Skip to main content
Glama
README.md2.96 kB
# KDB - The Kindly Debugger **Give your AI the superpower of time-travel debugging.** Rewind execution, find what went wrong, fix the bug timeline. [![License: Proprietary](https://img.shields.io/badge/License-Proprietary-purple.svg)](LICENSE) [![Pricing: Free Tier](https://img.shields.io/badge/Pricing-Free%20Tier%20Available-gold.svg)](https://kindly.software) --- ## What is KDB? KDB is a **time-travel debugger** that connects to Claude, Cursor, or any MCP-compatible AI assistant. Instead of reading code and guessing, your AI can now: - **Attach** to running processes - **Set breakpoints** and catch crashes in action - **Step forward** through execution - **Step BACKWARD** through time to find the root cause - **Inspect memory** and variables at any point in history All through natural language. Just ask Claude to debug your code. --- ## Quick Start ### 1. Get Your License Key ``` https://kindly.software ``` Free Hobby tier available. **Launch promo: unlimited sessions for 7 days.** ### 2. Add to Claude Code ```json { "mcpServers": { "kdb": { "command": "kdb-mcp", "args": ["--license", "YOUR_LICENSE_KEY"] } } } ``` ### 3. Debug ``` "Claude, attach to process 12345 and find why it's crashing" ``` That's it. Time-travel debugging via conversation. --- ## Features | Feature | Description | |---------|-------------| | **Time-Travel** | Step backward through execution history | | **Breakpoints** | Hardware breakpoints with hit counting | | **Stack Traces** | SIMD-accelerated unwinding (5000x faster than GDB) | | **Memory Inspection** | Read variables at any point in time | | **Audit Trail** | Cryptographic hash-chain for compliance (SOX/SOC2) | --- ## Pricing | Tier | Price | Sessions | |------|-------|----------| | **Hobby** | Free | 5/month (unlimited during launch week) | | **Pro** | Coming Soon | Extended | | **Enterprise** | Contact | Unlimited + Priority Support | --- ## MCP Tools ``` debugger/attach - Attach to process debugger/set_breakpoint - Add breakpoint debugger/continue - Resume execution debugger/step_forward - Step one instruction debugger/step_backward - TIME TRAVEL debugger/get_stack_trace - Get call stack debugger/get_variables - Read memory debugger/export_trace - Export audit trail ``` --- ## Requirements - **Platform**: Linux x86_64 (server-side) - **Access**: Users on any OS connect via MCP - **Permissions**: Same UID as target process (or CAP_SYS_PTRACE) --- ## License **Proprietary Commercial License** - See [LICENSE](LICENSE) - Free Hobby tier available - Use via MCP interface - [Terms of Service](https://kindly.software/terms) --- ## Links - **Website**: [kindly.software](https://kindly.software) - **Sign Up**: [Get License Key](https://kindly.software) - **Support**: support@kindly.software --- <p align="center"> <strong>Kindly Software</strong><br> <em>Debug smarter. Ship faster.</em> </p>

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/Kindly-Software/kdb-mcp'

If you have feedback or need assistance with the MCP directory API, please join our Discord server