Skip to content

Commit 40e4071

Browse files
ajitpratap0Ajit Pratap Singhclaude
authored
chore: add glama.json + Glama badge for MCP registry AAA score (#408)
- Add glama.json with full metadata: 7 tool definitions, categories, keywords, features, transport, license, related_servers - Add Glama score badge to README.md badge row Co-authored-by: Ajit Pratap Singh <ajitpratapsingh@Ajits-Mac-mini-2655.local> Co-authored-by: Claude Sonnet 4.6 <noreply@anthropic.com>
1 parent b6f75ee commit 40e4071

2 files changed

Lines changed: 109 additions & 0 deletions

File tree

README.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -14,6 +14,7 @@
1414
[![Website](https://img.shields.io/badge/gosqlx.dev-Website-blue?style=for-the-badge&logo=google-chrome)](https://gosqlx.dev)
1515
[![VS Code](https://img.shields.io/visual-studio-marketplace/v/ajitpratap0.gosqlx?style=for-the-badge&logo=visual-studio-code&label=VS%20Code)](https://marketplace.visualstudio.com/items?itemName=ajitpratap0.gosqlx)
1616
[![MCP](https://img.shields.io/badge/MCP-Remote%20Server-blue?style=for-the-badge&logo=cloud)](https://mcp.gosqlx.dev/health)
17+
[![Glama MCP Server](https://glama.ai/mcp/servers/ajitpratap0/GoSQLX/badges/score.svg)](https://glama.ai/mcp/servers/ajitpratap0/GoSQLX)
1718
[![Lint Action](https://img.shields.io/badge/Lint%20Action-GitHub-blue?style=for-the-badge&logo=github)](https://github.com/marketplace/actions/gosqlx-lint-action)
1819

1920
[![Tests](https://img.shields.io/github/actions/workflow/status/ajitpratap0/GoSQLX/test.yml?branch=main&label=Tests&style=flat-square)](https://github.com/ajitpratap0/GoSQLX/actions)

glama.json

Lines changed: 108 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,108 @@
1+
{
2+
"$schema": "https://glama.ai/mcp/schemas/server.json",
3+
"maintainers": ["ajitpratap0"],
4+
"name": "gosqlx-mcp",
5+
"display_name": "GoSQLX — SQL Intelligence MCP Server",
6+
"description": "Production-ready SQL parsing, formatting, linting, security scanning, and metadata extraction for Go. 7 MCP tools covering the full SQL analysis pipeline: validate_sql, format_sql, parse_sql, extract_metadata, security_scan, lint_sql, and analyze_sql. Supports PostgreSQL, MySQL, SQL Server, Oracle, SQLite, and Snowflake dialects. 1.38M+ ops/sec, zero-copy, race-free.",
7+
"repository": "https://github.com/ajitpratap0/GoSQLX",
8+
"homepage": "https://gosqlx.dev",
9+
"version": "1.12.1",
10+
"license": "Apache-2.0",
11+
"author": {
12+
"name": "Ajit Pratap Singh",
13+
"url": "https://github.com/ajitpratap0"
14+
},
15+
"url": "https://mcp.gosqlx.dev/mcp",
16+
"transport": "streamable-http",
17+
"runtime": "go",
18+
"categories": [
19+
"developer-tools",
20+
"databases",
21+
"security",
22+
"code-quality"
23+
],
24+
"keywords": [
25+
"sql",
26+
"sql-parser",
27+
"sql-formatter",
28+
"sql-linter",
29+
"sql-security",
30+
"sql-injection",
31+
"ast",
32+
"go",
33+
"golang",
34+
"postgresql",
35+
"mysql",
36+
"sqlite",
37+
"sql-server",
38+
"oracle",
39+
"snowflake",
40+
"mcp",
41+
"code-analysis"
42+
],
43+
"tools": [
44+
{
45+
"name": "validate_sql",
46+
"description": "Validate SQL syntax against generic or dialect-specific rules. Accepts optional dialect parameter (generic, mysql, postgresql, sqlite, sqlserver, oracle, snowflake). Returns {valid: bool, error?: string, dialect?: string}."
47+
},
48+
{
49+
"name": "format_sql",
50+
"description": "Format SQL with configurable indentation size, keyword casing (uppercase/lowercase), and optional trailing semicolon. Returns the formatted SQL string and the options applied."
51+
},
52+
{
53+
"name": "parse_sql",
54+
"description": "Parse SQL into an AST and return a summary: total statement count and fully-qualified AST node types for each statement."
55+
},
56+
{
57+
"name": "extract_metadata",
58+
"description": "Extract all tables, columns, and functions referenced in a SQL query. Useful for schema dependency analysis, query auditing, and impact analysis."
59+
},
60+
{
61+
"name": "security_scan",
62+
"description": "Scan SQL for injection attack patterns: tautologies (1=1), UNION-based attacks, stacked queries, comment bypasses, blind injection probes. Returns severity-classified findings (critical/high/medium/low) with descriptions and remediation suggestions."
63+
},
64+
{
65+
"name": "lint_sql",
66+
"description": "Lint SQL against all 10 GoSQLX style rules (L001–L010): trailing whitespace, mixed indentation, consecutive blank lines, indentation depth, line length, column alignment, keyword case, comma placement, aliasing consistency, redundant whitespace. Returns violations with line/column positions and fix suggestions."
67+
},
68+
{
69+
"name": "analyze_sql",
70+
"description": "Run all 6 analysis tools concurrently (validate_sql, parse_sql, extract_metadata, security_scan, lint_sql, format_sql) and return a single composite report. The most efficient way to get full SQL intelligence in one call."
71+
}
72+
],
73+
"capabilities": {
74+
"tools": true,
75+
"prompts": false,
76+
"resources": false
77+
},
78+
"features": {
79+
"dialects": [
80+
"generic",
81+
"mysql",
82+
"postgresql",
83+
"sqlite",
84+
"sqlserver",
85+
"oracle",
86+
"snowflake"
87+
],
88+
"security": {
89+
"injection_detection": true,
90+
"severity_levels": ["critical", "high", "medium", "low"],
91+
"patterns": ["tautology", "union-attack", "stacked-queries", "comment-bypass", "blind-injection"]
92+
},
93+
"linting": {
94+
"rules": 10,
95+
"rule_ids": ["L001", "L002", "L003", "L004", "L005", "L006", "L007", "L008", "L009", "L010"]
96+
},
97+
"performance": {
98+
"ops_per_sec": "1380000+",
99+
"concurrency": "race-free",
100+
"memory": "zero-copy object pooling"
101+
}
102+
},
103+
"related_servers": [
104+
"designcomputer/mysql_mcp_server",
105+
"ktanaka101/mcp-server-duckdb",
106+
"ClickHouse/mcp-clickhouse"
107+
]
108+
}

0 commit comments

Comments
 (0)