karukia-mcp 3.0.5 → 3.1.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/LICENSE +2 -3
- package/README.md +111 -30
- package/dist/index.js +4224 -3989
- package/package.json +5 -4
package/LICENSE
CHANGED
|
@@ -1,9 +1,9 @@
|
|
|
1
1
|
Business Source License 1.1
|
|
2
2
|
|
|
3
3
|
Licensor: KARUK IA (contact@karukia.com)
|
|
4
|
-
Licensed Work: karukia-mcp v3.0
|
|
4
|
+
Licensed Work: karukia-mcp v3.1.0
|
|
5
5
|
The Licensed Work is (c) 2026 KARUK IA
|
|
6
|
-
Change Date:
|
|
6
|
+
Change Date: April 2, 2036
|
|
7
7
|
Change License: Apache License, Version 2.0
|
|
8
8
|
|
|
9
9
|
Additional Use Grant:
|
|
@@ -17,7 +17,6 @@ Additional Use Grant:
|
|
|
17
17
|
- Personal projects and individual developers
|
|
18
18
|
- Educational institutions (classroom, student projects, research)
|
|
19
19
|
- Non-profit organizations
|
|
20
|
-
- Non-profit organizations
|
|
21
20
|
|
|
22
21
|
Production use is NOT permitted without a commercial license for:
|
|
23
22
|
- Consulting firms (ESN) using karukia-mcp for client-facing work
|
package/README.md
CHANGED
|
@@ -2,7 +2,7 @@
|
|
|
2
2
|
|
|
3
3
|
**The complete AI-assisted development methodology, delivered via MCP.**
|
|
4
4
|
|
|
5
|
-
**Latest: v3.0
|
|
5
|
+
**Latest: v3.1.0** — 27 tools, 20 skills, 1800+ checkpoints across 11 audit dimensions. Multi-AI platform support.
|
|
6
6
|
|
|
7
7
|
|
|
8
8
|
```
|
|
@@ -15,7 +15,7 @@
|
|
|
15
15
|
AI methodology for highly regulated industries · Made in Guadeloupe 🇬🇵
|
|
16
16
|
```
|
|
17
17
|
|
|
18
|
-
|
|
18
|
+
27 tools, 20 skills, 1800+ checkpoints across 11 audit dimensions. Built for **Claude Code** and **OpenAI Codex**. Compatible with any MCP client.
|
|
19
19
|
|
|
20
20
|
---
|
|
21
21
|
|
|
@@ -28,29 +28,37 @@
|
|
|
28
28
|
|
|
29
29
|
KARUKIA is a structured development methodology built around specialized AI personas. Each persona (Neo for security, Jeffrey for architecture, Viper for pentesting, Opo for quality...) comes with its own workflow, guard rails, and knowledge base.
|
|
30
30
|
|
|
31
|
-
When you call a KARUKIA tool, the MCP server returns a complete prompt — persona identity, workflow, checklists, templates — that transforms your AI assistant into that specialist for the session.
|
|
31
|
+
When you call a KARUKIA tool, the MCP server returns a complete prompt — persona identity, standardized workflow, coverage tracking, checklists, templates — that transforms your AI assistant into that specialist for the session.
|
|
32
32
|
|
|
33
33
|
```
|
|
34
34
|
You: "Run a security audit"
|
|
35
35
|
-> AI calls neo tool
|
|
36
|
-
-> MCP returns
|
|
36
|
+
-> MCP returns:
|
|
37
|
+
GUARD (non-negotiable obligations)
|
|
38
|
+
+ Neo persona (identity, style, expertise)
|
|
39
|
+
+ WORKFLOW (6-step standardized process)
|
|
40
|
+
+ COVERAGE (load previous scan manifest, prioritize unscanned files)
|
|
41
|
+
+ Checklists (445 security controls inline)
|
|
42
|
+
+ AGENTS (multi-agent parallel exploration)
|
|
37
43
|
-> AI becomes Neo, follows the methodology, produces structured findings
|
|
44
|
+
-> Coverage manifest written: 67% scanned — next session picks up where this one left off
|
|
38
45
|
```
|
|
39
46
|
|
|
40
|
-
## The
|
|
47
|
+
## The 12 Audit Dimensions
|
|
41
48
|
|
|
42
49
|
```
|
|
43
|
-
SECURITY
|
|
44
|
-
QUALITY
|
|
45
|
-
OFFENSIVE
|
|
46
|
-
|
|
47
|
-
|
|
48
|
-
|
|
49
|
-
|
|
50
|
-
|
|
51
|
-
|
|
52
|
-
|
|
53
|
-
|
|
50
|
+
SECURITY → Neo (445 pts) "Is my code secure?"
|
|
51
|
+
QUALITY → Certix (369 pts) "Is my app well-built?"
|
|
52
|
+
OFFENSIVE → Viper (245+ tests) "How would a hacker break in?"
|
|
53
|
+
DUE DILIGENCE→ deep_review (12ax) "Is this codebase investment-ready?"
|
|
54
|
+
TS → ts_quality (118) "Is my TypeScript clean?"
|
|
55
|
+
CSS → css_quality (55) "Is my design system maintainable?"
|
|
56
|
+
ARCHI → archi (70) "Is my architecture sound?"
|
|
57
|
+
TESTS → test_coverage (68) "Am I testing the right things?"
|
|
58
|
+
PERF → perf (90) "Where are the bottlenecks?"
|
|
59
|
+
DEBT → debt (55) "What's slowing us down?"
|
|
60
|
+
HDS/ISO → audit_expert (200+)"Am I ready for certification?"
|
|
61
|
+
SCAN → karukia_scan "Run all 11 dimensions at once"
|
|
54
62
|
```
|
|
55
63
|
|
|
56
64
|
---
|
|
@@ -78,7 +86,7 @@ Create or edit `.mcp.json` at the root of your project:
|
|
|
78
86
|
|
|
79
87
|
### Step 2 — Restart your AI client
|
|
80
88
|
|
|
81
|
-
Restart Claude Code (`/quit` then relaunch) or your IDE.
|
|
89
|
+
Restart Claude Code (`/quit` then relaunch) or your IDE. All 27 KARUKIA tools are now available.
|
|
82
90
|
|
|
83
91
|
> On first launch, `npx` downloads the package automatically (~175 KB). Subsequent launches use the cached version.
|
|
84
92
|
|
|
@@ -136,7 +144,7 @@ Then add to your global AI config (`~/.claude.json` for Claude Code):
|
|
|
136
144
|
|
|
137
145
|
---
|
|
138
146
|
|
|
139
|
-
##
|
|
147
|
+
## 27 Tools
|
|
140
148
|
|
|
141
149
|
### Essential (start here)
|
|
142
150
|
|
|
@@ -155,11 +163,12 @@ Each skill returns a complete prompt that transforms your AI into a specialist.
|
|
|
155
163
|
| `neo` | Security Auditor | Defensive audit against 6 frameworks (OWASP, HDS, ISO 27001, SOC 2, PCI-DSS, HIPAA) |
|
|
156
164
|
| `viper` | Pentest Brigade | Offensive testing with 16 agents, CVSS v4 scoring, MITRE ATT&CK mapping |
|
|
157
165
|
| `jeffrey` | Full-Stack Architect | Feature implementation with TDD and security validation |
|
|
158
|
-
| `opo` | Quality Validator | Web quality against
|
|
159
|
-
| `
|
|
166
|
+
| `opo` | Quality Validator | Web quality against 369 Certix rules |
|
|
167
|
+
| `audit_certix` | Quality Auditor | Deep Certix compliance audit with 5 profile checklists |
|
|
160
168
|
| `ebios_rm_audit` | Risk Analyst | EBIOS Risk Manager methodology (ANSSI) — formal risk analysis |
|
|
161
169
|
| `security_hardening` | Hardening Planner | Security improvement chantiers |
|
|
162
170
|
| `doc_refactor` | Doc Auditor | Documentation accuracy audit vs actual code |
|
|
171
|
+
| `deep_review` | Due Diligence Lead | 12-axis technical review: code, archi, scalability, costs, security, resilience, tests, DX, frontend perf, regulatory, AI, maintainability |
|
|
163
172
|
|
|
164
173
|
### Dimensional Skills (v3.0 New)
|
|
165
174
|
|
|
@@ -171,7 +180,7 @@ Each skill returns a complete prompt that transforms your AI into a specialist.
|
|
|
171
180
|
| `test_coverage` | 68 | Test inventory — frontend/backend coverage quality |
|
|
172
181
|
| `perf` | 90 | Performance — frontend, backend, build/bundle |
|
|
173
182
|
| `debt` | 55 | Technical debt — dead code, dependency health, code smells |
|
|
174
|
-
| `karukia_scan` |
|
|
183
|
+
| `karukia_scan` | 1800+ | **Global scan** — all 11 dimensions in parallel |
|
|
175
184
|
| `audit_expert_hds` | 200+ | Expert HDS 2.0/ISO 27001 — 8 domains, certification readiness |
|
|
176
185
|
| `change_report` | — | Change management report (ISO 27001 A.8.32) |
|
|
177
186
|
|
|
@@ -179,7 +188,7 @@ Each skill returns a complete prompt that transforms your AI into a specialist.
|
|
|
179
188
|
|
|
180
189
|
| Tool | Description |
|
|
181
190
|
|------|-------------|
|
|
182
|
-
| `list_checklists` | Browse all
|
|
191
|
+
| `list_checklists` | Browse all 22 checklists by category |
|
|
183
192
|
| `suggest_checklists` | Describe your project — get a prioritized audit plan |
|
|
184
193
|
| `generate_report` | Compile audit results into a scored Markdown report |
|
|
185
194
|
|
|
@@ -193,7 +202,7 @@ Each skill returns a complete prompt that transforms your AI into a specialist.
|
|
|
193
202
|
|
|
194
203
|
---
|
|
195
204
|
|
|
196
|
-
##
|
|
205
|
+
## 22 Checklists
|
|
197
206
|
|
|
198
207
|
### Defensive Security (Neo) — 6 checklists, 445 controls
|
|
199
208
|
|
|
@@ -206,11 +215,9 @@ Each skill returns a complete prompt that transforms your AI into a specialist.
|
|
|
206
215
|
| **PCI-DSS v4.0** | 97 | Payment processing |
|
|
207
216
|
| **HIPAA** | 67 | Health data, US |
|
|
208
217
|
|
|
209
|
-
### Web Quality (
|
|
218
|
+
### Web Quality (Certix) — 5 checklists, 369 rules
|
|
210
219
|
|
|
211
|
-
|
|
212
|
-
|
|
213
|
-
Based on [Opquast](https://www.opquast.com/) — the French web quality reference used by 15,000+ professionals.
|
|
220
|
+
Five profile-based checklists covering all aspects of web quality: DEV (development), UX (user experience), CONT (content), OPS (operations), and JUR (legal/compliance).
|
|
214
221
|
|
|
215
222
|
### Offensive Security (Viper) — 4 checklists, 245+ tests
|
|
216
223
|
|
|
@@ -235,6 +242,74 @@ Based on [Opquast](https://www.opquast.com/) — the French web quality referenc
|
|
|
235
242
|
|
|
236
243
|
---
|
|
237
244
|
|
|
245
|
+
## Multi-AI Platform Support
|
|
246
|
+
|
|
247
|
+
KARUKIA is built for and tested with **Claude Code** and **OpenAI Codex**. It is compatible with any MCP client (Cursor, Windsurf, Copilot, etc.), though those have not been tested with the `client_id` parameter.
|
|
248
|
+
|
|
249
|
+
All skill tools accept an optional `client_id` parameter: `"claude"` (default), `"codex"`, or `"generic"`. The entire prompt adapts:
|
|
250
|
+
|
|
251
|
+
| What adapts | Claude (`client_id: "claude"`) | Codex (`client_id: "codex"`) | Generic |
|
|
252
|
+
|---|---|---|---|
|
|
253
|
+
| Sub-agent orchestration | Task API with model hints | Natural language instructions | Natural language |
|
|
254
|
+
| Config file generated | `CLAUDE.md` | `CODEX-PROJECT.md` | `AI-CONFIG.md` |
|
|
255
|
+
| Model references | Opus / Sonnet | Generic model names | Generic model names |
|
|
256
|
+
| Memory root | `karukia/` | `karukia/` | `karukia/` |
|
|
257
|
+
|
|
258
|
+
This is the first MCP methodology server with true multi-AI platform abstraction. One npm package, one `.mcp.json` entry, full methodology regardless of the AI behind it.
|
|
259
|
+
|
|
260
|
+
---
|
|
261
|
+
|
|
262
|
+
## Iterative Coverage Tracking (New in v3.1)
|
|
263
|
+
|
|
264
|
+
Every audit skill tracks which files have been analyzed across sessions. No file in your codebase is left behind.
|
|
265
|
+
|
|
266
|
+
**How it works:**
|
|
267
|
+
1. **Scan 1** -- KARUKIA analyzes your codebase, covers ~40% of in-scope files. Writes a coverage manifest to `karukia/memory/coverage/{skill}-latest.json`.
|
|
268
|
+
2. **Scan 2** -- Reads the previous manifest, skips already-analyzed files, covers the next ~40%. Cumulative: 80%.
|
|
269
|
+
3. **Scan 3** -- Picks up the remaining 20%. Status: **COMPLETE**.
|
|
270
|
+
|
|
271
|
+
After any scan, the manifest records exactly which files were analyzed, which were skipped, and what findings were discovered -- with severity counts. When files are modified after a complete scan, only the changed files are re-analyzed.
|
|
272
|
+
|
|
273
|
+
```
|
|
274
|
+
--- COVERAGE neo ---
|
|
275
|
+
Scope total : 120 files
|
|
276
|
+
This scan : 48 files analyzed
|
|
277
|
+
Cumulative : 96 / 120 (80%)
|
|
278
|
+
Status : PARTIAL
|
|
279
|
+
|
|
280
|
+
Remaining -- next scan starts with:
|
|
281
|
+
- src/auth/session.ts
|
|
282
|
+
- src/api/handlers/patient.ts
|
|
283
|
+
- ... (24 more)
|
|
284
|
+
---
|
|
285
|
+
```
|
|
286
|
+
|
|
287
|
+
Coverage scopes are resolved from project-specific config (`karukia/config/coverage-scopes.json`, generated by `install`) or from the skill's default globs. This means a TypeScript audit scans `**/*.ts` files, a CSS audit scans `**/*.css` and `**/*.scss`, and so on.
|
|
288
|
+
|
|
289
|
+
---
|
|
290
|
+
|
|
291
|
+
## Standardized 6-Step Workflow (New in v3.1)
|
|
292
|
+
|
|
293
|
+
Every audit skill follows the same structured workflow:
|
|
294
|
+
|
|
295
|
+
```
|
|
296
|
+
Step 0 : PREPARATION -- Create session, load references
|
|
297
|
+
Step 0.5 : COVERAGE LOADING -- Read previous manifest, prioritize unscanned files
|
|
298
|
+
Step 1 : EXPLORATION -- Multi-agent parallel scanning (each agent covers a scope)
|
|
299
|
+
Step 2 : ANALYSIS -- Synthesize discoveries, identify required actions
|
|
300
|
+
Step 3 : EXECUTION -- Execute action plan, update progress after each action
|
|
301
|
+
Step 4 : VALIDATION -- Lint, build, test. Fix ALL issues before closure
|
|
302
|
+
Step 4.5 : COVERAGE WRITE -- Write coverage manifest for next session
|
|
303
|
+
Step 5 : CLOSURE -- Finalize session files, update trackers and knowledge base
|
|
304
|
+
```
|
|
305
|
+
|
|
306
|
+
Key workflow features:
|
|
307
|
+
- **Rule of 2 actions**: After every 2 read operations, findings MUST be written to `findings.md`. Context is never lost, even if the session is interrupted.
|
|
308
|
+
- **3-attempt protocol**: Diagnose and fix -- alternative approach -- rethink assumptions -- escalate to user. No blind retries.
|
|
309
|
+
- **Knowledge persistence**: Lessons learned and reusable patterns are saved to `karukia/memory/knowledge/` between sessions. The methodology gets smarter over time.
|
|
310
|
+
|
|
311
|
+
---
|
|
312
|
+
|
|
238
313
|
## Usage Examples
|
|
239
314
|
|
|
240
315
|
### Full security audit
|
|
@@ -255,6 +330,12 @@ Your AI calls `jeffrey` — becomes the Jeffrey architect — implements with TD
|
|
|
255
330
|
|
|
256
331
|
Your AI calls `viper` — deploys the Brigade methodology with 16 specialized agents across Recon, Surface Analysis, and Exploitation phases.
|
|
257
332
|
|
|
333
|
+
### Due diligence on a codebase (New in v3.1)
|
|
334
|
+
|
|
335
|
+
> "karukia deep_review"
|
|
336
|
+
|
|
337
|
+
Your AI calls `deep_review` — deploys a brigade of 6 parallel agents — each covers 2 of the 12 axes (code quality, architecture, scalability, costs, security, resilience, tests, DX, frontend perf, regulatory compliance, AI patterns, maintainability). Produces a scorecard with grades A+ to F per axis, a global score out of 120, and a prioritized action plan. Use it before an investment, a CTO takeover, or a major refactor.
|
|
338
|
+
|
|
258
339
|
### Orchestrate everything
|
|
259
340
|
|
|
260
341
|
> "karukia: add a logout button and audit security"
|
|
@@ -285,7 +366,7 @@ Built from the experience of securing a healthcare SaaS application for HDS 2.0
|
|
|
285
366
|
KARUKIA is a structured AI-assisted development methodology built around three principles:
|
|
286
367
|
|
|
287
368
|
1. **Separation of concerns** — Security, quality, and implementation are separate disciplines handled by separate AI personas.
|
|
288
|
-
2. **Formal checkpoints over gut feeling** —
|
|
369
|
+
2. **Formal checkpoints over gut feeling** — 1800+ documented checkpoints beat "I think it's fine."
|
|
289
370
|
3. **Defense in depth** — Defensive audit first, quality validation second, offensive testing last.
|
|
290
371
|
|
|
291
372
|
Built from real-world experience securing a healthcare SaaS application to HDS 2.0 / ISO 27001 standards.
|
|
@@ -320,7 +401,7 @@ If your company or consulting firm uses KARUKIA for production work or deploys i
|
|
|
320
401
|
| **Business** | 12 000 | Up to 50 developers |
|
|
321
402
|
| **Enterprise** | 20 000 | Unlimited developers + priority support |
|
|
322
403
|
|
|
323
|
-
All plans include: full access to all
|
|
404
|
+
All plans include: full access to all 27 tools, 20 skills, 1800+ checkpoints across 11 audit dimensions, and all updates for the license duration. Annual license, renewable.
|
|
324
405
|
|
|
325
406
|
**Contact:** contact@karukia.com
|
|
326
407
|
|
|
@@ -328,4 +409,4 @@ All plans include: full access to all 26 tools, 19 skills, 1673+ checkpoints acr
|
|
|
328
409
|
|
|
329
410
|
### Change License
|
|
330
411
|
|
|
331
|
-
On
|
|
412
|
+
On April 2, 2036, the Licensed Work will automatically convert to the [Apache License 2.0](https://www.apache.org/licenses/LICENSE-2.0).
|