@vibekiln/cutline-mcp-cli 0.4.3 → 0.4.4
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/dist/commands/init.js
CHANGED
|
@@ -94,7 +94,7 @@ Skip: Pure styling, docs, formatting, non-security dep bumps.
|
|
|
94
94
|
## Magic Phrase
|
|
95
95
|
|
|
96
96
|
If the user invokes Cutline naturally (for example: **"use cutline"**, **"use cutline to..."**, **"using cutline..."**, **"with cutline..."**), route automatically based on tier and intent:
|
|
97
|
-
- Free/default intent: run \`code_audit(project_root)\`
|
|
97
|
+
- Free/default intent: run \`code_audit(project_root)\` (aka "security vibe check")
|
|
98
98
|
- Premium product-linked intent: run \`engineering_audit(product_id, project_root)\`
|
|
99
99
|
- Feature implementation intent: run \`rgr_plan(...)\` then \`constraints_auto(...)\`
|
|
100
100
|
`;
|
|
@@ -109,7 +109,7 @@ alwaysApply: true
|
|
|
109
109
|
|
|
110
110
|
# Cutline Constraints
|
|
111
111
|
|
|
112
|
-
Run \`code_audit(project_root)\` before major implementations to check constraint coverage.
|
|
112
|
+
Run \`code_audit(project_root)\` before major implementations to run a security vibe check on constraint coverage.
|
|
113
113
|
|
|
114
114
|
Severity levels:
|
|
115
115
|
- **CRITICAL**: Must address before proceeding
|
|
@@ -184,7 +184,7 @@ Skip for: pure styling, docs, formatting, non-security dep bumps.
|
|
|
184
184
|
## Magic Phrase
|
|
185
185
|
|
|
186
186
|
If the user invokes Cutline naturally (for example: **"use cutline"**, **"use cutline to..."**, **"using cutline..."**, **"with cutline..."**), route automatically based on tier and intent:
|
|
187
|
-
- Free/default intent: \`code_audit(project_root)\`
|
|
187
|
+
- Free/default intent: \`code_audit(project_root)\` (aka "security vibe check")
|
|
188
188
|
- Premium product-linked intent: \`engineering_audit(product_id, project_root)\`
|
|
189
189
|
- Feature implementation intent: \`rgr_plan(...)\` then \`constraints_auto(...)\`
|
|
190
190
|
`;
|
package/dist/commands/setup.js
CHANGED
|
@@ -392,8 +392,8 @@ export async function setupCommand(options) {
|
|
|
392
392
|
{ cmd: 'use cutline', desc: 'Magic phrase (also works with "use cutline to...", "using cutline...", "with cutline...") — Cutline infers intent and routes to the right flow' },
|
|
393
393
|
{ cmd: 'Run a deep dive on my product idea', desc: 'Pre-mortem analysis — risks, assumptions, experiments' },
|
|
394
394
|
{ cmd: 'Plan this feature with constraints from my product', desc: 'RGR plan — constraint-aware implementation roadmap' },
|
|
395
|
-
{ cmd: 'Run a
|
|
396
|
-
{ cmd: 'Run an engineering
|
|
395
|
+
{ cmd: 'Run a security vibe check on this codebase', desc: 'Free security vibe check (`code_audit`) — security, reliability, and scalability (generic, not product-linked)' },
|
|
396
|
+
{ cmd: 'Run an engineering vibe check for my product', desc: 'Premium deep vibe check (`engineering_audit`) — product-linked analysis + RGR remediation plan' },
|
|
397
397
|
{ cmd: 'Check constraints for src/api/upload.ts', desc: 'Get NFR boundaries for a specific file' },
|
|
398
398
|
{ cmd: 'Generate .cutline.md for my product', desc: 'Write the constraint routing engine' },
|
|
399
399
|
{ cmd: 'What does my persona think about X?', desc: 'AI persona feedback on features' },
|
|
@@ -407,7 +407,7 @@ export async function setupCommand(options) {
|
|
|
407
407
|
else {
|
|
408
408
|
const items = [
|
|
409
409
|
{ cmd: 'use cutline', desc: 'Magic phrase (also works with "use cutline to...", "using cutline...", "with cutline...") — Cutline routes to the highest-value free flow for your intent' },
|
|
410
|
-
{ cmd: 'Run a
|
|
410
|
+
{ cmd: 'Run a security vibe check on this codebase', desc: 'Free security vibe check (`code_audit`) — security, reliability, and scalability scan (3/month free)' },
|
|
411
411
|
{ cmd: 'Explore a product idea', desc: 'Free 6-act discovery flow to identify pain points and opportunities' },
|
|
412
412
|
{ cmd: 'Continue my exploration session', desc: 'Resume and refine an existing free exploration conversation' },
|
|
413
413
|
];
|
|
@@ -8106,7 +8106,7 @@ server.setRequestHandler(ListToolsRequestSchema, async () => {
|
|
|
8106
8106
|
},
|
|
8107
8107
|
{
|
|
8108
8108
|
name: "code_audit",
|
|
8109
|
-
description: "\u{1F513} FREE -
|
|
8109
|
+
description: "\u{1F513} FREE - Security vibe check (code audit). Evaluates your codebase against a stack-aware constraint graph covering security, reliability, and scalability. No deep dive or product_id required \u2014 just point at your codebase. Shows aggregate readiness scores and top critical findings; detailed analysis and remediation require Premium. Requires a Cutline account (free). 3 scans/month.",
|
|
8110
8110
|
inputSchema: {
|
|
8111
8111
|
type: "object",
|
|
8112
8112
|
properties: {
|
|
@@ -8119,7 +8119,7 @@ server.setRequestHandler(ListToolsRequestSchema, async () => {
|
|
|
8119
8119
|
},
|
|
8120
8120
|
{
|
|
8121
8121
|
name: "engineering_audit",
|
|
8122
|
-
description: "\u{1F512} PREMIUM - Engineering audit for your product. Security-focused deep audit that scans local code, cross-references the product constraint graph, extracts security gaps, builds an RGR remediation plan, and optionally queues a deep dive job.",
|
|
8122
|
+
description: "\u{1F512} PREMIUM - Engineering vibe check (engineering audit) for your product. Security-focused deep audit that scans local code, cross-references the product constraint graph, extracts security gaps, builds an RGR remediation plan, and optionally queues a deep dive job.",
|
|
8123
8123
|
inputSchema: {
|
|
8124
8124
|
type: "object",
|
|
8125
8125
|
properties: {
|
package/package.json
CHANGED