Skip to main content
Glama

file_upload_test

Test web application file upload security by attempting to upload PHP shells using Content-Type bypass techniques and alternative extensions to identify vulnerabilities.

Instructions

Test web shell upload with Content-Type bypass variants. Attempts to upload a PHP web shell using various techniques: 1) Direct .php upload 2) .php with image/jpeg Content-Type (Content-Type bypass) 3) Alternative extensions (.php5, .phtml, .phar, .php7, .phps) 4) Double extension (.php.jpg) 5) Null byte (.php%00.jpg). After each upload, attempts to access the uploaded file to check execution. Returns: {results: [{technique, upload_status, execution_status, output, successful}]}. Side effects: Uploads files to the server. May achieve remote code execution.

Input Schema

TableJSON Schema
NameRequiredDescriptionDefault
urlYesBase URL of the target application, e.g. https://target.com
upload_endpointYesUpload endpoint path, e.g. /my-account/avatar or /api/upload
upload_fieldNoForm field name for the file upload, e.g. 'avatar', 'file', 'upload'file
upload_path_prefixNoPath where uploaded files are accessible, e.g. /files/avatars//files/avatars/
auth_cookieNoSession cookie for authenticated uploads
shell_commandNoCommand the PHP shell should executeid
extra_fieldsNoAdditional form fields, e.g. 'user=test&csrf=abc123'
Behavior4/5

Does the description disclose side effects, auth requirements, rate limits, or destructive behavior?

With no annotations provided, the description carries full burden and does well by disclosing key behaviors: 'Side effects: Uploads files to the server. May achieve remote code execution.' It also describes the testing flow (upload then access check) and return format. However, it doesn't mention rate limits, authentication requirements beyond the auth_cookie parameter, or error handling.

Agents need to know what a tool does to the world before calling it. Descriptions should go beyond structured annotations to explain consequences.

Conciseness4/5

Is the description appropriately sized, front-loaded, and free of redundancy?

The description is appropriately sized and front-loaded with the core purpose. It lists techniques clearly and ends with side effects. Some redundancy exists (e.g., 'Attempts to upload...' followed by 'After each upload...'), but overall it's efficient with zero wasted sentences.

Shorter descriptions cost fewer tokens and are easier for agents to parse. Every sentence should earn its place.

Completeness4/5

Given the tool's complexity, does the description cover enough for an agent to succeed on first attempt?

For a complex security testing tool with 7 parameters and no output schema, the description provides good context: it explains the testing methodology, techniques, return structure, and side effects. However, it doesn't detail the output schema (only mentions return format vaguely) or error cases, leaving some gaps in completeness.

Complex tools with many parameters or behaviors need more documentation. Simple tools need less. This dimension scales expectations accordingly.

Parameters3/5

Does the description clarify parameter syntax, constraints, interactions, or defaults beyond what the schema provides?

Schema description coverage is 100%, so the schema already documents all 7 parameters thoroughly. The description doesn't add any parameter-specific semantics beyond what's in the schema (e.g., it doesn't explain how url and upload_endpoint combine or provide examples for extra_fields). Baseline 3 is appropriate when the schema does the heavy lifting.

Input schemas describe structure but not intent. Descriptions should explain non-obvious parameter relationships and valid value ranges.

Purpose5/5

Does the description clearly state what the tool does and how it differs from similar tools?

The description explicitly states the tool's purpose: 'Test web shell upload with Content-Type bypass variants' and details specific techniques (direct .php upload, Content-Type bypass, alternative extensions, double extension, null byte). It clearly distinguishes this as a file upload security testing tool, unlike sibling tools focused on authentication, SQL injection, XSS, etc.

Agents choose between tools based on descriptions. A clear purpose with a specific verb and resource helps agents select the right tool.

Usage Guidelines3/5

Does the description explain when to use this tool, when not to, or what alternatives exist?

The description implies usage for security testing of file upload vulnerabilities but doesn't explicitly state when to use this tool versus alternatives (e.g., path_traversal_test or other sibling tools). It mentions 'Attempts to upload a PHP web shell' which suggests a specific testing context, but lacks explicit guidance on prerequisites or comparisons with other tools.

Agents often have multiple tools that could apply. Explicit usage guidance like "use X instead of Y when Z" prevents misuse.

Install Server

Other Tools

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/operantlabs/operant-mcp'

If you have feedback or need assistance with the MCP directory API, please join our Discord server