Skip to main content
Glama

Server Configuration

Describes the environment variables required to run the server.

NameRequiredDescriptionDefault
REDIS_HOSTNoRedis host for caching (optional)localhost
REDIS_PORTNoRedis port for caching (optional)6379
POSTGRES_DBYesPostgreSQL database namebugbounty
ZAP_API_URLNoOWASP ZAP API URLhttp://localhost:8081
POSTGRES_HOSTYesPostgreSQL database hostlocalhost
POSTGRES_PORTYesPostgreSQL database port5433
POSTGRES_USERYesPostgreSQL database userpostgres
CAIDO_API_TOKENNoCaido API token for traffic analysis integration
POSTGRES_PASSWORDYesPostgreSQL database password

Capabilities

Server capabilities have not been inspected yet.

Tools

Functions exposed to the LLM to take actions

NameDescription
recon.subfinderC

Run subfinder to discover subdomains for a domain

recon.httpxC

Run httpx to check which hosts are live and get status codes

recon.amassC

Run amass for passive/active subdomain enumeration

recon.dnsB

Resolve DNS records for a domain or subdomain

recon.fullC

Run full reconnaissance workflow: subfinder -> httpx -> amass

js.downloadC

Download JavaScript file from URL

js.beautifyC

Beautify and format JavaScript source code

js.find_endpointsC

Extract API endpoints, URLs, and paths from JavaScript code

js.extract_secretsC

Heuristically extract potential API keys, tokens, and secrets from JS

js.analyzeA

Download, beautify, and analyze a JavaScript file - extract endpoints and secrets

security.test_xssC

Test for XSS vulnerabilities (non-destructive payloads)

security.test_sqliC

Test for SQL injection vulnerabilities

security.test_idorC

Test for IDOR (Insecure Direct Object Reference) vulnerabilities

security.test_cspC

Test Content Security Policy configuration

security.test_auth_bypassC

Test for authentication bypass vulnerabilities

security.test_csrfC

Test for CSRF vulnerabilities using advanced techniques

render.screenshotC

Take a screenshot of a webpage

render.extract_domC

Extract and return the DOM structure of a webpage

render.extract_formsB

Extract all forms from a webpage

render.execute_jsC

Execute JavaScript in the context of a webpage

db.save_findingC

Save a bug finding to the database

db.get_findingsC

Retrieve bug findings from the database

db.get_test_resultsB

Retrieve test results with success/failure and scores

db.get_statisticsC

Get statistics about test results

db.initA

Initialize database tables (run once on first setup)

training.importC

Import training data from HTB or PortSwigger labs

training.getC

Retrieve training data for learning patterns

training.matchC

Match current test against learned patterns

training.statsB

Get statistics about test results and training data

training.import_portswiggerC

Import training data from PortSwigger Academy lab solution

training.import_htbB

Import training data from HackTheBox challenge

training.import_allC

Import all pre-loaded training data from Intigriti, PortSwigger, and other sources

training.extract_from_writeupC

Extract training patterns from bug bounty writeup text

training.get_csrf_patternsC

Get all CSRF exploitation patterns from training data

zap.health_checkB

Check if ZAP is running and accessible

zap.start_spiderB

Start a spider (crawler) scan on a target URL

zap.get_spider_statusC

Get the status of a spider scan

zap.start_active_scanC

Start an active vulnerability scan on a target URL

zap.get_active_scan_statusC

Get the status of an active scan

zap.get_alertsB

Get all security alerts from ZAP

zap.get_alerts_summaryC

Get summary of alerts by risk level

zap.send_requestC

Send a custom HTTP request through ZAP proxy

zap.proxy_processC

Process a request through the MCP proxy layer (enhances with AI intelligence)

zap.get_sitesB

Get list of discovered sites from ZAP

zap.get_urlsB

Get list of discovered URLs from ZAP

zap.create_contextC

Create a scanning context in ZAP

zap.include_in_contextC

Include a URL pattern in a context

Prompts

Interactive templates invoked by user choice

NameDescription

No prompts

Resources

Contextual data attached and managed by the client

NameDescription

No resources

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/telmon95/VulneraMCP'

If you have feedback or need assistance with the MCP directory API, please join our Discord server