Skip to main content
Glama

Server Configuration

Describes the environment variables required to run the server.

NameRequiredDescriptionDefault
NODE_ENVNoEnvironment mode (development, production, test).production
LOG_LEVELNoLogging level (DEBUG, INFO, WARN, ERROR).INFO
MAX_RETRIESNoMaximum retry attempts for failed requests.3
GITHUB_TOKENNoGitHub Personal Access Token for accessing repositories. Recommended for private repositories and higher rate limits.
SCAN_TIMEOUTNoTimeout for entire repository scans in milliseconds (default: 5 minutes).300000
MAX_FILE_SIZENoMaximum file size to process in bytes (default: 10MB).10485760
RETRY_DELAY_MAXNoMaximum delay between retries in milliseconds.30000
RETRY_DELAY_BASENoBase delay for exponential backoff in milliseconds.1000
MAX_FILES_PER_SCANNoMaximum files to scan per repository.10000
GITHUB_REQUEST_TIMEOUTNoTimeout for individual GitHub API requests in milliseconds.30000
CIRCUIT_BREAKER_TIMEOUTNoTime before attempting recovery in milliseconds.60000
GITHUB_RATE_LIMIT_BURSTNoBurst capacity for rate limiter.100
CIRCUIT_BREAKER_THRESHOLDNoFailure threshold before opening circuit.5
GITHUB_RATE_LIMIT_PER_HOURNoMaximum API calls per hour.5000

Capabilities

Features and capabilities supported by this server

CapabilityDetails
tools
{}
resources
{}

Tools

Functions exposed to the LLM to take actions

NameDescription
scan_repository

Scan a GitHub repository for secrets and sensitive information. Detects 35+ types of secrets including API keys, passwords, tokens, and credentials. Enterprise-grade with rate limiting, retry logic, and comprehensive error handling.

scan_code

Scan a code snippet or file content for secrets and sensitive information. Supports up to 10MB of code content with enhanced validation.

analyze_security

Perform comprehensive security analysis on a repository, including secret detection, vulnerability assessment, risk scoring, and compliance status.

get_secret_types

Get list of all supported secret types that can be detected (35+ types).

validate_secret

Validate if a detected secret is still active or has been revoked.

Prompts

Interactive templates invoked by user choice

NameDescription

No prompts

Resources

Contextual data attached and managed by the client

NameDescription
Supported Secret TypesList of all 35+ secret types that can be detected
Detection PatternsRegular expressions and patterns used for secret detection

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/cbuntingde/leak-secure-mcp'

If you have feedback or need assistance with the MCP directory API, please join our Discord server