Skip to main content
Glama
136,142 tools. Last updated 2026-05-22 11:09

"Known" matching MCP tools:

  • Load a specified URL in the current browser tab, resetting page state, and wait for the page to fully load. Use to navigate directly to known URLs instead of clicking interactive elements.
    MIT
  • Retrieve the CISA Known Exploited Vulnerabilities catalog to identify actively exploited security flaws. Returns daily-updated data with quality scoring and source verification for security auditing.
  • Load known pattern-to-component mappings from the knowledge file at the start of each HTML-to-Figma run. Use verified entries directly; candidate entries require a confirming design system check. Retrieve all entries or a single pattern.
    MIT
  • Retrieve metadata for a specific Code Ocean capsule using its unique ID. Use this tool to fetch detailed information about known computational workflows and data assets.
    MIT
  • Retrieve entities currently known in memory, sorted by recent activity, to get an overview at the start of a session before specific recall queries.
    MIT

Matching MCP Servers

  • A
    license
    A
    quality
    C
    maintenance
    Safe-upgrade advisor for OpenClaw. Detects current version, checks the deployment against a hand-curated catalog of version-specific known regressions, captures pre-upgrade snapshots, diffs them against post-upgrade state, and emits step-by-step upgrade + rollback guides.
    Last updated
    8
    MIT
  • A
    license
    A
    quality
    B
    maintenance
    A security filter that blocks dangerous code patterns by comparing normalized structural syntax trees against a blacklist of known threats using vector embeddings. It acts as a gatekeeper to prevent malicious code execution by identifying dangerous structures regardless of specific identifiers or literals.
    Last updated
    11
    MIT

Matching MCP Connectors

  • Provide an entity ID to retrieve its known facts, including revenue, employee count, and more.
    MIT
  • Evaluate wallet or contract addresses for AML risk, known exploits, phishing, and OFAC sanctions to ensure compliance and security.
    MIT
  • Scan popular packages for known vulnerabilities to identify security issues in widely-used dependencies across multiple ecosystems.
    MIT
  • Find the minimum safe version upgrade for packages to resolve known vulnerabilities by checking every published version and returning the nearest secure option.
    MIT
  • Fetch and scan an MCP server's .well-known/mcp.json for injection vulnerabilities to secure connections.
    Apache 2.0
  • Analyze EVM smart contract security by checking verification status, vulnerability patterns, token safety, and cross-referencing with ODEI's knowledge graph to identify risks and provide actionable findings for Base and Ethereum contracts.
  • Scan package versions for security vulnerabilities, displaying severity levels, fix versions, and advisory links to identify and address risks.
    MIT
  • Retrieve a list of exchanges supported by Polygon.io. Filter results by asset class or locale to access specific market data efficiently.
    MIT
  • Check email addresses against known disposable and temporary providers to validate user input and prevent throwaway signups.
    MIT
  • Check email or phone numbers against known scam patterns to identify suspicious senders. Provides structured analysis output without modifying any data.
    MIT
  • Browse cause-and-effect patterns ranked by observation frequency to review known issues, identify recurring problems, and build a knowledge base for debugging.
    MIT