karukia-mcp 3.0.6 → 3.1.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (4) hide show
  1. package/LICENSE +2 -3
  2. package/README.md +105 -22
  3. package/dist/index.js +715 -89
  4. package/package.json +4 -3
package/LICENSE CHANGED
@@ -1,9 +1,9 @@
1
1
  Business Source License 1.1
2
2
 
3
3
  Licensor: KARUK IA (contact@karukia.com)
4
- Licensed Work: karukia-mcp v3.0.5
4
+ Licensed Work: karukia-mcp v3.1.0
5
5
  The Licensed Work is (c) 2026 KARUK IA
6
- Change Date: March 6, 2028
6
+ Change Date: April 2, 2036
7
7
  Change License: Apache License, Version 2.0
8
8
 
9
9
  Additional Use Grant:
@@ -17,7 +17,6 @@ Additional Use Grant:
17
17
  - Personal projects and individual developers
18
18
  - Educational institutions (classroom, student projects, research)
19
19
  - Non-profit organizations
20
- - Non-profit organizations
21
20
 
22
21
  Production use is NOT permitted without a commercial license for:
23
22
  - Consulting firms (ESN) using karukia-mcp for client-facing work
package/README.md CHANGED
@@ -2,7 +2,7 @@
2
2
 
3
3
  **The complete AI-assisted development methodology, delivered via MCP.**
4
4
 
5
- **Latest: v3.0.5** — 26 tools, 19 skills, 1797+ checkpoints across 11 audit dimensions.
5
+ **Latest: v3.1.0** — 27 tools, 20 skills, 1800+ checkpoints across 11 audit dimensions. Multi-AI platform support.
6
6
 
7
7
 
8
8
  ```
@@ -15,7 +15,7 @@
15
15
  AI methodology for highly regulated industries · Made in Guadeloupe 🇬🇵
16
16
  ```
17
17
 
18
- 26 tools, 19 skills, 1797+ checkpoints across 11 audit dimensions. Works with any AI platform (Claude Code, Cursor, Windsurf, Copilot...) through the Model Context Protocol.
18
+ 27 tools, 20 skills, 1800+ checkpoints across 11 audit dimensions. Built for **Claude Code** and **OpenAI Codex**. Compatible with any MCP client.
19
19
 
20
20
  ---
21
21
 
@@ -28,29 +28,37 @@
28
28
 
29
29
  KARUKIA is a structured development methodology built around specialized AI personas. Each persona (Neo for security, Jeffrey for architecture, Viper for pentesting, Opo for quality...) comes with its own workflow, guard rails, and knowledge base.
30
30
 
31
- When you call a KARUKIA tool, the MCP server returns a complete prompt — persona identity, workflow, checklists, templates — that transforms your AI assistant into that specialist for the session.
31
+ When you call a KARUKIA tool, the MCP server returns a complete prompt — persona identity, standardized workflow, coverage tracking, checklists, templates — that transforms your AI assistant into that specialist for the session.
32
32
 
33
33
  ```
34
34
  You: "Run a security audit"
35
35
  -> AI calls neo tool
36
- -> MCP returns full Neo persona prompt + 445 security controls inline
36
+ -> MCP returns:
37
+ GUARD (non-negotiable obligations)
38
+ + Neo persona (identity, style, expertise)
39
+ + WORKFLOW (6-step standardized process)
40
+ + COVERAGE (load previous scan manifest, prioritize unscanned files)
41
+ + Checklists (445 security controls inline)
42
+ + AGENTS (multi-agent parallel exploration)
37
43
  -> AI becomes Neo, follows the methodology, produces structured findings
44
+ -> Coverage manifest written: 67% scanned — next session picks up where this one left off
38
45
  ```
39
46
 
40
- ## The 11 Audit Dimensions
47
+ ## The 12 Audit Dimensions
41
48
 
42
49
  ```
43
- SECURITY → Neo (445 pts) "Is my code secure?"
44
- QUALITY → Certix (369 pts) "Is my app well-built?"
45
- OFFENSIVE → Viper (245+ tests) "How would a hacker break in?"
46
- TS ts_quality (118) "Is my TypeScript clean?"
47
- CSS css_quality (55) "Is my design system maintainable?"
48
- ARCHI archi (70) "Is my architecture sound?"
49
- TESTS test_coverage (68) "Am I testing the right things?"
50
- PERF perf (90) "Where are the bottlenecks?"
51
- DEBT debt (55) "What's slowing us down?"
52
- HDS/ISO audit_expert (200+)"Am I ready for certification?"
53
- SCANkarukia_scan "Run all 11 dimensions at once"
50
+ SECURITY → Neo (445 pts) "Is my code secure?"
51
+ QUALITY → Certix (369 pts) "Is my app well-built?"
52
+ OFFENSIVE → Viper (245+ tests) "How would a hacker break in?"
53
+ DUE DILIGENCEdeep_review (12ax) "Is this codebase investment-ready?"
54
+ TS ts_quality (118) "Is my TypeScript clean?"
55
+ CSS css_quality (55) "Is my design system maintainable?"
56
+ ARCHI archi (70) "Is my architecture sound?"
57
+ TESTS test_coverage (68) "Am I testing the right things?"
58
+ PERF perf (90) "Where are the bottlenecks?"
59
+ DEBT debt (55) "What's slowing us down?"
60
+ HDS/ISOaudit_expert (200+)"Am I ready for certification?"
61
+ SCAN → karukia_scan "Run all 11 dimensions at once"
54
62
  ```
55
63
 
56
64
  ---
@@ -78,7 +86,7 @@ Create or edit `.mcp.json` at the root of your project:
78
86
 
79
87
  ### Step 2 — Restart your AI client
80
88
 
81
- Restart Claude Code (`/quit` then relaunch) or your IDE. The 27 KARUKIA tools are now available.
89
+ Restart Claude Code (`/quit` then relaunch) or your IDE. All 27 KARUKIA tools are now available.
82
90
 
83
91
  > On first launch, `npx` downloads the package automatically (~175 KB). Subsequent launches use the cached version.
84
92
 
@@ -136,7 +144,7 @@ Then add to your global AI config (`~/.claude.json` for Claude Code):
136
144
 
137
145
  ---
138
146
 
139
- ## 26 Tools
147
+ ## 27 Tools
140
148
 
141
149
  ### Essential (start here)
142
150
 
@@ -160,6 +168,7 @@ Each skill returns a complete prompt that transforms your AI into a specialist.
160
168
  | `ebios_rm_audit` | Risk Analyst | EBIOS Risk Manager methodology (ANSSI) — formal risk analysis |
161
169
  | `security_hardening` | Hardening Planner | Security improvement chantiers |
162
170
  | `doc_refactor` | Doc Auditor | Documentation accuracy audit vs actual code |
171
+ | `deep_review` | Due Diligence Lead | 12-axis technical review: code, archi, scalability, costs, security, resilience, tests, DX, frontend perf, regulatory, AI, maintainability |
163
172
 
164
173
  ### Dimensional Skills (v3.0 New)
165
174
 
@@ -171,7 +180,7 @@ Each skill returns a complete prompt that transforms your AI into a specialist.
171
180
  | `test_coverage` | 68 | Test inventory — frontend/backend coverage quality |
172
181
  | `perf` | 90 | Performance — frontend, backend, build/bundle |
173
182
  | `debt` | 55 | Technical debt — dead code, dependency health, code smells |
174
- | `karukia_scan` | 1797+ | **Global scan** — all 11 dimensions in parallel |
183
+ | `karukia_scan` | 1800+ | **Global scan** — all 11 dimensions in parallel |
175
184
  | `audit_expert_hds` | 200+ | Expert HDS 2.0/ISO 27001 — 8 domains, certification readiness |
176
185
  | `change_report` | — | Change management report (ISO 27001 A.8.32) |
177
186
 
@@ -233,6 +242,74 @@ Five profile-based checklists covering all aspects of web quality: DEV (developm
233
242
 
234
243
  ---
235
244
 
245
+ ## Multi-AI Platform Support
246
+
247
+ KARUKIA is built for and tested with **Claude Code** and **OpenAI Codex**. It is compatible with any MCP client (Cursor, Windsurf, Copilot, etc.), though those have not been tested with the `client_id` parameter.
248
+
249
+ All skill tools accept an optional `client_id` parameter: `"claude"` (default), `"codex"`, or `"generic"`. The entire prompt adapts:
250
+
251
+ | What adapts | Claude (`client_id: "claude"`) | Codex (`client_id: "codex"`) | Generic |
252
+ |---|---|---|---|
253
+ | Sub-agent orchestration | Task API with model hints | Natural language instructions | Natural language |
254
+ | Config file generated | `CLAUDE.md` | `CODEX-PROJECT.md` | `AI-CONFIG.md` |
255
+ | Model references | Opus / Sonnet | Generic model names | Generic model names |
256
+ | Memory root | `karukia/` | `karukia/` | `karukia/` |
257
+
258
+ This is the first MCP methodology server with true multi-AI platform abstraction. One npm package, one `.mcp.json` entry, full methodology regardless of the AI behind it.
259
+
260
+ ---
261
+
262
+ ## Iterative Coverage Tracking (New in v3.1)
263
+
264
+ Every audit skill tracks which files have been analyzed across sessions. No file in your codebase is left behind.
265
+
266
+ **How it works:**
267
+ 1. **Scan 1** -- KARUKIA analyzes your codebase, covers ~40% of in-scope files. Writes a coverage manifest to `karukia/memory/coverage/{skill}-latest.json`.
268
+ 2. **Scan 2** -- Reads the previous manifest, skips already-analyzed files, covers the next ~40%. Cumulative: 80%.
269
+ 3. **Scan 3** -- Picks up the remaining 20%. Status: **COMPLETE**.
270
+
271
+ After any scan, the manifest records exactly which files were analyzed, which were skipped, and what findings were discovered -- with severity counts. When files are modified after a complete scan, only the changed files are re-analyzed.
272
+
273
+ ```
274
+ --- COVERAGE neo ---
275
+ Scope total : 120 files
276
+ This scan : 48 files analyzed
277
+ Cumulative : 96 / 120 (80%)
278
+ Status : PARTIAL
279
+
280
+ Remaining -- next scan starts with:
281
+ - src/auth/session.ts
282
+ - src/api/handlers/patient.ts
283
+ - ... (24 more)
284
+ ---
285
+ ```
286
+
287
+ Coverage scopes are resolved from project-specific config (`karukia/config/coverage-scopes.json`, generated by `install`) or from the skill's default globs. This means a TypeScript audit scans `**/*.ts` files, a CSS audit scans `**/*.css` and `**/*.scss`, and so on.
288
+
289
+ ---
290
+
291
+ ## Standardized 6-Step Workflow (New in v3.1)
292
+
293
+ Every audit skill follows the same structured workflow:
294
+
295
+ ```
296
+ Step 0 : PREPARATION -- Create session, load references
297
+ Step 0.5 : COVERAGE LOADING -- Read previous manifest, prioritize unscanned files
298
+ Step 1 : EXPLORATION -- Multi-agent parallel scanning (each agent covers a scope)
299
+ Step 2 : ANALYSIS -- Synthesize discoveries, identify required actions
300
+ Step 3 : EXECUTION -- Execute action plan, update progress after each action
301
+ Step 4 : VALIDATION -- Lint, build, test. Fix ALL issues before closure
302
+ Step 4.5 : COVERAGE WRITE -- Write coverage manifest for next session
303
+ Step 5 : CLOSURE -- Finalize session files, update trackers and knowledge base
304
+ ```
305
+
306
+ Key workflow features:
307
+ - **Rule of 2 actions**: After every 2 read operations, findings MUST be written to `findings.md`. Context is never lost, even if the session is interrupted.
308
+ - **3-attempt protocol**: Diagnose and fix -- alternative approach -- rethink assumptions -- escalate to user. No blind retries.
309
+ - **Knowledge persistence**: Lessons learned and reusable patterns are saved to `karukia/memory/knowledge/` between sessions. The methodology gets smarter over time.
310
+
311
+ ---
312
+
236
313
  ## Usage Examples
237
314
 
238
315
  ### Full security audit
@@ -253,6 +330,12 @@ Your AI calls `jeffrey` — becomes the Jeffrey architect — implements with TD
253
330
 
254
331
  Your AI calls `viper` — deploys the Brigade methodology with 16 specialized agents across Recon, Surface Analysis, and Exploitation phases.
255
332
 
333
+ ### Due diligence on a codebase (New in v3.1)
334
+
335
+ > "karukia deep_review"
336
+
337
+ Your AI calls `deep_review` — deploys a brigade of 6 parallel agents — each covers 2 of the 12 axes (code quality, architecture, scalability, costs, security, resilience, tests, DX, frontend perf, regulatory compliance, AI patterns, maintainability). Produces a scorecard with grades A+ to F per axis, a global score out of 120, and a prioritized action plan. Use it before an investment, a CTO takeover, or a major refactor.
338
+
256
339
  ### Orchestrate everything
257
340
 
258
341
  > "karukia: add a logout button and audit security"
@@ -283,7 +366,7 @@ Built from the experience of securing a healthcare SaaS application for HDS 2.0
283
366
  KARUKIA is a structured AI-assisted development methodology built around three principles:
284
367
 
285
368
  1. **Separation of concerns** — Security, quality, and implementation are separate disciplines handled by separate AI personas.
286
- 2. **Formal checkpoints over gut feeling** — 1797+ documented checkpoints beat "I think it's fine."
369
+ 2. **Formal checkpoints over gut feeling** — 1800+ documented checkpoints beat "I think it's fine."
287
370
  3. **Defense in depth** — Defensive audit first, quality validation second, offensive testing last.
288
371
 
289
372
  Built from real-world experience securing a healthcare SaaS application to HDS 2.0 / ISO 27001 standards.
@@ -318,7 +401,7 @@ If your company or consulting firm uses KARUKIA for production work or deploys i
318
401
  | **Business** | 12 000 | Up to 50 developers |
319
402
  | **Enterprise** | 20 000 | Unlimited developers + priority support |
320
403
 
321
- All plans include: full access to all 26 tools, 19 skills, 1797+ checkpoints across 11 audit dimensions, and all updates for the license duration. Annual license, renewable.
404
+ All plans include: full access to all 27 tools, 20 skills, 1800+ checkpoints across 11 audit dimensions, and all updates for the license duration. Annual license, renewable.
322
405
 
323
406
  **Contact:** contact@karukia.com
324
407
 
@@ -326,4 +409,4 @@ All plans include: full access to all 26 tools, 19 skills, 1797+ checkpoints acr
326
409
 
327
410
  ### Change License
328
411
 
329
- On March 6, 2028, the Licensed Work will automatically convert to the [Apache License 2.0](https://www.apache.org/licenses/LICENSE-2.0).
412
+ On April 2, 2036, the Licensed Work will automatically convert to the [Apache License 2.0](https://www.apache.org/licenses/LICENSE-2.0).