Skip to main content
Glama
Sicks3c

HackerOne MCP Server

by Sicks3c

get_program_scope

Retrieve in-scope assets for bug bounty programs to identify eligible targets, asset types, and severity caps when drafting security reports.

Instructions

Get the in-scope assets for a bug bounty program. Returns asset types, identifiers, bounty eligibility, and severity caps. Useful when drafting reports to pick the correct asset.

Input Schema

TableJSON Schema
NameRequiredDescriptionDefault
program_handleYesProgram handle (e.g. 'uber', 'ipc-h1c-aws-tokyo-2026')
page_sizeNoNumber of scope items to return (default 100)

Implementation Reference

  • The actual implementation of the get_program_scope logic, which fetches and transforms the structured scope data for a program.
    export async function getProgramScope(handle: string, pageSize = 100) {
      const data = await h1Fetch(`/hackers/programs/${handle}/structured_scopes`, {
        "page[size]": String(pageSize),
      });
    
      return data.data.map((s: any) => ({
        id: s.id,
        asset_type: s.attributes.asset_type,
        asset_identifier: s.attributes.asset_identifier,
        eligible_for_bounty: s.attributes.eligible_for_bounty,
        eligible_for_submission: s.attributes.eligible_for_submission,
        instruction: s.attributes.instruction,
        max_severity: s.attributes.max_severity,
        created_at: s.attributes.created_at,
      }));
    }
  • src/index.ts:274-303 (registration)
    Registration of the get_program_scope tool with the MCP server, including input schema definition and tool handler mapping.
    server.tool(
      "get_program_scope",
      "Get the in-scope assets for a bug bounty program. Returns asset types, identifiers, bounty eligibility, and severity caps. Useful when drafting reports to pick the correct asset.",
      {
        program_handle: z
          .string()
          .describe("Program handle (e.g. 'uber', 'ipc-h1c-aws-tokyo-2026')"),
        page_size: z
          .number()
          .min(1)
          .max(100)
          .optional()
          .describe("Number of scope items to return (default 100)"),
      },
      async ({ program_handle, page_size }) => {
        try {
          const scope = await getProgramScope(program_handle, page_size);
          return {
            content: [
              {
                type: "text" as const,
                text: JSON.stringify(scope, null, 2),
              },
            ],
          };
        } catch (err: any) {
          return {
            content: [{ type: "text" as const, text: `Error: ${err.message}` }],
            isError: true,
          };
Behavior3/5

Does the description disclose side effects, auth requirements, rate limits, or destructive behavior?

No annotations are provided, so the description carries the full burden. It discloses the tool's behavior by specifying the return data (asset types, identifiers, bounty eligibility, severity caps) and a use case, but lacks details on permissions, rate limits, pagination (beyond the 'page_size' parameter in schema), or error handling. The description doesn't contradict any annotations, but with no annotations, it only partially fulfills the transparency requirement.

Agents need to know what a tool does to the world before calling it. Descriptions should go beyond structured annotations to explain consequences.

Conciseness5/5

Is the description appropriately sized, front-loaded, and free of redundancy?

The description is appropriately sized with two sentences: the first states the purpose and output, and the second provides a usage tip. It's front-loaded with essential information and has zero wasted words, making it efficient and easy to parse.

Shorter descriptions cost fewer tokens and are easier for agents to parse. Every sentence should earn its place.

Completeness4/5

Given the tool's complexity, does the description cover enough for an agent to succeed on first attempt?

Given the tool's moderate complexity (2 parameters, 100% schema coverage, no output schema), the description is fairly complete. It covers the purpose, output details, and a use case, but lacks information on output format (e.g., structure of returned assets), error cases, or integration with sibling tools. Without an output schema, more detail on return values would be beneficial, but it's adequate for basic understanding.

Complex tools with many parameters or behaviors need more documentation. Simple tools need less. This dimension scales expectations accordingly.

Parameters3/5

Does the description clarify parameter syntax, constraints, interactions, or defaults beyond what the schema provides?

Schema description coverage is 100%, so the schema already fully documents both parameters ('program_handle' and 'page_size'). The description adds no additional parameter semantics beyond what's in the schema, such as examples or constraints not covered. With high schema coverage, the baseline score of 3 is appropriate as the description doesn't compensate but also doesn't detract.

Input schemas describe structure but not intent. Descriptions should explain non-obvious parameter relationships and valid value ranges.

Purpose4/5

Does the description clearly state what the tool does and how it differs from similar tools?

The description clearly states the verb 'Get' and resource 'in-scope assets for a bug bounty program' with specific output details (asset types, identifiers, bounty eligibility, severity caps). It distinguishes from siblings like 'list_programs' or 'get_report' by focusing on program scope rather than programs or reports themselves, though it doesn't explicitly contrast with 'get_program_weaknesses' which might be related.

Agents choose between tools based on descriptions. A clear purpose with a specific verb and resource helps agents select the right tool.

Usage Guidelines3/5

Does the description explain when to use this tool, when not to, or what alternatives exist?

The description provides implied usage context ('Useful when drafting reports to pick the correct asset'), suggesting it's for report preparation. However, it doesn't explicitly state when to use this tool versus alternatives like 'list_programs' (which might list programs without scope details) or 'get_program_weaknesses' (which might focus on vulnerabilities rather than assets), nor does it mention exclusions or prerequisites.

Agents often have multiple tools that could apply. Explicit usage guidance like "use X instead of Y when Z" prevents misuse.

Install Server

Other Tools

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/Sicks3c/hackerone-mcp-server'

If you have feedback or need assistance with the MCP directory API, please join our Discord server