figmanage 1.2.0 → 1.2.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/mcp.js +13 -0
- package/dist/operations/compound-manager.js +3 -2
- package/dist/setup.js +21 -285
- package/package.json +3 -3
package/dist/mcp.js
CHANGED
|
@@ -1,4 +1,5 @@
|
|
|
1
1
|
import { createServer } from 'node:http';
|
|
2
|
+
import { randomBytes } from 'node:crypto';
|
|
2
3
|
import { McpServer } from '@modelcontextprotocol/sdk/server/mcp.js';
|
|
3
4
|
import { StdioServerTransport } from '@modelcontextprotocol/sdk/server/stdio.js';
|
|
4
5
|
import { StreamableHTTPServerTransport } from '@modelcontextprotocol/sdk/server/streamableHttp.js';
|
|
@@ -75,12 +76,24 @@ export async function startMcpServer() {
|
|
|
75
76
|
registerTools(server, config, enabledToolsets, readOnly);
|
|
76
77
|
const httpPort = parseHttpPort(process.argv);
|
|
77
78
|
if (httpPort) {
|
|
79
|
+
// Bearer token auth for HTTP transport
|
|
80
|
+
let httpToken = process.env.FIGMA_HTTP_TOKEN || '';
|
|
81
|
+
if (!httpToken) {
|
|
82
|
+
httpToken = randomBytes(32).toString('hex');
|
|
83
|
+
console.error(`Generated HTTP bearer token: ${httpToken}`);
|
|
84
|
+
console.error('Set FIGMA_HTTP_TOKEN to use a fixed token.');
|
|
85
|
+
}
|
|
78
86
|
const transport = new StreamableHTTPServerTransport({
|
|
79
87
|
sessionIdGenerator: undefined,
|
|
80
88
|
});
|
|
81
89
|
const httpServer = createServer(async (req, res) => {
|
|
82
90
|
const url = new URL(req.url ?? '/', `http://localhost:${httpPort}`);
|
|
83
91
|
if (url.pathname === '/mcp') {
|
|
92
|
+
const auth = req.headers.authorization || '';
|
|
93
|
+
if (auth !== `Bearer ${httpToken}`) {
|
|
94
|
+
res.writeHead(401).end('Unauthorized');
|
|
95
|
+
return;
|
|
96
|
+
}
|
|
84
97
|
await transport.handleRequest(req, res);
|
|
85
98
|
}
|
|
86
99
|
else {
|
|
@@ -460,6 +460,7 @@ export async function quarterlyDesignOpsReport(config, params) {
|
|
|
460
460
|
}),
|
|
461
461
|
]);
|
|
462
462
|
// Paginate all members (cursor-based, max 500)
|
|
463
|
+
const errors = [];
|
|
463
464
|
const allMembers = [];
|
|
464
465
|
let cursor;
|
|
465
466
|
const maxPages = 20;
|
|
@@ -478,7 +479,8 @@ export async function quarterlyDesignOpsReport(config, params) {
|
|
|
478
479
|
if (!cursor || batch.length < 25)
|
|
479
480
|
break;
|
|
480
481
|
}
|
|
481
|
-
catch {
|
|
482
|
+
catch (e) {
|
|
483
|
+
errors.push(`members: pagination stopped at page ${page} (${e.response?.status || e.message})`);
|
|
482
484
|
break;
|
|
483
485
|
}
|
|
484
486
|
}
|
|
@@ -515,7 +517,6 @@ export async function quarterlyDesignOpsReport(config, params) {
|
|
|
515
517
|
: 0;
|
|
516
518
|
// Billing
|
|
517
519
|
let billing = null;
|
|
518
|
-
const errors = [];
|
|
519
520
|
if (ratesResult.status === 'fulfilled') {
|
|
520
521
|
const prices = ratesResult.value.data?.meta?.product_prices || [];
|
|
521
522
|
const seatProducts = new Set(['expert', 'developer', 'collaborator']);
|
package/dist/setup.js
CHANGED
|
@@ -1,279 +1,14 @@
|
|
|
1
1
|
#!/usr/bin/env node
|
|
2
|
-
import {
|
|
3
|
-
import {
|
|
4
|
-
import { copyFileSync, unlinkSync, mkdtempSync, mkdirSync, existsSync, rmdirSync, readFileSync, writeFileSync } from 'fs';
|
|
2
|
+
import { execFileSync } from 'child_process';
|
|
3
|
+
import { mkdirSync, existsSync, readFileSync, writeFileSync } from 'fs';
|
|
5
4
|
import { join } from 'path';
|
|
6
|
-
import {
|
|
7
|
-
import
|
|
8
|
-
const COOKIE_NAME = '__Host-figma.authn';
|
|
9
|
-
// --- Platform-specific Chrome paths ---
|
|
10
|
-
function getChromePaths() {
|
|
11
|
-
switch (platform()) {
|
|
12
|
-
case 'darwin':
|
|
13
|
-
return [join(homedir(), 'Library/Application Support/Google/Chrome')];
|
|
14
|
-
case 'linux':
|
|
15
|
-
return [
|
|
16
|
-
join(homedir(), '.config/google-chrome'),
|
|
17
|
-
join(homedir(), '.config/chromium'),
|
|
18
|
-
];
|
|
19
|
-
case 'win32': {
|
|
20
|
-
const localAppData = process.env.LOCALAPPDATA || join(homedir(), 'AppData/Local');
|
|
21
|
-
return [join(localAppData, 'Google/Chrome/User Data')];
|
|
22
|
-
}
|
|
23
|
-
default:
|
|
24
|
-
return [];
|
|
25
|
-
}
|
|
26
|
-
}
|
|
27
|
-
// --- Chrome profile discovery ---
|
|
28
|
-
function findChromeProfiles() {
|
|
29
|
-
const chromePaths = getChromePaths();
|
|
30
|
-
const profiles = [];
|
|
31
|
-
for (const base of chromePaths) {
|
|
32
|
-
if (!existsSync(base))
|
|
33
|
-
continue;
|
|
34
|
-
const defaultProfile = join(base, 'Default');
|
|
35
|
-
if (existsSync(join(defaultProfile, 'Cookies')))
|
|
36
|
-
profiles.push(defaultProfile);
|
|
37
|
-
for (let i = 1; i <= 20; i++) {
|
|
38
|
-
const profile = join(base, `Profile ${i}`);
|
|
39
|
-
if (existsSync(join(profile, 'Cookies')))
|
|
40
|
-
profiles.push(profile);
|
|
41
|
-
}
|
|
42
|
-
}
|
|
43
|
-
if (profiles.length === 0)
|
|
44
|
-
throw new Error('No Chrome profiles with Cookies found.');
|
|
45
|
-
return profiles;
|
|
46
|
-
}
|
|
47
|
-
// --- macOS cookie decryption ---
|
|
48
|
-
function getMacDecryptionKey() {
|
|
49
|
-
const password = execFileSync('security', ['find-generic-password', '-w', '-s', 'Chrome Safe Storage'], { encoding: 'utf-8', stdio: ['pipe', 'pipe', 'pipe'] }).trim();
|
|
50
|
-
return pbkdf2Sync(password, 'saltysalt', 1003, 16, 'sha1');
|
|
51
|
-
}
|
|
52
|
-
// --- Linux cookie decryption ---
|
|
53
|
-
function getLinuxDecryptionKey() {
|
|
54
|
-
// Try GNOME Keyring first via secret-tool
|
|
55
|
-
try {
|
|
56
|
-
const password = execSync('secret-tool lookup application chrome', { encoding: 'utf-8', stdio: ['pipe', 'pipe', 'pipe'] }).trim();
|
|
57
|
-
if (password)
|
|
58
|
-
return pbkdf2Sync(password, 'saltysalt', 1, 16, 'sha1');
|
|
59
|
-
}
|
|
60
|
-
catch {
|
|
61
|
-
// secret-tool not available or no entry
|
|
62
|
-
}
|
|
63
|
-
// Fall back to default Chrome password
|
|
64
|
-
return pbkdf2Sync('peanuts', 'saltysalt', 1, 16, 'sha1');
|
|
65
|
-
}
|
|
66
|
-
// --- Windows cookie decryption ---
|
|
67
|
-
function getWindowsDecryptionKey(chromeBase) {
|
|
68
|
-
const localStatePath = join(chromeBase, 'Local State');
|
|
69
|
-
if (!existsSync(localStatePath)) {
|
|
70
|
-
throw new Error('Chrome Local State file not found. Cannot decrypt cookies on Windows.');
|
|
71
|
-
}
|
|
72
|
-
const localState = JSON.parse(readFileSync(localStatePath, 'utf-8'));
|
|
73
|
-
const encryptedKeyB64 = localState?.os_crypt?.encrypted_key;
|
|
74
|
-
if (!encryptedKeyB64) {
|
|
75
|
-
throw new Error('No encrypted_key in Chrome Local State.');
|
|
76
|
-
}
|
|
77
|
-
// The key is base64-encoded, with a 'DPAPI' prefix (5 bytes) before the actual DPAPI blob
|
|
78
|
-
const encryptedKey = Buffer.from(encryptedKeyB64, 'base64');
|
|
79
|
-
if (encryptedKey.toString('utf-8', 0, 5) !== 'DPAPI') {
|
|
80
|
-
throw new Error('Unexpected encrypted_key format (missing DPAPI prefix).');
|
|
81
|
-
}
|
|
82
|
-
const dpapiBlob = encryptedKey.slice(5).toString('base64');
|
|
83
|
-
// Use PowerShell to call DPAPI Unprotect
|
|
84
|
-
const psScript = `
|
|
85
|
-
Add-Type -AssemblyName System.Security
|
|
86
|
-
$blob = [Convert]::FromBase64String('${dpapiBlob}')
|
|
87
|
-
$dec = [Security.Cryptography.ProtectedData]::Unprotect($blob, $null, [Security.Cryptography.DataProtectionScope]::CurrentUser)
|
|
88
|
-
[Convert]::ToBase64String($dec)
|
|
89
|
-
`.trim().replace(/\n/g, '; ');
|
|
90
|
-
const decryptedB64 = execSync(`powershell -NoProfile -NonInteractive -Command "${psScript}"`, { encoding: 'utf-8', stdio: ['pipe', 'pipe', 'pipe'] }).trim();
|
|
91
|
-
return Buffer.from(decryptedB64, 'base64');
|
|
92
|
-
}
|
|
93
|
-
// --- Decryption ---
|
|
94
|
-
function decryptCBC(encrypted, key) {
|
|
95
|
-
// v10 prefix = Chrome AES-128-CBC encryption (macOS and Linux)
|
|
96
|
-
if (encrypted.length > 3 && encrypted[0] === 0x76 && encrypted[1] === 0x31 && encrypted[2] === 0x30) {
|
|
97
|
-
const iv = Buffer.alloc(16, 0x20); // Chrome uses space (0x20) as IV
|
|
98
|
-
const decipher = createDecipheriv('aes-128-cbc', key, iv);
|
|
99
|
-
const decrypted = Buffer.concat([decipher.update(encrypted.slice(3)), decipher.final()]);
|
|
100
|
-
// Chrome may prepend binary metadata before the cookie value.
|
|
101
|
-
// The actual cookie is URL-encoded JSON starting with %7B or raw JSON starting with {
|
|
102
|
-
const str = decrypted.toString('binary');
|
|
103
|
-
const jsonStart = str.indexOf('%7B');
|
|
104
|
-
if (jsonStart >= 0)
|
|
105
|
-
return str.slice(jsonStart);
|
|
106
|
-
const rawJsonStart = str.indexOf('{');
|
|
107
|
-
if (rawJsonStart >= 0)
|
|
108
|
-
return str.slice(rawJsonStart);
|
|
109
|
-
throw new Error('Decrypted cookie data does not contain expected JSON value');
|
|
110
|
-
}
|
|
111
|
-
return encrypted.toString('utf-8');
|
|
112
|
-
}
|
|
113
|
-
function decryptWindows(encrypted, key) {
|
|
114
|
-
// Windows Chrome uses AES-256-GCM with v10 prefix
|
|
115
|
-
// Format: v10 (3 bytes) + nonce (12 bytes) + ciphertext + tag (16 bytes)
|
|
116
|
-
if (encrypted.length > 3 && encrypted[0] === 0x76 && encrypted[1] === 0x31 && encrypted[2] === 0x30) {
|
|
117
|
-
const nonce = encrypted.slice(3, 15);
|
|
118
|
-
const ciphertextWithTag = encrypted.slice(15);
|
|
119
|
-
const tag = ciphertextWithTag.slice(ciphertextWithTag.length - 16);
|
|
120
|
-
const ciphertext = ciphertextWithTag.slice(0, ciphertextWithTag.length - 16);
|
|
121
|
-
const decipher = createDecipheriv('aes-256-gcm', key, nonce);
|
|
122
|
-
decipher.setAuthTag(tag);
|
|
123
|
-
const decrypted = Buffer.concat([decipher.update(ciphertext), decipher.final()]);
|
|
124
|
-
const str = decrypted.toString('utf-8');
|
|
125
|
-
const jsonStart = str.indexOf('%7B');
|
|
126
|
-
if (jsonStart >= 0)
|
|
127
|
-
return str.slice(jsonStart);
|
|
128
|
-
const rawJsonStart = str.indexOf('{');
|
|
129
|
-
if (rawJsonStart >= 0)
|
|
130
|
-
return str.slice(rawJsonStart);
|
|
131
|
-
throw new Error('Decrypted cookie data does not contain expected JSON value');
|
|
132
|
-
}
|
|
133
|
-
return encrypted.toString('utf-8');
|
|
134
|
-
}
|
|
135
|
-
// --- Cookie extraction ---
|
|
136
|
-
function extractCookie(profilePath) {
|
|
137
|
-
const cookiesDb = join(profilePath, 'Cookies');
|
|
138
|
-
const tmpDir = mkdtempSync(join(tmpdir(), 'figmanage-'));
|
|
139
|
-
const tmpDb = join(tmpDir, 'Cookies');
|
|
140
|
-
// Copy DB + WAL/SHM (Chrome locks the original)
|
|
141
|
-
copyFileSync(cookiesDb, tmpDb);
|
|
142
|
-
for (const ext of ['-wal', '-shm']) {
|
|
143
|
-
const src = cookiesDb + ext;
|
|
144
|
-
if (existsSync(src))
|
|
145
|
-
copyFileSync(src, tmpDb + ext);
|
|
146
|
-
}
|
|
147
|
-
try {
|
|
148
|
-
// Query for the auth cookie -- could be on figma.com or www.figma.com
|
|
149
|
-
const sqliteBin = platform() === 'win32' ? 'sqlite3.exe' : 'sqlite3';
|
|
150
|
-
const hex = execSync(`${sqliteBin} "${tmpDb}" "SELECT hex(encrypted_value) FROM cookies WHERE name = '${COOKIE_NAME}' AND host_key LIKE '%figma.com' ORDER BY last_access_utc DESC LIMIT 1;"`, { encoding: 'utf-8' }).trim();
|
|
151
|
-
if (!hex)
|
|
152
|
-
throw new Error(`No ${COOKIE_NAME} cookie found. Are you logged into figma.com in Chrome?`);
|
|
153
|
-
const encrypted = Buffer.from(hex, 'hex');
|
|
154
|
-
const os = platform();
|
|
155
|
-
if (os === 'darwin') {
|
|
156
|
-
const key = getMacDecryptionKey();
|
|
157
|
-
return decryptCBC(encrypted, key);
|
|
158
|
-
}
|
|
159
|
-
else if (os === 'linux') {
|
|
160
|
-
const key = getLinuxDecryptionKey();
|
|
161
|
-
return decryptCBC(encrypted, key);
|
|
162
|
-
}
|
|
163
|
-
else if (os === 'win32') {
|
|
164
|
-
// Derive the chrome base from the profile path (go up one level from Default/Profile N)
|
|
165
|
-
const chromeBase = join(profilePath, '..');
|
|
166
|
-
const key = getWindowsDecryptionKey(chromeBase);
|
|
167
|
-
return decryptWindows(encrypted, key);
|
|
168
|
-
}
|
|
169
|
-
throw new Error(`Unsupported platform: ${os}`);
|
|
170
|
-
}
|
|
171
|
-
finally {
|
|
172
|
-
for (const f of [tmpDb, tmpDb + '-wal', tmpDb + '-shm']) {
|
|
173
|
-
try {
|
|
174
|
-
unlinkSync(f);
|
|
175
|
-
}
|
|
176
|
-
catch { }
|
|
177
|
-
}
|
|
178
|
-
try {
|
|
179
|
-
rmdirSync(tmpDir);
|
|
180
|
-
}
|
|
181
|
-
catch { }
|
|
182
|
-
}
|
|
183
|
-
}
|
|
184
|
-
// --- Figma API validation ---
|
|
185
|
-
function parseCookieValue(raw) {
|
|
186
|
-
// Cookie value is JSON: {"userId":"token"} (may be URL-encoded)
|
|
187
|
-
let decoded = raw;
|
|
188
|
-
try {
|
|
189
|
-
decoded = decodeURIComponent(raw);
|
|
190
|
-
}
|
|
191
|
-
catch { }
|
|
192
|
-
try {
|
|
193
|
-
const parsed = JSON.parse(decoded);
|
|
194
|
-
const entries = Object.entries(parsed);
|
|
195
|
-
if (entries.length === 0)
|
|
196
|
-
throw new Error('Empty cookie JSON');
|
|
197
|
-
const [userId, token] = entries[0];
|
|
198
|
-
return { userId, token, cookieValue: raw };
|
|
199
|
-
}
|
|
200
|
-
catch {
|
|
201
|
-
throw new Error('Unexpected cookie format. Expected URL-encoded JSON with userId field.');
|
|
202
|
-
}
|
|
203
|
-
}
|
|
204
|
-
async function validateSession(cookieValue, userId) {
|
|
205
|
-
const headers = {
|
|
206
|
-
'Cookie': `${COOKIE_NAME}=${cookieValue}`,
|
|
207
|
-
'X-CSRF-Bypass': 'yes',
|
|
208
|
-
'X-Figma-User-Id': userId,
|
|
209
|
-
};
|
|
210
|
-
const res = await axios.get('https://www.figma.com/api/user/state', {
|
|
211
|
-
headers,
|
|
212
|
-
timeout: 15000,
|
|
213
|
-
});
|
|
214
|
-
if (res.data?.error !== false)
|
|
215
|
-
throw new Error('Session invalid');
|
|
216
|
-
const meta = res.data.meta || {};
|
|
217
|
-
const teams = (meta.teams || []).map((t) => ({ id: String(t.id), name: t.name }));
|
|
218
|
-
const orgs = (meta.orgs || []).map((o) => ({ id: String(o.id), name: o.name }));
|
|
219
|
-
// Try to find org_id: check orgs array, team_users, or follow the recents redirect
|
|
220
|
-
let orgId = '';
|
|
221
|
-
if (orgs.length > 0) {
|
|
222
|
-
orgId = orgs[0].id;
|
|
223
|
-
}
|
|
224
|
-
else {
|
|
225
|
-
// Figma redirects /files/recents-and-sharing to /files/{org_id}/recents-and-sharing
|
|
226
|
-
try {
|
|
227
|
-
const redirect = await axios.get('https://www.figma.com/files/recents-and-sharing', {
|
|
228
|
-
headers,
|
|
229
|
-
maxRedirects: 0,
|
|
230
|
-
validateStatus: (s) => s >= 200 && s < 400,
|
|
231
|
-
timeout: 10000,
|
|
232
|
-
});
|
|
233
|
-
// Check final URL for org_id pattern: /files/{org_id}/
|
|
234
|
-
const finalUrl = redirect.request?.res?.responseUrl || redirect.headers?.location || '';
|
|
235
|
-
const match = finalUrl.match(/\/files\/(\d+)\//);
|
|
236
|
-
if (match)
|
|
237
|
-
orgId = match[1];
|
|
238
|
-
}
|
|
239
|
-
catch (e) {
|
|
240
|
-
// Check redirect location header
|
|
241
|
-
const loc = e.response?.headers?.location || '';
|
|
242
|
-
const match = loc.match(/\/files\/(\d+)\//);
|
|
243
|
-
if (match)
|
|
244
|
-
orgId = match[1];
|
|
245
|
-
}
|
|
246
|
-
}
|
|
247
|
-
// If orgId found but no orgs entry, try to derive a name from the org's domain
|
|
248
|
-
if (orgId && orgs.length === 0) {
|
|
249
|
-
let name = orgId;
|
|
250
|
-
try {
|
|
251
|
-
const domRes = await axios.get(`https://www.figma.com/api/orgs/${orgId}/domains`, {
|
|
252
|
-
headers,
|
|
253
|
-
timeout: 10000,
|
|
254
|
-
});
|
|
255
|
-
const domains = domRes.data?.meta || [];
|
|
256
|
-
if (Array.isArray(domains) && domains.length > 0 && domains[0].domain) {
|
|
257
|
-
name = domains[0].domain;
|
|
258
|
-
}
|
|
259
|
-
}
|
|
260
|
-
catch { /* domain lookup optional */ }
|
|
261
|
-
orgs.push({ id: orgId, name });
|
|
262
|
-
}
|
|
263
|
-
return { orgId, orgs, teams };
|
|
264
|
-
}
|
|
265
|
-
// --- PAT validation ---
|
|
266
|
-
async function validatePat(pat) {
|
|
267
|
-
const res = await axios.get('https://api.figma.com/v1/me', {
|
|
268
|
-
headers: { 'X-Figma-Token': pat },
|
|
269
|
-
timeout: 15000,
|
|
270
|
-
});
|
|
271
|
-
return res.data.handle || res.data.email || 'valid';
|
|
272
|
-
}
|
|
5
|
+
import { homedir, platform } from 'os';
|
|
6
|
+
import { extractCookies, validateSession, validatePat } from './auth/cookie.js';
|
|
273
7
|
// --- MCP client detection and registration ---
|
|
274
8
|
function claudeCliAvailable() {
|
|
275
9
|
try {
|
|
276
|
-
|
|
10
|
+
const whichCmd = platform() === 'win32' ? 'where' : 'which';
|
|
11
|
+
execFileSync(whichCmd, ['claude'], {
|
|
277
12
|
encoding: 'utf-8',
|
|
278
13
|
stdio: ['pipe', 'pipe', 'pipe'],
|
|
279
14
|
});
|
|
@@ -285,9 +20,20 @@ function claudeCliAvailable() {
|
|
|
285
20
|
}
|
|
286
21
|
function registerWithClaude(envVars) {
|
|
287
22
|
try {
|
|
288
|
-
|
|
289
|
-
|
|
290
|
-
|
|
23
|
+
try {
|
|
24
|
+
execFileSync('claude', ['mcp', 'remove', 'figmanage', '-s', 'user'], {
|
|
25
|
+
encoding: 'utf-8',
|
|
26
|
+
stdio: ['pipe', 'pipe', 'pipe'],
|
|
27
|
+
});
|
|
28
|
+
}
|
|
29
|
+
catch {
|
|
30
|
+
// Ignore if not previously registered
|
|
31
|
+
}
|
|
32
|
+
execFileSync('claude', [
|
|
33
|
+
'mcp', 'add', 'figmanage', '--transport', 'stdio', '-s', 'user',
|
|
34
|
+
...Object.entries(envVars).flatMap(([k, v]) => ['--env', `${k}=${v}`]),
|
|
35
|
+
'--', 'npx', '-y', 'figmanage',
|
|
36
|
+
], { encoding: 'utf-8' });
|
|
291
37
|
return true;
|
|
292
38
|
}
|
|
293
39
|
catch {
|
|
@@ -414,17 +160,7 @@ async function setup() {
|
|
|
414
160
|
console.log(`Reading Chrome cookies${promptLabel}...`);
|
|
415
161
|
let accounts = [];
|
|
416
162
|
try {
|
|
417
|
-
|
|
418
|
-
for (const profilePath of profiles) {
|
|
419
|
-
try {
|
|
420
|
-
const rawCookie = extractCookie(profilePath);
|
|
421
|
-
const { userId, cookieValue } = parseCookieValue(rawCookie);
|
|
422
|
-
accounts.push({ userId, cookieValue, profile: profilePath.split(/[/\\]/).pop() });
|
|
423
|
-
}
|
|
424
|
-
catch {
|
|
425
|
-
// Profile doesn't have a Figma cookie
|
|
426
|
-
}
|
|
427
|
-
}
|
|
163
|
+
accounts = extractCookies();
|
|
428
164
|
}
|
|
429
165
|
catch (e) {
|
|
430
166
|
if (os === 'win32') {
|
package/package.json
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "figmanage",
|
|
3
3
|
"mcpName": "io.github.dannykeane/figmanage",
|
|
4
|
-
"version": "1.2.
|
|
4
|
+
"version": "1.2.2",
|
|
5
5
|
"description": "MCP server for managing your Figma workspace from the terminal.",
|
|
6
6
|
"type": "module",
|
|
7
7
|
"main": "dist/index.js",
|
|
@@ -40,8 +40,8 @@
|
|
|
40
40
|
},
|
|
41
41
|
"homepage": "https://github.com/dannykeane/figmanage#readme",
|
|
42
42
|
"dependencies": {
|
|
43
|
-
"@modelcontextprotocol/sdk": "^1.25.
|
|
44
|
-
"axios": "^1.
|
|
43
|
+
"@modelcontextprotocol/sdk": "^1.25.2",
|
|
44
|
+
"axios": "^1.13.5",
|
|
45
45
|
"axios-retry": "^4.4.0",
|
|
46
46
|
"commander": "^14.0.3",
|
|
47
47
|
"zod": "^3.23.0"
|