| Name | Modified | Size | Downloads / Week |
|---|---|---|---|
| Parent folder | |||
| Harmonist v1.0.0 source code.tar.gz | 2026-04-23 | 1.2 MB | |
| Harmonist v1.0.0 source code.zip | 2026-04-23 | 1.5 MB | |
| README.md | 2026-04-23 | 8.6 kB | |
| Totals: 3 Items | 2.7 MB | 0 | |
Initial public release. Harmonist ships 186 curated agents, a Schema-v2 frontmatter contract, structured validated memory, and a hook-driven enforcement layer that cannot be skipped by the LLM.
Catalogue
- 186 agents across 16 categories. Unified pool under
agents/<category>/<slug>.md, every file conforming to Schema v2. Strict agents (orchestration,review) drive the mandatory gates; persona agents are free-form specialists with domain depth. - Data-driven routing.
agents/index.jsonis the single routing table the orchestrator consults. Adding or renaming an agent requires zero edits toAGENTS.md. - Disambiguation metadata. Every agent with near-peers carries
distinguishes_from+ a one-linedisambiguationnote so the orchestrator can tie-break between look-alike specialists. - Domain filter + role filter. The integration prompt asks for
both the project's
domains(blockchain / gamedev / china-market / healthcare / etc.) and its workingroles(engineering, design, product, marketing, sales, support, finance, testing, academic) to select a sensible starter set of specialists, not a one-size-fits-all dump.
Enforcement
- Cursor hooks drive the stop gate. The
stophook parsesAGENT: <slug>markers from subagent prompts and refuses to allow turn completion ifqa-verifierhas not run, if any required reviewer is missing, or ifsession-handoff.mdwas not updated.loop_limit: 3caps retries; on exhaustion, an incident is recorded in.cursor/hooks/.state/incidents.jsonand surfaced in the nextsessionStartas aPROTOCOL-EXHAUSTEDbanner. - Cross-platform runner.
hooks/scripts/hook_runner.pyis a pure-Python implementation of every hook phase, so native Windows works out of the box; WSL / macOS / Linux can stay on the POSIX.shvariants viahooks/hooks.posix.json. - Capability scoping. Agents marked
readonly: trueare blocked from writing files; violations are logged. - PROTOCOL-SKIP abuse guard. The escape hatch for trivial turns is tracked in telemetry; excessive use triggers a warning injected into the session bootstrap context.
Memory
- Schema v1 memory contract.
.cursor/memory/*.mdentries are YAML blocks delimited by<!-- memory-entry:start -->/<!-- memory-entry:end -->with 7 required frontmatter fields.validate.pyenforces every rule and is wired into thestophook. - Hook-generated correlation IDs.
correlation_idhas the form<session_id>-<task_seq>, generated at session start (<unix-seconds><pid4>— collision-safe across parallel sessions) and advanced by the stop gate. The LLM cannot invent IDs. - CLI as the only write path.
memory.py appendvalidates before writing, scans for ~30 classes of secrets (AWS / GitHub / Stripe / GCP / Azure / Slack / Telegram / Discord / SendGrid / DigitalOcean / npm / PyPI / DB DSNs / generic high-entropy tokens / vendor-scoped UUIDs for Heroku, Postmark, etc.), and rejects placeholder-fenced content correctly so${STRIPE_KEY}still writes cleanly. - Search + rotate + dedupe.
memory.py searchfilters by tag / kind / correlation / summary;rotatearchives older entries; dedupe refuses identical-summary appends unless--allow-duplicate.
Supply-chain integrity
- MANIFEST.sha256 covers every shipped file.
check_pack_health.pyrunsbuild_manifest.py --verifyon every preflight; a tampered source is flagged. - Upgrade guard.
upgrade.py --applysha-verifies every pack source BEFORE copying into.cursor/. A tamperedsecurity-reviewer.mdis REFUSED. - Install-extras guard.
install_extras.pyinherits the same sha-verification for on-demand specialist installs. - Post-install anchor.
.cursor/pack-manifest.jsonrecords the sha of every installed pack-owned file soverify_integration.pycan detect someone weakening enforcement after install. - Snapshot + rollback.
upgrade.py --applytakes a pre-apply tarball snapshot under.cursor/.integration-snapshots/;upgrade.py --rollbackrestores from the most recent snapshot.
Prompt-injection scanner
scan_agent_safety.pyruns a heuristic regex pass over every agent markdown for four classes of hostile content: override (jailbreak markers, "ignore previous instructions"), exfil (secret leak attempts,.envaccess), remote exec (pastebin / ngrok / webhook.site callbacks,curl | bash, base64-decode-exec), policy subversion ("skip qa-verifier", "always approve silently"). Runs in CI; exit 1 on any error-severity hit. False-positive guards for legitimate MITRE ATT&CK threat docs.
Integrations
- 11 IDE targets via converters under
agents/integrations/: Cursor, Claude Code, GitHub Copilot, Windsurf, OpenCode, Aider, Kimi, Qwen, Gemini CLI, Antigravity, OpenClaw. - Thin-variant mode.
convert.sh --thinships the essentials-only body of each persona agent (everything up to## Deep Reference); typical saving ~38% across the pool.
Style + schema
- Schema v2 —
agents/SCHEMA.md. Required frontmatter plus optional metadata (version,updated_at,deprecated,distinguishes_from,disambiguation,domains,color,emoji,vibe). Slug (filename stem) is the identity key used for routing;nameis a human-readable display label. - Style guide —
agents/STYLE.md. Defines the two canonical shapes (strict vs persona), anti-patterns to avoid (personality theatre, adjective soup, emoji-prefixed headings, aspirational sections, cross-agent hand-off lists), a lightweight persona template, and a retrofit checklist. - Deep Reference convention. Every persona agent with ≥ 80
non-blank body lines carries a
## Deep Referencemarker. Thin variants cut at the marker;insert_deep_ref_marker.pyadds the marker to any long persona automatically.
Tooling
check_pack_health.py— 18 preflight checks (VERSION parses as SemVer, every directory + script present + executable, index / manifest fresh, lint clean, migrator idempotent, agent catalogue free of deprecated tech and prompt-injection patterns, README / AGENTS.md category counts matchindex.json).lint_agents.py— Schema v2 validator for every agent.build_index.py— deterministic routing-table generation.build_manifest.py— sha256 covering every shipped file (262 tracked files at 1.0.0).integrate.py/upgrade.py/deintegrate.py— full integration lifecycle.verify_integration.py— objective post-install audit.install_extras.py— on-demand specialist installation by slug / role / tag with sha-verification and thin-variant support.scan_agent_safety.py,scan_agent_freshness.py,scan_rules_conflicts.py,scan_memory_leaks.py— four complementary scanners for catalogue health and integration hygiene.merge_agents_md.py— replaces<!-- pack-owned -->blocks in a project'sAGENTS.mdwith the newest pack version, preserving project-owned prose between marker pairs.insert_deep_ref_marker.py— automated cut-point insertion for long persona agents.detect_regression_commands.py— infers project test / lint / build commands from manifests forbg-regression-runner.onboard.py— walkthrough for teammates joining an already-integrated project.refresh_py_guard.py— keeps the 3.9+ version guard in sync across every entry script.
Testing
- ~430 test assertions across hook tests (30 scenarios), memory
tests (29 scenarios), and 20 shell-based suites under
agents/scripts/test_*.sh. All passing on first clean integration. - GitHub Actions CI runs the full regression on every pull request
and push to
main.
Documentation
- Root-level
README.md,AGENTS.md,GUIDE_EN.md,integration-prompt.md,CHANGELOG.md,LICENSE,CONTRIBUTING.md,SECURITY.md,CODE_OF_CONDUCT.md. - Agent-level
agents/SCHEMA.md,agents/STYLE.md,agents/TAGS.md. - Memory-level
memory/SCHEMA.md,memory/README.md. - Optional
playbooks/— the NEXUS 7-phase lifecycle with phase runbooks, coordination docs, and scenario playbooks for startup-MVP, enterprise-feature, incident-response, and marketing-campaign workflows.