@northbridge-security/secureai 0.1.13

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (50) hide show
  1. package/.claude/README.md +122 -0
  2. package/.claude/commands/architect/clean.md +978 -0
  3. package/.claude/commands/architect/kiss.md +762 -0
  4. package/.claude/commands/architect/review.md +704 -0
  5. package/.claude/commands/catchup.md +90 -0
  6. package/.claude/commands/code.md +115 -0
  7. package/.claude/commands/commit.md +1218 -0
  8. package/.claude/commands/cover.md +1298 -0
  9. package/.claude/commands/fmea.md +275 -0
  10. package/.claude/commands/kaizen.md +312 -0
  11. package/.claude/commands/pr.md +503 -0
  12. package/.claude/commands/todo.md +99 -0
  13. package/.claude/commands/worktree.md +738 -0
  14. package/.claude/commands/wrapup.md +103 -0
  15. package/LICENSE +183 -0
  16. package/README.md +108 -0
  17. package/dist/cli.js +75634 -0
  18. package/docs/agents/devops-reviewer.md +889 -0
  19. package/docs/agents/kiss-simplifier.md +1088 -0
  20. package/docs/agents/typescript.md +8 -0
  21. package/docs/guides/README.md +109 -0
  22. package/docs/guides/agents.clean.arch.md +244 -0
  23. package/docs/guides/agents.clean.arch.ts.md +1314 -0
  24. package/docs/guides/agents.gotask.md +1037 -0
  25. package/docs/guides/agents.markdown.md +1209 -0
  26. package/docs/guides/agents.onepassword.md +285 -0
  27. package/docs/guides/agents.sonar.md +857 -0
  28. package/docs/guides/agents.tdd.md +838 -0
  29. package/docs/guides/agents.tdd.ts.md +1062 -0
  30. package/docs/guides/agents.typesript.md +1389 -0
  31. package/docs/guides/github-mcp.md +1075 -0
  32. package/package.json +130 -0
  33. package/packages/secureai-cli/src/cli.ts +21 -0
  34. package/tasks/README.md +880 -0
  35. package/tasks/aws.yml +64 -0
  36. package/tasks/bash.yml +118 -0
  37. package/tasks/bun.yml +738 -0
  38. package/tasks/claude.yml +183 -0
  39. package/tasks/docker.yml +420 -0
  40. package/tasks/docs.yml +127 -0
  41. package/tasks/git.yml +1336 -0
  42. package/tasks/gotask.yml +132 -0
  43. package/tasks/json.yml +77 -0
  44. package/tasks/markdown.yml +95 -0
  45. package/tasks/onepassword.yml +350 -0
  46. package/tasks/security.yml +102 -0
  47. package/tasks/sonar.yml +437 -0
  48. package/tasks/template.yml +74 -0
  49. package/tasks/vscode.yml +103 -0
  50. package/tasks/yaml.yml +121 -0
@@ -0,0 +1,122 @@
1
+ # Claude Configuration
2
+
3
+ The global configuration ensures, and cannot be overridden, that:
4
+
5
+ - Harmful or dangerous commands are blocked
6
+ - PII and secrets are not read or shared
7
+ - Claude does not add co-authoring information in commits
8
+
9
+ Standard setup:
10
+
11
+ ```json
12
+ {
13
+ "hooks": {
14
+ "PreToolUse": [
15
+ {
16
+ "hooks": [
17
+ {
18
+ "command": "secureai guard --stdin --agent claude",
19
+ "type": "command"
20
+ }
21
+ ],
22
+ "matcher": "*"
23
+ }
24
+ ],
25
+ "UserPromptSubmit": [
26
+ {
27
+ "hooks": [
28
+ {
29
+ "command": "secureai prompt --stdin --agent claude",
30
+ "type": "command"
31
+ }
32
+ ]
33
+ }
34
+ ]
35
+ },
36
+ "includeCoAuthoredBy": false,
37
+ "permissions": {
38
+ "deny": [
39
+ "Bash(npm publish:*)",
40
+ "Bash(git push:*)",
41
+ "Bash(npx publish:*)",
42
+ "Bash(GH_TOKEN=:*)",
43
+ "Bash(export GH_TOKEN:*)",
44
+ "Bash(gh:*)",
45
+ "Edit(.env)",
46
+ "Edit(.env.*)",
47
+ "Write(.env)",
48
+ "Write(.env.*)",
49
+ "Bash(cat ~/.claude:*)",
50
+ "Bash(cat /Users/*/.claude:*)",
51
+ "Bash(cat $HOME/.claude:*)",
52
+ "Read(~/.claude/.credentials.json)",
53
+ "Read(~/.claude/credentials.json)",
54
+ "Read(~/.config/claude/*)",
55
+ "Bash(claude mcp get:*)"
56
+ ],
57
+ "disableBypassPermissionsMode": "disable"
58
+ }
59
+ }
60
+ ```
61
+
62
+ The local configuration focuses on productivity and allows uninterrupted use for agents of:
63
+
64
+ - Use all Secure AI MCP features expect branch merging, which requires approval
65
+ - Uses permission lockdown as mode `Strict` to only allow our MCP server to be used
66
+ - Uses `allow` patterns to avoid repeated permission approvals
67
+
68
+ This setup gives a balance between strict security and productivity.
69
+
70
+ Standard setup:
71
+
72
+ ```json
73
+ {
74
+ "permissions": {
75
+ "allow": ["Read", "Edit", "Write", "Bash", "WebSearch", "WebFetch", "mcp__secureai-mcp__*"],
76
+ "ask": [
77
+ "Edit(.pii)",
78
+ "Write(.pii)",
79
+ "Edit(.claude/*)",
80
+ "Edit(.cursor/*)",
81
+ "Edit(.husky/*)",
82
+ "Edit(.vscode/*)",
83
+ "mcp__secureai-mcp__plan_merge"
84
+ ],
85
+ "deny": ["Read(.env*)", "Edit(.env*)", "Write(.env*)"]
86
+ }
87
+ }
88
+ ```
89
+
90
+ - Allow reading, editing and creating files except settings and hooks files that require approval
91
+ - Allow searching and fetching web content
92
+ - Do not read or edit .env secret files
93
+
94
+ Strict setup:
95
+
96
+ ```json
97
+ {
98
+ "enableAllProjectMcpServers": false,
99
+ "enabledMcpjsonServers": ["secureai-mcp"],
100
+ "permissions": {
101
+ "allow": [
102
+ "Read",
103
+ "Edit(.worktree/**)",
104
+ "Edit(.tmp/**)",
105
+ "Write(.worktree/**)",
106
+ "Write(.tmp/**)",
107
+ "Bash",
108
+ "WebSearch",
109
+ "WebFetch",
110
+ "mcp__secureai-mcp__*"
111
+ ],
112
+ "ask": ["Edit", "Write", "mcp__secureai-mcp__plan_merge"],
113
+ "deny": ["Read(.env*)", "Edit(.env*)", "Write(.env*)"]
114
+ }
115
+ }
116
+ ```
117
+
118
+ - Allow edits unrestricted inside the .tmp and .worktree folders, ask for edits on all other locations
119
+ - Disable MCP servers outside of Secure AI
120
+ - Allow searching and fetching web content
121
+ - Do not read or edit .env secret files
122
+