Server Details
security tools for AI agents: URL safety scanning, prompt injection detection (200+ patterns), email/password breach checks via HIBP, domain & IP reputation analysis, and AI skill supply chain scanning. Free tier (3 calls/day) or pay-per-request with USDC micropayments via x402.
- Status
- Healthy
- Last Tested
- Transport
- Streamable HTTP
- URL
See and control every tool call
Available Tools
9 toolsshieldapi.check_domainInspect
Check domain reputation: DNS records, blacklists (Spamhaus, SpamCop, SORBS), SPF/DMARC, SSL.
| Name | Required | Description | Default |
|---|---|---|---|
| domain | Yes | Domain name to check (e.g. example.com) |
shieldapi.check_emailInspect
Check if an email address has been exposed in known data breaches via HIBP.
| Name | Required | Description | Default |
|---|---|---|---|
| Yes | Email address to check |
shieldapi.check_ipInspect
Check IP reputation: blacklists, Tor exit node detection, reverse DNS.
| Name | Required | Description | Default |
|---|---|---|---|
| ip | Yes | IPv4 address to check (e.g. 8.8.8.8) |
shieldapi.check_passwordInspect
Check if a password hash (SHA-1) has been exposed in known data breaches via HIBP.
| Name | Required | Description | Default |
|---|---|---|---|
| hash | Yes | SHA-1 hash of the password (40 hex chars) |
shieldapi.check_password_rangeInspect
Look up a SHA-1 hash prefix in the HIBP k-Anonymity database.
| Name | Required | Description | Default |
|---|---|---|---|
| prefix | Yes | First 5 characters of the SHA-1 password hash |
shieldapi.check_promptInspect
Detect prompt injection in text. Analyzes across 4 categories (direct injection, encoding tricks, exfiltration, indirect injection) with 200+ detection patterns. Designed for real-time inline usage before processing untrusted user input. Returns boolean verdict, confidence score (0-1), matched patterns with evidence, and decoded content if encoding obfuscation was detected. Response time <100ms p95.
| Name | Required | Description | Default |
|---|---|---|---|
| prompt | Yes | The text to analyze for prompt injection | |
| context | No | Context hint for sensitivity: user-input (default), skill-prompt (higher tolerance), system-prompt (highest sensitivity) |
shieldapi.check_urlInspect
Check a URL for malware, phishing, and other threats. Uses URLhaus + heuristic analysis.
| Name | Required | Description | Default |
|---|---|---|---|
| url | Yes | The URL to check (e.g. https://example.com) |
shieldapi.full_scanInspect
Run all security checks on a target (URL, domain, IP, or email). Most comprehensive scan.
| Name | Required | Description | Default |
|---|---|---|---|
| target | Yes | Target to scan — URL, domain, IP address, or email |
shieldapi.scan_skillInspect
Scan an AI agent skill/plugin for security issues across 8 risk categories (Snyk ToxicSkills taxonomy). Checks for prompt injection, malicious code, suspicious downloads, credential handling, secret detection, third-party content, unverifiable dependencies, and financial access patterns. Static analysis only — no code execution. Returns risk score (0-100), severity-ranked findings with file locations, and human-readable summary.
| Name | Required | Description | Default |
|---|---|---|---|
| files | No | Additional code files to analyze (max 20 files) | |
| skill | No | Raw SKILL.md content or skill name from ClawHub |
To claim this server, publish a /.well-known/glama.json file on your server's domain with the following structure:
{
"$schema": "https://glama.ai/mcp/schemas/connector.json",
"maintainers": [
{
"email": "your-email@example.com"
}
]
}The email address must match the email associated with your Glama account. Once verified, the server will appear as claimed by you.
Control your server's listing on Glama, including description and metadata
Receive usage reports showing how your server is being used
Get monitoring and health status updates for your server
The connector status is unhealthy when Glama is unable to successfully connect to the server. This can happen for several reasons:
The server is experiencing an outage
The URL of the server is wrong
Credentials required to access the server are missing or invalid
If you are the owner of this MCP connector and would like to make modifications to the listing, including providing test credentials for accessing the server, please contact support@glama.ai.
Discussions
No comments yet. Be the first to start the discussion!