Karukia
KARUKIA MCP Server v3.0 β AI-powered development methodology with 26 tools, 19 skills, 1797+ checkpoints across 11 audit dimensions. Works with any AI platform via MCP protocol.
Ask AI about Karukia
Powered by Claude Β· Grounded in docs
I know everything about Karukia. Ask me about installation, configuration, usage, or troubleshooting.
0/500
Reviews
Documentation
KARUKIA MCP
βββ βββ ββββββ βββββββ βββ ββββββ βββ βββ ββββββ
βββ βββββββββββββββββββββββ ββββββ ββββ βββββββββββ
βββββββ βββββββββββββββββββ ββββββββββ βββββββββββ
βββββββ βββββββββββββββββββ ββββββββββ βββββββββββ
βββ ββββββ ββββββ βββββββββββββββ βββ ββββββ βββ
βββ ββββββ ββββββ βββ βββββββ βββ βββ ββββββ βββ
AI methodology for highly regulated industries Β· Made in Guadeloupe π¬π΅
The complete AI-assisted development methodology, delivered via MCP.
Latest: v3.1.0 β 27 tools, 20 skills, 1800+ checkpoints across 11 audit dimensions. Multi-AI platform support.
Built for Claude Code and OpenAI Codex. Compatible with any MCP client.
Using KARUKIA for your team or company? A commercial license is required. See Commercial Licensing below or contact contact@karukia.com
What is KARUKIA?
KARUKIA is a structured development methodology built around specialized AI personas. Each persona (Neo for security, Jeffrey for architecture, Viper for pentesting, Opo for quality...) comes with its own workflow, guard rails, and knowledge base.
When you call a KARUKIA tool, the MCP server returns a complete prompt β persona identity, standardized workflow, coverage tracking, checklists, templates β that transforms your AI assistant into that specialist for the session.
You: "Run a security audit"
-> AI calls neo tool
-> MCP returns:
GUARD (non-negotiable obligations)
+ Neo persona (identity, style, expertise)
+ WORKFLOW (6-step standardized process)
+ COVERAGE (load previous scan manifest, prioritize unscanned files)
+ Checklists (445 security controls inline)
+ AGENTS (multi-agent parallel exploration)
-> AI becomes Neo, follows the methodology, produces structured findings
-> Coverage manifest written: 67% scanned β next session picks up where this one left off
The 12 Audit Dimensions
SECURITY β Neo (445 pts) "Is my code secure?"
QUALITY β Certix (369 pts) "Is my app well-built?"
OFFENSIVE β Viper (245+ tests) "How would a hacker break in?"
DUE DILIGENCEβ deep_review (12ax) "Is this codebase investment-ready?"
TS β ts_quality (118) "Is my TypeScript clean?"
CSS β css_quality (55) "Is my design system maintainable?"
ARCHI β archi (70) "Is my architecture sound?"
TESTS β test_coverage (68) "Am I testing the right things?"
PERF β perf (90) "Where are the bottlenecks?"
DEBT β debt (55) "What's slowing us down?"
HDS/ISO β audit_expert (200+)"Am I ready for certification?"
SCAN β karukia_scan "Run all 11 dimensions at once"
Quick Start
Prerequisites: Node.js 22 or later.
Step 1 β Add KARUKIA to your project
Create or edit .mcp.json at the root of your project:
{
"mcpServers": {
"karukia": {
"command": "npx",
"args": ["karukia-mcp"]
}
}
}
Note: If the file already exists and has other MCP servers, just add the
"karukia"key inside the existing"mcpServers"object.
Step 2 β Restart your AI client
Restart Claude Code (/quit then relaunch) or your IDE. All 27 KARUKIA tools are now available.
On first launch,
npxdownloads the package automatically (~175 KB). Subsequent launches use the cached version.
Step 3 β Configure your project
Tell your AI:
"karukia install"
KARUKIA scans your project, detects your stack, and generates configuration files (security scope, CLAUDE.md, memory structure).
Step 4 β Start working
Just tell your AI what you need in natural language, always through the auto orchestrator:
"karukia auto: add user authentication" "karukia auto: audit security" "karukia auto: run a pentest"
auto is the recommended entry point for everything β it analyzes your request and routes to the right specialists automatically (Jeffrey β Neo β Opo, or Neo alone, or Viper, etc.).
Tip: You only need two commands:
karukia install(once) thenkarukia auto+ your request (always).autohandles the rest. For advanced use, skills can also be called directly: "karukia neo", "karukia viper". Say "karukia start" anytime for a full guide.
Where to put the config
| Client | File | Scope |
|---|---|---|
| Claude Code CLI | .mcp.json at project root | This project only |
| Claude Code CLI | ~/.claude.json (home directory) | All your projects |
| Claude Desktop | claude_desktop_config.json | Global |
| Cursor | .cursor/mcp.json at project root | This project only |
| Windsurf | MCP settings panel | Global |
Global Installation (optional)
If you want KARUKIA available in all your projects without adding .mcp.json each time:
npm install -g karukia-mcp
Then add to your global AI config (~/.claude.json for Claude Code):
{
"mcpServers": {
"karukia": {
"command": "karukia-mcp"
}
}
}
27 Tools
Essential (start here)
| Tool | Description |
|---|---|
install | [FIRST STEP] Configure KARUKIA for your project β run once |
auto | [MAIN TOOL] Describe what you need β KARUKIA routes to the right skills |
start | Quick-start guide β explains all skills at 3 progressive levels |
Core Skills (AI Personas)
Each skill returns a complete prompt that transforms your AI into a specialist.
| Tool | Persona | What it does |
|---|---|---|
neo | Security Auditor | Defensive audit against 6 frameworks (OWASP, HDS, ISO 27001, SOC 2, PCI-DSS, HIPAA) |
viper | Pentest Brigade | Offensive testing with 16 agents, CVSS v4 scoring, MITRE ATT&CK mapping |
jeffrey | Full-Stack Architect | Feature implementation with TDD and security validation |
opo | Quality Validator | Web quality against 369 Certix rules |
audit_certix | Quality Auditor | Deep Certix compliance audit with 5 profiles |
ebios_rm_audit | Risk Analyst | EBIOS Risk Manager methodology (ANSSI) β formal risk analysis |
security_hardening | Hardening Planner | Security improvement chantiers |
doc_refactor | Doc Auditor | Documentation accuracy audit vs actual code |
deep_review | Due Diligence Lead | 12-axis technical review: code, archi, scalability, costs, security, resilience, tests, DX, frontend perf, regulatory, AI, maintainability |
Dimensional Skills (v3.0 New)
| Tool | Checkpoints | What it does |
|---|---|---|
ts_quality | 118 | TypeScript audit β type safety, strict config, generics, async patterns |
css_quality | 55 | CSS/Design System β maintainability, accessibility, metrics |
archi | 70 | Architecture β module structure, coupling, layering |
test_coverage | 68 | Test inventory β frontend/backend coverage quality |
perf | 90 | Performance β frontend, backend, build/bundle |
debt | 55 | Technical debt β dead code, dependency health, code smells |
karukia_scan | 1800+ | Global scan β all 11 dimensions in parallel |
audit_expert_hds | 200+ | Expert HDS 2.0/ISO 27001 β 8 domains, certification readiness |
change_report | β | Change management report (ISO 27001 A.8.32) |
Utilities
| Tool | Description |
|---|---|
list_checklists | Browse all 22 checklists by category |
suggest_checklists | Describe your project β get a prioritized audit plan |
generate_report | Compile audit results into a scored Markdown report |
Memory & Config
| Tool | Description |
|---|---|
init_memory | Initialize KARUKIA memory structure in a project |
get_session_template | Get pre-filled session templates for any skill |
get_config_template | Get configuration templates (security scope, CLAUDE.md, analytics) |
22 Checklists
Defensive Security (Neo) β 6 checklists, 445 controls
| Checklist | Points | Scope |
|---|---|---|
| OWASP Security Baseline | 62 | Every web app |
| HDS 2.0 | 52 | Health data, France |
| ISO 27001:2022 | 93 | Enterprise ISMS |
| SOC 2 Type II | 74 | SaaS, US market |
| PCI-DSS v4.0 | 97 | Payment processing |
| HIPAA | 67 | Health data, US |
Web Quality (Certix) β 5 profiles, 369 rules
369 rules across 5 profiles: DEV (development), UX (user experience), CONT (content), OPS (operations), JUR (legal/compliance).
Certix is KARUKIA Solutions' own web quality referential, built for modern web applications.
Offensive Security (Viper) β 4 checklists, 245+ tests
| Checklist | Tests | Scope |
|---|---|---|
| OWASP WSTG v5 | 100 | Web penetration testing |
| Cloud Platform | 80+ | Firebase, GCP, AWS, Azure |
| Healthcare | 50+ | PHI, encryption, medical data |
| Attack Scenarios | 15+ | PTES templates, MITRE ATT&CK |
Dimensional Quality (New in v3.0) β 7 checklists, 656+ checkpoints
| Checklist | Points | Scope |
|---|---|---|
| TypeScript Quality | 118 | Type safety, strict config, patterns |
| CSS / Design System | 55 | Maintainability, a11y, metrics |
| Architecture | 70 | Module structure, coupling, layering |
| Test Coverage | 68 | Frontend/backend inventory, quality |
| Performance | 90 | Frontend, backend, build/bundle |
| Technical Debt | 55 | Dead code, deps, code smells |
| Expert HDS/ISO 27001 | 200+ | Certification readiness β 8 domains |
Multi-AI Platform Support
KARUKIA is built for and tested with Claude Code and OpenAI Codex. It is compatible with any MCP client (Cursor, Windsurf, Copilot, etc.), though those have not been tested with the client_id parameter.
All skill tools accept an optional client_id parameter: "claude" (default), "codex", or "generic". The entire prompt adapts:
| What adapts | Claude (client_id: "claude") | Codex (client_id: "codex") | Generic |
|---|---|---|---|
| Sub-agent orchestration | Task API with model hints | Natural language instructions | Natural language |
| Config file generated | CLAUDE.md | CODEX-PROJECT.md | AI-CONFIG.md |
| Model references | Opus / Sonnet | Generic model names | Generic model names |
| Memory root | karukia/ | karukia/ | karukia/ |
This is the first MCP methodology server with true multi-AI platform abstraction. One npm package, one .mcp.json entry, full methodology regardless of the AI behind it.
Iterative Coverage Tracking (New in v3.1)
Every audit skill tracks which files have been analyzed across sessions. No file in your codebase is left behind.
How it works:
- Scan 1 -- KARUKIA analyzes your codebase, covers ~40% of in-scope files. Writes a coverage manifest to
karukia/memory/coverage/{skill}-latest.json. - Scan 2 -- Reads the previous manifest, skips already-analyzed files, covers the next ~40%. Cumulative: 80%.
- Scan 3 -- Picks up the remaining 20%. Status: COMPLETE.
After any scan, the manifest records exactly which files were analyzed, which were skipped, and what findings were discovered -- with severity counts. When files are modified after a complete scan, only the changed files are re-analyzed.
--- COVERAGE neo ---
Scope total : 120 files
This scan : 48 files analyzed
Cumulative : 96 / 120 (80%)
Status : PARTIAL
Remaining -- next scan starts with:
- src/auth/session.ts
- src/api/handlers/patient.ts
- ... (24 more)
---
Coverage scopes are resolved from project-specific config (karukia/config/coverage-scopes.json, generated by install) or from the skill's default globs. This means a TypeScript audit scans **/*.ts files, a CSS audit scans **/*.css and **/*.scss, and so on.
Standardized 6-Step Workflow (New in v3.1)
Every audit skill follows the same structured workflow:
Step 0 : PREPARATION -- Create session, load references
Step 0.5 : COVERAGE LOADING -- Read previous manifest, prioritize unscanned files
Step 1 : EXPLORATION -- Multi-agent parallel scanning (each agent covers a scope)
Step 2 : ANALYSIS -- Synthesize discoveries, identify required actions
Step 3 : EXECUTION -- Execute action plan, update progress after each action
Step 4 : VALIDATION -- Lint, build, test. Fix ALL issues before closure
Step 4.5 : COVERAGE WRITE -- Write coverage manifest for next session
Step 5 : CLOSURE -- Finalize session files, update trackers and knowledge base
Key workflow features:
- Rule of 2 actions: After every 2 read operations, findings MUST be written to
findings.md. Context is never lost, even if the session is interrupted. - 3-attempt protocol: Diagnose and fix -- alternative approach -- rethink assumptions -- escalate to user. No blind retries.
- Knowledge persistence: Lessons learned and reusable patterns are saved to
karukia/memory/knowledge/between sessions. The methodology gets smarter over time.
Usage Examples
Full security audit
"Run a security audit on my project"
Your AI calls neo β becomes the Neo security auditor β follows the methodology β produces structured findings with severity, file:line references, and remediation steps.
Build a feature with guardrails
"karukia jeffrey: implement user authentication"
Your AI calls jeffrey β becomes the Jeffrey architect β implements with TDD, then chains to Neo for security validation (rejection loop: if Neo rejects, Jeffrey fixes, max 3 iterations).
Pentest your app
"karukia viper"
Your AI calls viper β deploys the Brigade methodology with 16 specialized agents across Recon, Surface Analysis, and Exploitation phases.
Due diligence on a codebase (New in v3.1)
"karukia deep_review"
Your AI calls deep_review -- deploys a brigade of 6 parallel agents -- each covers 2 of the 12 axes (code quality, architecture, scalability, costs, security, resilience, tests, DX, frontend perf, regulatory compliance, AI patterns, maintainability). Produces a scorecard with grades A+ to F per axis, a global score out of 120, and a prioritized action plan. Use it before an investment, a CTO takeover, or a major refactor.
Orchestrate everything
"karukia auto: add a logout button and audit security"
Your AI calls auto β analyzes the request β routes to the right skill(s) β manages the chain.
Documentation
- Livre Blanc (FranΓ§ais) β Document technique dΓ©taillΓ© : architecture, mΓ©thodologie, cas d'usage
- Whitepaper (English) β Technical deep-dive: architecture, methodology, use cases
About
KARUKIA is developed by KARUK IA Solutions, a B2B SaaS studio specializing in regulated industries (healthcare, finance, pharma), based in Guadeloupe. π¬π΅
KARUKIA was built while developing a healthcare SaaS application for HDS 2.0 and ISO 27001 certification. The methodology grew out of a real question: what does it actually take to get certified, from day one of development? The checklists reflect what a real auditor asks, point by point β not theory.
The project is built around three principles:
- Separation of concerns β Security, quality, and implementation are separate disciplines handled by separate AI personas.
- Formal checkpoints over gut feeling β 1800+ documented checkpoints beat "I think it's fine."
- Defense in depth β Defensive audit first, quality validation second, offensive testing last.
Made in Guadeloupe β AI doesn't replace the expert, it frees them.
Commercial Licensing
KARUKIA MCP is licensed under the Business Source License 1.1 (BUSL-1.1).
Free use (no license needed)
- Personal projects and individual developers
- Educational institutions, students, research
- Non-profit organizations
Commercial license required
If your company or consulting firm uses KARUKIA for production work or deploys it across developer teams, a commercial license is required.
| Plan | Price (EUR HT/year) | Team size |
|---|---|---|
| Starter | 5 000 | Up to 10 developers |
| Business | 12 000 | Up to 50 developers |
| Enterprise | 20 000 | Unlimited developers + priority support |
All plans include: full access to all 27 tools, 20 skills, 1800+ checkpoints across 11 audit dimensions, and all updates for the license duration. Annual license, renewable.
Contact: contact@karukia.com
A single external security audit costs 10-15k EUR. KARUKIA gives your entire team the methodology to run audits continuously β for less than the price of one.
Change License
On April 2, 2036, the Licensed Work will automatically convert to the Apache License 2.0.
