Skip to main content
Glama
rodhayl
by rodhayl

security

Scan code for secrets and vulnerabilities, analyze content risks, preview redactions, and automatically fix detected security issues in local projects.

Instructions

Security actions: scan, risk, redact, fix. scan may return coverage guidance for narrow scope; use recommended include globs and includeHidden=true.

Input Schema

TableJSON Schema
NameRequiredDescriptionDefault
actionYesAction: scan (find secrets/vulnerabilities), risk (analyze content risk), redact (preview redaction), fix (auto-fix detected secrets)
rootNoRoot directory to scan (action=scan|fix). Must be a directory; use workspace/search to discover valid roots.
scanTypeNoType of scan (for action=scan|fix)
outputFormatNoOutput format (for action=scan)
includeNoGlob patterns to include (e.g., ["**/*.ts","**/*.py"]). If omitted, scan auto-detects project type and applies defaults.
excludeNoFile patterns to exclude from scan (e.g., ["*_test.py", "*.spec.ts"]). Applied after include filter.
skipTestsNoSkip test directories (tests/, test/, __tests__/, spec/) to reduce noise. Default: true
includeHiddenNoInclude hidden files/directories (default: false). By default, hidden files and common noise dirs (node_modules, venv, .git) are skipped. Set true to scan hidden files like .env, .secret.
failOnEmptyNoFail when zero files are scanned. Default: true in CI, false in local runs.
applyNoApply fixes immediately (for action=fix, default: false)
contentNoContent to analyze/redact (for action=risk|redact)
contextNoContent context type (for action=risk)
strictModeNoStrict mode for risk analysis (for action=risk)
showContextNoShow context around redacted content (for action=redact)
contextLinesNoNumber of context lines to show (for action=redact)
formatNoOutput format: compact (paths only), dense (minimal), detailed (full), json (raw)
Behavior2/5

Does the description disclose side effects, auth requirements, rate limits, or destructive behavior?

No annotations are provided, so the description must carry full behavioral disclosure burden. It mentions scan may return coverage guidance, but critically fails to disclose that the fix action with apply=true performs destructive file modifications, or that redact is preview-only (per schema) vs destructive. No mention of auth requirements or rate limits.

Agents need to know what a tool does to the world before calling it. Descriptions should go beyond structured annotations to explain consequences.

Conciseness4/5

Is the description appropriately sized, front-loaded, and free of redundancy?

Two sentences with no filler. Front-loaded with action list. However, extreme brevity leaves insufficient room to cover 16 parameters and 4 distinct action modes adequately.

Shorter descriptions cost fewer tokens and are easier for agents to parse. Every sentence should earn its place.

Completeness2/5

Given the tool's complexity, does the description cover enough for an agent to succeed on first attempt?

Severely underspecified for a 16-parameter multi-modal tool. With no annotations, no output schema, and four distinct action modes (file-based scanning vs content analysis vs redaction preview vs auto-fixing), the two-sentence description leaves critical gaps in explaining action-specific requirements, returns, and side effects.

Complex tools with many parameters or behaviors need more documentation. Simple tools need less. This dimension scales expectations accordingly.

Parameters3/5

Does the description clarify parameter syntax, constraints, interactions, or defaults beyond what the schema provides?

Schema description coverage is 100%, establishing a baseline of 3. The description references 'include globs' and 'includeHidden=true' which map to specific parameters, but adds no semantic detail beyond the schema's own descriptions (e.g., no guidance on trade-offs between outputFormat choices or scanType selection).

Input schemas describe structure but not intent. Descriptions should explain non-obvious parameter relationships and valid value ranges.

Purpose4/5

Does the description clearly state what the tool does and how it differs from similar tools?

The description clearly enumerates four specific security actions (scan, risk, redact, fix) and identifies the domain as 'Security actions'. It specifies the resource type and operations available, though it lacks explicit differentiation from siblings like find_and_fix or analyze_file.

Agents choose between tools based on descriptions. A clear purpose with a specific verb and resource helps agents select the right tool.

Usage Guidelines2/5

Does the description explain when to use this tool, when not to, or what alternatives exist?

Provides specific guidance only for the scan action (using include globs and includeHidden=true for narrow scope), but offers no guidance on when to use risk vs scan, when to use fix vs redact, or when to choose this tool over sibling tools like find_and_fix or analyze_file.

Agents often have multiple tools that could apply. Explicit usage guidance like "use X instead of Y when Z" prevents misuse.

Install Server

Other Tools

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/rodhayl/mcpLocalHelper'

If you have feedback or need assistance with the MCP directory API, please join our Discord server