Skip to main content
Glama
codeql-analysis.yaml1.68 kB
name: "CodeQL" on: push: branches: - 'main' - 'release-v*' - 'staging/*' pull_request: schedule: - cron: '0 12 * * *' jobs: analyze-go: name: Analyze Go if: github.repository == 'aws/karpenter-provider-aws' runs-on: ubuntu-latest permissions: actions: read # github/codeql-action/init@v2 security-events: write # github/codeql-action/init@v2 steps: - uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0 - uses: ./.github/actions/install-deps - run: make vulncheck - uses: github/codeql-action/init@64d10c13136e1c5bce3e5fbde8d4906eeaafc885 # v3.30.6 with: languages: go - uses: github/codeql-action/autobuild@64d10c13136e1c5bce3e5fbde8d4906eeaafc885 # v3.30.6 - uses: github/codeql-action/analyze@64d10c13136e1c5bce3e5fbde8d4906eeaafc885 # v3.30.6 # Javascript is added here for evaluating Github Action vulnerabilities # https://github.blog/2023-08-09-four-tips-to-keep-your-github-actions-workflows-secure/#2-enable-code-scanning-for-workflows analyze-github-actions: name: Analyze Github Actions if: github.repository == 'aws/karpenter-provider-aws' runs-on: ubuntu-latest permissions: actions: read # github/codeql-action/init@v3 security-events: write # github/codeql-action/init@v3 steps: - uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0 - uses: github/codeql-action/init@64d10c13136e1c5bce3e5fbde8d4906eeaafc885 # v3.30.6 with: languages: actions - uses: github/codeql-action/analyze@64d10c13136e1c5bce3e5fbde8d4906eeaafc885 # v3.30.6

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/mengfwan/test-mcp-glama'

If you have feedback or need assistance with the MCP directory API, please join our Discord server