Integration MCP Proxy
Proxy integration: forward Chorus operations to any external MCP server (GitHub, Postgres, Filesystem, Exa, etc.)
Ask AI about Integration MCP Proxy
Powered by Claude Β· Grounded in docs
I know everything about Integration MCP Proxy. Ask me about installation, configuration, usage, or troubleshooting.
0/500
Reviews
Documentation
Chorus
Federated workflow runtime with crowd-sourced integration maintenance.
n8n for the agent era β self-hosted, AI-repaired, signed patches propagate across the fleet.
What it is
Chorus is a workflow engine you run on your own box. It fires workflows on webhooks, cron, or manual triggers, and calls out to the SaaS services you use (Slack, Stripe, Linear, Postgres, Gmail, etc.).
When an integration breaks β because a vendor changed their API, an auth scheme rotated, or a rate limit appeared β Chorus doesn't just surface the error. It tries to fix it:
- A local repair agent reads the error, fetches the latest vendor docs, and proposes a patch.
- The patch is validated against recorded HTTP snapshots before anything touches production.
- If valid, the patch is signed and submitted to the shared registry.
- Other users automatically pick up the fix β gated by a canary ladder so one bad patch doesn't brick the fleet.
Every user's failure becomes a permanent regression test, forever. That's the moat.
Architecture
ββ your machine ββββββββββββββββββββββββββββββββββββββββββββ
β β
β runtime ββΊ integration ββΊ external API β
β β β β
β β ββββΊ (on failure) β
β βΌ β
β reporter βββΊ signature + redaction β
β β β
β βΌ β
β repair-agent βββΊ fetches docs, proposes patch β
β β β
β βΌ β
β snapshot-test βββΊ validates against recorded traffic β
β β β
βββββββΌβββββββββββββββββββββββββββββββββββββββββββββββββββββ
β (signed patch)
βΌ
ββ shared registry (git repo + signatures) βββββββββββββββββ
β β
β canary ladder: 1 β 10 β 100 β fleet β
β reputation weighted β
β kill switch per-patch β
β β
ββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
β (propagates fixes)
βΌ
everyone else's runtime
Packages
packages/coreβ shared types, Zod schemas, error signature formatpackages/runtimeβ workflow execution engine (cron, webhooks, retries, SQLite state)packages/registryβ signed patch registry client/serverpackages/reporterβ failure capture + PII redaction + signature extractionpackages/repair-agentβ Claude-powered patch proposer + validatorpackages/cliβ thechorusCLI
Integrations
integrations/http-genericβ make any HTTP callintegrations/slack-sendβ send a Slack message (reference integration)
More integrations are added as community patches via the registry.
Design principles
- Self-hosted, credentials never leave your box. The registry only receives redacted error signatures, never payloads.
- Fail loudly, fix automatically. Silent failures are the enemy; Chorus assumes you want the incident surface, not hidden.
- One integration per user, not 400 per company. Chorus maintains the ~20 integrations you actually use. The long tail is community-maintained.
- Bounded blast radius. Every patch ships through static analysis, sandbox execution, differential testing, canary ladder. One bad patch hits 1 user, not 10k.
- AI is a tool, not a governor. The repair agent proposes; the test suite + canary ladder + user approval decide.
Status
Early. See docs/ARCHITECTURE.md for the full design and docs/ROADMAP.md for what's coming.
No demo video yet β the author's laptop is currently OOM from 24 concurrent Claude Code instances running in terminal tabs. Once RAM is reclaimed, a proper walkthrough lands here.
Install
npm install -g @delightfulchorus/cli
chorus init
That's it. chorus init scaffolds a ./chorus/ directory in the current folder, generates an Ed25519 keypair + AES encryption key, and creates an example workflow. Then chorus run starts the runtime.
Other install shapes
Zero-install one-liner β runs once from npm's cache, nothing left on disk:
npx @delightfulchorus/cli init
Per-project (pinned version, recommended for teams):
npm install --save-dev @delightfulchorus/cli
npx chorus init
The CLI binary is always chorus. The scoped npm name (@delightfulchorus/cli) is only the package identifier β you never type it after a global install.
Running the federation side
The client-side packages in packages/* are half the story. Operators who want to host a patch registry (org-private or public) should start at federation/RUNBOOK.md β it covers the registry repo template, GitHub Actions workflows, CDN revocation-list tooling, and the 5-minute incident playbook.
Quickstart
See QUICKSTART.md.
Documentation
- ARCHITECTURE.md β system design, data model, trust boundaries
- ROADMAP.md β what's coming, with triggers and concrete steps
- CREDENTIALS_ANALYSIS.md β typed credential catalog (n8n-inspired)
- MCP_GUIDE.md β auto-MCP per integration for any agent
- EVENT_TRIGGERS.md β event triggers +
step.waitForEvent - UI_GENERATOR.md β agent-generated dashboards
- federation/RUNBOOK.md β operator standup for hosting a registry
- CHANGELOG.md β release notes
License
MIT
