positive guidance on use case (CI/CD pipelines) and what to do with outputs (environment variables/config files). Lacks explicit 'when not to use' or alternative comparison.
Agents often have multiple tools that could apply. Explicit usage guidance like "use X instead of Y when Z" prevents misuse.
get_activityCInspect
Get recent package installation activity for a firewall.
| Name | Required | Description | Default |
|---|---|---|---|
| limit | No | Maximum number of records (default 20) | |
| firewall_id | Yes | Firewall public ID |
Tool Definition Quality
Does the description disclose side effects, auth requirements, rate limits, or destructive behavior?
No annotations provided, so description carries full burden. Uses 'recent' without defining the time window (24 hours? 30 days?). Does not disclose what activity types are returned (successes, failures, attempts?), sort order, or pagination behavior beyond the limit parameter.
Agents need to know what a tool does to the world before calling it. Descriptions should go beyond structured annotations to explain consequences.
Is the description appropriately sized, front-loaded, and free of redundancy?
Single sentence efficiently conveys core purpose with no redundancy. However, brevity comes at cost of omitted behavioral context; the description is front-loaded but undersized for the complexity of temporal data retrieval without annotations.
Shorter descriptions cost fewer tokens and are easier for agents to parse. Every sentence should earn its place.
Given the tool's complexity, does the description cover enough for an agent to succeed on first attempt?
With no output schema and no annotations, description should explain return structure and temporal scope. 'Recent' is undefined, and there's no indication of what data structure is returned (array of events? log entries?). Missing critical context for agent to interpret results.
Complex tools with many parameters or behaviors need more documentation. Simple tools need less. This dimension scales expectations accordingly.
Does the description clarify parameter syntax, constraints, interactions, or defaults beyond what the schema provides?
Schema coverage is 100%, so baseline applies. Description mentions 'for a firewall' which aligns with firewall_id parameter and implies temporal scope matching 'recent' to the limit parameter, but adds no syntax details, format requirements, or validation rules beyond the schema.
Input schemas describe structure but not intent. Descriptions should explain non-obvious parameter relationships and valid value ranges.
Does the description clearly state what the tool does and how it differs from similar tools?
States specific verb (Get), resource (package installation activity), and scope (recent, for a firewall). Distinguishes reasonably from mutation siblings (add/remove) but doesn't clarify distinction from 'check_package' which could be confused as a read operation.
Agents choose between tools based on descriptions. A clear purpose with a specific verb and resource helps agents select the right tool.
Does the description explain when to use this tool, when not to, or what alternatives exist?
Provides no guidance on when to use this versus check_package or list_firewalls. No information on prerequisites like firewall_id availability or permissions needed to access activity logs.
Agents often have multiple tools that could apply. Explicit usage guidance like "use X instead of Y when Z" prevents misuse.
get_proxy_configAInspect
Get proxy credentials and package manager configuration for a firewall. If no credential exists, creates one and returns ready-to-use setup commands. If a credential already exists, returns the username and a note that the password is already configured. Call roll_proxy_credential if a new password is needed.
| Name | Required | Description | Default |
|---|---|---|---|
| firewall_id | Yes | Firewall public ID |
Tool Definition Quality
Does the description disclose side effects, auth requirements, rate limits, or destructive behavior?
With no annotations provided, description carries full behavioral disclosure burden. Explains idempotent-like creation behavior (creates only if none exists), distinguishes between return formats (setup commands vs username+note), and clarifies password handling. Could mention authentication requirements or error states, but covers main behavioral traits well.
Agents need to know what a tool does to the world before calling it. Descriptions should go beyond structured annotations to explain consequences.
Is the description appropriately sized, front-loaded, and free of redundancy?
Four sentences with zero waste: purpose statement, conditional creation branch, conditional existing branch, and sibling reference. Information is front-loaded and logically ordered by execution paths.
Shorter descriptions cost fewer tokens and are easier for agents to parse. Every sentence should earn its place.
Given the tool's complexity, does the description cover enough for an agent to succeed on first attempt?
Despite no output schema, description adequately explains return values for both code paths (setup commands vs username/note). Covers side effects (credential creation) and references related credential management workflow. Missing only edge case handling for a complex credential management operation.
Complex tools with many parameters or behaviors need more documentation. Simple tools need less. This dimension scales expectations accordingly.
Does the description clarify parameter syntax, constraints, interactions, or defaults beyond what the schema provides?
Schema has 100% coverage ('Firewall public ID'), establishing baseline of 3. Description references 'for a firewall' which implicitly maps to firewall_id parameter but adds no additional semantic detail about format, constraints, or lookup behavior beyond the schema definition.
Input schemas describe structure but not intent. Descriptions should explain non-obvious parameter relationships and valid value ranges.
Does the description clearly state what the tool does and how it differs from similar tools?
States specific action (get proxy credentials and package manager configuration) with target resource (firewall). Distinguishes from sibling roll_proxy_credential by specifying when to use that alternative ('if a new password is needed'), clarifying this tool retrieves existing credentials while the sibling rotates them.
Agents choose between tools based on descriptions. A clear purpose with a specific verb and resource helps agents select the right tool.
Does the description explain when to use this tool, when not to, or what alternatives exist?
Provides explicit conditional logic: use this when you need current credentials (creates if absent, returns existing if present). Explicitly names alternative tool roll_proxy_credential for the specific case of needing a new password, creating clear decision boundaries.
Agents often have multiple tools that could apply. Explicit usage guidance like "use X instead of Y when Z" prevents misuse.
list_firewallsBInspect
List all firewalls the user has access to.
| Name | Required | Description | Default |
|---|---|---|---|
No parameters | |||
Tool Definition Quality
Does the description disclose side effects, auth requirements, rate limits, or destructive behavior?
No annotations are provided, requiring the description to carry the full burden of behavioral disclosure. While it mentions access scope ('user has access to'), it fails to confirm the read-only nature of the operation, disclose return format or pagination behavior, or specify rate limiting characteristics expected for a listing operation.
Agents need to know what a tool does to the world before calling it. Descriptions should go beyond structured annotations to explain consequences.
Is the description appropriately sized, front-loaded, and free of redundancy?
Single sentence with no wasted words, front-loaded with the action verb and target resource. Every element earns its place with no redundancy or digression.
Shorter descriptions cost fewer tokens and are easier for agents to parse. Every sentence should earn its place.
Given the tool's complexity, does the description cover enough for an agent to succeed on first attempt?
Adequate for a simple parameterless tool, but gaps remain: it lacks description of return values (no output schema exists) and safety characteristics (no annotations provided) that would help an agent understand the operation's impact and result structure.
Complex tools with many parameters or behaviors need more documentation. Simple tools need less. This dimension scales expectations accordingly.
Does the description clarify parameter syntax, constraints, interactions, or defaults beyond what the schema provides?
With zero parameters and 100% schema coverage (trivially satisfied by empty schema), the baseline applies. The description appropriately focuses on tool purpose rather than parameters, consistent with the empty input schema.
Input schemas describe structure but not intent. Descriptions should explain non-obvious parameter relationships and valid value ranges.
Does the description clearly state what the tool does and how it differs from similar tools?
The description uses a specific verb (List) and resource (firewalls), with scope ('the user has access to') clarifying authorization boundaries. It implicitly distinguishes from siblings by naming its unique resource domain (distinct from allowlists, packages, credentials, activity, and proxy configs managed by other tools), though it lacks explicit comparative guidance.
Agents choose between tools based on descriptions. A clear purpose with a specific verb and resource helps agents select the right tool.
Does the description explain when to use this tool, when not to, or what alternatives exist?
The description states what the tool does but provides no guidance on when to use it versus alternatives like get_proxy_config, nor does it indicate prerequisites, error conditions, or specific scenarios requiring this list operation.
Agents often have multiple tools that could apply. Explicit usage guidance like "use X instead of Y when Z" prevents misuse.
remove_from_allowlistBInspect
Remove a package from a firewall's allowlist.
| Name | Required | Description | Default |
|---|---|---|---|
| firewall_id | Yes | Firewall public ID | |
| package_name | Yes | Package name to remove |
Tool Definition Quality
Does the description disclose side effects, auth requirements, rate limits, or destructive behavior?
No annotations provided, so description carries full burden for behavioral disclosure. Fails to specify if removal is idempotent (safe to call if already removed), what error conditions exist, whether changes are immediate or propagated, or required permissions. 'Remove' implies mutation but lacks safety context.
Agents need to know what a tool does to the world before calling it. Descriptions should go beyond structured annotations to explain consequences.
Is the description appropriately sized, front-loaded, and free of redundancy?
Single sentence of 9 words with no redundancy. Action verb leads, every word earns its place. Appropriate density for a 2-parameter mutation tool.
Shorter descriptions cost fewer tokens and are easier for agents to parse. Every sentence should earn its place.
Given the tool's complexity, does the description cover enough for an agent to succeed on first attempt?
Adequate for basic invocation but incomplete given zero annotations and no output schema. Missing behavioral details (idempotency, error handling, propagation delays) that would help an agent handle responses and edge cases for this mutation operation.
Complex tools with many parameters or behaviors need more documentation. Simple tools need less. This dimension scales expectations accordingly.
Does the description clarify parameter syntax, constraints, interactions, or defaults beyond what the schema provides?
Schema coverage is 100% with clear descriptions for both firewall_id and package_name. Description adds minimal semantic value beyond the schema, primarily establishing the allowlist context relationship. Baseline 3 is appropriate since schema does the heavy lifting.
Input schemas describe structure but not intent. Descriptions should explain non-obvious parameter relationships and valid value ranges.
Does the description clearly state what the tool does and how it differs from similar tools?
Clear verb (Remove), resource (package), and scope (firewall's allowlist). Implicitly distinguishes from 'add_to_allowlist' via opposite verb and from 'remove_from_denylist' via target list, though it doesn't explicitly name siblings or explain functional differences between allowlist vs denylist removal.
Agents choose between tools based on descriptions. A clear purpose with a specific verb and resource helps agents select the right tool.
Does the description explain when to use this tool, when not to, or what alternatives exist?
No explicit guidance on when to use this tool versus alternatives. Does not explain when to remove from allowlist versus adding to denylist (different security postures), nor prerequisites like firewall state or package existence requirements.
Agents often have multiple tools that could apply. Explicit usage guidance like "use X instead of Y when Z" prevents misuse.
remove_from_denylistBInspect
Remove a package from a firewall's denylist.
| Name | Required | Description | Default |
|---|---|---|---|
| firewall_id | Yes | Firewall public ID | |
| package_name | Yes | Package name to remove |
Tool Definition Quality
Does the description disclose side effects, auth requirements, rate limits, or destructive behavior?
With no annotations provided, the description carries the full disclosure burden but fails to specify critical behavioral traits: idempotency (whether calling twice errors), immediate vs. eventual effect on firewall rules, or what occurs if the package isn't on the denylist.
Agents need to know what a tool does to the world before calling it. Descriptions should go beyond structured annotations to explain consequences.
Is the description appropriately sized, front-loaded, and free of redundancy?
The single sentence is appropriately sized with zero redundancy. Every word earns its place by stating the action, object, and location of the operation.
Shorter descriptions cost fewer tokens and are easier for agents to parse. Every sentence should earn its place.
Given the tool's complexity, does the description cover enough for an agent to succeed on first attempt?
For a simple two-parameter mutation tool with complete schema coverage and no output schema, the description is minimally sufficient for invocation. However, it lacks completeness regarding error handling, side effects on active connections, or confirmation of success criteria.
Complex tools with many parameters or behaviors need more documentation. Simple tools need less. This dimension scales expectations accordingly.
Does the description clarify parameter syntax, constraints, interactions, or defaults beyond what the schema provides?
Schema coverage is 100%, establishing a baseline of 3. The description adds minimal semantic value beyond the schema—it confirms the 'firewall_id' relates to a denylist context and that 'package_name' refers to the blocked entity, but does not elaborate on package naming formats or firewall ID formats.
Input schemas describe structure but not intent. Descriptions should explain non-obvious parameter relationships and valid value ranges.
Does the description clearly state what the tool does and how it differs from similar tools?
The description provides a specific verb (Remove) and resource (package from a firewall's denylist), clearly indicating the tool's function. It implicitly distinguishes from siblings like 'add_to_denylist' and 'remove_from_allowlist' through specific resource naming, though it lacks explicit comparative guidance.
Agents choose between tools based on descriptions. A clear purpose with a specific verb and resource helps agents select the right tool.
Does the description explain when to use this tool, when not to, or what alternatives exist?
The description offers no guidance on when to use this tool versus alternatives like 'add_to_allowlist' for unblocking traffic, nor does it mention prerequisites such as verifying the package is currently on the denylist (e.g., via 'check_package').
Agents often have multiple tools that could apply. Explicit usage guidance like "use X instead of Y when Z" prevents misuse.
roll_proxy_credentialAInspect
Roll (regenerate) the personal proxy credential for a firewall. This invalidates the previous password and returns a new one with ready-to-use configuration commands. Only call this when the user explicitly needs new credentials — it will break any existing package manager configuration using the old password.
| Name | Required | Description | Default |
|---|---|---|---|
| firewall_id | Yes | Firewall public ID |
Tool Definition Quality
Does the description disclose side effects, auth requirements, rate limits, or destructive behavior?
With no annotations provided, the description fully discloses behavioral traits including the destructive nature ('invalidates the previous password'), the specific side effects ('breaks any existing package manager configuration'), and the return format ('returns a new one with ready-to-use configuration commands'). This covers mutation behavior and output characteristics comprehensively.
Agents need to know what a tool does to the world before calling it. Descriptions should go beyond structured annotations to explain consequences.
Is the description appropriately sized, front-loaded, and free of redundancy?
The description consists of three dense sentences without filler. The first sentence establishes purpose, the second describes behavioral outcomes, and the third provides critical usage guardrails. Every clause delivers essential information about operation semantics or safety constraints.
Shorter descriptions cost fewer tokens and are easier for agents to parse. Every sentence should earn its place.
Given the tool's complexity, does the description cover enough for an agent to succeed on first attempt?
For a single-parameter credential rotation tool without output schema, the description comprehensively covers operation purpose, destructive side effects, return value characteristics, and precise usage conditions. No additional description elements are necessary given the tool's focused scope.
Complex tools with many parameters or behaviors need more documentation. Simple tools need less. This dimension scales expectations accordingly.
Does the description clarify parameter syntax, constraints, interactions, or defaults beyond what the schema provides?
The input schema has 100% description coverage with the firewall_id parameter fully documented as 'Firewall public ID.' Since the schema is self-explanatory and complete, the description appropriately focuses on behavioral semantics rather than repeating parameter documentation, meeting the baseline for high coverage schemas.
Input schemas describe structure but not intent. Descriptions should explain non-obvious parameter relationships and valid value ranges.
Does the description clearly state what the tool does and how it differs from similar tools?
The description uses specific verbs 'Roll (regenerate)' and identifies the exact resource 'personal proxy credential for a firewall.' It clearly distinguishes from siblings like `get_proxy_config` (retrieval) and `create_service_credential` (service vs personal credentials) by specifying the credential type and destructive regeneration action.
Agents choose between tools based on descriptions. A clear purpose with a specific verb and resource helps agents select the right tool.
Does the description explain when to use this tool, when not to, or what alternatives exist?
The description provides explicit when-to-use guidance ('Only call this when the user explicitly needs new credentials') and clear warnings about negative consequences ('it will break any existing package manager configuration'). It explicitly states the prerequisite condition requiring explicit user intent.
Agents often have multiple tools that could apply. Explicit usage guidance like "use X instead of Y when Z" prevents misuse.
Claim this connector by publishing a /.well-known/glama.json file on your server's domain with the following structure:
{
"$schema": "https://glama.ai/mcp/schemas/connector.json",
"maintainers": [{ "email": "your-email@example.com" }]
}The email address must match the email associated with your Glama account. Once published, Glama will automatically detect and verify the file within a few minutes.
Control your server's listing on Glama, including description and metadata
Access analytics and receive server usage reports
Get monitoring and health status updates for your server
Feature your server to boost visibility and reach more users
For users:
Full audit trail – every tool call is logged with inputs and outputs for compliance and debugging
Granular tool control – enable or disable individual tools per connector to limit what your AI agents can do
Centralized credential management – store and rotate API keys and OAuth tokens in one place
Change alerts – get notified when a connector changes its schema, adds or removes tools, or updates tool definitions, so nothing breaks silently
For server owners:
Proven adoption – public usage metrics on your listing show real-world traction and build trust with prospective users
Tool-level analytics – see which tools are being used most, helping you prioritize development and documentation
Direct user feedback – users can report issues and suggest improvements through the listing, giving you a channel you would not have otherwise
The connector status is unhealthy when Glama is unable to successfully connect to the server. This can happen for several reasons:
The server is experiencing an outage
The URL of the server is wrong
Credentials required to access the server are missing or invalid
If you are the owner of this MCP connector and would like to make modifications to the listing, including providing test credentials for accessing the server, please contact support@glama.ai.
Discussions
No comments yet. Be the first to start the discussion!