icdev 1.0.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- icdev/__init__.py +18 -0
- icdev/_paths.py +85 -0
- icdev/_version.py +3 -0
- icdev/data/__init__.py +1 -0
- icdev/data/args/__init__.py +1 -0
- icdev/data/args/agent_authority.yaml +61 -0
- icdev/data/args/agent_config.yaml +355 -0
- icdev/data/args/agentic_fitness.yaml +31 -0
- icdev/data/args/ai_governance_config.yaml +137 -0
- icdev/data/args/atlas_critique_config.yaml +66 -0
- icdev/data/args/bedrock_models.yaml +63 -0
- icdev/data/args/cicd_config.yaml +82 -0
- icdev/data/args/classification_config.yaml +232 -0
- icdev/data/args/cli_config.yaml +154 -0
- icdev/data/args/cloud_config.yaml +63 -0
- icdev/data/args/code_pattern_config.yaml +151 -0
- icdev/data/args/code_quality_config.yaml +47 -0
- icdev/data/args/companion_registry.yaml +202 -0
- icdev/data/args/context_config.yaml +82 -0
- icdev/data/args/csp_monitor_config.yaml +268 -0
- icdev/data/args/cui_markings.yaml +35 -0
- icdev/data/args/db_config.yaml +40 -0
- icdev/data/args/deployment_profiles.yaml +248 -0
- icdev/data/args/dev_profile_config.yaml +144 -0
- icdev/data/args/devsecops_config.yaml +286 -0
- icdev/data/args/endpoint_security_config.yaml +137 -0
- icdev/data/args/extension_config.yaml +79 -0
- icdev/data/args/file_access_tiers.yaml +88 -0
- icdev/data/args/framework_registry.yaml +415 -0
- icdev/data/args/innovation_config.yaml +431 -0
- icdev/data/args/installation_manifest.yaml +1087 -0
- icdev/data/args/llm_config.yaml +495 -0
- icdev/data/args/maintenance_config.yaml +55 -0
- icdev/data/args/memory_config.yaml +83 -0
- icdev/data/args/monitoring_config.yaml +127 -0
- icdev/data/args/mosa_config.yaml +190 -0
- icdev/data/args/nlq_config.yaml +35 -0
- icdev/data/args/observability_config.yaml +39 -0
- icdev/data/args/observability_tracing_config.yaml +170 -0
- icdev/data/args/oscal_tools_config.yaml +43 -0
- icdev/data/args/owasp_agentic_config.yaml +171 -0
- icdev/data/args/phase_registry.yaml +618 -0
- icdev/data/args/project_defaults.yaml +235 -0
- icdev/data/args/prompt_chains.yaml +163 -0
- icdev/data/args/resilience_config.yaml +50 -0
- icdev/data/args/ricoas_config.yaml +191 -0
- icdev/data/args/role_personas.yaml +362 -0
- icdev/data/args/scaling_config.yaml +176 -0
- icdev/data/args/security_gates.yaml +685 -0
- icdev/data/args/skill_injection_config.yaml +322 -0
- icdev/data/args/spec_config.yaml +53 -0
- icdev/data/args/supply_chain_config.yaml +76 -0
- icdev/data/args/translation_config.yaml +228 -0
- icdev/data/args/workflow_templates/ato_acceleration.yaml +54 -0
- icdev/data/args/workflow_templates/build_deploy.yaml +63 -0
- icdev/data/args/workflow_templates/full_compliance.yaml +43 -0
- icdev/data/args/workflow_templates/security_hardening.yaml +55 -0
- icdev/data/args/worktree_config.yaml +34 -0
- icdev/data/args/zta_config.yaml +247 -0
- icdev/data/context/__init__.py +1 -0
- icdev/data/context/agent/__init__.py +1 -0
- icdev/data/context/agent/response_schemas/__init__.py +1 -0
- icdev/data/context/agent/response_schemas/debate_position.json +46 -0
- icdev/data/context/agent/response_schemas/fitness_scorecard.json +74 -0
- icdev/data/context/agent/response_schemas/review_decision.json +39 -0
- icdev/data/context/agent/response_schemas/task_decomposition.json +82 -0
- icdev/data/context/agent/response_schemas/veto_decision.json +40 -0
- icdev/data/context/agentic/__init__.py +1 -0
- icdev/data/context/agentic/architecture_patterns.md +269 -0
- icdev/data/context/agentic/capability_registry.yaml +202 -0
- icdev/data/context/agentic/csp_mcp_registry.yaml +280 -0
- icdev/data/context/agentic/fitness_rubric.md +56 -0
- icdev/data/context/agentic/governance_baseline.md +205 -0
- icdev/data/context/ci/__init__.py +1 -0
- icdev/data/context/ci/worktree_templates.json +44 -0
- icdev/data/context/cloud/__init__.py +1 -0
- icdev/data/context/cloud/csp_service_registry.json +739 -0
- icdev/data/context/compliance/__init__.py +1 -0
- icdev/data/context/compliance/atlas_mitigations.json +293 -0
- icdev/data/context/compliance/atlas_techniques.json +833 -0
- icdev/data/context/compliance/cisa_sbd_requirements.json +432 -0
- icdev/data/context/compliance/cjis_security_policy.json +522 -0
- icdev/data/context/compliance/cmmc_practices.json +2494 -0
- icdev/data/context/compliance/cmmc_report_template.md +142 -0
- icdev/data/context/compliance/cnssi_1253_overlay.json +109 -0
- icdev/data/context/compliance/control_crosswalk.json +1914 -0
- icdev/data/context/compliance/control_families/__init__.py +1 -0
- icdev/data/context/compliance/csp_certifications.json +251 -0
- icdev/data/context/compliance/cssp_report_template.md +193 -0
- icdev/data/context/compliance/cui_templates/__init__.py +1 -0
- icdev/data/context/compliance/cui_templates/banner_block.txt +4 -0
- icdev/data/context/compliance/cui_templates/code_header.txt +8 -0
- icdev/data/context/compliance/cui_templates/document_template.md +35 -0
- icdev/data/context/compliance/data_type_framework_map.json +321 -0
- icdev/data/context/compliance/data_type_registry.json +147 -0
- icdev/data/context/compliance/dod_cssp_8530.json +463 -0
- icdev/data/context/compliance/eu_ai_act_annex_iii.json +108 -0
- icdev/data/context/compliance/export_templates/__init__.py +1 -0
- icdev/data/context/compliance/export_templates/emass_controls.csv.j2 +4 -0
- icdev/data/context/compliance/export_templates/evidence_package.md.j2 +39 -0
- icdev/data/context/compliance/export_templates/executive_summary.md.j2 +55 -0
- icdev/data/context/compliance/export_templates/poam_tracking.csv.j2 +4 -0
- icdev/data/context/compliance/fedramp_20x_ksi_schemas.json +133 -0
- icdev/data/context/compliance/fedramp_high_baseline.json +4370 -0
- icdev/data/context/compliance/fedramp_moderate_baseline.json +2183 -0
- icdev/data/context/compliance/fedramp_report_template.md +181 -0
- icdev/data/context/compliance/fips_200_areas.json +362 -0
- icdev/data/context/compliance/gao_ai_accountability.json +262 -0
- icdev/data/context/compliance/hipaa_security_rule.json +720 -0
- icdev/data/context/compliance/hitrust_csf_v11.json +930 -0
- icdev/data/context/compliance/impact_level_profiles.json +251 -0
- icdev/data/context/compliance/incident_response_template.md +1110 -0
- icdev/data/context/compliance/iso27001_2022_controls.json +750 -0
- icdev/data/context/compliance/iso27001_nist_bridge.json +382 -0
- icdev/data/context/compliance/iso42001_controls.json +254 -0
- icdev/data/context/compliance/ivv_checklist_template.md +80 -0
- icdev/data/context/compliance/ivv_report_template.md +116 -0
- icdev/data/context/compliance/ivv_requirements.json +372 -0
- icdev/data/context/compliance/mosa_crosswalk.json +327 -0
- icdev/data/context/compliance/mosa_framework.json +250 -0
- icdev/data/context/compliance/narrative_templates/AC.md.j2 +101 -0
- icdev/data/context/compliance/narrative_templates/AU.md.j2 +106 -0
- icdev/data/context/compliance/narrative_templates/IA.md.j2 +104 -0
- icdev/data/context/compliance/narrative_templates/SC.md.j2 +102 -0
- icdev/data/context/compliance/narrative_templates/SI.md.j2 +111 -0
- icdev/data/context/compliance/narrative_templates/__init__.py +1 -0
- icdev/data/context/compliance/narrative_templates/default.md.j2 +50 -0
- icdev/data/context/compliance/narrative_templates/executive_summary.j2 +27 -0
- icdev/data/context/compliance/narrative_templates/poam_milestone.j2 +19 -0
- icdev/data/context/compliance/narrative_templates/ssp_section.j2 +11 -0
- icdev/data/context/compliance/nist_800_171_controls.json +1552 -0
- icdev/data/context/compliance/nist_800_207_crosswalk.json +399 -0
- icdev/data/context/compliance/nist_800_207_zta.json +258 -0
- icdev/data/context/compliance/nist_800_53.json +324 -0
- icdev/data/context/compliance/nist_ai_600_1_genai.json +326 -0
- icdev/data/context/compliance/nist_ai_rmf.json +206 -0
- icdev/data/context/compliance/nist_sp_800_60_types.json +1667 -0
- icdev/data/context/compliance/omb_m25_21_high_impact_ai.json +248 -0
- icdev/data/context/compliance/omb_m26_04_unbiased_ai.json +262 -0
- icdev/data/context/compliance/owasp_agentic_asi.json +133 -0
- icdev/data/context/compliance/owasp_agentic_threats.json +285 -0
- icdev/data/context/compliance/owasp_llm_top10.json +274 -0
- icdev/data/context/compliance/pci_dss_v4.json +510 -0
- icdev/data/context/compliance/poam_template.md +117 -0
- icdev/data/context/compliance/safeai_controls.json +512 -0
- icdev/data/context/compliance/sbd_report_template.md +77 -0
- icdev/data/context/compliance/siem_config_templates/__init__.py +1 -0
- icdev/data/context/compliance/siem_config_templates/filebeat.yml +213 -0
- icdev/data/context/compliance/siem_config_templates/log_sources.json +208 -0
- icdev/data/context/compliance/soc2_trust_criteria.json +661 -0
- icdev/data/context/compliance/ssp_template.md +432 -0
- icdev/data/context/compliance/stig_templates/__init__.py +1 -0
- icdev/data/context/compliance/stig_templates/webapp_stig.json +139 -0
- icdev/data/context/compliance/xai_requirements.json +108 -0
- icdev/data/context/dashboard/__init__.py +1 -0
- icdev/data/context/dashboard/nlq_examples.json +50 -0
- icdev/data/context/dashboard/schema_descriptions.json +23 -0
- icdev/data/context/integration/__init__.py +1 -0
- icdev/data/context/integration/approval_workflows.json +32 -0
- icdev/data/context/integration/gitlab_field_mappings.json +33 -0
- icdev/data/context/integration/jira_field_mappings.json +32 -0
- icdev/data/context/integration/reqif_export_schema.json +23 -0
- icdev/data/context/integration/servicenow_field_mappings.json +22 -0
- icdev/data/context/languages/__init__.py +1 -0
- icdev/data/context/languages/framework_patterns.json +205 -0
- icdev/data/context/languages/language_registry.json +279 -0
- icdev/data/context/llm/__init__.py +1 -0
- icdev/data/context/llm/example_provider.py +86 -0
- icdev/data/context/mbse/__init__.py +1 -0
- icdev/data/context/mbse/des_report_template.md +162 -0
- icdev/data/context/mbse/des_requirements.json +411 -0
- icdev/data/context/mbse/digital_thread_patterns.json +403 -0
- icdev/data/context/mbse/reqif_schema.json +280 -0
- icdev/data/context/mbse/sysml_element_types.json +432 -0
- icdev/data/context/modernization/__init__.py +1 -0
- icdev/data/context/modernization/db_type_mappings.json +148 -0
- icdev/data/context/modernization/decomposition_patterns.json +284 -0
- icdev/data/context/modernization/framework_migration_patterns.json +359 -0
- icdev/data/context/modernization/migration_report_template.md +168 -0
- icdev/data/context/modernization/seven_rs_catalog.json +369 -0
- icdev/data/context/modernization/version_upgrade_rules.json +279 -0
- icdev/data/context/oscal/NIST_SP-800-53_rev5_catalog.json +254987 -0
- icdev/data/context/oscal/README.md +43 -0
- icdev/data/context/patterns/__init__.py +1 -0
- icdev/data/context/profiles/__init__.py +1 -0
- icdev/data/context/profiles/dod_baseline_v1.yaml +145 -0
- icdev/data/context/profiles/fedramp_baseline_v1.yaml +143 -0
- icdev/data/context/profiles/financial_baseline_v1.yaml +142 -0
- icdev/data/context/profiles/healthcare_baseline_v1.yaml +135 -0
- icdev/data/context/profiles/law_enforcement_v1.yaml +129 -0
- icdev/data/context/profiles/startup_v1.yaml +134 -0
- icdev/data/context/requirements/__init__.py +1 -0
- icdev/data/context/requirements/ambiguity_patterns.json +97 -0
- icdev/data/context/requirements/boundary_impact_rules.json +123 -0
- icdev/data/context/requirements/default_constitutions.json +67 -0
- icdev/data/context/requirements/document_extraction_rules.json +58 -0
- icdev/data/context/requirements/gap_patterns.json +108 -0
- icdev/data/context/requirements/readiness_rubric.json +78 -0
- icdev/data/context/requirements/red_alternative_patterns.json +210 -0
- icdev/data/context/requirements/safe_templates.json +72 -0
- icdev/data/context/requirements/spec_quality_checklist.json +122 -0
- icdev/data/context/simulation/__init__.py +1 -0
- icdev/data/context/simulation/architecture_patterns.json +36 -0
- icdev/data/context/simulation/coa_templates.json +38 -0
- icdev/data/context/simulation/cost_models.json +23 -0
- icdev/data/context/simulation/risk_categories.json +46 -0
- icdev/data/context/supply_chain/__init__.py +1 -0
- icdev/data/context/supply_chain/isa_templates.json +129 -0
- icdev/data/context/supply_chain/nist_800_161_controls.json +247 -0
- icdev/data/context/supply_chain/scrm_risk_matrix.json +147 -0
- icdev/data/context/templates/__init__.py +1 -0
- icdev/data/context/templates/ansible/__init__.py +1 -0
- icdev/data/context/templates/ansible/playbooks/__init__.py +1 -0
- icdev/data/context/templates/ansible/roles/__init__.py +1 -0
- icdev/data/context/templates/gitlab_ci/__init__.py +1 -0
- icdev/data/context/templates/grafana/__init__.py +1 -0
- icdev/data/context/templates/kubernetes/__init__.py +1 -0
- icdev/data/context/templates/project/__init__.py +1 -0
- icdev/data/context/templates/project/api/__init__.py +1 -0
- icdev/data/context/templates/project/cli/__init__.py +1 -0
- icdev/data/context/templates/project/data_pipeline/__init__.py +1 -0
- icdev/data/context/templates/project/iac/__init__.py +1 -0
- icdev/data/context/templates/project/javascript_frontend/__init__.py +1 -0
- icdev/data/context/templates/project/javascript_frontend/src/__init__.py +1 -0
- icdev/data/context/templates/project/javascript_frontend/tests/__init__.py +1 -0
- icdev/data/context/templates/project/microservice/__init__.py +1 -0
- icdev/data/context/templates/project/python_backend/__init__.py +1 -0
- icdev/data/context/templates/project/python_backend/src/__init__.py +1 -0
- icdev/data/context/templates/project/python_backend/tests/__init__.py +1 -0
- icdev/data/context/templates/project/python_backend/tests/features/__init__.py +1 -0
- icdev/data/context/templates/project/python_backend/tests/steps/__init__.py +1 -0
- icdev/data/context/templates/terraform/__init__.py +1 -0
- icdev/data/context/templates/terraform/govcloud_base/__init__.py +1 -0
- icdev/data/context/templates/terraform/modules/__init__.py +1 -0
- icdev/data/context/tone/__init__.py +1 -0
- icdev/data/context/translation/dependency_mappings.json +186 -0
- icdev/data/context/translation/type_mappings.json +149 -0
- icdev/data/docs/README.md +187 -0
- icdev/data/docs/__init__.py +1 -0
- icdev/data/docs/admin/gateway-guide.md +338 -0
- icdev/data/docs/admin/marketplace-guide.md +396 -0
- icdev/data/docs/admin/monitoring-guide.md +509 -0
- icdev/data/docs/architecture/compliance-framework.md +764 -0
- icdev/data/docs/architecture/database-schema.md +689 -0
- icdev/data/docs/architecture/gotcha-framework.md +518 -0
- icdev/data/docs/architecture/multi-agent-system.md +603 -0
- icdev/data/docs/dx/README.md +106 -0
- icdev/data/docs/dx/__init__.py +1 -0
- icdev/data/docs/dx/ci-cd-integration.md +378 -0
- icdev/data/docs/dx/claude-code-guide.md +213 -0
- icdev/data/docs/dx/companion-guide.md +232 -0
- icdev/data/docs/dx/dev-profiles.md +309 -0
- icdev/data/docs/dx/icdev-yaml-spec.md +219 -0
- icdev/data/docs/dx/integration-tiers.md +279 -0
- icdev/data/docs/dx/llm-routing-guide.md +456 -0
- icdev/data/docs/dx/quickstart.md +192 -0
- icdev/data/docs/dx/sdk-reference.md +356 -0
- icdev/data/docs/dx/unified-mcp-setup.md +525 -0
- icdev/data/docs/features/__init__.py +1 -0
- icdev/data/docs/features/phase-01-gotcha-framework.md +249 -0
- icdev/data/docs/features/phase-02-atlas-build-workflow.md +223 -0
- icdev/data/docs/features/phase-03-tdd-bdd-testing.md +261 -0
- icdev/data/docs/features/phase-04-nist-compliance.md +255 -0
- icdev/data/docs/features/phase-05-security-scanning.md +229 -0
- icdev/data/docs/features/phase-06-infrastructure-deployment.md +288 -0
- icdev/data/docs/features/phase-07-code-review-gates.md +276 -0
- icdev/data/docs/features/phase-08-self-healing.md +223 -0
- icdev/data/docs/features/phase-09-monitoring-observability.md +230 -0
- icdev/data/docs/features/phase-10-dashboard-web-ui.md +218 -0
- icdev/data/docs/features/phase-11-multi-agent-architecture.md +272 -0
- icdev/data/docs/features/phase-12-integration-testing.md +228 -0
- icdev/data/docs/features/phase-13-cicd-integration.md +257 -0
- icdev/data/docs/features/phase-14-secure-by-design-ivv.md +240 -0
- icdev/data/docs/features/phase-15-maintenance-audit.md +192 -0
- icdev/data/docs/features/phase-16-ato-acceleration.md +228 -0
- icdev/data/docs/features/phase-17-multi-framework-compliance.md +223 -0
- icdev/data/docs/features/phase-18-mbse-integration.md +242 -0
- icdev/data/docs/features/phase-19-agentic-generation.md +202 -0
- icdev/data/docs/features/phase-20-fips-security-categorization.md +198 -0
- icdev/data/docs/features/phase-21-saas-multi-tenancy.md +273 -0
- icdev/data/docs/features/phase-22-federated-gotcha-marketplace.md +242 -0
- icdev/data/docs/features/phase-23-universal-compliance-platform.md +238 -0
- icdev/data/docs/features/phase-24-devsecops-pipeline-security.md +198 -0
- icdev/data/docs/features/phase-25-zero-trust-architecture.md +220 -0
- icdev/data/docs/features/phase-26-dod-mosa.md +205 -0
- icdev/data/docs/features/phase-27-cli-capabilities.md +222 -0
- icdev/data/docs/features/phase-28-remote-command-gateway.md +235 -0
- icdev/data/docs/features/phase-29-proactive-monitoring.md +212 -0
- icdev/data/docs/features/phase-30-dashboard-auth.md +215 -0
- icdev/data/docs/features/phase-31-dashboard-ux-low-impact.md +188 -0
- icdev/data/docs/features/phase-32-dashboard-ux-medium-impact.md +223 -0
- icdev/data/docs/features/phase-33-modular-installation.md +218 -0
- icdev/data/docs/features/phase-34-dev-profiles.md +239 -0
- icdev/data/docs/features/phase-35-innovation-engine.md +257 -0
- icdev/data/docs/features/phase-36-evolutionary-intelligence.md +351 -0
- icdev/data/docs/features/phase-37-mitre-atlas-integration.md +485 -0
- icdev/data/docs/features/phase-38-cloud-agnostic-architecture.md +1033 -0
- icdev/data/docs/features/phase-39-observability-operations.md +178 -0
- icdev/data/docs/features/phase-40-nlq-compliance-queries.md +176 -0
- icdev/data/docs/features/phase-41-parallel-cicd.md +169 -0
- icdev/data/docs/features/phase-42-framework-planning.md +177 -0
- icdev/data/docs/features/phase-43-cross-language-translation.md +225 -0
- icdev/data/docs/features/phase-44-innovation-adaptation.md +227 -0
- icdev/data/docs/features/phase-45-owasp-agentic-security.md +239 -0
- icdev/data/docs/features/phase-46-observability-traceability-xai.md +240 -0
- icdev/data/docs/features/phase-47-unified-mcp-gateway.md +257 -0
- icdev/data/docs/features/phase-48-ai-transparency.md +203 -0
- icdev/data/docs/features/phase-49-ai-accountability.md +243 -0
- icdev/data/docs/features/phase-50-ai-governance-intake-chat.md +195 -0
- icdev/data/docs/features/phase-51-unified-chat-dashboard.md +240 -0
- icdev/data/docs/features/phase-52-code-intelligence.md +244 -0
- icdev/data/docs/features/phase-53-fedramp-20x-owasp-asi.md +359 -0
- icdev/data/docs/features/phase-54-slsa-swft-orchestration.md +379 -0
- icdev/data/docs/features/phase-55-a2a-v03-mcp-oauth.md +322 -0
- icdev/data/docs/features/phase-56-evidence-lineage.md +352 -0
- icdev/data/docs/features/phase-57-eu-ai-act-iron-bank.md +319 -0
- icdev/data/docs/features/phase-58-creative-engine.md +370 -0
- icdev/data/docs/features/phase-59-govcon-intelligence.md +535 -0
- icdev/data/docs/features/phase-60-cpmp.md +528 -0
- icdev/data/docs/features/phase-61-orchestration-improvements.md +534 -0
- icdev/data/docs/operations/dashboard-guide.md +354 -0
- icdev/data/docs/operations/deployment-guide.md +556 -0
- icdev/data/docs/operations/saas-admin-guide.md +439 -0
- icdev/data/docs/operations/security-operations-guide.md +733 -0
- icdev/data/docs/runbooks/backup-restore.md +412 -0
- icdev/data/docs/runbooks/troubleshooting.md +499 -0
- icdev/data/features/__init__.py +1 -0
- icdev/data/features/cicd_integration.feature +41 -0
- icdev/data/features/compliance_gates.feature +46 -0
- icdev/data/features/dashboard.feature +72 -0
- icdev/data/features/environment.py +25 -0
- icdev/data/features/project_management.feature +32 -0
- icdev/data/features/requirements_intake.feature +42 -0
- icdev/data/features/saas_platform.feature +53 -0
- icdev/data/features/security_scanning.feature +36 -0
- icdev/data/features/steps/__init__.py +1 -0
- icdev/data/features/steps/cicd_steps.py +465 -0
- icdev/data/features/steps/compliance_steps.py +308 -0
- icdev/data/features/steps/dashboard_steps.py +88 -0
- icdev/data/features/steps/project_steps.py +126 -0
- icdev/data/features/steps/requirements_intake_steps.py +689 -0
- icdev/data/features/steps/saas_platform_steps.py +572 -0
- icdev/data/features/steps/security_steps.py +236 -0
- icdev/data/features/steps/testing_steps.py +226 -0
- icdev/data/features/testing_pipeline.feature +42 -0
- icdev/data/goals/__init__.py +1 -0
- icdev/data/goals/agent_management.md +144 -0
- icdev/data/goals/agentic_generation.md +345 -0
- icdev/data/goals/agentic_threat_model.md +309 -0
- icdev/data/goals/ai_accountability.md +90 -0
- icdev/data/goals/ai_governance_intake.md +132 -0
- icdev/data/goals/ai_transparency.md +76 -0
- icdev/data/goals/atlas_integration.md +405 -0
- icdev/data/goals/ato_acceleration.md +139 -0
- icdev/data/goals/boundary_supply_chain.md +206 -0
- icdev/data/goals/build_app.md +544 -0
- icdev/data/goals/cicd_integration.md +86 -0
- icdev/data/goals/claude_dir_maintenance.md +77 -0
- icdev/data/goals/cli_capabilities.md +340 -0
- icdev/data/goals/cloud_agnostic.md +312 -0
- icdev/data/goals/code_intelligence.md +197 -0
- icdev/data/goals/code_review.md +94 -0
- icdev/data/goals/compliance_workflow.md +858 -0
- icdev/data/goals/continuous_harmonization.md +140 -0
- icdev/data/goals/cross_language_translation.md +171 -0
- icdev/data/goals/dashboard.md +142 -0
- icdev/data/goals/deploy_workflow.md +390 -0
- icdev/data/goals/devsecops_workflow.md +408 -0
- icdev/data/goals/evolutionary_intelligence.md +305 -0
- icdev/data/goals/external_integration.md +113 -0
- icdev/data/goals/framework_planning.md +63 -0
- icdev/data/goals/init_project.md +235 -0
- icdev/data/goals/innovation_engine.md +199 -0
- icdev/data/goals/integration_testing.md +189 -0
- icdev/data/goals/maintenance_audit.md +196 -0
- icdev/data/goals/manifest.md +56 -0
- icdev/data/goals/mbse_integration.md +504 -0
- icdev/data/goals/modernization_workflow.md +618 -0
- icdev/data/goals/monitoring.md +126 -0
- icdev/data/goals/mosa_workflow.md +463 -0
- icdev/data/goals/multi_agent_orchestration.md +68 -0
- icdev/data/goals/nlq_compliance.md +63 -0
- icdev/data/goals/observability.md +64 -0
- icdev/data/goals/observability_traceability_xai.md +154 -0
- icdev/data/goals/owasp_agentic_security.md +395 -0
- icdev/data/goals/parallel_cicd.md +61 -0
- icdev/data/goals/requirements_intake.md +213 -0
- icdev/data/goals/sbd_ivv_workflow.md +195 -0
- icdev/data/goals/security_categorization.md +133 -0
- icdev/data/goals/security_scan.md +381 -0
- icdev/data/goals/self_healing.md +120 -0
- icdev/data/goals/simulation_engine.md +111 -0
- icdev/data/goals/tdd_workflow.md +403 -0
- icdev/data/goals/zero_trust_architecture.md +403 -0
- icdev/data/hardprompts/__init__.py +1 -0
- icdev/data/hardprompts/agent/__init__.py +1 -0
- icdev/data/hardprompts/agent/agentic_architect.md +100 -0
- icdev/data/hardprompts/agent/debate_prompt.md +32 -0
- icdev/data/hardprompts/agent/fitness_evaluation.md +48 -0
- icdev/data/hardprompts/agent/governance_review.md +214 -0
- icdev/data/hardprompts/agent/reviewer_prompt.md +34 -0
- icdev/data/hardprompts/agent/skill_design.md +172 -0
- icdev/data/hardprompts/agent/task_decomposition.md +275 -0
- icdev/data/hardprompts/agent/veto_check_prompt.md +33 -0
- icdev/data/hardprompts/architect/__init__.py +1 -0
- icdev/data/hardprompts/architect/api_design.md +283 -0
- icdev/data/hardprompts/architect/data_model.md +277 -0
- icdev/data/hardprompts/architect/system_design.md +180 -0
- icdev/data/hardprompts/builder/__init__.py +1 -0
- icdev/data/hardprompts/builder/code_generation.md +59 -0
- icdev/data/hardprompts/builder/refactor.md +58 -0
- icdev/data/hardprompts/builder/scaffold_project.md +69 -0
- icdev/data/hardprompts/builder/test_generation.md +87 -0
- icdev/data/hardprompts/ci/__init__.py +1 -0
- icdev/data/hardprompts/ci/worktree_setup.md +35 -0
- icdev/data/hardprompts/compliance/__init__.py +1 -0
- icdev/data/hardprompts/compliance/cmmc_assessment.md +63 -0
- icdev/data/hardprompts/compliance/cssp_assessment.md +75 -0
- icdev/data/hardprompts/compliance/cui_marking.md +86 -0
- icdev/data/hardprompts/compliance/fedramp_assessment.md +55 -0
- icdev/data/hardprompts/compliance/ivv_assessment.md +96 -0
- icdev/data/hardprompts/compliance/poam_generation.md +57 -0
- icdev/data/hardprompts/compliance/sbd_assessment.md +101 -0
- icdev/data/hardprompts/compliance/security_categorization.md +74 -0
- icdev/data/hardprompts/compliance/ssp_generation.md +56 -0
- icdev/data/hardprompts/compliance/stig_evaluation.md +63 -0
- icdev/data/hardprompts/dashboard/__init__.py +1 -0
- icdev/data/hardprompts/dashboard/nlq_system_prompt.md +26 -0
- icdev/data/hardprompts/infra/__init__.py +1 -0
- icdev/data/hardprompts/infra/k8s_manifests.md +118 -0
- icdev/data/hardprompts/infra/pipeline_generation.md +160 -0
- icdev/data/hardprompts/infra/terraform_generation.md +92 -0
- icdev/data/hardprompts/integration/__init__.py +1 -0
- icdev/data/hardprompts/integration/approval_review.md +17 -0
- icdev/data/hardprompts/integration/jira_mapping.md +25 -0
- icdev/data/hardprompts/integration/servicenow_mapping.md +14 -0
- icdev/data/hardprompts/knowledge/__init__.py +1 -0
- icdev/data/hardprompts/knowledge/pattern_detection.md +73 -0
- icdev/data/hardprompts/knowledge/recommendation_engine.md +90 -0
- icdev/data/hardprompts/knowledge/root_cause_analysis.md +91 -0
- icdev/data/hardprompts/maintenance/__init__.py +1 -0
- icdev/data/hardprompts/maintenance/maintenance_assessment.md +82 -0
- icdev/data/hardprompts/mbse/__init__.py +1 -0
- icdev/data/hardprompts/mbse/digital_thread.md +67 -0
- icdev/data/hardprompts/mbse/model_import.md +62 -0
- icdev/data/hardprompts/mbse/model_to_code.md +65 -0
- icdev/data/hardprompts/modernization/__init__.py +1 -0
- icdev/data/hardprompts/modernization/legacy_analysis.md +93 -0
- icdev/data/hardprompts/modernization/migration_planning.md +150 -0
- icdev/data/hardprompts/modernization/seven_r_assessment.md +107 -0
- icdev/data/hardprompts/requirements/__init__.py +1 -0
- icdev/data/hardprompts/requirements/bdd_generation.md +35 -0
- icdev/data/hardprompts/requirements/clarification_prioritization.md +29 -0
- icdev/data/hardprompts/requirements/decomposition.md +60 -0
- icdev/data/hardprompts/requirements/document_extraction.md +45 -0
- icdev/data/hardprompts/requirements/gap_detection.md +70 -0
- icdev/data/hardprompts/requirements/intake_conversation.md +101 -0
- icdev/data/hardprompts/requirements/readiness_assessment.md +39 -0
- icdev/data/hardprompts/requirements/spec_quality.md +33 -0
- icdev/data/hardprompts/requirements/traceability_analysis.md +23 -0
- icdev/data/hardprompts/security/__init__.py +1 -0
- icdev/data/hardprompts/security/endpoint_security.md +78 -0
- icdev/data/hardprompts/security/threat_model.md +70 -0
- icdev/data/hardprompts/security/vulnerability_assessment.md +81 -0
- icdev/data/hardprompts/simulation/__init__.py +1 -0
- icdev/data/hardprompts/simulation/architecture_impact.md +27 -0
- icdev/data/hardprompts/simulation/coa_alternative.md +27 -0
- icdev/data/hardprompts/simulation/coa_generation.md +25 -0
- icdev/data/hardprompts/simulation/compliance_impact.md +28 -0
- icdev/data/hardprompts/simulation/cost_estimation.md +33 -0
- icdev/data/hardprompts/simulation/risk_assessment.md +28 -0
- icdev/data/hardprompts/translation/code_translation.md +68 -0
- icdev/data/hardprompts/translation/dependency_suggestion.md +44 -0
- icdev/data/hardprompts/translation/test_translation.md +64 -0
- icdev/data/hardprompts/translation/translation_repair.md +59 -0
- icdev/py.typed +0 -0
- icdev/tools/__init__.py +1 -0
- icdev/tools/_gen_formatter.py +12 -0
- icdev/tools/a2a/__init__.py +1 -0
- icdev/tools/a2a/agent_cards/architect.json +43 -0
- icdev/tools/a2a/agent_cards/builder.json +50 -0
- icdev/tools/a2a/agent_cards/compliance.json +57 -0
- icdev/tools/a2a/agent_cards/devsecops.json +71 -0
- icdev/tools/a2a/agent_cards/infra.json +57 -0
- icdev/tools/a2a/agent_cards/integration.json +57 -0
- icdev/tools/a2a/agent_cards/knowledge.json +43 -0
- icdev/tools/a2a/agent_cards/mbse.json +57 -0
- icdev/tools/a2a/agent_cards/modernization.json +50 -0
- icdev/tools/a2a/agent_cards/monitor.json +43 -0
- icdev/tools/a2a/agent_cards/orchestrator.json +36 -0
- icdev/tools/a2a/agent_cards/requirements_analyst.json +64 -0
- icdev/tools/a2a/agent_cards/security.json +50 -0
- icdev/tools/a2a/agent_cards/simulation.json +57 -0
- icdev/tools/a2a/agent_cards/supply_chain.json +50 -0
- icdev/tools/a2a/agent_client.py +349 -0
- icdev/tools/a2a/agent_registry.py +412 -0
- icdev/tools/a2a/agent_server.py +579 -0
- icdev/tools/a2a/task.py +200 -0
- icdev/tools/agent/__init__.py +2 -0
- icdev/tools/agent/a2a_agent_card_generator.py +285 -0
- icdev/tools/agent/a2a_discovery_server.py +250 -0
- icdev/tools/agent/agent_executor.py +529 -0
- icdev/tools/agent/agent_memory.py +557 -0
- icdev/tools/agent/agent_models.py +51 -0
- icdev/tools/agent/atlas_critique.py +908 -0
- icdev/tools/agent/authority.py +443 -0
- icdev/tools/agent/bedrock_client.py +1075 -0
- icdev/tools/agent/collaboration.py +871 -0
- icdev/tools/agent/dispatcher_mode.py +665 -0
- icdev/tools/agent/mailbox.py +575 -0
- icdev/tools/agent/prompt_chain_executor.py +1064 -0
- icdev/tools/agent/session_purpose.py +350 -0
- icdev/tools/agent/skill_router.py +638 -0
- icdev/tools/agent/skill_selector.py +486 -0
- icdev/tools/agent/team_orchestrator.py +1108 -0
- icdev/tools/agent/token_tracker.py +290 -0
- icdev/tools/analysis/__init__.py +1 -0
- icdev/tools/analysis/code_analyzer.py +780 -0
- icdev/tools/analysis/runtime_feedback.py +389 -0
- icdev/tools/audit/__init__.py +1 -0
- icdev/tools/audit/audit_logger.py +196 -0
- icdev/tools/audit/audit_query.py +157 -0
- icdev/tools/audit/decision_recorder.py +72 -0
- icdev/tools/builder/__init__.py +1 -0
- icdev/tools/builder/agentic_fitness.py +534 -0
- icdev/tools/builder/agentic_test_templates/test_a2a_callback.py +117 -0
- icdev/tools/builder/agentic_test_templates/test_a2a_lifecycle.feature +52 -0
- icdev/tools/builder/agentic_test_templates/test_agent_card.feature +37 -0
- icdev/tools/builder/agentic_test_templates/test_agent_health.py +128 -0
- icdev/tools/builder/agentic_test_templates/test_memory_system.feature +50 -0
- icdev/tools/builder/agentic_test_templates/test_skill_execution.feature +40 -0
- icdev/tools/builder/app_blueprint.py +1583 -0
- icdev/tools/builder/child_app_generator.py +2852 -0
- icdev/tools/builder/claude_md_generator.py +1734 -0
- icdev/tools/builder/code_generator.py +3703 -0
- icdev/tools/builder/db_init_generator.py +1709 -0
- icdev/tools/builder/dev_profile_manager.py +954 -0
- icdev/tools/builder/formatter.py +768 -0
- icdev/tools/builder/goal_adapter.py +592 -0
- icdev/tools/builder/gotcha_validator.py +812 -0
- icdev/tools/builder/language_support.py +441 -0
- icdev/tools/builder/linter.py +976 -0
- icdev/tools/builder/profile_detector.py +657 -0
- icdev/tools/builder/profile_md_generator.py +723 -0
- icdev/tools/builder/scaffolder.py +1590 -0
- icdev/tools/builder/scaffolder_extended.py +1771 -0
- icdev/tools/builder/test_writer.py +950 -0
- icdev/tools/ci/__init__.py +2 -0
- icdev/tools/ci/connectors/__init__.py +2 -0
- icdev/tools/ci/connectors/base_connector.py +80 -0
- icdev/tools/ci/connectors/connector_registry.py +188 -0
- icdev/tools/ci/connectors/mattermost_connector.py +159 -0
- icdev/tools/ci/connectors/slack_connector.py +197 -0
- icdev/tools/ci/core/__init__.py +2 -0
- icdev/tools/ci/core/air_gap_detector.py +115 -0
- icdev/tools/ci/core/comment_handler.py +192 -0
- icdev/tools/ci/core/conversation_manager.py +479 -0
- icdev/tools/ci/core/event_envelope.py +500 -0
- icdev/tools/ci/core/event_router.py +443 -0
- icdev/tools/ci/core/failure_parser.py +397 -0
- icdev/tools/ci/core/recovery_engine.py +527 -0
- icdev/tools/ci/modules/__init__.py +2 -0
- icdev/tools/ci/modules/agent.py +271 -0
- icdev/tools/ci/modules/git_ops.py +175 -0
- icdev/tools/ci/modules/state.py +117 -0
- icdev/tools/ci/modules/vcs.py +303 -0
- icdev/tools/ci/modules/workflow_ops.py +295 -0
- icdev/tools/ci/modules/worktree.py +340 -0
- icdev/tools/ci/pipeline_config_generator.py +558 -0
- icdev/tools/ci/triggers/__init__.py +2 -0
- icdev/tools/ci/triggers/gitlab_task_monitor.py +330 -0
- icdev/tools/ci/triggers/poll_trigger.py +237 -0
- icdev/tools/ci/triggers/webhook_server.py +356 -0
- icdev/tools/ci/workflows/__init__.py +2 -0
- icdev/tools/ci/workflows/icdev_build.py +140 -0
- icdev/tools/ci/workflows/icdev_comply.py +284 -0
- icdev/tools/ci/workflows/icdev_document.py +152 -0
- icdev/tools/ci/workflows/icdev_e2e.py +188 -0
- icdev/tools/ci/workflows/icdev_patch.py +186 -0
- icdev/tools/ci/workflows/icdev_plan.py +202 -0
- icdev/tools/ci/workflows/icdev_plan_build.py +41 -0
- icdev/tools/ci/workflows/icdev_plan_build_test.py +46 -0
- icdev/tools/ci/workflows/icdev_plan_build_test_review.py +47 -0
- icdev/tools/ci/workflows/icdev_review.py +126 -0
- icdev/tools/ci/workflows/icdev_sdlc.py +261 -0
- icdev/tools/ci/workflows/icdev_test.py +240 -0
- icdev/tools/cli/__init__.py +1 -0
- icdev/tools/cli/output_formatter.py +756 -0
- icdev/tools/cli_formatter.py +42 -0
- icdev/tools/cloud/__init__.py +11 -0
- icdev/tools/cloud/cloud_mode_manager.py +364 -0
- icdev/tools/cloud/csp_changelog.py +383 -0
- icdev/tools/cloud/csp_health_checker.py +268 -0
- icdev/tools/cloud/csp_monitor.py +951 -0
- icdev/tools/cloud/iam_provider.py +593 -0
- icdev/tools/cloud/kms_provider.py +346 -0
- icdev/tools/cloud/monitoring_provider.py +628 -0
- icdev/tools/cloud/provider_factory.py +376 -0
- icdev/tools/cloud/region_validator.py +345 -0
- icdev/tools/cloud/registry_provider.py +563 -0
- icdev/tools/cloud/secrets_provider.py +486 -0
- icdev/tools/cloud/storage_provider.py +446 -0
- icdev/tools/compat/__init__.py +21 -0
- icdev/tools/compat/cli_harmonizer.py +251 -0
- icdev/tools/compat/datetime_utils.py +18 -0
- icdev/tools/compat/db_utils.py +160 -0
- icdev/tools/compat/platform_utils.py +123 -0
- icdev/tools/compliance/__init__.py +1 -0
- icdev/tools/compliance/accountability_manager.py +397 -0
- icdev/tools/compliance/ai_accountability_audit.py +294 -0
- icdev/tools/compliance/ai_impact_assessor.py +273 -0
- icdev/tools/compliance/ai_incident_response.py +301 -0
- icdev/tools/compliance/ai_inventory_manager.py +239 -0
- icdev/tools/compliance/ai_reassessment_scheduler.py +256 -0
- icdev/tools/compliance/ai_transparency_audit.py +248 -0
- icdev/tools/compliance/atlas_assessor.py +278 -0
- icdev/tools/compliance/atlas_report_generator.py +1211 -0
- icdev/tools/compliance/base_assessor.py +597 -0
- icdev/tools/compliance/cato_monitor.py +1385 -0
- icdev/tools/compliance/cato_scheduler.py +699 -0
- icdev/tools/compliance/cjis_assessor.py +76 -0
- icdev/tools/compliance/classification_manager.py +1353 -0
- icdev/tools/compliance/cmmc_assessor.py +1491 -0
- icdev/tools/compliance/cmmc_report_generator.py +1100 -0
- icdev/tools/compliance/compliance_detector.py +463 -0
- icdev/tools/compliance/compliance_exporter.py +427 -0
- icdev/tools/compliance/compliance_status.py +825 -0
- icdev/tools/compliance/control_mapper.py +505 -0
- icdev/tools/compliance/crosswalk_engine.py +1203 -0
- icdev/tools/compliance/cssp_assessor.py +1045 -0
- icdev/tools/compliance/cssp_evidence_collector.py +729 -0
- icdev/tools/compliance/cssp_report_generator.py +1116 -0
- icdev/tools/compliance/cui_marker.py +388 -0
- icdev/tools/compliance/diagram_validator.py +600 -0
- icdev/tools/compliance/emass/__init__.py +2 -0
- icdev/tools/compliance/emass/emass_client.py +840 -0
- icdev/tools/compliance/emass/emass_export.py +777 -0
- icdev/tools/compliance/emass/emass_sync.py +826 -0
- icdev/tools/compliance/eu_ai_act_classifier.py +194 -0
- icdev/tools/compliance/evidence_collector.py +468 -0
- icdev/tools/compliance/fairness_assessor.py +316 -0
- icdev/tools/compliance/fedramp_assessor.py +1808 -0
- icdev/tools/compliance/fedramp_authorization_packager.py +137 -0
- icdev/tools/compliance/fedramp_ksi_generator.py +355 -0
- icdev/tools/compliance/fedramp_report_generator.py +1128 -0
- icdev/tools/compliance/fips199_categorizer.py +881 -0
- icdev/tools/compliance/fips200_validator.py +315 -0
- icdev/tools/compliance/gao_ai_assessor.py +231 -0
- icdev/tools/compliance/gao_evidence_builder.py +308 -0
- icdev/tools/compliance/hipaa_assessor.py +78 -0
- icdev/tools/compliance/hitrust_assessor.py +49 -0
- icdev/tools/compliance/incident_response_plan.py +718 -0
- icdev/tools/compliance/iso27001_assessor.py +92 -0
- icdev/tools/compliance/iso42001_assessor.py +114 -0
- icdev/tools/compliance/ivv_assessor.py +2327 -0
- icdev/tools/compliance/ivv_report_generator.py +1662 -0
- icdev/tools/compliance/model_card_generator.py +297 -0
- icdev/tools/compliance/mosa_assessor.py +117 -0
- icdev/tools/compliance/multi_regime_assessor.py +451 -0
- icdev/tools/compliance/narrative_generator.py +1013 -0
- icdev/tools/compliance/nist_800_207_assessor.py +191 -0
- icdev/tools/compliance/nist_ai_600_1_assessor.py +188 -0
- icdev/tools/compliance/nist_ai_rmf_assessor.py +110 -0
- icdev/tools/compliance/nist_lookup.py +245 -0
- icdev/tools/compliance/omb_m25_21_assessor.py +228 -0
- icdev/tools/compliance/omb_m26_04_assessor.py +188 -0
- icdev/tools/compliance/oscal_catalog_adapter.py +395 -0
- icdev/tools/compliance/oscal_generator.py +2170 -0
- icdev/tools/compliance/oscal_tools.py +1182 -0
- icdev/tools/compliance/owasp_agentic_assessor.py +226 -0
- icdev/tools/compliance/owasp_asi_assessor.py +200 -0
- icdev/tools/compliance/owasp_llm_assessor.py +244 -0
- icdev/tools/compliance/pci_dss_assessor.py +80 -0
- icdev/tools/compliance/pi_compliance_tracker.py +1461 -0
- icdev/tools/compliance/poam_generator.py +405 -0
- icdev/tools/compliance/resolve_marking.py +283 -0
- icdev/tools/compliance/sbd_assessor.py +2068 -0
- icdev/tools/compliance/sbd_report_generator.py +1236 -0
- icdev/tools/compliance/sbom_generator.py +1008 -0
- icdev/tools/compliance/siem_config_generator.py +674 -0
- icdev/tools/compliance/slsa_attestation_generator.py +490 -0
- icdev/tools/compliance/soc2_assessor.py +77 -0
- icdev/tools/compliance/ssp_generator.py +573 -0
- icdev/tools/compliance/stig_checker.py +727 -0
- icdev/tools/compliance/swft_evidence_bundler.py +337 -0
- icdev/tools/compliance/system_card_generator.py +309 -0
- icdev/tools/compliance/traceability_matrix.py +1281 -0
- icdev/tools/compliance/universal_classification_manager.py +1172 -0
- icdev/tools/compliance/xacta/__init__.py +2 -0
- icdev/tools/compliance/xacta/xacta_client.py +449 -0
- icdev/tools/compliance/xacta/xacta_export.py +557 -0
- icdev/tools/compliance/xacta/xacta_sync.py +333 -0
- icdev/tools/compliance/xai_assessor.py +231 -0
- icdev/tools/dashboard/__init__.py +1 -0
- icdev/tools/dashboard/api/__init__.py +1 -0
- icdev/tools/dashboard/api/_pipeline_state.py +17 -0
- icdev/tools/dashboard/api/activity.py +206 -0
- icdev/tools/dashboard/api/admin.py +176 -0
- icdev/tools/dashboard/api/agents.py +53 -0
- icdev/tools/dashboard/api/ai_accountability.py +163 -0
- icdev/tools/dashboard/api/ai_transparency.py +198 -0
- icdev/tools/dashboard/api/audit.py +58 -0
- icdev/tools/dashboard/api/batch.py +666 -0
- icdev/tools/dashboard/api/chat.py +241 -0
- icdev/tools/dashboard/api/cicd.py +219 -0
- icdev/tools/dashboard/api/code_quality.py +223 -0
- icdev/tools/dashboard/api/compliance.py +171 -0
- icdev/tools/dashboard/api/cpmp.py +915 -0
- icdev/tools/dashboard/api/diagrams.py +65 -0
- icdev/tools/dashboard/api/events.py +250 -0
- icdev/tools/dashboard/api/evidence.py +99 -0
- icdev/tools/dashboard/api/fedramp_20x.py +77 -0
- icdev/tools/dashboard/api/govcon.py +1095 -0
- icdev/tools/dashboard/api/intake.py +1171 -0
- icdev/tools/dashboard/api/lineage.py +163 -0
- icdev/tools/dashboard/api/metrics.py +155 -0
- icdev/tools/dashboard/api/nlq.py +72 -0
- icdev/tools/dashboard/api/orchestration.py +472 -0
- icdev/tools/dashboard/api/oscal.py +183 -0
- icdev/tools/dashboard/api/prod_audit.py +183 -0
- icdev/tools/dashboard/api/projects.py +191 -0
- icdev/tools/dashboard/api/proposals.py +1084 -0
- icdev/tools/dashboard/api/traces.py +363 -0
- icdev/tools/dashboard/api/usage.py +234 -0
- icdev/tools/dashboard/app.py +1986 -0
- icdev/tools/dashboard/auth.py +500 -0
- icdev/tools/dashboard/byok.py +245 -0
- icdev/tools/dashboard/chat_manager.py +675 -0
- icdev/tools/dashboard/config.py +116 -0
- icdev/tools/dashboard/diagram_definitions.py +642 -0
- icdev/tools/dashboard/nlq_processor.py +323 -0
- icdev/tools/dashboard/phase_loader.py +136 -0
- icdev/tools/dashboard/sse_manager.py +89 -0
- icdev/tools/dashboard/state_tracker.py +267 -0
- icdev/tools/dashboard/static/css/style.css +706 -0
- icdev/tools/dashboard/static/css/ux.css +2047 -0
- icdev/tools/dashboard/static/js/activity.js +322 -0
- icdev/tools/dashboard/static/js/api.js +161 -0
- icdev/tools/dashboard/static/js/batch.js +814 -0
- icdev/tools/dashboard/static/js/charts.js +618 -0
- icdev/tools/dashboard/static/js/chat.js +1514 -0
- icdev/tools/dashboard/static/js/kanban.js +113 -0
- icdev/tools/dashboard/static/js/live.js +569 -0
- icdev/tools/dashboard/static/js/mermaid-icdev.js +332 -0
- icdev/tools/dashboard/static/js/proposals.js +588 -0
- icdev/tools/dashboard/static/js/shortcuts.js +544 -0
- icdev/tools/dashboard/static/js/tables.js +652 -0
- icdev/tools/dashboard/static/js/tour.js +524 -0
- icdev/tools/dashboard/static/js/ux.js +942 -0
- icdev/tools/dashboard/templates/404.html +10 -0
- icdev/tools/dashboard/templates/activity.html +80 -0
- icdev/tools/dashboard/templates/admin/users.html +144 -0
- icdev/tools/dashboard/templates/ai_accountability.html +235 -0
- icdev/tools/dashboard/templates/ai_transparency.html +263 -0
- icdev/tools/dashboard/templates/base.html +104 -0
- icdev/tools/dashboard/templates/batch.html +23 -0
- icdev/tools/dashboard/templates/chat.html +332 -0
- icdev/tools/dashboard/templates/children.html +149 -0
- icdev/tools/dashboard/templates/cicd.html +253 -0
- icdev/tools/dashboard/templates/code_quality.html +214 -0
- icdev/tools/dashboard/templates/cpmp/cor_detail.html +220 -0
- icdev/tools/dashboard/templates/cpmp/cor_portal.html +91 -0
- icdev/tools/dashboard/templates/cpmp/deliverable_detail.html +197 -0
- icdev/tools/dashboard/templates/cpmp/detail.html +578 -0
- icdev/tools/dashboard/templates/cpmp/portfolio.html +202 -0
- icdev/tools/dashboard/templates/dev_profiles.html +304 -0
- icdev/tools/dashboard/templates/diagrams.html +224 -0
- icdev/tools/dashboard/templates/events/timeline.html +232 -0
- icdev/tools/dashboard/templates/evidence.html +134 -0
- icdev/tools/dashboard/templates/fedramp_20x.html +207 -0
- icdev/tools/dashboard/templates/gateway.html +244 -0
- icdev/tools/dashboard/templates/govcon/capabilities.html +135 -0
- icdev/tools/dashboard/templates/govcon/pipeline.html +214 -0
- icdev/tools/dashboard/templates/govcon/requirements.html +120 -0
- icdev/tools/dashboard/templates/index.html +254 -0
- icdev/tools/dashboard/templates/lineage.html +141 -0
- icdev/tools/dashboard/templates/login.html +51 -0
- icdev/tools/dashboard/templates/monitoring/overview.html +193 -0
- icdev/tools/dashboard/templates/orchestration/dashboard.html +545 -0
- icdev/tools/dashboard/templates/oscal.html +263 -0
- icdev/tools/dashboard/templates/phases.html +150 -0
- icdev/tools/dashboard/templates/prod_audit.html +280 -0
- icdev/tools/dashboard/templates/profile.html +183 -0
- icdev/tools/dashboard/templates/projects/detail.html +583 -0
- icdev/tools/dashboard/templates/projects/list.html +47 -0
- icdev/tools/dashboard/templates/proposals/detail.html +1253 -0
- icdev/tools/dashboard/templates/proposals/list.html +179 -0
- icdev/tools/dashboard/templates/proposals/section_detail.html +193 -0
- icdev/tools/dashboard/templates/provenance.html +181 -0
- icdev/tools/dashboard/templates/query/nlq.html +234 -0
- icdev/tools/dashboard/templates/quick_paths.html +69 -0
- icdev/tools/dashboard/templates/traces.html +155 -0
- icdev/tools/dashboard/templates/translation_detail.html +199 -0
- icdev/tools/dashboard/templates/translations.html +162 -0
- icdev/tools/dashboard/templates/usage.html +225 -0
- icdev/tools/dashboard/templates/wizard.html +539 -0
- icdev/tools/dashboard/templates/xai.html +208 -0
- icdev/tools/dashboard/ux_helpers.py +962 -0
- icdev/tools/dashboard/websocket.py +81 -0
- icdev/tools/db/__init__.py +1 -0
- icdev/tools/db/backup.py +312 -0
- icdev/tools/db/backup_manager.py +832 -0
- icdev/tools/db/init_icdev_db.py +5900 -0
- icdev/tools/db/migrate.py +178 -0
- icdev/tools/db/migration_runner.py +549 -0
- icdev/tools/db/migrations/001_baseline/meta.json +9 -0
- icdev/tools/db/migrations/001_baseline/up.py +68 -0
- icdev/tools/db/migrations/002_memory_enhancements/down.sql +8 -0
- icdev/tools/db/migrations/002_memory_enhancements/meta.json +9 -0
- icdev/tools/db/migrations/002_memory_enhancements/up.py +118 -0
- icdev/tools/db/migrations/003_dev_profiles/meta.json +8 -0
- icdev/tools/db/migrations/003_dev_profiles/up.py +93 -0
- icdev/tools/db/migrations/004_innovation_engine/down.py +19 -0
- icdev/tools/db/migrations/004_innovation_engine/up.py +227 -0
- icdev/tools/db/migrations/005_phase_37_ai_security/down.py +19 -0
- icdev/tools/db/migrations/005_phase_37_ai_security/up.py +258 -0
- icdev/tools/db/migrations/006_phase_36_evolution/down.py +21 -0
- icdev/tools/db/migrations/006_phase_36_evolution/up.py +323 -0
- icdev/tools/db/migrations/007_phase_38_cloud/down.py +14 -0
- icdev/tools/db/migrations/007_phase_38_cloud/up.py +110 -0
- icdev/tools/db/migrations/008_phase36_37_integration/up.py +55 -0
- icdev/tools/db/migrations/__init__.py +2 -0
- icdev/tools/devsecops/__init__.py +2 -0
- icdev/tools/devsecops/attestation_manager.py +458 -0
- icdev/tools/devsecops/network_segmentation_generator.py +614 -0
- icdev/tools/devsecops/pdp_config_generator.py +1256 -0
- icdev/tools/devsecops/pipeline_security_generator.py +484 -0
- icdev/tools/devsecops/policy_generator.py +653 -0
- icdev/tools/devsecops/profile_manager.py +388 -0
- icdev/tools/devsecops/service_mesh_generator.py +1073 -0
- icdev/tools/devsecops/zta_maturity_scorer.py +368 -0
- icdev/tools/devsecops/zta_terraform_generator.py +1303 -0
- icdev/tools/dx/__init__.py +3 -0
- icdev/tools/dx/companion.py +266 -0
- icdev/tools/dx/instruction_generator.py +753 -0
- icdev/tools/dx/mcp_config_generator.py +282 -0
- icdev/tools/dx/skill_translator.py +425 -0
- icdev/tools/dx/tool_detector.py +144 -0
- icdev/tools/extensions/__init__.py +21 -0
- icdev/tools/extensions/builtins/010_ai_governance_chat.py +277 -0
- icdev/tools/extensions/builtins/__init__.py +2 -0
- icdev/tools/extensions/extension_manager.py +455 -0
- icdev/tools/infra/__init__.py +1 -0
- icdev/tools/infra/ansible_generator.py +869 -0
- icdev/tools/infra/dockerfile_generator.py +361 -0
- icdev/tools/infra/infra_status.py +393 -0
- icdev/tools/infra/ironbank_metadata_generator.py +411 -0
- icdev/tools/infra/k8s_generator.py +1002 -0
- icdev/tools/infra/pipeline_generator.py +832 -0
- icdev/tools/infra/rollback.py +400 -0
- icdev/tools/infra/terraform_generator.py +1142 -0
- icdev/tools/infra/terraform_generator_azure.py +1254 -0
- icdev/tools/infra/terraform_generator_gcp.py +953 -0
- icdev/tools/infra/terraform_generator_ibm.py +360 -0
- icdev/tools/infra/terraform_generator_oci.py +919 -0
- icdev/tools/infra/terraform_generator_onprem.py +319 -0
- icdev/tools/innovation/__init__.py +8 -0
- icdev/tools/innovation/competitive_intel.py +492 -0
- icdev/tools/innovation/innovation_manager.py +681 -0
- icdev/tools/innovation/introspective_analyzer.py +774 -0
- icdev/tools/innovation/register_external_patterns.py +440 -0
- icdev/tools/innovation/signal_ranker.py +1038 -0
- icdev/tools/innovation/solution_generator.py +697 -0
- icdev/tools/innovation/standards_monitor.py +466 -0
- icdev/tools/innovation/trend_detector.py +1046 -0
- icdev/tools/innovation/triage_engine.py +1149 -0
- icdev/tools/innovation/web_scanner.py +894 -0
- icdev/tools/installer/__init__.py +1 -0
- icdev/tools/installer/compliance_configurator.py +637 -0
- icdev/tools/installer/installer.py +1711 -0
- icdev/tools/installer/module_registry.py +805 -0
- icdev/tools/installer/platform_setup.py +961 -0
- icdev/tools/integration/__init__.py +2 -0
- icdev/tools/integration/approval_manager.py +561 -0
- icdev/tools/integration/doors_exporter.py +627 -0
- icdev/tools/integration/gitlab_connector.py +784 -0
- icdev/tools/integration/jira_connector.py +774 -0
- icdev/tools/integration/servicenow_connector.py +693 -0
- icdev/tools/knowledge/__init__.py +1 -0
- icdev/tools/knowledge/knowledge_ingest.py +293 -0
- icdev/tools/knowledge/pattern_detector.py +693 -0
- icdev/tools/knowledge/recommendation_engine.py +461 -0
- icdev/tools/knowledge/self_heal_analyzer.py +504 -0
- icdev/tools/llm/__init__.py +72 -0
- icdev/tools/llm/anthropic_provider.py +170 -0
- icdev/tools/llm/azure_openai_provider.py +338 -0
- icdev/tools/llm/bedrock_provider.py +315 -0
- icdev/tools/llm/embedding_provider.py +438 -0
- icdev/tools/llm/gemini_provider.py +381 -0
- icdev/tools/llm/ibm_watsonx_provider.py +232 -0
- icdev/tools/llm/oci_genai_provider.py +462 -0
- icdev/tools/llm/ollama_provider.py +340 -0
- icdev/tools/llm/openai_provider.py +225 -0
- icdev/tools/llm/provider.py +355 -0
- icdev/tools/llm/provider_sdk.py +175 -0
- icdev/tools/llm/router.py +780 -0
- icdev/tools/llm/vertex_ai_provider.py +374 -0
- icdev/tools/maintenance/__init__.py +2 -0
- icdev/tools/maintenance/dependency_scanner.py +1030 -0
- icdev/tools/maintenance/maintenance_auditor.py +815 -0
- icdev/tools/maintenance/remediation_engine.py +966 -0
- icdev/tools/maintenance/vulnerability_checker.py +987 -0
- icdev/tools/mbse/__init__.py +3 -0
- icdev/tools/mbse/des_assessor.py +1186 -0
- icdev/tools/mbse/des_report_generator.py +800 -0
- icdev/tools/mbse/diagram_extractor.py +811 -0
- icdev/tools/mbse/digital_thread.py +1665 -0
- icdev/tools/mbse/model_code_generator.py +1122 -0
- icdev/tools/mbse/model_control_mapper.py +420 -0
- icdev/tools/mbse/pi_model_tracker.py +1093 -0
- icdev/tools/mbse/reqif_parser.py +1483 -0
- icdev/tools/mbse/sync_engine.py +1805 -0
- icdev/tools/mbse/xmi_parser.py +1573 -0
- icdev/tools/mcp/__init__.py +1 -0
- icdev/tools/mcp/base_server.py +535 -0
- icdev/tools/mcp/builder_server.py +725 -0
- icdev/tools/mcp/compliance_server.py +1407 -0
- icdev/tools/mcp/context_indexer.py +199 -0
- icdev/tools/mcp/context_server.py +305 -0
- icdev/tools/mcp/core_server.py +679 -0
- icdev/tools/mcp/devsecops_server.py +432 -0
- icdev/tools/mcp/gap_handlers.py +1079 -0
- icdev/tools/mcp/gateway_server.py +339 -0
- icdev/tools/mcp/generate_registry.py +623 -0
- icdev/tools/mcp/infra_server.py +264 -0
- icdev/tools/mcp/innovation_server.py +316 -0
- icdev/tools/mcp/integration_server.py +527 -0
- icdev/tools/mcp/knowledge_server.py +429 -0
- icdev/tools/mcp/maintenance_server.py +248 -0
- icdev/tools/mcp/marketplace_server.py +499 -0
- icdev/tools/mcp/mbse_server.py +398 -0
- icdev/tools/mcp/modernization_server.py +496 -0
- icdev/tools/mcp/observability_server.py +354 -0
- icdev/tools/mcp/requirements_server.py +415 -0
- icdev/tools/mcp/simulation_server.py +468 -0
- icdev/tools/mcp/standalone/__init__.py +2 -0
- icdev/tools/mcp/standalone/builder.py +59 -0
- icdev/tools/mcp/standalone/compliance.py +59 -0
- icdev/tools/mcp/standalone/core.py +59 -0
- icdev/tools/mcp/standalone/knowledge.py +59 -0
- icdev/tools/mcp/standalone/maintenance.py +59 -0
- icdev/tools/mcp/supply_chain_server.py +476 -0
- icdev/tools/mcp/tool_registry.py +2008 -0
- icdev/tools/mcp/unified_server.py +158 -0
- icdev/tools/memory/__init__.py +2 -0
- icdev/tools/memory/auto_capture.py +347 -0
- icdev/tools/memory/embed_memory.py +158 -0
- icdev/tools/memory/history_compressor.py +334 -0
- icdev/tools/memory/hybrid_search.py +236 -0
- icdev/tools/memory/maintenance_cron.py +289 -0
- icdev/tools/memory/memory_consolidation.py +444 -0
- icdev/tools/memory/memory_db.py +133 -0
- icdev/tools/memory/memory_read.py +102 -0
- icdev/tools/memory/memory_write.py +222 -0
- icdev/tools/memory/semantic_search.py +139 -0
- icdev/tools/memory/time_decay.py +435 -0
- icdev/tools/modernization/__init__.py +3 -0
- icdev/tools/modernization/architecture_extractor.py +734 -0
- icdev/tools/modernization/compliance_bridge.py +1499 -0
- icdev/tools/modernization/db_migration_planner.py +1385 -0
- icdev/tools/modernization/doc_generator.py +1428 -0
- icdev/tools/modernization/framework_migrator.py +1525 -0
- icdev/tools/modernization/legacy_analyzer.py +1948 -0
- icdev/tools/modernization/migration_code_generator.py +1639 -0
- icdev/tools/modernization/migration_report_generator.py +1653 -0
- icdev/tools/modernization/migration_tracker.py +1726 -0
- icdev/tools/modernization/monolith_decomposer.py +1508 -0
- icdev/tools/modernization/seven_r_assessor.py +1658 -0
- icdev/tools/modernization/strangler_fig_manager.py +1705 -0
- icdev/tools/modernization/ui_analyzer.py +771 -0
- icdev/tools/modernization/version_migrator.py +1392 -0
- icdev/tools/monitor/__init__.py +1 -0
- icdev/tools/monitor/alert_correlator.py +495 -0
- icdev/tools/monitor/auto_resolver.py +612 -0
- icdev/tools/monitor/health_checker.py +509 -0
- icdev/tools/monitor/heartbeat_daemon.py +792 -0
- icdev/tools/monitor/log_analyzer.py +516 -0
- icdev/tools/monitor/metric_collector.py +496 -0
- icdev/tools/mosa/__init__.py +10 -0
- icdev/tools/mosa/icd_generator.py +370 -0
- icdev/tools/mosa/modular_design_analyzer.py +683 -0
- icdev/tools/mosa/mosa_code_enforcer.py +349 -0
- icdev/tools/mosa/tsp_generator.py +265 -0
- icdev/tools/observability/__init__.py +100 -0
- icdev/tools/observability/genai_attributes.py +88 -0
- icdev/tools/observability/instrumentation.py +140 -0
- icdev/tools/observability/mlflow_exporter.py +194 -0
- icdev/tools/observability/otel_tracer.py +168 -0
- icdev/tools/observability/provenance/__init__.py +3 -0
- icdev/tools/observability/provenance/prov_recorder.py +324 -0
- icdev/tools/observability/shap/__init__.py +3 -0
- icdev/tools/observability/shap/agent_shap.py +275 -0
- icdev/tools/observability/sqlite_tracer.py +361 -0
- icdev/tools/observability/trace_context.py +205 -0
- icdev/tools/observability/tracer.py +230 -0
- icdev/tools/orchestration/__init__.py +2 -0
- icdev/tools/orchestration/workflow_composer.py +361 -0
- icdev/tools/project/__init__.py +1 -0
- icdev/tools/project/manifest_loader.py +418 -0
- icdev/tools/project/project_create.py +350 -0
- icdev/tools/project/project_list.py +174 -0
- icdev/tools/project/project_scaffold.py +1715 -0
- icdev/tools/project/project_status.py +479 -0
- icdev/tools/project/session_context_builder.py +757 -0
- icdev/tools/project/validate_manifest.py +55 -0
- icdev/tools/registry/__init__.py +10 -0
- icdev/tools/registry/absorption_engine.py +832 -0
- icdev/tools/registry/capability_evaluator.py +668 -0
- icdev/tools/registry/child_registry.py +617 -0
- icdev/tools/registry/cross_pollinator.py +1065 -0
- icdev/tools/registry/genome_manager.py +671 -0
- icdev/tools/registry/learning_collector.py +912 -0
- icdev/tools/registry/propagation_manager.py +942 -0
- icdev/tools/registry/staging_manager.py +742 -0
- icdev/tools/registry/telemetry_collector.py +423 -0
- icdev/tools/requirements/__init__.py +1 -0
- icdev/tools/requirements/ai_governance_scorer.py +208 -0
- icdev/tools/requirements/boundary_analyzer.py +1293 -0
- icdev/tools/requirements/clarification_engine.py +618 -0
- icdev/tools/requirements/complexity_scorer.py +387 -0
- icdev/tools/requirements/consistency_analyzer.py +803 -0
- icdev/tools/requirements/constitution_manager.py +605 -0
- icdev/tools/requirements/decomposition_engine.py +778 -0
- icdev/tools/requirements/document_extractor.py +1016 -0
- icdev/tools/requirements/elicitation_techniques.py +519 -0
- icdev/tools/requirements/gap_detector.py +271 -0
- icdev/tools/requirements/intake_engine.py +2188 -0
- icdev/tools/requirements/prd_generator.py +847 -0
- icdev/tools/requirements/prd_validator.py +595 -0
- icdev/tools/requirements/readiness_scorer.py +313 -0
- icdev/tools/requirements/spec_organizer.py +1029 -0
- icdev/tools/requirements/spec_quality_checker.py +1097 -0
- icdev/tools/requirements/traceability_builder.py +579 -0
- icdev/tools/resilience/__init__.py +34 -0
- icdev/tools/resilience/circuit_breaker.py +340 -0
- icdev/tools/resilience/correlation.py +150 -0
- icdev/tools/resilience/errors.py +81 -0
- icdev/tools/resilience/retry.py +95 -0
- icdev/tools/schemas/__init__.py +27 -0
- icdev/tools/schemas/chat.py +61 -0
- icdev/tools/schemas/compliance.py +56 -0
- icdev/tools/schemas/core.py +85 -0
- icdev/tools/schemas/innovation.py +37 -0
- icdev/tools/schemas/validation.py +109 -0
- icdev/tools/sdk/__init__.py +3 -0
- icdev/tools/sdk/icdev_client.py +218 -0
- icdev/tools/security/__init__.py +1 -0
- icdev/tools/security/agent_output_validator.py +330 -0
- icdev/tools/security/agent_trust_scorer.py +466 -0
- icdev/tools/security/ai_bom_generator.py +725 -0
- icdev/tools/security/ai_telemetry_logger.py +469 -0
- icdev/tools/security/atlas_red_team.py +543 -0
- icdev/tools/security/code_pattern_scanner.py +378 -0
- icdev/tools/security/confabulation_detector.py +271 -0
- icdev/tools/security/container_scanner.py +491 -0
- icdev/tools/security/dependency_auditor.py +944 -0
- icdev/tools/security/endpoint_security_scanner.py +579 -0
- icdev/tools/security/mcp_tool_authorizer.py +243 -0
- icdev/tools/security/prompt_injection_detector.py +737 -0
- icdev/tools/security/sast_runner.py +948 -0
- icdev/tools/security/secret_detector.py +378 -0
- icdev/tools/security/tool_chain_validator.py +357 -0
- icdev/tools/security/vuln_scanner.py +539 -0
- icdev/tools/simulation/__init__.py +2 -0
- icdev/tools/simulation/coa_generator.py +1552 -0
- icdev/tools/simulation/monte_carlo.py +758 -0
- icdev/tools/simulation/scenario_manager.py +1073 -0
- icdev/tools/simulation/simulation_engine.py +1104 -0
- icdev/tools/supply_chain/__init__.py +2 -0
- icdev/tools/supply_chain/cve_triager.py +705 -0
- icdev/tools/supply_chain/dependency_graph.py +645 -0
- icdev/tools/supply_chain/isa_manager.py +540 -0
- icdev/tools/supply_chain/scrm_assessor.py +546 -0
- icdev/tools/testing/__init__.py +2 -0
- icdev/tools/testing/acceptance_validator.py +411 -0
- icdev/tools/testing/claude_dir_validator.py +831 -0
- icdev/tools/testing/data_types.py +199 -0
- icdev/tools/testing/e2e_runner.py +715 -0
- icdev/tools/testing/fuzz_cli.py +306 -0
- icdev/tools/testing/health_check.py +483 -0
- icdev/tools/testing/platform_check.py +143 -0
- icdev/tools/testing/production_audit.py +1862 -0
- icdev/tools/testing/production_remediate.py +804 -0
- icdev/tools/testing/screenshot_validator.py +539 -0
- icdev/tools/testing/smoke_test.py +283 -0
- icdev/tools/testing/test_agent_models.py +117 -0
- icdev/tools/testing/test_orchestrator.py +957 -0
- icdev/tools/testing/utils.py +229 -0
- icdev/tools/translation/__init__.py +17 -0
- icdev/tools/translation/code_translator.py +550 -0
- icdev/tools/translation/dependency_mapper.py +277 -0
- icdev/tools/translation/feature_map.py +395 -0
- icdev/tools/translation/project_assembler.py +439 -0
- icdev/tools/translation/source_extractor.py +609 -0
- icdev/tools/translation/test_translator.py +333 -0
- icdev/tools/translation/translation_manager.py +582 -0
- icdev/tools/translation/translation_validator.py +662 -0
- icdev/tools/translation/type_checker.py +371 -0
- icdev-1.0.0.dist-info/METADATA +868 -0
- icdev-1.0.0.dist-info/RECORD +1105 -0
- icdev-1.0.0.dist-info/WHEEL +5 -0
- icdev-1.0.0.dist-info/entry_points.txt +9 -0
- icdev-1.0.0.dist-info/licenses/LICENSE +254 -0
- icdev-1.0.0.dist-info/licenses/NOTICE +268 -0
- icdev-1.0.0.dist-info/top_level.txt +1 -0
|
@@ -0,0 +1,2008 @@
|
|
|
1
|
+
#!/usr/bin/env python3
|
|
2
|
+
# CUI // SP-CTI
|
|
3
|
+
"""Declarative tool registry for the Unified MCP Gateway Server (D301).
|
|
4
|
+
|
|
5
|
+
Maps tool name -> (module, handler, schema) for all ICDEV tools.
|
|
6
|
+
Used by unified_server.py for lazy-loaded handler dispatch.
|
|
7
|
+
|
|
8
|
+
Auto-generated by generate_registry.py, manually completed for servers
|
|
9
|
+
that use non-standard instantiation patterns (gateway, context, innovation,
|
|
10
|
+
observability).
|
|
11
|
+
|
|
12
|
+
Categories:
|
|
13
|
+
core (5)
|
|
14
|
+
compliance (36)
|
|
15
|
+
builder (13)
|
|
16
|
+
infra (6)
|
|
17
|
+
knowledge (5)
|
|
18
|
+
maintenance (4)
|
|
19
|
+
mbse (10)
|
|
20
|
+
modernization (10)
|
|
21
|
+
requirements (10)
|
|
22
|
+
supply_chain (9)
|
|
23
|
+
simulation (8)
|
|
24
|
+
integration (10)
|
|
25
|
+
marketplace (11)
|
|
26
|
+
devsecops (12)
|
|
27
|
+
gateway (5)
|
|
28
|
+
context (5)
|
|
29
|
+
innovation (10)
|
|
30
|
+
observability (6)
|
|
31
|
+
translation (9)
|
|
32
|
+
dx (5)
|
|
33
|
+
cloud (5)
|
|
34
|
+
registry (9)
|
|
35
|
+
security_agentic (9)
|
|
36
|
+
testing (6)
|
|
37
|
+
installer (4)
|
|
38
|
+
misc (8)
|
|
39
|
+
|
|
40
|
+
Total: 230 tools, 6 resources
|
|
41
|
+
"""
|
|
42
|
+
|
|
43
|
+
|
|
44
|
+
TOOL_REGISTRY = {
|
|
45
|
+
# ============================================================
|
|
46
|
+
# CORE (5 tools)
|
|
47
|
+
# ============================================================
|
|
48
|
+
"project_create": {
|
|
49
|
+
"category": "core",
|
|
50
|
+
"module": "icdev.tools.mcp.core_server",
|
|
51
|
+
"handler": "handle_project_create",
|
|
52
|
+
"description": "Create a new ICDEV project with UUID, directory scaffolding, database record, and audit trail entry.",
|
|
53
|
+
"input_schema": {"type": "object", "properties": {"name": {"type": "string", "description": "Project name (human-readable)"}, "description": {"type": "string", "description": "Project description"}, "type": {"type": "string", "description": "Project type", "enum": ["webapp", "microservice", "api", "cli", "data_pipeline", "iac"], "default": "webapp"}, "classification": {"type": "string", "description": "Data classification level", "enum": ["CUI", "FOUO", "Public"], "default": "CUI"}, "tech_stack": {"type": "object", "description": "Technology stack (backend, frontend, database)", "properties": {"backend": {"type": "string"}, "frontend": {"type": "string"}, "database": {"type": "string"}}}}, "required": ["name"]},
|
|
54
|
+
},
|
|
55
|
+
"project_list": {
|
|
56
|
+
"category": "core",
|
|
57
|
+
"module": "icdev.tools.mcp.core_server",
|
|
58
|
+
"handler": "handle_project_list",
|
|
59
|
+
"description": "List all ICDEV projects from the database, optionally filtered by status.",
|
|
60
|
+
"input_schema": {"type": "object", "properties": {"status_filter": {"type": "string", "description": "Filter by project status (active, archived, suspended)", "enum": ["active", "archived", "suspended"]}}},
|
|
61
|
+
},
|
|
62
|
+
"project_status": {
|
|
63
|
+
"category": "core",
|
|
64
|
+
"module": "icdev.tools.mcp.core_server",
|
|
65
|
+
"handler": "handle_project_status",
|
|
66
|
+
"description": "Get detailed project status including compliance (SSP, POA&M, STIG), security (scans, vulnerabilities, SBOM), deployment (per environment), and test (pass rate, coverage) summaries.",
|
|
67
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string", "description": "UUID of the project"}}, "required": ["project_id"]},
|
|
68
|
+
},
|
|
69
|
+
"task_dispatch": {
|
|
70
|
+
"category": "core",
|
|
71
|
+
"module": "icdev.tools.mcp.core_server",
|
|
72
|
+
"handler": "handle_task_dispatch",
|
|
73
|
+
"description": "Create an A2A (Agent-to-Agent) task record to dispatch work to another agent.",
|
|
74
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string", "description": "UUID of the project (optional)"}, "target_agent_id": {"type": "string", "description": "ID of the target agent to receive the task"}, "skill_id": {"type": "string", "description": "Skill identifier the target agent should execute"}, "input_data": {"type": "object", "description": "Input data for the task"}, "priority": {"type": "integer", "description": "Task priority (1=highest, 10=lowest)", "minimum": 1, "maximum": 10, "default": 5}}, "required": ["skill_id"]},
|
|
75
|
+
},
|
|
76
|
+
"agent_status": {
|
|
77
|
+
"category": "core",
|
|
78
|
+
"module": "icdev.tools.mcp.core_server",
|
|
79
|
+
"handler": "handle_agent_status",
|
|
80
|
+
"description": "Get the status of registered A2A agents, including active task counts.",
|
|
81
|
+
"input_schema": {"type": "object", "properties": {"agent_id": {"type": "string", "description": "Specific agent ID to query (omit for all agents)"}}},
|
|
82
|
+
},
|
|
83
|
+
# ============================================================
|
|
84
|
+
# COMPLIANCE (31 tools)
|
|
85
|
+
# ============================================================
|
|
86
|
+
"nist_lookup": {
|
|
87
|
+
"category": "compliance",
|
|
88
|
+
"module": "icdev.tools.mcp.compliance_server",
|
|
89
|
+
"handler": "handle_nist_lookup",
|
|
90
|
+
"description": "Look up NIST 800-53 Rev 5 security controls by control ID (e.g., AC-2) or list all controls in a family (e.g., AC, AU, SA).",
|
|
91
|
+
"input_schema": {"type": "object", "properties": {"control_id": {"type": "string", "description": "Control ID to look up (e.g., AC-2, SA-11)"}, "family": {"type": "string", "description": "Family code to list all controls (e.g., AC, AU, CM, IA, SA, SC)"}}},
|
|
92
|
+
},
|
|
93
|
+
"ssp_generate": {
|
|
94
|
+
"category": "compliance",
|
|
95
|
+
"module": "icdev.tools.mcp.compliance_server",
|
|
96
|
+
"handler": "handle_ssp_generate",
|
|
97
|
+
"description": "Generate a System Security Plan (SSP) document for a project with all 17 sections per NIST 800-53. Includes CUI markings.",
|
|
98
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string", "description": "UUID of the project"}, "output_dir": {"type": "string", "description": "Output directory for SSP document (optional)"}}, "required": ["project_id"]},
|
|
99
|
+
},
|
|
100
|
+
"poam_generate": {
|
|
101
|
+
"category": "compliance",
|
|
102
|
+
"module": "icdev.tools.mcp.compliance_server",
|
|
103
|
+
"handler": "handle_poam_generate",
|
|
104
|
+
"description": "Generate a Plan of Action & Milestones (POA&M) document from security scan findings with corrective actions and milestones.",
|
|
105
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string", "description": "UUID of the project"}, "output_dir": {"type": "string", "description": "Output directory for POA&M (optional)"}}, "required": ["project_id"]},
|
|
106
|
+
},
|
|
107
|
+
"stig_check": {
|
|
108
|
+
"category": "compliance",
|
|
109
|
+
"module": "icdev.tools.mcp.compliance_server",
|
|
110
|
+
"handler": "handle_stig_check",
|
|
111
|
+
"description": "Run STIG compliance checks against a project. Returns findings categorized as CAT1 (critical), CAT2 (high), CAT3 (medium).",
|
|
112
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string", "description": "UUID of the project"}, "stig_profile": {"type": "string", "description": "STIG profile to check against", "enum": ["webapp", "container", "database", "linux", "network"], "default": "webapp"}}, "required": ["project_id"]},
|
|
113
|
+
},
|
|
114
|
+
"sbom_generate": {
|
|
115
|
+
"category": "compliance",
|
|
116
|
+
"module": "icdev.tools.mcp.compliance_server",
|
|
117
|
+
"handler": "handle_sbom_generate",
|
|
118
|
+
"description": "Generate a Software Bill of Materials (SBOM) in CycloneDX format. Lists all dependencies with versions and known vulnerabilities.",
|
|
119
|
+
"input_schema": {"type": "object", "properties": {"project_dir": {"type": "string", "description": "Path to the project directory"}, "project_id": {"type": "string", "description": "UUID of the project (optional, for DB recording)"}}, "required": ["project_dir"]},
|
|
120
|
+
},
|
|
121
|
+
"cui_mark": {
|
|
122
|
+
"category": "compliance",
|
|
123
|
+
"module": "icdev.tools.mcp.compliance_server",
|
|
124
|
+
"handler": "handle_cui_mark",
|
|
125
|
+
"description": "Apply CUI (Controlled Unclassified Information) markings to a file or content string. Adds CUI // SP-CTI banners and designation indicators.",
|
|
126
|
+
"input_schema": {"type": "object", "properties": {"file_path": {"type": "string", "description": "Path to file to mark with CUI banners"}, "content": {"type": "string", "description": "Content string to mark (alternative to file_path)"}, "marking": {"type": "string", "description": "CUI marking text", "default": "CUI // SP-CTI"}}},
|
|
127
|
+
},
|
|
128
|
+
"control_map": {
|
|
129
|
+
"category": "compliance",
|
|
130
|
+
"module": "icdev.tools.mcp.compliance_server",
|
|
131
|
+
"handler": "handle_control_map",
|
|
132
|
+
"description": "Map a project activity (e.g., code.commit, test.execute, deploy) to relevant NIST 800-53 controls. Records the mapping in the database.",
|
|
133
|
+
"input_schema": {"type": "object", "properties": {"activity": {"type": "string", "description": "Activity type (e.g., code.commit, test.execute, security.scan, deploy.staging)"}, "project_id": {"type": "string", "description": "UUID of the project (optional)"}}, "required": ["activity"]},
|
|
134
|
+
},
|
|
135
|
+
"cssp_assess": {
|
|
136
|
+
"category": "compliance",
|
|
137
|
+
"module": "icdev.tools.mcp.compliance_server",
|
|
138
|
+
"handler": "handle_cssp_assess",
|
|
139
|
+
"description": "Run CSSP assessment per DoD Instruction 8530.01 against a project. Evaluates 5 functional areas: Identify, Protect, Detect, Respond, Sustain.",
|
|
140
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string", "description": "UUID of the project"}, "functional_area": {"type": "string", "description": "Functional area to assess (default: all)", "enum": ["all", "Identify", "Protect", "Detect", "Respond", "Sustain"], "default": "all"}}, "required": ["project_id"]},
|
|
141
|
+
},
|
|
142
|
+
"cssp_report": {
|
|
143
|
+
"category": "compliance",
|
|
144
|
+
"module": "icdev.tools.mcp.compliance_server",
|
|
145
|
+
"handler": "handle_cssp_report",
|
|
146
|
+
"description": "Generate a CSSP certification report with functional area scores, evidence summary, and certification recommendation.",
|
|
147
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string", "description": "UUID of the project"}, "output_dir": {"type": "string", "description": "Output directory (optional)"}}, "required": ["project_id"]},
|
|
148
|
+
},
|
|
149
|
+
"cssp_ir_plan": {
|
|
150
|
+
"category": "compliance",
|
|
151
|
+
"module": "icdev.tools.mcp.compliance_server",
|
|
152
|
+
"handler": "handle_cssp_ir_plan",
|
|
153
|
+
"description": "Generate an Incident Response Plan per CSSP SOC requirements with escalation timelines and SOC coordination procedures.",
|
|
154
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string", "description": "UUID of the project"}, "output_dir": {"type": "string", "description": "Output directory (optional)"}}, "required": ["project_id"]},
|
|
155
|
+
},
|
|
156
|
+
"cssp_evidence": {
|
|
157
|
+
"category": "compliance",
|
|
158
|
+
"module": "icdev.tools.mcp.compliance_server",
|
|
159
|
+
"handler": "handle_cssp_evidence",
|
|
160
|
+
"description": "Collect and index evidence artifacts for CSSP assessment. Scans project for compliance artifacts and maps them to CSSP requirements.",
|
|
161
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string", "description": "UUID of the project"}, "project_dir": {"type": "string", "description": "Project directory path (optional)"}}, "required": ["project_id"]},
|
|
162
|
+
},
|
|
163
|
+
"xacta_sync": {
|
|
164
|
+
"category": "compliance",
|
|
165
|
+
"module": "icdev.tools.mcp.compliance_server",
|
|
166
|
+
"handler": "handle_xacta_sync",
|
|
167
|
+
"description": "Sync project compliance data to Xacta 360 (system of record for CSSP/ATO). Supports API, export, and hybrid modes.",
|
|
168
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string", "description": "UUID of the project"}, "mode": {"type": "string", "description": "Sync mode", "enum": ["api", "export", "hybrid"], "default": "hybrid"}}, "required": ["project_id"]},
|
|
169
|
+
},
|
|
170
|
+
"xacta_export": {
|
|
171
|
+
"category": "compliance",
|
|
172
|
+
"module": "icdev.tools.mcp.compliance_server",
|
|
173
|
+
"handler": "handle_xacta_export",
|
|
174
|
+
"description": "Generate Xacta 360-compatible export files (OSCAL JSON or CSV) for batch import.",
|
|
175
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string", "description": "UUID of the project"}, "format": {"type": "string", "description": "Export format", "enum": ["oscal", "csv", "all"], "default": "oscal"}}, "required": ["project_id"]},
|
|
176
|
+
},
|
|
177
|
+
"sbd_assess": {
|
|
178
|
+
"category": "compliance",
|
|
179
|
+
"module": "icdev.tools.mcp.compliance_server",
|
|
180
|
+
"handler": "handle_sbd_assess",
|
|
181
|
+
"description": "Run Secure by Design assessment per CISA commitments and DoDI 5000.87 across 14 security domains.",
|
|
182
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string", "description": "UUID of the project to assess"}, "domain": {"type": "string", "enum": ["all", "Authentication", "Memory Safety", "Vulnerability Mgmt", "Intrusion Evidence", "Cryptography", "Access Control", "Input Handling", "Error Handling", "Supply Chain", "Threat Modeling", "Defense in Depth", "Secure Defaults", "CUI Compliance", "DoD Software Assurance"], "default": "all", "description": "Domain to assess (default: all)"}, "project_dir": {"type": "string", "description": "Project directory for file-based checks (optional)"}}, "required": ["project_id"]},
|
|
183
|
+
},
|
|
184
|
+
"sbd_report": {
|
|
185
|
+
"category": "compliance",
|
|
186
|
+
"module": "icdev.tools.mcp.compliance_server",
|
|
187
|
+
"handler": "handle_sbd_report",
|
|
188
|
+
"description": "Generate a Secure by Design assessment report with domain scores and CISA commitment status.",
|
|
189
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string", "description": "UUID of the project"}, "output_dir": {"type": "string", "description": "Output directory (optional)"}}, "required": ["project_id"]},
|
|
190
|
+
},
|
|
191
|
+
"ivv_assess": {
|
|
192
|
+
"category": "compliance",
|
|
193
|
+
"module": "icdev.tools.mcp.compliance_server",
|
|
194
|
+
"handler": "handle_ivv_assess",
|
|
195
|
+
"description": "Run IV&V assessment per IEEE 1012 across 9 process areas (verification + validation).",
|
|
196
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string", "description": "UUID of the project to assess"}, "process_area": {"type": "string", "enum": ["all", "Requirements Verification", "Design Verification", "Code Verification", "Test Verification", "Integration Verification", "Traceability Analysis", "Security Verification", "Build/Deploy Verification", "Process Compliance"], "default": "all", "description": "Process area to assess (default: all)"}, "project_dir": {"type": "string", "description": "Project directory for file-based checks (optional)"}}, "required": ["project_id"]},
|
|
197
|
+
},
|
|
198
|
+
"ivv_report": {
|
|
199
|
+
"category": "compliance",
|
|
200
|
+
"module": "icdev.tools.mcp.compliance_server",
|
|
201
|
+
"handler": "handle_ivv_report",
|
|
202
|
+
"description": "Generate an IV&V certification report with verification/validation scores and certification recommendation.",
|
|
203
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string", "description": "UUID of the project"}, "output_dir": {"type": "string", "description": "Output directory (optional)"}}, "required": ["project_id"]},
|
|
204
|
+
},
|
|
205
|
+
"rtm_generate": {
|
|
206
|
+
"category": "compliance",
|
|
207
|
+
"module": "icdev.tools.mcp.compliance_server",
|
|
208
|
+
"handler": "handle_rtm_generate",
|
|
209
|
+
"description": "Generate a Requirements Traceability Matrix (RTM) linking requirements to design, code, and tests.",
|
|
210
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string", "description": "UUID of the project"}, "project_dir": {"type": "string", "description": "Project directory to scan for artifacts"}}, "required": ["project_id"]},
|
|
211
|
+
},
|
|
212
|
+
"crosswalk_query": {
|
|
213
|
+
"category": "compliance",
|
|
214
|
+
"module": "icdev.tools.mcp.compliance_server",
|
|
215
|
+
"handler": "handle_crosswalk_query",
|
|
216
|
+
"description": "Query control crosswalk engine for multi-framework mappings (NIST 800-53 ↔ FedRAMP ↔ 800-171 ↔ CMMC). Actions: frameworks_for_control, controls_for_framework, controls_for_impact_level, coverage, gap_analysis.",
|
|
217
|
+
"input_schema": {"type": "object", "properties": {"action": {"type": "string", "enum": ["frameworks_for_control", "controls_for_framework", "controls_for_impact_level", "coverage", "gap_analysis"], "default": "frameworks_for_control", "description": "Query action to perform"}, "control_id": {"type": "string", "description": "NIST 800-53 control ID (e.g., AC-2)"}, "framework": {"type": "string", "description": "Target framework (fedramp, cmmc, 800-171)"}, "baseline": {"type": "string", "description": "Framework baseline (moderate, high, l2, l3)"}, "project_id": {"type": "string", "description": "UUID of the project (for coverage/gap_analysis)"}, "impact_level": {"type": "string", "enum": ["IL4", "IL5", "IL6"], "description": "DoD Impact Level"}}},
|
|
218
|
+
},
|
|
219
|
+
"fedramp_assess": {
|
|
220
|
+
"category": "compliance",
|
|
221
|
+
"module": "icdev.tools.mcp.compliance_server",
|
|
222
|
+
"handler": "handle_fedramp_assess",
|
|
223
|
+
"description": "Run FedRAMP Moderate or High baseline security assessment against a project. Inherits NIST 800-53 implementations via crosswalk.",
|
|
224
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string", "description": "UUID of the project"}, "baseline": {"type": "string", "enum": ["moderate", "high"], "default": "moderate", "description": "FedRAMP baseline to assess against"}, "project_dir": {"type": "string", "description": "Project directory for auto-checks (optional)"}}, "required": ["project_id"]},
|
|
225
|
+
},
|
|
226
|
+
"fedramp_report": {
|
|
227
|
+
"category": "compliance",
|
|
228
|
+
"module": "icdev.tools.mcp.compliance_server",
|
|
229
|
+
"handler": "handle_fedramp_report",
|
|
230
|
+
"description": "Generate a FedRAMP assessment report with control family scores, gap analysis, and readiness score.",
|
|
231
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string", "description": "UUID of the project"}, "baseline": {"type": "string", "enum": ["moderate", "high"], "default": "moderate"}, "output_path": {"type": "string", "description": "Output path for report (optional)"}}, "required": ["project_id"]},
|
|
232
|
+
},
|
|
233
|
+
"cmmc_assess": {
|
|
234
|
+
"category": "compliance",
|
|
235
|
+
"module": "icdev.tools.mcp.compliance_server",
|
|
236
|
+
"handler": "handle_cmmc_assess",
|
|
237
|
+
"description": "Run CMMC Level 2 or Level 3 assessment against a project. Evaluates practices across 14 domains.",
|
|
238
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string", "description": "UUID of the project"}, "level": {"type": "integer", "enum": [2, 3], "default": 2, "description": "CMMC level to assess"}, "project_dir": {"type": "string", "description": "Project directory for auto-checks (optional)"}}, "required": ["project_id"]},
|
|
239
|
+
},
|
|
240
|
+
"cmmc_report": {
|
|
241
|
+
"category": "compliance",
|
|
242
|
+
"module": "icdev.tools.mcp.compliance_server",
|
|
243
|
+
"handler": "handle_cmmc_report",
|
|
244
|
+
"description": "Generate a CMMC assessment report with domain scores, practice status, and NIST 800-171 cross-reference.",
|
|
245
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string", "description": "UUID of the project"}, "level": {"type": "integer", "enum": [2, 3], "default": 2}, "output_path": {"type": "string", "description": "Output path for report (optional)"}}, "required": ["project_id"]},
|
|
246
|
+
},
|
|
247
|
+
"oscal_generate": {
|
|
248
|
+
"category": "compliance",
|
|
249
|
+
"module": "icdev.tools.mcp.compliance_server",
|
|
250
|
+
"handler": "handle_oscal_generate",
|
|
251
|
+
"description": "Generate NIST OSCAL 1.1.2 artifacts (SSP, POA&M, Assessment Results, Component Definition) in machine-readable format.",
|
|
252
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string", "description": "UUID of the project"}, "artifact": {"type": "string", "enum": ["ssp", "poam", "assessment_results", "component_definition", "all"], "default": "ssp", "description": "OSCAL artifact type to generate"}, "format": {"type": "string", "enum": ["json", "xml", "yaml"], "default": "json", "description": "Output format"}}, "required": ["project_id"]},
|
|
253
|
+
},
|
|
254
|
+
"emass_sync": {
|
|
255
|
+
"category": "compliance",
|
|
256
|
+
"module": "icdev.tools.mcp.compliance_server",
|
|
257
|
+
"handler": "handle_emass_sync",
|
|
258
|
+
"description": "Sync project compliance data to eMASS (DoD system of record). Supports API, export, and hybrid modes.",
|
|
259
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string", "description": "UUID of the project"}, "mode": {"type": "string", "enum": ["api", "export", "hybrid"], "default": "hybrid", "description": "Sync mode: api (REST), export (CSV/files), hybrid (try API, fall back to export)"}}, "required": ["project_id"]},
|
|
260
|
+
},
|
|
261
|
+
"cato_monitor": {
|
|
262
|
+
"category": "compliance",
|
|
263
|
+
"module": "icdev.tools.mcp.compliance_server",
|
|
264
|
+
"handler": "handle_cato_monitor",
|
|
265
|
+
"description": "Monitor continuous ATO (cATO) evidence freshness and readiness. Actions: readiness, check_freshness, auto_reassess, dashboard, expire.",
|
|
266
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string", "description": "UUID of the project"}, "action": {"type": "string", "enum": ["readiness", "check_freshness", "auto_reassess", "dashboard", "expire"], "default": "readiness", "description": "Monitoring action to perform"}}, "required": ["project_id"]},
|
|
267
|
+
},
|
|
268
|
+
"pi_compliance": {
|
|
269
|
+
"category": "compliance",
|
|
270
|
+
"module": "icdev.tools.mcp.compliance_server",
|
|
271
|
+
"handler": "handle_pi_compliance",
|
|
272
|
+
"description": "Track compliance across SAFe Program Increments (PIs). Actions: start, record, close, velocity, burndown, report.",
|
|
273
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string", "description": "UUID of the project"}, "action": {"type": "string", "enum": ["start", "record", "close", "velocity", "burndown", "report"], "default": "velocity", "description": "PI tracking action"}, "pi_number": {"type": "string", "description": "PI identifier (e.g., PI-24.1)"}, "start_date": {"type": "string", "description": "PI start date (YYYY-MM-DD)"}, "end_date": {"type": "string", "description": "PI end date (YYYY-MM-DD)"}}, "required": ["project_id"]},
|
|
274
|
+
},
|
|
275
|
+
"classification_check": {
|
|
276
|
+
"category": "compliance",
|
|
277
|
+
"module": "icdev.tools.mcp.compliance_server",
|
|
278
|
+
"handler": "handle_classification_check",
|
|
279
|
+
"description": "Validate project classification markings, get marking banners, or query impact level baselines.",
|
|
280
|
+
"input_schema": {"type": "object", "properties": {"action": {"type": "string", "enum": ["validate", "banner", "baseline", "profile"], "default": "validate", "description": "Classification action"}, "project_id": {"type": "string", "description": "UUID of the project (for validate)"}, "impact_level": {"type": "string", "enum": ["IL4", "IL5", "IL6"], "description": "Impact level (for baseline/profile)"}, "classification": {"type": "string", "description": "Classification level (for banner)"}}},
|
|
281
|
+
},
|
|
282
|
+
"fips199_categorize": {
|
|
283
|
+
"category": "compliance",
|
|
284
|
+
"module": "icdev.tools.mcp.compliance_server",
|
|
285
|
+
"handler": "handle_fips199_categorize",
|
|
286
|
+
"description": "FIPS 199 security categorization using NIST SP 800-60 information types. Actions: categorize, add_type, remove_type, list_types, list_catalog, get, gate.",
|
|
287
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string", "description": "Project UUID"}, "action": {"type": "string", "enum": ["categorize", "add_type", "remove_type", "list_types", "list_catalog", "get", "gate"], "default": "categorize"}, "type_id": {"type": "string", "description": "SP 800-60 info type ID (e.g., D.1.1.1)"}, "method": {"type": "string", "enum": ["information_type", "manual", "cnssi_1253"], "default": "information_type"}, "manual_c": {"type": "string", "enum": ["Low", "Moderate", "High"]}, "manual_i": {"type": "string", "enum": ["Low", "Moderate", "High"]}, "manual_a": {"type": "string", "enum": ["Low", "Moderate", "High"]}, "adjust_c": {"type": "string", "enum": ["Low", "Moderate", "High"]}, "adjust_i": {"type": "string", "enum": ["Low", "Moderate", "High"]}, "adjust_a": {"type": "string", "enum": ["Low", "Moderate", "High"]}, "justification": {"type": "string"}, "category": {"type": "string", "description": "Catalog filter (D.1, D.2, D.3)"}}},
|
|
288
|
+
},
|
|
289
|
+
"fips200_validate": {
|
|
290
|
+
"category": "compliance",
|
|
291
|
+
"module": "icdev.tools.mcp.compliance_server",
|
|
292
|
+
"handler": "handle_fips200_validate",
|
|
293
|
+
"description": "Validate FIPS 200 minimum security requirements across all 17 areas.",
|
|
294
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string", "description": "Project UUID"}, "project_dir": {"type": "string"}, "gate": {"type": "boolean", "default": False}}, "required": ["project_id"]},
|
|
295
|
+
},
|
|
296
|
+
"security_categorize": {
|
|
297
|
+
"category": "compliance",
|
|
298
|
+
"module": "icdev.tools.mcp.compliance_server",
|
|
299
|
+
"handler": "handle_security_categorize",
|
|
300
|
+
"description": "Full security categorization: FIPS 199 + FIPS 200 + baseline selection.",
|
|
301
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string", "description": "Project UUID"}}, "required": ["project_id"]},
|
|
302
|
+
},
|
|
303
|
+
"oscal_validate_deep": {
|
|
304
|
+
"category": "compliance",
|
|
305
|
+
"module": "icdev.tools.mcp.compliance_server",
|
|
306
|
+
"handler": "handle_oscal_validate_deep",
|
|
307
|
+
"description": "Run 3-layer deep OSCAL validation: structural → pydantic → Metaschema. Each layer independently optional.",
|
|
308
|
+
"input_schema": {"type": "object", "properties": {"file_path": {"type": "string", "description": "Path to OSCAL JSON file"}, "project_id": {"type": "string", "description": "Project UUID (optional)"}}, "required": ["file_path"]},
|
|
309
|
+
},
|
|
310
|
+
"oscal_convert": {
|
|
311
|
+
"category": "compliance",
|
|
312
|
+
"module": "icdev.tools.mcp.compliance_server",
|
|
313
|
+
"handler": "handle_oscal_convert",
|
|
314
|
+
"description": "Convert OSCAL artifact between JSON, XML, and YAML formats using oscal-cli.",
|
|
315
|
+
"input_schema": {"type": "object", "properties": {"input_path": {"type": "string", "description": "Path to input OSCAL file"}, "output_format": {"type": "string", "enum": ["json", "xml", "yaml"], "default": "xml"}, "output_path": {"type": "string", "description": "Output file path (optional)"}}, "required": ["input_path"]},
|
|
316
|
+
},
|
|
317
|
+
"oscal_resolve_profile": {
|
|
318
|
+
"category": "compliance",
|
|
319
|
+
"module": "icdev.tools.mcp.compliance_server",
|
|
320
|
+
"handler": "handle_oscal_resolve_profile",
|
|
321
|
+
"description": "Flatten an OSCAL Profile into a resolved Catalog using oscal-cli profile resolution.",
|
|
322
|
+
"input_schema": {"type": "object", "properties": {"profile_path": {"type": "string", "description": "Path to OSCAL Profile JSON"}, "output_path": {"type": "string", "description": "Output path (optional)"}}, "required": ["profile_path"]},
|
|
323
|
+
},
|
|
324
|
+
"oscal_catalog_lookup": {
|
|
325
|
+
"category": "compliance",
|
|
326
|
+
"module": "icdev.tools.mcp.compliance_server",
|
|
327
|
+
"handler": "handle_oscal_catalog_lookup",
|
|
328
|
+
"description": "Look up NIST 800-53 controls from official OSCAL catalog (1000+ controls) with ICDEV fallback.",
|
|
329
|
+
"input_schema": {"type": "object", "properties": {"control_id": {"type": "string", "description": "Control ID (e.g., AC-2)"}, "family": {"type": "string", "description": "Family code (e.g., AC, AU)"}}},
|
|
330
|
+
},
|
|
331
|
+
"oscal_detect_tools": {
|
|
332
|
+
"category": "compliance",
|
|
333
|
+
"module": "icdev.tools.mcp.compliance_server",
|
|
334
|
+
"handler": "handle_oscal_detect_tools",
|
|
335
|
+
"description": "Detect available OSCAL ecosystem tools (oscal-cli, oscal-pydantic, NIST catalog).",
|
|
336
|
+
"input_schema": {"type": "object", "properties": {}},
|
|
337
|
+
},
|
|
338
|
+
# ============================================================
|
|
339
|
+
# BUILDER (13 tools)
|
|
340
|
+
# ============================================================
|
|
341
|
+
"scaffold": {
|
|
342
|
+
"category": "builder",
|
|
343
|
+
"module": "icdev.tools.mcp.builder_server",
|
|
344
|
+
"handler": "handle_scaffold",
|
|
345
|
+
"description": "Generate a project directory structure from templates. Includes CUI markings, README, compliance directory, Dockerfile, .gitignore, and test scaffolding.",
|
|
346
|
+
"input_schema": {"type": "object", "properties": {"name": {"type": "string", "description": "Project name"}, "type": {"type": "string", "description": "Project type (includes multi-language scaffolds)", "enum": ["webapp", "microservice", "api", "cli", "data_pipeline", "iac", "java-backend", "java-microservice", "go-backend", "go-microservice", "rust-backend", "csharp-backend", "csharp-api", "typescript-backend", "typescript-api"], "default": "webapp"}, "output_dir": {"type": "string", "description": "Output directory (optional, defaults to projects/)"}, "tech_stack": {"type": "object", "description": "Technology stack preferences", "properties": {"backend": {"type": "string"}, "frontend": {"type": "string"}, "database": {"type": "string"}}}}, "required": ["name"]},
|
|
347
|
+
},
|
|
348
|
+
"write_tests": {
|
|
349
|
+
"category": "builder",
|
|
350
|
+
"module": "icdev.tools.mcp.builder_server",
|
|
351
|
+
"handler": "handle_write_tests",
|
|
352
|
+
"description": "Generate test files from a feature description (RED phase of TDD). Creates Gherkin BDD feature files and language-specific step definitions/unit tests.",
|
|
353
|
+
"input_schema": {"type": "object", "properties": {"feature": {"type": "string", "description": "Feature description to generate tests for"}, "project_dir": {"type": "string", "description": "Path to the project directory"}, "test_type": {"type": "string", "description": "Type of tests to generate", "enum": ["unit", "bdd", "both"], "default": "both"}, "language": {"type": "string", "description": "Target language for step definitions and unit tests", "enum": ["python", "java", "javascript", "typescript", "go", "rust", "csharp"], "default": "python"}}, "required": ["feature"]},
|
|
354
|
+
},
|
|
355
|
+
"generate_code": {
|
|
356
|
+
"category": "builder",
|
|
357
|
+
"module": "icdev.tools.mcp.builder_server",
|
|
358
|
+
"handler": "handle_generate_code",
|
|
359
|
+
"description": "Generate implementation code to make failing tests pass (GREEN phase of TDD). Analyzes test file to determine required code. Supports 6 languages.",
|
|
360
|
+
"input_schema": {"type": "object", "properties": {"test_file": {"type": "string", "description": "Path to the failing test file"}, "project_dir": {"type": "string", "description": "Path to the project directory"}, "language": {"type": "string", "description": "Target language for generated code", "enum": ["python", "java", "javascript", "typescript", "go", "rust", "csharp"], "default": "python"}}, "required": ["test_file"]},
|
|
361
|
+
},
|
|
362
|
+
"run_tests": {
|
|
363
|
+
"category": "builder",
|
|
364
|
+
"module": "icdev.tools.mcp.builder_server",
|
|
365
|
+
"handler": "handle_run_tests",
|
|
366
|
+
"description": "Execute the test suite using pytest (unit tests) and/or behave (BDD). Returns pass/fail status, output, and coverage data.",
|
|
367
|
+
"input_schema": {"type": "object", "properties": {"project_dir": {"type": "string", "description": "Path to the project directory"}, "test_type": {"type": "string", "description": "Which tests to run", "enum": ["unit", "bdd", "all"], "default": "all"}, "verbose": {"type": "boolean", "description": "Verbose output", "default": False}, "coverage": {"type": "boolean", "description": "Generate coverage report", "default": True}}, "required": ["project_dir"]},
|
|
368
|
+
},
|
|
369
|
+
"lint": {
|
|
370
|
+
"category": "builder",
|
|
371
|
+
"module": "icdev.tools.mcp.builder_server",
|
|
372
|
+
"handler": "handle_lint",
|
|
373
|
+
"description": "Run linters on a project (multi-language: bandit, checkstyle, golangci-lint, clippy, dotnet analyzers, eslint).",
|
|
374
|
+
"input_schema": {"type": "object", "properties": {"project_dir": {"type": "string", "description": "Path to the project directory"}}, "required": ["project_dir"]},
|
|
375
|
+
},
|
|
376
|
+
"format": {
|
|
377
|
+
"category": "builder",
|
|
378
|
+
"module": "icdev.tools.mcp.builder_server",
|
|
379
|
+
"handler": "handle_format",
|
|
380
|
+
"description": "Run code formatters on a project (multi-language: black, google-java-format, gofmt, rustfmt, dotnet-format, prettier).",
|
|
381
|
+
"input_schema": {"type": "object", "properties": {"project_dir": {"type": "string", "description": "Path to the project directory"}}, "required": ["project_dir"]},
|
|
382
|
+
},
|
|
383
|
+
"agentic_fitness": {
|
|
384
|
+
"category": "builder",
|
|
385
|
+
"module": "icdev.tools.mcp.builder_server",
|
|
386
|
+
"handler": "handle_agentic_fitness",
|
|
387
|
+
"description": "Assess component fitness for agentic architecture. Scores across 6 dimensions (autonomy, statefulness, tool-density, collaboration, error-recovery, domain-complexity). Returns scorecard with overall_score and per-dimension ratings.",
|
|
388
|
+
"input_schema": {"type": "object", "properties": {"spec": {"type": "string", "description": "Application specification or description to assess"}, "project_id": {"type": "string", "description": "Project ID for tracking (optional)"}}, "required": ["spec"]},
|
|
389
|
+
},
|
|
390
|
+
"generate_blueprint": {
|
|
391
|
+
"category": "builder",
|
|
392
|
+
"module": "icdev.tools.mcp.builder_server",
|
|
393
|
+
"handler": "handle_generate_blueprint",
|
|
394
|
+
"description": "Generate a deployment blueprint from a fitness scorecard. Produces agent topology, port assignments, MCP server config, goal selection, and infrastructure plan for the child application.",
|
|
395
|
+
"input_schema": {"type": "object", "properties": {"fitness_scorecard": {"type": "string", "description": "Path to the fitness scorecard JSON file"}, "user_decisions": {"type": "object", "description": "User decisions (cloud provider, MBSE, ATO, port offset, etc.)"}, "app_name": {"type": "string", "description": "Name of the child application"}, "cloud_provider": {"type": "string", "description": "Cloud provider", "enum": ["aws", "gcp", "azure", "oracle"], "default": "aws"}, "cloud_region": {"type": "string", "description": "Cloud region", "default": "us-gov-west-1"}, "impact_level": {"type": "string", "description": "Impact level", "enum": ["IL2", "IL4", "IL5", "IL6"], "default": "IL4"}, "output": {"type": "string", "description": "Output path for the blueprint JSON (optional)"}}, "required": ["fitness_scorecard", "app_name"]},
|
|
396
|
+
},
|
|
397
|
+
"generate_child_app": {
|
|
398
|
+
"category": "builder",
|
|
399
|
+
"module": "icdev.tools.mcp.builder_server",
|
|
400
|
+
"handler": "handle_generate_child_app",
|
|
401
|
+
"description": "Generate a mini-ICDEV clone child application from a blueprint. Runs the 12-step generation pipeline: scaffold, agents, goals, tools, memory, DB, MCP, CLAUDE.md, CI/CD, compliance, Docker, K8s.",
|
|
402
|
+
"input_schema": {"type": "object", "properties": {"blueprint": {"type": "string", "description": "Path to the blueprint JSON file"}, "output": {"type": "string", "description": "Output directory for the generated application (optional)"}}, "required": ["blueprint"]},
|
|
403
|
+
},
|
|
404
|
+
"dev_profile_create": {
|
|
405
|
+
"category": "builder",
|
|
406
|
+
"module": "icdev.tools.mcp.builder_server",
|
|
407
|
+
"handler": "handle_dev_profile_create",
|
|
408
|
+
"description": "Create a tenant/project development profile from a starter template or explicit data. Supports 6 starter templates (dod_baseline, fedramp_baseline, healthcare_baseline, financial_baseline, law_enforcement, startup). Profiles define coding standards, tooling preferences, and compliance requirements.",
|
|
409
|
+
"input_schema": {"type": "object", "properties": {"scope": {"type": "string", "description": "Profile scope level", "enum": ["platform", "tenant", "program", "project", "user"], "default": "project"}, "scope_id": {"type": "string", "description": "Scope entity ID (e.g., tenant-abc, proj-123)"}, "template": {"type": "string", "description": "Starter template name (e.g., dod_baseline, fedramp_baseline, startup)"}, "profile_data": {"type": "object", "description": "Explicit profile data (merged on top of template if both given)"}, "created_by": {"type": "string", "description": "Creator identity", "default": "mcp-client"}}, "required": ["scope_id"]},
|
|
410
|
+
},
|
|
411
|
+
"dev_profile_get": {
|
|
412
|
+
"category": "builder",
|
|
413
|
+
"module": "icdev.tools.mcp.builder_server",
|
|
414
|
+
"handler": "handle_dev_profile_get",
|
|
415
|
+
"description": "Get the current active development profile for a scope. Returns all profile dimensions (language, style, testing, architecture, security, compliance, operations, documentation, git, ai).",
|
|
416
|
+
"input_schema": {"type": "object", "properties": {"scope": {"type": "string", "enum": ["platform", "tenant", "program", "project", "user"], "default": "project"}, "scope_id": {"type": "string", "description": "Scope entity ID"}, "version": {"type": "integer", "description": "Specific version number (omit for current)"}}, "required": ["scope_id"]},
|
|
417
|
+
},
|
|
418
|
+
"dev_profile_resolve": {
|
|
419
|
+
"category": "builder",
|
|
420
|
+
"module": "icdev.tools.mcp.builder_server",
|
|
421
|
+
"handler": "handle_dev_profile_resolve",
|
|
422
|
+
"description": "Resolve the 5-layer cascade (platform -> tenant -> program -> project -> user) to produce the effective merged profile with provenance tracking. Shows which scope set each value and whether dimensions are locked.",
|
|
423
|
+
"input_schema": {"type": "object", "properties": {"scope": {"type": "string", "enum": ["platform", "tenant", "program", "project", "user"], "default": "project"}, "scope_id": {"type": "string", "description": "Scope entity ID to resolve from"}}, "required": ["scope_id"]},
|
|
424
|
+
},
|
|
425
|
+
"dev_profile_detect": {
|
|
426
|
+
"category": "builder",
|
|
427
|
+
"module": "icdev.tools.mcp.builder_server",
|
|
428
|
+
"handler": "handle_dev_profile_detect",
|
|
429
|
+
"description": "Auto-detect development profile from an existing repository. Scans files, git history, CI/CD configs, and code patterns to suggest profile dimensions with confidence scores. Advisory only (D185) — requires explicit acceptance.",
|
|
430
|
+
"input_schema": {"type": "object", "properties": {"repo_path": {"type": "string", "description": "Path to repository to scan"}, "tenant_id": {"type": "string", "description": "Tenant ID (for storing detection results)"}, "project_id": {"type": "string", "description": "Project ID (for storing detection results)"}, "store": {"type": "boolean", "description": "Whether to store detection results in DB", "default": False}}, "required": ["repo_path"]},
|
|
431
|
+
},
|
|
432
|
+
# ============================================================
|
|
433
|
+
# INFRA (6 tools)
|
|
434
|
+
# ============================================================
|
|
435
|
+
"terraform_plan": {
|
|
436
|
+
"category": "infra",
|
|
437
|
+
"module": "icdev.tools.mcp.infra_server",
|
|
438
|
+
"handler": "handle_terraform_plan",
|
|
439
|
+
"description": "Generate Terraform configurations for AWS GovCloud deployment. Produces provider.tf, variables.tf, main.tf with VPC, ECR, and RDS modules.",
|
|
440
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string", "description": "UUID of the project"}, "output_dir": {"type": "string", "description": "Output directory for Terraform files"}, "modules": {"type": "array", "description": "Terraform modules to generate", "items": {"type": "string", "enum": ["vpc", "ecr", "rds", "s3", "iam"]}, "default": ["vpc", "ecr", "rds"]}}, "required": ["project_id"]},
|
|
441
|
+
},
|
|
442
|
+
"terraform_apply": {
|
|
443
|
+
"category": "infra",
|
|
444
|
+
"module": "icdev.tools.mcp.infra_server",
|
|
445
|
+
"handler": "handle_terraform_apply",
|
|
446
|
+
"description": "Apply Terraform configurations. Requires explicit approval flag. In production, delegates to GitLab CI/CD pipeline.",
|
|
447
|
+
"input_schema": {"type": "object", "properties": {"terraform_dir": {"type": "string", "description": "Directory containing Terraform files"}, "approved": {"type": "boolean", "description": "Explicit approval to apply changes", "default": False}}, "required": ["terraform_dir"]},
|
|
448
|
+
},
|
|
449
|
+
"ansible_run": {
|
|
450
|
+
"category": "infra",
|
|
451
|
+
"module": "icdev.tools.mcp.infra_server",
|
|
452
|
+
"handler": "handle_ansible_run",
|
|
453
|
+
"description": "Generate Ansible playbooks for server configuration and application deployment.",
|
|
454
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string", "description": "UUID of the project"}, "output_dir": {"type": "string", "description": "Output directory for Ansible files"}, "playbook_type": {"type": "string", "description": "Type of playbook to generate", "enum": ["deploy", "configure", "harden", "backup"], "default": "deploy"}}, "required": ["project_id"]},
|
|
455
|
+
},
|
|
456
|
+
"k8s_deploy": {
|
|
457
|
+
"category": "infra",
|
|
458
|
+
"module": "icdev.tools.mcp.infra_server",
|
|
459
|
+
"handler": "handle_k8s_deploy",
|
|
460
|
+
"description": "Generate Kubernetes manifests (Deployment, Service, ConfigMap, NetworkPolicy) for a project with security hardening.",
|
|
461
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string", "description": "UUID of the project"}, "output_dir": {"type": "string", "description": "Output directory for K8s manifests"}, "environment": {"type": "string", "description": "Target environment", "enum": ["staging", "production"], "default": "staging"}}, "required": ["project_id"]},
|
|
462
|
+
},
|
|
463
|
+
"pipeline_generate": {
|
|
464
|
+
"category": "infra",
|
|
465
|
+
"module": "icdev.tools.mcp.infra_server",
|
|
466
|
+
"handler": "handle_pipeline_generate",
|
|
467
|
+
"description": "Generate a GitLab CI/CD pipeline (.gitlab-ci.yml) with 7 stages: lint, test, security-scan, build, compliance-check, deploy-staging, deploy-prod.",
|
|
468
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string", "description": "UUID of the project"}, "output_dir": {"type": "string", "description": "Output directory for pipeline config"}, "stages": {"type": "array", "description": "Pipeline stages to include", "items": {"type": "string"}}}, "required": ["project_id"]},
|
|
469
|
+
},
|
|
470
|
+
"rollback": {
|
|
471
|
+
"category": "infra",
|
|
472
|
+
"module": "icdev.tools.mcp.infra_server",
|
|
473
|
+
"handler": "handle_rollback",
|
|
474
|
+
"description": "Rollback a deployment to a previous version. Records the rollback in audit trail and updates deployment status.",
|
|
475
|
+
"input_schema": {"type": "object", "properties": {"deployment_id": {"type": "string", "description": "ID of the deployment to rollback"}, "target_version": {"type": "string", "description": "Version to rollback to (optional, defaults to previous)"}, "reason": {"type": "string", "description": "Reason for rollback"}}, "required": ["deployment_id"]},
|
|
476
|
+
},
|
|
477
|
+
# ============================================================
|
|
478
|
+
# KNOWLEDGE (5 tools)
|
|
479
|
+
# ============================================================
|
|
480
|
+
"search_knowledge": {
|
|
481
|
+
"category": "knowledge",
|
|
482
|
+
"module": "icdev.tools.mcp.knowledge_server",
|
|
483
|
+
"handler": "handle_search_knowledge",
|
|
484
|
+
"description": "Search the ICDEV knowledge base for patterns, solutions, and best practices. Supports keyword search with optional pattern type filtering.",
|
|
485
|
+
"input_schema": {"type": "object", "properties": {"query": {"type": "string", "description": "Search query (keywords or error message)"}, "pattern_type": {"type": "string", "description": "Filter by pattern type", "enum": ["error", "performance", "security", "compliance", "deployment", "configuration"]}, "limit": {"type": "integer", "description": "Max results to return", "default": 10}}, "required": ["query"]},
|
|
486
|
+
},
|
|
487
|
+
"add_pattern": {
|
|
488
|
+
"category": "knowledge",
|
|
489
|
+
"module": "icdev.tools.mcp.knowledge_server",
|
|
490
|
+
"handler": "handle_add_pattern",
|
|
491
|
+
"description": "Add a new pattern to the knowledge base. Patterns capture common issues and their solutions for future self-healing.",
|
|
492
|
+
"input_schema": {"type": "object", "properties": {"name": {"type": "string", "description": "Pattern name (short, descriptive)"}, "pattern_type": {"type": "string", "description": "Pattern category", "enum": ["error", "performance", "security", "compliance", "deployment", "configuration"], "default": "error"}, "description": {"type": "string", "description": "Detailed description of the pattern"}, "detection_rule": {"type": "string", "description": "How to detect this pattern (regex, log pattern, metric threshold)"}, "solution": {"type": "string", "description": "How to resolve when this pattern is detected"}, "auto_healable": {"type": "boolean", "description": "Whether this can be auto-remediated", "default": False}, "confidence": {"type": "number", "description": "Confidence score 0.0-1.0", "default": 0.5}}, "required": ["name"]},
|
|
493
|
+
},
|
|
494
|
+
"get_recommendations": {
|
|
495
|
+
"category": "knowledge",
|
|
496
|
+
"module": "icdev.tools.mcp.knowledge_server",
|
|
497
|
+
"handler": "handle_get_recommendations",
|
|
498
|
+
"description": "Get improvement recommendations for a project based on failure history and knowledge base patterns.",
|
|
499
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string", "description": "UUID of the project"}}, "required": ["project_id"]},
|
|
500
|
+
},
|
|
501
|
+
"analyze_failure": {
|
|
502
|
+
"category": "knowledge",
|
|
503
|
+
"module": "icdev.tools.mcp.knowledge_server",
|
|
504
|
+
"handler": "handle_analyze_failure",
|
|
505
|
+
"description": "Analyze a failure to determine root cause. Matches against known patterns and uses LLM analysis for unknown issues.",
|
|
506
|
+
"input_schema": {"type": "object", "properties": {"failure_id": {"type": "string", "description": "ID of a logged failure (from failure_log table)"}, "error_message": {"type": "string", "description": "Error message to analyze (alternative to failure_id)"}, "log_data": {"type": "string", "description": "Raw log data for context"}}},
|
|
507
|
+
},
|
|
508
|
+
"self_heal": {
|
|
509
|
+
"category": "knowledge",
|
|
510
|
+
"module": "icdev.tools.mcp.knowledge_server",
|
|
511
|
+
"handler": "handle_self_heal",
|
|
512
|
+
"description": "Trigger self-healing for a detected issue. Checks confidence threshold (>=0.7 for auto, 0.3-0.7 for suggestion, <0.3 for escalation) and rate limits (max 5/hour).",
|
|
513
|
+
"input_schema": {"type": "object", "properties": {"pattern_id": {"type": "integer", "description": "ID of the knowledge pattern to apply"}, "project_id": {"type": "string", "description": "UUID of the affected project"}, "context": {"type": "object", "description": "Additional context about the failure"}}, "required": ["pattern_id"]},
|
|
514
|
+
},
|
|
515
|
+
# ============================================================
|
|
516
|
+
# MAINTENANCE (4 tools)
|
|
517
|
+
# ============================================================
|
|
518
|
+
"scan_dependencies": {
|
|
519
|
+
"category": "maintenance",
|
|
520
|
+
"module": "icdev.tools.mcp.maintenance_server",
|
|
521
|
+
"handler": "handle_scan_dependencies",
|
|
522
|
+
"description": "Inventory all project dependencies across detected languages (Python, Node.js, Rust, Go, Java, .NET). Reports current version, latest version, and days stale. Use --offline for air-gapped environments where registry access is unavailable.",
|
|
523
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string", "description": "UUID of the project to scan"}, "language": {"type": "string", "description": "Specific language to scan (optional, auto-detects all if omitted)", "enum": ["python", "nodejs", "rust", "go", "java", "dotnet"]}, "offline": {"type": "boolean", "description": "Run in offline/air-gapped mode (skip registry checks)", "default": False}}, "required": ["project_id"]},
|
|
524
|
+
},
|
|
525
|
+
"check_vulnerabilities": {
|
|
526
|
+
"category": "maintenance",
|
|
527
|
+
"module": "icdev.tools.mcp.maintenance_server",
|
|
528
|
+
"handler": "handle_check_vulnerabilities",
|
|
529
|
+
"description": "Check project dependencies against advisory databases (NVD, GitHub Advisories, pip-audit, npm audit, cargo-audit). Maps findings to SLA deadlines: critical=48hr, high=7d, medium=30d, low=90d.",
|
|
530
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string", "description": "UUID of the project to check"}}, "required": ["project_id"]},
|
|
531
|
+
},
|
|
532
|
+
"run_maintenance_audit": {
|
|
533
|
+
"category": "maintenance",
|
|
534
|
+
"module": "icdev.tools.mcp.maintenance_server",
|
|
535
|
+
"handler": "handle_run_maintenance_audit",
|
|
536
|
+
"description": "Run a full maintenance audit: dependency inventory, vulnerability check, maintenance score computation (0-100), SLA compliance tracking, trend analysis, and CUI-marked report generation. Gate: score >= 50 required for deployment.",
|
|
537
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string", "description": "UUID of the project to audit"}, "offline": {"type": "boolean", "description": "Run in offline/air-gapped mode (skip registry checks)", "default": False}}, "required": ["project_id"]},
|
|
538
|
+
},
|
|
539
|
+
"remediate": {
|
|
540
|
+
"category": "maintenance",
|
|
541
|
+
"module": "icdev.tools.mcp.maintenance_server",
|
|
542
|
+
"handler": "handle_remediate",
|
|
543
|
+
"description": "Auto-implement dependency fixes: update dependency files, create remediation branches, run tests to verify fixes. Medium/low severity auto-fixed; critical/high require manual approval. Use --dry-run to preview changes.",
|
|
544
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string", "description": "UUID of the project to remediate"}, "vulnerability_id": {"type": "integer", "description": "Specific vulnerability ID to remediate (optional, remediates all eligible if omitted)"}, "auto": {"type": "boolean", "description": "Enable auto-remediation for medium/low severity vulnerabilities", "default": False}, "dry_run": {"type": "boolean", "description": "Preview remediation actions without applying changes", "default": False}}, "required": ["project_id"]},
|
|
545
|
+
},
|
|
546
|
+
# ============================================================
|
|
547
|
+
# MBSE (10 tools)
|
|
548
|
+
# ============================================================
|
|
549
|
+
"import_xmi": {
|
|
550
|
+
"category": "mbse",
|
|
551
|
+
"module": "icdev.tools.mcp.mbse_server",
|
|
552
|
+
"handler": "handle_import_xmi",
|
|
553
|
+
"description": "Import a Cameo SysML v1.6 XMI model file into the ICDEV database",
|
|
554
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string", "description": "ICDEV project ID"}, "file_path": {"type": "string", "description": "Path to the XMI file exported from Cameo"}}, "required": ["project_id", "file_path"]},
|
|
555
|
+
},
|
|
556
|
+
"import_reqif": {
|
|
557
|
+
"category": "mbse",
|
|
558
|
+
"module": "icdev.tools.mcp.mbse_server",
|
|
559
|
+
"handler": "handle_import_reqif",
|
|
560
|
+
"description": "Import a DOORS NG ReqIF 1.2 requirements file into the ICDEV database",
|
|
561
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string", "description": "ICDEV project ID"}, "file_path": {"type": "string", "description": "Path to the ReqIF file exported from DOORS NG"}}, "required": ["project_id", "file_path"]},
|
|
562
|
+
},
|
|
563
|
+
"trace_forward": {
|
|
564
|
+
"category": "mbse",
|
|
565
|
+
"module": "icdev.tools.mcp.mbse_server",
|
|
566
|
+
"handler": "handle_trace_forward",
|
|
567
|
+
"description": "Trace forward through the digital thread from a source element (requirement → model → code → test → control)",
|
|
568
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string", "description": "ICDEV project ID"}, "source_type": {"type": "string", "enum": ["doors_requirement", "sysml_element", "code_module", "test_file", "nist_control"]}, "source_id": {"type": "string", "description": "ID of the source element"}}, "required": ["project_id", "source_type", "source_id"]},
|
|
569
|
+
},
|
|
570
|
+
"trace_backward": {
|
|
571
|
+
"category": "mbse",
|
|
572
|
+
"module": "icdev.tools.mcp.mbse_server",
|
|
573
|
+
"handler": "handle_trace_backward",
|
|
574
|
+
"description": "Trace backward through the digital thread from a target element (control → test → code → model → requirement)",
|
|
575
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string", "description": "ICDEV project ID"}, "target_type": {"type": "string", "enum": ["doors_requirement", "sysml_element", "code_module", "test_file", "nist_control"]}, "target_id": {"type": "string", "description": "ID of the target element"}}, "required": ["project_id", "target_type", "target_id"]},
|
|
576
|
+
},
|
|
577
|
+
"mbse_generate_code": {
|
|
578
|
+
"category": "mbse",
|
|
579
|
+
"module": "icdev.tools.mcp.mbse_server",
|
|
580
|
+
"handler": "handle_generate_code",
|
|
581
|
+
"description": "Generate code scaffolding from SysML model elements (blocks → classes, activities → functions)",
|
|
582
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string", "description": "ICDEV project ID"}, "language": {"type": "string", "default": "python", "enum": ["python", "java", "go", "rust", "csharp", "typescript"]}, "output_dir": {"type": "string", "description": "Output directory for generated code"}}, "required": ["project_id", "output_dir"]},
|
|
583
|
+
},
|
|
584
|
+
"detect_drift": {
|
|
585
|
+
"category": "mbse",
|
|
586
|
+
"module": "icdev.tools.mcp.mbse_server",
|
|
587
|
+
"handler": "handle_detect_drift",
|
|
588
|
+
"description": "Check synchronization status between SysML model and generated code files",
|
|
589
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string", "description": "ICDEV project ID"}}, "required": ["project_id"]},
|
|
590
|
+
},
|
|
591
|
+
"sync_model": {
|
|
592
|
+
"category": "mbse",
|
|
593
|
+
"module": "icdev.tools.mcp.mbse_server",
|
|
594
|
+
"handler": "handle_sync_model",
|
|
595
|
+
"description": "Trigger model-code synchronization in either direction",
|
|
596
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string", "description": "ICDEV project ID"}, "direction": {"type": "string", "default": "model_to_code", "enum": ["model_to_code", "code_to_model"]}, "language": {"type": "string", "default": "python"}, "output_path": {"type": "string", "description": "Output XMI path (for code_to_model)"}}, "required": ["project_id"]},
|
|
597
|
+
},
|
|
598
|
+
"des_assess": {
|
|
599
|
+
"category": "mbse",
|
|
600
|
+
"module": "icdev.tools.mcp.mbse_server",
|
|
601
|
+
"handler": "handle_des_assess",
|
|
602
|
+
"description": "Run DoDI 5000.87 Digital Engineering Strategy compliance assessment",
|
|
603
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string", "description": "ICDEV project ID"}, "project_dir": {"type": "string", "description": "Project directory path"}}, "required": ["project_id", "project_dir"]},
|
|
604
|
+
},
|
|
605
|
+
"thread_coverage": {
|
|
606
|
+
"category": "mbse",
|
|
607
|
+
"module": "icdev.tools.mcp.mbse_server",
|
|
608
|
+
"handler": "handle_thread_coverage",
|
|
609
|
+
"description": "Compute digital thread coverage metrics (requirements → model → code → test → control)",
|
|
610
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string", "description": "ICDEV project ID"}}, "required": ["project_id"]},
|
|
611
|
+
},
|
|
612
|
+
"model_snapshot": {
|
|
613
|
+
"category": "mbse",
|
|
614
|
+
"module": "icdev.tools.mcp.mbse_server",
|
|
615
|
+
"handler": "handle_model_snapshot",
|
|
616
|
+
"description": "Create a PI-cadenced model snapshot for SAFe traceability",
|
|
617
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string", "description": "ICDEV project ID"}, "pi_number": {"type": "string", "description": "PI identifier (e.g., PI-25.1)"}, "snapshot_type": {"type": "string", "default": "manual", "enum": ["pi_start", "pi_end", "baseline", "milestone", "manual"]}, "notes": {"type": "string", "description": "Optional notes for this snapshot"}}, "required": ["project_id"]},
|
|
618
|
+
},
|
|
619
|
+
# ============================================================
|
|
620
|
+
# MODERNIZATION (10 tools)
|
|
621
|
+
# ============================================================
|
|
622
|
+
"register_legacy_app": {
|
|
623
|
+
"category": "modernization",
|
|
624
|
+
"module": "icdev.tools.mcp.modernization_server",
|
|
625
|
+
"handler": "handle_register_legacy_app",
|
|
626
|
+
"description": "Register a legacy application for modernization analysis",
|
|
627
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string", "description": "ICDEV project ID"}, "name": {"type": "string", "description": "Application name"}, "source_path": {"type": "string", "description": "Path to legacy source code"}, "description": {"type": "string", "description": "Application description"}}, "required": ["project_id", "name", "source_path"]},
|
|
628
|
+
},
|
|
629
|
+
"analyze_legacy": {
|
|
630
|
+
"category": "modernization",
|
|
631
|
+
"module": "icdev.tools.mcp.modernization_server",
|
|
632
|
+
"handler": "handle_analyze_legacy",
|
|
633
|
+
"description": "Run full legacy code analysis — AST parsing, dependency extraction, framework detection, API discovery, complexity metrics",
|
|
634
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string", "description": "ICDEV project ID"}, "app_id": {"type": "string", "description": "Legacy application ID"}}, "required": ["project_id", "app_id"]},
|
|
635
|
+
},
|
|
636
|
+
"extract_architecture": {
|
|
637
|
+
"category": "modernization",
|
|
638
|
+
"module": "icdev.tools.mcp.modernization_server",
|
|
639
|
+
"handler": "handle_extract_architecture",
|
|
640
|
+
"description": "Reverse-engineer architecture from analyzed legacy code — call graph, component diagram, data flow, service boundaries",
|
|
641
|
+
"input_schema": {"type": "object", "properties": {"app_id": {"type": "string", "description": "Legacy application ID"}}, "required": ["app_id"]},
|
|
642
|
+
},
|
|
643
|
+
"generate_docs": {
|
|
644
|
+
"category": "modernization",
|
|
645
|
+
"module": "icdev.tools.mcp.modernization_server",
|
|
646
|
+
"handler": "handle_generate_docs",
|
|
647
|
+
"description": "Generate documentation from legacy code analysis — API docs, data dictionary, component docs, dependency map",
|
|
648
|
+
"input_schema": {"type": "object", "properties": {"app_id": {"type": "string", "description": "Legacy application ID"}, "output_dir": {"type": "string", "description": "Output directory for generated documentation"}}, "required": ["app_id", "output_dir"]},
|
|
649
|
+
},
|
|
650
|
+
"assess_seven_r": {
|
|
651
|
+
"category": "modernization",
|
|
652
|
+
"module": "icdev.tools.mcp.modernization_server",
|
|
653
|
+
"handler": "handle_assess_seven_r",
|
|
654
|
+
"description": "Run 7R migration strategy assessment — scores all 7 Rs (Rehost, Replatform, Refactor, Re-architect, Repurchase, Retire, Retain) with weighted decision matrix",
|
|
655
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string", "description": "ICDEV project ID"}, "app_id": {"type": "string", "description": "Legacy application ID"}, "weights_path": {"type": "string", "description": "Optional path to custom scoring weights JSON"}}, "required": ["project_id", "app_id"]},
|
|
656
|
+
},
|
|
657
|
+
"create_migration_plan": {
|
|
658
|
+
"category": "modernization",
|
|
659
|
+
"module": "icdev.tools.mcp.modernization_server",
|
|
660
|
+
"handler": "handle_create_migration_plan",
|
|
661
|
+
"description": "Create a migration plan with decomposition tasks, timeline, and effort estimates",
|
|
662
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string", "description": "ICDEV project ID"}, "app_id": {"type": "string", "description": "Legacy application ID"}, "strategy": {"type": "string", "enum": ["rehost", "replatform", "refactor", "rearchitect", "repurchase", "retire", "retain"]}, "target_language": {"type": "string", "description": "Target programming language"}, "target_framework": {"type": "string", "description": "Target framework"}, "target_database": {"type": "string", "description": "Target database"}, "target_architecture": {"type": "string", "default": "microservices", "enum": ["microservices", "modular_monolith", "serverless", "event_driven", "layered", "hexagonal"]}, "migration_approach": {"type": "string", "default": "strangler_fig", "enum": ["big_bang", "strangler_fig", "parallel_run", "blue_green", "canary", "phased"]}}, "required": ["project_id", "app_id", "strategy"]},
|
|
663
|
+
},
|
|
664
|
+
"track_migration": {
|
|
665
|
+
"category": "modernization",
|
|
666
|
+
"module": "icdev.tools.mcp.modernization_server",
|
|
667
|
+
"handler": "handle_track_migration",
|
|
668
|
+
"description": "Track migration progress — PI snapshots, velocity, burndown, dashboard",
|
|
669
|
+
"input_schema": {"type": "object", "properties": {"plan_id": {"type": "string", "description": "Migration plan ID"}, "action": {"type": "string", "default": "dashboard", "enum": ["snapshot", "velocity", "burndown", "dashboard"]}, "pi_number": {"type": "string", "description": "PI identifier (e.g., PI-25.3) \u2014 required for snapshot"}, "snapshot_type": {"type": "string", "default": "manual", "enum": ["pi_start", "pi_end", "milestone", "manual"]}}, "required": ["plan_id"]},
|
|
670
|
+
},
|
|
671
|
+
"generate_migration_code": {
|
|
672
|
+
"category": "modernization",
|
|
673
|
+
"module": "icdev.tools.mcp.modernization_server",
|
|
674
|
+
"handler": "handle_generate_migration_code",
|
|
675
|
+
"description": "Generate migration code — adapters, facades, service scaffolding, data access layers, tests, rollback scripts",
|
|
676
|
+
"input_schema": {"type": "object", "properties": {"plan_id": {"type": "string", "description": "Migration plan ID"}, "output_dir": {"type": "string", "description": "Output directory for generated code"}}, "required": ["plan_id", "output_dir"]},
|
|
677
|
+
},
|
|
678
|
+
"check_compliance_bridge": {
|
|
679
|
+
"category": "modernization",
|
|
680
|
+
"module": "icdev.tools.mcp.modernization_server",
|
|
681
|
+
"handler": "handle_check_compliance_bridge",
|
|
682
|
+
"description": "Validate ATO compliance coverage during migration — control inheritance, gap analysis, coverage validation",
|
|
683
|
+
"input_schema": {"type": "object", "properties": {"plan_id": {"type": "string", "description": "Migration plan ID"}, "action": {"type": "string", "default": "validate", "enum": ["validate", "gaps", "dashboard", "report"]}, "output_dir": {"type": "string", "description": "Output directory for reports"}}, "required": ["plan_id"]},
|
|
684
|
+
},
|
|
685
|
+
"migrate_version": {
|
|
686
|
+
"category": "modernization",
|
|
687
|
+
"module": "icdev.tools.mcp.modernization_server",
|
|
688
|
+
"handler": "handle_migrate_version",
|
|
689
|
+
"description": "Run version or framework migration transforms — Python 2→3, Java 8→17, .NET Framework→.NET 8, Struts→Spring, WCF→ASP.NET Core, etc.",
|
|
690
|
+
"input_schema": {"type": "object", "properties": {"source_path": {"type": "string", "description": "Source code directory"}, "output_path": {"type": "string", "description": "Output directory for transformed code"}, "migration_type": {"type": "string", "default": "version", "enum": ["version", "framework"]}, "language": {"type": "string", "description": "Language (for version migration)", "enum": ["python", "java", "csharp"]}, "from_version": {"type": "string", "description": "Source version (e.g., 2.7, 8, 4.8)"}, "to_version": {"type": "string", "description": "Target version (e.g., 3.11, 17, 8.0)"}, "from_framework": {"type": "string", "description": "Source framework (for framework migration)"}, "to_framework": {"type": "string", "description": "Target framework (for framework migration)"}}, "required": ["source_path", "output_path"]},
|
|
691
|
+
},
|
|
692
|
+
# ============================================================
|
|
693
|
+
# REQUIREMENTS (10 tools)
|
|
694
|
+
# ============================================================
|
|
695
|
+
"create_intake_session": {
|
|
696
|
+
"category": "requirements",
|
|
697
|
+
"module": "icdev.tools.mcp.requirements_server",
|
|
698
|
+
"handler": "handle_create_intake_session",
|
|
699
|
+
"description": "Create a new AI-driven requirements intake session for a project",
|
|
700
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string", "description": "ICDEV project ID"}, "customer_name": {"type": "string", "description": "Customer/stakeholder name"}, "customer_org": {"type": "string", "description": "Customer organization"}, "impact_level": {"type": "string", "default": "IL4", "enum": ["IL2", "IL4", "IL5", "IL6"], "description": "DoD Impact Level"}, "classification": {"type": "string", "default": "CUI", "description": "Classification marking"}}, "required": ["project_id", "customer_name"]},
|
|
701
|
+
},
|
|
702
|
+
"resume_intake_session": {
|
|
703
|
+
"category": "requirements",
|
|
704
|
+
"module": "icdev.tools.mcp.requirements_server",
|
|
705
|
+
"handler": "handle_resume_intake_session",
|
|
706
|
+
"description": "Resume an existing requirements intake session",
|
|
707
|
+
"input_schema": {"type": "object", "properties": {"session_id": {"type": "string", "description": "Intake session ID to resume"}}, "required": ["session_id"]},
|
|
708
|
+
},
|
|
709
|
+
"get_session_status": {
|
|
710
|
+
"category": "requirements",
|
|
711
|
+
"module": "icdev.tools.mcp.requirements_server",
|
|
712
|
+
"handler": "handle_get_session_status",
|
|
713
|
+
"description": "Get details and current status of an intake session",
|
|
714
|
+
"input_schema": {"type": "object", "properties": {"session_id": {"type": "string", "description": "Intake session ID"}}, "required": ["session_id"]},
|
|
715
|
+
},
|
|
716
|
+
"process_intake_turn": {
|
|
717
|
+
"category": "requirements",
|
|
718
|
+
"module": "icdev.tools.mcp.requirements_server",
|
|
719
|
+
"handler": "handle_process_intake_turn",
|
|
720
|
+
"description": "Process a conversation turn in the AI-driven requirements intake session",
|
|
721
|
+
"input_schema": {"type": "object", "properties": {"session_id": {"type": "string", "description": "Intake session ID"}, "message": {"type": "string", "description": "User message or response to intake question"}}, "required": ["session_id", "message"]},
|
|
722
|
+
},
|
|
723
|
+
"upload_document": {
|
|
724
|
+
"category": "requirements",
|
|
725
|
+
"module": "icdev.tools.mcp.requirements_server",
|
|
726
|
+
"handler": "handle_upload_document",
|
|
727
|
+
"description": "Upload a document (SOW, CDD, ConOps, SRD, SRS) for requirement extraction",
|
|
728
|
+
"input_schema": {"type": "object", "properties": {"session_id": {"type": "string", "description": "Intake session ID"}, "file_path": {"type": "string", "description": "Path to the document file"}, "document_type": {"type": "string", "default": "other", "enum": ["sow", "cdd", "conops", "srd", "srs", "other"], "description": "Type of document being uploaded"}}, "required": ["session_id", "file_path"]},
|
|
729
|
+
},
|
|
730
|
+
"extract_document": {
|
|
731
|
+
"category": "requirements",
|
|
732
|
+
"module": "icdev.tools.mcp.requirements_server",
|
|
733
|
+
"handler": "handle_extract_document",
|
|
734
|
+
"description": "Extract requirements from a previously uploaded document",
|
|
735
|
+
"input_schema": {"type": "object", "properties": {"document_id": {"type": "string", "description": "Document ID returned from upload_document"}}, "required": ["document_id"]},
|
|
736
|
+
},
|
|
737
|
+
"detect_gaps": {
|
|
738
|
+
"category": "requirements",
|
|
739
|
+
"module": "icdev.tools.mcp.requirements_server",
|
|
740
|
+
"handler": "handle_detect_gaps",
|
|
741
|
+
"description": "Detect gaps, ambiguities, and missing requirements in the intake session",
|
|
742
|
+
"input_schema": {"type": "object", "properties": {"session_id": {"type": "string", "description": "Intake session ID"}, "check_security": {"type": "boolean", "default": True, "description": "Check for missing security requirements"}, "check_compliance": {"type": "boolean", "default": True, "description": "Check for missing compliance requirements"}, "check_testability": {"type": "boolean", "default": True, "description": "Check requirement testability"}, "check_interfaces": {"type": "boolean", "default": False, "description": "Check for missing interface definitions"}, "check_data": {"type": "boolean", "default": False, "description": "Check for missing data requirements"}}, "required": ["session_id"]},
|
|
743
|
+
},
|
|
744
|
+
"score_readiness": {
|
|
745
|
+
"category": "requirements",
|
|
746
|
+
"module": "icdev.tools.mcp.requirements_server",
|
|
747
|
+
"handler": "handle_score_readiness",
|
|
748
|
+
"description": "Score requirement readiness to determine if requirements are complete enough for decomposition",
|
|
749
|
+
"input_schema": {"type": "object", "properties": {"session_id": {"type": "string", "description": "Intake session ID"}, "threshold": {"type": "number", "default": 0.7, "description": "Minimum readiness score (0.0-1.0) to pass"}}, "required": ["session_id"]},
|
|
750
|
+
},
|
|
751
|
+
"decompose_requirements": {
|
|
752
|
+
"category": "requirements",
|
|
753
|
+
"module": "icdev.tools.mcp.requirements_server",
|
|
754
|
+
"handler": "handle_decompose_requirements",
|
|
755
|
+
"description": "Decompose requirements into SAFe hierarchy (Epic > Capability > Feature > Story)",
|
|
756
|
+
"input_schema": {"type": "object", "properties": {"session_id": {"type": "string", "description": "Intake session ID"}, "target_level": {"type": "string", "default": "story", "enum": ["epic", "capability", "feature", "story"], "description": "Target decomposition level"}, "generate_bdd": {"type": "boolean", "default": False, "description": "Generate BDD acceptance criteria for stories"}, "estimate": {"type": "boolean", "default": True, "description": "Generate story point estimates"}}, "required": ["session_id"]},
|
|
757
|
+
},
|
|
758
|
+
"generate_bdd": {
|
|
759
|
+
"category": "requirements",
|
|
760
|
+
"module": "icdev.tools.mcp.requirements_server",
|
|
761
|
+
"handler": "handle_generate_bdd",
|
|
762
|
+
"description": "Generate BDD (Gherkin) acceptance criteria for all requirements in the session",
|
|
763
|
+
"input_schema": {"type": "object", "properties": {"session_id": {"type": "string", "description": "Intake session ID"}}, "required": ["session_id"]},
|
|
764
|
+
},
|
|
765
|
+
# ============================================================
|
|
766
|
+
# SUPPLY_CHAIN (9 tools)
|
|
767
|
+
# ============================================================
|
|
768
|
+
"register_ato_system": {
|
|
769
|
+
"category": "supply_chain",
|
|
770
|
+
"module": "icdev.tools.mcp.supply_chain_server",
|
|
771
|
+
"handler": "handle_register_ato_system",
|
|
772
|
+
"description": "Register an existing ATO boundary system for boundary impact analysis",
|
|
773
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string", "description": "ICDEV project ID"}, "system_name": {"type": "string", "description": "Name of the ATO system boundary"}, "ato_status": {"type": "string", "default": "active", "enum": ["active", "conditional", "expired", "pending"], "description": "Current ATO status"}, "boundary_definition": {"type": "string", "description": "JSON string defining the boundary (components, networks, data flows)"}, "baseline_controls": {"type": "string", "description": "JSON string of baseline NIST 800-53 controls implemented"}, "classification": {"type": "string", "default": "CUI", "description": "Classification marking"}, "impact_level": {"type": "string", "default": "IL4", "enum": ["IL2", "IL4", "IL5", "IL6"], "description": "DoD Impact Level"}}, "required": ["project_id", "system_name"]},
|
|
774
|
+
},
|
|
775
|
+
"assess_boundary_impact": {
|
|
776
|
+
"category": "supply_chain",
|
|
777
|
+
"module": "icdev.tools.mcp.supply_chain_server",
|
|
778
|
+
"handler": "handle_assess_boundary_impact",
|
|
779
|
+
"description": "Assess a requirement's impact on an ATO boundary — returns GREEN/YELLOW/ORANGE/RED tier classification",
|
|
780
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string", "description": "ICDEV project ID"}, "system_id": {"type": "string", "description": "ATO system boundary ID"}, "requirement_id": {"type": "string", "description": "Requirement ID to assess"}}, "required": ["project_id", "system_id", "requirement_id"]},
|
|
781
|
+
},
|
|
782
|
+
"generate_red_alternative": {
|
|
783
|
+
"category": "supply_chain",
|
|
784
|
+
"module": "icdev.tools.mcp.supply_chain_server",
|
|
785
|
+
"handler": "handle_generate_red_alternative",
|
|
786
|
+
"description": "Generate alternative COAs (Courses of Action) for RED-tier requirements that would invalidate ATO",
|
|
787
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string", "description": "ICDEV project ID"}, "assessment_id": {"type": "string", "description": "Boundary impact assessment ID (from assess_boundary_impact)"}}, "required": ["project_id", "assessment_id"]},
|
|
788
|
+
},
|
|
789
|
+
"add_vendor": {
|
|
790
|
+
"category": "supply_chain",
|
|
791
|
+
"module": "icdev.tools.mcp.supply_chain_server",
|
|
792
|
+
"handler": "handle_add_vendor",
|
|
793
|
+
"description": "Register a supply chain vendor with SCRM risk tier and Section 889 compliance status",
|
|
794
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string", "description": "ICDEV project ID"}, "vendor_name": {"type": "string", "description": "Vendor or supplier name"}, "vendor_type": {"type": "string", "default": "software", "enum": ["software", "hardware", "cloud_service", "integrator", "open_source"], "description": "Type of vendor"}, "country_of_origin": {"type": "string", "description": "ISO 3166-1 alpha-2 country code (e.g., US, GB, DE)"}, "scrm_risk_tier": {"type": "string", "default": "medium", "enum": ["low", "medium", "high", "critical"], "description": "Initial SCRM risk tier"}, "section_889_status": {"type": "string", "default": "compliant", "enum": ["compliant", "non_compliant", "under_review", "exempt"], "description": "Section 889 compliance status"}}, "required": ["project_id", "vendor_name", "country_of_origin"]},
|
|
795
|
+
},
|
|
796
|
+
"build_dependency_graph": {
|
|
797
|
+
"category": "supply_chain",
|
|
798
|
+
"module": "icdev.tools.mcp.supply_chain_server",
|
|
799
|
+
"handler": "handle_build_dependency_graph",
|
|
800
|
+
"description": "Build or query the project supply chain dependency graph — vendors, components, and their relationships",
|
|
801
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string", "description": "ICDEV project ID"}}, "required": ["project_id"]},
|
|
802
|
+
},
|
|
803
|
+
"propagate_impact": {
|
|
804
|
+
"category": "supply_chain",
|
|
805
|
+
"module": "icdev.tools.mcp.supply_chain_server",
|
|
806
|
+
"handler": "handle_propagate_impact",
|
|
807
|
+
"description": "Propagate a vulnerability or supply chain event through the dependency graph to determine blast radius",
|
|
808
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string", "description": "ICDEV project ID"}, "component": {"type": "string", "description": "Affected component name"}, "impact_type": {"type": "string", "default": "vulnerability", "enum": ["vulnerability", "supply_disruption", "license_change", "eol_notice", "vendor_breach"], "description": "Type of supply chain impact"}, "severity": {"type": "string", "default": "high", "enum": ["critical", "high", "medium", "low"], "description": "Impact severity"}}, "required": ["project_id", "component"]},
|
|
809
|
+
},
|
|
810
|
+
"manage_isa": {
|
|
811
|
+
"category": "supply_chain",
|
|
812
|
+
"module": "icdev.tools.mcp.supply_chain_server",
|
|
813
|
+
"handler": "handle_manage_isa",
|
|
814
|
+
"description": "ISA/MOU lifecycle management — list, create, check expiring, or find review-due agreements",
|
|
815
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string", "description": "ICDEV project ID"}, "action": {"type": "string", "enum": ["list", "create", "expiring", "review_due"], "description": "ISA management action"}, "source_system": {"type": "string", "description": "Source system name (required for create)"}, "target_system": {"type": "string", "description": "Target system name (required for create)"}, "data_types_shared": {"type": "string", "description": "Comma-separated data types shared between systems"}, "auth_date": {"type": "string", "description": "Authorization date (YYYY-MM-DD)"}, "expiry_date": {"type": "string", "description": "Expiry date (YYYY-MM-DD)"}, "days_ahead": {"type": "number", "default": 90, "description": "Look-ahead days for expiring check"}}, "required": ["project_id", "action"]},
|
|
816
|
+
},
|
|
817
|
+
"assess_scrm": {
|
|
818
|
+
"category": "supply_chain",
|
|
819
|
+
"module": "icdev.tools.mcp.supply_chain_server",
|
|
820
|
+
"handler": "handle_assess_scrm",
|
|
821
|
+
"description": "Run NIST 800-161 Supply Chain Risk Management assessment — per vendor or aggregate project-level",
|
|
822
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string", "description": "ICDEV project ID"}, "vendor_id": {"type": "string", "description": "Vendor ID (required when aggregate is false)"}, "aggregate": {"type": "boolean", "default": False, "description": "If true, assess all vendors for the project"}}, "required": ["project_id"]},
|
|
823
|
+
},
|
|
824
|
+
"triage_cve": {
|
|
825
|
+
"category": "supply_chain",
|
|
826
|
+
"module": "icdev.tools.mcp.supply_chain_server",
|
|
827
|
+
"handler": "handle_triage_cve",
|
|
828
|
+
"description": "Triage a CVE with blast radius analysis through the dependency graph — assigns SLA and escalation timeline",
|
|
829
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string", "description": "ICDEV project ID"}, "cve_id": {"type": "string", "description": "CVE identifier (e.g., CVE-2024-12345)"}, "component": {"type": "string", "description": "Affected component name"}, "cvss_score": {"type": "number", "description": "CVSS v3.1 base score (0.0-10.0)"}, "severity": {"type": "string", "enum": ["critical", "high", "medium", "low"], "description": "CVE severity level"}, "description": {"type": "string", "description": "CVE description for context"}}, "required": ["project_id", "cve_id", "component", "severity"]},
|
|
830
|
+
},
|
|
831
|
+
# ============================================================
|
|
832
|
+
# SIMULATION (8 tools)
|
|
833
|
+
# ============================================================
|
|
834
|
+
"create_scenario": {
|
|
835
|
+
"category": "simulation",
|
|
836
|
+
"module": "icdev.tools.mcp.simulation_server",
|
|
837
|
+
"handler": "handle_create_scenario",
|
|
838
|
+
"description": "Create a what-if scenario for Digital Program Twin simulation",
|
|
839
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string", "description": "ICDEV project ID"}, "scenario_name": {"type": "string", "description": "Human-readable scenario name"}, "scenario_type": {"type": "string", "default": "what_if", "enum": ["what_if", "coa_comparison", "risk_analysis"], "description": "Type of scenario"}, "modifications": {"type": "string", "description": "JSON string describing modifications (add/remove requirements, architecture changes)"}, "base_session_id": {"type": "string", "description": "RICOAS session ID to use as baseline (optional)"}}, "required": ["project_id", "scenario_name"]},
|
|
840
|
+
},
|
|
841
|
+
"run_simulation": {
|
|
842
|
+
"category": "simulation",
|
|
843
|
+
"module": "icdev.tools.mcp.simulation_server",
|
|
844
|
+
"handler": "handle_run_simulation",
|
|
845
|
+
"description": "Run 6-dimension simulation (architecture, compliance, supply chain, schedule, cost, risk)",
|
|
846
|
+
"input_schema": {"type": "object", "properties": {"scenario_id": {"type": "string", "description": "Scenario ID to simulate"}, "dimensions": {"type": "string", "default": "all", "description": "Comma-separated dimensions or 'all' (architecture,compliance,supply_chain,schedule,cost,risk)"}}, "required": ["scenario_id"]},
|
|
847
|
+
},
|
|
848
|
+
"run_monte_carlo": {
|
|
849
|
+
"category": "simulation",
|
|
850
|
+
"module": "icdev.tools.mcp.simulation_server",
|
|
851
|
+
"handler": "handle_run_monte_carlo",
|
|
852
|
+
"description": "Run Monte Carlo estimation for schedule, cost, or risk with PERT distributions",
|
|
853
|
+
"input_schema": {"type": "object", "properties": {"scenario_id": {"type": "string", "description": "Scenario ID to estimate"}, "dimension": {"type": "string", "enum": ["schedule", "cost", "risk"], "description": "Dimension to estimate"}, "iterations": {"type": "integer", "default": 10000, "description": "Number of Monte Carlo iterations (recommend >= 1000)"}, "confidence_levels": {"type": "string", "default": "0.10,0.50,0.80,0.90", "description": "Comma-separated confidence levels (e.g. P10, P50, P80, P90)"}}, "required": ["scenario_id", "dimension"]},
|
|
854
|
+
},
|
|
855
|
+
"generate_coas": {
|
|
856
|
+
"category": "simulation",
|
|
857
|
+
"module": "icdev.tools.mcp.simulation_server",
|
|
858
|
+
"handler": "handle_generate_coas",
|
|
859
|
+
"description": "Generate 3 Courses of Action (Speed/Balanced/Comprehensive) for a RICOAS session",
|
|
860
|
+
"input_schema": {"type": "object", "properties": {"session_id": {"type": "string", "description": "RICOAS session ID"}, "project_id": {"type": "string", "description": "ICDEV project ID (optional)"}, "simulate": {"type": "boolean", "default": False, "description": "Run 6-dimension simulation on each COA"}}, "required": ["session_id"]},
|
|
861
|
+
},
|
|
862
|
+
"generate_alternative_coa": {
|
|
863
|
+
"category": "simulation",
|
|
864
|
+
"module": "icdev.tools.mcp.simulation_server",
|
|
865
|
+
"handler": "handle_generate_alternative_coa",
|
|
866
|
+
"description": "Generate an alternative COA for a RED-tier requirement that stays within ATO boundary",
|
|
867
|
+
"input_schema": {"type": "object", "properties": {"session_id": {"type": "string", "description": "RICOAS session ID"}, "requirement_id": {"type": "string", "description": "ID of the RED requirement"}, "project_id": {"type": "string", "description": "ICDEV project ID (optional)"}}, "required": ["session_id", "requirement_id"]},
|
|
868
|
+
},
|
|
869
|
+
"compare_coas": {
|
|
870
|
+
"category": "simulation",
|
|
871
|
+
"module": "icdev.tools.mcp.simulation_server",
|
|
872
|
+
"handler": "handle_compare_coas",
|
|
873
|
+
"description": "Compare all COAs in a session across 6 simulation dimensions side-by-side",
|
|
874
|
+
"input_schema": {"type": "object", "properties": {"session_id": {"type": "string", "description": "RICOAS session ID"}}, "required": ["session_id"]},
|
|
875
|
+
},
|
|
876
|
+
"select_coa": {
|
|
877
|
+
"category": "simulation",
|
|
878
|
+
"module": "icdev.tools.mcp.simulation_server",
|
|
879
|
+
"handler": "handle_select_coa",
|
|
880
|
+
"description": "Select a COA and record the decision with rationale for audit trail",
|
|
881
|
+
"input_schema": {"type": "object", "properties": {"coa_id": {"type": "string", "description": "ID of the selected COA"}, "selected_by": {"type": "string", "description": "Who selected this COA (name or role)"}, "rationale": {"type": "string", "description": "Rationale for selecting this COA"}}, "required": ["coa_id", "selected_by", "rationale"]},
|
|
882
|
+
},
|
|
883
|
+
"manage_scenarios": {
|
|
884
|
+
"category": "simulation",
|
|
885
|
+
"module": "icdev.tools.mcp.simulation_server",
|
|
886
|
+
"handler": "handle_manage_scenarios",
|
|
887
|
+
"description": "List, fork, archive, export, or summarize simulation scenarios",
|
|
888
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string", "description": "ICDEV project ID (for list action)"}, "scenario_id": {"type": "string", "description": "Scenario ID (for fork/archive/export/summary)"}, "action": {"type": "string", "enum": ["list", "fork", "archive", "export", "summary"], "description": "Action to perform"}, "new_name": {"type": "string", "description": "New scenario name (for fork action)"}, "output_path": {"type": "string", "description": "Output file path (for export action)"}}, "required": ["action"]},
|
|
889
|
+
},
|
|
890
|
+
# ============================================================
|
|
891
|
+
# INTEGRATION (10 tools)
|
|
892
|
+
# ============================================================
|
|
893
|
+
"configure_jira": {
|
|
894
|
+
"category": "integration",
|
|
895
|
+
"module": "icdev.tools.mcp.integration_server",
|
|
896
|
+
"handler": "handle_configure_jira",
|
|
897
|
+
"description": "Configure Jira integration for bidirectional requirement sync",
|
|
898
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string", "description": "ICDEV project ID"}, "instance_url": {"type": "string", "description": "Jira instance URL (e.g., https://org.atlassian.net)"}, "project_key": {"type": "string", "description": "Jira project key (e.g., PROJ)"}, "auth_secret_ref": {"type": "string", "description": "AWS Secrets Manager reference for Jira credentials"}}, "required": ["project_id", "instance_url", "project_key", "auth_secret_ref"]},
|
|
899
|
+
},
|
|
900
|
+
"sync_jira": {
|
|
901
|
+
"category": "integration",
|
|
902
|
+
"module": "icdev.tools.mcp.integration_server",
|
|
903
|
+
"handler": "handle_sync_jira",
|
|
904
|
+
"description": "Push decomposed SAFe items to Jira or pull status updates from Jira",
|
|
905
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string", "description": "ICDEV project ID"}, "direction": {"type": "string", "default": "push", "enum": ["push", "pull"], "description": "Sync direction: push to Jira or pull from Jira"}, "session_id": {"type": "string", "description": "RICOAS session ID to scope the sync"}, "dry_run": {"type": "boolean", "default": False, "description": "Preview changes without applying"}}, "required": ["project_id"]},
|
|
906
|
+
},
|
|
907
|
+
"configure_servicenow": {
|
|
908
|
+
"category": "integration",
|
|
909
|
+
"module": "icdev.tools.mcp.integration_server",
|
|
910
|
+
"handler": "handle_configure_servicenow",
|
|
911
|
+
"description": "Configure ServiceNow integration for bidirectional requirement sync",
|
|
912
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string", "description": "ICDEV project ID"}, "instance_url": {"type": "string", "description": "ServiceNow instance URL (e.g., https://org.service-now.com)"}, "table_name": {"type": "string", "default": "rm_story", "description": "ServiceNow table name for requirements"}, "auth_secret_ref": {"type": "string", "description": "AWS Secrets Manager reference for ServiceNow credentials"}}, "required": ["project_id", "instance_url", "auth_secret_ref"]},
|
|
913
|
+
},
|
|
914
|
+
"sync_servicenow": {
|
|
915
|
+
"category": "integration",
|
|
916
|
+
"module": "icdev.tools.mcp.integration_server",
|
|
917
|
+
"handler": "handle_sync_servicenow",
|
|
918
|
+
"description": "Push decomposed SAFe items to ServiceNow or pull status updates from ServiceNow",
|
|
919
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string", "description": "ICDEV project ID"}, "direction": {"type": "string", "default": "push", "enum": ["push", "pull"], "description": "Sync direction: push to ServiceNow or pull from ServiceNow"}, "session_id": {"type": "string", "description": "RICOAS session ID to scope the sync"}, "dry_run": {"type": "boolean", "default": False, "description": "Preview changes without applying"}}, "required": ["project_id"]},
|
|
920
|
+
},
|
|
921
|
+
"configure_gitlab": {
|
|
922
|
+
"category": "integration",
|
|
923
|
+
"module": "icdev.tools.mcp.integration_server",
|
|
924
|
+
"handler": "handle_configure_gitlab",
|
|
925
|
+
"description": "Configure GitLab integration for bidirectional requirement sync",
|
|
926
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string", "description": "ICDEV project ID"}, "instance_url": {"type": "string", "description": "GitLab instance URL (e.g., https://gitlab.example.com)"}, "gitlab_project_id": {"type": "string", "description": "GitLab project ID (numeric or path)"}, "auth_secret_ref": {"type": "string", "description": "AWS Secrets Manager reference for GitLab credentials"}}, "required": ["project_id", "instance_url", "gitlab_project_id", "auth_secret_ref"]},
|
|
927
|
+
},
|
|
928
|
+
"sync_gitlab": {
|
|
929
|
+
"category": "integration",
|
|
930
|
+
"module": "icdev.tools.mcp.integration_server",
|
|
931
|
+
"handler": "handle_sync_gitlab",
|
|
932
|
+
"description": "Push decomposed SAFe items to GitLab or pull status updates from GitLab",
|
|
933
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string", "description": "ICDEV project ID"}, "direction": {"type": "string", "default": "push", "enum": ["push", "pull"], "description": "Sync direction: push to GitLab or pull from GitLab"}, "session_id": {"type": "string", "description": "RICOAS session ID to scope the sync"}, "dry_run": {"type": "boolean", "default": False, "description": "Preview changes without applying"}}, "required": ["project_id"]},
|
|
934
|
+
},
|
|
935
|
+
"export_reqif": {
|
|
936
|
+
"category": "integration",
|
|
937
|
+
"module": "icdev.tools.mcp.integration_server",
|
|
938
|
+
"handler": "handle_export_reqif",
|
|
939
|
+
"description": "Export requirements as ReqIF 1.2 XML for import into IBM DOORS NG",
|
|
940
|
+
"input_schema": {"type": "object", "properties": {"session_id": {"type": "string", "description": "RICOAS session ID containing requirements to export"}, "output_path": {"type": "string", "description": "File path for the generated ReqIF XML output"}, "include_trace": {"type": "boolean", "default": True, "description": "Include traceability links in the export"}}, "required": ["session_id", "output_path"]},
|
|
941
|
+
},
|
|
942
|
+
"submit_approval": {
|
|
943
|
+
"category": "integration",
|
|
944
|
+
"module": "icdev.tools.mcp.integration_server",
|
|
945
|
+
"handler": "handle_submit_approval",
|
|
946
|
+
"description": "Submit a requirements package, COA selection, boundary acceptance, or deployment gate for approval",
|
|
947
|
+
"input_schema": {"type": "object", "properties": {"session_id": {"type": "string", "description": "RICOAS session ID for the approval subject"}, "approval_type": {"type": "string", "enum": ["requirements_package", "coa_selection", "boundary_acceptance", "deployment_gate"], "description": "Type of approval workflow to initiate"}, "submitted_by": {"type": "string", "description": "Identity of the submitter (e.g., agent name or user ID)"}, "reviewers": {"type": "string", "description": "JSON string array of reviewer identities"}}, "required": ["session_id", "approval_type", "submitted_by"]},
|
|
948
|
+
},
|
|
949
|
+
"review_approval": {
|
|
950
|
+
"category": "integration",
|
|
951
|
+
"module": "icdev.tools.mcp.integration_server",
|
|
952
|
+
"handler": "handle_review_approval",
|
|
953
|
+
"description": "Record a reviewer decision (approved, rejected, conditional) on a pending approval",
|
|
954
|
+
"input_schema": {"type": "object", "properties": {"approval_id": {"type": "string", "description": "ID of the approval to review"}, "reviewer": {"type": "string", "description": "Identity of the reviewer"}, "decision": {"type": "string", "enum": ["approved", "rejected", "conditional"], "description": "Reviewer decision"}, "rationale": {"type": "string", "description": "Explanation for the decision"}}, "required": ["approval_id", "reviewer", "decision", "rationale"]},
|
|
955
|
+
},
|
|
956
|
+
"build_traceability": {
|
|
957
|
+
"category": "integration",
|
|
958
|
+
"module": "icdev.tools.mcp.integration_server",
|
|
959
|
+
"handler": "handle_build_traceability",
|
|
960
|
+
"description": "Build a full Requirements Traceability Matrix linking requirement to SysML to code to test to NIST control",
|
|
961
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string", "description": "ICDEV project ID"}, "session_id": {"type": "string", "description": "Optional RICOAS session ID to scope the RTM"}}, "required": ["project_id"]},
|
|
962
|
+
},
|
|
963
|
+
# ============================================================
|
|
964
|
+
# MARKETPLACE (11 tools)
|
|
965
|
+
# ============================================================
|
|
966
|
+
"publish_asset": {
|
|
967
|
+
"category": "marketplace",
|
|
968
|
+
"module": "icdev.tools.mcp.marketplace_server",
|
|
969
|
+
"handler": "handle_publish_asset",
|
|
970
|
+
"description": "Publish a GOTCHA asset (skill/goal/hardprompt/context/args/compliance) through 7-gate security pipeline",
|
|
971
|
+
"input_schema": {"type": "object", "properties": {"asset_path": {"type": "string", "description": "Path to asset directory"}, "asset_type": {"type": "string", "enum": ["skill", "goal", "hardprompt", "context", "args", "compliance"]}, "tenant_id": {"type": "string", "description": "Publisher tenant ID"}, "publisher_user": {"type": "string", "description": "Publisher identity"}, "publisher_org": {"type": "string", "description": "Publisher organization"}, "target_tier": {"type": "string", "enum": ["tenant_local", "central_vetted"], "default": "tenant_local"}, "asset_id": {"type": "string", "description": "Existing asset ID (for new version)"}, "new_version": {"type": "string", "description": "Version for update"}, "changelog": {"type": "string"}, "signing_key": {"type": "string", "description": "Path to RSA private key"}}, "required": ["asset_path", "asset_type", "tenant_id"]},
|
|
972
|
+
},
|
|
973
|
+
"install_asset": {
|
|
974
|
+
"category": "marketplace",
|
|
975
|
+
"module": "icdev.tools.mcp.marketplace_server",
|
|
976
|
+
"handler": "handle_install_asset",
|
|
977
|
+
"description": "Install a marketplace asset to a tenant/project",
|
|
978
|
+
"input_schema": {"type": "object", "properties": {"asset_id": {"type": "string"}, "version_id": {"type": "string"}, "tenant_id": {"type": "string"}, "project_id": {"type": "string"}, "installed_by": {"type": "string"}, "install_path": {"type": "string"}}, "required": ["asset_id", "tenant_id"]},
|
|
979
|
+
},
|
|
980
|
+
"uninstall_asset": {
|
|
981
|
+
"category": "marketplace",
|
|
982
|
+
"module": "icdev.tools.mcp.marketplace_server",
|
|
983
|
+
"handler": "handle_uninstall_asset",
|
|
984
|
+
"description": "Uninstall a marketplace asset",
|
|
985
|
+
"input_schema": {"type": "object", "properties": {"installation_id": {"type": "string"}, "uninstalled_by": {"type": "string"}}, "required": ["installation_id"]},
|
|
986
|
+
},
|
|
987
|
+
"search_assets": {
|
|
988
|
+
"category": "marketplace",
|
|
989
|
+
"module": "icdev.tools.mcp.marketplace_server",
|
|
990
|
+
"handler": "handle_search_assets",
|
|
991
|
+
"description": "Search marketplace using hybrid keyword + semantic search",
|
|
992
|
+
"input_schema": {"type": "object", "properties": {"query": {"type": "string", "description": "Search query"}, "asset_type": {"type": "string", "enum": ["skill", "goal", "hardprompt", "context", "args", "compliance"]}, "impact_level": {"type": "string", "enum": ["IL2", "IL4", "IL5", "IL6"]}, "catalog_tier": {"type": "string", "enum": ["tenant_local", "central_vetted"]}, "tenant_id": {"type": "string"}, "limit": {"type": "integer", "default": 20}}, "required": ["query"]},
|
|
993
|
+
},
|
|
994
|
+
"list_assets": {
|
|
995
|
+
"category": "marketplace",
|
|
996
|
+
"module": "icdev.tools.mcp.marketplace_server",
|
|
997
|
+
"handler": "handle_list_assets",
|
|
998
|
+
"description": "List marketplace assets with optional filters",
|
|
999
|
+
"input_schema": {"type": "object", "properties": {"asset_type": {"type": "string"}, "tenant_id": {"type": "string"}, "catalog_tier": {"type": "string"}, "status": {"type": "string"}, "impact_level": {"type": "string"}, "limit": {"type": "integer", "default": 50}, "offset": {"type": "integer", "default": 0}}},
|
|
1000
|
+
},
|
|
1001
|
+
"get_asset": {
|
|
1002
|
+
"category": "marketplace",
|
|
1003
|
+
"module": "icdev.tools.mcp.marketplace_server",
|
|
1004
|
+
"handler": "handle_get_asset",
|
|
1005
|
+
"description": "Get full asset details including versions and scan results",
|
|
1006
|
+
"input_schema": {"type": "object", "properties": {"slug": {"type": "string", "description": "Asset slug (publisher/name)"}, "asset_id": {"type": "string"}}},
|
|
1007
|
+
},
|
|
1008
|
+
"review_asset": {
|
|
1009
|
+
"category": "marketplace",
|
|
1010
|
+
"module": "icdev.tools.mcp.marketplace_server",
|
|
1011
|
+
"handler": "handle_review_asset",
|
|
1012
|
+
"description": "Complete review decision (approve/reject/conditional) for cross-tenant sharing",
|
|
1013
|
+
"input_schema": {"type": "object", "properties": {"review_id": {"type": "string"}, "reviewer_id": {"type": "string"}, "decision": {"type": "string", "enum": ["approved", "rejected", "conditional"]}, "rationale": {"type": "string"}, "conditions": {"type": "string"}}, "required": ["review_id", "reviewer_id", "decision", "rationale"]},
|
|
1014
|
+
},
|
|
1015
|
+
"list_pending": {
|
|
1016
|
+
"category": "marketplace",
|
|
1017
|
+
"module": "icdev.tools.mcp.marketplace_server",
|
|
1018
|
+
"handler": "handle_list_pending",
|
|
1019
|
+
"description": "List pending review requests for marketplace assets",
|
|
1020
|
+
"input_schema": {"type": "object", "properties": {"reviewer_id": {"type": "string"}}},
|
|
1021
|
+
},
|
|
1022
|
+
"check_compat": {
|
|
1023
|
+
"category": "marketplace",
|
|
1024
|
+
"module": "icdev.tools.mcp.marketplace_server",
|
|
1025
|
+
"handler": "handle_check_compat",
|
|
1026
|
+
"description": "Check IL, version, and dependency compatibility for an asset",
|
|
1027
|
+
"input_schema": {"type": "object", "properties": {"asset_id": {"type": "string"}, "consumer_il": {"type": "string", "enum": ["IL2", "IL4", "IL5", "IL6"]}, "tenant_id": {"type": "string"}, "platform_version": {"type": "string"}}, "required": ["asset_id"]},
|
|
1028
|
+
},
|
|
1029
|
+
"sync_status": {
|
|
1030
|
+
"category": "marketplace",
|
|
1031
|
+
"module": "icdev.tools.mcp.marketplace_server",
|
|
1032
|
+
"handler": "handle_sync_status",
|
|
1033
|
+
"description": "Get federation sync status across all tenants",
|
|
1034
|
+
"input_schema": {"type": "object", "properties": {}},
|
|
1035
|
+
},
|
|
1036
|
+
"asset_scan": {
|
|
1037
|
+
"category": "marketplace",
|
|
1038
|
+
"module": "icdev.tools.mcp.marketplace_server",
|
|
1039
|
+
"handler": "handle_asset_scan",
|
|
1040
|
+
"description": "Run 7-gate security scanning pipeline on a marketplace asset",
|
|
1041
|
+
"input_schema": {"type": "object", "properties": {"asset_id": {"type": "string"}, "version_id": {"type": "string"}, "asset_path": {"type": "string"}, "gates": {"type": "string", "description": "Comma-separated gate names"}, "classification": {"type": "string"}}, "required": ["asset_id", "version_id", "asset_path"]},
|
|
1042
|
+
},
|
|
1043
|
+
# ============================================================
|
|
1044
|
+
# DEVSECOPS (12 tools)
|
|
1045
|
+
# ============================================================
|
|
1046
|
+
"devsecops_profile_create": {
|
|
1047
|
+
"category": "devsecops",
|
|
1048
|
+
"module": "icdev.tools.mcp.devsecops_server",
|
|
1049
|
+
"handler": "handle_devsecops_profile_create",
|
|
1050
|
+
"description": "Create or update a DevSecOps profile for a project. Sets maturity level and active pipeline security stages.",
|
|
1051
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string", "description": "Project identifier"}, "maturity_level": {"type": "string", "description": "Target maturity level (level_1_initial through level_5_optimized)"}, "stages": {"type": "array", "items": {"type": "string"}, "description": "Explicit list of active stage IDs"}}, "required": ["project_id"]},
|
|
1052
|
+
},
|
|
1053
|
+
"devsecops_profile_get": {
|
|
1054
|
+
"category": "devsecops",
|
|
1055
|
+
"module": "icdev.tools.mcp.devsecops_server",
|
|
1056
|
+
"handler": "handle_devsecops_profile_get",
|
|
1057
|
+
"description": "Get a project's current DevSecOps profile including maturity level, active stages, and stage configurations.",
|
|
1058
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string", "description": "Project identifier"}}, "required": ["project_id"]},
|
|
1059
|
+
},
|
|
1060
|
+
"devsecops_maturity_assess": {
|
|
1061
|
+
"category": "devsecops",
|
|
1062
|
+
"module": "icdev.tools.mcp.devsecops_server",
|
|
1063
|
+
"handler": "handle_devsecops_maturity_assess",
|
|
1064
|
+
"description": "Assess DevSecOps maturity level, identify gaps for next level, and provide recommendations.",
|
|
1065
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string", "description": "Project identifier"}}, "required": ["project_id"]},
|
|
1066
|
+
},
|
|
1067
|
+
"zta_maturity_score": {
|
|
1068
|
+
"category": "devsecops",
|
|
1069
|
+
"module": "icdev.tools.mcp.devsecops_server",
|
|
1070
|
+
"handler": "handle_zta_maturity_score",
|
|
1071
|
+
"description": "Score ZTA maturity across all 7 DoD pillars (User Identity, Device, Network, Application/Workload, Data, Visibility/Analytics, Automation/Orchestration). Returns per-pillar scores and weighted aggregate.",
|
|
1072
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string", "description": "Project identifier"}, "pillar": {"type": "string", "description": "Score a specific pillar (optional \u2014 omit for all 7)"}}, "required": ["project_id"]},
|
|
1073
|
+
},
|
|
1074
|
+
"zta_assess": {
|
|
1075
|
+
"category": "devsecops",
|
|
1076
|
+
"module": "icdev.tools.mcp.devsecops_server",
|
|
1077
|
+
"handler": "handle_zta_assess",
|
|
1078
|
+
"description": "Run NIST SP 800-207 Zero Trust Architecture assessment. Evaluates ZTA requirements against project artifacts and crosswalks to NIST 800-53.",
|
|
1079
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string", "description": "Project identifier"}, "project_dir": {"type": "string", "description": "Path to project source code for automated checks"}, "gate": {"type": "boolean", "description": "Evaluate gate pass/fail only"}}, "required": ["project_id"]},
|
|
1080
|
+
},
|
|
1081
|
+
"pipeline_security_generate": {
|
|
1082
|
+
"category": "devsecops",
|
|
1083
|
+
"module": "icdev.tools.mcp.devsecops_server",
|
|
1084
|
+
"handler": "handle_pipeline_security_generate",
|
|
1085
|
+
"description": "Generate GitLab CI security stages based on the project's DevSecOps profile. Only includes stages active in the profile.",
|
|
1086
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string", "description": "Project identifier"}}, "required": ["project_id"]},
|
|
1087
|
+
},
|
|
1088
|
+
"policy_generate": {
|
|
1089
|
+
"category": "devsecops",
|
|
1090
|
+
"module": "icdev.tools.mcp.devsecops_server",
|
|
1091
|
+
"handler": "handle_policy_generate",
|
|
1092
|
+
"description": "Generate Kyverno or OPA/Gatekeeper admission policies for pod security, image registry restriction, label enforcement, and resource limits.",
|
|
1093
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string", "description": "Project identifier"}, "engine": {"type": "string", "enum": ["kyverno", "opa"], "description": "Policy engine (default: kyverno)"}}, "required": ["project_id"]},
|
|
1094
|
+
},
|
|
1095
|
+
"service_mesh_generate": {
|
|
1096
|
+
"category": "devsecops",
|
|
1097
|
+
"module": "icdev.tools.mcp.devsecops_server",
|
|
1098
|
+
"handler": "handle_service_mesh_generate",
|
|
1099
|
+
"description": "Generate Istio or Linkerd service mesh configurations including mTLS, authorization policies, traffic routing, and circuit breaking.",
|
|
1100
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string", "description": "Project identifier"}, "mesh": {"type": "string", "enum": ["istio", "linkerd"], "description": "Service mesh type (default: istio)"}}, "required": ["project_id"]},
|
|
1101
|
+
},
|
|
1102
|
+
"network_segmentation_generate": {
|
|
1103
|
+
"category": "devsecops",
|
|
1104
|
+
"module": "icdev.tools.mcp.devsecops_server",
|
|
1105
|
+
"handler": "handle_network_segmentation_generate",
|
|
1106
|
+
"description": "Generate Kubernetes NetworkPolicy manifests for ZTA micro-segmentation: default-deny per namespace, DNS exceptions, per-service policies.",
|
|
1107
|
+
"input_schema": {"type": "object", "properties": {"project_path": {"type": "string", "description": "Target project directory"}, "namespaces": {"type": "array", "items": {"type": "string"}, "description": "Namespace names for isolation policies"}, "microsegmentation": {"type": "boolean", "description": "Generate per-service micro-segmentation policies"}, "services": {"type": "array", "items": {"type": "string"}, "description": "Service names for micro-segmentation"}}},
|
|
1108
|
+
},
|
|
1109
|
+
"attestation_verify": {
|
|
1110
|
+
"category": "devsecops",
|
|
1111
|
+
"module": "icdev.tools.mcp.devsecops_server",
|
|
1112
|
+
"handler": "handle_attestation_verify",
|
|
1113
|
+
"description": "Verify image signing and SBOM attestations. Returns verification commands for cosign CLI.",
|
|
1114
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string", "description": "Project identifier"}, "image": {"type": "string", "description": "Container image reference (e.g., registry/app:v1.0)"}}, "required": ["project_id", "image"]},
|
|
1115
|
+
},
|
|
1116
|
+
"zta_posture_check": {
|
|
1117
|
+
"category": "devsecops",
|
|
1118
|
+
"module": "icdev.tools.mcp.devsecops_server",
|
|
1119
|
+
"handler": "handle_zta_posture_check",
|
|
1120
|
+
"description": "Check ZTA posture for cATO readiness. Returns overall maturity score, per-pillar scores, and whether the project meets minimum ZTA requirements for continuous authorization.",
|
|
1121
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string", "description": "Project identifier"}}, "required": ["project_id"]},
|
|
1122
|
+
},
|
|
1123
|
+
"pdp_config_generate": {
|
|
1124
|
+
"category": "devsecops",
|
|
1125
|
+
"module": "icdev.tools.mcp.devsecops_server",
|
|
1126
|
+
"handler": "handle_pdp_config_generate",
|
|
1127
|
+
"description": "Generate PDP (Policy Decision Point) reference documentation and PEP (Policy Enforcement Point) configs for Istio/Linkerd pointing to external identity/access providers.",
|
|
1128
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string", "description": "Project identifier"}, "pdp_type": {"type": "string", "description": "PDP provider type (disa_icam, zscaler, palo_alto_prisma, crowdstrike, microsoft_entra, custom)"}, "pep": {"type": "boolean", "description": "Generate PEP config instead of PDP reference"}, "mesh": {"type": "string", "enum": ["istio", "linkerd"], "description": "Service mesh for PEP generation"}}, "required": ["project_id"]},
|
|
1129
|
+
},
|
|
1130
|
+
# ============================================================
|
|
1131
|
+
# GATEWAY (5 tools)
|
|
1132
|
+
# ============================================================
|
|
1133
|
+
"bind_user": {
|
|
1134
|
+
"category": "gateway",
|
|
1135
|
+
"module": "icdev.tools.mcp.gateway_server",
|
|
1136
|
+
"handler": "handle_bind_user",
|
|
1137
|
+
"description": "Initiate or complete a user binding ceremony for remote command access",
|
|
1138
|
+
"input_schema": {"type": "object", "properties": {"action": {"type": "string", "enum": ["initiate", "verify", "provision"]}, "channel": {"type": "string"}, "channel_user_id": {"type": "string"}, "challenge_code": {"type": "string"}, "icdev_user_id": {"type": "string"}, "tenant_id": {"type": "string"}}},
|
|
1139
|
+
},
|
|
1140
|
+
"list_bindings": {
|
|
1141
|
+
"category": "gateway",
|
|
1142
|
+
"module": "icdev.tools.mcp.gateway_server",
|
|
1143
|
+
"handler": "handle_list_bindings",
|
|
1144
|
+
"description": "List remote user bindings (active, pending, revoked)",
|
|
1145
|
+
"input_schema": {"type": "object", "properties": {"channel": {"type": "string"}, "status": {"type": "string"}}},
|
|
1146
|
+
},
|
|
1147
|
+
"revoke_binding": {
|
|
1148
|
+
"category": "gateway",
|
|
1149
|
+
"module": "icdev.tools.mcp.gateway_server",
|
|
1150
|
+
"handler": "handle_revoke_binding",
|
|
1151
|
+
"description": "Revoke an active remote user binding",
|
|
1152
|
+
"input_schema": {"type": "object", "properties": {"binding_id": {"type": "string"}, "reason": {"type": "string"}}, "required": ["binding_id"]},
|
|
1153
|
+
},
|
|
1154
|
+
"send_command": {
|
|
1155
|
+
"category": "gateway",
|
|
1156
|
+
"module": "icdev.tools.mcp.gateway_server",
|
|
1157
|
+
"handler": "handle_send_command",
|
|
1158
|
+
"description": "Execute an ICDEV command via the remote gateway (for testing/admin)",
|
|
1159
|
+
"input_schema": {"type": "object", "properties": {"command": {"type": "string"}, "project_id": {"type": "string"}, "channel": {"type": "string"}}, "required": ["command"]},
|
|
1160
|
+
},
|
|
1161
|
+
"gateway_status": {
|
|
1162
|
+
"category": "gateway",
|
|
1163
|
+
"module": "icdev.tools.mcp.gateway_server",
|
|
1164
|
+
"handler": "handle_gateway_status",
|
|
1165
|
+
"description": "Show remote gateway status: active channels, environment mode, recent commands",
|
|
1166
|
+
"input_schema": {"type": "object", "properties": {}},
|
|
1167
|
+
},
|
|
1168
|
+
# ============================================================
|
|
1169
|
+
# CONTEXT (5 tools)
|
|
1170
|
+
# ============================================================
|
|
1171
|
+
"fetch_docs": {
|
|
1172
|
+
"category": "context",
|
|
1173
|
+
"module": "icdev.tools.mcp.context_server",
|
|
1174
|
+
"handler": "handle_fetch_docs",
|
|
1175
|
+
"description": "Fetch CLAUDE.md section by header name or keyword search",
|
|
1176
|
+
"input_schema": {"type": "object", "properties": {"section": {"type": "string", "description": "Section header name (exact or partial match)"}, "keyword": {"type": "string", "description": "Keyword to search across all sections"}}},
|
|
1177
|
+
},
|
|
1178
|
+
"list_sections": {
|
|
1179
|
+
"category": "context",
|
|
1180
|
+
"module": "icdev.tools.mcp.context_server",
|
|
1181
|
+
"handler": "handle_list_sections",
|
|
1182
|
+
"description": "List all CLAUDE.md sections (table of contents)",
|
|
1183
|
+
"input_schema": {"type": "object", "properties": {}},
|
|
1184
|
+
},
|
|
1185
|
+
"get_icdev_metadata": {
|
|
1186
|
+
"category": "context",
|
|
1187
|
+
"module": "icdev.tools.mcp.context_server",
|
|
1188
|
+
"handler": "handle_get_icdev_metadata",
|
|
1189
|
+
"description": "Get live system metadata (projects, agents, compliance, events)",
|
|
1190
|
+
"input_schema": {"type": "object", "properties": {}},
|
|
1191
|
+
},
|
|
1192
|
+
"get_project_context": {
|
|
1193
|
+
"category": "context",
|
|
1194
|
+
"module": "icdev.tools.mcp.context_server",
|
|
1195
|
+
"handler": "handle_get_project_context",
|
|
1196
|
+
"description": "Get project-specific context for agent use",
|
|
1197
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string", "description": "Project ID"}}, "required": ["project_id"]},
|
|
1198
|
+
},
|
|
1199
|
+
"get_agent_context": {
|
|
1200
|
+
"category": "context",
|
|
1201
|
+
"module": "icdev.tools.mcp.context_server",
|
|
1202
|
+
"handler": "handle_get_agent_context",
|
|
1203
|
+
"description": "Get role-tailored CLAUDE.md sections for an agent",
|
|
1204
|
+
"input_schema": {"type": "object", "properties": {"role": {"type": "string", "description": "Agent role (builder, compliance, security, architect, infrastructure, orchestrator)"}}, "required": ["role"]},
|
|
1205
|
+
},
|
|
1206
|
+
# ============================================================
|
|
1207
|
+
# INNOVATION (10 tools)
|
|
1208
|
+
# ============================================================
|
|
1209
|
+
"scan_web": {
|
|
1210
|
+
"category": "innovation",
|
|
1211
|
+
"module": "icdev.tools.mcp.innovation_server",
|
|
1212
|
+
"handler": "handle_scan_web",
|
|
1213
|
+
"description": "Scan web sources (GitHub, NVD, SO, HN) for innovation signals",
|
|
1214
|
+
"input_schema": {"type": "object", "properties": {"source": {"type": "string", "description": "Specific source to scan (github, cve_databases, stackoverflow, hackernews) or omit for all"}}},
|
|
1215
|
+
},
|
|
1216
|
+
"score_signals": {
|
|
1217
|
+
"category": "innovation",
|
|
1218
|
+
"module": "icdev.tools.mcp.innovation_server",
|
|
1219
|
+
"handler": "handle_score_signals",
|
|
1220
|
+
"description": "Score innovation signals with 5-dimension weighted average",
|
|
1221
|
+
"input_schema": {"type": "object", "properties": {"signal_id": {"type": "string", "description": "Specific signal ID to score, or omit to score all new signals"}}},
|
|
1222
|
+
},
|
|
1223
|
+
"triage_signals": {
|
|
1224
|
+
"category": "innovation",
|
|
1225
|
+
"module": "icdev.tools.mcp.innovation_server",
|
|
1226
|
+
"handler": "handle_triage_signals",
|
|
1227
|
+
"description": "Run compliance-first 5-stage triage on scored signals",
|
|
1228
|
+
"input_schema": {"type": "object", "properties": {"signal_id": {"type": "string", "description": "Specific signal ID to triage, or omit to triage all scored"}}},
|
|
1229
|
+
},
|
|
1230
|
+
"detect_trends": {
|
|
1231
|
+
"category": "innovation",
|
|
1232
|
+
"module": "icdev.tools.mcp.innovation_server",
|
|
1233
|
+
"handler": "handle_detect_trends",
|
|
1234
|
+
"description": "Detect emerging trend patterns across innovation signals",
|
|
1235
|
+
"input_schema": {"type": "object", "properties": {"time_window_days": {"type": "integer", "default": 30}, "min_signals": {"type": "integer", "default": 3}}},
|
|
1236
|
+
},
|
|
1237
|
+
"generate_solution": {
|
|
1238
|
+
"category": "innovation",
|
|
1239
|
+
"module": "icdev.tools.mcp.innovation_server",
|
|
1240
|
+
"handler": "handle_generate_solution",
|
|
1241
|
+
"description": "Generate solution specification from an approved innovation signal",
|
|
1242
|
+
"input_schema": {"type": "object", "properties": {"signal_id": {"type": "string", "description": "Signal ID to generate solution for, or omit for all approved"}}},
|
|
1243
|
+
},
|
|
1244
|
+
"run_pipeline": {
|
|
1245
|
+
"category": "innovation",
|
|
1246
|
+
"module": "icdev.tools.mcp.innovation_server",
|
|
1247
|
+
"handler": "handle_run_pipeline",
|
|
1248
|
+
"description": "Run full innovation pipeline: discover \u2192 score \u2192 triage \u2192 generate",
|
|
1249
|
+
"input_schema": {"type": "object", "properties": {}},
|
|
1250
|
+
},
|
|
1251
|
+
"get_status": {
|
|
1252
|
+
"category": "innovation",
|
|
1253
|
+
"module": "icdev.tools.mcp.innovation_server",
|
|
1254
|
+
"handler": "handle_get_status",
|
|
1255
|
+
"description": "Get innovation engine status overview with signal counts and health",
|
|
1256
|
+
"input_schema": {"type": "object", "properties": {}},
|
|
1257
|
+
},
|
|
1258
|
+
"introspect": {
|
|
1259
|
+
"category": "innovation",
|
|
1260
|
+
"module": "icdev.tools.mcp.innovation_server",
|
|
1261
|
+
"handler": "handle_introspect",
|
|
1262
|
+
"description": "Run introspective analysis on ICDEV internal telemetry",
|
|
1263
|
+
"input_schema": {"type": "object", "properties": {"type": {"type": "string", "description": "Analysis type: all, failed_self_heals, gate_failures, unused_tools, slow_pipelines, nlq_gaps, knowledge_gaps", "default": "all"}}},
|
|
1264
|
+
},
|
|
1265
|
+
"competitive_scan": {
|
|
1266
|
+
"category": "innovation",
|
|
1267
|
+
"module": "icdev.tools.mcp.innovation_server",
|
|
1268
|
+
"handler": "handle_competitive_scan",
|
|
1269
|
+
"description": "Scan competitors for feature gaps and intelligence",
|
|
1270
|
+
"input_schema": {"type": "object", "properties": {"competitor": {"type": "string", "description": "Specific competitor name or omit for all"}}},
|
|
1271
|
+
},
|
|
1272
|
+
"standards_check": {
|
|
1273
|
+
"category": "innovation",
|
|
1274
|
+
"module": "icdev.tools.mcp.innovation_server",
|
|
1275
|
+
"handler": "handle_standards_check",
|
|
1276
|
+
"description": "Check standards bodies (NIST, CISA, DoD) for compliance updates",
|
|
1277
|
+
"input_schema": {"type": "object", "properties": {"body": {"type": "string", "description": "Standards body: nist, cisa, dod, fedramp, iso, or omit for all"}}},
|
|
1278
|
+
},
|
|
1279
|
+
# ============================================================
|
|
1280
|
+
# OBSERVABILITY (6 tools)
|
|
1281
|
+
# ============================================================
|
|
1282
|
+
"trace_query": {
|
|
1283
|
+
"category": "observability",
|
|
1284
|
+
"module": "icdev.tools.mcp.observability_server",
|
|
1285
|
+
"handler": "trace_query_handler",
|
|
1286
|
+
"description": "Query traces and spans from the distributed tracing system. Filter by trace_id, project_id, or span name.",
|
|
1287
|
+
"input_schema": {"type": "object", "properties": {"trace_id": {"type": "string", "description": "Specific trace ID to query"}, "project_id": {"type": "string", "description": "Filter by project ID"}, "name": {"type": "string", "description": "Filter by span name (e.g., 'mcp.tool_call')"}, "limit": {"type": "integer", "description": "Max results (default 50, max 200)"}}},
|
|
1288
|
+
},
|
|
1289
|
+
"trace_summary": {
|
|
1290
|
+
"category": "observability",
|
|
1291
|
+
"module": "icdev.tools.mcp.observability_server",
|
|
1292
|
+
"handler": "trace_summary_handler",
|
|
1293
|
+
"description": "Get aggregate trace statistics: total spans, traces, MCP tool calls, errors, average duration.",
|
|
1294
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string", "description": "Filter by project ID"}}},
|
|
1295
|
+
},
|
|
1296
|
+
"prov_lineage": {
|
|
1297
|
+
"category": "observability",
|
|
1298
|
+
"module": "icdev.tools.mcp.observability_server",
|
|
1299
|
+
"handler": "prov_lineage_handler",
|
|
1300
|
+
"description": "Query W3C PROV provenance lineage for an entity. Trace backward (what produced this?) or forward (what did this produce?).",
|
|
1301
|
+
"input_schema": {"type": "object", "properties": {"entity_id": {"type": "string", "description": "Entity ID to query lineage for"}, "direction": {"type": "string", "enum": ["backward", "forward"], "description": "Lineage direction"}, "max_depth": {"type": "integer", "description": "Max traversal depth (default 50)"}}, "required": ["entity_id"]},
|
|
1302
|
+
},
|
|
1303
|
+
"prov_export": {
|
|
1304
|
+
"category": "observability",
|
|
1305
|
+
"module": "icdev.tools.mcp.observability_server",
|
|
1306
|
+
"handler": "prov_export_handler",
|
|
1307
|
+
"description": "Export provenance graph as W3C PROV-JSON format for interoperability.",
|
|
1308
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string", "description": "Filter by project ID"}}},
|
|
1309
|
+
},
|
|
1310
|
+
"shap_analyze": {
|
|
1311
|
+
"category": "observability",
|
|
1312
|
+
"module": "icdev.tools.mcp.observability_server",
|
|
1313
|
+
"handler": "shap_analyze_handler",
|
|
1314
|
+
"description": "Run AgentSHAP Monte Carlo Shapley value analysis on a trace to determine tool importance attribution.",
|
|
1315
|
+
"input_schema": {"type": "object", "properties": {"trace_id": {"type": "string", "description": "Trace ID to analyze"}, "iterations": {"type": "integer", "description": "Monte Carlo iterations (default 1000, max 5000)"}}, "required": ["trace_id"]},
|
|
1316
|
+
},
|
|
1317
|
+
"xai_assess": {
|
|
1318
|
+
"category": "observability",
|
|
1319
|
+
"module": "icdev.tools.mcp.observability_server",
|
|
1320
|
+
"handler": "xai_assess_handler",
|
|
1321
|
+
"description": "Run XAI compliance assessment: 10 automated checks covering tracing, provenance, SHAP, and explainability against NIST AI RMF and DoD RAI requirements.",
|
|
1322
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string", "description": "Project ID to assess"}}, "required": ["project_id"]},
|
|
1323
|
+
},
|
|
1324
|
+
# ============================================================
|
|
1325
|
+
# TRANSLATION (9 tools)
|
|
1326
|
+
# ============================================================
|
|
1327
|
+
"translate_code": {
|
|
1328
|
+
"category": "translation",
|
|
1329
|
+
"module": "icdev.tools.mcp.gap_handlers",
|
|
1330
|
+
"handler": "handle_translate_code",
|
|
1331
|
+
"description": "Run full cross-language translation pipeline (Extract, Type-Check, Translate, Assemble, Validate+Repair).",
|
|
1332
|
+
"input_schema": {"type": "object", "properties": {"source_path": {"type": "string", "description": "Path to source code directory"}, "source_language": {"type": "string", "description": "Source language"}, "target_language": {"type": "string", "description": "Target language"}, "output_dir": {"type": "string", "description": "Output directory"}, "project_id": {"type": "string"}, "validate": {"type": "boolean", "default": True}, "dry_run": {"type": "boolean", "default": False}}, "required": ["source_path", "source_language", "target_language", "output_dir"]},
|
|
1333
|
+
},
|
|
1334
|
+
"extract_source_ir": {
|
|
1335
|
+
"category": "translation",
|
|
1336
|
+
"module": "icdev.tools.mcp.gap_handlers",
|
|
1337
|
+
"handler": "handle_extract_source_ir",
|
|
1338
|
+
"description": "Extract language-agnostic Intermediate Representation (IR) from source code.",
|
|
1339
|
+
"input_schema": {"type": "object", "properties": {"source_path": {"type": "string"}, "language": {"type": "string"}, "output_ir": {"type": "string"}, "project_id": {"type": "string"}}, "required": ["source_path", "language"]},
|
|
1340
|
+
},
|
|
1341
|
+
"translate_unit": {
|
|
1342
|
+
"category": "translation",
|
|
1343
|
+
"module": "icdev.tools.mcp.gap_handlers",
|
|
1344
|
+
"handler": "handle_translate_unit",
|
|
1345
|
+
"description": "Translate a single code unit from IR to target language with pass@k candidates.",
|
|
1346
|
+
"input_schema": {"type": "object", "properties": {"ir_file": {"type": "string"}, "source_language": {"type": "string"}, "target_language": {"type": "string"}, "output_dir": {"type": "string"}, "candidates": {"type": "integer", "default": 3}}, "required": ["ir_file", "source_language", "target_language", "output_dir"]},
|
|
1347
|
+
},
|
|
1348
|
+
"map_dependencies": {
|
|
1349
|
+
"category": "translation",
|
|
1350
|
+
"module": "icdev.tools.mcp.gap_handlers",
|
|
1351
|
+
"handler": "handle_map_dependencies",
|
|
1352
|
+
"description": "Map source language dependencies to target language equivalents.",
|
|
1353
|
+
"input_schema": {"type": "object", "properties": {"source_language": {"type": "string"}, "target_language": {"type": "string"}, "imports": {"type": "string", "description": "Comma-separated source imports"}}, "required": ["source_language", "target_language", "imports"]},
|
|
1354
|
+
},
|
|
1355
|
+
"check_types": {
|
|
1356
|
+
"category": "translation",
|
|
1357
|
+
"module": "icdev.tools.mcp.gap_handlers",
|
|
1358
|
+
"handler": "handle_check_types",
|
|
1359
|
+
"description": "Run type-compatibility pre-check between source and target type systems.",
|
|
1360
|
+
"input_schema": {"type": "object", "properties": {"ir_file": {"type": "string"}, "source_language": {"type": "string"}, "target_language": {"type": "string"}}, "required": ["ir_file", "source_language", "target_language"]},
|
|
1361
|
+
},
|
|
1362
|
+
"assemble_project": {
|
|
1363
|
+
"category": "translation",
|
|
1364
|
+
"module": "icdev.tools.mcp.gap_handlers",
|
|
1365
|
+
"handler": "handle_assemble_project",
|
|
1366
|
+
"description": "Assemble translated units into a complete target-language project.",
|
|
1367
|
+
"input_schema": {"type": "object", "properties": {"output_dir": {"type": "string"}, "target_language": {"type": "string"}, "project_name": {"type": "string"}}, "required": ["output_dir", "target_language"]},
|
|
1368
|
+
},
|
|
1369
|
+
"validate_translation": {
|
|
1370
|
+
"category": "translation",
|
|
1371
|
+
"module": "icdev.tools.mcp.gap_handlers",
|
|
1372
|
+
"handler": "handle_validate_translation",
|
|
1373
|
+
"description": "Validate translated code (syntax, API surface, round-trip IR consistency).",
|
|
1374
|
+
"input_schema": {"type": "object", "properties": {"source_ir": {"type": "string"}, "output_dir": {"type": "string"}, "target_language": {"type": "string"}}, "required": ["source_ir", "output_dir", "target_language"]},
|
|
1375
|
+
},
|
|
1376
|
+
"translate_tests": {
|
|
1377
|
+
"category": "translation",
|
|
1378
|
+
"module": "icdev.tools.mcp.gap_handlers",
|
|
1379
|
+
"handler": "handle_translate_tests",
|
|
1380
|
+
"description": "Translate test suite from source to target language with framework-specific assertion mapping.",
|
|
1381
|
+
"input_schema": {"type": "object", "properties": {"source_test_dir": {"type": "string"}, "source_language": {"type": "string"}, "target_language": {"type": "string"}, "output_dir": {"type": "string"}, "ir_file": {"type": "string"}}, "required": ["source_test_dir", "source_language", "target_language", "output_dir"]},
|
|
1382
|
+
},
|
|
1383
|
+
"map_features": {
|
|
1384
|
+
"category": "translation",
|
|
1385
|
+
"module": "icdev.tools.mcp.gap_handlers",
|
|
1386
|
+
"handler": "handle_map_features",
|
|
1387
|
+
"description": "Map language-specific features between source and target languages.",
|
|
1388
|
+
"input_schema": {"type": "object", "properties": {"source_language": {"type": "string"}, "target_language": {"type": "string"}, "feature_category": {"type": "string"}}, "required": ["source_language", "target_language"]},
|
|
1389
|
+
},
|
|
1390
|
+
# ============================================================
|
|
1391
|
+
# DX (5 tools)
|
|
1392
|
+
# ============================================================
|
|
1393
|
+
"companion_setup": {
|
|
1394
|
+
"category": "dx",
|
|
1395
|
+
"module": "icdev.tools.mcp.gap_handlers",
|
|
1396
|
+
"handler": "handle_companion_setup",
|
|
1397
|
+
"description": "Auto-detect AI coding tools and generate all companion configuration files.",
|
|
1398
|
+
"input_schema": {"type": "object", "properties": {"platforms": {"type": "string", "description": "Comma-separated platforms or 'all'"}, "write": {"type": "boolean", "default": True}, "sync": {"type": "boolean", "default": False}}},
|
|
1399
|
+
},
|
|
1400
|
+
"detect_ai_tools": {
|
|
1401
|
+
"category": "dx",
|
|
1402
|
+
"module": "icdev.tools.mcp.gap_handlers",
|
|
1403
|
+
"handler": "handle_detect_ai_tools",
|
|
1404
|
+
"description": "Detect installed AI coding tools from environment, config files, and directories.",
|
|
1405
|
+
"input_schema": {"type": "object", "properties": {}},
|
|
1406
|
+
},
|
|
1407
|
+
"generate_instructions": {
|
|
1408
|
+
"category": "dx",
|
|
1409
|
+
"module": "icdev.tools.mcp.gap_handlers",
|
|
1410
|
+
"handler": "handle_generate_instructions",
|
|
1411
|
+
"description": "Generate instruction/rules files for AI coding tools.",
|
|
1412
|
+
"input_schema": {"type": "object", "properties": {"platforms": {"type": "string"}, "write": {"type": "boolean", "default": True}}},
|
|
1413
|
+
},
|
|
1414
|
+
"generate_mcp_configs": {
|
|
1415
|
+
"category": "dx",
|
|
1416
|
+
"module": "icdev.tools.mcp.gap_handlers",
|
|
1417
|
+
"handler": "handle_generate_mcp_configs",
|
|
1418
|
+
"description": "Generate MCP configuration files for AI tools that support MCP.",
|
|
1419
|
+
"input_schema": {"type": "object", "properties": {"platforms": {"type": "string"}, "write": {"type": "boolean", "default": True}}},
|
|
1420
|
+
},
|
|
1421
|
+
"translate_skills": {
|
|
1422
|
+
"category": "dx",
|
|
1423
|
+
"module": "icdev.tools.mcp.gap_handlers",
|
|
1424
|
+
"handler": "handle_translate_skills",
|
|
1425
|
+
"description": "Translate Claude Code skills to equivalent formats for other AI tools.",
|
|
1426
|
+
"input_schema": {"type": "object", "properties": {"platforms": {"type": "string"}, "write": {"type": "boolean", "default": True}}},
|
|
1427
|
+
},
|
|
1428
|
+
# ============================================================
|
|
1429
|
+
# CLOUD (5 tools)
|
|
1430
|
+
# ============================================================
|
|
1431
|
+
"csp_monitor_scan": {
|
|
1432
|
+
"category": "cloud",
|
|
1433
|
+
"module": "icdev.tools.mcp.gap_handlers",
|
|
1434
|
+
"handler": "handle_csp_monitor_scan",
|
|
1435
|
+
"description": "Scan CSPs for service updates, deprecations, and compliance changes.",
|
|
1436
|
+
"input_schema": {"type": "object", "properties": {"csp": {"type": "string"}, "all_csps": {"type": "boolean", "default": True}}},
|
|
1437
|
+
},
|
|
1438
|
+
"csp_changelog": {
|
|
1439
|
+
"category": "cloud",
|
|
1440
|
+
"module": "icdev.tools.mcp.gap_handlers",
|
|
1441
|
+
"handler": "handle_csp_changelog",
|
|
1442
|
+
"description": "Generate CSP service changelog with recommendations.",
|
|
1443
|
+
"input_schema": {"type": "object", "properties": {"days": {"type": "integer", "default": 30}, "format": {"type": "string", "enum": ["json", "markdown"], "default": "json"}, "output": {"type": "string"}}},
|
|
1444
|
+
},
|
|
1445
|
+
"validate_region": {
|
|
1446
|
+
"category": "cloud",
|
|
1447
|
+
"module": "icdev.tools.mcp.gap_handlers",
|
|
1448
|
+
"handler": "handle_validate_region",
|
|
1449
|
+
"description": "Validate that a CSP region meets required compliance certifications.",
|
|
1450
|
+
"input_schema": {"type": "object", "properties": {"csp": {"type": "string"}, "region": {"type": "string"}, "frameworks": {"type": "string"}, "impact_level": {"type": "string"}}, "required": ["csp", "region"]},
|
|
1451
|
+
},
|
|
1452
|
+
"cloud_mode_status": {
|
|
1453
|
+
"category": "cloud",
|
|
1454
|
+
"module": "icdev.tools.mcp.gap_handlers",
|
|
1455
|
+
"handler": "handle_cloud_mode_status",
|
|
1456
|
+
"description": "Get current cloud mode, CSP configuration, and readiness status.",
|
|
1457
|
+
"input_schema": {"type": "object", "properties": {"action": {"type": "string", "enum": ["status", "validate", "eligible", "check_readiness"], "default": "status"}}},
|
|
1458
|
+
},
|
|
1459
|
+
"csp_health_check": {
|
|
1460
|
+
"category": "cloud",
|
|
1461
|
+
"module": "icdev.tools.mcp.gap_handlers",
|
|
1462
|
+
"handler": "handle_csp_health_check",
|
|
1463
|
+
"description": "Check health of all configured CSP services.",
|
|
1464
|
+
"input_schema": {"type": "object", "properties": {}},
|
|
1465
|
+
},
|
|
1466
|
+
# ============================================================
|
|
1467
|
+
# REGISTRY (9 tools)
|
|
1468
|
+
# ============================================================
|
|
1469
|
+
"register_child": {
|
|
1470
|
+
"category": "registry",
|
|
1471
|
+
"module": "icdev.tools.mcp.gap_handlers",
|
|
1472
|
+
"handler": "handle_register_child",
|
|
1473
|
+
"description": "Register a child application in the evolutionary intelligence registry.",
|
|
1474
|
+
"input_schema": {"type": "object", "properties": {"name": {"type": "string"}, "app_type": {"type": "string"}, "endpoint": {"type": "string"}, "project_id": {"type": "string"}}, "required": ["name", "app_type"]},
|
|
1475
|
+
},
|
|
1476
|
+
"list_children": {
|
|
1477
|
+
"category": "registry",
|
|
1478
|
+
"module": "icdev.tools.mcp.gap_handlers",
|
|
1479
|
+
"handler": "handle_list_children",
|
|
1480
|
+
"description": "List all registered child applications with health status.",
|
|
1481
|
+
"input_schema": {"type": "object", "properties": {"status": {"type": "string"}}},
|
|
1482
|
+
},
|
|
1483
|
+
"get_genome": {
|
|
1484
|
+
"category": "registry",
|
|
1485
|
+
"module": "icdev.tools.mcp.gap_handlers",
|
|
1486
|
+
"handler": "handle_get_genome",
|
|
1487
|
+
"description": "Get the current capability genome version with SHA-256 content hash.",
|
|
1488
|
+
"input_schema": {"type": "object", "properties": {"version": {"type": "string"}, "history": {"type": "boolean", "default": False}}},
|
|
1489
|
+
},
|
|
1490
|
+
"evaluate_capability": {
|
|
1491
|
+
"category": "registry",
|
|
1492
|
+
"module": "icdev.tools.mcp.gap_handlers",
|
|
1493
|
+
"handler": "handle_evaluate_capability",
|
|
1494
|
+
"description": "Evaluate a capability across 6 dimensions (universality, compliance_safety, risk, evidence, novelty, cost).",
|
|
1495
|
+
"input_schema": {"type": "object", "properties": {"capability_data": {"type": "object"}, "child_id": {"type": "string"}}, "required": ["capability_data"]},
|
|
1496
|
+
},
|
|
1497
|
+
"list_staging": {
|
|
1498
|
+
"category": "registry",
|
|
1499
|
+
"module": "icdev.tools.mcp.gap_handlers",
|
|
1500
|
+
"handler": "handle_list_staging",
|
|
1501
|
+
"description": "List staging environments for capability testing.",
|
|
1502
|
+
"input_schema": {"type": "object", "properties": {}},
|
|
1503
|
+
},
|
|
1504
|
+
"list_propagations": {
|
|
1505
|
+
"category": "registry",
|
|
1506
|
+
"module": "icdev.tools.mcp.gap_handlers",
|
|
1507
|
+
"handler": "handle_list_propagations",
|
|
1508
|
+
"description": "List capability propagation history.",
|
|
1509
|
+
"input_schema": {"type": "object", "properties": {"status": {"type": "string"}}},
|
|
1510
|
+
},
|
|
1511
|
+
"absorption_candidates": {
|
|
1512
|
+
"category": "registry",
|
|
1513
|
+
"module": "icdev.tools.mcp.gap_handlers",
|
|
1514
|
+
"handler": "handle_absorption_candidates",
|
|
1515
|
+
"description": "Get capabilities eligible for genome absorption (passed 72-hour stability window).",
|
|
1516
|
+
"input_schema": {"type": "object", "properties": {}},
|
|
1517
|
+
},
|
|
1518
|
+
"unevaluated_behaviors": {
|
|
1519
|
+
"category": "registry",
|
|
1520
|
+
"module": "icdev.tools.mcp.gap_handlers",
|
|
1521
|
+
"handler": "handle_unevaluated_behaviors",
|
|
1522
|
+
"description": "Get learned behaviors from children that haven't been evaluated yet.",
|
|
1523
|
+
"input_schema": {"type": "object", "properties": {}},
|
|
1524
|
+
},
|
|
1525
|
+
"cross_pollination_candidates": {
|
|
1526
|
+
"category": "registry",
|
|
1527
|
+
"module": "icdev.tools.mcp.gap_handlers",
|
|
1528
|
+
"handler": "handle_cross_pollination_candidates",
|
|
1529
|
+
"description": "Find capabilities that could be shared between child applications.",
|
|
1530
|
+
"input_schema": {"type": "object", "properties": {}},
|
|
1531
|
+
},
|
|
1532
|
+
# ============================================================
|
|
1533
|
+
# SECURITY_AGENTIC (9 tools)
|
|
1534
|
+
# ============================================================
|
|
1535
|
+
"scan_code_patterns": {
|
|
1536
|
+
"category": "security_agentic",
|
|
1537
|
+
"module": "icdev.tools.mcp.gap_handlers",
|
|
1538
|
+
"handler": "handle_scan_code_patterns",
|
|
1539
|
+
"description": "Scan code for dangerous patterns (eval, exec, os.system, SQL injection) across 6 languages.",
|
|
1540
|
+
"input_schema": {"type": "object", "properties": {"project_dir": {"type": "string"}, "language": {"type": "string"}, "gate": {"type": "boolean", "default": False}}, "required": ["project_dir"]},
|
|
1541
|
+
},
|
|
1542
|
+
"validate_tool_chain": {
|
|
1543
|
+
"category": "security_agentic",
|
|
1544
|
+
"module": "icdev.tools.mcp.gap_handlers",
|
|
1545
|
+
"handler": "handle_validate_tool_chain",
|
|
1546
|
+
"description": "Validate MCP tool call sequences against security rules.",
|
|
1547
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string"}, "gate": {"type": "boolean", "default": False}}, "required": ["project_id"]},
|
|
1548
|
+
},
|
|
1549
|
+
"validate_agent_output": {
|
|
1550
|
+
"category": "security_agentic",
|
|
1551
|
+
"module": "icdev.tools.mcp.gap_handlers",
|
|
1552
|
+
"handler": "handle_validate_agent_output",
|
|
1553
|
+
"description": "Validate agent output for classification leaks, PII, and credential exposure.",
|
|
1554
|
+
"input_schema": {"type": "object", "properties": {"text": {"type": "string"}, "project_id": {"type": "string"}, "gate": {"type": "boolean", "default": False}}},
|
|
1555
|
+
},
|
|
1556
|
+
"score_agent_trust": {
|
|
1557
|
+
"category": "security_agentic",
|
|
1558
|
+
"module": "icdev.tools.mcp.gap_handlers",
|
|
1559
|
+
"handler": "handle_score_agent_trust",
|
|
1560
|
+
"description": "Compute dynamic trust score for an agent based on behavior history.",
|
|
1561
|
+
"input_schema": {"type": "object", "properties": {"agent_id": {"type": "string"}, "all_agents": {"type": "boolean", "default": False}, "gate": {"type": "boolean", "default": False}, "project_id": {"type": "string"}}},
|
|
1562
|
+
},
|
|
1563
|
+
"check_mcp_authorization": {
|
|
1564
|
+
"category": "security_agentic",
|
|
1565
|
+
"module": "icdev.tools.mcp.gap_handlers",
|
|
1566
|
+
"handler": "handle_check_mcp_authorization",
|
|
1567
|
+
"description": "Check if a role is authorized to use a specific MCP tool.",
|
|
1568
|
+
"input_schema": {"type": "object", "properties": {"role": {"type": "string"}, "tool": {"type": "string"}, "list_permissions": {"type": "boolean", "default": False}, "validate_config": {"type": "boolean", "default": False}}},
|
|
1569
|
+
},
|
|
1570
|
+
"ai_telemetry_summary": {
|
|
1571
|
+
"category": "security_agentic",
|
|
1572
|
+
"module": "icdev.tools.mcp.gap_handlers",
|
|
1573
|
+
"handler": "handle_ai_telemetry_summary",
|
|
1574
|
+
"description": "Get AI telemetry summary including usage stats and anomaly detection.",
|
|
1575
|
+
"input_schema": {"type": "object", "properties": {"action": {"type": "string", "enum": ["summary", "anomalies", "drift"], "default": "summary"}, "window_hours": {"type": "integer", "default": 24}, "agent_id": {"type": "string"}}},
|
|
1576
|
+
},
|
|
1577
|
+
"generate_ai_bom": {
|
|
1578
|
+
"category": "security_agentic",
|
|
1579
|
+
"module": "icdev.tools.mcp.gap_handlers",
|
|
1580
|
+
"handler": "handle_generate_ai_bom",
|
|
1581
|
+
"description": "Generate AI Bill of Materials tracking all AI/ML components.",
|
|
1582
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string"}, "project_dir": {"type": "string"}, "gate": {"type": "boolean", "default": False}}, "required": ["project_id"]},
|
|
1583
|
+
},
|
|
1584
|
+
"run_atlas_red_team": {
|
|
1585
|
+
"category": "security_agentic",
|
|
1586
|
+
"module": "icdev.tools.mcp.gap_handlers",
|
|
1587
|
+
"handler": "handle_run_atlas_red_team",
|
|
1588
|
+
"description": "Run MITRE ATLAS red team tests (opt-in only).",
|
|
1589
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string"}, "technique": {"type": "string"}, "behavioral": {"type": "boolean", "default": False}, "brt_technique": {"type": "string"}}, "required": ["project_id"]},
|
|
1590
|
+
},
|
|
1591
|
+
"detect_behavioral_drift": {
|
|
1592
|
+
"category": "security_agentic",
|
|
1593
|
+
"module": "icdev.tools.mcp.gap_handlers",
|
|
1594
|
+
"handler": "handle_detect_behavioral_drift",
|
|
1595
|
+
"description": "Detect behavioral drift in agent tool usage patterns using z-score baseline.",
|
|
1596
|
+
"input_schema": {"type": "object", "properties": {"agent_id": {"type": "string"}}},
|
|
1597
|
+
},
|
|
1598
|
+
# ============================================================
|
|
1599
|
+
# TESTING (6 tools)
|
|
1600
|
+
# ============================================================
|
|
1601
|
+
"production_audit": {
|
|
1602
|
+
"category": "testing",
|
|
1603
|
+
"module": "icdev.tools.mcp.gap_handlers",
|
|
1604
|
+
"handler": "handle_production_audit",
|
|
1605
|
+
"description": "Run production readiness audit (30 checks across 6 categories).",
|
|
1606
|
+
"input_schema": {"type": "object", "properties": {"category": {"type": "string"}, "gate": {"type": "boolean", "default": False}}},
|
|
1607
|
+
},
|
|
1608
|
+
"production_remediate": {
|
|
1609
|
+
"category": "testing",
|
|
1610
|
+
"module": "icdev.tools.mcp.gap_handlers",
|
|
1611
|
+
"handler": "handle_production_remediate",
|
|
1612
|
+
"description": "Auto-fix audit blockers with 3-tier confidence model.",
|
|
1613
|
+
"input_schema": {"type": "object", "properties": {"auto": {"type": "boolean", "default": False}, "dry_run": {"type": "boolean", "default": False}, "check_id": {"type": "string"}, "skip_audit": {"type": "boolean", "default": False}}},
|
|
1614
|
+
},
|
|
1615
|
+
"validate_claude_dir": {
|
|
1616
|
+
"category": "testing",
|
|
1617
|
+
"module": "icdev.tools.mcp.gap_handlers",
|
|
1618
|
+
"handler": "handle_validate_claude_dir",
|
|
1619
|
+
"description": "Validate .claude directory governance (append-only tables, hooks, routes, deny rules).",
|
|
1620
|
+
"input_schema": {"type": "object", "properties": {"check": {"type": "string"}}},
|
|
1621
|
+
},
|
|
1622
|
+
"health_check": {
|
|
1623
|
+
"category": "testing",
|
|
1624
|
+
"module": "icdev.tools.mcp.gap_handlers",
|
|
1625
|
+
"handler": "handle_health_check",
|
|
1626
|
+
"description": "Run full system health check.",
|
|
1627
|
+
"input_schema": {"type": "object", "properties": {}},
|
|
1628
|
+
},
|
|
1629
|
+
"validate_screenshot": {
|
|
1630
|
+
"category": "testing",
|
|
1631
|
+
"module": "icdev.tools.mcp.gap_handlers",
|
|
1632
|
+
"handler": "handle_validate_screenshot",
|
|
1633
|
+
"description": "Validate a screenshot using vision LLM for content verification.",
|
|
1634
|
+
"input_schema": {"type": "object", "properties": {"image": {"type": "string"}, "assertion": {"type": "string"}, "batch_dir": {"type": "string"}, "check": {"type": "boolean", "default": False}}},
|
|
1635
|
+
},
|
|
1636
|
+
"run_e2e_tests": {
|
|
1637
|
+
"category": "testing",
|
|
1638
|
+
"module": "icdev.tools.mcp.gap_handlers",
|
|
1639
|
+
"handler": "handle_run_e2e_tests",
|
|
1640
|
+
"description": "Run E2E tests via Playwright MCP.",
|
|
1641
|
+
"input_schema": {"type": "object", "properties": {"test_file": {"type": "string"}, "run_all": {"type": "boolean", "default": False}, "validate_screenshots": {"type": "boolean", "default": False}, "vision_strict": {"type": "boolean", "default": False}}},
|
|
1642
|
+
},
|
|
1643
|
+
# ============================================================
|
|
1644
|
+
# INSTALLER (4 tools)
|
|
1645
|
+
# ============================================================
|
|
1646
|
+
"install_modules": {
|
|
1647
|
+
"category": "installer",
|
|
1648
|
+
"module": "icdev.tools.mcp.gap_handlers",
|
|
1649
|
+
"handler": "handle_install_modules",
|
|
1650
|
+
"description": "Install ICDEV modules using profile-based or custom module selection.",
|
|
1651
|
+
"input_schema": {"type": "object", "properties": {"profile": {"type": "string"}, "compliance": {"type": "string"}, "platform": {"type": "string"}, "add_module": {"type": "string"}, "interactive": {"type": "boolean", "default": False}}},
|
|
1652
|
+
},
|
|
1653
|
+
"validate_module_registry": {
|
|
1654
|
+
"category": "installer",
|
|
1655
|
+
"module": "icdev.tools.mcp.gap_handlers",
|
|
1656
|
+
"handler": "handle_validate_module_registry",
|
|
1657
|
+
"description": "Validate the ICDEV module registry for dependency consistency.",
|
|
1658
|
+
"input_schema": {"type": "object", "properties": {}},
|
|
1659
|
+
},
|
|
1660
|
+
"list_compliance_postures": {
|
|
1661
|
+
"category": "installer",
|
|
1662
|
+
"module": "icdev.tools.mcp.gap_handlers",
|
|
1663
|
+
"handler": "handle_list_compliance_postures",
|
|
1664
|
+
"description": "List available compliance posture configurations.",
|
|
1665
|
+
"input_schema": {"type": "object", "properties": {}},
|
|
1666
|
+
},
|
|
1667
|
+
"generate_platform_artifacts": {
|
|
1668
|
+
"category": "installer",
|
|
1669
|
+
"module": "icdev.tools.mcp.gap_handlers",
|
|
1670
|
+
"handler": "handle_generate_platform_artifacts",
|
|
1671
|
+
"description": "Generate platform-specific deployment artifacts (Docker, K8s, Helm, env).",
|
|
1672
|
+
"input_schema": {"type": "object", "properties": {"platform": {"type": "string"}, "modules": {"type": "string"}}, "required": ["platform"]},
|
|
1673
|
+
},
|
|
1674
|
+
# ============================================================
|
|
1675
|
+
# MISC (8 tools)
|
|
1676
|
+
# ============================================================
|
|
1677
|
+
"register_external_patterns": {
|
|
1678
|
+
"category": "misc",
|
|
1679
|
+
"module": "icdev.tools.mcp.gap_handlers",
|
|
1680
|
+
"handler": "handle_register_external_patterns",
|
|
1681
|
+
"description": "Register external framework patterns as innovation signals.",
|
|
1682
|
+
"input_schema": {"type": "object", "properties": {"patterns": {"type": "array"}, "source_framework": {"type": "string"}}, "required": ["patterns", "source_framework"]},
|
|
1683
|
+
},
|
|
1684
|
+
"analyze_legacy_ui": {
|
|
1685
|
+
"category": "misc",
|
|
1686
|
+
"module": "icdev.tools.mcp.gap_handlers",
|
|
1687
|
+
"handler": "handle_analyze_legacy_ui",
|
|
1688
|
+
"description": "Analyze legacy UI screenshots for complexity scoring and component extraction.",
|
|
1689
|
+
"input_schema": {"type": "object", "properties": {"image": {"type": "string"}, "image_dir": {"type": "string"}, "app_id": {"type": "string"}, "project_id": {"type": "string"}, "store": {"type": "boolean", "default": False}}},
|
|
1690
|
+
},
|
|
1691
|
+
"generate_profile_md": {
|
|
1692
|
+
"category": "misc",
|
|
1693
|
+
"module": "icdev.tools.mcp.gap_handlers",
|
|
1694
|
+
"handler": "handle_generate_profile_md",
|
|
1695
|
+
"description": "Generate PROFILE.md from a development profile.",
|
|
1696
|
+
"input_schema": {"type": "object", "properties": {"scope": {"type": "string", "default": "project"}, "scope_id": {"type": "string"}, "output": {"type": "string"}, "store": {"type": "boolean", "default": False}}, "required": ["scope_id"]},
|
|
1697
|
+
},
|
|
1698
|
+
"generate_claude_md": {
|
|
1699
|
+
"category": "misc",
|
|
1700
|
+
"module": "icdev.tools.mcp.gap_handlers",
|
|
1701
|
+
"handler": "handle_generate_claude_md",
|
|
1702
|
+
"description": "Generate dynamic CLAUDE.md for a child application from a blueprint.",
|
|
1703
|
+
"input_schema": {"type": "object", "properties": {"blueprint": {"type": "string"}, "output": {"type": "string"}}, "required": ["blueprint"]},
|
|
1704
|
+
},
|
|
1705
|
+
"version_migrate": {
|
|
1706
|
+
"category": "misc",
|
|
1707
|
+
"module": "icdev.tools.mcp.gap_handlers",
|
|
1708
|
+
"handler": "handle_version_migrate",
|
|
1709
|
+
"description": "Run language version migration (e.g., Python 2 to 3, Java 8 to 17).",
|
|
1710
|
+
"input_schema": {"type": "object", "properties": {"source": {"type": "string"}, "output": {"type": "string"}, "language": {"type": "string", "enum": ["python", "java", "csharp"]}, "from_version": {"type": "string"}, "to_version": {"type": "string"}}, "required": ["source", "output", "language", "from_version", "to_version"]},
|
|
1711
|
+
},
|
|
1712
|
+
"framework_migrate": {
|
|
1713
|
+
"category": "misc",
|
|
1714
|
+
"module": "icdev.tools.mcp.gap_handlers",
|
|
1715
|
+
"handler": "handle_framework_migrate",
|
|
1716
|
+
"description": "Run framework migration (e.g., Struts to Spring Boot, WCF to ASP.NET Core).",
|
|
1717
|
+
"input_schema": {"type": "object", "properties": {"source": {"type": "string"}, "output": {"type": "string"}, "from_framework": {"type": "string"}, "to_framework": {"type": "string"}}, "required": ["source", "output", "from_framework", "to_framework"]},
|
|
1718
|
+
},
|
|
1719
|
+
"worktree_manage": {
|
|
1720
|
+
"category": "misc",
|
|
1721
|
+
"module": "icdev.tools.mcp.gap_handlers",
|
|
1722
|
+
"handler": "handle_worktree_manage",
|
|
1723
|
+
"description": "Manage git worktrees for parallel CI/CD task isolation.",
|
|
1724
|
+
"input_schema": {"type": "object", "properties": {"action": {"type": "string", "enum": ["create", "list", "cleanup", "status"], "default": "list"}, "task_id": {"type": "string"}, "target_dir": {"type": "string"}, "worktree_name": {"type": "string"}}},
|
|
1725
|
+
},
|
|
1726
|
+
"nlq_query": {
|
|
1727
|
+
"category": "misc",
|
|
1728
|
+
"module": "icdev.tools.mcp.gap_handlers",
|
|
1729
|
+
"handler": "handle_nlq_query",
|
|
1730
|
+
"description": "Run natural language compliance query (NLQ to SQL).",
|
|
1731
|
+
"input_schema": {"type": "object", "properties": {"query": {"type": "string"}, "project_id": {"type": "string"}}, "required": ["query"]},
|
|
1732
|
+
},
|
|
1733
|
+
# ============================================================
|
|
1734
|
+
# AI TRANSPARENCY & ACCOUNTABILITY (Phase 48, 10 tools)
|
|
1735
|
+
# ============================================================
|
|
1736
|
+
"omb_m25_21_assess": {
|
|
1737
|
+
"category": "compliance",
|
|
1738
|
+
"module": "icdev.tools.mcp.gap_handlers",
|
|
1739
|
+
"handler": "handle_omb_m25_21_assess",
|
|
1740
|
+
"description": "Run OMB M-25-21 High-Impact AI assessment. Checks AI inventory, risk classification, oversight plans, and transparency notices.",
|
|
1741
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string", "description": "Project UUID"}, "project_dir": {"type": "string", "description": "Project directory path (optional)"}}, "required": ["project_id"]},
|
|
1742
|
+
},
|
|
1743
|
+
"omb_m26_04_assess": {
|
|
1744
|
+
"category": "compliance",
|
|
1745
|
+
"module": "icdev.tools.mcp.gap_handlers",
|
|
1746
|
+
"handler": "handle_omb_m26_04_assess",
|
|
1747
|
+
"description": "Run OMB M-26-04 Unbiased AI assessment. Checks model cards, system cards, bias testing, fairness metrics, and human review processes.",
|
|
1748
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string", "description": "Project UUID"}, "project_dir": {"type": "string", "description": "Project directory path (optional)"}}, "required": ["project_id"]},
|
|
1749
|
+
},
|
|
1750
|
+
"nist_ai_600_1_assess": {
|
|
1751
|
+
"category": "compliance",
|
|
1752
|
+
"module": "icdev.tools.mcp.gap_handlers",
|
|
1753
|
+
"handler": "handle_nist_ai_600_1_assess",
|
|
1754
|
+
"description": "Run NIST AI 600-1 GenAI Profile assessment. Checks confabulation detection, data privacy, information integrity, CBRN safeguards, and value chain transparency.",
|
|
1755
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string", "description": "Project UUID"}, "project_dir": {"type": "string", "description": "Project directory path (optional)"}}, "required": ["project_id"]},
|
|
1756
|
+
},
|
|
1757
|
+
"gao_ai_assess": {
|
|
1758
|
+
"category": "compliance",
|
|
1759
|
+
"module": "icdev.tools.mcp.gap_handlers",
|
|
1760
|
+
"handler": "handle_gao_ai_assess",
|
|
1761
|
+
"description": "Run GAO-21-519SP AI Accountability assessment. Checks governance, data, performance, and monitoring evidence.",
|
|
1762
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string", "description": "Project UUID"}, "project_dir": {"type": "string", "description": "Project directory path (optional)"}}, "required": ["project_id"]},
|
|
1763
|
+
},
|
|
1764
|
+
"fedramp_ksi_generate": {
|
|
1765
|
+
"category": "compliance",
|
|
1766
|
+
"module": "icdev.tools.mcp.gap_handlers",
|
|
1767
|
+
"handler": "handle_fedramp_ksi_generate",
|
|
1768
|
+
"description": "Generate FedRAMP 20x KSI evidence for continuous authorization. Maps ICDEV evidence to 43 KSIs across 12 NIST families.",
|
|
1769
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string", "description": "Project UUID"}, "ksi_id": {"type": "string", "description": "Specific KSI ID (optional, generates all if omitted)"}}, "required": ["project_id"]},
|
|
1770
|
+
},
|
|
1771
|
+
"fedramp_authorization_package": {
|
|
1772
|
+
"category": "compliance",
|
|
1773
|
+
"module": "icdev.tools.mcp.gap_handlers",
|
|
1774
|
+
"handler": "handle_fedramp_authorization_package",
|
|
1775
|
+
"description": "Bundle FedRAMP 20x authorization package with OSCAL SSP, KSI evidence, and compliance artifacts.",
|
|
1776
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string", "description": "Project UUID"}, "output_dir": {"type": "string", "description": "Output directory (optional)"}}, "required": ["project_id"]},
|
|
1777
|
+
},
|
|
1778
|
+
"owasp_asi_assess": {
|
|
1779
|
+
"category": "compliance",
|
|
1780
|
+
"module": "icdev.tools.mcp.gap_handlers",
|
|
1781
|
+
"handler": "handle_owasp_asi_assess",
|
|
1782
|
+
"description": "Run OWASP ASI01-ASI10 Agentic AI risk assessment. Maps 10 ASI risks to ICDEV controls.",
|
|
1783
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string", "description": "Project UUID"}, "project_dir": {"type": "string", "description": "Project directory path (optional)"}}, "required": ["project_id"]},
|
|
1784
|
+
},
|
|
1785
|
+
"slsa_generate": {
|
|
1786
|
+
"category": "compliance",
|
|
1787
|
+
"module": "icdev.tools.mcp.gap_handlers",
|
|
1788
|
+
"handler": "handle_slsa_generate",
|
|
1789
|
+
"description": "Generate SLSA v1.0 provenance statement from build pipeline evidence (D341).",
|
|
1790
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string", "description": "Project UUID"}, "target_level": {"type": "integer", "description": "Target SLSA level (0-4, default 3)"}}, "required": ["project_id"]},
|
|
1791
|
+
},
|
|
1792
|
+
"slsa_verify": {
|
|
1793
|
+
"category": "compliance",
|
|
1794
|
+
"module": "icdev.tools.mcp.gap_handlers",
|
|
1795
|
+
"handler": "handle_slsa_verify",
|
|
1796
|
+
"description": "Verify project meets target SLSA level with gap analysis and recommendations.",
|
|
1797
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string", "description": "Project UUID"}, "target_level": {"type": "integer", "description": "Target SLSA level (0-4, default 3)"}}, "required": ["project_id"]},
|
|
1798
|
+
},
|
|
1799
|
+
"swft_bundle": {
|
|
1800
|
+
"category": "compliance",
|
|
1801
|
+
"module": "icdev.tools.mcp.gap_handlers",
|
|
1802
|
+
"handler": "handle_swft_bundle",
|
|
1803
|
+
"description": "Bundle DoD SWFT evidence package with SLSA provenance, SBOM, VEX, and compliance artifacts.",
|
|
1804
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string", "description": "Project UUID"}, "output_dir": {"type": "string", "description": "Output directory (optional)"}}, "required": ["project_id"]},
|
|
1805
|
+
},
|
|
1806
|
+
"vex_generate": {
|
|
1807
|
+
"category": "compliance",
|
|
1808
|
+
"module": "icdev.tools.mcp.gap_handlers",
|
|
1809
|
+
"handler": "handle_vex_generate",
|
|
1810
|
+
"description": "Generate VEX (Vulnerability Exploitability eXchange) document from vulnerability data.",
|
|
1811
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string", "description": "Project UUID"}}, "required": ["project_id"]},
|
|
1812
|
+
},
|
|
1813
|
+
"model_card_generate": {
|
|
1814
|
+
"category": "compliance",
|
|
1815
|
+
"module": "icdev.tools.mcp.gap_handlers",
|
|
1816
|
+
"handler": "handle_model_card_generate",
|
|
1817
|
+
"description": "Generate a model card per OMB M-26-04 / Google Model Cards format. Pulls data from AI BOM, telemetry, and XAI assessments.",
|
|
1818
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string"}, "model_name": {"type": "string", "description": "Name of the AI model"}}, "required": ["project_id", "model_name"]},
|
|
1819
|
+
},
|
|
1820
|
+
"system_card_generate": {
|
|
1821
|
+
"category": "compliance",
|
|
1822
|
+
"module": "icdev.tools.mcp.gap_handlers",
|
|
1823
|
+
"handler": "handle_system_card_generate",
|
|
1824
|
+
"description": "Generate a system-level AI card covering the entire AI system (models, tools, agents, data flows, risk profile).",
|
|
1825
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string"}}, "required": ["project_id"]},
|
|
1826
|
+
},
|
|
1827
|
+
"ai_transparency_audit": {
|
|
1828
|
+
"category": "compliance",
|
|
1829
|
+
"module": "icdev.tools.mcp.gap_handlers",
|
|
1830
|
+
"handler": "handle_ai_transparency_audit",
|
|
1831
|
+
"description": "Run cross-framework AI transparency audit across all 4 frameworks (OMB M-25-21, M-26-04, AI 600-1, GAO) with gap analysis.",
|
|
1832
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string"}, "project_dir": {"type": "string"}}, "required": ["project_id"]},
|
|
1833
|
+
},
|
|
1834
|
+
"confabulation_check": {
|
|
1835
|
+
"category": "security",
|
|
1836
|
+
"module": "icdev.tools.mcp.gap_handlers",
|
|
1837
|
+
"handler": "handle_confabulation_check",
|
|
1838
|
+
"description": "Check text output for confabulation (hallucination) indicators using deterministic methods: citation verification, contradiction detection, confidence calibration.",
|
|
1839
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string"}, "text": {"type": "string", "description": "Text to check for confabulation"}}, "required": ["project_id", "text"]},
|
|
1840
|
+
},
|
|
1841
|
+
"ai_inventory_register": {
|
|
1842
|
+
"category": "compliance",
|
|
1843
|
+
"module": "icdev.tools.mcp.gap_handlers",
|
|
1844
|
+
"handler": "handle_ai_inventory_register",
|
|
1845
|
+
"description": "Register an AI use case in the OMB M-25-21 inventory. Classifies risk level (minimal, high-impact, safety-impacting).",
|
|
1846
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string"}, "name": {"type": "string", "description": "AI component name"}, "purpose": {"type": "string"}, "risk_level": {"type": "string", "enum": ["minimal_risk", "high_impact", "safety_impacting"], "default": "minimal_risk"}}, "required": ["project_id", "name"]},
|
|
1847
|
+
},
|
|
1848
|
+
"fairness_assess": {
|
|
1849
|
+
"category": "compliance",
|
|
1850
|
+
"module": "icdev.tools.mcp.gap_handlers",
|
|
1851
|
+
"handler": "handle_fairness_assess",
|
|
1852
|
+
"description": "Assess fairness and bias compliance per OMB M-26-04. Checks documentation evidence for bias testing, fairness metrics, and appeal processes.",
|
|
1853
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string"}, "project_dir": {"type": "string"}}, "required": ["project_id"]},
|
|
1854
|
+
},
|
|
1855
|
+
# ============================================================
|
|
1856
|
+
# AI ACCOUNTABILITY (Phase 49, D316-D321, 8 tools)
|
|
1857
|
+
# ============================================================
|
|
1858
|
+
"ai_oversight_plan_create": {
|
|
1859
|
+
"category": "compliance",
|
|
1860
|
+
"module": "icdev.tools.mcp.gap_handlers",
|
|
1861
|
+
"handler": "handle_ai_oversight_plan_create",
|
|
1862
|
+
"description": "Register a human oversight plan for an AI system (M25-OVR-1, GAO accountability).",
|
|
1863
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string"}, "plan_name": {"type": "string"}, "plan_data": {"type": "string"}, "approved_by": {"type": "string"}}, "required": ["project_id", "plan_name"]},
|
|
1864
|
+
},
|
|
1865
|
+
"ai_caio_designate": {
|
|
1866
|
+
"category": "compliance",
|
|
1867
|
+
"module": "icdev.tools.mcp.gap_handlers",
|
|
1868
|
+
"handler": "handle_ai_caio_designate",
|
|
1869
|
+
"description": "Designate a Chief AI Officer or responsible AI official for a project (M25-OVR-4).",
|
|
1870
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string"}, "official_name": {"type": "string"}, "official_role": {"type": "string", "default": "CAIO"}, "organization": {"type": "string"}}, "required": ["project_id", "official_name"]},
|
|
1871
|
+
},
|
|
1872
|
+
"ai_appeal_file": {
|
|
1873
|
+
"category": "compliance",
|
|
1874
|
+
"module": "icdev.tools.mcp.gap_handlers",
|
|
1875
|
+
"handler": "handle_ai_appeal_file",
|
|
1876
|
+
"description": "File an accountability appeal for an AI system decision (M25-OVR-3, M26-REV-2, FAIR-7).",
|
|
1877
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string"}, "appellant": {"type": "string"}, "ai_system": {"type": "string"}, "decision_contested": {"type": "string"}}, "required": ["project_id", "appellant", "ai_system"]},
|
|
1878
|
+
},
|
|
1879
|
+
"ai_appeal_resolve": {
|
|
1880
|
+
"category": "compliance",
|
|
1881
|
+
"module": "icdev.tools.mcp.gap_handlers",
|
|
1882
|
+
"handler": "handle_ai_appeal_resolve",
|
|
1883
|
+
"description": "Resolve a previously filed AI accountability appeal.",
|
|
1884
|
+
"input_schema": {"type": "object", "properties": {"appeal_id": {"type": "integer"}, "resolution": {"type": "string"}, "resolved_by": {"type": "string"}}, "required": ["appeal_id", "resolution", "resolved_by"]},
|
|
1885
|
+
},
|
|
1886
|
+
"ai_ethics_review_submit": {
|
|
1887
|
+
"category": "compliance",
|
|
1888
|
+
"module": "icdev.tools.mcp.gap_handlers",
|
|
1889
|
+
"handler": "handle_ai_ethics_review_submit",
|
|
1890
|
+
"description": "Submit an ethics review for an AI system (GAO-GOV-2/3, M26-REV-3, FAIR-1).",
|
|
1891
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string"}, "review_type": {"type": "string"}, "ai_system": {"type": "string"}, "findings": {"type": "string"}, "opt_out_policy": {"type": "boolean", "default": False}, "legal_compliance_matrix": {"type": "boolean", "default": False}, "pre_deployment_review": {"type": "boolean", "default": False}, "reviewer": {"type": "string"}}, "required": ["project_id", "review_type"]},
|
|
1892
|
+
},
|
|
1893
|
+
"ai_incident_log": {
|
|
1894
|
+
"category": "compliance",
|
|
1895
|
+
"module": "icdev.tools.mcp.gap_handlers",
|
|
1896
|
+
"handler": "handle_ai_incident_log",
|
|
1897
|
+
"description": "Log an AI-specific incident for tracking and corrective action (M25-RISK-4, GAO-MON-3).",
|
|
1898
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string"}, "incident_type": {"type": "string", "enum": ["confabulation", "bias_detected", "unauthorized_access", "model_drift", "data_breach", "safety_violation", "appeal_escalation", "other"]}, "ai_system": {"type": "string"}, "severity": {"type": "string", "enum": ["low", "medium", "high", "critical"], "default": "medium"}, "description": {"type": "string"}, "reported_by": {"type": "string"}}, "required": ["project_id", "incident_type", "description"]},
|
|
1899
|
+
},
|
|
1900
|
+
"ai_reassessment_schedule": {
|
|
1901
|
+
"category": "compliance",
|
|
1902
|
+
"module": "icdev.tools.mcp.gap_handlers",
|
|
1903
|
+
"handler": "handle_ai_reassessment_schedule",
|
|
1904
|
+
"description": "Create or update a reassessment schedule for an AI system (M25-INV-3, GAO-MON-4).",
|
|
1905
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string"}, "ai_system": {"type": "string"}, "frequency": {"type": "string", "enum": ["monthly", "quarterly", "semi_annual", "annual"], "default": "annual"}, "next_due": {"type": "string", "description": "ISO date for next reassessment"}}, "required": ["project_id", "ai_system"]},
|
|
1906
|
+
},
|
|
1907
|
+
"ai_accountability_audit": {
|
|
1908
|
+
"category": "compliance",
|
|
1909
|
+
"module": "icdev.tools.mcp.gap_handlers",
|
|
1910
|
+
"handler": "handle_ai_accountability_audit",
|
|
1911
|
+
"description": "Run cross-framework AI accountability audit across all 4 frameworks with gap analysis and remediation guidance (Phase 49).",
|
|
1912
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string"}, "project_dir": {"type": "string"}}, "required": ["project_id"]},
|
|
1913
|
+
},
|
|
1914
|
+
# ============================================================
|
|
1915
|
+
# CODE INTELLIGENCE (Phase 52, D331-D337, 3 tools)
|
|
1916
|
+
# ============================================================
|
|
1917
|
+
"code_analyze": {
|
|
1918
|
+
"category": "builder",
|
|
1919
|
+
"module": "icdev.tools.mcp.gap_handlers",
|
|
1920
|
+
"handler": "handle_code_analyze",
|
|
1921
|
+
"description": "Run AST-based code quality analysis on a project directory. Returns per-function metrics: cyclomatic/cognitive complexity, nesting depth, LOC, smells, maintainability score.",
|
|
1922
|
+
"input_schema": {"type": "object", "properties": {"project_dir": {"type": "string", "description": "Directory to analyze"}, "project_id": {"type": "string"}, "store": {"type": "boolean", "description": "Store metrics in DB", "default": False}}, "required": ["project_dir"]},
|
|
1923
|
+
},
|
|
1924
|
+
"code_quality_report": {
|
|
1925
|
+
"category": "builder",
|
|
1926
|
+
"module": "icdev.tools.mcp.gap_handlers",
|
|
1927
|
+
"handler": "handle_code_quality_report",
|
|
1928
|
+
"description": "Get code quality trend report for a project. Shows maintainability over time, complexity distribution, and smell density.",
|
|
1929
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string"}}, "required": ["project_id"]},
|
|
1930
|
+
},
|
|
1931
|
+
# ============================================================
|
|
1932
|
+
# PLATFORM ONE / IRON BANK (Phase 57, D350, 2 tools)
|
|
1933
|
+
# ============================================================
|
|
1934
|
+
"ironbank_generate": {
|
|
1935
|
+
"category": "compliance",
|
|
1936
|
+
"module": "icdev.tools.mcp.gap_handlers",
|
|
1937
|
+
"handler": "handle_ironbank_generate",
|
|
1938
|
+
"description": "Generate Platform One / Iron Bank hardening manifest (hardening_manifest.yaml) and container approval record for DoD Iron Bank submission.",
|
|
1939
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string", "description": "Project UUID"}, "project_dir": {"type": "string", "description": "Project source directory (optional, for language detection)"}, "output_dir": {"type": "string", "description": "Output directory for artifacts (optional)"}}, "required": ["project_id"]},
|
|
1940
|
+
},
|
|
1941
|
+
"ironbank_validate": {
|
|
1942
|
+
"category": "compliance",
|
|
1943
|
+
"module": "icdev.tools.mcp.gap_handlers",
|
|
1944
|
+
"handler": "handle_ironbank_validate",
|
|
1945
|
+
"description": "Validate existing Iron Bank hardening manifest against required fields and Iron Bank submission requirements.",
|
|
1946
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string", "description": "Project UUID"}, "manifest_path": {"type": "string", "description": "Path to hardening_manifest.yaml (optional)"}}, "required": ["project_id"]},
|
|
1947
|
+
},
|
|
1948
|
+
"eu_ai_act_classify": {
|
|
1949
|
+
"category": "compliance",
|
|
1950
|
+
"module": "icdev.tools.mcp.gap_handlers",
|
|
1951
|
+
"handler": "handle_eu_ai_act_classify",
|
|
1952
|
+
"description": "Run EU AI Act (Regulation 2024/1689) risk classification and compliance assessment. Maps 12 high-risk requirements to ICDEV controls via ISO 27001 bridge.",
|
|
1953
|
+
"input_schema": {"type": "object", "properties": {"project_id": {"type": "string", "description": "Project UUID"}, "project_dir": {"type": "string", "description": "Project directory path (optional)"}}, "required": ["project_id"]},
|
|
1954
|
+
},
|
|
1955
|
+
"runtime_feedback_collect": {
|
|
1956
|
+
"category": "builder",
|
|
1957
|
+
"module": "icdev.tools.mcp.gap_handlers",
|
|
1958
|
+
"handler": "handle_runtime_feedback_collect",
|
|
1959
|
+
"description": "Collect runtime feedback from test results. Parses JUnit XML or pytest stdout and correlates test results back to source functions.",
|
|
1960
|
+
"input_schema": {"type": "object", "properties": {"xml_path": {"type": "string", "description": "Path to JUnit XML file"}, "project_id": {"type": "string"}, "run_id": {"type": "string"}}, "required": ["xml_path"]},
|
|
1961
|
+
},
|
|
1962
|
+
}
|
|
1963
|
+
|
|
1964
|
+
|
|
1965
|
+
RESOURCE_REGISTRY = {
|
|
1966
|
+
"projects://list": {
|
|
1967
|
+
"name": "Project List",
|
|
1968
|
+
"description": "List of all ICDEV projects",
|
|
1969
|
+
"module": "icdev.tools.mcp.core_server",
|
|
1970
|
+
"handler": "handle_resource_projects_list",
|
|
1971
|
+
"mime_type": "application/json",
|
|
1972
|
+
},
|
|
1973
|
+
"projects://{id}/status": {
|
|
1974
|
+
"name": "Project Status",
|
|
1975
|
+
"description": "Detailed status for a specific project",
|
|
1976
|
+
"module": "icdev.tools.mcp.core_server",
|
|
1977
|
+
"handler": "handle_resource_project_status",
|
|
1978
|
+
"mime_type": "application/json",
|
|
1979
|
+
},
|
|
1980
|
+
"marketplace://catalog": {
|
|
1981
|
+
"name": "Marketplace Catalog",
|
|
1982
|
+
"description": "Published marketplace assets",
|
|
1983
|
+
"module": "icdev.tools.mcp.marketplace_server",
|
|
1984
|
+
"handler": "handle_catalog_resource",
|
|
1985
|
+
"mime_type": "application/json",
|
|
1986
|
+
},
|
|
1987
|
+
"marketplace://pending-reviews": {
|
|
1988
|
+
"name": "Pending Reviews",
|
|
1989
|
+
"description": "Marketplace assets awaiting review",
|
|
1990
|
+
"module": "icdev.tools.mcp.marketplace_server",
|
|
1991
|
+
"handler": "handle_pending_resource",
|
|
1992
|
+
"mime_type": "application/json",
|
|
1993
|
+
},
|
|
1994
|
+
"observability://config": {
|
|
1995
|
+
"name": "Observability Configuration",
|
|
1996
|
+
"description": "Current observability tracing configuration (backend, sampling, retention, content policy)",
|
|
1997
|
+
"module": "icdev.tools.mcp.observability_server",
|
|
1998
|
+
"handler": "config_resource_handler",
|
|
1999
|
+
"mime_type": "application/json",
|
|
2000
|
+
},
|
|
2001
|
+
"observability://stats": {
|
|
2002
|
+
"name": "Observability Statistics",
|
|
2003
|
+
"description": "Live trace, provenance, and SHAP statistics",
|
|
2004
|
+
"module": "icdev.tools.mcp.observability_server",
|
|
2005
|
+
"handler": "stats_resource_handler",
|
|
2006
|
+
"mime_type": "application/json",
|
|
2007
|
+
},
|
|
2008
|
+
}
|