Skip to main content
Glama

Kloudle Cloud Security Scanner

Server Details

AWS cloud security scanners for AI agents — S3, IAM, EC2, EKS, RDS, CloudTrail, CloudWatch Logs

Status
Healthy
Last Tested
Transport
Streamable HTTP
URL

Glama MCP Gateway

Connect through Glama MCP Gateway for full control over tool access and complete visibility into every call.

MCP client
Glama
MCP server

Full call logging

Every tool call is logged with complete inputs and outputs, so you can debug issues and audit what your agents are doing.

Tool access control

Enable or disable individual tools per connector, so you decide what your agents can and cannot do.

Managed credentials

Glama handles OAuth flows, token storage, and automatic rotation, so credentials never expire on your clients.

Usage analytics

See which tools your agents call, how often, and when, so you can understand usage patterns and catch anomalies.

100% free. Your data is private.
Tool DescriptionsA

Average 3.7/5 across 2 of 2 tools scored.

Server CoherenceA
Disambiguation5/5

The two tools have clearly distinct purposes: 'get' retrieves detailed metadata and commands for a specific scanner binary, while 'search' finds scanners by capability with summary information. There is no overlap or ambiguity between these functions.

Naming Consistency5/5

Both tools use simple, consistent verb-based names ('get' and 'search') that follow a predictable pattern. The naming is clean and uniform without any stylistic deviations.

Tool Count2/5

With only two tools, the server feels under-scoped for a cloud security scanner domain. This minimal set may limit agent workflows, as typical security operations would benefit from more actions like scanning, reporting, or configuration management.

Completeness2/5

The tool surface is severely incomplete for cloud security scanning. While 'get' and 'search' provide access to scanner binaries, there are significant gaps: no tools to actually run scans, analyze results, manage configurations, or handle alerts, which are core to the domain.

Available Tools

2 tools
getAInspect

Get full metadata, SHA256 hash, download URL, and ready-to-run shell command for a Kloudle scanner binary. Pass args to get a complete command; omit for a template with placeholders.

ParametersJSON Schema
NameRequiredDescriptionDefault
argsNoCLI args as key-value pairs (e.g., {'region': 'us-east-1'})
nameYesBinary name (e.g., 'k5e-aws-s3')
Behavior3/5

Does the description disclose side effects, auth requirements, rate limits, or destructive behavior?

With no annotations provided, the description carries the full burden of behavioral disclosure. It describes what information is returned (metadata, hash, URL, shell command) and the conditional behavior based on args parameter, but doesn't mention authentication requirements, rate limits, error conditions, or response format details. It provides basic behavioral context but leaves significant gaps.

Agents need to know what a tool does to the world before calling it. Descriptions should go beyond structured annotations to explain consequences.

Conciseness5/5

Is the description appropriately sized, front-loaded, and free of redundancy?

The description is perfectly concise with two sentences that each earn their place: the first establishes the core purpose and outputs, the second provides crucial usage guidance for the args parameter. No wasted words, front-loaded with essential information.

Shorter descriptions cost fewer tokens and are easier for agents to parse. Every sentence should earn its place.

Completeness3/5

Given the tool's complexity, does the description cover enough for an agent to succeed on first attempt?

Given the tool has no annotations and no output schema, the description provides adequate coverage of what the tool does and basic parameter guidance, but leaves gaps in behavioral transparency (no auth/error/rate limit info) and doesn't describe the structure or format of the returned metadata. For a tool with 2 parameters and no structured output documentation, it's minimally viable but incomplete.

Complex tools with many parameters or behaviors need more documentation. Simple tools need less. This dimension scales expectations accordingly.

Parameters3/5

Does the description clarify parameter syntax, constraints, interactions, or defaults beyond what the schema provides?

With 100% schema description coverage, the schema already documents both parameters thoroughly. The description adds some semantic context by explaining the effect of including/omitting the 'args' parameter on the output, but doesn't provide additional meaning beyond what the schema descriptions already state for the parameters themselves.

Input schemas describe structure but not intent. Descriptions should explain non-obvious parameter relationships and valid value ranges.

Purpose5/5

Does the description clearly state what the tool does and how it differs from similar tools?

The description clearly states the specific action ('Get full metadata, SHA256 hash, download URL, and ready-to-run shell command') and resource ('Kloudle scanner binary'), distinguishing it from the sibling 'search' tool by focusing on retrieving complete binary information rather than searching. It provides concrete details about what information is returned.

Agents choose between tools based on descriptions. A clear purpose with a specific verb and resource helps agents select the right tool.

Usage Guidelines4/5

Does the description explain when to use this tool, when not to, or what alternatives exist?

The description provides clear context on when to use specific parameter configurations ('Pass args to get a complete command; omit for a template with placeholders'), but doesn't explicitly mention when to use this tool versus the sibling 'search' tool or any other alternatives. The guidance is helpful for parameter usage but lacks sibling differentiation.

Agents often have multiple tools that could apply. Explicit usage guidance like "use X instead of Y when Z" prevents misuse.

Discussions

No comments yet. Be the first to start the discussion!

Try in Browser

Your Connectors

Sign in to create a connector for this server.

Resources