Wormhole
Logs file edits, decisions, and commands so agents stay in sync, avoid conflicts, and pick up where others left off.
Wormhole 🌀
Collaborative AI Workflow Manager
Keep your AI coding agents in sync. Wormhole gives Claude Code, GitHub Copilot, and Cursor a shared memory layer—so when you switch tools mid-task, nothing gets lost.
Works across:
- 🔀 Multiple subagents within the same tool (e.g., parallel Claude tasks)
- 🔄 Different AI tools entirely (Claude ↔ Copilot ↔ Cursor)
⚠️ Disclaimer: Wormhole is an early-stage project. APIs and behavior may change, and there may be rough edges. It’s built in the open and evolving fast based on real developer feedback.
Features
- Universal Logging - Single
logtool for any action type - Event Tagging - Categorize events with tags for better organization
- Session Management - Named work sessions with isolation
- Token Optimized - Compact output, delta queries, relevance filtering
- Conflict Detection - Know when agents touch the same files
- Stale Event Rejection - Automatically filters out file edits that no longer exist in the current project state
- Web UI Visualization - View sessions, timeline events, and insights with
npx wormhole ui - Knowledge Capture & Search - Save decisions/pitfalls and surface them with intent-aware search
Quick Start
Try instantly with npx (no installation required):
npx wormhole-mcp
Minimal Workflow (token-optimized)
start_session- Pull context:
search_project_knowledge+get_recent - Before edits:
check_conflicts - During work:
logevery file_edit/cmd_run/decision/test_result/todos - Capture learnings:
save_knowledge(decision/pitfall/convention/constraint) - Finish:
end_sessionwith summary
start_session({ project_path: ".", agent_id: "copilot", name: "fix-auth" })
search_project_knowledge({ project_path: ".", intent: "debugging", query: "auth" })
get_recent({ project_path: "." })
check_conflicts({ project_path: ".", files: ["src/auth.ts"] })
log({ action: "file_edit", agent_id: "copilot", project_path: ".", content: { file_path: "src/auth.ts", description: "Fix timeout" } })
save_knowledge({ project_path: ".", knowledge_type: "decision", title: "Use async DB client", content: "Prevents blocking" })
end_session({ session_id: "abc-123", summary: "Auth fixed; tests green" })
Web UI
Visualize your agent activity with the built-in web interface:
# Start the UI server (default port: 3000)
npx wormhole ui
# Or specify a custom port
npx wormhole ui 8080
Then open http://localhost:3000 in your browser to see:
- 📊 Dashboard - Stats on events, sessions, and agents
- ⏱️ Timeline - Visual event stream with filtering
- 📋 Sessions - All work sessions with details
- 📈 Insights - Action types and tag analytics
Installation
Option 1: npx (Recommended)
Claude Code — Add to ~/.claude/claude_code_config.json:
{
"mcpServers": {
"wormhole": {
"command": "npx",
"args": ["-y", "wormhole-mcp"]
}
}
}
GitHub Copilot — Add to .vscode/mcp.json in your project:
{
"servers": {
"wormhole": {
"command": "npx",
"args": ["-y", "wormhole-mcp"]
}
}
}
Option 2: Global Install
npm install -g wormhole-mcp
Then use "command": "wormhole-mcp" in your config.
Option 3: From Source
git clone https://github.com/fatmali/wormhole.git
cd wormhole
npm install
npm run build
Use "command": "node" with "args": ["/path/to/wormhole/dist/server.js"].
### Claude Code Plugin
For Claude Code users, there's an optional plugin that bundles the MCP server config with a skill:
```bash
# Install the plugin
claude /install-plugin ./node_modules/wormhole-mcp/plugins/wormhole
Or test locally:
claude --plugin-dir ./node_modules/wormhole-mcp/plugins/wormhole
Then invoke with /wormhole:wormhole in Claude Code.
Standalone skill (simpler):
cp -r node_modules/wormhole-mcp/skills/wormhole .claude/skills/
MCP Tools
log
Universal logging for any action type:
// Log a command
log({
action: "cmd_run",
agent_id: "claude-code",
project_path: "/path/to/project",
content: { command: "npm test", exit_code: 0 },
tags: ["testing", "ci"] // Optional: categorize events
})
// Log a file edit
log({
action: "file_edit",
agent_id: "claude-code",
project_path: "/path/to/project",
content: { file_path: "src/auth.ts", description: "Added JWT validation" },
tags: ["bugfix", "auth"]
})
// Log a decision
log({
action: "decision",
agent_id: "claude-code",
project_path: "/path/to/project",
content: { decision: "Use Zod for validation", rationale: "Already in deps" }
})
// Log test results
log({
action: "test_result",
agent_id: "claude-code",
project_path: "/path/to/project",
content: { test_suite: "auth.test.ts", status: "passed" }
})
// Log user feedback
log({
action: "feedback",
agent_id: "claude-code",
project_path: "/path/to/project",
content: { agent_suggestion: "Use async/await", user_response: "rejected", user_note: "Legacy code" }
})
// Log todos
log({
action: "todos",
agent_id: "claude-code",
project_path: "/path/to/project",
content: {
items: [
{ task: "Add input validation", status: "pending", priority: "high" },
{ task: "Write unit tests", status: "done" },
{ task: "Update README", status: "pending" }
],
context: "Auth refactor"
}
})
// Log plan output
log({
action: "plan_output",
agent_id: "claude-code",
project_path: "/path/to/project",
content: {
title: "API Authentication Design",
type: "architecture",
content: "Use JWT with refresh tokens, store in httpOnly cookies..."
}
})
Action Types:
cmd_run- Command executionsfile_edit- File modificationsdecision- Design decisions with rationaletest_result- Test outcomesfeedback- User acceptance/rejectiontodos- Task items with status trackingplan_output- Planning artifacts (design, architecture, tasks)- Any custom type you need
get_recent
Get recent activity (compact by default):
get_recent({ project_path: "/path/to/project" })
Output:
[5m] claude: npm test → ✓
[8m] cursor: edit auth.ts "Add JWT"
[12m] copilot: decided "Use Zod for validation"
[15m] claude: auth.test.ts ✓
cursor: evt_123
Options:
limit- Max events (default: 5)detail-minimal|normal|fullsince_cursor- Only new events (delta query)related_to- Filter by file pathsaction_types- Filter by action typestags- Filter by tags (e.g.,["bugfix", "feature"])
get_tags
Get all unique tags used in a project with counts:
get_tags({ project_path: "/path/to/project" })
// Output:
// tags:
// bugfix (12)
### `save_knowledge`
Persist decisions, pitfalls, conventions, or constraints so agents don’t repeat mistakes.
```javascript
save_knowledge({
project_path: "/path/to/project",
knowledge_type: "pitfall",
title: "Avoid fs.readFileSync in handlers",
content: "Blocks event loop; causes timeouts",
confidence: 0.9
})
search_project_knowledge
Intent-aware lookup of stored knowledge. Prefers types that match your intent.
search_project_knowledge({
project_path: "/path/to/project",
intent: "debugging",
query: "auth"
})
// → [{ type: "pitfall", summary: "Avoid fs.readFileSync", confidence: 0.9 }]
// feature (8) // testing (5) // auth (3)
**Options:**
- `with_counts` - Include event counts per tag (default: true)
### `check_conflicts`
Detect concurrent file edits:
```javascript
check_conflicts({ project_path: "/path/to/project" })
Stale Event Rejection
Wormhole automatically tracks and validates file edits to ensure agents never act on stale information. When a file_edit event is logged with a diff, Wormhole:
- Extracts the full patch - Stores all added/removed lines from the diff
- Validates on query - When events are retrieved via
get_recentor conflict detection, each file edit is checked against the current file state - Fuzzy matching - Uses intelligent matching to handle code that moved positions, only rejecting truly stale edits
- Auto-filters - Rejected events are automatically excluded from results
How it works
When you log a file edit:
log({
action: "file_edit",
agent_id: "claude-code",
project_path: "/path/to/project",
content: {
file_path: "src/auth.ts",
description: "Added JWT validation",
diff: `--- a/src/auth.ts
+++ b/src/auth.ts
@@ -10,6 +10,7 @@
function validateToken(token: string) {
+ const decoded = jwt.verify(token, SECRET);
return decoded;
}`
}
})
Wormhole stores the full diff in the payload. Later, when another agent queries recent events:
- File still has the change → Event is included
- Code was removed or changed → Event is silently filtered out
- Code moved to different location → Still recognized (fuzzy match)
Note: The diff field is NOT truncated (unlike other content fields), ensuring accurate validation even for large changes.
This ensures agents always work with accurate context about what's currently in the codebase.
Validation Algorithm
The patch validation uses intelligent fuzzy matching:
For Added Lines (+):
- Checks if the added code exists anywhere in the current file
- Uses normalized comparison (trimmed whitespace)
- Accepts partial matches (code that contains or is contained by the search)
- Requires 60% of added lines to match for validation
For Removed Lines (-):
- If a "removed" line still exists in the file → patch is stale
- This catches cases where a deletion was reverted
Edge Cases Handled:
- File deleted: Patch fails validation
- Code refactored: Fuzzy matching still finds the logic if it exists
- Whitespace changes: Normalized comparison ignores formatting
- Line movements: Searches entire file, not just original position
- No patch stored: Event is kept (backward compatibility)
- Already rejected: Event is skipped on subsequent queries
Performance
- Validation runs only when events are queried (lazy evaluation)
- File I/O is cached by OS for repeated reads
- Minimal overhead: ~1-5ms per file_edit event
- Database stores full diffs efficiently as TEXT columns
cleanup
Clean up events with scopes:
// Clean entire project
cleanup({ scope: "project", project_path: "/path/to/project" })
// Clean specific session
cleanup({ scope: "session", session_id: "abc-123" })
// Clean everything
cleanup({ scope: "all", force: true })
Session Management
start_session
Start a named work session:
start_session({
project_path: "/path/to/project",
agent_id: "claude-code",
name: "bugfix-auth",
description: "Fixing login timeout issue"
})
// → session started: bugfix-auth (abc-123-def)
Sessions automatically isolate context—previous events hidden from queries.
end_session
End a session with summary:
end_session({
session_id: "abc-123-def",
summary: "Fixed timeout by optimizing DB query"
})
list_sessions
View sessions:
list_sessions({ project_path: "/path/to/project" })
Output:
● bugfix-auth (2h) by claude
○ feature-payment (1d) by cursor
switch_session
Resume a previous session:
switch_session({ session_id: "xyz-789" })
Configuration
Config file: ~/.wormhole/config.json
{
"retention_hours": 24,
"max_payload_chars": 200,
"auto_cleanup": true,
"default_detail": "minimal",
"default_limit": 5
}
Note: The max_payload_chars setting truncates most content fields for display, but diff fields in file_edit events are always stored in full to enable accurate stale-event validation.
Token Optimization
Wormhole minimizes token usage for get_recent responses through four key strategies:
1. Compact Output Format (Default)
Instead of returning raw JSON, events are formatted as single-line summaries:
# Compact (default) - ~35 chars per event
[5m] claude: npm test → ✓
# vs Full JSON - ~200+ chars per event
{"id":42,"agent_id":"claude-code","action":"cmd_run","payload":"{\"command\":\"npm test\",\"exit_code\":0}","timestamp":1706621234567,"project_path":"/path/to/project","session_id":"abc-123"}
The detail parameter controls verbosity:
minimal(default) — Single-line summaries with symbols (✓/✗)normal— Multi-line with key detailsfull— Complete JSON payloads
2. Payload Truncation
Content fields are truncated to 200 characters by default (max_payload_chars config):
// Stored/displayed as:
"Added authentication middleware with JWT validation and refresh token..."
// Instead of full 2000+ char description
Exception: diff fields in file_edit events are never truncated—they're needed for stale event validation.
3. Delta Queries
Use since_cursor to fetch only events since your last query:
// First call returns events + cursor
get_recent({ project_path: "." })
// → [5 events] + cursor: evt_42
// Subsequent call returns only NEW events
get_recent({ project_path: ".", since_cursor: "evt_42" })
// → [0-2 events] instead of repeating all 5
This prevents re-sending the same context repeatedly.
4. Low Default Limits
default_limit: 5— Returns only 5 most recent events- Agents can increase with
limitparam when needed
Token Comparison
| Scenario | Without Optimization | With Optimization |
|---|---|---|
| 5 events, first query | ~500-1000 tokens | ~100 tokens |
| 5 events, delta query (2 new) | ~500-1000 tokens | ~40 tokens |
| 10 events, full detail | ~2000+ tokens | ~800 tokens |
Configuration
Adjust in ~/.wormhole/config.json:
{
"max_payload_chars": 200,
"default_detail": "minimal",
"default_limit": 5
}
Architecture
┌─────────────┐ ┌─────────────┐ ┌─────────────┐
│ Claude Code │ │ Copilot │ │ Cursor │
└──────┬──────┘ └──────┬──────┘ └──────┬──────┘
│ │ │
└────────────────┼────────────────┘
│
┌───────▼───────┐
│ Wormhole │
│ MCP Server │
└───────┬───────┘
│
┌───────▼───────┐
│ SQLite │
│ timeline.db │
└───────────────┘
Data Storage
- Database:
~/.wormhole/timeline.db - Config:
~/.wormhole/config.json - Archives:
~/.wormhole/archives/
License
MIT
संबंधित सर्वर
Alpha Vantage MCP Server
प्रायोजकAccess financial market data: realtime & historical stock, ETF, options, forex, crypto, commodities, fundamentals, technical indicators, & more
JetBrains
Work on your code with JetBrains IDEs
Adobe After Effects MCP
An MCP server that allows AI assistants to interact with Adobe After Effects.
BaseCreative MCP
A template for deploying a remote MCP server on Cloudflare Workers without authentication.
agentskill.sh
Search, discover, and install 55k+ AI agent skills for Claude Code, Cursor, Copilot, Windsurf, and more.
Skeleton UI Docs
An MCP server that exposes the Skeleton UI documentation as tools for coding agents.
BCMS MCP
Give me a one - two sentence description of the BCMS MCP # MCP The BCMS Model Context Protocol (MCP) integration enables AI assistants like Claude, Cursor, and other MCP-compatible tools to interact directly with your BCMS content. This allows you to create, read, and update content entries, manage media files, and explore your content structure—all through natural language conversations with AI. ## What is MCP? The [Model Context Protocol (MCP)](https://modelcontextprotocol.io/) is an open standard developed by Anthropic that allows AI applications to securely connect to external data sources and tools. With BCMS MCP support, you can leverage AI assistants to: - Query and explore your content structure - Create new content entries with AI-generated content - Update existing entries - Manage your media library - Get intelligent suggestions based on your content model --- ## Getting Started ### Prerequisites 1. A BCMS account with an active instance 2. An MCP key with appropriate permissions 3. An MCP-compatible client (Claude Desktop, Cursor, or any MCP client) ### Step 1: Create an MCP Key 1. Navigate to your BCMS dashboard 2. Go to Settings → MCP 3. Click Create MCP Key 4. Configure the permissions for templates you want the AI to access:GET: Read entries 5. POST: Create entries 6. PUT: Update entries 7. DELETE: Delete entries Note: Right now, MCP only supports creating, reading and updating content. ### Step 2: Configure Your MCP Client You can find full instructions for integrating BCMS with your AI tools right inside BCMS, on the MCP page. But in general, installing BCMS MCP works in a standard way: ``` { "mcpServers": { "bcms": { "url": "https://app.thebcms.com/api/v3/mcp?mcpKey=YOUR_MCP_KEY" } } } ``` ## Available Tools Once connected, your AI assistant will have access to the following tools based on your MCP key permissions: ### Content Discovery #### list_templates_and_entries Lists all templates and their entries that you have access to. This is typically the first tool to call when exploring your BCMS content. Returns: - Template IDs, names, and slugs - Entry IDs with titles and slugs for each language Example prompt: "Show me all the templates and entries in my BCMS" --- ### Entry Management #### list_entries_for_{templateId} Retrieves all entries for a specific template with full content data. A separate tool is generated for each template you have access to. Returns: - Complete entry data including all meta fields - Content in all configured languages - Entry statuses Example prompt: "List all blog posts from my Blog template" --- #### create_entry_for_{templateId} Creates a new entry for a specific template. The input schema is dynamically generated based on your template's field structure. Input: - statuses: Array of status assignments per language - meta: Array of metadata for each language (title, slug, custom fields) - content: Array of content nodes for each language Example prompt: "Create a new blog post titled 'Getting Started with BCMS' with a brief introduction paragraph" --- #### update_entry_for_{templateId} Updates an existing entry for a specific language. Input: - entryId: The ID of the entry to update - lng: Language code (e.g., "en") - status: Optional status ID - meta: Updated metadata - content: Updated content nodes Example prompt: "Update the introduction paragraph of my 'Getting Started' blog post" --- ### Media Management #### list_all_media Lists all media files in your media library. Returns: - Media IDs, names, and types - File metadata (size, dimensions for images) - Parent directory information Example prompt: "Show me all images in my media library" --- #### list_media_dirs Lists the directory structure of your media library. Returns: - Hierarchical directory structure - Directory IDs and names Example prompt: "Show me the folder structure of my media library" --- #### create-media-directory Creates a new directory in your media library. Input: - name: Name of the directory - parentId: Optional parent directory ID (root if not specified) Example prompt: "Create a new folder called 'Blog Images' in my media library" --- #### request-upload-media-url Returns a URL you use to upload a file (for example via POST with multipart form data), which avoids pushing large binaries through the MCP tool payload. You still need a valid file name and MIME type when uploading, as described in the tool response. Availability: Only when the MCP key has Can mutate media enabled. Example prompt: “Give me an upload URL for a new hero image, then tell me how to upload it.” Input: - fileName: Name of the file with extension - fileData: Base64-encoded file data (with data URI prefix) - parentId: Optional parent directory ID Example prompt: "Upload this image to my Blog Images folder" --- ### Linking Tools #### get_entry_pointer_link Generates an internal BCMS link to an entry for use in content. Input: - entryId: The ID of the entry to link to Returns: - Internal link format: entry:{entryId}@*_{templateId}:entry Example prompt: "Get me the internal link for the 'About Us' page entry" --- #### get_media_pointer_link Generates an internal BCMS link to a media item for use in content. Input: - mediaId: The ID of the media item Returns: - Internal link format: media:{mediaId}@*_@*_:entry Example prompt: "Get the link for the hero image so I can use it in my blog post" --- ## Content Structure ### Entry Content Nodes When creating or updating entries, content is structured as an array of nodes. Supported node types include: Type Description paragraph Standard text paragraph heading Heading (h1-h6) bulletList Unordered list orderedList Numbered list listItem List item codeBlock Code block with syntax highlighting blockquote Quote block image Image node widget Custom widget with props ### Example Content Structure ``` { "content": [ { "lng": "en", "nodes": [ { "type": "heading", "attrs": { "level": 1 }, "content": [ { "type": "text", "text": "Welcome to BCMS" } ] }, { "type": "paragraph", "content": [ { "type": "text", "text": "This is your first paragraph." } ] } ] } ] } ``` ## Security & Permissions ### MCP Key Scopes Your MCP key controls what the AI can access: - Template Access: Only templates explicitly granted in the MCP key are visible - Operation Permissions: Each template can have independent GET/POST/PUT/DELETE permissions - Media Access: Media operations are controlled separately ### Best Practices 1. Principle of Least Privilege: Only grant the permissions needed for your use case 2. Separate Keys: Create different MCP keys for different purposes or team members 3. Regular Rotation: Periodically rotate your MCP keys ## Use Cases ### Content Creation Workflows Blog Post Creation "Create a new blog post about the benefits of headless CMS. Include an introduction, three main benefits with explanations, and a conclusion. Use the Blog template." Product Updates "Update the price field for all products in the Electronics category to apply a 10% discount" ### Content Exploration Content Audit "List all blog posts that don't have a featured image set" Translation Status "Show me which entries are missing German translations" ### Media Organization Library Cleanup "Show me all unused images in the media library" Folder Setup "Create folder structure for: Products > Categories > Electronics, Clothing, Home" ## Troubleshooting ### Common Issues #### "MCP key not found" - Verify your MCP key format: keyId.keySecret.instanceId - Ensure the MCP key hasn't been deleted or deactivated - Check that you're using the correct instance #### "MCP key does not have access to template" - Review your MCP key permissions in the dashboard - Ensure the required operation (GET/POST/PUT/DELETE) is enabled for the template #### Session Expired - MCP sessions may timeout after periods of inactivity - Simply start a new conversation to establish a fresh session ### Getting Help - Documentation: [thebcms.com/docs](https://thebcms.com/docs) - Support: [[email protected]](mailto:[email protected]) - Community: [Join BCMS Discord](https://discord.com/invite/SYBY89ccaR) for community support ## Technical Reference ### Endpoint POST https://app.thebcms.com/api/v3/mcp?mcpKey={MCP_KEY} ### Transport BCMS MCP uses the Streamable HTTP transport with session management. Sessions are maintained via the mcp-session-id header. ### Response Format All tools return structured JSON responses conforming to the MCP specification with: - content: Array of content blocks - structuredContent: Typed response data ## Rate Limits MCP requests are subject to the same rate limits as API requests: - Requests are tracked per MCP key - Contact support if you need higher limits for production workloads
Cache Overflow
knowledge network for AI coding agents. Developers connect their agents to a shared pool of verified solutions — saving tokens, reducing debugging time, and getting better results. Solution authors earn when their work helps others.
Kunobi
Kubernetes desktop IDE with an embedded MCP server for visual oversight of AI-driven cluster operations. Supports FluxCD, ArgoCD, and Helm.
TypeScript MCP Server
TypeScript MCP server for AI-powered refactoring. Rename symbols, extract functions, move declarations, inline variables, find references, and fix diagnostics — strictly via the native tsserver
MCP ZAP Server
Exposes OWASP ZAP as an MCP server, enabling AI agents to orchestrate security scans, import OpenAPI specs, and generate reports.