karukia-mcp 3.0.0 → 3.0.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +86 -22
- package/dist/http.js +155 -196
- package/dist/index.js +73 -181
- package/package.json +18 -11
package/README.md
CHANGED
|
@@ -1,8 +1,20 @@
|
|
|
1
1
|
# KARUKIA MCP
|
|
2
2
|
|
|
3
|
+
```
|
|
4
|
+
██╗ ██╗ █████╗ ██████╗ ██╗ ██╗██╗ ██╗ ██╗ █████╗
|
|
5
|
+
██║ ██╔╝██╔══██╗██╔══██╗██║ ██║██║ ██╔╝ ██║██╔══██╗
|
|
6
|
+
█████╔╝ ███████║██████╔╝██║ ██║█████╔╝ ██║███████║
|
|
7
|
+
██╔═██╗ ██╔══██║██╔══██╗██║ ██║██╔═██╗ ██║██╔══██║
|
|
8
|
+
██║ ██╗██║ ██║██║ ██║╚██████╔╝██║ ██╗ ██║██║ ██║
|
|
9
|
+
╚═╝ ╚═╝╚═╝ ╚═╝╚═╝ ╚═╝ ╚═════╝ ╚═╝ ╚═╝ ╚═╝╚═╝ ╚═╝
|
|
10
|
+
AI methodology for highly regulated industries · Made in Guadeloupe 🇬🇵
|
|
11
|
+
```
|
|
12
|
+
|
|
3
13
|
**The complete AI-assisted development methodology, delivered via MCP.**
|
|
4
14
|
|
|
5
|
-
|
|
15
|
+
**Latest: v3.0.1**
|
|
16
|
+
|
|
17
|
+
27 tools, 20 skills, 1673+ checkpoints across 11 audit dimensions. Works with any AI platform (Claude Code, Cursor, Windsurf, Copilot...) through the Model Context Protocol.
|
|
6
18
|
|
|
7
19
|
## What is KARUKIA?
|
|
8
20
|
|
|
@@ -17,19 +29,27 @@ You: "Run a security audit"
|
|
|
17
29
|
-> AI becomes Neo, follows the methodology, produces structured findings
|
|
18
30
|
```
|
|
19
31
|
|
|
20
|
-
## The
|
|
32
|
+
## The 11 Audit Dimensions
|
|
21
33
|
|
|
22
34
|
```
|
|
23
|
-
|
|
24
|
-
|
|
25
|
-
|
|
35
|
+
SECURITY → Neo (445 pts) "Is my code secure?"
|
|
36
|
+
QUALITY → Opquast (245 pts) "Is my app well-built?"
|
|
37
|
+
OFFENSIVE → Viper (245+ tests) "How would a hacker break in?"
|
|
38
|
+
TS → ts_quality (118) "Is my TypeScript clean?"
|
|
39
|
+
CSS → css_quality (55) "Is my design system maintainable?"
|
|
40
|
+
ARCHI → archi (70) "Is my architecture sound?"
|
|
41
|
+
TESTS → test_coverage (68) "Am I testing the right things?"
|
|
42
|
+
PERF → perf (90) "Where are the bottlenecks?"
|
|
43
|
+
DEBT → debt (55) "What's slowing us down?"
|
|
44
|
+
HDS/ISO → audit_expert (200+)"Am I ready for certification?"
|
|
45
|
+
SCAN → karukia_scan "Run all 11 dimensions at once"
|
|
26
46
|
```
|
|
27
47
|
|
|
28
48
|
---
|
|
29
49
|
|
|
30
50
|
## Quick Start
|
|
31
51
|
|
|
32
|
-
**Prerequisites:** [Node.js](https://nodejs.org/)
|
|
52
|
+
**Prerequisites:** [Node.js](https://nodejs.org/) 22 or later.
|
|
33
53
|
|
|
34
54
|
### Step 1 — Add KARUKIA to your project
|
|
35
55
|
|
|
@@ -50,7 +70,7 @@ Create or edit `.mcp.json` at the root of your project:
|
|
|
50
70
|
|
|
51
71
|
### Step 2 — Restart your AI client
|
|
52
72
|
|
|
53
|
-
Restart Claude Code (`/quit` then relaunch) or your IDE. The
|
|
73
|
+
Restart Claude Code (`/quit` then relaunch) or your IDE. The 27 KARUKIA tools are now available.
|
|
54
74
|
|
|
55
75
|
> On first launch, `npx` downloads the package automatically (~175 KB). Subsequent launches use the cached version.
|
|
56
76
|
|
|
@@ -108,7 +128,7 @@ Then add to your global AI config (`~/.claude.json` for Claude Code):
|
|
|
108
128
|
|
|
109
129
|
---
|
|
110
130
|
|
|
111
|
-
##
|
|
131
|
+
## 27 Tools
|
|
112
132
|
|
|
113
133
|
### Essential (start here)
|
|
114
134
|
|
|
@@ -118,7 +138,7 @@ Then add to your global AI config (`~/.claude.json` for Claude Code):
|
|
|
118
138
|
| `auto` | **[MAIN TOOL]** Describe what you need — KARUKIA routes to the right skills |
|
|
119
139
|
| `start` | Quick-start guide — explains all skills at 3 progressive levels |
|
|
120
140
|
|
|
121
|
-
###
|
|
141
|
+
### Core Skills (AI Personas)
|
|
122
142
|
|
|
123
143
|
Each skill returns a complete prompt that transforms your AI into a specialist.
|
|
124
144
|
|
|
@@ -131,31 +151,41 @@ Each skill returns a complete prompt that transforms your AI into a specialist.
|
|
|
131
151
|
| `audit_opquast` | Quality Auditor | Deep Opquast compliance audit with 14 thematic checklists |
|
|
132
152
|
| `ebios_rm_audit` | Risk Analyst | EBIOS Risk Manager methodology (ANSSI) — formal risk analysis |
|
|
133
153
|
| `security_hardening` | Hardening Planner | Security improvement chantiers |
|
|
134
|
-
| `terraform_update` | IaC Specialist | Terraform automation for KMS, GCS, IAM |
|
|
135
154
|
| `doc_refactor` | Doc Auditor | Documentation accuracy audit vs actual code |
|
|
136
155
|
|
|
137
|
-
###
|
|
156
|
+
### Dimensional Skills (v3.0 New)
|
|
157
|
+
|
|
158
|
+
| Tool | Checkpoints | What it does |
|
|
159
|
+
|------|-------------|-------------|
|
|
160
|
+
| `ts_quality` | 118 | TypeScript audit — type safety, strict config, generics, async patterns |
|
|
161
|
+
| `css_quality` | 55 | CSS/Design System — maintainability, accessibility, metrics |
|
|
162
|
+
| `archi` | 70 | Architecture — module structure, coupling, layering |
|
|
163
|
+
| `test_coverage` | 68 | Test inventory — frontend/backend coverage quality |
|
|
164
|
+
| `perf` | 90 | Performance — frontend, backend, build/bundle |
|
|
165
|
+
| `debt` | 55 | Technical debt — dead code, dependency health, code smells |
|
|
166
|
+
| `karukia_scan` | 1673+ | **Global scan** — all 11 dimensions in parallel |
|
|
167
|
+
| `audit_expert_hds` | 200+ | Expert HDS 2.0/ISO 27001 — 8 domains, certification readiness |
|
|
168
|
+
| `change_report` | — | Change management report (ISO 27001 A.8.32) |
|
|
169
|
+
|
|
170
|
+
### Utilities
|
|
138
171
|
|
|
139
172
|
| Tool | Description |
|
|
140
173
|
|------|-------------|
|
|
141
|
-
| `list_checklists` | Browse all
|
|
142
|
-
| `get_checklist` | Retrieve the full content of any checklist |
|
|
143
|
-
| `search_rules` | Search across all 935+ checkpoints by keyword and severity |
|
|
174
|
+
| `list_checklists` | Browse all 31 checklists by category |
|
|
144
175
|
| `suggest_checklists` | Describe your project — get a prioritized audit plan |
|
|
145
176
|
| `generate_report` | Compile audit results into a scored Markdown report |
|
|
146
177
|
|
|
147
|
-
###
|
|
178
|
+
### Memory & Config
|
|
148
179
|
|
|
149
180
|
| Tool | Description |
|
|
150
181
|
|------|-------------|
|
|
151
182
|
| `init_memory` | Initialize KARUKIA memory structure in a project |
|
|
152
183
|
| `get_session_template` | Get pre-filled session templates for any skill |
|
|
153
184
|
| `get_config_template` | Get configuration templates (security scope, CLAUDE.md, analytics) |
|
|
154
|
-
| `get_shared` | Access shared methodology components (guard rules, workflow, agents) |
|
|
155
185
|
|
|
156
186
|
---
|
|
157
187
|
|
|
158
|
-
##
|
|
188
|
+
## 31 Checklists
|
|
159
189
|
|
|
160
190
|
### Defensive Security (Neo) — 6 checklists, 445 controls
|
|
161
191
|
|
|
@@ -183,6 +213,18 @@ Based on [Opquast](https://www.opquast.com/) — the French web quality referenc
|
|
|
183
213
|
| **Healthcare** | 50+ | PHI, encryption, medical data |
|
|
184
214
|
| **Attack Scenarios** | 15+ | PTES templates, MITRE ATT&CK |
|
|
185
215
|
|
|
216
|
+
### Dimensional Quality (New in v3.0) — 7 checklists, 656+ checkpoints
|
|
217
|
+
|
|
218
|
+
| Checklist | Points | Scope |
|
|
219
|
+
|-----------|--------|-------|
|
|
220
|
+
| **TypeScript Quality** | 118 | Type safety, strict config, patterns |
|
|
221
|
+
| **CSS / Design System** | 55 | Maintainability, a11y, metrics |
|
|
222
|
+
| **Architecture** | 70 | Module structure, coupling, layering |
|
|
223
|
+
| **Test Coverage** | 68 | Frontend/backend inventory, quality |
|
|
224
|
+
| **Performance** | 90 | Frontend, backend, build/bundle |
|
|
225
|
+
| **Technical Debt** | 55 | Dead code, deps, code smells |
|
|
226
|
+
| **Expert HDS/ISO 27001** | 200+ | Certification readiness — 8 domains |
|
|
227
|
+
|
|
186
228
|
---
|
|
187
229
|
|
|
188
230
|
## Usage Examples
|
|
@@ -215,31 +257,53 @@ Your AI calls `auto` — analyzes the request — routes to the right skill(s)
|
|
|
215
257
|
|
|
216
258
|
## Documentation
|
|
217
259
|
|
|
218
|
-
- [Livre Blanc (
|
|
260
|
+
- [Livre Blanc (Français)](./LIVRE-BLANC.md) — Document technique détaillé : architecture, méthodologie, cas d'usage
|
|
219
261
|
- [Whitepaper (English)](./WHITEPAPER.md) — Technical deep-dive: architecture, methodology, use cases
|
|
220
262
|
|
|
221
263
|
---
|
|
222
264
|
|
|
223
265
|
## Cloud / Enterprise
|
|
224
266
|
|
|
225
|
-
KARUKIA runs locally by default (stdio
|
|
267
|
+
KARUKIA runs locally by default (stdio via `npx`). Free, zero infrastructure.
|
|
268
|
+
|
|
269
|
+
**For teams** — a managed KARUKIA server (waitlist): connect your whole team via a single API key, centralized audit trail, consistent checklists across all developers.
|
|
226
270
|
|
|
227
|
-
|
|
271
|
+
→ **contact@karukia.com** to join the waitlist.
|
|
228
272
|
|
|
229
273
|
---
|
|
230
274
|
|
|
231
|
-
## About
|
|
275
|
+
## About
|
|
276
|
+
|
|
277
|
+
KARUKIA is developed by **[KARUK IA Solutions](https://karukia.com)**, a B2B SaaS studio specializing in regulated industries (healthcare, finance, pharma), based in Guadeloupe. 🇬🇵
|
|
278
|
+
|
|
279
|
+
Built from the experience of securing a healthcare SaaS application for HDS 2.0 / ISO 27001 certification. The methodology was made open to share what a real certification process actually requires — not just theory.
|
|
280
|
+
|
|
281
|
+
> *Made in Guadeloupe — AI doesn't replace the expert, it frees them.*
|
|
282
|
+
|
|
283
|
+
---
|
|
284
|
+
|
|
285
|
+
## Why KARUKIA
|
|
232
286
|
|
|
233
287
|
KARUKIA is a structured AI-assisted development methodology built around three principles:
|
|
234
288
|
|
|
235
289
|
1. **Separation of concerns** — Security, quality, and implementation are separate disciplines handled by separate AI personas.
|
|
236
|
-
2. **Formal checkpoints over gut feeling** —
|
|
290
|
+
2. **Formal checkpoints over gut feeling** — 1673+ documented checkpoints beat "I think it's fine."
|
|
237
291
|
3. **Defense in depth** — Defensive audit first, quality validation second, offensive testing last.
|
|
238
292
|
|
|
239
293
|
Built from real-world experience securing a healthcare SaaS application to HDS 2.0 / ISO 27001 standards.
|
|
240
294
|
|
|
241
295
|
---
|
|
242
296
|
|
|
297
|
+
## Privacy & Data Handling
|
|
298
|
+
|
|
299
|
+
- **KARUKIA MCP does not store any user data server-side.** In stdio mode (default via `npx`), the server is stateless — no data leaves your machine.
|
|
300
|
+
- **Generated prompts** are returned to your AI client (Claude, GPT, Cursor, etc.). Do not include real health data, credentials, or sensitive personal information in tool call arguments (e.g., the `scope`, `task`, or `period` fields).
|
|
301
|
+
- **HTTP mode** (`start:http`): request logs contain session metadata (tool name, duration, HTTP status) but never the content of requests or generated prompts. Sensitive headers (`Authorization`, `Mcp-Session-Id`) are automatically redacted in logs.
|
|
302
|
+
- **Session memory files** (stored in `karukia/memory/sessions/` on your machine): follow the retention policy documented in [`karukia/config/session-retention.md`](./karukia/config/session-retention.md). For teams in regulated sectors: do not store real patient data or PHI in session files.
|
|
303
|
+
- **For teams in regulated sectors (healthcare, finance)**: use stdio mode (local) for maximum data isolation, or contact contact@karukia.com for the managed offering.
|
|
304
|
+
|
|
305
|
+
---
|
|
306
|
+
|
|
243
307
|
## License
|
|
244
308
|
|
|
245
309
|
KARUKIA MCP is free for personal, educational, and internal professional use.
|