Skip to main content
Glama
132,898 tools. Last updated 2026-05-10 09:54

"Counter-Strike" matching MCP tools:

  • Summarize your current work session: returns aggregate counts of screenshots taken, voice segments transcribed, clipboard events, and keystrokes, plus session start timestamp. Use at end of session for a complete rollup.
  • Burn one of your keys on a Solana round to increase the per-key dividend rate for your remaining keys and reduce competitors' share. Use when you hold many keys and the pot is still growing.
    MIT
  • Create buyer personas via a structured 7-question interview covering role, tensions, objections, and channels. Switch between interview, record, and list modes to define audience profiles.
    MIT
  • Calculate predicted fair-value prices for specific option contracts using Helium's proprietary machine learning models trained on historical options data.
    MIT
  • Retrieve a stashed value by tunnel ID. This read-once operation increments the counter and may auto-destroy the tunnel if maxReads was set. Returns the value or an error if the tunnel is expired or not found.
  • Retrieve option chain data for financial instruments to analyze contracts, including trade details, quotes, implied volatility, and Greeks. Filter results by contract type, strike price, expiration date, and other parameters for focused analysis.
    MIT

Matching MCP Servers

  • Analyze League of Legends champions for win rates, pick rates, builds, and skill orders. Optimize gameplay with counter picks, item recommendations, and tailored strategies for specific positions and game modes.
    MIT
  • Replace scene content, auto-snapshotting the previous version to a revision log for diffing between revisions and incrementing the version counter.
  • Retrieve option contracts for specified underlying symbols with filtering by expiration date, strike price, type, and status to analyze trading opportunities.
    MIT
  • Scan file content and path before writing to detect path traversal, secrets, PII, and sensitive file paths. Blocks unsafe writes to prevent credential leaks and accidental overwrites.
    Apache 2.0
  • Scans LLM-generated responses before delivery to block system prompt leaks, unexpected PII, toxic content, or topic drift. Provide original prompt for best results.
    Apache 2.0
  • Scan SQL queries for injection, destructive operations, and PII extraction before execution. Blocks unsafe queries; allows safe ones. Use for LLM-generated or user-input SQL.
    Apache 2.0
  • Attack an enemy unit to resolve combat and counter-attack. Both units may take damage or die. Requires attacker in READY or MOVED status and target in range. Use simulate_attack to preview before committing.
  • Break down complex coding problems into structured, self-auditing thought steps. Enables branching, revising, and backtracking to explore solutions systematically before finalizing a response.
    MIT
  • Facilitate structured three-stage deliberation among agents: independent voting, anonymized cross-ranking, and final synthesis to achieve balanced consensus with cancellation support.
    MIT
  • Manage retry tracking for individual modules in forge runs. Track attempt counts, scores, and stagnation flags to decide between retrying or escalating failed modules.
    MIT