vuln_kev_latest
:
Instructions
Get recently added CISA KEV entries (actively exploited vulnerabilities).
Input Schema
| Name | Required | Description | Default |
|---|---|---|---|
| days | No | Look back N days | |
| limit | No |
:
Get recently added CISA KEV entries (actively exploited vulnerabilities).
| Name | Required | Description | Default |
|---|---|---|---|
| days | No | Look back N days | |
| limit | No |
Does the description disclose side effects, auth requirements, rate limits, or destructive behavior?
With no annotations provided, the description carries the full burden of behavioral disclosure. It successfully clarifies that CISA KEV refers to actively exploited vulnerabilities, adding critical domain context. However, it omits operational details like whether results are paginated, data freshness guarantees, or the structure of returned entries.
Agents need to know what a tool does to the world before calling it. Descriptions should go beyond structured annotations to explain consequences.
Is the description appropriately sized, front-loaded, and free of redundancy?
The description consists of a single efficient sentence that front-loads the action verb and resource. There is no redundant text or repetition of structured schema information.
Shorter descriptions cost fewer tokens and are easier for agents to parse. Every sentence should earn its place.
Given the tool's complexity, does the description cover enough for an agent to succeed on first attempt?
Given the tool's low complexity (two simple parameters, no output schema), the description is minimally adequate. It covers the core domain concept (KEV) but lacks output format description and could mention that both parameters are optional with defaults.
Complex tools with many parameters or behaviors need more documentation. Simple tools need less. This dimension scales expectations accordingly.
Does the description clarify parameter syntax, constraints, interactions, or defaults beyond what the schema provides?
Schema description coverage is 50% (only 'days' has a description; 'limit' has none). The tool description fails to compensate for this gap by explaining what the 'limit' parameter controls or providing usage examples for the date range filtering.
Input schemas describe structure but not intent. Descriptions should explain non-obvious parameter relationships and valid value ranges.
Does the description clearly state what the tool does and how it differs from similar tools?
The description clearly identifies the resource ('CISA KEV entries'), the operation ('Get'), and the temporal scope ('recently added'). The parenthetical '(actively exploited vulnerabilities)' helpfully defines the KEV acronym for domain clarity.
Agents choose between tools based on descriptions. A clear purpose with a specific verb and resource helps agents select the right tool.
Does the description explain when to use this tool, when not to, or what alternatives exist?
The description provides no explicit guidance on when to select this tool versus siblings like 'vuln_kev_due_soon' or 'vuln_trending'. While 'recently added' implies temporal recency, there is no stated 'when to use' or 'when not to use' guidance.
Agents often have multiple tools that could apply. Explicit usage guidance like "use X instead of Y when Z" prevents misuse.
We provide all the information about MCP servers via our MCP API.
curl -X GET 'https://glama.ai/api/mcp/v1/servers/martc03/gov-mcp-servers'
If you have feedback or need assistance with the MCP directory API, please join our Discord server