Quickstart
Overview
Section titled “Overview”The server exposes 20 instruction tools as mission verbs. You invoke one tool with a natural-language request; the server internally orchestrates the right skills, selects models based on workload profiles, and returns structured advisory output.
All tools share the same input schema:
{ request: string; // required — describe what you want context?: string; // optional — additional background options?: object; // optional — tool-specific overrides}Your First Task
Section titled “Your First Task”-
Start a new session with Bootstrap
The
task-bootstraptool orients the agent, loads codebase context, and auto-chains to the right downstream tool:Use task-bootstrap to start a new task: I want to add HMAC signing to thesession token issuer in src/infrastructure/session-manager.ts -
Let Bootstrap route you
Bootstrap analyzes the request and auto-chains to
feature-implement(new capability on existing code = implement). No manual tool selection needed. -
Design first (optional but recommended)
For non-trivial features, run
system-designbeforefeature-implement:Use system-design to design the HMAC signing approach for session tokens.Constraints: must be compatible with existing SessionManager interface,use @noble/hashes, zero new dependencies. -
Implement
Use feature-implement to implement HMAC session token signing.Context: design decision: use HMAC-SHA256 with a 32-byte secret fromenv SESSION_HMAC_SECRET. Sign the session ID + expiry timestamp. -
Verify
The tool auto-chains to
test-verifyandcode-reviewon completion.
Common Workflows
Section titled “Common Workflows”Debugging a failing test
Section titled “Debugging a failing test”Use issue-debug to find why this test is failing:Error: Expected 200, got 401 in POST /api/session/refreshStack trace: [paste here]issue-debug uses cheap model class, auto-chains to test-verify → code-refactor → policy-govern.
Reviewing for security
Section titled “Reviewing for security”Use code-review to audit src/tools/skill-handler.ts for security issues,focusing on input validation and prompt injection vectors.code-review uses reviewer model class, chains to policy-govern → physics-analysis.
Architecture decision
Section titled “Architecture decision”Use system-design to decide between xstate v4 and v5 for the workflowstate machine. Constraints: ESM only, TypeScript strict, no runtime LLM calls.Governance audit
Section titled “Governance audit”Use policy-govern to audit the session management layer for OWASP Top-10compliance. Focus on: injection, broken authentication, insecure design.Physics analysis (advanced)
Section titled “Physics analysis (advanced)”Use physics-analysis to apply quantum measurement collapse analysis tothe skill-handler dispatch path. Evaluate coupling as superposition collapse.Meta-Routing for Complex Tasks
Section titled “Meta-Routing for Complex Tasks”When you have a compound task that spans multiple tools, use meta-routing:
Use meta-routing to decide how to handle: I need to add a new `graph-export`tool that writes the skill graph as JSON, add tests, review security, anddocument it. What is the right sequence of tools?meta-routing emits a sequenced call plan — you then execute each step.
Next Steps
Section titled “Next Steps”- MCP Configuration — environment variables and orchestration config
- Tool Reference — all 20 tools with triggers and chain graphs
- Skill System Explained — how skills work beneath the tools