Skip to main content
Glama
131,529 tools. Last updated 2026-05-11 13:05

"namespace:com.task-bounty" matching MCP tools:

  • Assess DeFi protocol safety with a 0-100 risk score based on TVL size, trend, contract age, audits, and bug-bounty status. Higher scores indicate lower rug-pull and hack risk.
    Business Source 1.1
  • Evaluate DeFi protocol risk with a 0-100 score using TVL, contract age, audit count, and Immunefi status to assess contract and governance safety.
    Business Source 1.1
  • Close an active bounty to prevent further claims when an issue is resolved without payout. Requires bounty ID and creator authorization.
    MIT
  • Discover available bounties for contribution or review their status. Returns a JSON array of bounty objects with details such as id, amount, state, and creator. Optionally limit the results.
    MIT
  • Permanently remove an active bounty from Gitopia. Only the bounty creator can delete it using its bounty ID. Use close_bounty if you only need to deactivate.
    MIT
  • Attach a token reward to an issue to incentivize work. Broadcasts an on-chain transaction and returns the bounty ID. Requires owner, repo name, issue ID, and amount.
    MIT

Matching MCP Servers

  • A
    license
    C
    quality
    C
    maintenance
    Enables AI agents to generate and manage specialized bug bounty hunting workflows including reconnaissance, vulnerability testing, OSINT gathering, and file upload testing. Provides REST API endpoints for comprehensive security assessments with intelligence-driven vulnerability prioritization.
    Last updated
    40
    2
    MIT
  • A
    license
    -
    quality
    C
    maintenance
    Professional security testing server with 50+ integrated tools for web application vulnerability scanning, reconnaissance, fuzzing, and API testing. Enables comprehensive bug bounty hunting workflows including subdomain enumeration, XSS/SQLi detection, and automated security assessments.
    Last updated
    MIT

Matching MCP Connectors

  • Marketplace where AI coding agents fix GitHub bugs for cash bounties. Posters draft and fund bounties from chat (Stripe Checkout); solvers browse open work, request repo access, submit PRs, and get paid in USDC, ETH, or BTC. 11 tools.

  • An MCP server for deep research or task groups

  • Get full bounty details including amount, state, expiry, and creator to decide if it's worth working on. Requires bounty ID.
    MIT
  • Scan any public URL for performance, accessibility, SEO, and best practices issues. Get scores and a list of problems with one-click bounty pre-fill to post fix requests.
    MIT
  • Accept the winning submission for your bounty. Completes the job, awards XP and payout to the developer, and rejects all other pending submissions.
    MIT
  • Retrieve complete details of a specific bug bounty by ID, including description, expected vs actual behavior, reproduction steps, and tech stack to understand and address the issue.
    MIT
  • Rank upstream GitHub repositories from project dependencies to discover proof-backed issue, bounty, and PR opportunities while filtering out spammy contributions.
    MIT
  • Apply to a private VibeFix bounty by submitting your bounty ID and a brief introduction. The owner reviews your application and grants access if approved. For private bounties only.
    MIT
  • List all submissions for a bounty, showing developer information and fix descriptions. Provide a bounty ID to view submissions for that bounty.
    MIT
  • Post a bug bounty for issues in AI-generated code. Free bounties go live immediately; paid bounties return a checkout URL to complete payment.
    MIT
  • Submit a solution to a VibeFix bounty by providing the bounty ID, a detailed description of your fix, and an optional link to your branch or pull request.
    MIT
  • Initialize database tables for the VulneraMCP bug bounty platform to store vulnerability findings and security tool data during first-time setup.
    MIT
  • Retrieve discovered websites from OWASP ZAP for security testing and vulnerability assessment in bug bounty hunting workflows.
    MIT
  • Resolve DNS records for domains to identify potential security vulnerabilities during reconnaissance phases of bug bounty hunting.
    MIT
  • Extract all forms from webpages to identify potential security vulnerabilities during bug bounty hunting and automated reconnaissance.
    MIT