Nipmod

MCP

Connect Nipmod to agents

Run the CLI as MCP for search, view, trust reports, install and update plans, claim proof, verify, audit, SBOM and explain.

Default safe

Hosts can ask for package facts, exact metadata, trust reports and install plans. They cannot add or install through MCP.

Unsigned preview

publish_plan previews package metadata without remote writes and without local signing.

Claim proof

claim_verify checks Gitlawb owner proof. package_patch returns files only and never opens remote PRs.

Proof first

Every registry answer keeps the same digest, signature, transparency and witness evidence as the CLI.

Explicit roots

Custom transparency or advisory roots require an opt in flag inside the tool call.

Tools

Exact tool contract

nipmod.search

read only

nipmod.view

read only

nipmod.inspect

read only

nipmod.install_plan

read only

nipmod.update_plan

read only

nipmod.publish_plan

gated dry run

nipmod.claim_verify

read only

nipmod.claim_index

read only

nipmod.package_patch

read only

nipmod.verify

read only

nipmod.audit

read only

nipmod.sbom

read only

nipmod.explain

read only

printf '{"jsonrpc":"2.0","id":1,"method":"initialize","params":{"protocolVersion":"2025-11-25","capabilities":{},"clientInfo":{"name":"smoke","version":"1.0.0"}}}\n{"jsonrpc":"2.0","id":2,"method":"tools/list"}\n' | nipmod mcp serve
Search

Search

{"jsonrpc":"2.0","id":3,"method":"tools/call","params":{"name":"nipmod.search","arguments":{"query":"gitlawb"}}}
Plan install

Plan install

{"jsonrpc":"2.0","id":4,"method":"tools/call","params":{"name":"nipmod.install_plan","arguments":{"specifier":"gitlawb-repo-reader"}}}
Verify claim

Verify claim

{"jsonrpc":"2.0","id":5,"method":"tools/call","params":{"name":"nipmod.claim_verify","arguments":{"repo":"gitlawb://did:key:z6Mk.../repo"}}}
Audit

Audit

{"jsonrpc":"2.0","id":6,"method":"tools/call","params":{"name":"nipmod.audit","arguments":{"online":true}}}

Hosts

One local server. Three agent tools.

Codex

~/.codex/config.toml
codex mcp add nipmod -- nipmod mcp serve
[mcp_servers.nipmod]
command = "nipmod"
args = ["mcp", "serve"]

Claude Code

.mcp.json
claude mcp add --transport stdio --scope project nipmod -- nipmod mcp serve
{
  "mcpServers": {
    "nipmod": {
      "type": "stdio",
      "command": "nipmod",
      "args": ["mcp", "serve"],
      "env": {}
    }
  }
}

OpenCode

opencode.json
Create opencode.json
{
  "$schema": "https://opencode.ai/config.json",
  "mcp": {
    "nipmod": {
      "type": "local",
      "command": ["nipmod", "mcp", "serve"],
      "enabled": true
    }
  }
}