forgecraft-mcp 0.2.0 → 0.2.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (55) hide show
  1. package/README.md +25 -5
  2. package/dist/index.js +1 -1
  3. package/dist/registry/loader.d.ts.map +1 -1
  4. package/dist/registry/loader.js +26 -1
  5. package/dist/registry/loader.js.map +1 -1
  6. package/dist/registry/mcp-discovery.d.ts +82 -0
  7. package/dist/registry/mcp-discovery.d.ts.map +1 -0
  8. package/dist/registry/mcp-discovery.js +202 -0
  9. package/dist/registry/mcp-discovery.js.map +1 -0
  10. package/dist/shared/errors/index.d.ts +4 -0
  11. package/dist/shared/errors/index.d.ts.map +1 -1
  12. package/dist/shared/errors/index.js +6 -0
  13. package/dist/shared/errors/index.js.map +1 -1
  14. package/dist/shared/types.d.ts +44 -1
  15. package/dist/shared/types.d.ts.map +1 -1
  16. package/dist/shared/types.js +6 -0
  17. package/dist/shared/types.js.map +1 -1
  18. package/dist/tools/configure-mcp.d.ts +21 -0
  19. package/dist/tools/configure-mcp.d.ts.map +1 -1
  20. package/dist/tools/configure-mcp.js +86 -24
  21. package/dist/tools/configure-mcp.js.map +1 -1
  22. package/dist/tools/list.d.ts.map +1 -1
  23. package/dist/tools/list.js +24 -0
  24. package/dist/tools/list.js.map +1 -1
  25. package/package.json +7 -3
  26. package/templates/analytics/mcp-servers.yaml +10 -0
  27. package/templates/api/mcp-servers.yaml +12 -0
  28. package/templates/cli/mcp-servers.yaml +10 -0
  29. package/templates/data-lineage/instructions.yaml +28 -0
  30. package/templates/data-lineage/mcp-servers.yaml +20 -0
  31. package/templates/data-pipeline/mcp-servers.yaml +12 -0
  32. package/templates/fintech/mcp-servers.yaml +12 -0
  33. package/templates/game/mcp-servers.yaml +10 -0
  34. package/templates/healthcare/mcp-servers.yaml +12 -0
  35. package/templates/hipaa/instructions.yaml +41 -0
  36. package/templates/hipaa/mcp-servers.yaml +12 -0
  37. package/templates/infra/mcp-servers.yaml +18 -0
  38. package/templates/library/mcp-servers.yaml +18 -0
  39. package/templates/medallion-architecture/instructions.yaml +41 -0
  40. package/templates/medallion-architecture/mcp-servers.yaml +20 -0
  41. package/templates/ml/mcp-servers.yaml +10 -0
  42. package/templates/mobile/mcp-servers.yaml +10 -0
  43. package/templates/observability-xray/instructions.yaml +40 -0
  44. package/templates/observability-xray/mcp-servers.yaml +14 -0
  45. package/templates/realtime/mcp-servers.yaml +12 -0
  46. package/templates/soc2/instructions.yaml +41 -0
  47. package/templates/soc2/mcp-servers.yaml +22 -0
  48. package/templates/social/mcp-servers.yaml +22 -0
  49. package/templates/state-machine/mcp-servers.yaml +10 -0
  50. package/templates/universal/mcp-servers.yaml +26 -0
  51. package/templates/web-react/mcp-servers.yaml +18 -0
  52. package/templates/web-static/mcp-servers.yaml +18 -0
  53. package/templates/web3/mcp-servers.yaml +10 -0
  54. package/templates/zero-trust/instructions.yaml +41 -0
  55. package/templates/zero-trust/mcp-servers.yaml +14 -0
@@ -0,0 +1,20 @@
1
+ tag: MEDALLION-ARCHITECTURE
2
+ section: mcp-servers
3
+ servers:
4
+ - name: postgres
5
+ description: "PostgreSQL for medallion layer metadata, quality gate results, and lineage tracking"
6
+ command: npx
7
+ args: ["-y", "@modelcontextprotocol/server-postgres"]
8
+ tags: [MEDALLION-ARCHITECTURE, DATA-PIPELINE]
9
+ category: database
10
+ env:
11
+ POSTGRES_CONNECTION_STRING: ""
12
+ url: "https://github.com/modelcontextprotocol/servers/tree/main/src/postgres"
13
+
14
+ - name: filesystem
15
+ description: "Filesystem access for Bronze/Silver/Gold layer data files and pipeline configs"
16
+ command: npx
17
+ args: ["-y", "@modelcontextprotocol/server-filesystem"]
18
+ tags: [MEDALLION-ARCHITECTURE, DATA-PIPELINE]
19
+ category: filesystem
20
+ url: "https://github.com/modelcontextprotocol/servers/tree/main/src/filesystem"
@@ -0,0 +1,10 @@
1
+ tag: ML
2
+ section: mcp-servers
3
+ servers:
4
+ - name: jupyter
5
+ description: "Jupyter notebook management — create, execute, and inspect cells"
6
+ command: npx
7
+ args: ["-y", "mcp-server-jupyter"]
8
+ tags: [ML, DATA-PIPELINE]
9
+ category: ai-ml
10
+ url: "https://github.com/datalayer/jupyter-mcp-server"
@@ -0,0 +1,10 @@
1
+ tag: MOBILE
2
+ section: mcp-servers
3
+ servers:
4
+ - name: android-emulator
5
+ description: "Android emulator control — screenshots, tap, swipe, and app lifecycle"
6
+ command: npx
7
+ args: ["-y", "mcp-server-android"]
8
+ tags: [MOBILE]
9
+ category: devtools
10
+ url: "https://github.com/nicholasgriffintn/android-mcp-server"
@@ -0,0 +1,40 @@
1
+ tag: OBSERVABILITY-XRAY
2
+ section: instructions
3
+ blocks:
4
+ - id: xray-lambda-instrumentation
5
+ tier: recommended
6
+ title: "Auto-Add X-Ray Instrumentation to Lambdas"
7
+ content: |
8
+ ## Auto-Add X-Ray Instrumentation to Lambdas
9
+
10
+ - Enable X-Ray active tracing on every Lambda function by default. Set `tracing: Active` in SAM/CloudFormation or `tracing_config { mode = "Active" }` in Terraform.
11
+ - Wrap the AWS SDK client with the X-Ray SDK to automatically trace all downstream AWS service calls (DynamoDB, S3, SQS, SNS).
12
+ - Add X-Ray middleware or decorators to every Lambda handler. No handler should execute without producing a trace segment.
13
+ - Include custom subsegments for business-critical operations: database queries, external API calls, heavy computations.
14
+ - Propagate trace headers across service boundaries: ensure `X-Amzn-Trace-Id` is forwarded in HTTP headers and SQS message attributes.
15
+ - Set sampling rules appropriate to traffic volume: 100% for low-traffic, reservoir-based for high-traffic. Document sampling decisions.
16
+
17
+ - id: xray-annotations-metadata
18
+ tier: recommended
19
+ title: "X-Ray Annotations & Metadata Standards"
20
+ content: |
21
+ ## X-Ray Annotations & Metadata Standards
22
+
23
+ - Add annotations for every trace: `service`, `environment`, `version`, `userId` (hashed), `correlationId`. Annotations are indexed and searchable.
24
+ - Use metadata for non-indexed debug data: request/response sizes, feature flags, cache hit/miss ratios.
25
+ - Define a standard annotation taxonomy across all services. No ad-hoc annotation keys — use a shared enum or constant file.
26
+ - Create X-Ray groups for critical paths: user-facing APIs, payment flows, data pipelines. Monitor group error rates and latency.
27
+ - Set up X-Ray insights for automated anomaly detection on critical service groups.
28
+ - Include X-Ray trace IDs in error responses and log entries for cross-referencing between traces and logs.
29
+
30
+ - id: xray-alerting
31
+ tier: optional
32
+ title: "X-Ray-Based Alerting & SLOs"
33
+ content: |
34
+ ## X-Ray-Based Alerting & SLOs
35
+
36
+ - Define SLOs per service using X-Ray latency and error rate data: p50, p95, p99 latency targets and error budget thresholds.
37
+ - Create CloudWatch alarms from X-Ray service maps: alert on elevated fault rates, latency spikes, or throttling.
38
+ - Monitor cold start impact via X-Ray initialization subsegments. Alert if cold start percentage exceeds threshold.
39
+ - Build dashboards combining X-Ray service map data with CloudWatch metrics for a unified observability view.
40
+ - Review X-Ray traces weekly for optimization opportunities: unnecessary downstream calls, serial-when-could-be-parallel patterns.
@@ -0,0 +1,14 @@
1
+ tag: OBSERVABILITY-XRAY
2
+ section: mcp-servers
3
+ servers:
4
+ - name: aws-cloudwatch
5
+ description: "AWS CloudWatch logs and metrics — query X-Ray traces, view Lambda logs, monitor alarms"
6
+ command: npx
7
+ args: ["-y", "mcp-server-cloudwatch"]
8
+ tags: [OBSERVABILITY-XRAY, INFRA]
9
+ category: monitoring
10
+ env:
11
+ AWS_REGION: ""
12
+ AWS_ACCESS_KEY_ID: ""
13
+ AWS_SECRET_ACCESS_KEY: ""
14
+ url: "https://github.com/modelcontextprotocol/servers"
@@ -0,0 +1,12 @@
1
+ tag: REALTIME
2
+ section: mcp-servers
3
+ servers:
4
+ - name: redis
5
+ description: "Redis key-value store management — pub/sub, streams, caching, and session management"
6
+ command: npx
7
+ args: ["-y", "mcp-server-redis"]
8
+ tags: [REALTIME]
9
+ category: database
10
+ env:
11
+ REDIS_URL: "redis://localhost:6379"
12
+ url: "https://github.com/nicholasgriffintn/redis-mcp-server"
@@ -0,0 +1,41 @@
1
+ tag: SOC2
2
+ section: instructions
3
+ blocks:
4
+ - id: access-control-validation
5
+ tier: recommended
6
+ title: "Access Control Validation"
7
+ content: |
8
+ ## Access Control Validation
9
+
10
+ - Implement role-based access control (RBAC) with the principle of least privilege. No user or service account gets more access than required.
11
+ - Define access control matrices mapping roles to resources and operations. Review and update quarterly.
12
+ - Enforce multi-factor authentication (MFA) for all administrative and privileged access.
13
+ - Automate access reviews: flag dormant accounts (no login in 90 days), over-provisioned roles, and orphaned service accounts.
14
+ - Log all access control changes (role assignments, permission grants, policy updates) with who-changed-what-when detail.
15
+ - Test access controls with negative tests: verify that unauthorized roles are denied, not just that authorized roles succeed.
16
+
17
+ - id: change-management
18
+ tier: recommended
19
+ title: "Change Management & Audit Trail"
20
+ content: |
21
+ ## Change Management & Audit Trail
22
+
23
+ - Every production change requires a documented change request with description, risk assessment, rollback plan, and approval.
24
+ - Enforce separation of duties: the person who writes code cannot be the sole approver for deployment.
25
+ - Maintain an immutable audit trail of all changes: code commits, config changes, infrastructure modifications, access grants.
26
+ - Implement automated change detection: alert on unexpected file changes, config drift, or unauthorized deployments.
27
+ - Conduct post-incident reviews for all unplanned changes. Document root cause, timeline, and preventive measures.
28
+ - Tag all deployments with version, timestamp, deployer, and change request ID for full traceability.
29
+
30
+ - id: incident-response
31
+ tier: recommended
32
+ title: "Incident Response Procedures"
33
+ content: |
34
+ ## Incident Response Procedures
35
+
36
+ - Define and document an incident response plan with clear roles: incident commander, communications lead, technical lead.
37
+ - Classify incidents by severity (P1-P4) with defined response times, escalation paths, and communication templates.
38
+ - Implement automated incident detection: anomaly alerts, threshold breaches, security event correlation.
39
+ - Conduct tabletop exercises quarterly to test incident response procedures with realistic scenarios.
40
+ - Maintain a post-mortem culture: blameless retrospectives within 48 hours, action items tracked to completion.
41
+ - Ensure incident logs are retained for SOC2 audit periods (minimum 12 months) with tamper-evident storage.
@@ -0,0 +1,22 @@
1
+ tag: SOC2
2
+ section: mcp-servers
3
+ servers:
4
+ - name: github
5
+ description: "GitHub repository management — PR reviews, access controls, audit trails for change management"
6
+ command: npx
7
+ args: ["-y", "@modelcontextprotocol/server-github"]
8
+ tags: [SOC2, UNIVERSAL]
9
+ category: version-control
10
+ env:
11
+ GITHUB_PERSONAL_ACCESS_TOKEN: ""
12
+ url: "https://github.com/modelcontextprotocol/servers/tree/main/src/github"
13
+
14
+ - name: sentry
15
+ description: "Sentry error and incident tracking — incident response monitoring and alerting"
16
+ command: npx
17
+ args: ["-y", "mcp-server-sentry"]
18
+ tags: [SOC2, API]
19
+ category: monitoring
20
+ env:
21
+ SENTRY_AUTH_TOKEN: ""
22
+ url: "https://github.com/modelcontextprotocol/servers"
@@ -0,0 +1,22 @@
1
+ tag: SOCIAL
2
+ section: mcp-servers
3
+ servers:
4
+ - name: postgres
5
+ description: "PostgreSQL database inspection, queries, and schema management — common backend for social platforms"
6
+ command: npx
7
+ args: ["-y", "@modelcontextprotocol/server-postgres"]
8
+ tags: [DATA-PIPELINE, API, SOCIAL]
9
+ category: database
10
+ env:
11
+ POSTGRES_CONNECTION_STRING: ""
12
+ url: "https://github.com/modelcontextprotocol/servers/tree/main/src/postgres"
13
+
14
+ - name: redis
15
+ description: "Redis key-value store management — caching, sessions, feeds, and real-time features"
16
+ command: npx
17
+ args: ["-y", "mcp-server-redis"]
18
+ tags: [REALTIME, SOCIAL]
19
+ category: database
20
+ env:
21
+ REDIS_URL: "redis://localhost:6379"
22
+ url: "https://github.com/nicholasgriffintn/redis-mcp-server"
@@ -0,0 +1,10 @@
1
+ tag: STATE-MACHINE
2
+ section: mcp-servers
3
+ servers:
4
+ - name: sequential-thinking
5
+ description: "Dynamic, reflective problem-solving through thought sequences — ideal for modeling state transitions"
6
+ command: npx
7
+ args: ["-y", "@modelcontextprotocol/server-sequential-thinking"]
8
+ tags: [UNIVERSAL, STATE-MACHINE]
9
+ category: general
10
+ url: "https://github.com/modelcontextprotocol/servers/tree/main/src/sequentialthinking"
@@ -0,0 +1,26 @@
1
+ tag: UNIVERSAL
2
+ section: mcp-servers
3
+ servers:
4
+ - name: forgecraft
5
+ description: "Production-grade engineering standards and project scaffolding"
6
+ command: npx
7
+ args: ["-y", "forgecraft-mcp"]
8
+ tags: [UNIVERSAL]
9
+ category: scaffolding
10
+ url: "https://github.com/jghiringhelli/forgecraft-mcp"
11
+
12
+ - name: context7
13
+ description: "Pulls up-to-date documentation and code examples for libraries directly into your prompt"
14
+ command: npx
15
+ args: ["-y", "@upstash/context7-mcp@latest"]
16
+ tags: [UNIVERSAL]
17
+ category: documentation
18
+ url: "https://github.com/upstash/context7"
19
+
20
+ - name: sequential-thinking
21
+ description: "Dynamic, reflective problem-solving through thought sequences"
22
+ command: npx
23
+ args: ["-y", "@modelcontextprotocol/server-sequential-thinking"]
24
+ tags: [UNIVERSAL]
25
+ category: general
26
+ url: "https://github.com/modelcontextprotocol/servers/tree/main/src/sequentialthinking"
@@ -0,0 +1,18 @@
1
+ tag: WEB-REACT
2
+ section: mcp-servers
3
+ servers:
4
+ - name: chrome-devtools
5
+ description: "Chrome DevTools integration for debugging, profiling, and network inspection"
6
+ command: npx
7
+ args: ["-y", "@anthropic/chrome-devtools-mcp@latest"]
8
+ tags: [WEB-REACT, WEB-STATIC, ANALYTICS]
9
+ category: devtools
10
+ url: "https://github.com/anthropics/anthropic-quickstarts/tree/main/chrome-devtools-mcp"
11
+
12
+ - name: playwright
13
+ description: "Browser automation for E2E testing, screenshots, and web scraping"
14
+ command: npx
15
+ args: ["-y", "@anthropic/mcp-server-playwright"]
16
+ tags: [WEB-REACT, WEB-STATIC]
17
+ category: testing
18
+ url: "https://github.com/anthropics/anthropic-quickstarts/tree/main/mcp-server-playwright"
@@ -0,0 +1,18 @@
1
+ tag: WEB-STATIC
2
+ section: mcp-servers
3
+ servers:
4
+ - name: chrome-devtools
5
+ description: "Chrome DevTools integration for debugging, profiling, and network inspection"
6
+ command: npx
7
+ args: ["-y", "@anthropic/chrome-devtools-mcp@latest"]
8
+ tags: [WEB-REACT, WEB-STATIC, ANALYTICS]
9
+ category: devtools
10
+ url: "https://github.com/anthropics/anthropic-quickstarts/tree/main/chrome-devtools-mcp"
11
+
12
+ - name: playwright
13
+ description: "Browser automation for E2E testing, screenshots, and web scraping"
14
+ command: npx
15
+ args: ["-y", "@anthropic/mcp-server-playwright"]
16
+ tags: [WEB-REACT, WEB-STATIC]
17
+ category: testing
18
+ url: "https://github.com/anthropics/anthropic-quickstarts/tree/main/mcp-server-playwright"
@@ -0,0 +1,10 @@
1
+ tag: WEB3
2
+ section: mcp-servers
3
+ servers:
4
+ - name: solidity
5
+ description: "Solidity smart contract development — compilation, ABI generation, and deployment helpers"
6
+ command: npx
7
+ args: ["-y", "mcp-server-solidity"]
8
+ tags: [WEB3]
9
+ category: devtools
10
+ url: "https://github.com/AIMONGmbH/solidity-mcp-server"
@@ -0,0 +1,41 @@
1
+ tag: ZERO-TRUST
2
+ section: instructions
3
+ blocks:
4
+ - id: deny-by-default-iam
5
+ tier: recommended
6
+ title: "Deny-by-Default IAM Policies"
7
+ content: |
8
+ ## Deny-by-Default IAM Policies
9
+
10
+ - Start with zero permissions. Every identity (user, service, Lambda) begins with no access and receives only explicit allows.
11
+ - Write IAM policies with explicit deny statements for sensitive operations. Explicit denies override any allows — use them as guardrails.
12
+ - Scope every IAM policy to specific resources using ARNs. Never use wildcard (*) for resources in production policies.
13
+ - Enforce condition keys on every policy: require specific VPCs, IP ranges, MFA, or time windows for access.
14
+ - Implement IAM policy boundaries (permission boundaries) to cap the maximum permissions any role can receive, regardless of attached policies.
15
+ - Automate IAM policy review: scan for overly permissive policies (Action: *, Resource: *) in CI and block deployment.
16
+
17
+ - id: explicit-allow-rules
18
+ tier: recommended
19
+ title: "Explicit Allow Rules & Least Privilege"
20
+ content: |
21
+ ## Explicit Allow Rules & Least Privilege
22
+
23
+ - Document every allow rule with a business justification: why this identity needs this action on this resource.
24
+ - Group related permissions into managed policies named by function (e.g., `OrderServiceReadDynamo`, `PaymentServiceInvokeKMS`).
25
+ - Use temporary credentials (STS AssumeRole) instead of long-lived access keys. Set maximum session duration to the minimum needed.
26
+ - Implement just-in-time (JIT) access for elevated privileges: temporary role escalation with automatic expiry and audit logging.
27
+ - Review and prune unused permissions quarterly using IAM Access Analyzer or equivalent. Remove any permission not used in 90 days.
28
+ - Tag all IAM roles and policies with owner, team, service, and last-review-date for governance and accountability.
29
+
30
+ - id: network-zero-trust
31
+ tier: optional
32
+ title: "Network-Level Zero Trust"
33
+ content: |
34
+ ## Network-Level Zero Trust
35
+
36
+ - Do not rely on network location (VPC, subnet) as a trust boundary. Authenticate and authorize every request regardless of origin.
37
+ - Encrypt all internal service-to-service communication with mutual TLS (mTLS). No plaintext traffic, even within a VPC.
38
+ - Implement service mesh or API gateway for policy enforcement at the network layer: rate limiting, authentication, authorization.
39
+ - Use private endpoints for AWS services (VPC endpoints) to keep traffic off the public internet.
40
+ - Segment workloads into isolated security groups with minimal ingress/egress rules. Default deny all, then add specific allows.
41
+ - Monitor and alert on unexpected network flows: new connections between services, unusual data transfer volumes, connections to unknown endpoints.
@@ -0,0 +1,14 @@
1
+ tag: ZERO-TRUST
2
+ section: mcp-servers
3
+ servers:
4
+ - name: aws-iam
5
+ description: "AWS IAM policy analysis and management for zero-trust policy enforcement"
6
+ command: npx
7
+ args: ["-y", "mcp-server-aws"]
8
+ tags: [ZERO-TRUST, INFRA]
9
+ category: security
10
+ env:
11
+ AWS_REGION: ""
12
+ AWS_ACCESS_KEY_ID: ""
13
+ AWS_SECRET_ACCESS_KEY: ""
14
+ url: "https://github.com/modelcontextprotocol/servers"