Skip to main content
Glama

Server Configuration

Describes the environment variables required to run the server.

NameRequiredDescriptionDefault
NODE_ENVNoStandard environment variable used as a fallback for environment detection if QRING_ENV is not specified.
QRING_ENVNoSets the current environment context for secret resolution (e.g., dev, staging, prod). This determines which value is returned when a secret exists in multiple states (Superposition).

Capabilities

Features and capabilities supported by this server

CapabilityDetails
tools
{
  "listChanged": true
}

Tools

Functions exposed to the LLM to take actions

NameDescription
get_secret

Retrieve a secret by key. Collapses superposition if the secret has multiple environment states. Records access in audit log (observer effect).

list_secrets

List all secret keys with quantum metadata (scope, decay status, superposition states, entanglement, access count). Values are never exposed.

set_secret

Store a secret with optional quantum metadata: TTL (decay), environment state (superposition), description, tags.

delete_secret

Remove a secret from the keyring.

has_secret

Check if a secret exists. Returns boolean. Never reveals the value. Respects decay — expired secrets return false.

inspect_secret

Show full quantum state of a secret: superposition states, decay status, entanglement links, access history. Never reveals the actual value.

detect_environment

Detect the current environment context (wavefunction collapse). Returns the detected environment and its source (NODE_ENV, git branch, project config, etc.).

generate_secret

Generate a cryptographic secret (quantum noise). Formats: hex, base64, alphanumeric, uuid, api-key, token, password. Optionally save directly to the keyring.

entangle_secrets

Create a quantum entanglement between two secrets. When the source is rotated/updated, the target automatically receives the same value.

tunnel_create

Create an ephemeral secret that exists only in memory (quantum tunneling). Never persisted to disk. Optional TTL and max-reads for self-destruction.

tunnel_read

Read an ephemeral tunneled secret by ID. May self-destruct if max-reads is reached.

tunnel_list

List active tunneled secrets (IDs and metadata only, never values).

tunnel_destroy

Immediately destroy a tunneled secret.

teleport_pack

Pack secrets into an AES-256-GCM encrypted bundle for sharing between machines (quantum teleportation).

teleport_unpack

Decrypt and import secrets from a teleport bundle.

audit_log

Query the audit log for secret access history (observer effect). Shows who accessed what and when.

detect_anomalies

Scan for anomalous secret access patterns: burst reads, unusual-hour access. Returns findings and recommendations.

health_check

Run a comprehensive health check on all secrets: decay status, staleness, anomalies, entropy assessment.

agent_scan

Run an autonomous agent health scan: checks decay, staleness, anomalies, and optionally auto-rotates expired secrets. Returns a structured report.

Prompts

Interactive templates invoked by user choice

NameDescription

No prompts

Resources

Contextual data attached and managed by the client

NameDescription

No resources

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/I4cTime/quantum_ring'

If you have feedback or need assistance with the MCP directory API, please join our Discord server