| db_queryA | Execute a SQL query against a SQLite database and return the results. Modes: "explore" (default): Uses a built-in in-memory demo database pre-loaded
with sample tables (users, products, orders). Great for quick testing. "file": Queries a user-specified SQLite file on disk.
Security: In "explore" mode only SELECT statements are allowed. In "file" mode only SELECT, EXPLAIN, and WITH ... SELECT are allowed. DML/DDL (INSERT, UPDATE, DELETE, DROP, etc.) will be rejected.
Returns: |
| api_callA | Make an HTTP request to any external API endpoint and return the response. Supported features: All HTTP methods: GET, POST, PUT, PATCH, DELETE, HEAD, OPTIONS Custom headers (including Authorization / Bearer tokens) JSON and form-urlencoded request bodies URL query parameters (via url or params) Configurable timeout (default 15 seconds) Response includes status code, headers, and body
Use cases: Fetching data from REST APIs Sending webhooks Querying third-party services (weather, maps, etc.) Testing and debugging API endpoints
|
| file_readA | Read the contents of a file from the local filesystem. Features: Read entire file or a specific byte range Automatic encoding detection (UTF-8 default) Returns file metadata (size, last modified) Supports any text file type
Security: |
| file_writeA | Write content to a file on the local filesystem. Features: Creates parent directories automatically if they don't exist Overwrites existing files or creates new ones Supports any text encoding (default: UTF-8)
Use cases: Saving generated code, configs, or data Creating log files Writing reports or exports
|
| file_listA | List files and directories at a given path. Features: List contents of any directory Recursive listing with configurable depth Filter results by file extension Returns file sizes and types
Use cases: Exploring project structures Finding specific file types Auditing directory contents
|
| calculatorA | Evaluate a mathematical expression and return the result. Supported operations: Arithmetic: +, -, *, /, %, ** Parentheses for grouping: (2 + 3) * 4 Common functions: abs, ceil, floor, round, sqrt, min, max Constants: PI, E
Safety: Examples: |
| get_datetimeA | Get the current date and time in various formats. Returns: ISO 8601 string Unix timestamp Individual components (year, month, day, hour, minute, second) Day of week and week number Timezone information
This tool does not require any parameters. |
| json_parserA | Parse, validate, and query JSON data. Modes: "parse": Parse a JSON string and return it formatted. "query": Extract a specific field using dot-notation (e.g., "data.users[0].name"). "validate": Check if a string is valid JSON and describe its structure. "summarize": Return a schema-like summary of a JSON object's structure.
Examples: Parse: '{"a":1,"b":2}' → pretty-printed object Query: '{"users":[{"name":"Alice"}]}' with path "users[0].name" → "Alice" Validate: '{"a":1}' → {"valid": true, "type": "object", "keys": ["a"]}
|
| text_transformA | Transform text using various operations. Supported operations: "uppercase": Convert to UPPERCASE "lowercase": Convert to lowercase "titlecase": Convert to Title Case "camelcase": Convert to camelCase "snakecase": Convert to snake_case "kebabcase": Convert to kebab-case "reverse": Reverse the text "trim": Remove leading/trailing whitespace "slug": URL-safe slug (lowercase, hyphens, no special chars) "base64_encode": Encode to Base64 "base64_decode": Decode from Base64 "word_count": Count words, characters, sentences, and paragraphs "remove_duplicates": Remove duplicate lines "sort_lines": Sort lines alphabetically "extract_emails": Extract all email addresses from text "extract_urls": Extract all URLs from text "hash": Simple hash summary (character frequency)
|
| get_environmentA | Get information about the current server environment. Returns: Operating system details (platform, arch, release) Node.js version Server process info (PID, uptime, memory usage) CPU information Memory (total, free, used) Network hostname
This tool does not require any parameters. No sensitive environment
variables or secrets are exposed. |