Skip to main content
Glama
x0base

mcp-security-toolkit

agent_tool_risk_audit

Audits agent tool definitions for schema-level security risks including over-broad parameters, missing constraints, dangerous defaults, and data exfiltration patterns.

Instructions

Statically audit a single agent tool definition for schema-level risks.

Accepts OpenAI function-calling, Anthropic tool-use, MCP tool, or a bare JSON Schema. Reports:

  • over-broad params (bare-string paths/commands/URLs)

  • missing constraints (enum/pattern/min/max/maxLength/maxItems)

  • dangerous defaults (suspicious paths, disabled safeguards)

  • exfil-shape (URL-destination + data-payload in the same tool)

  • ambiguous descriptions vs risky tool names

Args: schema: A tool definition as a dict.

Returns: Structured AuditReport. Pure function, no I/O, no chaining.

Input Schema

TableJSON Schema
NameRequiredDescriptionDefault
schemaYes
Behavior4/5

Does the description disclose side effects, auth requirements, rate limits, or destructive behavior?

The description declares the tool as 'Pure function, no I/O, no chaining,' which clearly communicates its safe, side-effect-free behavior. It also lists the types of risks it reports. Without annotations, this provides adequate transparency, though it could mention error handling.

Agents need to know what a tool does to the world before calling it. Descriptions should go beyond structured annotations to explain consequences.

Conciseness5/5

Is the description appropriately sized, front-loaded, and free of redundancy?

The description is concise and well-structured: a one-line summary, bullet points for reported risks, and clear Args/Returns sections. Every sentence adds value without unnecessary repetition.

Shorter descriptions cost fewer tokens and are easier for agents to parse. Every sentence should earn its place.

Completeness5/5

Given the tool's complexity, does the description cover enough for an agent to succeed on first attempt?

Given the tool's complexity and lack of output schema, the description fully explains inputs, expected formats, analysis capabilities, return type, and behavior (pure function). No gaps are apparent.

Complex tools with many parameters or behaviors need more documentation. Simple tools need less. This dimension scales expectations accordingly.

Parameters4/5

Does the description clarify parameter syntax, constraints, interactions, or defaults beyond what the schema provides?

The schema only defines 'schema' as a generic object with no constraints. The description compensates by explaining that the parameter is 'A tool definition as a dict' and lists the acceptable formats (OpenAI function-calling, etc.), adding critical meaning beyond the schema.

Input schemas describe structure but not intent. Descriptions should explain non-obvious parameter relationships and valid value ranges.

Purpose5/5

Does the description clearly state what the tool does and how it differs from similar tools?

The description clearly states the tool's purpose: 'Statically audit a single agent tool definition for schema-level risks.' It specifies the verb (audit), resource (agent tool definition), and scope (single, static). This distinguishes it from sibling tools like 'mcp_server_audit' which likely audits an entire server.

Agents choose between tools based on descriptions. A clear purpose with a specific verb and resource helps agents select the right tool.

Usage Guidelines3/5

Does the description explain when to use this tool, when not to, or what alternatives exist?

The description lists accepted input formats (OpenAI, Anthropic, MCP, bare JSON Schema) but does not explicitly guide when to use this tool versus alternatives like 'mcp_server_audit' or 'prompt_injection_audit'. Usage context is implied but not formalized.

Agents often have multiple tools that could apply. Explicit usage guidance like "use X instead of Y when Z" prevents misuse.

Install Server

Other Tools

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/x0base/mcp-security-toolkit'

If you have feedback or need assistance with the MCP directory API, please join our Discord server