Skip to main content
Glama

WebScout MCP

by pyscout

reverse_engineer_chat

Analyze chat interfaces to identify streaming API endpoints by sending test messages and capturing network traffic patterns, including Server-Sent Events and WebSocket connections.

Instructions

Automatically reverse engineer a chat interface by navigating to the URL, sending a test message, and capturing all network traffic to identify streaming API endpoints. Returns discovered endpoints with their request/response patterns including Server-Sent Events (SSE), WebSocket connections, and chunked HTTP responses. Perfect for quick analysis of public chat interfaces without authentication.

Input Schema

NameRequiredDescriptionDefault
captureWindowMsNoDuration in milliseconds to monitor network traffic after sending the message. Increase for slow-responding APIs (default: 8000)
messageNoThe test message to send to trigger a streaming response from the chat AI (default: "hi")hi
urlYesThe complete URL of the chat interface to analyze (e.g., https://chat.example.com)

Input Schema (JSON Schema)

{ "properties": { "captureWindowMs": { "default": 8000, "description": "Duration in milliseconds to monitor network traffic after sending the message. Increase for slow-responding APIs (default: 8000)", "type": "number" }, "message": { "default": "hi", "description": "The test message to send to trigger a streaming response from the chat AI (default: \"hi\")", "type": "string" }, "url": { "description": "The complete URL of the chat interface to analyze (e.g., https://chat.example.com)", "type": "string" } }, "required": [ "url" ], "type": "object" }

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/pyscout/webscout-mcp'

If you have feedback or need assistance with the MCP directory API, please join our Discord server