Skip to main content
Glama
127,309 tools. Last updated 2026-05-05 14:21

"Secret scanning and credential detection tools" matching MCP tools:

Matching MCP Servers

  • A
    license
    -
    quality
    C
    maintenance
    Scans code for exposed secrets, API keys, tokens, and credentials across 69 patterns covering cloud services, AI platforms, payment providers, authentication services, and databases.
    Last updated
    MIT
  • F
    license
    -
    quality
    B
    maintenance
    Enables AI assistants to write .env files with secrets stored locally, allowing search by name/description while keeping actual secret values private and never exposed to the AI.
    Last updated
    5

Matching MCP Connectors

  • Query the tamper-evident audit log to investigate secret access events. Filter by key, action, or limit to trace reads/writes/deletes for specific credentials.
  • Permanently remove a secret and all its environment states from the keyring for a given scope. Use this destructive action when a credential is retired or created in error. Cannot be undone.
  • Retrieve the plaintext value of a secret from the q-ring keyring. Use when an agent needs the actual credential to call an external API or inject into a runtime. Returns JSON with key and value.
  • Ask upstream provider to issue a fresh credential for an existing secret and store the new value into the keyring. Use when a secret is expiring, leaked, or part of a scheduled rotation.
  • Extract malware detection signatures from Joe Sandbox analysis reports to identify malicious behaviors like code injection or credential theft, with optional filtering for high-impact indicators.
  • Validate JWT credential authenticity by checking signatures against issuer keys, returning decoded claims and verification status for debugging or pre-action inspection.
  • Create a narrower child credential from an existing parent credential to delegate limited authority to sub-agents or isolated steps while maintaining scope restrictions.
  • Link two secret keys across scopes so updates to either propagate the same value to both. Prevents credential drift when the same logical secret, like an API key, exists under multiple names or scopes.
  • Enforce zero-tolerance security policy by evaluating SAST, secret detection, injection surfaces, auth boundaries, and TLS config. Any CRITICAL finding or exposed secret results in a VIOLATION verdict.
    MIT
  • List Harden-Runner security detections for a GitHub organization, filtered by detection type (e.g., 'Action-Uses-Imposter-Commit') and status (new, suppressed, resolved).
  • Retrieve detailed information about security detections in Panther, including detection bodies and test cases, to analyze and understand threat monitoring rules.
    Python
    Apache 2.0