You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
- README: add stack files section with mcpm.yaml example, 4 new commands
in command table, update agent mode to 9 tools
- ARCHITECTURE: add stack/ module, export/lock/up/diff commands, update
test count to 812+
- CLAUDE.md: add V1.3 shipped section with all stack file features,
update tool count and command list
- TODOS: mark #3 (backup) as resolved, add #15 (secret storage)
- Bump version to v0.3.0
|`mcpm serve`| Start mcpm as an MCP server (stdio transport) |
159
190
@@ -174,7 +205,7 @@ mcpm can run as an MCP server itself, letting AI agents search, install, and aud
174
205
}
175
206
```
176
207
177
-
This exposes 8 tools: `mcpm_search`, `mcpm_install`, `mcpm_info`, `mcpm_list`, `mcpm_remove`, `mcpm_audit`, `mcpm_doctor`, and `mcpm_setup`.
208
+
This exposes 9 tools: `mcpm_search`, `mcpm_install`, `mcpm_info`, `mcpm_list`, `mcpm_remove`, `mcpm_audit`, `mcpm_doctor`, `mcpm_setup`, and `mcpm_up`.
178
209
179
210
The `mcpm_setup` tool takes a natural language description like "filesystem and GitHub" and handles everything: search, trust scoring, install. One tool call to assemble a working MCP toolchain.
**Resolution:** Implemented in BaseAdapter.writeAtomic (base.ts:49). Writes .bak file before every atomic write. mcpm up takes a single .bak snapshot before batch starts (up.ts:223).
27
24
28
25
### 4. Cross-Platform Config Paths
29
26
**Priority:** P1
@@ -63,6 +60,13 @@
63
60
64
61
## Post-V1
65
62
63
+
### 15. Encrypted Secret Storage for Stack Files
64
+
**Priority:** P2
65
+
**What:** Investigate alternatives to plaintext env var storage in client config files. Options: OS keychain integration, encrypted .env files, reference-only storage (pointer to secret manager).
66
+
**Why:** Stack files scale team-wide. Every `mcpm up` writes secrets as plaintext JSON to client configs. With 5+ servers each needing API keys, that's 5+ plaintext secrets per developer per IDE.
67
+
**Context:** Current approach (plaintext + chmod 600) is the npm/pip norm. But mcpm positions as a security tool. Plaintext secrets in 4 config files per machine is inconsistent with that positioning. Not blocking for V1.3 but matters for enterprise adoption.
0 commit comments