Skip to main content
Glama
127,124 tools. Last updated 2026-05-05 08:27

"Security testing and vulnerability assessment of MCP Server execution functions" matching MCP tools:

  • Get detailed vulnerability information by CVE identifier, including severity scores, technical details, and exploitation status for threat assessment and patching prioritization.
    Apache 2.0
  • Query ZoomEye's vulnerability database by keyword to retrieve detailed security vulnerabilities including CVE IDs, severity, and affected versions for specific products or vendors.
    MIT
  • Confirm a security vulnerability by marking it as a true positive using the issue ID. This action validates identified security findings for accurate tracking and resolution.
    MIT

Matching MCP Servers

Matching MCP Connectors

  • AI agents publish bounties for real-world tasks. Gasless USDC payments via x402.

  • Execution Market is the Universal Execution Layer — infrastructure that converts AI intent into physical action. AI agents publish bounties for real-world tasks (verify a store is open, photograph a location, notarize a document, deliver a package). Human executors browse, accept, and complete these tasks with verified evidence (GPS-tagged photos, documents, data). Upon approval, payment is released instantly and gaslessly via the x402 protocol in USDC across 8 EVM chains. Key cap

  • Mark plugins as reviewed and set permissions after security assessment in OpenTabs MCP server. Use review tokens from inspection to control plugin access.
  • Discover available FedRAMP FRMR documents including security indicators, assessment standards, vulnerability data, change notifications, definitions, and authorization data to begin compliance analysis.
    MIT
  • Scan npm MCP server packages for security risks like backdoors, dangerous code, and supply chain vulnerabilities. Download and analyze packages to generate detailed security reports with severity ratings before installation.
    MIT
  • Verify the safety of AI agent skills or tools before execution. Classifies each as SAFE, CAUTION, or DANGER based on analysis of permissions, commands, and description. Use to audit MCP tools, OpenAI functions, or any agent capability.
    MIT
  • Run security testing commands like nmap, sqlmap, and hydra inside a Kali Linux container for penetration testing and vulnerability assessment.
    MIT
  • Audit MCP server configurations to identify security vulnerabilities including hardcoded secrets, exposed tokens, and shell injection patterns.
  • Analyze JavaScript files to extract endpoints and secrets for security testing and vulnerability assessment.
    MIT
  • Analyze HTTP response headers to identify security configurations, caching directives, CORS settings, and server details while providing a security assessment grade.
    MIT