karukia-mcp 3.0.6 → 3.1.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/LICENSE +2 -3
- package/README.md +105 -22
- package/dist/index.js +715 -89
- package/package.json +4 -3
package/LICENSE
CHANGED
|
@@ -1,9 +1,9 @@
|
|
|
1
1
|
Business Source License 1.1
|
|
2
2
|
|
|
3
3
|
Licensor: KARUK IA (contact@karukia.com)
|
|
4
|
-
Licensed Work: karukia-mcp v3.0
|
|
4
|
+
Licensed Work: karukia-mcp v3.1.0
|
|
5
5
|
The Licensed Work is (c) 2026 KARUK IA
|
|
6
|
-
Change Date:
|
|
6
|
+
Change Date: April 2, 2036
|
|
7
7
|
Change License: Apache License, Version 2.0
|
|
8
8
|
|
|
9
9
|
Additional Use Grant:
|
|
@@ -17,7 +17,6 @@ Additional Use Grant:
|
|
|
17
17
|
- Personal projects and individual developers
|
|
18
18
|
- Educational institutions (classroom, student projects, research)
|
|
19
19
|
- Non-profit organizations
|
|
20
|
-
- Non-profit organizations
|
|
21
20
|
|
|
22
21
|
Production use is NOT permitted without a commercial license for:
|
|
23
22
|
- Consulting firms (ESN) using karukia-mcp for client-facing work
|
package/README.md
CHANGED
|
@@ -2,7 +2,7 @@
|
|
|
2
2
|
|
|
3
3
|
**The complete AI-assisted development methodology, delivered via MCP.**
|
|
4
4
|
|
|
5
|
-
**Latest: v3.0
|
|
5
|
+
**Latest: v3.1.0** — 27 tools, 20 skills, 1800+ checkpoints across 11 audit dimensions. Multi-AI platform support.
|
|
6
6
|
|
|
7
7
|
|
|
8
8
|
```
|
|
@@ -15,7 +15,7 @@
|
|
|
15
15
|
AI methodology for highly regulated industries · Made in Guadeloupe 🇬🇵
|
|
16
16
|
```
|
|
17
17
|
|
|
18
|
-
|
|
18
|
+
27 tools, 20 skills, 1800+ checkpoints across 11 audit dimensions. Built for **Claude Code** and **OpenAI Codex**. Compatible with any MCP client.
|
|
19
19
|
|
|
20
20
|
---
|
|
21
21
|
|
|
@@ -28,29 +28,37 @@
|
|
|
28
28
|
|
|
29
29
|
KARUKIA is a structured development methodology built around specialized AI personas. Each persona (Neo for security, Jeffrey for architecture, Viper for pentesting, Opo for quality...) comes with its own workflow, guard rails, and knowledge base.
|
|
30
30
|
|
|
31
|
-
When you call a KARUKIA tool, the MCP server returns a complete prompt — persona identity, workflow, checklists, templates — that transforms your AI assistant into that specialist for the session.
|
|
31
|
+
When you call a KARUKIA tool, the MCP server returns a complete prompt — persona identity, standardized workflow, coverage tracking, checklists, templates — that transforms your AI assistant into that specialist for the session.
|
|
32
32
|
|
|
33
33
|
```
|
|
34
34
|
You: "Run a security audit"
|
|
35
35
|
-> AI calls neo tool
|
|
36
|
-
-> MCP returns
|
|
36
|
+
-> MCP returns:
|
|
37
|
+
GUARD (non-negotiable obligations)
|
|
38
|
+
+ Neo persona (identity, style, expertise)
|
|
39
|
+
+ WORKFLOW (6-step standardized process)
|
|
40
|
+
+ COVERAGE (load previous scan manifest, prioritize unscanned files)
|
|
41
|
+
+ Checklists (445 security controls inline)
|
|
42
|
+
+ AGENTS (multi-agent parallel exploration)
|
|
37
43
|
-> AI becomes Neo, follows the methodology, produces structured findings
|
|
44
|
+
-> Coverage manifest written: 67% scanned — next session picks up where this one left off
|
|
38
45
|
```
|
|
39
46
|
|
|
40
|
-
## The
|
|
47
|
+
## The 12 Audit Dimensions
|
|
41
48
|
|
|
42
49
|
```
|
|
43
|
-
SECURITY
|
|
44
|
-
QUALITY
|
|
45
|
-
OFFENSIVE
|
|
46
|
-
|
|
47
|
-
|
|
48
|
-
|
|
49
|
-
|
|
50
|
-
|
|
51
|
-
|
|
52
|
-
|
|
53
|
-
|
|
50
|
+
SECURITY → Neo (445 pts) "Is my code secure?"
|
|
51
|
+
QUALITY → Certix (369 pts) "Is my app well-built?"
|
|
52
|
+
OFFENSIVE → Viper (245+ tests) "How would a hacker break in?"
|
|
53
|
+
DUE DILIGENCE→ deep_review (12ax) "Is this codebase investment-ready?"
|
|
54
|
+
TS → ts_quality (118) "Is my TypeScript clean?"
|
|
55
|
+
CSS → css_quality (55) "Is my design system maintainable?"
|
|
56
|
+
ARCHI → archi (70) "Is my architecture sound?"
|
|
57
|
+
TESTS → test_coverage (68) "Am I testing the right things?"
|
|
58
|
+
PERF → perf (90) "Where are the bottlenecks?"
|
|
59
|
+
DEBT → debt (55) "What's slowing us down?"
|
|
60
|
+
HDS/ISO → audit_expert (200+)"Am I ready for certification?"
|
|
61
|
+
SCAN → karukia_scan "Run all 11 dimensions at once"
|
|
54
62
|
```
|
|
55
63
|
|
|
56
64
|
---
|
|
@@ -78,7 +86,7 @@ Create or edit `.mcp.json` at the root of your project:
|
|
|
78
86
|
|
|
79
87
|
### Step 2 — Restart your AI client
|
|
80
88
|
|
|
81
|
-
Restart Claude Code (`/quit` then relaunch) or your IDE.
|
|
89
|
+
Restart Claude Code (`/quit` then relaunch) or your IDE. All 27 KARUKIA tools are now available.
|
|
82
90
|
|
|
83
91
|
> On first launch, `npx` downloads the package automatically (~175 KB). Subsequent launches use the cached version.
|
|
84
92
|
|
|
@@ -136,7 +144,7 @@ Then add to your global AI config (`~/.claude.json` for Claude Code):
|
|
|
136
144
|
|
|
137
145
|
---
|
|
138
146
|
|
|
139
|
-
##
|
|
147
|
+
## 27 Tools
|
|
140
148
|
|
|
141
149
|
### Essential (start here)
|
|
142
150
|
|
|
@@ -160,6 +168,7 @@ Each skill returns a complete prompt that transforms your AI into a specialist.
|
|
|
160
168
|
| `ebios_rm_audit` | Risk Analyst | EBIOS Risk Manager methodology (ANSSI) — formal risk analysis |
|
|
161
169
|
| `security_hardening` | Hardening Planner | Security improvement chantiers |
|
|
162
170
|
| `doc_refactor` | Doc Auditor | Documentation accuracy audit vs actual code |
|
|
171
|
+
| `deep_review` | Due Diligence Lead | 12-axis technical review: code, archi, scalability, costs, security, resilience, tests, DX, frontend perf, regulatory, AI, maintainability |
|
|
163
172
|
|
|
164
173
|
### Dimensional Skills (v3.0 New)
|
|
165
174
|
|
|
@@ -171,7 +180,7 @@ Each skill returns a complete prompt that transforms your AI into a specialist.
|
|
|
171
180
|
| `test_coverage` | 68 | Test inventory — frontend/backend coverage quality |
|
|
172
181
|
| `perf` | 90 | Performance — frontend, backend, build/bundle |
|
|
173
182
|
| `debt` | 55 | Technical debt — dead code, dependency health, code smells |
|
|
174
|
-
| `karukia_scan` |
|
|
183
|
+
| `karukia_scan` | 1800+ | **Global scan** — all 11 dimensions in parallel |
|
|
175
184
|
| `audit_expert_hds` | 200+ | Expert HDS 2.0/ISO 27001 — 8 domains, certification readiness |
|
|
176
185
|
| `change_report` | — | Change management report (ISO 27001 A.8.32) |
|
|
177
186
|
|
|
@@ -233,6 +242,74 @@ Five profile-based checklists covering all aspects of web quality: DEV (developm
|
|
|
233
242
|
|
|
234
243
|
---
|
|
235
244
|
|
|
245
|
+
## Multi-AI Platform Support
|
|
246
|
+
|
|
247
|
+
KARUKIA is built for and tested with **Claude Code** and **OpenAI Codex**. It is compatible with any MCP client (Cursor, Windsurf, Copilot, etc.), though those have not been tested with the `client_id` parameter.
|
|
248
|
+
|
|
249
|
+
All skill tools accept an optional `client_id` parameter: `"claude"` (default), `"codex"`, or `"generic"`. The entire prompt adapts:
|
|
250
|
+
|
|
251
|
+
| What adapts | Claude (`client_id: "claude"`) | Codex (`client_id: "codex"`) | Generic |
|
|
252
|
+
|---|---|---|---|
|
|
253
|
+
| Sub-agent orchestration | Task API with model hints | Natural language instructions | Natural language |
|
|
254
|
+
| Config file generated | `CLAUDE.md` | `CODEX-PROJECT.md` | `AI-CONFIG.md` |
|
|
255
|
+
| Model references | Opus / Sonnet | Generic model names | Generic model names |
|
|
256
|
+
| Memory root | `karukia/` | `karukia/` | `karukia/` |
|
|
257
|
+
|
|
258
|
+
This is the first MCP methodology server with true multi-AI platform abstraction. One npm package, one `.mcp.json` entry, full methodology regardless of the AI behind it.
|
|
259
|
+
|
|
260
|
+
---
|
|
261
|
+
|
|
262
|
+
## Iterative Coverage Tracking (New in v3.1)
|
|
263
|
+
|
|
264
|
+
Every audit skill tracks which files have been analyzed across sessions. No file in your codebase is left behind.
|
|
265
|
+
|
|
266
|
+
**How it works:**
|
|
267
|
+
1. **Scan 1** -- KARUKIA analyzes your codebase, covers ~40% of in-scope files. Writes a coverage manifest to `karukia/memory/coverage/{skill}-latest.json`.
|
|
268
|
+
2. **Scan 2** -- Reads the previous manifest, skips already-analyzed files, covers the next ~40%. Cumulative: 80%.
|
|
269
|
+
3. **Scan 3** -- Picks up the remaining 20%. Status: **COMPLETE**.
|
|
270
|
+
|
|
271
|
+
After any scan, the manifest records exactly which files were analyzed, which were skipped, and what findings were discovered -- with severity counts. When files are modified after a complete scan, only the changed files are re-analyzed.
|
|
272
|
+
|
|
273
|
+
```
|
|
274
|
+
--- COVERAGE neo ---
|
|
275
|
+
Scope total : 120 files
|
|
276
|
+
This scan : 48 files analyzed
|
|
277
|
+
Cumulative : 96 / 120 (80%)
|
|
278
|
+
Status : PARTIAL
|
|
279
|
+
|
|
280
|
+
Remaining -- next scan starts with:
|
|
281
|
+
- src/auth/session.ts
|
|
282
|
+
- src/api/handlers/patient.ts
|
|
283
|
+
- ... (24 more)
|
|
284
|
+
---
|
|
285
|
+
```
|
|
286
|
+
|
|
287
|
+
Coverage scopes are resolved from project-specific config (`karukia/config/coverage-scopes.json`, generated by `install`) or from the skill's default globs. This means a TypeScript audit scans `**/*.ts` files, a CSS audit scans `**/*.css` and `**/*.scss`, and so on.
|
|
288
|
+
|
|
289
|
+
---
|
|
290
|
+
|
|
291
|
+
## Standardized 6-Step Workflow (New in v3.1)
|
|
292
|
+
|
|
293
|
+
Every audit skill follows the same structured workflow:
|
|
294
|
+
|
|
295
|
+
```
|
|
296
|
+
Step 0 : PREPARATION -- Create session, load references
|
|
297
|
+
Step 0.5 : COVERAGE LOADING -- Read previous manifest, prioritize unscanned files
|
|
298
|
+
Step 1 : EXPLORATION -- Multi-agent parallel scanning (each agent covers a scope)
|
|
299
|
+
Step 2 : ANALYSIS -- Synthesize discoveries, identify required actions
|
|
300
|
+
Step 3 : EXECUTION -- Execute action plan, update progress after each action
|
|
301
|
+
Step 4 : VALIDATION -- Lint, build, test. Fix ALL issues before closure
|
|
302
|
+
Step 4.5 : COVERAGE WRITE -- Write coverage manifest for next session
|
|
303
|
+
Step 5 : CLOSURE -- Finalize session files, update trackers and knowledge base
|
|
304
|
+
```
|
|
305
|
+
|
|
306
|
+
Key workflow features:
|
|
307
|
+
- **Rule of 2 actions**: After every 2 read operations, findings MUST be written to `findings.md`. Context is never lost, even if the session is interrupted.
|
|
308
|
+
- **3-attempt protocol**: Diagnose and fix -- alternative approach -- rethink assumptions -- escalate to user. No blind retries.
|
|
309
|
+
- **Knowledge persistence**: Lessons learned and reusable patterns are saved to `karukia/memory/knowledge/` between sessions. The methodology gets smarter over time.
|
|
310
|
+
|
|
311
|
+
---
|
|
312
|
+
|
|
236
313
|
## Usage Examples
|
|
237
314
|
|
|
238
315
|
### Full security audit
|
|
@@ -253,6 +330,12 @@ Your AI calls `jeffrey` — becomes the Jeffrey architect — implements with TD
|
|
|
253
330
|
|
|
254
331
|
Your AI calls `viper` — deploys the Brigade methodology with 16 specialized agents across Recon, Surface Analysis, and Exploitation phases.
|
|
255
332
|
|
|
333
|
+
### Due diligence on a codebase (New in v3.1)
|
|
334
|
+
|
|
335
|
+
> "karukia deep_review"
|
|
336
|
+
|
|
337
|
+
Your AI calls `deep_review` — deploys a brigade of 6 parallel agents — each covers 2 of the 12 axes (code quality, architecture, scalability, costs, security, resilience, tests, DX, frontend perf, regulatory compliance, AI patterns, maintainability). Produces a scorecard with grades A+ to F per axis, a global score out of 120, and a prioritized action plan. Use it before an investment, a CTO takeover, or a major refactor.
|
|
338
|
+
|
|
256
339
|
### Orchestrate everything
|
|
257
340
|
|
|
258
341
|
> "karukia: add a logout button and audit security"
|
|
@@ -283,7 +366,7 @@ Built from the experience of securing a healthcare SaaS application for HDS 2.0
|
|
|
283
366
|
KARUKIA is a structured AI-assisted development methodology built around three principles:
|
|
284
367
|
|
|
285
368
|
1. **Separation of concerns** — Security, quality, and implementation are separate disciplines handled by separate AI personas.
|
|
286
|
-
2. **Formal checkpoints over gut feeling** —
|
|
369
|
+
2. **Formal checkpoints over gut feeling** — 1800+ documented checkpoints beat "I think it's fine."
|
|
287
370
|
3. **Defense in depth** — Defensive audit first, quality validation second, offensive testing last.
|
|
288
371
|
|
|
289
372
|
Built from real-world experience securing a healthcare SaaS application to HDS 2.0 / ISO 27001 standards.
|
|
@@ -318,7 +401,7 @@ If your company or consulting firm uses KARUKIA for production work or deploys i
|
|
|
318
401
|
| **Business** | 12 000 | Up to 50 developers |
|
|
319
402
|
| **Enterprise** | 20 000 | Unlimited developers + priority support |
|
|
320
403
|
|
|
321
|
-
All plans include: full access to all
|
|
404
|
+
All plans include: full access to all 27 tools, 20 skills, 1800+ checkpoints across 11 audit dimensions, and all updates for the license duration. Annual license, renewable.
|
|
322
405
|
|
|
323
406
|
**Contact:** contact@karukia.com
|
|
324
407
|
|
|
@@ -326,4 +409,4 @@ All plans include: full access to all 26 tools, 19 skills, 1797+ checkpoints acr
|
|
|
326
409
|
|
|
327
410
|
### Change License
|
|
328
411
|
|
|
329
|
-
On
|
|
412
|
+
On April 2, 2036, the Licensed Work will automatically convert to the [Apache License 2.0](https://www.apache.org/licenses/LICENSE-2.0).
|