Skip to main content
Glama

Threat.Zone MCP Server

by threat-zone
GPL 3.0
14
  • Apple
  • Linux

scan_file_sandbox_simple

Analyze files for potential malware using default sandbox settings. Submit files for automated security analysis to detect threats without advanced configuration.

Instructions

Submit a file for simple sandbox analysis using default settings.

This is a simplified version of scan_file_sandbox with default configurations. Use scan_file_sandbox for advanced configuration options.

Args: file_path: Path to the file to analyze is_public: Whether the scan results should be public (default: False) entrypoint: File to execute within archive (if applicable) password: Password for archive files (if applicable)

Input Schema

NameRequiredDescriptionDefault
entrypointNo
file_pathYes
is_publicNo
passwordNo

Input Schema (JSON Schema)

{ "properties": { "entrypoint": { "anyOf": [ { "type": "string" }, { "type": "null" } ], "default": null, "title": "Entrypoint" }, "file_path": { "title": "File Path", "type": "string" }, "is_public": { "default": false, "title": "Is Public", "type": "boolean" }, "password": { "anyOf": [ { "type": "string" }, { "type": "null" } ], "default": null, "title": "Password" } }, "required": [ "file_path" ], "type": "object" }

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/threat-zone/threatzonemcp'

If you have feedback or need assistance with the MCP directory API, please join our Discord server