Skip to main content
Glama

extensive_scan

Run a thorough security scan: WAF detection, recon, port scanning, fingerprinting, TLS audit, directory discovery, and checks for XSS, SQLi, CSRF, and sensitive files. Requires user consent.

Instructions

Comprehensive scan (20-45 min): WAF detection, full recon, top-1000 port scan, tech fingerprinting, TLS audit, directory discovery, XSS, SQLi, CSRF, sensitive file discovery

Input Schema

TableJSON Schema
NameRequiredDescriptionDefault
targetYesTarget URL
consentYesExplicit consent for active scanning
Behavior3/5

Does the description disclose side effects, auth requirements, rate limits, or destructive behavior?

No annotations are provided, so the description carries the full burden. It discloses time duration and scan types, but lacks info on side effects, destructive potential (though consent is required), rate limiting, or what happens during/after the scan. The consent parameter is already in schema.

Agents need to know what a tool does to the world before calling it. Descriptions should go beyond structured annotations to explain consequences.

Conciseness4/5

Is the description appropriately sized, front-loaded, and free of redundancy?

The description is a single sentence front-loaded with the key purpose and duration. It efficiently lists scan types without unnecessary words, though it could benefit from brief separators for readability.

Shorter descriptions cost fewer tokens and are easier for agents to parse. Every sentence should earn its place.

Completeness3/5

Given the tool's complexity, does the description cover enough for an agent to succeed on first attempt?

Given the moderate complexity of a comprehensive scan and no output schema, the description covers the scope and duration but omits expected output format, error handling, or post-scan behavior. It is adequate but lacks completeness for an agent to fully anticipate results.

Complex tools with many parameters or behaviors need more documentation. Simple tools need less. This dimension scales expectations accordingly.

Parameters3/5

Does the description clarify parameter syntax, constraints, interactions, or defaults beyond what the schema provides?

Schema description coverage is 100% with two parameters (target and consent) already documented. The description does not add any parameter-specific information beyond the schema, so it meets the baseline but does not exceed.

Input schemas describe structure but not intent. Descriptions should explain non-obvious parameter relationships and valid value ranges.

Purpose5/5

Does the description clearly state what the tool does and how it differs from similar tools?

The description clearly states it is a comprehensive scan with a list of specific activities (WAF detection, full recon, port scan, tech fingerprinting, etc.), which distinguishes it from sibling tools like quick_scan, nmap, and whatweb. The verb 'scan' and resource context are explicit.

Agents choose between tools based on descriptions. A clear purpose with a specific verb and resource helps agents select the right tool.

Usage Guidelines3/5

Does the description explain when to use this tool, when not to, or what alternatives exist?

The description implies use for thorough scanning and mentions time range (20-45 min), but does not explicitly state when to use vs alternatives like quick_scan or other specialized tools. No guidance on prerequisites or when not to use.

Agents often have multiple tools that could apply. Explicit usage guidance like "use X instead of Y when Z" prevents misuse.

Install Server

Other Tools

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/MohitSahoo/MCPToolForWebVulnerabilities-'

If you have feedback or need assistance with the MCP directory API, please join our Discord server