Skip to main content
Glama
Shrike-Security

Shrike Security MCP Server

report_bypass

Submit security bypass incidents to improve detection patterns for prompt injection, SQL injection, PII exposure, and file write vulnerabilities.

Instructions

Reports content that bypassed security checks to help improve detection.

Supports multiple bypass types:

  • Prompt bypasses: Use 'prompt' field

  • File write bypasses: Use 'filePath' and/or 'fileContent' fields

  • SQL bypasses: Use 'sqlQuery' field

  • Web search bypasses: Use 'searchQuery' field

The bypass will be analyzed and may generate a new detection pattern.

Input Schema

TableJSON Schema
NameRequiredDescriptionDefault
promptNoThe prompt that bypassed security detection
filePathNoFile path for file_write bypasses (e.g., config.yaml with undetected secrets)
fileContentNoFile content that should have been blocked (e.g., AWS keys, SSN)
sqlQueryNoSQL query that bypassed injection detection
searchQueryNoWeb search query with undetected PII
mutationTypeNoType of mutation used (e.g., semantic_rewrite, encoding_exploit, unicode_tricks)
categoryNoThreat category (auto-inferred if not provided)
notesNoAdditional notes about the bypass

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/Shrike-Security/shrike-mcp'

If you have feedback or need assistance with the MCP directory API, please join our Discord server