@triedotdev/mcp 1.0.32 → 1.0.34

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/README.md CHANGED
@@ -2,7 +2,12 @@
2
2
 
3
3
  **Customizable Parallel Agents for AI Code Review**
4
4
 
5
- 20+ specialized agents scan your code for security, privacy, compliance, and bugs—all running in parallel with intelligent caching and real-time streaming.
5
+ 20 specialized agents scan your code for security, privacy, compliance, and bugs—all running in parallel with intelligent caching and real-time streaming.
6
+
7
+ ## What's New (latest updates)
8
+ - Slash-friendly commands: `/trie` and `/trie_<tool>` work the same as `trie`.
9
+ - Command palette: call `trie` with `action` to dispatch (scan, any agent, agent_smith, pr_review, watch, test, fix, explain, list_agents).
10
+ - Clear MCP naming: all tools are discoverable with `trie_*` prefixes while short aliases still work.
6
11
 
7
12
  ---
8
13
 
@@ -11,14 +16,15 @@
11
16
  - [Features](#features)
12
17
  - [Quick Start](#quick-start)
13
18
  - [Usage](#usage)
19
+ - [MCP Tools](#mcp-tools)
14
20
  - [CLI](#cli)
15
- - [CI/CD Integration](#cicd-integration)
16
- - [VS Code Extension](#vs-code-extension)
17
21
  - [Built-in Agents](#built-in-agents)
18
22
  - [Special Agents](#special-agents)
19
23
  - [Custom Agents](#custom-agents)
24
+ - [AI-Enhanced Mode](#ai-enhanced-mode)
25
+ - [CI/CD Integration](#cicd-integration)
26
+ - [VS Code Extension](#vs-code-extension)
20
27
  - [Configuration](#configuration)
21
- - [Team Collaboration](#team-collaboration)
22
28
  - [License](#license)
23
29
 
24
30
  ---
@@ -29,12 +35,11 @@
29
35
 
30
36
  | Feature | Description |
31
37
  |---------|-------------|
32
- | **20+ Built-in Agents** | Security, Privacy, SOC 2, Legal, Architecture, Performance, E2E, Visual QA, Data Flow, Agent Smith, and more |
38
+ | **20 Built-in Agents** | Security, Privacy, SOC 2, Legal, Architecture, Performance, E2E, Visual QA, Data Flow, and more |
33
39
  | **Parallel Execution** | True parallel execution with worker threads—3-5x faster scans |
34
40
  | **Result Caching** | File-based caching with SHA256 hashing—70% faster repeated scans |
35
- | **Streaming Progress** | Real-time progress updates as agents complete |
36
41
  | **Smart Triaging** | Only activates relevant agents based on code context |
37
- | **Interactive Dashboard** | Terminal UI with progress bars, filters, and issue browser |
42
+ | **Streaming Progress** | Real-time progress updates as agents complete |
38
43
 
39
44
  ### Developer Experience
40
45
 
@@ -50,7 +55,6 @@
50
55
  | Feature | Description |
51
56
  |---------|-------------|
52
57
  | **CI/CD Integration** | GitHub Actions, pre-commit hooks, SARIF output |
53
- | **Team Collaboration** | Issue assignment, Slack notifications, expertise-based routing |
54
58
  | **VS Code Extension** | Inline diagnostics, quick-fix code actions, scan on save |
55
59
 
56
60
  ---
@@ -96,14 +100,10 @@ Trie works with any MCP-compatible AI tool (OpenCode, Windsurf, etc.). Configure
96
100
  npx @triedotdev/mcp
97
101
  ```
98
102
 
99
- Trie auto-detects which tool is running and adapts its output format accordingly.
100
-
101
103
  ---
102
104
 
103
105
  ## Usage
104
106
 
105
- ### Basic Scanning
106
-
107
107
  Once configured, ask your AI assistant:
108
108
 
109
109
  ```
@@ -117,76 +117,76 @@ Run trie_security on this file
117
117
  Run trie_soc2 to check compliance
118
118
  ```
119
119
 
120
- ### AI-Enhanced Mode (Recommended)
120
+ Slash-friendly command palette:
121
121
 
122
- Trie works in two modes:
122
+ - `trie` or `/trie` shows the quick menu.
123
+ - `trie` / `/trie` with `{ action: "scan", files?: [], directory?: "" }` runs a full triaged scan.
124
+ - `trie` / `/trie` with `{ action: "<agent>", files?: [] }` runs one agent (e.g., `security`, `ux`, `soc2`, `agent_smith`).
123
125
 
124
- | Mode | Description |
125
- |------|-------------|
126
- | **Pattern-Only** (default) | Fast regex matching for specific patterns (exposed secrets, async forEach, etc.). Limited coverage without AI. |
127
- | **AI-Enhanced** | Full analysis: pattern detection + AI validation + deeper issue discovery. **Recommended for comprehensive scanning.** |
128
-
129
- > **Note:** Pattern-only mode catches specific high-confidence issues (AWS keys, GitHub tokens, common anti-patterns) but won't find logic bugs, architectural issues, or context-dependent problems. For thorough analysis, enable AI mode.
130
-
131
- **Enable AI mode:**
132
-
133
- **For MCP usage (Cursor/Claude Code):**
126
+ ### How It Works
134
127
 
135
- Add the API key to your MCP configuration:
128
+ Trie generates **actionable reports** with high-confidence issues. It does not auto-fix code. Instead:
136
129
 
137
- ```json
138
- {
139
- "mcpServers": {
140
- "Trie": {
141
- "command": "npx",
142
- "args": ["@triedotdev/mcp"],
143
- "env": {
144
- "ANTHROPIC_API_KEY": "sk-ant-..."
145
- }
146
- }
147
- }
148
- }
149
- ```
130
+ 1. **Trie scans** your code and generates a report with prioritized issues
131
+ 2. **You review** the issues in the report
132
+ 3. **You (or Cursor/Claude Code)** apply fixes based on Trie's recommendations
150
133
 
151
- **For CLI usage (terminal/CI):**
134
+ ---
152
135
 
153
- Add the API key to your project's `.env.local` file (in your project root):
136
+ ## MCP Tools
154
137
 
155
- ```bash
156
- echo 'ANTHROPIC_API_KEY=sk-ant-...' >> .env.local
157
- ```
138
+ These tools are available when using Trie via MCP (Cursor, Claude Code, etc.).
158
139
 
159
- Then load it before running CLI commands:
140
+ ### Core Tools
160
141
 
161
- ```bash
162
- # Load environment variables
163
- set -a; source .env.local; set +a
164
-
165
- # Now run CLI commands
166
- trie-agent scan
167
- ```
142
+ | Tool | Description |
143
+ |------|-------------|
144
+ | `trie_scan` | Scan code with intelligent agent selection |
145
+ | `trie_watch` | Watch mode—automatically scan files as you code |
146
+ | `trie_fix` | Generate fix recommendations for detected issues |
147
+ | `trie_explain` | Explain code, issues, or changes in plain language |
168
148
 
169
- > **Important:**
170
- > - **MCP config** (`env` in mcp.json) only applies to the MCP server process launched by Cursor/Claude Code
171
- > - **CLI commands** (`trie-agent scan`, `trie-agent watch`) need the key in your shell environment (via `.env.local` or `export`)
172
- > - The MCP server and CLI are separate processes with separate environments
149
+ ### Custom Agent Tools
173
150
 
174
- When AI is enabled, you'll see:
175
- - `AI-powered analysis enabled` in output
176
- - `[AI VALIDATED]` and `[AI FOUND]` tags on issues
177
- - Richer fix recommendations
151
+ | Tool | Description |
152
+ |------|-------------|
153
+ | `trie_create_agent` | Create a custom agent from a PDF, TXT, or MD document |
154
+ | `trie_save_agent` | Save a custom agent configuration |
155
+ | `trie_list_agents` | List all registered agents (built-in and custom) |
156
+
157
+ ### Individual Agent Tools
158
+
159
+ Run a specific agent directly:
160
+
161
+ | Tool | What It Catches |
162
+ |------|-----------------|
163
+ | `trie_security` | SQL injection, XSS, hardcoded secrets, auth bypasses, OWASP Top 10 |
164
+ | `trie_privacy` | GDPR/CCPA/PCI-DSS compliance, PII exposure, logging sensitive data |
165
+ | `trie_soc2` | Access control gaps, missing audit logs, encryption issues |
166
+ | `trie_legal` | HIPAA/COPPA compliance, consent patterns, data retention |
167
+ | `trie_accessibility` | WCAG 2.1 compliance, keyboard nav, screen readers, color contrast |
168
+ | `trie_architecture` | Code organization, SOLID principles, N+1 queries, scalability |
169
+ | `trie_bugs` | Null safety, edge cases, async issues, common bugs |
170
+ | `trie_types` | Type errors, missing annotations, null checks |
171
+ | `trie_devops` | Config issues, logging, environment variables, deployment patterns |
172
+ | `trie_clean` | Clean up AI-generated code: find vibe-coded patterns and quick fixes |
173
+ | `trie_design` | Awwwards-level polish, design systems, motion design |
174
+ | `trie_ux` | Simulate happy path, security tester, confused user, impatient user |
178
175
 
179
176
  ---
180
177
 
181
178
  ## CLI
182
179
 
183
- Trie includes a CLI for terminal-based scanning and CI/CD integration. The CLI generates reports with actionable issues—it does not auto-fix code. Use Cursor or Claude Code to apply fixes based on the reports.
180
+ Trie includes a CLI for terminal-based scanning and CI/CD integration.
184
181
 
185
- > **Note:** The CLI is separate from MCP tools. Use MCP tools (`trie_scan`, `trie_watch`) when working inside Cursor/Claude Code. Use the CLI (`trie-agent scan`, `trie-agent watch`) for terminal/CI usage.
182
+ > **Note:** The CLI is separate from MCP tools. Use MCP tools (`trie_scan`, `trie_watch`) when working inside Cursor/Claude Code. Use the CLI for terminal/CI usage.
186
183
 
187
184
  ### Commands
188
185
 
189
186
  ```bash
187
+ # List available commands
188
+ trie-agent help
189
+
190
190
  # Basic scan (generates report and exits)
191
191
  trie-agent scan
192
192
 
@@ -204,6 +204,9 @@ trie-agent scan --agents security,privacy,bugs
204
204
 
205
205
  # Output JSON report
206
206
  trie-agent scan --format json --output report.json
207
+
208
+ # List all available agents
209
+ trie-agent agents
207
210
  ```
208
211
 
209
212
  ### CLI vs MCP Tools
@@ -214,27 +217,160 @@ trie-agent scan --format json --output report.json
214
217
  | **Terminal/CI** | CLI (`trie-agent scan`, `trie-agent watch`) | Running from terminal, CI pipelines, scripts |
215
218
  | **VS Code** | VS Code extension | Using VS Code (not Cursor/Claude Code) |
216
219
 
217
- Both generate the same reports—they're just different interfaces to the same scanning engine.
220
+ ---
221
+
222
+ ## Built-in Agents
223
+
224
+ ### Security & Compliance (4 agents)
225
+
226
+ | Agent | Description |
227
+ |-------|-------------|
228
+ | **Security** | SQL injection, XSS, hardcoded secrets, auth bypasses, OWASP Top 10 |
229
+ | **Privacy** | GDPR/CCPA/PCI-DSS compliance, PII exposure, data encryption |
230
+ | **SOC 2** | Access control gaps, missing audit logs, encryption, secrets management |
231
+ | **Legal** | HIPAA/COPPA compliance, consent patterns, data retention |
232
+
233
+ ### Code Quality (6 agents)
234
+
235
+ | Agent | Description |
236
+ |-------|-------------|
237
+ | **TypeCheck** | Type errors, missing annotations, null checks |
238
+ | **Bug Finding** | Null safety, edge cases, async issues, race conditions |
239
+ | **Software Architect** | Code organization, SOLID principles, N+1 queries, scalability |
240
+ | **Test** | Missing test coverage, test quality, edge case coverage |
241
+ | **Performance** | Memory leaks, inefficient algorithms, bundle size |
242
+ | **Trie Clean** | Clean up AI-generated "vibe code": find common mistakes and quick fixes |
243
+
244
+ ### UI/UX (5 agents)
245
+
246
+ | Agent | Description |
247
+ |-------|-------------|
248
+ | **Accessibility** | WCAG 2.1 compliance, keyboard nav, screen readers, color contrast |
249
+ | **Design Engineer** | Awwwards-level polish, design systems, motion design, creative CSS |
250
+ | **User Testing** | Simulate happy path, security tester, confused user, impatient user |
251
+ | **Visual QA** | Visual regression, responsive design, cross-browser issues |
252
+ | **E2E** | End-to-end test coverage, user flow validation |
253
+
254
+ ### Operations (3 agents)
255
+
256
+ | Agent | Description |
257
+ |-------|-------------|
258
+ | **DevOps** | Config issues, logging, environment variables, deployment patterns |
259
+ | **Data Flow** | Data flow analysis, state management, API contracts |
260
+ | **Comprehension** | Plain language explanations for non-technical stakeholders |
218
261
 
219
262
  ---
220
263
 
221
- ## How It Works
264
+ ## Special Agents
222
265
 
223
- Trie generates **actionable reports** with high-confidence issues. It does not auto-fix code. Instead:
266
+ These agents are **manually invoked**—they don't run during `trie_scan`.
224
267
 
225
- 1. **Trie scans** your code and generates a report with prioritized issues
226
- 2. **You review** the issues in the report (or share with Cursor/Claude Code)
227
- 3. **You (or Cursor/Claude Code)** apply fixes based on Trie's recommendations
268
+ ### Super Reviewer
269
+
270
+ Interactive PR reviews: walks through changes file-by-file with AI guidance.
228
271
 
229
- This keeps you in control while providing comprehensive issue detection. Trie focuses on **finding and reporting** issues—you decide how to fix them.
272
+ ```
273
+ Run trie_super_reviewer on this PR
274
+ ```
275
+
276
+ ### Agent Smith
277
+
278
+ The ultimate AI code enforcer—43 specialized hunters targeting AI-generated anti-patterns. Runs a swarm of sub-agents to find "vibe-coded" patterns.
279
+
280
+ ```
281
+ Run trie_agent_smith on this codebase
282
+ ```
230
283
 
231
284
  ---
232
285
 
233
- ## CI/CD Integration
286
+ ## Custom Agents
287
+
288
+ Create your own agents from PDFs, style guides, or documentation.
234
289
 
235
- Trie integrates seamlessly with GitHub Actions for automated security scanning.
290
+ ### Create a Custom Agent
236
291
 
237
- ### Quick Setup
292
+ ```
293
+ Create a custom agent from my-style-guide.pdf called "brand_guidelines"
294
+ ```
295
+
296
+ Or use the MCP tool directly:
297
+
298
+ ```
299
+ trie_create_agent with filePath: "./docs/style-guide.pdf", agentName: "brand_guidelines"
300
+ ```
301
+
302
+ ### How It Works
303
+
304
+ 1. **Parse** — Trie extracts text from your document (PDF, TXT, MD)
305
+ 2. **Compress** — AI distills the document into actionable rules
306
+ 3. **Register** — The agent is saved to `.trie/agents/` and loaded automatically
307
+
308
+ ### List Custom Agents
309
+
310
+ ```
311
+ trie_list_agents
312
+ ```
313
+
314
+ Custom agents are stored in `.trie/agents/` in your project directory.
315
+
316
+ ---
317
+
318
+ ## AI-Enhanced Mode
319
+
320
+ Trie works in two modes:
321
+
322
+ | Mode | Description |
323
+ |------|-------------|
324
+ | **Pattern-Only** (default) | Fast regex matching for specific patterns (exposed secrets, async forEach, etc.). Limited coverage. |
325
+ | **AI-Enhanced** | Full analysis: pattern detection + AI validation + deeper issue discovery. **Recommended.** |
326
+
327
+ ### Enable AI Mode
328
+
329
+ **For MCP usage (Cursor/Claude Code):**
330
+
331
+ Add the API key to your MCP configuration:
332
+
333
+ ```json
334
+ {
335
+ "mcpServers": {
336
+ "Trie": {
337
+ "command": "npx",
338
+ "args": ["@triedotdev/mcp"],
339
+ "env": {
340
+ "ANTHROPIC_API_KEY": "sk-ant-..."
341
+ }
342
+ }
343
+ }
344
+ }
345
+ ```
346
+
347
+ **For CLI usage (terminal/CI):**
348
+
349
+ Add the API key to your project's `.env.local` file:
350
+
351
+ ```bash
352
+ echo 'ANTHROPIC_API_KEY=sk-ant-...' >> .env.local
353
+ ```
354
+
355
+ Then load it before running CLI commands:
356
+
357
+ ```bash
358
+ set -a; source .env.local; set +a
359
+ trie-agent scan
360
+ ```
361
+
362
+ > **Important:** MCP config only applies to the MCP server. CLI commands need the key in your shell environment.
363
+
364
+ When AI is enabled, you'll see:
365
+ - `AI-powered analysis enabled` in output
366
+ - `[AI VALIDATED]` and `[AI FOUND]` tags on issues
367
+ - Richer fix recommendations
368
+
369
+ ---
370
+
371
+ ## CI/CD Integration
372
+
373
+ ### GitHub Actions
238
374
 
239
375
  Copy the workflow files to your repo:
240
376
 
@@ -245,19 +381,15 @@ cp node_modules/@triedotdev/mcp/.github/workflows/trie-*.yml .github/workflows/
245
381
 
246
382
  ### Available Workflows
247
383
 
248
- #### Full Security Scan (`trie-security-scan.yml`)
249
-
250
- Runs on push to `main`/`develop`, PRs, and daily schedule (2 AM UTC).
251
-
252
- **Features:**
384
+ **Full Security Scan** (`trie-security-scan.yml`)
385
+ - Runs on push to `main`/`develop`, PRs, and daily schedule
253
386
  - Runs security agents: `security`, `privacy`, `soc2`, `legal`
254
387
  - Uploads SARIF to GitHub Security tab
255
388
  - Comments on PRs with summary
256
389
  - Fails build on critical issues
257
390
 
258
- #### Pre-commit Checks (`trie-pre-commit.yml`)
259
-
260
- Runs on every PR—fast, incremental scanning.
391
+ **Pre-commit Checks** (`trie-pre-commit.yml`)
392
+ - Runs on every PR—fast, incremental scanning
261
393
 
262
394
  ---
263
395
 
@@ -265,32 +397,32 @@ Runs on every PR—fast, incremental scanning.
265
397
 
266
398
  Native VS Code extension with inline diagnostics and quick fixes.
267
399
 
268
- ---
269
-
270
- ## Built-in Agents
271
-
272
- ### Security & Compliance
273
-
274
- | Agent | Command | What It Catches |
275
- |-------|---------|-----------------|
276
- | **Security** | `trie_security` | SQL injection, XSS, hardcoded secrets, auth bypasses, OWASP Top 10 |
277
- | **Privacy** | `trie_privacy` | GDPR/CCPA/PCI-DSS compliance, data exposure, logging sensitive data |
278
- | **SOC 2** | `trie_soc2` | Access control gaps, missing audit logs, encryption issues |
279
- | **Legal** | `trie_legal` | HIPAA/COPPA compliance, consent patterns, data retention |
400
+ ### Features
401
+ - Inline diagnostics from Trie scans
402
+ - Quick-fix code actions
403
+ - Scan on save
404
+ - Status bar integration
280
405
 
281
406
  ---
282
407
 
283
- ## Special Agents
284
-
285
- These agents are **manually invoked**—they don't run during `trie_scan`.
408
+ ## Configuration
286
409
 
287
- ### Super Reviewer
410
+ ### Scan Options
288
411
 
289
- Interactive PR reviews: walks through changes file-by-file with AI guidance.
412
+ | Option | Description | Default |
413
+ |--------|-------------|---------|
414
+ | `parallel` | Run agents in parallel | `true` |
415
+ | `cache` | Enable result caching | `true` |
416
+ | `maxConcurrency` | Max parallel agents | `4` |
417
+ | `timeoutMs` | Agent timeout in milliseconds | `120000` |
418
+ | `streaming` | Stream progress updates | `true` |
419
+ | `workers` | Use worker threads | `true` |
290
420
 
291
- ### Agent Smith
421
+ ### Example
292
422
 
293
- The ultimate AI code enforcer—43 specialized hunters targeting AI-generated anti-patterns.
423
+ ```
424
+ trie_scan with parallel: true, cache: true, maxConcurrency: 8
425
+ ```
294
426
 
295
427
  ---
296
428