Skip to main content
Glama

veritas_security_gate

Enforce zero-tolerance security policy by evaluating SAST, secret detection, injection surfaces, auth boundaries, and TLS config. Any CRITICAL finding or exposed secret results in a VIOLATION verdict.

Instructions

Gate 8/10: Evaluates security posture from SAST, secret detection, injection surfaces, auth boundaries, and TLS config. Use this to enforce zero-tolerance security policy — any CRITICAL finding or exposed secret causes VIOLATION. Returns JSON with verdict (PASS | MODEL_BOUND | VIOLATION) and findings array with severity levels.

Input Schema

TableJSON Schema
NameRequiredDescriptionDefault
claimYesA VERITAS BuildClaim object for deterministic gate evaluation. All fields are optional for partial evaluation — only fields relevant to the invoked gate are required.
Behavior4/5

Does the description disclose side effects, auth requirements, rate limits, or destructive behavior?

With no annotations, the description fully discloses the violation trigger (any CRITICAL finding or exposed secret) and return format (verdict with PASS/MODEL_BOUND/VIOLATION and findings). No side effects or permissions discussed.

Agents need to know what a tool does to the world before calling it. Descriptions should go beyond structured annotations to explain consequences.

Conciseness5/5

Is the description appropriately sized, front-loaded, and free of redundancy?

Three sentences, each serving a distinct purpose: purpose, usage, and return. No fluff, front-loaded with the primary action.

Shorter descriptions cost fewer tokens and are easier for agents to parse. Every sentence should earn its place.

Completeness4/5

Given the tool's complexity, does the description cover enough for an agent to succeed on first attempt?

Covers all essential aspects for a gate: what it evaluates, enforcement policy, verdict outcomes, and return type. No output schema exists, so describing the return format is sufficient.

Complex tools with many parameters or behaviors need more documentation. Simple tools need less. This dimension scales expectations accordingly.

Parameters3/5

Does the description clarify parameter syntax, constraints, interactions, or defaults beyond what the schema provides?

Schema coverage is 100% for the single parameter 'claim', with detailed property descriptions. The description adds no additional parameter-level meaning beyond what the schema provides.

Input schemas describe structure but not intent. Descriptions should explain non-obvious parameter relationships and valid value ranges.

Purpose5/5

Does the description clearly state what the tool does and how it differs from similar tools?

The description clearly states the verb (evaluates), resource (security posture), and specific aspects (SAST, secret detection, etc.). It distinguishes itself as 'Gate 8/10' among sibling VERITAS gates.

Agents choose between tools based on descriptions. A clear purpose with a specific verb and resource helps agents select the right tool.

Usage Guidelines4/5

Does the description explain when to use this tool, when not to, or what alternatives exist?

Explicitly says 'Use this to enforce zero-tolerance security policy', indicating when to use. Does not explicitly state when not to use or provide alternatives, but the context of being a security gate is clear.

Agents often have multiple tools that could apply. Explicit usage guidance like "use X instead of Y when Z" prevents misuse.

Install Server

Other Tools

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/VrtxOmega/omega-brain-mcp'

If you have feedback or need assistance with the MCP directory API, please join our Discord server