KS
Killer-Skills

organon-tools-developer — how to use organon-tools-developer how to use organon-tools-developer, what is organon-tools-developer, organon-tools-developer setup guide, organon-tools-developer install, organon-tools-developer alternative, organon-tools-developer vs competing tools, methodology enforcement in organon-tools, organon-tools development best practices, organon-tools CLI command development

v1.0.0
GitHub

About this Skill

Perfect for Methodology Enforcement Agents needing to develop and validate organon-tools using CLI commands and verification gates. organon-tools-developer is a Claude skill for agents developing organon-tools, ensuring that the tools follow the methodology specification.

Features

Adds new CLI commands (organon <command>) with methodology consistency
Supports addition of new verification gates for enhanced validation
Enables evolution of methodology specification (book-llms/) with precision
Facilitates bug fixing and refactoring of organon-tools code with adherence to methodology
Ensures development of new MCP tools/prompt/resource aligns with methodology

# Core Topics

VledicFranco VledicFranco
[0]
[0]
Updated: 3/6/2026

Quality Score

Top 5%
60
Excellent
Based on code quality & docs
Installation
SYS Universal Install (Auto-Detect)
Cursor IDE Windsurf IDE VS Code IDE
> npx killer-skills add VledicFranco/organon/organon-tools-developer

Agent Capability Analysis

The organon-tools-developer MCP Server by VledicFranco is an open-source Categories.community integration for Claude and other AI agents, enabling seamless task automation and capability expansion. Optimized for how to use organon-tools-developer, what is organon-tools-developer, organon-tools-developer setup guide.

Ideal Agent Persona

Perfect for Methodology Enforcement Agents needing to develop and validate organon-tools using CLI commands and verification gates.

Core Value

Empowers agents to streamline development by validating CLI commands, verification gates, and MCP tools, ensuring organon-tools are built using methodology, with features like evolution of methodology specification and bug fixing.

Capabilities Granted for organon-tools-developer MCP Server

Adding new CLI commands for organon-tools
Creating new verification gates for methodology enforcement
Developing and refining MCP tools and resources

! Prerequisites & Limits

  • Requires knowledge of organon-tools and methodology
  • Limited to development and validation of organon-tools
Project
SKILL.md
14.1 KB
.cursorrules
1.2 KB
package.json
240 B
Ready
UTF-8

# Tags

[No tags]
SKILL.md
Readonly

Organon Tools Developer Skill

A Claude skill for agents developing organon-tools — ensures the tools that enforce methodology are built using methodology.


When to Use This Skill

Use this skill when:

  • Adding a new CLI command (organon <command>)
  • Adding a new verification gate
  • Adding a new MCP tool/prompt/resource
  • Evolving the methodology specification (book-llms/)
  • Fixing bugs or refactoring organon-tools code

Purpose: Ensure organon-tools development follows its own ETHOS.md constraints and PHILOSOPHY.md design decisions.


Identity Check (Always Start Here)

Before any work, load and internalize:

  1. Read organon/domains/tools/ETHOS.md - 6 invariants, 5 principles, 8 heuristics
  2. Read organon/domains/tools/PHILOSOPHY.md - 5 design decisions and trade-offs
  3. Read book-llms/three-layer-architecture.md - If working on verification gates

Critical constraint: This tool builds tools that enforce methodology. The builder must follow what it builds.


The 6 Invariants (Never Violate)

From organon/domains/tools/ETHOS.md:

  1. Schema fidelity - Frontmatter parser matches book-llms/frontmatter-system.md exactly
  2. Every command has tests - No untested code ships
  3. Gates fail builds, not warn - Verification gates produce pass/fail, never soft warnings
  4. Machine-parsable output - All commands support --format json
  5. Idempotent operations - Same input = same output, no side effects
  6. Breaking changes require major version bump - CLI, JSON schema, frontmatter schema

If your change violates any invariant, STOP and redesign.


The 5 Design Principles (Prioritized)

From organon/domains/tools/ETHOS.md:

  1. Schema fidelity over convenience - When book-llms/ spec conflicts with ease-of-use, spec wins
  2. Fail-fast over forgiving - Invalid input blocks execution, errors surface immediately
  3. Composability over monoliths - Commands work in Unix pipelines
  4. Testability over implementation speed - Pure functions with tests, thin CLI wrappers
  5. Clarity over brevity - Error messages explain what failed and how to fix it

Core Architecture Pattern

From organon/domains/tools/PHILOSOPHY.md:

src/
├── core/                   ← Pure functions (no I/O, no console, no process.exit)
│   ├── types.ts            ← FileSystem interface, result types
│   ├── <feature>.ts        ← Pure logic with tests
│   └── <feature>.test.ts   ← Vitest tests (>90% coverage)
├── cli/commands/           ← Thin wrappers (yargs handlers)
│   └── <command>.ts        ← Parse args → call core → format output
└── mcp/                    ← Thin MCP adapters
    ├── tools.ts            ← Wrap core functions as MCP tools
    └── prompts.ts          ← Methodology workflow templates

Pattern: Core logic is pure and testable. CLI and MCP are thin adapters.


Workflow 1: Adding a New CLI Command

Example: Adding organon check-links command

  1. Design phase (before coding):

    • What does it do? (one sentence)
    • Is it idempotent? (same input = same output?)
    • Does it support --format json?
    • What exit codes? (0 = success, 1 = failure)
    • Does it compose with other commands?
  2. Implementation phase:

    bash
    1# Create core utility (pure function) 2touch src/core/check-links.ts 3touch src/core/check-links.test.ts 4 5# Create CLI command wrapper 6touch src/cli/commands/check-links.ts
  3. Core utility structure (src/core/check-links.ts):

    typescript
    1import { FileSystem, Result } from './types'; 2 3export interface CheckLinksOptions { 4 projectRoot: string; 5 // ... other options 6} 7 8export interface CheckLinksResult { 9 success: boolean; 10 brokenLinks: Array<{ file: string; link: string; reason: string }>; 11} 12 13export async function checkLinks( 14 options: CheckLinksOptions, 15 fs: FileSystem 16): Promise<CheckLinksResult> { 17 // Pure logic here - no console.log, no process.exit 18 // Return structured results 19}
  4. Write tests first (src/core/check-links.test.ts):

    typescript
    1import { describe, it, expect } from 'vitest'; 2import { checkLinks } from './check-links'; 3import { MockFileSystem } from './test-utils'; 4 5describe('checkLinks', () => { 6 it('detects broken links', async () => { 7 const fs = new MockFileSystem({ ... }); 8 const result = await checkLinks({ projectRoot: '.' }, fs); 9 expect(result.brokenLinks).toHaveLength(1); 10 }); 11 12 // ... more tests 13});
  5. CLI wrapper (src/cli/commands/check-links.ts):

    typescript
    1import yargs from 'yargs'; 2import { checkLinks } from '../../core/check-links'; 3import { NodeFileSystem } from '../../core/node-fs'; 4 5export const checkLinksCommand: yargs.CommandModule = { 6 command: 'check-links', 7 describe: 'Check for broken links in organon files', 8 builder: (yargs) => { 9 return yargs 10 .option('format', { 11 choices: ['human', 'json'] as const, 12 default: 'human' as const, 13 }); 14 }, 15 handler: async (args) => { 16 const fs = new NodeFileSystem(); 17 const result = await checkLinks({ projectRoot: process.cwd() }, fs); 18 19 if (args.format === 'json') { 20 console.log(JSON.stringify(result, null, 2)); 21 } else { 22 // Human-readable output 23 if (result.brokenLinks.length === 0) { 24 console.log('✓ No broken links found'); 25 } else { 26 console.error('✗ Found broken links:'); 27 result.brokenLinks.forEach(l => { 28 console.error(` ${l.file}: ${l.link} (${l.reason})`); 29 }); 30 } 31 } 32 33 process.exit(result.success ? 0 : 1); 34 }, 35};
  6. Register command (in src/cli/index.ts):

    typescript
    1import { checkLinksCommand } from './commands/check-links'; 2 3yargs 4 .command(checkLinksCommand) 5 // ... other commands
  7. Verification checklist:

    • Core function is pure (no I/O, no console, no process.exit)
    • Tests exist and pass (npm test)
    • Coverage >90% for core logic
    • Command supports --format json
    • Command is idempotent
    • Help text exists (organon check-links --help)
    • Error messages are clear and actionable
    • README.md updated with example usage
    • No TypeScript compilation errors (npm run build)

Workflow 2: Adding a New Verification Gate

Example: Adding a "freshness" gate that checks last-modified dates

  1. Update specification first:

    • Add gate description to book-llms/three-layer-architecture.md
    • Define what it checks, when it fails, how to fix
    • Commit spec changes before implementation
  2. Implementation (follow Workflow 1 pattern):

    bash
    1# Core logic 2touch src/core/verify-freshness.ts 3touch src/core/verify-freshness.test.ts
  3. Gate structure (src/core/verify-freshness.ts):

    typescript
    1import { FileSystem, VerificationResult } from './types'; 2 3export async function verifyFreshness( 4 projectRoot: string, 5 fs: FileSystem 6): Promise<VerificationResult> { 7 return { 8 gate: 'freshness', 9 passed: boolean, 10 errors: Array<{ file: string; message: string; fix: string }>, 11 warnings: [], // Gates never warn, only fail 12 }; 13}
  4. Register gate (in src/core/verify.ts):

    typescript
    1import { verifyFreshness } from './verify-freshness'; 2 3const GATES = { 4 'freshness': verifyFreshness, 5 // ... other gates 6};
  5. Test coverage requirements:

    • 100% coverage for verification gate logic (stricter than general 90% requirement)
    • Test pass cases
    • Test all failure modes
    • Test fix suggestions are actionable
  6. Update CLI (src/cli/commands/verify.ts):

    typescript
    1.option('gate', { 2 type: 'array', 3 choices: ['frontmatter', 'references', 'triplets', 'coverage', 'freshness'], 4 description: 'Run specific gates (defaults to all)', 5})
  7. Verification checklist:

    • Spec updated in book-llms/three-layer-architecture.md FIRST
    • Gate fails builds (exit 1), never warns
    • 100% test coverage for gate logic
    • Error messages include file path, line number, and fix suggestion
    • Gate registered in verify.ts
    • CLI updated with new gate option
    • README.md documents the new gate
    • organon verify --gate freshness works

Workflow 3: Adding a New MCP Tool/Prompt

Example: Adding organon_check_dependencies MCP tool

  1. Core function exists (or create it following Workflow 1)

  2. Add MCP tool (src/mcp/tools.ts):

    typescript
    1{ 2 name: 'organon_check_dependencies', 3 description: 'Check if organon file dependencies are satisfied', 4 inputSchema: { 5 type: 'object', 6 properties: { 7 file: { type: 'string', description: 'Path to organon file' }, 8 }, 9 required: ['file'], 10 }, 11 handler: async (args) => { 12 const result = await checkDependencies(args.file, fs); 13 return { 14 content: [{ type: 'text', text: JSON.stringify(result, null, 2) }], 15 }; 16 }, 17}
  3. Add MCP prompt (src/mcp/prompts.ts) - If it's a workflow:

    typescript
    1{ 2 name: 'check-organon-dependencies', 3 description: 'Workflow for verifying organon dependency chains', 4 arguments: [ 5 { name: 'scope', description: 'Scope to check (product, domain, feature)', required: false }, 6 ], 7 handler: async (args) => { 8 return { 9 messages: [ 10 { 11 role: 'user', 12 content: { 13 type: 'text', 14 text: `# Check Organon Dependencies Workflow\n\n...`, 15 }, 16 }, 17 ], 18 }; 19 }, 20}
  4. Verification checklist:

    • Tool wraps existing core function (don't duplicate logic)
    • Input schema is clear and validates properly
    • Output is structured JSON
    • Tool registered in src/mcp/server.ts
    • MCP-SETUP.md updated with usage example
    • Test with organon mcp and verify tool appears

Workflow 4: Evolving the Methodology (RFC-Aware)

Example: Adding a new frontmatter field

DANGER ZONE: Changes to book-llms/ affect ALL projects using Organon.

  1. RFC pattern (from book-llms/patterns.md):

    • Create book-llms/rfcs/RFC-NNN-<title>.md
    • Document: Problem, Proposal, Trade-offs, Migration path
    • Get consensus (in this project: ensure it aligns with ETHOS.md)
    • Update spec (book-llms/frontmatter-system.md)
    • Update implementation (packages/tools/src/core/frontmatter-parser.ts)
    • Update tests
    • Document migration in CHANGELOG.md
    • Bump version (breaking = major, additive = minor)
  2. Breaking change checklist (requires major version bump):

    • Does it change frontmatter schema? (breaking)
    • Does it change CLI interface? (breaking)
    • Does it change JSON output schema? (breaking)
    • Does it remove/rename a command? (breaking)
    • If any YES, bump major version
  3. Invariant check:

    • Schema fidelity: Implementation must match spec exactly
    • Breaking changes require major version bump: Semver enforced

Common Pitfalls (Don't Do This)

  1. ❌ Adding logic to CLI commands → ✅ Add to src/core/, CLI is thin wrapper
  2. ❌ Using console.log in core functions → ✅ Return structured results, CLI formats
  3. ❌ Using process.exit in core functions → ✅ Return success/failure, CLI exits
  4. ❌ Writing tests after code → ✅ Write tests first (TDD pattern)
  5. ❌ Making gates warn instead of fail → ✅ Gates fail builds (INV-TOOLS-3)
  6. ❌ Skipping --format json support → ✅ All commands must support it (INV-TOOLS-4)
  7. ❌ Implementing before spec updated → ✅ Update book-llms/ spec first
  8. ❌ Auto-fixing invalid frontmatter → ✅ Fail-fast, force user to fix (principle #2)

Pre-Commit Verification

Before committing ANY code:

bash
1# 1. Tests pass 2npm test 3 4# 2. No TypeScript errors 5npm run build 6 7# 3. Self-verification (dogfooding) 8npm run organon verify 9 10# 4. Coverage check (>90% for core, 100% for gates) 11npm run test:coverage

If any fail, do not commit.


When in Doubt

  1. Check ETHOS.md - Does this violate an invariant?
  2. Check PHILOSOPHY.md - Does this align with design decisions?
  3. Check three-layer-architecture.md - Is this the right pattern for gates?
  4. Ask: Would this tool enforce what I'm about to build?

Remember: Organon-tools builds tools that enforce methodology. If you wouldn't want the tool to allow this pattern, don't implement it.


Meta-Principle

The tools that enforce constraints must be built with more discipline than the code they govern.

If organon-tools has untested code, how can it enforce test coverage on others? If organon-tools has invalid frontmatter, how can it validate others? If organon-tools violates its own ETHOS.md, the methodology loses credibility.

Build the tools you wish existed when auditing someone else's work.


Error Recovery

FailureRecovery Action
Tests failFix implementation to match test expectations. Do not skip or disable tests.
Coverage below threshold (>90% core, 100% gates)Add missing test cases for uncovered branches. Use npm run test:coverage to identify gaps.
TypeScript compilation errorsFix type issues. Do not use any or @ts-ignore as workarounds.
Gate warns instead of failingChange gate to produce pass/fail exit codes. Invariant INV-TOOLS-3: gates fail builds, never warn.
--format json not supportedAdd JSON output format. Invariant INV-TOOLS-4: all commands must support --format json.
Breaking change detectedBump major version. Invariant INV-TOOLS-6: breaking changes require major version bump.
Spec not updated before implementationStop. Update book-llms/ specification first, then implement to match. Spec is source of truth.

Related Skills

Looking for an alternative to organon-tools-developer or building a Categories.community AI Agent? Explore these related open-source MCP Servers.

View All

widget-generator

Logo of f
f

widget-generator is an open-source AI agent skill for creating widget plugins that are injected into prompt feeds on prompts.chat. It supports two rendering modes: standard prompt widgets using default PromptCard styling and custom render widgets built as full React components.

149.6k
0
Design

chat-sdk

Logo of lobehub
lobehub

chat-sdk is a unified TypeScript SDK for building chat bots across multiple platforms, providing a single interface for deploying bot logic.

73.0k
0
Communication

zustand

Logo of lobehub
lobehub

The ultimate space for work and life — to find, build, and collaborate with agent teammates that grow with you. We are taking agent harness to the next level — enabling multi-agent collaboration, effortless agent team design, and introducing agents as the unit of work interaction.

72.8k
0
Communication

data-fetching

Logo of lobehub
lobehub

The ultimate space for work and life — to find, build, and collaborate with agent teammates that grow with you. We are taking agent harness to the next level — enabling multi-agent collaboration, effortless agent team design, and introducing agents as the unit of work interaction.

72.8k
0
Communication