Skip to main content
Glama

Hostaway MCP Server

.pre-commit-config.yaml4.42 kB
# Pre-commit hooks configuration # Install with: pre-commit install # Run manually: pre-commit run --all-files repos: # Ruff formatting and linting - repo: https://github.com/astral-sh/ruff-pre-commit rev: v0.8.4 hooks: # Run ruff formatter - id: ruff-format name: ruff format description: "Format code with Ruff" # Run ruff linter - id: ruff name: ruff check description: "Lint code with Ruff" args: [--fix, --exit-non-zero-on-fix] # Security audit - repo: https://github.com/PyCQA/bandit rev: '1.7.10' hooks: - id: bandit name: bandit security scan description: "Security vulnerability scanner" args: ['-ll', '-r', 'src/', '--skip', 'B113'] # Skip httpx timeout warnings (handled in code) pass_filenames: false # Don't pass individual files, scan whole src/ directory # General file checks - repo: https://github.com/pre-commit/pre-commit-hooks rev: v5.0.0 hooks: - id: trailing-whitespace name: trim trailing whitespace - id: end-of-file-fixer name: fix end of files - id: check-yaml name: check yaml - id: check-added-large-files name: check for large files args: ['--maxkb=1000'] - id: check-merge-conflict name: check for merge conflicts - id: detect-private-key name: detect private keys - id: detect-aws-credentials name: detect AWS credentials # Gitleaks secret scanner (with custom config) - repo: https://github.com/zricethezav/gitleaks rev: v8.18.2 hooks: - id: gitleaks name: detect secrets and keys description: Detect secrets and sensitive information in code args: ['--config', '.gitleaks.toml', '--verbose'] # Safety - Check Python dependencies for security vulnerabilities - repo: https://github.com/Lucas-C/pre-commit-hooks-safety rev: v1.3.3 hooks: - id: python-safety-dependencies-check name: check Python dependencies description: Check Python dependencies for known security vulnerabilities files: (requirements.*\.txt$|pyproject\.toml$) # Semgrep - Advanced static analysis for security patterns # Disabled: requires metrics enabled or explicit config file # - repo: https://github.com/returntocorp/semgrep # rev: v1.97.0 # hooks: # - id: semgrep # name: semgrep security scan # description: Static analysis for security vulnerabilities # args: [ # '--config=auto', # Use default security rules # '--error', # Exit with error on findings # '--metrics=off', # Disable telemetry # '--timeout=30', # 30 second timeout per rule # ] # exclude: | # (?x)^( # tests/.*| # .*\.min\.js| # .*\.min\.css| # node_modules/.*| # \.next/.*| # dist/.*| # build/.* # )$ # Check for hardcoded passwords - repo: local hooks: - id: check-hardcoded-credentials name: check for hardcoded credentials description: Check for hardcoded passwords and API keys entry: bash -c 'grep -r -E "(password|passwd|pwd|secret|api[_-]?key|token|credential)[[:space:]]*[=:][[:space:]]*[\"'\''][^\"'\'']{8,}[\"'\'']" --include="*.py" --include="*.js" --include="*.ts" --include="*.tsx" --include="*.env*" --exclude-dir=node_modules --exclude-dir=.git --exclude-dir=dist --exclude-dir=.next --exclude="*.test.*" --exclude="*.spec.*" . || true | grep -v "example\|placeholder\|your[_-]api\|test[_-]api" | if grep .; then exit 1; else exit 0; fi' language: system pass_filenames: false # TypeScript/JavaScript specific security checks - repo: https://github.com/pre-commit/mirrors-eslint rev: v9.16.0 hooks: - id: eslint name: eslint security check files: \.(js|jsx|ts|tsx)$ args: ['--config', '.eslintrc.security.json', '--fix', '--max-warnings=0'] additional_dependencies: - eslint@9.16.0 - eslint-plugin-security@3.0.1 - '@typescript-eslint/eslint-plugin@8.18.2' - '@typescript-eslint/parser@8.18.2' exclude: | (?x)^( node_modules/.*| \.next/.*| dist/.*| build/.* )$

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/darrentmorgan/hostaway-mcp'

If you have feedback or need assistance with the MCP directory API, please join our Discord server