@kaitranntt/ccs 7.65.3-dev.10 → 7.65.3-dev.11

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (2) hide show
  1. package/README.md +88 -816
  2. package/package.json +1 -1
package/README.md CHANGED
@@ -4,875 +4,147 @@
4
4
 
5
5
  ![CCS Logo](assets/ccs-logo-medium.png)
6
6
 
7
- ### The universal AI profile manager for Claude Code.
8
- Run Claude, Gemini, GLM, and any Anthropic-compatible API - concurrently, without conflicts.
7
+ ### The multi-provider profile and runtime manager for Claude Code and compatible CLIs
8
+
9
+ Run Claude, Codex, Droid-routed profiles, GLM, local models, and
10
+ Anthropic-compatible APIs without config thrash.
9
11
 
10
12
  [![License](https://img.shields.io/badge/license-MIT-C15F3C?style=for-the-badge)](LICENSE)
11
13
  [![npm](https://img.shields.io/npm/v/@kaitranntt/ccs?style=for-the-badge&logo=npm)](https://www.npmjs.com/package/@kaitranntt/ccs)
12
14
  [![PoweredBy](https://img.shields.io/badge/PoweredBy-ClaudeKit-C15F3C?style=for-the-badge)](https://claudekit.cc?ref=HMNKXOHN)
13
15
 
14
- **[Features](https://ccs.kaitran.ca)** | **[Documentation Hub](https://docs.ccs.kaitran.ca)**
16
+ **[Website](https://ccs.kaitran.ca)** |
17
+ **[Documentation](https://docs.ccs.kaitran.ca)** |
18
+ **[Product Tour](https://docs.ccs.kaitran.ca/getting-started/product-tour)** |
19
+ **[CLI Reference](https://docs.ccs.kaitran.ca/reference/cli-commands)**
15
20
 
16
21
  </div>
17
22
 
18
- <br>
19
-
20
- ## Community Projects
21
-
22
- | Project | Author | Description |
23
- |---------|--------|-------------|
24
- | [opencode-ccs-sync](https://github.com/JasonLandbridge/opencode-ccs-sync) | [@JasonLandbridge](https://github.com/JasonLandbridge) | Auto-sync CCS providers into OpenCode |
25
-
26
- <br>
23
+ ## Why CCS
27
24
 
28
- ## The Three Pillars
25
+ CCS gives you one stable command surface while letting you switch between:
29
26
 
30
- | Capability | What It Does | Manage Via |
31
- |------------|--------------|------------|
32
- | **Multiple Claude Accounts** | Run work + personal Claude subs simultaneously | Dashboard |
33
- | **OAuth Providers** | Gemini, Codex, Antigravity - zero API keys needed | Dashboard |
34
- | **API Profiles** | GLM, Kimi, or any Anthropic-compatible API | Dashboard |
27
+ - multiple runtimes such as Claude Code, Factory Droid, and Codex CLI
28
+ - multiple Claude subscriptions and isolated account contexts
29
+ - OAuth providers like Codex, Copilot, Kiro, Claude, Qwen, Kimi, and more
30
+ - API and local-model profiles like GLM, Kimi, OpenRouter, Ollama, llama.cpp,
31
+ Novita, and Alibaba Coding Plan
35
32
 
36
- <br>
33
+ The goal is simple: stop rewriting config files, stop breaking active sessions,
34
+ and move between providers in seconds.
37
35
 
38
36
  ## Quick Start
39
37
 
40
- Looking for the full setup guide, command reference, provider guides, or troubleshooting?
41
- Start at **https://docs.ccs.kaitran.ca**.
42
-
43
- ## Contribute And Report Safely
44
-
45
- - Contributing guide: [CONTRIBUTING.md](./CONTRIBUTING.md)
46
- - Starter work: [good first issue](https://github.com/kaitranntt/ccs/labels/good%20first%20issue), [help wanted](https://github.com/kaitranntt/ccs/labels/help%20wanted)
47
- - Questions: [open a question issue](https://github.com/kaitranntt/ccs/issues/new/choose)
48
- - Security reports: [SECURITY.md](./SECURITY.md) and the [private advisory form](https://github.com/kaitranntt/ccs/security/advisories/new)
49
-
50
- ### 1. Install
51
-
52
38
  ```bash
53
39
  npm install -g @kaitranntt/ccs
54
- ```
55
-
56
- <details>
57
- <summary>Alternative package managers</summary>
58
-
59
- ```bash
60
- yarn global add @kaitranntt/ccs # yarn
61
- pnpm add -g @kaitranntt/ccs # pnpm (70% less disk space)
62
- bun add -g @kaitranntt/ccs # bun (30x faster)
63
- ```
64
-
65
- </details>
66
-
67
- ### 2. Open Dashboard
68
-
69
- ```bash
70
40
  ccs config
71
- # Opens a local browser URL
72
41
  ```
73
42
 
74
- CCS uses the runtime's system-default bind. If that bind is reachable beyond loopback,
75
- the CLI also prints bind/network details plus an auth reminder.
76
-
77
- Force all-interface binding for remote devices:
43
+ Then launch whatever runtime fits the task:
78
44
 
79
45
  ```bash
80
- ccs config --host 0.0.0.0
81
- # Terminal prints the reachable URLs to open from the other device
46
+ ccs
47
+ ccs codex
48
+ ccs --target droid glm
49
+ ccs glm
50
+ ccs ollama
82
51
  ```
83
52
 
84
- If you expose the dashboard beyond localhost, protect it first with `ccs config auth setup`.
85
-
86
- Use `ccs config --host 127.0.0.1` to force local-only binding.
53
+ Need the full setup path instead of the short version?
87
54
 
88
- Dashboard updates hub: `http://localhost:3000/updates`
55
+ | Need | Start here |
56
+ | --- | --- |
57
+ | Install and verify CCS | [`/getting-started/installation`](https://docs.ccs.kaitran.ca/getting-started/installation) |
58
+ | First successful session | [`/getting-started/first-session`](https://docs.ccs.kaitran.ca/getting-started/first-session) |
59
+ | Visual walkthrough | [`/getting-started/product-tour`](https://docs.ccs.kaitran.ca/getting-started/product-tour) |
60
+ | Provider selection | [`/providers/concepts/overview`](https://docs.ccs.kaitran.ca/providers/concepts/overview) |
61
+ | Full command reference | [`/reference/cli-commands`](https://docs.ccs.kaitran.ca/reference/cli-commands) |
62
+ | Troubleshooting | [`/reference/troubleshooting`](https://docs.ccs.kaitran.ca/reference/troubleshooting) |
89
63
 
90
- Want to run the dashboard in Docker or pull the prebuilt image? See `docker/README.md`.
64
+ ## See CCS In Action
91
65
 
92
- ### 3. Configure Your Accounts
66
+ ### Usage Analytics
93
67
 
94
- The dashboard provides visual management for all account types:
68
+ ![Analytics Dashboard](assets/screenshots/analytics.webp)
95
69
 
96
- - **Claude Accounts**: Isolation-first by default (work, personal, client), with explicit shared context opt-in
97
- - **OAuth Providers**: One-click auth for Gemini, Codex, Antigravity, Kiro, Copilot
98
- - **AI Providers**: Configure Gemini, Codex, Claude, Vertex, and OpenAI-compatible API keys under `CLIProxy -> AI Providers`
99
- - **API Profiles**: Configure GLM, Kimi, OpenRouter, and other Anthropic-compatible APIs as CCS-native profiles
100
- - **Codex CLI**: Dedicated dashboard page for native runtime diagnostics and guarded `config.toml` editing
101
- - **Factory Droid**: Track Droid install location and BYOK settings health
102
- - **Updates Center**: Track support rollouts (Droid target, CLIProxy provider changes, WebSearch integrations)
103
- - **Health Monitor**: Real-time status across all profiles
104
- - **Language Switcher**: Toggle dashboard locale between English, Simplified Chinese, and Vietnamese
70
+ Track usage, costs, and session patterns across profiles. Deep dive:
71
+ [Dashboard Analytics](https://docs.ccs.kaitran.ca/features/dashboard/analytics).
105
72
 
106
- **Analytics Dashboard**
107
-
108
- ![Analytics](assets/screenshots/analytics.webp)
109
-
110
- **Live Auth Monitor**
73
+ ### Live Auth And Health Monitoring
111
74
 
112
75
  ![Live Auth Monitor](assets/screenshots/live-auth-monitor.webp)
113
76
 
114
- **CLI Proxy API & Copilot Integration**
115
-
116
- ![CLIProxy API](assets/screenshots/cliproxyapi.webp)
117
-
118
- ![Copilot API](assets/screenshots/copilot-api.webp)
119
-
120
- **WebSearch Fallback**
121
-
122
- ![WebSearch](assets/screenshots/websearch.webp)
123
-
124
- <br>
125
-
126
- ## Built-in Providers
127
-
128
- | Provider | Auth Type | Command | Best For |
129
- |----------|-----------|---------|----------|
130
- | **Claude** | Subscription | `ccs` | Default, strategic planning |
131
- | **Gemini** | OAuth | `ccs gemini` | Zero-config, fast iteration |
132
- | **Codex** | OAuth | `ccs codex` | Code generation |
133
- | **Copilot** | OAuth | `ccs copilot` or `ccs ghcp` | GitHub Copilot models |
134
- | **Cursor IDE** | Local Token | `ccs cursor` | Run Claude through Cursor models via local daemon |
135
- | **Kiro** | OAuth (AWS default) | `ccs kiro` | AWS CodeWhisperer (Claude-powered) |
136
- | **Antigravity** | OAuth | `ccs agy` | Alternative routing |
137
- | **OpenRouter** | API Key | `ccs openrouter` | 300+ models, unified API |
138
- | **Ollama** | Local | `ccs ollama` | Local open-source models, privacy |
139
- | **llama.cpp** | Local | `ccs llamacpp` | Local GGUF inference via llama.cpp server |
140
- | **Ollama Cloud** | API Key | `ccs ollama-cloud` | Cloud-hosted open-source models |
141
- | **GLM** | API Key | `ccs glm` | Cost-optimized execution |
142
- | **KM (Kimi API)** | API Key | `ccs km` | Long-context, thinking mode |
143
- | **Kimi (OAuth)** | OAuth | `ccs kimi` | Device-code OAuth via CLIProxy |
144
- | **Azure Foundry** | API Key | `ccs foundry` | Claude via Microsoft Azure |
145
- | **Minimax** | API Key | `ccs mm` | M2 series, 1M context |
146
- | **DeepSeek** | API Key | `ccs deepseek` | V3.2 and R1 reasoning |
147
- | **Novita AI** | API Key | `ccs api create --preset novita` | Anthropic-compatible Novita endpoint for Claude Code |
148
- | **Qwen (OAuth)** | OAuth | `ccs qwen` | Qwen Code via CLIProxy |
149
- | **Qwen API** | API Key | `ccs api create --preset qwen` | DashScope Anthropic-compatible API |
150
- | **Alibaba Coding Plan** | API Key | `ccs api create --preset alibaba-coding-plan` | Model Studio Coding Plan endpoint |
151
-
152
- **OpenRouter Integration** (v7.0.0): CCS v7.0.0 adds OpenRouter with interactive model picker, dynamic discovery, and tier mapping (opus/sonnet/haiku). Create via `ccs api create --preset openrouter` or dashboard.
153
-
154
- **Alibaba Coding Plan Integration**: Configure via `ccs api create --preset alibaba-coding-plan` (or preset alias `alibaba`) with Coding Plan keys (`sk-sp-...`) and endpoint `https://coding-intl.dashscope.aliyuncs.com/apps/anthropic`.
155
-
156
- **Ollama Integration**: Run local open-source models (qwen3-coder, gpt-oss:20b) with full privacy. Use `ccs api create --preset ollama` - requires [Ollama v0.14.0+](https://ollama.com) installed. For cloud models, use `ccs api create --preset ollama-cloud`.
157
-
158
- > **Third-party WebSearch steering:** Claude-backed third-party launches keep Anthropic's native `WebSearch` disabled, provision `ccs-websearch.WebSearch` when the managed runtime is available, and append a short system hint so Claude prefers that managed tool over ad hoc Bash or `curl` lookups whenever current web information is needed.
159
- > Setting `websearch.enabled: false` disables the managed local runtime, but CCS still suppresses Anthropic's native `WebSearch` on third-party backends because those providers cannot execute it correctly.
160
-
161
- > **Image backend visibility:** `ccs config image-analysis --set-fallback <backend>` defines the backend CCS should use when a profile alias cannot be inferred directly. Use `--set-profile-backend <profile> <backend>` and `--clear-profile-backend <profile>` for explicit per-profile mappings. In the dashboard, the global `Settings -> Image` section now shows the shared backend routing state, while each profile editor keeps a compact `Image` status card that links back to those global controls.
162
- > Third-party launches now expose a first-class local `ImageAnalysis` MCP tool when the runtime is ready, route requests directly to the resolved CCS provider path, and fall back to native `Read` when the managed runtime is unavailable.
163
-
164
- > **Copilot config behavior:** Opening the dashboard or other read-only Copilot endpoints does not rewrite `~/.ccs/copilot.settings.json`. If CCS detects deprecated Copilot model IDs such as `raptor-mini`, it shows warnings immediately and only persists replacements when you explicitly save the Copilot configuration.
165
-
166
- **llama.cpp Integration**: Run a local llama.cpp OpenAI-compatible server and create a profile with `ccs api create --preset llamacpp`. CCS defaults to `http://127.0.0.1:8080`, matching the standard llama.cpp server port.
167
-
168
- **Azure Foundry**: Use `ccs api create --preset foundry` to set up Claude via Microsoft Azure AI Foundry. Requires Azure resource and API key from [ai.azure.com](https://ai.azure.com).
169
-
170
- ![OpenRouter API Profiles](assets/screenshots/api-profiles-openrouter.webp)
171
-
172
- > **OAuth providers** authenticate via browser on first run. Tokens are cached in `~/.ccs/cliproxy/auth/`.
173
-
174
- > **Kiro / Copilot account naming:** Manual nicknames are optional. If the provider does not expose an email, CCS derives a safe internal identifier automatically and you can rename it later.
175
-
176
- > **AI Providers dashboard:** Configure CLIProxy-managed API key families at `ccs config` -> `CLIProxy` -> `AI Providers`. Use `API Profiles` only for CCS-native Anthropic-compatible profiles.
177
-
178
- **Powered by:**
179
- - [CLIProxyAPIPlus](https://github.com/router-for-me/CLIProxyAPIPlus) - Extended OAuth proxy with Kiro ([@fuko2935](https://github.com/fuko2935), [@Ravens2121](https://github.com/Ravens2121)) and Copilot ([@em4go](https://github.com/em4go)) support
180
- - [CLIProxyAPI](https://github.com/router-for-me/CLIProxyAPI) - Core OAuth proxy for Gemini, Codex, Antigravity
181
- - [copilot-api](https://github.com/ericc-ch/copilot-api) - GitHub Copilot API integration
182
-
183
- > [!TIP]
184
- > **Need more?** CCS supports **any Anthropic-compatible API**. Create custom profiles for self-hosted LLMs, enterprise gateways, or alternative providers. See [API Profiles documentation](https://docs.ccs.kaitran.ca/providers/api-profiles).
185
-
186
- <br>
187
-
188
- ## Usage
189
-
190
- ### Basic Commands
191
-
192
- ```bash
193
- ccs # Default Claude session
194
- ccs gemini # Gemini (OAuth)
195
- ccs codex # OpenAI Codex (OAuth)
196
- ccs cursor # Run Claude through Cursor local proxy
197
- ccs kiro # Kiro/AWS CodeWhisperer (OAuth)
198
- ccs ghcp # GitHub Copilot (OAuth device flow)
199
- ccs agy # Antigravity (OAuth)
200
- ccs qwen # Qwen Code (OAuth via CLIProxy)
201
- ccs ollama # Local Ollama (no API key needed)
202
- ccs llamacpp # Local llama.cpp (no API key needed)
203
- ccs glm # GLM (API key)
204
- ccs km # Kimi API profile (API key)
205
- ccs api create --preset alibaba-coding-plan # Alibaba Coding Plan profile
206
- ccs api discover --register # Auto-register orphan *.settings.json
207
- ccs api copy glm glm-backup # Duplicate profile config + settings
208
- ccs api export glm --out ./glm.ccs-profile.json # Export for cross-device transfer
209
- ccs api import ./glm.ccs-profile.json # Import exported profile bundle
210
- ```
211
-
212
- ### Runtime Aliases (built-in bins / `argv[0]` pattern)
213
-
214
- Built-in Droid and native Codex runtime aliases are installed with the package:
215
-
216
- ```bash
217
- ccs-droid glm # explicit alias
218
- ccsd glm # legacy shortcut
219
- ccs-codex # explicit native Codex alias
220
- ccsx # short native Codex alias
221
- ```
222
-
223
- CCS also ships an opinionated Codex provider shortcut:
224
-
225
- ```bash
226
- ccsxp # same as: ccs codex --target codex
227
- ```
228
-
229
- Need additional alias names? First create the matching symlink or another launcher that
230
- preserves the invoked basename, then map that name with `CCS_TARGET_ALIASES` (preferred) or legacy
231
- target-specific env vars:
232
-
233
- ```bash
234
- ln -s "$(command -v ccs)" /usr/local/bin/mydroid
235
- ln -s "$(command -v ccs)" /usr/local/bin/mycodex
236
- CCS_TARGET_ALIASES='droid=mydroid;codex=mycodex'
237
- # Legacy fallback still supported:
238
- CCS_DROID_ALIASES='mydroid'
239
- CCS_CODEX_ALIASES='mycodex'
240
- ```
241
-
242
- For Factory BYOK compatibility, CCS also stores a per-profile Droid provider hint
243
- (`CCS_DROID_PROVIDER`) using one of:
244
- `anthropic`, `openai`, or `generic-chat-completion-api`.
245
- If the hint is missing, CCS resolves provider from base URL/model at runtime.
246
-
247
- CCS also persists Droid's active model selector in `~/.factory/settings.json`
248
- (`model: custom:<alias>`). This avoids passing `-m` argv in interactive mode,
249
- which Droid treats as queued prompt text.
250
-
251
- CCS supports structural Droid command passthrough after profile selection:
252
-
253
- ```bash
254
- ccs-droid codex exec --skip-permissions-unsafe "fix failing tests"
255
- ccs-droid codex --skip-permissions-unsafe "fix failing tests" # auto-routed to: droid exec ...
256
- ccs-droid codex -m custom:gpt-5.3-codex "fix failing tests" # short exec flags auto-routed too
257
- ```
258
-
259
- If you pass exec-only flags without a prompt (for example `--skip-permissions-unsafe`),
260
- Droid `exec` will return its native "No prompt provided" usage guidance.
261
-
262
- If multiple reasoning flags are provided in Droid exec mode, CCS keeps the first
263
- flag and warns about duplicates.
264
-
265
- Dashboard parity: `ccs config` -> `Factory Droid`
77
+ See auth state, account health, and provider readiness without dropping into raw
78
+ config. Deep dive:
79
+ [Live Auth Monitor](https://docs.ccs.kaitran.ca/features/dashboard/live-auth-monitor).
266
80
 
267
- ### Native Codex Runtime (runtime-only in v1)
81
+ ### OAuth Provider Control Center
268
82
 
269
- CCS can launch native Codex as a first-class runtime target without rewriting your
270
- `~/.codex/config.toml` on every run. CCS uses transient `codex -c key=value` overrides for
271
- Codex-routed sessions and leaves your existing Codex home/config in place.
272
-
273
- Supported in v1:
274
-
275
- ```bash
276
- ccs --target codex # native Codex default session
277
- ccs-codex # explicit Codex alias
278
- ccsx # short native Codex alias
279
- ccsxp # built-in CCS Codex provider on native Codex
280
- ccs codex --target codex # explicit equivalent of ccsxp
281
- ccs api create codex-api --cliproxy-provider codex
282
- ccs codex-api --target codex # Codex bridge profile on native Codex
283
- ```
284
-
285
- Not supported in v1:
286
- - Claude account profiles on Codex target
287
- - Copilot profiles on Codex target
288
- - Generic API profiles that are not Codex-routed CLIProxy bridges
289
- - Non-Codex CLIProxy providers on Codex target
290
- - Composite CLIProxy variants on Codex target
291
-
292
- Dashboard parity: `ccs config` -> `Compatible` -> `Codex CLI`
293
-
294
- The dedicated Codex dashboard reads and writes the user layer only: `~/.codex/config.toml`
295
- (or `$CODEX_HOME/config.toml`). It now ships as a split-view control center:
296
-
297
- - left pane: guided controls for top-level runtime defaults, project trust, profiles,
298
- model providers, MCP servers, and supported feature toggles
299
- - right pane: raw `config.toml` editor for unsupported or exact-fidelity edits
300
- - overview/docs tabs: binary detection, user-layer summary, support matrix guidance, and
301
- upstream OpenAI references
302
-
303
- Structured saves intentionally normalize TOML formatting and drop comments. Use the raw editor
304
- when exact layout matters. Structured edits also refresh the raw snapshot immediately. Guided
305
- controls stay disabled while the raw editor has unsaved or invalid TOML, project trust paths must
306
- be absolute or start with `~/`, and supported feature flags can be cleared back to Codex defaults
307
- with `Use default`. CCS also keeps warning that transient runtime overrides such as
308
- `codex -c key=value` and `CCS_CODEX_API_KEY` can change the effective runtime without persisting
309
- back into the user config file.
310
-
311
- #### CLIProxy-backed native Codex
312
-
313
- There are two supported ways to use CLIProxy with native Codex:
314
-
315
- 1. `ccsxp` or `ccs codex --target codex`
316
- Uses the built-in CCS Codex provider route on native Codex. This path relies on transient
317
- CCS-managed `-c` overrides and does **not** require changing your saved `model_provider`.
318
-
319
- 2. Plain `codex` or a personal alias like `cxp`
320
- Save CLIProxy as the native default provider in `~/.codex/config.toml` (or
321
- `$CODEX_HOME/config.toml`), then export `CLIPROXY_API_KEY` in your shell.
322
-
323
- ```toml
324
- model_provider = "cliproxy"
325
-
326
- [model_providers.cliproxy]
327
- base_url = "http://127.0.0.1:8317/api/provider/codex"
328
- env_key = "CLIPROXY_API_KEY"
329
- wire_api = "responses"
330
- ```
331
-
332
- The top-level `model_provider = "cliproxy"` line is required. Defining only
333
- `[model_providers.cliproxy]` is not enough for plain `codex` to pick it by default.
334
-
335
- ```bash
336
- export CLIPROXY_API_KEY="ccs-internal-managed"
337
- ccsxp "your prompt" # CCS shortcut for the built-in provider route
338
- codex "your prompt" # native Codex using your saved cliproxy default
339
- ```
340
-
341
- Dashboard parity: `ccs config` -> `Compatible` -> `Codex CLI`
342
-
343
- - `Overview`: explains `ccsx` vs `ccsxp`
344
- - `Top-level settings`: set **Default provider** to `cliproxy`
345
- - `Model providers`: save `cliproxy` with `env_key = "CLIPROXY_API_KEY"`
346
-
347
- ### Per-Profile Target Defaults
348
-
349
- You can pin a default target (`claude` or `droid`) per profile:
350
-
351
- ```bash
352
- # API profile defaults to Droid
353
- ccs api create myglm --preset glm --target droid
354
-
355
- # CLIProxy variant defaults to Droid
356
- ccs cliproxy create mycodex --provider codex --target droid
357
- ```
358
-
359
- Built-in CLIProxy providers also work with Droid alias/target override:
360
-
361
- ```bash
362
- ccs-droid codex
363
- ccs-droid agy
364
- ccs codex --target droid
365
- ccs-droid codex exec --auto high "triage this bug report"
366
- ```
367
-
368
- Dashboard parity:
369
- - `ccs config` -> `API Profiles` -> set **Default Target**
370
- - `ccs config` -> `CLIProxy` -> create/edit variant -> set **Default Target**
371
-
372
- ### Kiro Auth Methods
373
-
374
- `ccs kiro --auth` defaults to AWS Builder ID Device OAuth (best support for AWS org accounts).
375
-
376
- ```bash
377
- ccs kiro --auth --kiro-auth-method aws # AWS Builder ID device code (default)
378
- ccs kiro --auth --kiro-auth-method aws-authcode # AWS Builder ID auth code
379
- ccs kiro --auth --kiro-auth-method google # Google OAuth
380
- ccs kiro --auth --kiro-auth-method github # Dashboard management OAuth flow
381
- ```
382
-
383
- Dashboard parity: `ccs config` -> Accounts -> Add Kiro account -> choose `Auth Method`.
384
-
385
- ### Cursor IDE Quick Start
386
-
387
- ```bash
388
- ccs cursor enable
389
- ccs cursor auth
390
- ccs cursor start
391
- ccs cursor "explain this repo"
392
- ccs cursor status
393
- ```
394
-
395
- If auto-detect is unavailable:
396
-
397
- ```bash
398
- ccs cursor auth --manual --token <token> --machine-id <machine-id>
399
- ```
400
-
401
- Defaults:
402
- - Port: `20129`
403
- - Ghost mode: enabled
404
- - Dashboard page: `ccs config` -> `Cursor IDE`
405
-
406
- Detailed guide: [`docs/cursor-integration.md`](./docs/cursor-integration.md)
407
-
408
- ### Claude IDE Extension Setup
409
-
410
- CCS now has a native setup flow for the Anthropic Claude extension in VS Code and compatible hosts.
411
- Use the same resolver in both the CLI and dashboard, so API profiles, CCS auth accounts,
412
- CLIProxy-backed profiles, Copilot, and default-profile continuity all map to the correct env shape.
413
-
414
- Preferred shared-settings path:
415
-
416
- ```bash
417
- ccs persist glm
418
- ccs persist work
419
- ccs persist default
420
- ```
421
-
422
- This writes the resolved setup to `~/.claude/settings.json`, which is the best option when you want
423
- the Claude CLI and the IDE extension to share one CCS profile.
424
-
425
- IDE-local snippet path:
426
-
427
- ```bash
428
- ccs env glm --format claude-extension --ide vscode
429
- ccs env work --format claude-extension --ide cursor
430
- ccs env default --format claude-extension --ide windsurf
431
- ```
432
-
433
- This prints a copy-ready `settings.json` snippet for the installed Claude extension host:
434
-
435
- - `vscode` / `cursor`: `claudeCode.environmentVariables` plus `claudeCode.disableLoginPrompt`
436
- - `windsurf`: `claude-code.environmentVariables`
437
-
438
- Account and continuity-aware flows use `CLAUDE_CONFIG_DIR` instead of Anthropic transport env vars.
439
- CLIProxy and Copilot flows emit the required `ANTHROPIC_*` variables and still depend on their local
440
- proxy/daemon being reachable.
441
-
442
- Dashboard parity:
443
- - `ccs config` -> `Claude Extension`
444
- - Select a CCS profile and IDE host to copy either the shared `~/.claude/settings.json` payload or the IDE-local extension snippet
445
-
446
- ### Parallel Workflows
447
-
448
- Run multiple terminals with different providers:
449
-
450
- > Delegation compatibility: when CCS spawns child Claude sessions, it strips the `CLAUDECODE` guard variable to avoid nested-session blocking in Claude Code v2.1.39+.
451
-
452
- ```bash
453
- # Terminal 1: Planning (Claude Pro)
454
- ccs work "design the authentication system"
455
-
456
- # Terminal 2: Execution (GLM - cost optimized)
457
- ccs glm "implement the user service from the plan"
458
-
459
- # Terminal 3: Local testing (Ollama - offline, privacy)
460
- ccs ollama "run tests and generate coverage report"
461
-
462
- # Terminal 4: Review (Gemini)
463
- ccs gemini "review the implementation for security issues"
464
- ```
465
-
466
- ### Multi-Account Claude
467
-
468
- Create isolated Claude instances for work/personal separation:
469
-
470
- ```bash
471
- ccs auth create work
472
-
473
- # Run concurrently in separate terminals
474
- ccs work "implement feature" # Terminal 1
475
- ccs "review code" # Terminal 2 (personal account)
476
- ```
477
-
478
- #### Account Context Modes (Isolation-First)
479
-
480
- Account profiles are isolated by default.
481
-
482
- | Mode | Default | Requirements |
483
- |------|---------|--------------|
484
- | `isolated` | Yes | No `context_group` required |
485
- | `shared` | No (explicit opt-in) | Valid non-empty `context_group` |
486
-
487
- Shared mode continuity depth:
488
-
489
- - `standard` (default): shares project workspace context only
490
- - `deeper` (advanced opt-in): additionally syncs `session-env`, `file-history`, `shell-snapshots`, `todos`
491
-
492
- Opt in to shared context when needed:
493
-
494
- ```bash
495
- # Share context with default group
496
- ccs auth create backup --share-context
497
-
498
- # Share context only within named group
499
- ccs auth create backup2 --context-group sprint-a
500
-
501
- # Advanced deeper continuity mode (requires shared mode)
502
- ccs auth create backup3 --context-group sprint-a --deeper-continuity
503
- ```
504
-
505
- Update existing accounts without recreating login:
506
-
507
- 1. Run `ccs config`
508
- 2. Open `Accounts`
509
- 3. Click the pencil icon in Actions and set `isolated` or `shared` mode + continuity depth
510
-
511
- Shared mode metadata in `~/.ccs/config.yaml`:
512
-
513
- ```yaml
514
- accounts:
515
- work:
516
- created: "2026-02-24T00:00:00.000Z"
517
- last_used: null
518
- context_mode: "shared"
519
- context_group: "team-alpha"
520
- continuity_mode: "standard"
521
- ```
522
-
523
- `context_group` rules:
524
-
525
- - lowercase letters, numbers, `_`, `-`
526
- - must start with a letter
527
- - max length `64`
528
- - non-empty after normalization
529
- - normalized by trim + lowercase + whitespace collapse (`" Team Alpha "` -> `"team-alpha"`)
530
-
531
- Shared context with `standard` depth links project workspace data. `deeper` depth links additional continuity artifacts. Credentials remain isolated per account.
532
-
533
- Resume is lane-scoped:
534
-
535
- - plain `ccs -r` resumes the lane that plain `ccs` currently uses
536
- - `ccs <account> -r` resumes that account's lane only
537
- - those lanes can differ, even when an account is `shared + deeper`
538
-
539
- If you do most of your work with plain `ccs` and want future resumes to line up with an auth account:
540
-
541
- ```bash
542
- ccs auth default work
543
- ```
544
-
545
- If you need to protect local continuity files before changing account sync settings:
546
-
547
- ```bash
548
- ccs auth backup work
549
- ccs auth backup default
550
- ```
551
-
552
- - `ccs auth backup work` backs up the local continuity lane for that auth account
553
- - `ccs auth backup default` backs up the lane plain `ccs` would use right now
554
- - this backs up local continuity artifacts only; Claude-hosted resume behavior still depends on upstream state
555
-
556
- #### Cross-Profile Continuity Inheritance (Claude Target)
557
-
558
- You can map non-account profiles (API, CLIProxy, Copilot, or `default`) to reuse continuity artifacts from an account profile:
559
-
560
- ```yaml
561
- continuity:
562
- inherit_from_account:
563
- glm: pro
564
- gemini: pro
565
- copilot: pro
566
- default: pro
567
- ```
568
-
569
- With this config, `ccs glm`, `ccs gemini`, and `ccs copilot` run with `pro`'s `CLAUDE_CONFIG_DIR` continuity context while keeping each profile's own provider credentials/settings.
570
-
571
- Alternative path for lower manual switching:
572
-
573
- - Use CLIProxy Claude pool (`ccs cliproxy auth claude`) and manage pool behavior in `ccs config` -> `CLIProxy Plus`.
574
-
575
- Technical details: [`docs/session-sharing-technical-analysis.md`](docs/session-sharing-technical-analysis.md)
576
-
577
- <br>
578
-
579
- ## Maintenance
580
-
581
- ### Health Check
582
-
583
- ```bash
584
- ccs doctor
585
- ```
586
-
587
- Verifies: Claude CLI, config files, symlinks, permissions.
588
-
589
- ### Update
590
-
591
- ```bash
592
- ccs update # Update to latest
593
- ccs update --force # Force reinstall
594
- ccs update --beta # Install dev channel
595
- ```
596
-
597
- ### CI Parity Gate (for contributors)
598
-
599
- Before opening or updating a PR, run:
600
-
601
- ```bash
602
- bun run validate:ci-parity
603
- ```
604
-
605
- This mirrors CI behavior (build + validate + base-branch freshness check) and is also enforced by the local `pre-push` hook.
606
-
607
- ### Sync Shared Items
608
-
609
- ```bash
610
- ccs sync
611
- ```
612
-
613
- Re-creates symlinks for shared commands, skills, and settings.
614
-
615
- ### Quota Management
616
-
617
- ```bash
618
- ccs cliproxy doctor # Check quota status for all agy accounts
619
- ccs cliproxy quota # Show agy/claude/codex/gemini/ghcp quotas (Claude/Codex: 5h + weekly reset schedule)
620
- ```
621
-
622
- **Auto-Failover**: When a managed account runs out of quota, CCS automatically switches to another account with remaining capacity. Shared GCP project accounts are excluded (pooled quota).
623
-
624
- ### CLIProxy Lifecycle
625
-
626
- ```bash
627
- ccs cliproxy start # Start CLIProxy background service
628
- ccs cliproxy status # Check running status
629
- ccs cliproxy restart # Restart CLIProxy service
630
- ccs cliproxy stop # Stop running CLIProxy service
631
- ```
632
-
633
- <br>
634
-
635
- ## Configuration
636
-
637
- CCS auto-creates config on install. Dashboard is the recommended way to manage settings.
638
-
639
- **Config location**: `~/.ccs/config.yaml`
640
-
641
- <details>
642
- <summary>Custom Claude CLI path</summary>
643
-
644
- If Claude CLI is installed in a non-standard location:
645
-
646
- ```bash
647
- export CCS_CLAUDE_PATH="/path/to/claude" # Unix
648
- $env:CCS_CLAUDE_PATH = "D:\Tools\Claude\claude.exe" # Windows
649
- ```
650
-
651
- CCS sanitizes child Claude spawn environments by stripping `CLAUDECODE` (case-insensitive) to prevent nested-session guard failures during delegation. `CCS_CLAUDE_PATH` is still respected after this sanitization step.
652
-
653
- </details>
654
-
655
- <details>
656
- <summary>Windows symlink support</summary>
657
-
658
- Enable Developer Mode for true symlinks:
659
-
660
- 1. **Settings** → **Privacy & Security** → **For developers**
661
- 2. Enable **Developer Mode**
662
- 3. Reinstall: `npm install -g @kaitranntt/ccs`
663
-
664
- Without Developer Mode, CCS falls back to copying directories.
665
-
666
- </details>
667
-
668
- <br>
669
-
670
- ## WebSearch
671
-
672
- Third-party profiles (Gemini, Codex, GLM, etc.) cannot use Anthropic's native WebSearch. CCS now provisions a first-class local `ccs-websearch` MCP tool when the managed runtime is available, disables native `WebSearch` on third-party launches, and steers Claude toward real local providers instead of surfacing a denied native-tool call.
673
-
674
- ### How It Works
675
-
676
- | Profile Type | WebSearch Method |
677
- |--------------|------------------|
678
- | Claude (native) | Anthropic WebSearch API |
679
- | Third-party profiles | CCS local MCP `WebSearch` tool when available; otherwise Bash/network fallback |
680
-
681
- ### Local Search Backend Chain
682
-
683
- For third-party profiles, CCS steers Claude toward the managed `ccs-websearch.WebSearch` MCP tool when it is available. The tool is intentionally named to match the native `WebSearch` concept, which helps Claude prefer it over ad hoc Bash or `curl` fetches, but Bash/network fallback can still happen if the tool is unavailable or ignored. When the tool is used, CCS routes that request through deterministic search providers in this order:
684
-
685
- | Priority | Provider | Setup | Notes |
686
- |----------|----------|-------|-------|
687
- | 1st | Exa | `EXA_API_KEY` | API-backed search with extracted content |
688
- | 2nd | Tavily | `TAVILY_API_KEY` | Agent-oriented search API |
689
- | 3rd | Brave Search | `BRAVE_API_KEY` | Cleaner API-backed results |
690
- | 4th | DuckDuckGo | None | Built-in default fallback |
691
- | 5th | Gemini / OpenCode / Grok | Optional | Legacy compatibility fallback only |
692
-
693
- ### Configuration
694
-
695
- Configure via dashboard (**Settings** page) or `~/.ccs/config.yaml`:
696
-
697
- ```yaml
698
- websearch:
699
- enabled: true # Enable/disable (default: true)
700
- providers:
701
- exa:
702
- enabled: false # Enable when EXA_API_KEY is set
703
- tavily:
704
- enabled: false # Enable when TAVILY_API_KEY is set
705
- duckduckgo:
706
- enabled: true # Built-in zero-setup fallback
707
- brave:
708
- enabled: false # Enable when BRAVE_API_KEY is set
709
- gemini:
710
- enabled: false # Optional legacy fallback
711
- ```
712
-
713
- > [!TIP]
714
- > **DuckDuckGo** still works out of the box. Add **Exa**, **Tavily**, or **Brave Search** if you want API-backed results, then keep Gemini/OpenCode/Grok only if you explicitly want legacy fallback behavior.
715
- > CCS manages the user-scope MCP entry in `~/.claude.json` and syncs it into isolated account configs when needed.
716
-
717
- > [!NOTE]
718
- > Set `CCS_WEBSEARCH_TRACE=1` to write correlated launch, MCP, provider, and headless summary records to `~/.ccs/logs/websearch-trace.jsonl`. That trace is designed to answer whether CCS exposed the managed tool, whether Claude called it, which provider won, and when a headless run likely bypassed it via `Bash` or `WebFetch`.
719
-
720
- See [docs/websearch.md](./docs/websearch.md) for detailed configuration and troubleshooting.
721
-
722
- <br>
723
-
724
- ## Image Analysis
725
-
726
- Third-party profiles (Gemini, Codex, GLM bridge profiles, Copilot, and similar routes) now use a first-class local `ImageAnalysis` MCP tool instead of relying on a denied `Read` hook as the normal experience.
727
-
728
- ### How It Works
729
-
730
- | Profile Type | Image Method |
731
- |--------------|--------------|
732
- | Claude (native) | Native Claude vision / native `Read` |
733
- | Third-party profiles | CCS local MCP `ImageAnalysis` tool when available |
734
- | Third-party when runtime unavailable | Native `Read` fallback |
735
-
736
- ### Direct Provider Routing
737
-
738
- When the managed tool is used, CCS resolves the backend before launch and posts image-analysis requests directly to the provider-scoped CCS route:
739
-
740
- ```text
741
- /api/provider/<backend>/v1/messages
742
- ```
743
-
744
- That path goes from Claude -> `ccs-image-analysis.ImageAnalysis` -> CCS/CLIProxy provider routing. It does not bounce through Claude Code, a helper CLI, or a second model wrapper.
745
-
746
- ### Prompting and Fallback
747
-
748
- CCS appends a short steering hint telling Claude to prefer `ImageAnalysis` over `Read` for local image and PDF files. The tool uses editable prompt templates from `~/.ccs/prompts/image-analysis/` and automatically picks `default`, `screenshot`, or `document`.
749
-
750
- If the local runtime, auth, or proxy path is unavailable, CCS keeps the launch non-fatal and falls back to native `Read`. The legacy `Read` hook remains only as a compatibility fallback when CCS can install it safely.
751
-
752
- See [docs/image-analysis.md](./docs/image-analysis.md) for configuration, routing details, and troubleshooting.
753
-
754
- <br>
755
-
756
- ## Remote CLIProxy
757
-
758
- CCS v7.x supports connecting to remote CLIProxyAPI instances, enabling:
759
- - **Team sharing**: One CLIProxyAPI server for multiple developers
760
- - **Cost optimization**: Centralized API key management
761
- - **Network isolation**: Keep API credentials on a secure server
762
-
763
- ### Quick Setup
83
+ ![CLIProxy API](assets/screenshots/cliproxyapi.webp)
764
84
 
765
- Configure via dashboard (**Settings > CLIProxy Server**) or CLI flags:
85
+ Manage OAuth-backed providers, quota visibility, and routing from one place.
86
+ Deep dive:
87
+ [CLIProxy API](https://docs.ccs.kaitran.ca/features/proxy/cliproxy-api).
766
88
 
767
- ```bash
768
- ccs gemini --proxy-host 192.168.1.100 --proxy-port 8317
769
- ccs codex --proxy-host proxy.example.com --proxy-protocol https
770
- ```
89
+ ### Managed Tooling And Fallbacks
771
90
 
772
- ### CLI Flags
91
+ ![WebSearch Fallback](assets/screenshots/websearch.webp)
773
92
 
774
- | Flag | Description |
775
- |------|-------------|
776
- | `--proxy-host` | Remote proxy hostname or IP |
777
- | `--proxy-port` | Remote proxy port (default: 8317 for HTTP, 443 for HTTPS) |
778
- | `--proxy-protocol` | `http` or `https` (default: http) |
779
- | `--proxy-auth-token` | Bearer token for authentication |
780
- | `--local-proxy` | Force local mode, ignore remote config |
781
- | `--remote-only` | Fail if remote unreachable (no fallback) |
93
+ CCS can provision first-class local tools like WebSearch and image analysis for
94
+ third-party launches instead of leaving you to wire them by hand. Deep dive:
95
+ [WebSearch](https://docs.ccs.kaitran.ca/features/ai/websearch).
782
96
 
783
- See [Remote Proxy documentation](https://docs.ccs.kaitran.ca/features/remote-proxy) for detailed setup.
97
+ ## Docs Matrix
784
98
 
785
- <br>
99
+ The README stays short on purpose. The docs site owns the detailed guides and
100
+ reference material.
786
101
 
787
- ## Standard Fetch Proxy
102
+ | If you want to... | Read this |
103
+ | --- | --- |
104
+ | Understand what CCS is and how the pieces fit together | [Introduction](https://docs.ccs.kaitran.ca/introduction) |
105
+ | Install CCS cleanly on a new machine | [Installation](https://docs.ccs.kaitran.ca/getting-started/installation) |
106
+ | Go from install to a successful first run | [Your First CCS Session](https://docs.ccs.kaitran.ca/getting-started/first-session) |
107
+ | See the dashboard and workflow surfaces before setup | [Product Tour](https://docs.ccs.kaitran.ca/getting-started/product-tour) |
108
+ | Compare OAuth providers, Claude accounts, and API profiles | [Provider Overview](https://docs.ccs.kaitran.ca/providers/concepts/overview) |
109
+ | Learn the dashboard structure and feature pages | [Dashboard Overview](https://docs.ccs.kaitran.ca/features/dashboard/overview) |
110
+ | Configure profiles, paths, and environment variables | [Configuration](https://docs.ccs.kaitran.ca/getting-started/configuration) |
111
+ | Keep OpenCode aligned with your live CCS setup | [OpenCode Sync Plugin](https://docs.ccs.kaitran.ca/features/workflow/opencode-sync) |
112
+ | Browse every command and flag | [CLI Commands](https://docs.ccs.kaitran.ca/reference/cli-commands) |
113
+ | Recover from install, auth, or provider failures | [Troubleshooting](https://docs.ccs.kaitran.ca/reference/troubleshooting) |
114
+ | Understand storage, config, and architecture details | [Reference](https://docs.ccs.kaitran.ca/reference/architecture) |
788
115
 
789
- CCS also respects standard proxy environment variables for fetch-based quota, dashboard,
790
- and provider management requests:
116
+ ## Example Workflow
791
117
 
792
118
  ```bash
793
- export HTTPS_PROXY=http://proxy.example.com:8080
794
- export HTTP_PROXY=http://proxy.example.com:8080
795
- export ALL_PROXY=http://proxy.example.com:8080
796
- export NO_PROXY=localhost,127.0.0.1,.internal.corp
797
- ```
798
-
799
- Notes:
800
- - CCS automatically bypasses loopback addresses (`localhost`, `127.0.0.1`, `::1`) for its own local services.
801
- - If `HTTPS_PROXY` is unset, CCS falls back to `HTTP_PROXY` for HTTPS fetches.
802
- - `ALL_PROXY` is used when protocol-specific proxy variables are not configured.
803
- - Proxy URLs must use `http://` or `https://`.
119
+ # Design with default Claude
120
+ ccs "design the auth flow"
804
121
 
805
- <br>
122
+ # Implement with a different provider
123
+ ccs codex "implement the user service"
806
124
 
807
- ## Documentation Hub
125
+ # Use a cheaper API profile for routine work
126
+ ccs glm "clean up tests and docs"
808
127
 
809
- If you are not sure where to start, open **https://docs.ccs.kaitran.ca** first.
810
- The hosted docs are the best entry point for setup, command reference, provider guides, and troubleshooting.
811
-
812
- | Topic | Link |
813
- |-------|------|
814
- | Docs Home | [docs.ccs.kaitran.ca](https://docs.ccs.kaitran.ca) |
815
- | Installation | [docs.ccs.kaitran.ca/getting-started/installation](https://docs.ccs.kaitran.ca/getting-started/installation) |
816
- | Configuration | [docs.ccs.kaitran.ca/getting-started/configuration](https://docs.ccs.kaitran.ca/getting-started/configuration) |
817
- | OAuth Providers | [docs.ccs.kaitran.ca/providers/oauth-providers](https://docs.ccs.kaitran.ca/providers/oauth-providers) |
818
- | Multi-Account Claude | [docs.ccs.kaitran.ca/providers/claude-accounts](https://docs.ccs.kaitran.ca/providers/claude-accounts) |
819
- | API Profiles | [docs.ccs.kaitran.ca/providers/api-profiles](https://docs.ccs.kaitran.ca/providers/api-profiles) |
820
- | Remote Proxy | [docs.ccs.kaitran.ca/features/remote-proxy](https://docs.ccs.kaitran.ca/features/remote-proxy) |
821
- | Cursor IDE (local guide) | [./docs/cursor-integration.md](./docs/cursor-integration.md) |
822
- | Dashboard i18n (local guide) | [./docs/i18n-dashboard.md](./docs/i18n-dashboard.md) |
823
- | CLI Reference | [docs.ccs.kaitran.ca/reference/cli-commands](https://docs.ccs.kaitran.ca/reference/cli-commands) |
824
- | Architecture | [docs.ccs.kaitran.ca/reference/architecture](https://docs.ccs.kaitran.ca/reference/architecture) |
825
- | Troubleshooting | [docs.ccs.kaitran.ca/reference/troubleshooting](https://docs.ccs.kaitran.ca/reference/troubleshooting) |
826
-
827
- <br>
828
-
829
- ## Uninstall
830
-
831
- ```bash
832
- npm uninstall -g @kaitranntt/ccs
833
- ```
834
-
835
- <details>
836
- <summary>Alternative package managers</summary>
837
-
838
- ```bash
839
- yarn global remove @kaitranntt/ccs
840
- pnpm remove -g @kaitranntt/ccs
841
- bun remove -g @kaitranntt/ccs
128
+ # Run a local model when you need privacy or offline access
129
+ ccs ollama "summarize these logs"
842
130
  ```
843
131
 
844
- </details>
845
-
846
- <br>
847
-
848
- ## Philosophy
849
-
850
- - **YAGNI**: No features "just in case"
851
- - **KISS**: Simple, focused implementation
852
- - **DRY**: One source of truth (config)
853
-
854
- <br>
855
-
856
- ## Contributing
857
-
858
- See [CONTRIBUTING.md](./CONTRIBUTING.md). For suspected vulnerabilities, use [SECURITY.md](./SECURITY.md) instead of a public issue.
859
-
860
- <br>
861
-
862
- ## License
132
+ ## Community Projects
863
133
 
864
- MIT License - see [LICENSE](LICENSE).
134
+ | Project | Author | Description |
135
+ | --- | --- | --- |
136
+ | [opencode-ccs-sync](https://github.com/JasonLandbridge/opencode-ccs-sync) | [@JasonLandbridge](https://github.com/JasonLandbridge) | Auto-sync CCS providers into OpenCode |
865
137
 
866
- <br>
138
+ ## Contribute And Report Safely
867
139
 
868
- <div align="center">
140
+ - Contributing guide: [CONTRIBUTING.md](./CONTRIBUTING.md)
141
+ - Starter work:
142
+ [good first issue](https://github.com/kaitranntt/ccs/labels/good%20first%20issue),
143
+ [help wanted](https://github.com/kaitranntt/ccs/labels/help%20wanted)
144
+ - Questions: [open a question issue](https://github.com/kaitranntt/ccs/issues/new/choose)
145
+ - Security reports: [SECURITY.md](./SECURITY.md) and the
146
+ [private advisory form](https://github.com/kaitranntt/ccs/security/advisories/new)
869
147
 
870
148
  ## Star History
871
149
 
872
150
  [![Star History Chart](https://api.star-history.com/svg?repos=kaitranntt/ccs&type=date&legend=top-left)](https://www.star-history.com/#kaitranntt/ccs&type=date&legend=top-left)
873
-
874
- ---
875
-
876
- **[ccs.kaitran.ca](https://ccs.kaitran.ca)** | **[docs.ccs.kaitran.ca](https://docs.ccs.kaitran.ca)** | [Issue Templates](https://github.com/kaitranntt/ccs/issues/new/choose) | [Private Security Report](https://github.com/kaitranntt/ccs/security/advisories/new) | [Star on GitHub](https://github.com/kaitranntt/ccs)
877
-
878
- </div>
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@kaitranntt/ccs",
3
- "version": "7.65.3-dev.10",
3
+ "version": "7.65.3-dev.11",
4
4
  "description": "Claude Code Switch - Instant profile switching between Claude, GLM, Kimi, and more",
5
5
  "keywords": [
6
6
  "cli",