Skip to main content
Glama

Server Configuration

Describes the environment variables required to run the server.

NameRequiredDescriptionDefault

No arguments

Capabilities

Features and capabilities supported by this server

CapabilityDetails
tools
{
  "listChanged": false
}
prompts
{
  "listChanged": false
}
resources
{
  "subscribe": false,
  "listChanged": false
}
experimental
{}

Tools

Functions exposed to the LLM to take actions

NameDescription
vet_commandA

Vet a single shell command for destructive patterns BEFORE execution. Detects rm -rf nested in chains, package-manager glob removal (apt remove 'nvidia'), dd/mkfs/wipefs filesystem destruction, chmod 777 on system paths, curl|bash network-exfil, chained shutdown/reboot, git destructive ops (push --force, reset --hard), and DROP DATABASE / TRUNCATE via cli. Returns verdict (CLEAN / CAUTION / REVIEW / BLOCK / UNVERIFIED), risk_score (0-100), and per-finding rule_id + severity + recommendation. Sub-second, local, no API key. Use inline before approving any agent-proposed command.

vet_command_chainA

Vet a chained / multi-statement shell command — same rules as vet_command, but escalates LOW→MEDIUM and MEDIUM→HIGH because destructive fragments nested deep inside a chain (after &&, ;, or |) are easier for the operator to overlook on a quick read. Use this for any command containing &&, ||, ;, or piped subshells. The exact failure mode this targets: r/LocalLLaMA 'one bash permission slipped' (1.5k upvotes) — agent proposed a chained command, operator pattern-matched the lede, missed rm -rf deep in the chain.

list_detection_rulesA

Return the catalog of every detection rule the scanner applies — rule_id, severity, pattern_kind, description, example_match. Use this to audit coverage, document detection scope to your compliance/security team, or build a custom allowlist. 30 rules across 8 families: DESTRUCTIVE / PACKAGE / PRIVILEGED / SHUTDOWN / EXFIL / DATABASE / GIT / SUSPICIOUS.

Prompts

Interactive templates invoked by user choice

NameDescription
vet-this-commandVet the most recent shell command in the conversation, explain each finding's risk, and recommend a specific action — refuse, sandbox-test, edit, or proceed with caveats.
audit-scriptAudit a multi-line shell script line by line — calls vet_command on every non-trivial line and produces a per-line risk report.

Resources

Contextual data attached and managed by the client

NameDescription
Demo: clean commandSample input demonstrating a CLEAN verdict (no destructive patterns)
Demo: dangerous commandSample input with package-glob removal + chained reboot + curl|bash — demonstrates a BLOCK verdict
Demo: sneaky chained commandSample input mimicking the r/LocalLLaMA failure mode — benign-looking lede + rm -rf with env-var nested deep in the chain. Demonstrates chain-mode escalation.

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/temurkhan13/bash-vet-mcp'

If you have feedback or need assistance with the MCP directory API, please join our Discord server