Skip to main content
Glama
step-security

stepsecurity-mcp

Official

analyze_anomalous_calls_by_process

Group anomalous network-call detections by process to distinguish legitimate VPN daemons (tailscaled, twingate, etc.) from other processes needing per-destination review. Returns per-process count, distinct endpoints, sample detections, and a suggested suppression rule for VPN processes.

Instructions

Group tenant-wide anomalous network-call detections by the calling process. Goal: spot VPN / mesh-networking daemons (tailscaled, twingate, zerotier-one, netbird, cloudflared, warp-svc, openvpn, wireguard) that are legitimately fanning out to many peer IPs and coordination endpoints as normal operation. For those, a single process-scoped rule suppresses both domain AND direct-IP benign anomalies with one rule. Returns per-process: count, distinct endpoints, distinct direct IPs, sample detections (with dashboard links), and a suggested single suppression rule. When a VPN process appears (is_vpn_process_candidate=true), propose a process-wide rule (just {process: , owner: '*', ...}). Do NOT auto-propose process-wide rules for other processes (dockerd, containerd, snapd, curl, etc.) — those can make security-relevant calls and deserve per-destination review.

Input Schema

TableJSON Schema
NameRequiredDescriptionDefault
customerNoStepSecurity customer/tenant identifier. Optional — falls back to STEP_SECURITY_CUSTOMER env var.
minCountNoHide processes with fewer than this many anomalies (default: 2).
Behavior4/5

Does the description disclose side effects, auth requirements, rate limits, or destructive behavior?

With no annotations, the description fully discloses behavior: it returns per-process data and suggests suppression rules, including the logic for auto-proposing process-wide rules for VPN processes. It does not mention side effects or permissions, but the tool appears read-only.

Agents need to know what a tool does to the world before calling it. Descriptions should go beyond structured annotations to explain consequences.

Conciseness4/5

Is the description appropriately sized, front-loaded, and free of redundancy?

The description is a single paragraph but well-organized: first the goal, then specific guidance, then return details. It is informative without being overly verbose, though could be slightly more concise.

Shorter descriptions cost fewer tokens and are easier for agents to parse. Every sentence should earn its place.

Completeness5/5

Given the tool's complexity, does the description cover enough for an agent to succeed on first attempt?

Given no output schema, the description fully explains the return structure: per-process count, distinct endpoints, distinct direct IPs, sample detections with dashboard links, and a suggested suppression rule. It also covers the logic for VPN processes. Sibling tools provide additional context.

Complex tools with many parameters or behaviors need more documentation. Simple tools need less. This dimension scales expectations accordingly.

Parameters3/5

Does the description clarify parameter syntax, constraints, interactions, or defaults beyond what the schema provides?

Schema coverage is 100%, so baseline is 3. The description adds no extra meaning beyond what's in the schema for the two parameters (customer and minCount). The mention of env var fallback is already in the schema description.

Input schemas describe structure but not intent. Descriptions should explain non-obvious parameter relationships and valid value ranges.

Purpose5/5

Does the description clearly state what the tool does and how it differs from similar tools?

The description clearly states that the tool groups anomalous network-call detections by process, aiming to identify VPN/mesh-networking daemons. It distinguishes from siblings like list_anomalous_network_calls and create_suppression_rule by specifying it returns per-process statistics and suggests suppression rules.

Agents choose between tools based on descriptions. A clear purpose with a specific verb and resource helps agents select the right tool.

Usage Guidelines5/5

Does the description explain when to use this tool, when not to, or what alternatives exist?

Explicit guidance on when to use (spot VPN daemons) and when not to (do not auto-propose process-wide rules for other processes like dockerd). It also explains that for VPN processes, a single rule suppresses both domain and direct-IP anomalies.

Agents often have multiple tools that could apply. Explicit usage guidance like "use X instead of Y when Z" prevents misuse.

Install Server

Other Tools

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/step-security/stepsecurity-mcp'

If you have feedback or need assistance with the MCP directory API, please join our Discord server