Skip to main content
Glama

Server Configuration

Describes the environment variables required to run the server.

NameRequiredDescriptionDefault
PYTHONUTF8NoSet to 1 to ensure UTF-8 encoding for Python1

Capabilities

Features and capabilities supported by this server

CapabilityDetails
tools
{
  "listChanged": false
}
prompts
{
  "listChanged": false
}
resources
{
  "subscribe": false,
  "listChanged": false
}
experimental
{}

Tools

Functions exposed to the LLM to take actions

NameDescription
omega_preload_context

Loads episodic context for a new task by querying the RAG store, vault history, and any sealed handoff. Call this once at the start of every new task before doing any work. Returns JSON with fields: rag_matches, vault_history, handoff, continuity_type (CONTINUATION | CONTEXT_SWITCH | FRESH_START).

omega_rag_query

Searches the provenance RAG store using semantic similarity and returns ranked text fragments. Use this for meaning-based search; use omega_vault_search instead for exact keyword matching. Returns JSON array of {fragment, similarity_score, quality_score, source, tier}.

omega_ingest

Stores a new knowledge fragment in the provenance RAG store with source and evidence tier metadata. Use this to persist decisions, patterns, or findings for future retrieval via omega_rag_query. Returns JSON with fields: fragment_id, stored (boolean), timestamp.

omega_vault_search

Searches the vault database using exact keyword matching via SQLite FTS5. Use this for precise keyword lookups; use omega_rag_query instead for semantic/meaning-based search. Returns JSON array of matching vault entries with timestamps and session context.

omega_cortex_check

Read-only alignment gate that measures semantic similarity between a proposed action and the task baseline. Use this to check alignment before high-impact operations without modifying any arguments; use omega_cortex_steer instead if you want automatic argument correction. Returns JSON with fields: approved (boolean), similarity (float 0-1), verdict (APPROVED | BLOCKED).

omega_cortex_steer

Alignment gate with automatic argument correction for drifting tool calls. Use this instead of omega_cortex_check when you want arguments auto-corrected toward the baseline; blocks hard if similarity < 0.45, steers if 0.45-0.65, passes unchanged if > 0.65. Returns JSON with fields: similarity (float), steered_args (object), corrections (array), verdict (PASSED | STEERED | BLOCKED).

omega_seal_run

Appends a tamper-proof entry to the SEAL (Secure Evidence Audit Ledger) SHA-256 hash chain. Use this to create an immutable audit record of significant events, decisions, or state changes. Returns JSON with fields: seal_hash (hex string), chain_position (integer), timestamp (ISO 8601).

omega_log_session

Writes a complete session record to the vault for cross-session persistence. Use this at the end of a work session to record what was done; data is retrievable via omega_vault_search. Returns JSON with fields: session_id, stored (boolean), entry_count (integer).

omega_write_handoff

Creates a SHA-256 sealed handoff document that auto-loads on the next server restart via omega://session/preload. Use this at the end of a session to ensure seamless context continuity for the next session. Returns JSON with fields: handoff_hash (hex string), file_path (string).

omega_execute

Cortex-governed execution wrapper that checks alignment, steers if needed, executes, and auto-logs to the SEAL chain. Use this as the default way to invoke any Omega Brain tool with full governance; only wraps Omega Brain tools — external tools are returned with steered_args for manual invocation. Returns JSON with fields: result (object), cortex_verdict (string), seal_hash (hex string).

omega_brain_report

Generates a human-readable audit report showing SEAL chain entries, Cortex verdicts, and vault statistics. Use this to inspect the trust and governance layer; use omega_brain_status for a quick health summary instead. Returns formatted text report with sections: seal_tail, cortex_verdicts, vault_stats, session_health.

omega_brain_status

Returns a quick health summary of all Omega Brain subsystems as structured JSON. Use this for a fast status check; use omega_brain_report for a detailed audit report instead. Returns JSON with fields: vault_sessions (int), vault_entries (int), rag_fragments (int), seal_entries (int), session_id (string), uptime_seconds (float), call_count (int).

veritas_intake_gate

Gate 1/10: Parses, canonicalizes, and validates a BuildClaim's structure and computes SHA-256 IDs. Use this first to validate claim structure before running any downstream gates. Returns JSON with fields: verdict (PASS | VIOLATION), claim_id (hex), primitive_count (int), evidence_count (int).

veritas_type_gate

Gate 2/10: Enforces type-level correctness — unique primitives, non-empty domains, operator arity, symbol resolution, and unit consistency. Use this after intake to catch structural errors before evidence evaluation. Returns JSON with verdict (PASS | VIOLATION) and reason_code: TYPE_OK, TYPE_DUPLICATE_PRIMITIVE, TYPE_EMPTY_DOMAIN, TYPE_OPERATOR_ARITY, UNDEFINED_SYMBOL, or UNIT_MISMATCH.

veritas_dependency_gate

Gate 3/10: Analyzes supply-chain security via SBOM scan, CVE check, integrity verification, license compatibility, and dependency depth. Use this to assess third-party dependency risk before deploying or releasing. Returns JSON with verdict (PASS | MODEL_BOUND | VIOLATION) and per-dependency findings array.

veritas_evidence_gate

Gate 4/10: Evaluates evidence sufficiency for critical variables by computing independence (MIS_GREEDY), agreement, and quality scores. Use this to verify that evidence meets K_min, A_min, Q_min thresholds; use veritas_compute_quality or veritas_mis_greedy for individual calculations. Returns JSON with verdict (PASS | INCONCLUSIVE) and reason_code: EVIDENCE_OK, INSUFFICIENT_INDEPENDENCE, LOW_AGREEMENT, or LOW_QUALITY.

veritas_math_gate

Gate 5/10: Translates boundary constraints into interval arithmetic or SMT formulas and checks satisfiability with evidence values. Use this after evidence gate to verify that measured values satisfy all declared constraints. Returns JSON with verdict (PASS | VIOLATION | INCONCLUSIVE) and reason_code: MATH_OK, UNSAT_CONSTRAINT, or DECIDABILITY_TIMEOUT.

veritas_cost_gate

Gate 6/10: Computes resource utilization as max(cost_i / bound_i) and checks against redline thresholds. Use this to verify cost budgets are within limits; skipped automatically if no cost vector is declared. Returns JSON with verdict (PASS | MODEL_BOUND | INCONCLUSIVE), utilization (float), and reason_code: COST_OK, COST_REDLINING, COST_NOT_APPLICABLE, or UNDECLARED_COST_BOUND.

veritas_incentive_gate

Gate 7/10: Detects evidence monoculture by measuring source dominance (max_count_from_single_source / independent_set_size). Use this to guard against single-source bias in evidence; dominance > 0.50 triggers MODEL_BOUND. Returns JSON with verdict (PASS | MODEL_BOUND), dominance (float), and reason_code: INCENTIVE_OK or DOMINANCE_DETECTED.

veritas_security_gate

Gate 8/10: Evaluates security posture from SAST, secret detection, injection surfaces, auth boundaries, and TLS config. Use this to enforce zero-tolerance security policy — any CRITICAL finding or exposed secret causes VIOLATION. Returns JSON with verdict (PASS | MODEL_BOUND | VIOLATION) and findings array with severity levels.

veritas_adversary_gate

Gate 9/10: Stress-tests the claim against attack transforms (bound inflation, evidence removal, parameter/evidence perturbation). Use this as the final robustness check; fragility > 25% triggers MODEL_BOUND (ADVERSARY_FRAGILE). Returns JSON with verdict (PASS | MODEL_BOUND), fragility (float), attacks_tested (int), attacks_degraded (int).

veritas_run_pipeline

Runs the full 10-gate VERITAS pipeline: INTAKE → TYPE → DEPENDENCY → EVIDENCE → MATH → COST → INCENTIVE → SECURITY → ADVERSARY → TRACE/SEAL. Use this for complete end-to-end evaluation of a BuildClaim; use individual gates for targeted checks. Returns JSON with fields: final_verdict (PASS | MODEL_BOUND | INCONCLUSIVE | VIOLATION), gate_results (array), reason_codes (array), seal_hash (hex string).

veritas_compute_quality

Computes the VERITAS Quality(e) score for a single evidence item using: clamp01(0.50provenance + 0.30uncertainty + 0.20*method). Use this to evaluate individual evidence quality before submitting to the evidence gate. Returns JSON with fields: quality (float 0.0-1.0).

veritas_mis_greedy

Runs the MIS_GREEDY algorithm to find the maximum independent set of evidence items with no shared source, chain, dependency, or same-protocol-within-24h. Use this to check evidence independence before submitting to the evidence gate; use veritas_compute_quality for individual quality scores. Returns JSON with fields: independent_set (array), independent_count (int), total_items (int), agreement (float 0.0-1.0).

veritas_claeg_resolve

Maps a VERITAS verdict to a CLAEG terminal state: PASS→STABLE_CONTINUATION, MODEL_BOUND/INCONCLUSIVE→ISOLATED_CONTAINMENT, VIOLATION→TERMINAL_SHUTDOWN. Use this after a pipeline run to determine the system's required operational state. Returns JSON with fields: verdict (string), terminal_state (string), invariant (string).

veritas_claeg_transition

Validates whether a CLAEG state transition is permitted under closed-world rules (absence of explicit permission = prohibition). Use this before changing system operational state; TERMINAL_SHUTDOWN is absorbing (no outbound transitions). Returns JSON with fields: allowed (boolean), reason (string).

veritas_nafe_scan

Scans text for NAFE failure signatures: Narrative Rescue, Moral Override, Authority Drift, and Intent Inference. Use this on commit messages, PR descriptions, or incident reports to detect narrative bypasses of deterministic gates. Returns JSON with fields: clean (boolean), flags (array of detected signatures), scan_metadata (object). Violations auto-seal to the audit ledger.

Prompts

Interactive templates invoked by user choice

NameDescription
omega_task_startBrief Antigravity at task start. Detects CONTINUATION / CONTEXT_SWITCH / FRESH_START automatically.
omega_seal_taskONE TAP end-of-session seal. Fully automatic: reads vault tape, auto-generates summary, logs to vault, writes S.E.A.L. trace, writes handoff. No fields required. Zero typing.
omega_write_handoffStructured handoff with explicit fields. Use when you want to be precise about task, decisions, files, and next steps. The AI fills these in — you don't type them. omega_seal_task is preferred for quick workflow; this is for detailed records.

Resources

Contextual data attached and managed by the client

NameDescription
Omega Startup Brain PreloadAuto-fetched at startup: RAG + handoff + vault. Zero manual calls needed.
Last Session HandoffSHA-256 verified cross-session handoff file.
Current MCP SessionSession ID and call count.
Omega Brain StatusDB stats, embedding engine, ledger count.
VERITAS Omega Build Spec v1.0.0Canonical specification: invariants, thresholds, gate order, type system. Read-only source of truth.
CLAEG GrammarConstraint-Locked Alignment Evaluation Grammar: terminal states, allowed transitions, prohibitions.
VERITAS Gate OrderThe 10-gate pipeline order: INTAKE->TYPE->DEPENDENCY->EVIDENCE->MATH->COST->INCENTIVE->SECURITY->ADVERSARY->TRACE/SEAL
VERITAS Baseline ThresholdsNumeric thresholds for dev/baseline regime.
VERITAS Production ThresholdsEscalated numeric thresholds for production/release regime.

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/VrtxOmega/omega-brain-mcp'

If you have feedback or need assistance with the MCP directory API, please join our Discord server