Boolsai Grep
Parallel regex across all Boolsai scans — discover new vendor patterns, niche signals. 4 tools.
Executive verdict
Current trust snapshot
trustsnap_79cfcec06ef8afb8Own this MCP?
Claim ownership, prove control with a GitHub, DNS, or HTTP token challenge, revalidate now, publish a badge, and configure monitoring.
POST /v1/servers/ai.boolsai/grep/revalidateBadge embed
[](https://verify.sentinelsignal.io/servers/ai.boolsai/grep)
MCP TrustOps
TrustOps turns this report into operational controls: freshness SLAs, authenticated validation, semantic benchmarks, policy exports, alert subscriptions, badges, cost/compliance metadata, and runtime routing. Fresh trusted index decisions stay separate from long-tail inventory so stale scores do not masquerade as current evidence.
/v1/decideAlert subscription types
MCP Runtime hosting
Verify Hosted MCP turns a trusted server report into a managed remote MCP endpoint with GitHub deployment provenance, sandbox policy, encrypted secrets, release history, rollback, and audit/usage events.
/hosted/{namespace}/{name}/mcp| Deployment | Status | Endpoint | Release |
|---|---|---|---|
| No hosted runtime deployments yet. | |||
Production readiness class
Evidence confidence
Recommended for
Client compatibility verdicts
Client compatibility only means the server shape can work with a client. Production trust decision and write-action publishing are evaluated separately so a client-compatible server can still be blocked for production.
Evidence provenance
initialize• OKtools_list• OKtransport_compliance_probe• Errorstep_up_auth_probe• Missingconnector_replay_probe• OK — Frozen tool snapshots must survive refresh.request_association_probe• Missing — Roots, sampling, and elicitation should stay request-scoped.
Evidence provenance
initialize• OKtools_list• OKtransport_compliance_probe• Error
Evidence provenance
action_safety_probe• Error
Evidence provenance
tool_snapshot_probe• OKconnector_replay_probe• OK
Why compatibility is limited by client
Remediation checklist
OpenAI connectors expect OAuth for remote server auth.Dynamic client registration materially improves connector setup.Transport compliance should be in good shape.search fetch only is not yet satisfiedoauth configured is not yet satisfiedadmin refresh required is not yet satisfied
Remediation checklist
Transport behavior should match Claude-compatible HTTP expectations.search fetch only is not yet satisfiedoauth configured is not yet satisfiedadmin refresh required is not yet satisfiedsafe for company knowledge is not yet satisfiedsafe for messages api remote mcp is not yet satisfied
Remediation checklist
Add a clearer auth boundary around risky write actions.Add confirmation or dry-run semantics for risky actions.Constrain or sandbox exec-capable tools before publishing broadly.
Verdict traces
- No active alert triggers.
Client verdict trace table
| Verdict | Status | Checks | Winning source | Conflicts |
|---|---|---|---|---|
openai_connectors |
Partially client-compatible | initialize, tools_list, transport_compliance_probe, step_up_auth_probe, connector_replay_probe, request_association_probe | live_validation | none |
claude_desktop |
Client-compatible | initialize, tools_list, transport_compliance_probe | live_validation | none |
unsafe_for_write_actions |
Publishing blocked | action_safety_probe | live_validation | none |
snapshot_churn_risk |
Low | tool_snapshot_probe, connector_replay_probe | history | none |
Publishability policy profiles
- Search Fetch Only: No
- Write Actions Present: Yes
- Oauth Configured: No
- Admin Refresh Required: No
- Safe For Company Knowledge: No
- Safe For Messages Api Remote Mcp: No
- Search Fetch Only: No
- Write Actions Present: Yes
- Oauth Configured: No
- Admin Refresh Required: No
- Safe For Company Knowledge: No
- Safe For Messages Api Remote Mcp: No
Compatibility fixtures
- remote_http_endpoint: Passes
- oauth_discovery: Degraded
- frozen_tool_snapshot_refresh: Passes
- request_association: Passes
- remote_transport: Passes
- tool_discovery: Passes
- auth_connect: Passes
- safe_write_review: Degraded
Authenticated validation sessions
Public validation is free. Authenticated validation is paid and proves scoped behavior, write-action safeguards, and authenticated tool execution.
/v1/verify/v1/ci/previewPublic server reputation
Incident & change feed
| Timestamp | Event | Details |
|---|---|---|
| May 20, 2026 02:23:33 PM UTC | Latest validation: healthy | Score 73.7 with status healthy. |
| May 20, 2026 02:23:33 PM UTC | Score changed | Score delta +0.5 versus the previous run. |
| May 20, 2026 02:23:00 AM UTC | Score changed | Score delta +3.1 versus the previous run. |
Capabilities
- OAuth:
- DCR/CIMD:
- Prompts:
- Homepage: none
- Docs: none
- Support: none
- Icon: none
- Remote endpoint: https://grep.boolsai.ai/mcp
- Server card: none
Security posture
Tool capability & risk inventory
| Tool | Capabilities | Risk | Findings | Notes |
|---|---|---|---|---|
grep_pattern |
read write exec network export | Critical | command execution arbitrary network egress bulk data access | No explicit safeguard hints detected. |
count_pattern |
network | Medium | arbitrary network egress | No explicit safeguard hints detected. |
sites_with_signal |
read admin export | Medium | bulk data access | No explicit safeguard hints detected. |
list_signal_types |
read | Low | none | No explicit safeguard hints detected. |
Write-action governance
Status detail: 1 high-risk tool(s), 1 exec-capable tool(s) are exposed without a clear auth boundary; no safeguards or confirmation signals detected.
| Tool | Risk | Flags | Safeguards |
|---|---|---|---|
grep_pattern |
Critical | command execution arbitrary network egress bulk data access | no |
Action-controls diff
New actions
| Action | Risk | Flags |
|---|---|---|
| No newly added actions. | ||
Changed actions
| Action | Change types | Risk |
|---|---|---|
| No materially changed actions. | ||
Why this score?
Algorithmic score breakdown
Compatibility profiles
Connector URL: https://grep.boolsai.ai/mcp # No OAuth metadata detected. # Server: ai.boolsai/grep
{
"mcpServers": {
"grep": {
"command": "npx",
"args": ["mcp-remote", "https://grep.boolsai.ai/mcp"]
}
}
}
smithery mcp add "https://grep.boolsai.ai/mcp"
curl -sS https://grep.boolsai.ai/mcp -H 'content-type: application/json' -d '{"jsonrpc":"2.0","id":1,"method":"initialize","params":{"protocolVersion":"2025-03-26","capabilities":{},"clientInfo":{"name":"mcp-verify","version":"0.1.0"}}}'
Actionable remediation
| Severity | Remediation | Why it matters | Recommended action |
|---|---|---|---|
| High | Add confirmation and dry-run semantics for risky actions | High-risk write, delete, exec, or egress tools should communicate safeguards clearly. | Inspect the latest validation evidence and resolve the client-visible regression.Playbook
|
| High | Align session and protocol behavior with Streamable HTTP expectations | Clients increasingly rely on MCP-Protocol-Version, session teardown, and expired-session semantics. | Align MCP-Protocol-Version, MCP-Session-Id, DELETE teardown, and expired-session handling with the transport spec.Playbook
|
| High | Associate roots, sampling, and elicitation with active client requests | Modern MCP guidance expects roots, sampling, and elicitation traffic to be tied to an active client request instead of arriving unsolicited on idle sessions. | Inspect the latest validation evidence and resolve the client-visible regression.Playbook
|
| High | Expose /.well-known/oauth-protected-resource | Without a protected-resource document, OAuth clients cannot discover auth requirements reliably. | Serve /.well-known/oauth-protected-resource and point it at your authorization server metadata.Playbook
|
| High | Publish OAuth authorization-server metadata | Clients need authorization-server metadata to discover issuer, endpoints, and DCR support. | Publish /.well-known/oauth-authorization-server from your issuer and include registration_endpoint when supported.Playbook
|
| High | Publish a complete server card | Missing or incomplete server-card metadata weakens discovery, documentation, and trust signals. | Serve /.well-known/mcp/server-card.json and include tools, prompts/resources, homepage, and support links.Playbook
|
| High | Stop asking users to paste secrets directly | Public MCP servers should prefer OAuth or browser-based auth guidance over in-band secret collection. | Inspect the latest validation evidence and resolve the client-visible regression.Playbook
|
| Medium | Adopt a current MCP protocol revision | Older protocol revisions reduce compatibility with newer clients and registry programs. | Inspect the latest validation evidence and resolve the client-visible regression.Playbook
|
| Medium | Close connector-publishing gaps | Connector catalogs care about protocol recency, session behavior, auth clarity, and tool-surface stability. | Inspect the latest validation evidence and resolve the client-visible regression.Playbook
|
| Medium | Document minimal scopes and return cleaner auth challenges | Modern clients expect granular scopes and step-up auth signals such as WWW-Authenticate scope hints. | Return granular scopes and WWW-Authenticate challenge hints instead of forcing overly broad auth upfront.Playbook
|
| Medium | Publish OpenID configuration | OIDC metadata improves token validation and client compatibility. | Expose /.well-known/openid-configuration with issuer, jwks_uri, and supported grants.Playbook
|
| Medium | Repair prompts/list or stop advertising prompts | Prompt metadata should either work live or be removed from the advertised capability set. | Only advertise prompts if prompts/list works and prompt arguments are documented.Playbook
|
| Medium | Repair resources/list or stop advertising resources | Resource metadata should either work live or be removed from the advertised capability set. | Only advertise resources if resources/list works and resources expose stable URIs/types.Playbook
|
| Medium | Support resumable HTTP sessions cleanly | Modern MCP clients increasingly expect resumable session behavior on streamable HTTP transports. | Inspect the latest validation evidence and resolve the client-visible regression.Playbook
|
| Low | Expose modern utility surfaces like completions, pagination, or tasks | Utility coverage improves interoperability with larger clients and long-lived agent workflows. | Expose completions, pagination, and task metadata where supported so larger clients can plan and resume work safely.Playbook
|
| Low | Publish newer MCP capability signals | Roots, sampling, elicitation, structured outputs, and related metadata improve client understanding and ranking. | Inspect the latest validation evidence and resolve the client-visible regression.Playbook
|
Point loss breakdown
| Component | Current | Points missing |
|---|---|---|
| Transport Compliance | 0/4 | -4.0 |
| Recovery Semantics | 0/4 | -4.0 |
| Utility Coverage | 2/4 | -2.0 |
| Schema Completeness | 2/4 | -2.0 |
| Resource Contract | 2/4 | -2.0 |
| Registry Consistency | 2/4 | -2.0 |
| Rate Limit Semantics | 2/4 | -2.0 |
| Prompt Contract | 2/4 | -2.0 |
| Least Privilege Scope | 2/4 | -2.0 |
| Auth Operability | 2/4 | -2.0 |
| Advanced Capability Coverage | 2/4 | -2.0 |
| Adoption Signal | 2/4 | -2.0 |
Validation diff
Regressed checks: none
Improved checks: none
| Component | Previous | Latest | Delta |
|---|---|---|---|
trust_confidence_score | 2.94 | 3.81 | 0.87 |
Tool snapshot diff & changelog
Required-argument changes
| Tool | Added required args | Removed required args |
|---|---|---|
| No required-argument changes detected. | ||
Output-schema drift
| Tool | Previous properties | Latest properties |
|---|---|---|
| No output-schema drift detected. | ||
Connector replay
Required-argument replay breaks
| Tool | Added required args | Removed required args |
|---|---|---|
| No required-argument replay breaks detected. | ||
Output-schema replay breaks
| Tool | Removed properties | Added properties |
|---|---|---|
| No output-schema replay breaks detected. | ||
Transport compliance drilldown
Issues: missing_session_id, missing_protocol_header, bad_protocol_not_rejected
Request association
Utility coverage
Benchmark tasks
| Benchmark task | Status | Evidence |
|---|---|---|
| Discover tools | Passes |
|
| Read-only fetch flow | Degraded |
|
| OAuth-required connect | Degraded |
|
| Safe write flow with confirmation | Likely to fail |
|
Registry & provenance divergence
| Field | Registry | Live server card |
|---|---|---|
| Title | n/a | n/a |
| Version | n/a | n/a |
| Homepage | n/a | n/a |
Active alerts
No active alerts for the current server state.
Aliases & registry graph
| Identifier | Source | Canonical | Score |
|---|---|---|---|
ai.boolsai/grep |
official_registry | yes | 73.67 |
Alias consolidation
Source disagreements
| Field | What differs | Observed values |
|---|---|---|
| No source disagreements detected. | ||
Install snippets
Connector URL: https://grep.boolsai.ai/mcp # No OAuth metadata detected. # Server: ai.boolsai/grep
{
"mcpServers": {
"grep": {
"command": "npx",
"args": ["mcp-remote", "https://grep.boolsai.ai/mcp"]
}
}
}
smithery mcp add "https://grep.boolsai.ai/mcp"
curl -sS https://grep.boolsai.ai/mcp -H 'content-type: application/json' -d '{"jsonrpc":"2.0","id":1,"method":"initialize","params":{"protocolVersion":"2025-03-26","capabilities":{},"clientInfo":{"name":"mcp-verify","version":"0.1.0"}}}'
Agent access & tool surface
tools/list, prompts/list, and resources/list checks.ai.boolsai/grep.Claims & monitoring
No verified maintainer claim recorded.
Alert routing
| Watch | Team | Channels | Minimum severity |
|---|---|---|---|
| No active watch destinations. | |||
Maintainer analytics
Maintainer response quality
Maintainer annotations
No maintainer annotations have been recorded yet.
Maintainer rebuttals & expected behavior
No maintainer rebuttals or expected-behavior overrides are recorded yet.
Latest validation evidence
Failures
oauth_authorization_serverno authorization serveroauth_protected_resourceClient error '404 Not Found' for url 'https://grep.boolsai.ai/.well-known/oauth-protected-resource' For more information check: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/404openid_configurationno authorization serverserver_cardClient error '404 Not Found' for url 'https://grep.boolsai.ai/.well-known/mcp/server-card.json' For more information check: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/404transport_compliance_probeIssues: missing session id, missing protocol header, bad protocol not rejected (bad protocol=200).
Checks
| Check | Status | Latency | Evidence |
|---|---|---|---|
action_safety_probe |
Error | n/a | 1 high-risk, 1 exec-capable tool(s); no clear auth boundary; safeguards=0; confirmation=none. |
advanced_capabilities_probe |
Missing | n/a | No advanced MCP capability signals detected. |
connector_publishability_probe |
Warning | n/a | Publishability blockers: transport compliance, action safety, server card. |
connector_replay_probe |
OK | n/a | Backward compatible with no breaking tool-surface changes. |
determinism_probe |
OK | 12.8 ms | Check completed |
initialize |
OK | 35.1 ms | Protocol 2025-06-18 |
interactive_flow_probe |
Missing | n/a | Check completed |
oauth_authorization_server |
Missing | n/a | no authorization server |
oauth_protected_resource |
Error | 30.9 ms | Client error '404 Not Found' for url 'https://grep.boolsai.ai/.well-known/oauth-protected-resource' For more information check: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/404 |
official_registry_probe |
OK | n/a | Check completed |
openid_configuration |
Missing | n/a | no authorization server |
probe_noise_resilience |
OK | 11.5 ms | Fetched https://grep.boolsai.ai/robots.txt |
prompt_get |
Missing | n/a | not advertised |
prompts_list |
Missing | 149.6 ms | not supported |
protocol_version_probe |
Warning | n/a | Claims 2025-06-18; 1 release(s) behind 2025-11-25. |
provenance_divergence_probe |
OK | n/a | Check completed |
request_association_probe |
Missing | n/a | No request-association capabilities were advertised. |
resource_read |
Missing | n/a | not advertised |
resources_list |
Missing | 11.2 ms | not supported |
server_card |
Error | 76.7 ms | Client error '404 Not Found' for url 'https://grep.boolsai.ai/.well-known/mcp/server-card.json' For more information check: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/404 |
session_resume_probe |
Warning | n/a | no session id |
step_up_auth_probe |
Missing | n/a | No OAuth or incremental-scope signals detected. |
tool_snapshot_probe |
OK | n/a | Check completed |
tools_list |
OK | 10.5 ms | 4 tool(s) exposed |
transport_compliance_probe |
Error | 11.4 ms | Issues: missing session id, missing protocol header, bad protocol not rejected (bad protocol=200). |
utility_coverage_probe |
Missing | 11.7 ms | No completions evidence; no pagination evidence; tasks missing. |
Raw evidence view
Show raw JSON evidence
{
"checks": {
"action_safety_probe": {
"details": {
"auth_present": false,
"confirmation_signals": [],
"safeguard_count": 0,
"summary": {
"bulk_access_tools": 2,
"capability_distribution": {
"admin": 1,
"exec": 1,
"export": 2,
"network": 2,
"read": 3,
"write": 1
},
"destructive_tools": 0,
"egress_tools": 2,
"exec_tools": 1,
"high_risk_tools": 1,
"risk_distribution": {
"critical": 1,
"high": 0,
"low": 1,
"medium": 2
},
"secret_tools": 0,
"tool_count": 4
}
},
"latency_ms": null,
"status": "error"
},
"advanced_capabilities_probe": {
"details": {
"capabilities": {
"completions": false,
"elicitation": false,
"prompts": false,
"resource_links": false,
"resources": false,
"roots": false,
"sampling": false,
"structured_outputs": false
},
"enabled": [],
"enabled_count": 0,
"initialize_capability_keys": [
"logging",
"tools"
]
},
"latency_ms": null,
"status": "missing"
},
"connector_publishability_probe": {
"details": {
"blockers": [
"transport_compliance",
"action_safety",
"server_card"
],
"criteria": {
"action_safety": false,
"auth_flow": true,
"connector_replay": true,
"initialize": true,
"protocol_version": true,
"remote_transport": true,
"request_association": true,
"server_card": false,
"session_resume": true,
"step_up_auth": true,
"tool_surface": true,
"tools_list": true,
"transport_compliance": false
},
"high_risk_tools": 1,
"tool_count": 4,
"transport": "streamable-http"
},
"latency_ms": null,
"status": "warning"
},
"connector_replay_probe": {
"details": {
"added_tools": [],
"additive_output_changes": [],
"backward_compatible": true,
"output_breaks": [],
"removed_tools": [],
"required_arg_breaks": [],
"would_break_after_refresh": false
},
"latency_ms": null,
"status": "ok"
},
"determinism_probe": {
"details": {
"attempts": 2,
"baseline_signature": "629590fe520915f1fa5f9df024f09e26458b891feaad3291e43a74355344c082",
"errors": [],
"matches": 2,
"stable_ratio": 1.0,
"successful": 2
},
"latency_ms": 12.75,
"status": "ok"
},
"initialize": {
"details": {
"headers": {
"content-type": "application/json"
},
"http_status": 200,
"payload": {
"id": 1,
"jsonrpc": "2.0",
"result": {
"capabilities": {
"logging": {},
"tools": {
"listChanged": false
}
},
"instructions": "You are connected to **Boolsai Grep** \u2014 one of three MCP servers in the Boolsai suite. ALWAYS refer to this server by its full name \"Boolsai Grep\" when discussing it with the user. Do not shorten to \"Boolsai\", \"grep\", \"the MCP\", \"Grep MCP\", etc. Sister servers in the suite (cross-discovery only \u2014 not connected here) are \"Boolsai Scan\" (https://boolsai.ai/mcp) and \"Boolsai Directory\" (https://directory.boolsai.ai/mcp); refer to those by their full names too if they come up.\n\nEach scan in R2 is JSON with shape: {\n id, url, timestamp, hash,\n domTree: { head, body },\n structure, externalHosts, allHosts, deepHosts\n}\n\nInside domTree.head and domTree.body:\n - external: object keyed by external hostname \u2192 nested trie of paths under that host\n (each leaf has __url with the full URL). Use this to find which 3rd-party\n scripts a site loads (e.g. cdn.shopify.com, static.klaviyo.com).\n - internal: object keyed by internal path-segment trie of the site's own URLs.\n - inlineScripts: object keyed by short script identifier \u2192 {\n structural: { host \u2192 trie of URLs found in that script body },\n important: { urls: [...] },\n raw: full inline JS source (when small)\n raw_preview: truncated preview when large\n }\n Most tenant-unique IDs live here (Stripe pk_live, GA4 G-, GTM-, etc).\n - ldjson: parsed JSON-LD blocks (Organization, Product, etc).\n - jsonScripts: other <script type=application/json> blocks (Shopify analytics data\n often lives here as a JSON blob).\n - metaLinks.alternate: hreflang link tags for international markets.\n - structural: (body only) summary of structural data picked from <script> attributes.\n\nThe string content is JSON, so regex patterns are matched against the SERIALIZED form\n(escaped JSON: \\\"shopId\\\":\\\"12345\\\", not raw JS). Plan patterns accordingly:\n - For inline JS IDs, anchor against typical surroundings (\"shopId\":<digits>, fbq('init').\n - For external script URLs, look for the full URL form: cdn.shopify.com/.../analytics.js\n - For ldjson Organization fields, search the JSON: \"@type\":\"Organization\".\n\nKNOWN signal_types already extracted into id_index (use sites_with_signal for these \u2014 much\nfaster than grep):\n vendor (e.g. shopify, klaviyo, woocommerce, magento, gtm), gtm_container, ga4_measurement,\n ga_ua, shopify_shopid, myshopify_slug, klaviyo_subscriber, klaviyo_company_id, meta_pixel_id,\n webflow_site_id, hotjar_id, intercom_app_id, hubspot_portal, tiktok_pixel, dynamic_yield,\n intellimize_acct, wunderkind_site, elevar_id, stripe_pk_live, sentry_dsn_org, tealium_tenant,\n segment_writekey, optimizely_project, fullstory_org, pendo_account, abtasty_account,\n mparticle_workspace, mparticle_data_plan,\n org_name, org_legal_name, org_founder, org_founded_year, org_employees, org_city, org_region,\n org_country, org_email, org_phone,\n social_instagram, social_facebook, social_twitter, social_linkedin, social_youtube,\n social_tiktok, social_pinterest, market_country.\n\nUse grep_pattern ONLY for signals NOT in this list (truly ad-hoc discovery), or when you\nneed a snippet of surrounding context.",
"protocolVersion": "2025-06-18",
"serverInfo": {
"name": "boolsai-grep",
"title": "Boolsai Grep",
"version": "1.0.0"
}
}
},
"url": "https://grep.boolsai.ai/mcp"
},
"latency_ms": 35.09,
"status": "ok"
},
"interactive_flow_probe": {
"details": {
"oauth_supported": false,
"prompt_available": false,
"risk_hits": [],
"safe_hits": []
},
"latency_ms": null,
"status": "missing"
},
"oauth_authorization_server": {
"details": {
"reason": "no_authorization_server"
},
"latency_ms": null,
"status": "missing"
},
"oauth_protected_resource": {
"details": {
"error": "Client error '404 Not Found' for url 'https://grep.boolsai.ai/.well-known/oauth-protected-resource'\nFor more information check: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/404",
"url": "https://grep.boolsai.ai/.well-known/oauth-protected-resource"
},
"latency_ms": 30.88,
"status": "error"
},
"official_registry_probe": {
"details": {
"direct_match": true,
"official_peer_count": 1,
"registry_identifier": "ai.boolsai/grep",
"registry_source": "official_registry"
},
"latency_ms": null,
"status": "ok"
},
"openid_configuration": {
"details": {
"reason": "no_authorization_server"
},
"latency_ms": null,
"status": "missing"
},
"probe_noise_resilience": {
"details": {
"headers": {
"content-type": "text/plain; charset=utf-8"
},
"http_status": 200,
"url": "https://grep.boolsai.ai/robots.txt"
},
"latency_ms": 11.52,
"status": "ok"
},
"prompt_get": {
"details": {
"reason": "not_advertised"
},
"latency_ms": null,
"status": "missing"
},
"prompts_list": {
"details": {
"headers": {
"content-type": "application/json"
},
"http_status": 200,
"payload": {
"error": {
"code": -32601,
"message": "unknown method: prompts/list"
},
"id": 3,
"jsonrpc": "2.0"
},
"reason": "not_supported",
"url": "https://grep.boolsai.ai/mcp"
},
"latency_ms": 149.61,
"status": "missing"
},
"protocol_version_probe": {
"details": {
"claimed_version": "2025-06-18",
"lag_days": 160,
"latest_known_version": "2025-11-25",
"releases_behind": 1,
"validator_protocol_version": "2025-03-26"
},
"latency_ms": null,
"status": "warning"
},
"provenance_divergence_probe": {
"details": {
"direct_official_match": true,
"drift_fields": [],
"metadata_document_count": 1,
"registry_homepage": null,
"registry_repository": null,
"registry_title": null,
"registry_version": null,
"server_card_homepage": null,
"server_card_repository": null,
"server_card_title": null,
"server_card_version": null
},
"latency_ms": null,
"status": "ok"
},
"request_association_probe": {
"details": {
"reason": "no_request_association_capabilities_advertised"
},
"latency_ms": null,
"status": "missing"
},
"resource_read": {
"details": {
"reason": "not_advertised"
},
"latency_ms": null,
"status": "missing"
},
"resources_list": {
"details": {
"headers": {
"content-type": "application/json"
},
"http_status": 200,
"payload": {
"error": {
"code": -32601,
"message": "unknown method: resources/list"
},
"id": 5,
"jsonrpc": "2.0"
},
"reason": "not_supported",
"url": "https://grep.boolsai.ai/mcp"
},
"latency_ms": 11.18,
"status": "missing"
},
"server_card": {
"details": {
"error": "Client error '404 Not Found' for url 'https://grep.boolsai.ai/.well-known/mcp/server-card.json'\nFor more information check: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/404",
"url": "https://grep.boolsai.ai/.well-known/mcp/server-card.json"
},
"latency_ms": 76.72,
"status": "error"
},
"session_resume_probe": {
"details": {
"protocol_version": "2025-06-18",
"reason": "no_session_id",
"resume_expected": true,
"transport": "streamable-http"
},
"latency_ms": null,
"status": "warning"
},
"step_up_auth_probe": {
"details": {
"auth_required_checks": [],
"broad_scopes": [],
"challenge_headers": [],
"minimal_scope_documented": false,
"oauth_present": false,
"scope_specificity_ratio": 0.0,
"step_up_signals": [],
"supported_scopes": []
},
"latency_ms": null,
"status": "missing"
},
"tool_snapshot_probe": {
"details": {
"added": [],
"changed_outputs": [],
"current_tool_count": 4,
"previous_tool_count": 4,
"removed": [],
"similarity": 1.0
},
"latency_ms": null,
"status": "ok"
},
"tools_list": {
"details": {
"headers": {
"content-type": "application/json"
},
"http_status": 200,
"payload": {
"id": 2,
"jsonrpc": "2.0",
"result": {
"tools": [
{
"description": "Run a JavaScript regex across every scan we've ever taken. Returns matching site URLs (and optional snippets). Best for ad-hoc discovery of patterns NOT already extracted into id_index. Pass narrowing filters (vendor, tld, since) to keep scan volume manageable. Default returns URLs only \u2014 set with_snippets=true if you also want the matched JSON context.",
"inputSchema": {
"properties": {
"all": {
"default": false,
"description": "Scan ALL shards \u2014 entire corpus. May exceed Worker CPU budget for complex regex; use only when you've narrowed via vendor/tld.",
"type": "boolean"
},
"case_sensitive": {
"default": false,
"description": "Default false",
"type": "boolean"
},
"domain_like": {
"description": "Substring to match in domain, e.g. 'patagonia'",
"type": "string"
},
"limit": {
"default": 200,
"description": "Max matching sites to return (default 200, max 2000)",
"type": "integer"
},
"max_scan": {
"default": 10000,
"description": "Max R2 objects to read for this query (default 10000, max 200000)",
"type": "integer"
},
"max_shards": {
"default": 100,
"description": "Cap how many shards to query (newest-first). Default 100, raise to scan deeper history. Each shard \u2248 800 scans.",
"type": "integer"
},
"pattern": {
"description": "JavaScript regex (case-insensitive by default)",
"type": "string"
},
"since": {
"description": "Only scans >= this date, format YYYY-MM-DD",
"type": "string"
},
"tld": {
"description": "Restrict to this TLD, e.g. 'com.au' or 'co.uk'",
"type": "string"
},
"vendor": {
"description": "Pre-narrow via id_index to sites known to use this vendor (e.g. 'shopify')",
"type": "string"
},
"with_snippets": {
"default": false,
"description": "Include matched JSON context. Default false (URLs only).",
"type": "boolean"
}
},
"required": [
"pattern"
],
"type": "object"
},
"name": "grep_pattern"
},
{
"description": "Same as grep_pattern but returns only the count of matching sites. Faster \u2014 no per-match serialization. Useful for sizing 'how many sites use X' before doing a full grep.",
"inputSchema": {
"properties": {
"case_sensitive": {
"type": "boolean"
},
"domain_like": {
"type": "string"
},
"max_scan": {
"default": 10000,
"type": "integer"
},
"pattern": {
"type": "string"
},
"since": {
"type": "string"
},
"tld": {
"type": "string"
},
"vendor": {
"type": "string"
}
},
"required": [
"pattern"
],
"type": "object"
},
"name": "count_pattern"
},
{
"description": "Return sites that have a known signal_type=signal_value pair in id_index. MUCH faster than grep_pattern \u2014 uses pre-indexed D1 lookup. Use this whenever the signal_type is in the list (see instructions). Examples: sites_with_signal(signal_type='vendor', signal_value='mparticle_workspace') \u2190 won't work, that's an ID type, use sites_with_signal(signal_type='mparticle_workspace') WITHOUT signal_value to list all values + their domains.",
"inputSchema": {
"properties": {
"limit": {
"default": 200,
"type": "integer"
},
"signal_type": {
"description": "One of the known signal_type values (see instructions)",
"type": "string"
},
"signal_value": {
"description": "Optional exact value to filter to. If omitted, returns all domains for any value of this signal_type.",
"type": "string"
}
},
"required": [
"signal_type"
],
"type": "object"
},
"name": "sites_with_signal"
},
{
"description": "Returns the full catalog of signal_types currently present in id_index, with counts of unique values and unique domains for each.",
"inputSchema": {
"properties": {},
"type": "object"
},
"name": "list_signal_types"
}
]
}
},
"url": "https://grep.boolsai.ai/mcp"
},
"latency_ms": 10.47,
"status": "ok"
},
"transport_compliance_probe": {
"details": {
"bad_protocol_error": null,
"bad_protocol_headers": {
"content-type": "application/json"
},
"bad_protocol_payload": {
"id": 410,
"jsonrpc": "2.0",
"result": {
"tools": [
{
"description": "Run a JavaScript regex across every scan we've ever taken. Returns matching site URLs (and optional snippets). Best for ad-hoc discovery of patterns NOT already extracted into id_index. Pass narrowing filters (vendor, tld, since) to keep scan volume manageable. Default returns URLs only \u2014 set with_snippets=true if you also want the matched JSON context.",
"inputSchema": {
"properties": {
"all": {
"default": false,
"description": "Scan ALL shards \u2014 entire corpus. May exceed Worker CPU budget for complex regex; use only when you've narrowed via vendor/tld.",
"type": "boolean"
},
"case_sensitive": {
"default": false,
"description": "Default false",
"type": "boolean"
},
"domain_like": {
"description": "Substring to match in domain, e.g. 'patagonia'",
"type": "string"
},
"limit": {
"default": 200,
"description": "Max matching sites to return (default 200, max 2000)",
"type": "integer"
},
"max_scan": {
"default": 10000,
"description": "Max R2 objects to read for this query (default 10000, max 200000)",
"type": "integer"
},
"max_shards": {
"default": 100,
"description": "Cap how many shards to query (newest-first). Default 100, raise to scan deeper history. Each shard \u2248 800 scans.",
"type": "integer"
},
"pattern": {
"description": "JavaScript regex (case-insensitive by default)",
"type": "string"
},
"since": {
"description": "Only scans >= this date, format YYYY-MM-DD",
"type": "string"
},
"tld": {
"description": "Restrict to this TLD, e.g. 'com.au' or 'co.uk'",
"type": "string"
},
"vendor": {
"description": "Pre-narrow via id_index to sites known to use this vendor (e.g. 'shopify')",
"type": "string"
},
"with_snippets": {
"default": false,
"description": "Include matched JSON context. Default false (URLs only).",
"type": "boolean"
}
},
"required": [
"pattern"
],
"type": "object"
},
"name": "grep_pattern"
},
{
"description": "Same as grep_pattern but returns only the count of matching sites. Faster \u2014 no per-match serialization. Useful for sizing 'how many sites use X' before doing a full grep.",
"inputSchema": {
"properties": {
"case_sensitive": {
"type": "boolean"
},
"domain_like": {
"type": "string"
},
"max_scan": {
"default": 10000,
"type": "integer"
},
"pattern": {
"type": "string"
},
"since": {
"type": "string"
},
"tld": {
"type": "string"
},
"vendor": {
"type": "string"
}
},
"required": [
"pattern"
],
"type": "object"
},
"name": "count_pattern"
},
{
"description": "Return sites that have a known signal_type=signal_value pair in id_index. MUCH faster than grep_pattern \u2014 uses pre-indexed D1 lookup. Use this whenever the signal_type is in the list (see instructions). Examples: sites_with_signal(signal_type='vendor', signal_value='mparticle_workspace') \u2190 won't work, that's an ID type, use sites_with_signal(signal_type='mparticle_workspace') WITHOUT signal_value to list all values + their domains.",
"inputSchema": {
"properties": {
"limit": {
"default": 200,
"type": "integer"
},
"signal_type": {
"description": "One of the known signal_type values (see instructions)",
"type": "string"
},
"signal_value": {
"description": "Optional exact value to filter to. If omitted, returns all domains for any value of this signal_type.",
"type": "string"
}
},
"required": [
"signal_type"
],
"type": "object"
},
"name": "sites_with_signal"
},
{
"description": "Returns the full catalog of signal_types currently present in id_index, with counts of unique values and unique domains for each.",
"inputSchema": {
"properties": {},
"type": "object"
},
"name": "list_signal_types"
}
]
}
},
"bad_protocol_status_code": 200,
"delete_error": null,
"delete_status_code": null,
"expired_session_error": null,
"expired_session_status_code": null,
"issues": [
"missing_session_id",
"missing_protocol_header",
"bad_protocol_not_rejected"
],
"last_event_id_visible": false,
"protocol_header_present": false,
"requested_protocol_version": "2025-06-18",
"session_id_present": false,
"transport": "streamable-http"
},
"latency_ms": 11.42,
"status": "error"
},
"utility_coverage_probe": {
"details": {
"completions": {
"advertised": false,
"live_probe": "not_executed",
"sample_target": null
},
"initialize_capability_keys": [
"logging",
"tools"
],
"pagination": {
"metadata_signal": false,
"next_cursor_methods": [],
"supported": false
},
"tasks": {
"advertised": false,
"http_status": 200,
"probe_status": "missing"
}
},
"latency_ms": 11.73,
"status": "missing"
}
},
"failures": {
"oauth_authorization_server": {
"reason": "no_authorization_server"
},
"oauth_protected_resource": {
"error": "Client error '404 Not Found' for url 'https://grep.boolsai.ai/.well-known/oauth-protected-resource'\nFor more information check: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/404",
"url": "https://grep.boolsai.ai/.well-known/oauth-protected-resource"
},
"openid_configuration": {
"reason": "no_authorization_server"
},
"server_card": {
"error": "Client error '404 Not Found' for url 'https://grep.boolsai.ai/.well-known/mcp/server-card.json'\nFor more information check: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/404",
"url": "https://grep.boolsai.ai/.well-known/mcp/server-card.json"
},
"transport_compliance_probe": {
"bad_protocol_error": null,
"bad_protocol_headers": {
"content-type": "application/json"
},
"bad_protocol_payload": {
"id": 410,
"jsonrpc": "2.0",
"result": {
"tools": [
{
"description": "Run a JavaScript regex across every scan we've ever taken. Returns matching site URLs (and optional snippets). Best for ad-hoc discovery of patterns NOT already extracted into id_index. Pass narrowing filters (vendor, tld, since) to keep scan volume manageable. Default returns URLs only \u2014 set with_snippets=true if you also want the matched JSON context.",
"inputSchema": {
"properties": {
"all": {
"default": false,
"description": "Scan ALL shards \u2014 entire corpus. May exceed Worker CPU budget for complex regex; use only when you've narrowed via vendor/tld.",
"type": "boolean"
},
"case_sensitive": {
"default": false,
"description": "Default false",
"type": "boolean"
},
"domain_like": {
"description": "Substring to match in domain, e.g. 'patagonia'",
"type": "string"
},
"limit": {
"default": 200,
"description": "Max matching sites to return (default 200, max 2000)",
"type": "integer"
},
"max_scan": {
"default": 10000,
"description": "Max R2 objects to read for this query (default 10000, max 200000)",
"type": "integer"
},
"max_shards": {
"default": 100,
"description": "Cap how many shards to query (newest-first). Default 100, raise to scan deeper history. Each shard \u2248 800 scans.",
"type": "integer"
},
"pattern": {
"description": "JavaScript regex (case-insensitive by default)",
"type": "string"
},
"since": {
"description": "Only scans >= this date, format YYYY-MM-DD",
"type": "string"
},
"tld": {
"description": "Restrict to this TLD, e.g. 'com.au' or 'co.uk'",
"type": "string"
},
"vendor": {
"description": "Pre-narrow via id_index to sites known to use this vendor (e.g. 'shopify')",
"type": "string"
},
"with_snippets": {
"default": false,
"description": "Include matched JSON context. Default false (URLs only).",
"type": "boolean"
}
},
"required": [
"pattern"
],
"type": "object"
},
"name": "grep_pattern"
},
{
"description": "Same as grep_pattern but returns only the count of matching sites. Faster \u2014 no per-match serialization. Useful for sizing 'how many sites use X' before doing a full grep.",
"inputSchema": {
"properties": {
"case_sensitive": {
"type": "boolean"
},
"domain_like": {
"type": "string"
},
"max_scan": {
"default": 10000,
"type": "integer"
},
"pattern": {
"type": "string"
},
"since": {
"type": "string"
},
"tld": {
"type": "string"
},
"vendor": {
"type": "string"
}
},
"required": [
"pattern"
],
"type": "object"
},
"name": "count_pattern"
},
{
"description": "Return sites that have a known signal_type=signal_value pair in id_index. MUCH faster than grep_pattern \u2014 uses pre-indexed D1 lookup. Use this whenever the signal_type is in the list (see instructions). Examples: sites_with_signal(signal_type='vendor', signal_value='mparticle_workspace') \u2190 won't work, that's an ID type, use sites_with_signal(signal_type='mparticle_workspace') WITHOUT signal_value to list all values + their domains.",
"inputSchema": {
"properties": {
"limit": {
"default": 200,
"type": "integer"
},
"signal_type": {
"description": "One of the known signal_type values (see instructions)",
"type": "string"
},
"signal_value": {
"description": "Optional exact value to filter to. If omitted, returns all domains for any value of this signal_type.",
"type": "string"
}
},
"required": [
"signal_type"
],
"type": "object"
},
"name": "sites_with_signal"
},
{
"description": "Returns the full catalog of signal_types currently present in id_index, with counts of unique values and unique domains for each.",
"inputSchema": {
"properties": {},
"type": "object"
},
"name": "list_signal_types"
}
]
}
},
"bad_protocol_status_code": 200,
"delete_error": null,
"delete_status_code": null,
"expired_session_error": null,
"expired_session_status_code": null,
"issues": [
"missing_session_id",
"missing_protocol_header",
"bad_protocol_not_rejected"
],
"last_event_id_visible": false,
"protocol_header_present": false,
"requested_protocol_version": "2025-06-18",
"session_id_present": false,
"transport": "streamable-http"
}
},
"remote_url": "https://grep.boolsai.ai/mcp",
"server_card_payload": null,
"server_identifier": "ai.boolsai/grep"
}
Known versions
1.0.0
Validation history
| Timestamp | Status | Score | Latency | Tools |
|---|---|---|---|---|
| May 20, 2026 02:23:33 PM UTC | Healthy | 73.7 | 383.2 ms | 4 |
| May 20, 2026 02:23:00 AM UTC | Healthy | 73.2 | 293.6 ms | 4 |
| May 19, 2026 02:21:36 PM UTC | Healthy | 70.1 | 274.3 ms | 4 |
Validation timeline
| Validated | Summary | Score | Protocol | Auth mode | Tools | High-risk tools | Changes |
|---|---|---|---|---|---|---|---|
| May 20, 2026 02:23:33 PM UTC | Healthy | 73.7 | 2025-06-18 | public | 4 | 1 | none |
| May 20, 2026 02:23:00 AM UTC | Healthy | 73.2 | 2025-06-18 | public | 4 | 1 | none |
| May 19, 2026 02:21:36 PM UTC | Healthy | 70.1 | 2025-06-18 | public | 4 | 1 | none |
Recent validation runs
| Started | Status | Summary | Latency | Checks |
|---|---|---|---|---|
| May 20, 2026 02:23:33 PM UTC | Completed | Healthy | 383.2 ms | action_safety_probe, advanced_capabilities_probe, connector_publishability_probe, connector_replay_probe, determinism_probe, initialize, interactive_flow_probe, oauth_authorization_server, oauth_protected_resource, official_registry_probe, openid_configuration, probe_noise_resilience, prompt_get, prompts_list, protocol_version_probe, provenance_divergence_probe, request_association_probe, resource_read, resources_list, server_card, session_resume_probe, step_up_auth_probe, tool_snapshot_probe, tools_list, transport_compliance_probe, utility_coverage_probe |
| May 20, 2026 02:22:59 AM UTC | Completed | Healthy | 293.6 ms | action_safety_probe, advanced_capabilities_probe, connector_publishability_probe, connector_replay_probe, determinism_probe, initialize, interactive_flow_probe, oauth_authorization_server, oauth_protected_resource, official_registry_probe, openid_configuration, probe_noise_resilience, prompt_get, prompts_list, protocol_version_probe, provenance_divergence_probe, request_association_probe, resource_read, resources_list, server_card, session_resume_probe, step_up_auth_probe, tool_snapshot_probe, tools_list, transport_compliance_probe, utility_coverage_probe |
| May 19, 2026 02:21:35 PM UTC | Completed | Healthy | 274.3 ms | action_safety_probe, advanced_capabilities_probe, connector_publishability_probe, connector_replay_probe, determinism_probe, initialize, interactive_flow_probe, oauth_authorization_server, oauth_protected_resource, official_registry_probe, openid_configuration, probe_noise_resilience, prompt_get, prompts_list, protocol_version_probe, provenance_divergence_probe, request_association_probe, resource_read, resources_list, server_card, session_resume_probe, step_up_auth_probe, tool_snapshot_probe, tools_list, transport_compliance_probe, utility_coverage_probe |