We provide all the information about MCP servers via our MCP API.
curl -X GET 'https://glama.ai/api/mcp/v1/servers/deslicer/mcp-for-splunk'
If you have feedback or need assistance with the MCP directory API, please join our Discord server
.gitleaksignore•3.68 kB
# Gitleaks ignore file
# These are fingerprints for known false positives in historical commits
# Format: commit:file:rule:line
# Test credentials in test_credentials_handling.py (commit eec6d6d)
# These are intentional fake passwords for testing credential masking
eec6d6dc260ec720c48f8d4b9f3ebae5db785252:tests/security/test_credentials_handling.py:splunk-password:31
eec6d6dc260ec720c48f8d4b9f3ebae5db785252:tests/security/test_credentials_handling.py:splunk-password:39
eec6d6dc260ec720c48f8d4b9f3ebae5db785252:tests/security/test_credentials_handling.py:splunk-password:78
eec6d6dc260ec720c48f8d4b9f3ebae5db785252:tests/security/test_credentials_handling.py:splunk-password:85
eec6d6dc260ec720c48f8d4b9f3ebae5db785252:tests/security/test_credentials_handling.py:splunk-password:174
eec6d6dc260ec720c48f8d4b9f3ebae5db785252:tests/security/test_credentials_handling.py:splunk-password:184
eec6d6dc260ec720c48f8d4b9f3ebae5db785252:tests/security/test_credentials_handling.py:splunk-password:239
eec6d6dc260ec720c48f8d4b9f3ebae5db785252:tests/security/test_credentials_handling.py:splunk-password:288
eec6d6dc260ec720c48f8d4b9f3ebae5db785252:tests/security/test_credentials_handling.py:splunk-password:326
eec6d6dc260ec720c48f8d4b9f3ebae5db785252:tests/security/test_credentials_handling.py:splunk-password:359
eec6d6dc260ec720c48f8d4b9f3ebae5db785252:tests/security/test_credentials_handling.py:splunk-password:432
eec6d6dc260ec720c48f8d4b9f3ebae5db785252:tests/security/test_credentials_handling.py:generic-credential:290
eec6d6dc260ec720c48f8d4b9f3ebae5db785252:tests/security/test_credentials_handling.py:generic-credential:327
# Test credentials in test_http_surface.py (commit eec6d6d)
eec6d6dc260ec720c48f8d4b9f3ebae5db785252:tests/security/test_http_surface.py:splunk-password:369
# splunk_client.py password parameter (commits 64ac233 and eec6d6d)
# This is the password= parameter in splunklib.client.connect() - not a hardcoded secret
64ac233bfd533af5bd907ec9af136e10d1703f28:src/splunk_client.py:generic-credential:36
eec6d6dc260ec720c48f8d4b9f3ebae5db785252:src/splunk_client.py:generic-credential:46
# Docker compose dev defaults (commit a71bc8a)
# Default dev password Chang3d! - well-known, not a production secret
a71bc8a403dc1071a407a350c8d24ec891b59ad8:docker-compose-dev.yml:splunk-password:115
a71bc8a403dc1071a407a350c8d24ec891b59ad8:docker-compose-dev.yml:splunk-password:249
a71bc8a403dc1071a407a350c8d24ec891b59ad8:docker-compose-dev.yml:generic-credential:248
# Meta: gitleaksignore file itself triggers on fingerprint text (commit 88d1fff)
88d1fffb6e9e2ee1032940106947d6ca792e3c36:.gitleaksignore:generic-credential:25
# Sentry integration ContextVar tokens - not secrets, just variable names
# These are Python contextvars.ContextVar.set() return values, named "token" per stdlib convention
# Original files (commit 141f35f - now deleted)
141f35f3ca9425db7b276e1c964528f75a54ad45:src/core/sentry_integration.py:generic-credential:220
141f35f3ca9425db7b276e1c964528f75a54ad45:src/core/sentry_integration.py:generic-credential:277
141f35f3ca9425db7b276e1c964528f75a54ad45:src/core/sentry_middleware.py:generic-credential:58
141f35f3ca9425db7b276e1c964528f75a54ad45:src/core/sentry_middleware.py:generic-credential:59
# Refactored sentry subpackage (commit 8f63aa5)
8f63aa5470fe7953e54953b5e6b2bd4cca655aff:src/core/sentry/http_middleware.py:generic-credential:51
8f63aa5470fe7953e54953b5e6b2bd4cca655aff:src/core/sentry/http_middleware.py:generic-credential:52
8f63aa5470fe7953e54953b5e6b2bd4cca655aff:src/core/sentry/decorators.py:generic-credential:53
8f63aa5470fe7953e54953b5e6b2bd4cca655aff:src/core/sentry/decorators.py:generic-credential:101