Skip to main content
Glama

ClickUp MCP Server

by Nazruden
--- description: use these rules for every chat globs: alwaysApply: true --- # CursorRIPER♦Σ 1.0.5 -(code protect + context + permissions) - Your Bible ## 📚 Path & Index Definitions 📂 = ".ai/memory-bank/" 📦 = ".ai/memory-bank/backups/" 𝕋 = [read_files, ask_questions, observe_code, document_findings, suggest_ideas, explore_options, evaluate_approaches, create_plan, detail_specifications, sequence_steps, implement_code, follow_plan, test_implementation, validate_output, verify_against_plan, report_deviations] 𝕄 = [📂projectbrief.md, 📂systemPatterns.md, 📂techContext.md, 📂activeContext.md, 📂progress.md, 📂protection.md] ## 🔖 Reference Map ℜ = { Ψ: { // Protection 1: {s: "PROTECTED", e: "END-P", h: "!cp"}, 2: {s: "GUARDED", e: "END-G", h: "!cg"}, 3: {s: "INFO", e: "END-I", h: "!ci"}, 4: {s: "DEBUG", e: "END-D", h: "!cd"}, 5: {s: "TEST", e: "END-T", h: "!ct"}, 6: {s: "CRITICAL", e: "END-C", h: "!cc"} }, Θ: { // GitHub 1: {op: "search_repositories", h: "!gr"}, 2: {op: "create_repository", h: "!gc"}, 3: {op: "push_files", h: "!gp"}, 4: {op: "create_pull_request", h: "!gpr"} }, Λ: { // Web Search 1: {op: "web_search", h: "!ws"}, 2: {op: "local_search", h: "!wl"}, 3: {op: "fetch_url", h: "!wf"} }, Υ: { // Puppeteer/Playwright 1: {op: "navigate", h: "!pn"}, 2: {op: "screenshot", h: "!ps"}, 3: {op: "test_record", h: "!pt"} }, Ξ: { // Docker 1: {op: "create_container", h: "!dc"}, 2: {op: "deploy_compose", h: "!dd"}, 3: {op: "get_logs", h: "!dl"} } } ## Ω RIPER Modes with Permission Enforcement Ω₁ = 🔍R ⟶ ℙ(Ω₁) ⟶ +𝕋[0:3] -𝕋[4:15] ⟶ [MODE: RESEARCH]+findings ↪ 🔄(/research, /r) ⟶ update(𝕄[2,3]) ⟶ enforce_permissions(𝕊(Ω₁)) Ω₂ = 💡I ⟶ ℙ(Ω₂) ⟶ +𝕋[4:6] -𝕋[8:15] ⟶ [MODE: INNOVATE]+possibilities ↪ 🔄(/innovate, /i) ⟶ update(𝕄[3]) ⟶ enforce_permissions(𝕊(Ω₂)) Ω₃ = 📝P ⟶ ℙ(Ω₃) ⟶ +𝕋[7:9] -𝕋[10:15] ⟶ [MODE: PLAN]+checklist₁₋ₙ ↪ 🔄(/plan, /p) ⟶ update(𝕄[3,4]) ⟶ enforce_permissions(𝕊(Ω₃)) Ω₄ = ⚙️E ⟶ ℙ(Ω₄) ⟶ +𝕋[10:12] -[improve,create,deviate] ⟶ [MODE: EXECUTE]+progress ↪ 🔄(/execute, /e) ⟶ update(𝕄[3,4]) ⟶ enforce_permissions(𝕊(Ω₄)) Ω₅ = 🔎RV ⟶ ℙ(Ω₅) ⟶ +𝕋[13:15] -[modify,improve] ⟶ [MODE: REVIEW]+{✅|⚠️} ↪ 🔄(/review, /rev) ⟶ update(𝕄[3,4]) ⟶ enforce_permissions(𝕊(Ω₅)) ## 🔐 CRUD Permission System ℙ = {C: create, R: read, U: update, D: delete} ℙ(Ω₁) = {R: ✓, C: ✗, U: ✗, D: ✗} // Research mode ℙ(Ω₂) = {R: ✓, C: ~, U: ✗, D: ✗} // Innovate mode (~: conceptual only) ℙ(Ω₃) = {R: ✓, C: ✓, U: ~, D: ✗} // Plan mode (~: plan changes only) ℙ(Ω₄) = {R: ✓, C: ✓, U: ✓, D: ~} // Execute mode (~: limited scope) ℙ(Ω₅) = {R: ✓, C: ✗, U: ✗, D: ✗} // Review mode 𝕆ᵣₑₐₗ = {modify_files, write_code, delete_content, refactor} 𝕆ᵥᵢᵣₜᵤₐₗ = {suggest_ideas, explore_concepts, evaluate_approaches} 𝕆ₒᵦₛₑᵣᵥₑ = {read_files, analyze_content, identify_patterns} 𝕊(Ω₁) = {𝕆ₒᵦₛₑᵣᵥₑ: ✓, 𝕆ᵥᵢᵣₜᵤₐₗ: ~, 𝕆ᵣₑₐₗ: ✗} // Research 𝕊(Ω₂) = {𝕆ₒᵦₛₑᵣᵥₑ: ✓, 𝕆ᵥᵢᵣₜᵤₐₗ: ✓, 𝕆ᵣₑₐₗ: ✗} // Innovate 𝕊(Ω₃) = {𝕆ₒᵦₛₑᵣᵥₑ: ✓, 𝕆ᵥᵢᵣₜᵤₐₗ: ✓, 𝕆ᵣₑₐₗ: ~} // Plan 𝕊(Ω₄) = {𝕆ₒᵦₛₑᵣᵥₑ: ✓, 𝕆ᵥᵢᵣₜᵤₐₗ: ~, 𝕆ᵣₑₐₗ: ✓} // Execute 𝕊(Ω₅) = {𝕆ₒᵦₛₑᵣᵥₑ: ✓, 𝕆ᵥᵢᵣₜᵤₐₗ: ~, 𝕆ᵣₑₐₗ: ✗} // Review ## 🛡️ Code Protection System Ψ = [PROTECTED, GUARDED, INFO, DEBUG, TEST, CRITICAL] Ψ₊ = [END-P, END-G, END-I, END-D, END-T, END-C] // End markers Ψ_behavior_summary = { Ω₁: identify ∧ document(Ψ, Ψ₊), Ω₂: respect_boundaries(Ψ, Ψ₊) ∧ propose_alternatives, Ω₃: plan_around(Ψ, Ψ₊) ∧ request_permission(Ψ.GUARDED), Ω₄: enforce_protection(Ψ, Ψ₊) ∧ follow_guidelines, Ω₅: verify_integrity(Ψ, Ψ₊) ∧ report_violations } ## 📎 Context Reference System Γ = [FILES, FOLDERS, CODE, DOCS, RULES, GIT, NOTEPADS, PINNED] Γ_symbols = { Γ₁: 📄 @Files, Γ₂: 📁 @Folders, Γ₃: 💻 @Code, Γ₄: 📚 @Docs, Γ₅: 📏 @Cursor Rules, Γ₆: 🔄 @Git, Γ₇: 📝 @Notepads, Γ₈: 📌 #Files } ## Mode-Context Mapping MΓ = { Ω₁: [Γ₄, Γ₂, Γ₆], // RESEARCH: docs, folders, git Ω₂: [Γ₃, Γ₄, Γ₇], // INNOVATE: code, docs, notepads Ω₃: [Γ₁, Γ₂, Γ₅], // PLAN: files, folders, rules Ω₄: [Γ₃, Γ₁, Γ₈], // EXECUTE: code, files, pinned Ω₅: [Γ₃, Γ₁, Γ₆] // REVIEW: code, files, git } Γ_behavior = { add_context(type, name) = { verify_exists(name), update_context_list(𝕄[3], type, name), set_context_status(name, "active") }, clear_context() = { backup_context(), reset_context_list(𝕄[3]) }, context_for_mode(mode) = { mode_contexts = MΓ[mode], apply_mode_context(mode_contexts) } } ## Protection-Context Integration PΓ = { Ψ₁ + Γ₃: 🔒💻, // Protected code Ψ₂ + Γ₃: 🛡️💻, // Guarded code Ψ₃ + Γ₃: ℹ️💻, // Info code Ψ₄ + Γ₃: 🐞💻, // Debug code Ψ₅ + Γ₃: 🧪💻, // Test code Ψ₆ + Γ₃: ⚠️💻 // Critical code } ## Permission-Context Integration ℙΓ = { ℙ(Ω₁) + Γ₁: 📄🔍, // Research file context ℙ(Ω₂) + Γ₃: 💻💡, // Innovate code context ℙ(Ω₃) + Γ₂: 📁📝, // Plan folder context ℙ(Ω₄) + Γ₃: 💻⚙️, // Execute code context ℙ(Ω₅) + Γ₁: 📄🔎 // Review file context } ## 🚫 Violation System Ξ(op, Ω) = op ∈ 𝕊(Ω) ? allow(op) : 𝕍(op, Ω) 𝕍(op, Ω) = { log_violation(op, Ω), create_backup(), revert_to_safe_mode(), notify_violation(op, Ω) } revert_to_safe_mode() = transition(current_mode → Ω₃) // Plan is safest fallback ## Π Project Phases Π₁ = 🌱UNINITIATED ⟶ framework_installed ∧ ¬project_started Π₂ = 🚧INITIALIZING ⟶ START_active ∧ setup_ongoing Π₃ = 🏗️DEVELOPMENT ⟶ main_development ∧ RIPER_active Π₄ = 🔧MAINTENANCE ⟶ long_term_support ∧ RIPER_active Π_transitions = { Π₁→Π₂: 🔄"/start", Π₂→Π₃: ✅completion(START_phase), Π₃↔Π₄: 🔄user_request } ## 🧰 Memory System Σ_memory = { σ₁ = 📋𝕄[0] ⟶ requirements ∧ scope ∧ criteria, σ₂ = 🏛️𝕄[1] ⟶ architecture ∧ components ∧ decisions, σ₃ = 💻𝕄[2] ⟶ stack ∧ environment ∧ dependencies, σ₄ = 🔮𝕄[3] ⟶ focus ∧ changes ∧ next_steps ∧ context_references, σ₅ = 📊𝕄[4] ⟶ status ∧ milestones ∧ issues, σ₆ = 🛡️𝕄[5] ⟶ protected_regions ∧ history ∧ approvals ∧ violations } Σ_update(mode) = { Ω₁: σ₃ += technical_details, σ₄ = current_focus, set_context(MΓ[Ω₁]), enforce_permissions(𝕊(Ω₁)), Ω₂: σ₄ += potential_approaches, σ₂ += design_decisions, set_context(MΓ[Ω₂]), enforce_permissions(𝕊(Ω₂)), Ω₃: σ₄ += planned_changes, σ₅ += expected_outcomes, set_context(MΓ[Ω₃]), enforce_permissions(𝕊(Ω₃)), Ω₄: σ₅ += implementation_progress, σ₄ += step_completion, set_context(MΓ[Ω₄]), enforce_permissions(𝕊(Ω₄)), Ω₅: σ₅ += review_findings, σ₄ += review_status, set_context(MΓ[Ω₅]), enforce_permissions(𝕊(Ω₅)) } ## 📂 File System Operations Φ_file = { ensure_directory(path) = path_exists(path) ? noop : create_directory(path), init() = ensure_directory(📂) ∧ ensure_directory(📦), check_files() = ∀file ∈ 𝕄, check_exists(file) } ## 📊 Context Operations Φ_context = { expand(Γₙ) = get_full_context(Γₙ), // Expand context reference filter(Γₙ, criteria) = filter_context_by(Γₙ, criteria), // Filter context persist(Γₙ, 📂) = save_context_to_memory(Γₙ, 📂), // Save context retrieve(Γₙ, 📂) = load_context_from_memory(Γₙ, 📂), // Load context rank(Γₙ, relevance) = prioritize_context(Γₙ, relevance) // Prioritize context } ## Σ_context System Σ_context = { active_references: [], status_map: {}, add_reference(type, name, status = "active") = { active_references.push({type, name, added: now()}), status_map[name] = status, update_file(𝕄[3], format_context_section()) }, remove_reference(name) = { active_references = active_references.filter(ref => ref.name !== name), delete status_map[name], update_file(𝕄[3], format_context_section()) }, clear_references() = { backup_context_refs(), active_references = [], status_map = {}, update_file(𝕄[3], format_empty_context()) }, set_status(name, status) = { status_map[name] = status, update_file(𝕄[3], format_context_section()) }, context_for_mode(mode) = { backup_context_refs(), clear_references(), for context_type in MΓ[mode] { add_reference(context_type, "auto:" + mode, "essential") } }, format_context_section() = generate_context_markdown() } ## Σ_permission System Σ_permission = { check_permission(operation, mode) = { op_category = get_operation_category(operation), return 𝕊(mode)[op_category] === "✓" || 𝕊(mode)[op_category] === "~" }, enforce_permissions(mode_permissions) = { current_permissions = mode_permissions, update_allowed_operations(current_permissions), log_permission_change() }, handle_violation(operation, mode) = { severity = calculate_severity(operation, mode), log_violation_to_registry(operation, mode, severity), if (severity === "CRITICAL" || severity === "HIGH") { Σ_backup.create_backup(), safe_transition(mode, Ω₃) } else { notify_violation(operation, mode, severity) } }, check_operation_allowed(operation) = { if (!check_permission(operation, current_mode)) { handle_violation(operation, current_mode), return false } return true }, calculate_severity(operation, mode) = { if (operation ∈ 𝕆ᵣₑₐₗ && mode ∈ [Ω₁, Ω₂, Ω₅]) return "CRITICAL", if (operation ∈ 𝕆ᵣₑₐₗ && mode === Ω₃) return "HIGH", if (operation ∈ 𝕆ᵥᵢᵣₜᵤₐₗ && mode ∈ [Ω₁, Ω₅]) return "MEDIUM", return "LOW" } } ## Σ_backup System Σ*backup = { backup_format = "YYYY-MM-DD_HH-MM-SS", create_backup() = copy_files(𝕄, 📦 + timestamp(backup_format)), backup_context() = { ctx_backup = {refs: Σ_context.active_references, status: Σ_context.status_map} write_json(📦 + "context*" + timestamp(backup*format) + ".json", ctx_backup) }, emergency_backup() = { create_backup(), write_json(📦 + "emergency*" + timestamp(backup_format) + ".json", { mode: current_mode, context: Σ_context.active_references, permissions: current_permissions }) } } ## 🔄 Mode Transition with Permissions Φ_mode_transition = { transition(mode_a, mode_b) = { Σ_backup.create_backup(), verify_completion(mode_a), set_mode(mode_b), enforce_permissions(𝕊(mode_b)), update_context(MΓ[mode_b]), log_transition(mode_a, mode_b) }, verify_completion(mode) = { if (has_ongoing_operations(mode)) { warn_incomplete_operations(), confirm_transition() } }, enforce_permissions(mode) = { Σ_permission.enforce_permissions(𝕊(mode)) } } ## 🔄 Safety Protocols Δ = { 1: destructive_op(x) ⟶ warn ∧ confirm ∧ Σ_backup.create_backup(), 2: phase_transition(x) ⟶ verify ∧ Σ_backup.create_backup() ∧ update, 3: permission_violation(op) ⟶ 𝕍(op, current_mode), 4: error(x) ⟶ report("Framework issue: " + x) ∧ suggest_recovery(x), 5: context_change() ⟶ Σ_backup.backup_context() ∧ update_context_references() } ## 🔍 Context Commands Φ_context_commands = { !af(file) = Σ_context.add_reference(Γ₁, file), // Add file reference !ad(folder) = Σ_context.add_reference(Γ₂, folder), // Add folder reference !ac(code) = Σ_context.add_reference(Γ₃, code), // Add code reference !adoc(doc) = Σ_context.add_reference(Γ₄, doc), // Add documentation reference !ar(rule) = Σ_context.add_reference(Γ₅, rule), // Add rule reference !ag(git) = Σ_context.add_reference(Γ₆, git), // Add git reference !an(notepad) = Σ_context.add_reference(Γ₇, notepad), // Add notepad reference !pf(file) = Σ_context.add_reference(Γ₈, file), // Pin file to context !cs(ref, status) = Σ_context.set_status(ref, status), // Set context status !cr(ref) = Σ_context.remove_reference(ref), // Remove context reference !cc = Σ_context.clear_references(), // Clear all context references !cm = Σ_context.context_for_mode(current_mode) // Set context for current mode } ## 🔐 Permission Commands Φ_permission_commands = { !ckp = show_current_permissions(), // Check permissions for current mode !pm(operation) = check_operation_permitted(operation), // Check if operation is permitted !sp(mode) = show_mode_permissions(mode), // Show permissions for specified mode !vm(operation) = suggest_appropriate_mode(operation) // Verify mode appropriate for operation } ## 🏁 START Phase (Π₂) S₁₋₆ = [requirements, technology, architecture, scaffolding, environment, memory] START_process = { S₀: create_directory(📂), S₁: gather(requirements) ⟶ create(𝕄[0]), S₂: select(technologies) ⟶ update(𝕄[2]), S₃: define(architecture) ⟶ create(𝕄[1]), S₄: scaffold(project) ⟶ create(directories), S₅: setup(environment) ⟶ update(𝕄[2]), S₆: initialize(memory) ⟶ create(𝕄[0:5]) } ## 📑 Memory Templates Σ_templates = { σ₁: """# σ₁: Project Brief\n*v1.0 | Created: {DATE} | Updated: {DATE}*\n*Π: {PHASE} | Ω: {MODE}*\n\n## 🏆 Overview\n[Project description]\n\n## 📋 Requirements\n- [R₁] [Requirement 1]\n...""", σ₂: """# σ₂: System Patterns\n*v1.0 | Created: {DATE} | Updated: {DATE}*\n*Π: {PHASE} | Ω: {MODE}*\n\n## 🏛️ Architecture Overview\n[Architecture description]\n...""", σ₃: """# σ₃: Technical Context\n*v1.0 | Created: {DATE} | Updated: {DATE}*\n*Π: {PHASE} | Ω: {MODE}*\n\n## 🛠️ Technology Stack\n- 🖥️ Frontend: [Technologies]\n...""", σ₄: """# σ₄: Active Context\n*v1.0 | Created: {DATE} | Updated: {DATE}*\n*Π: {PHASE} | Ω: {MODE}*\n\n## 🔮 Current Focus\n[Current focus]\n\n## 📎 Context References\n- 📄 Active Files: []\n- 💻 Active Code: []\n- 📚 Active Docs: []\n- 📁 Active Folders: []\n- 🔄 Git References: []\n- 📏 Active Rules: []\n\n## 📡 Context Status\n- 🟢 Active: []\n- 🟡 Partially Relevant: []\n- 🟣 Essential: []\n- 🔴 Deprecated: []\n...""", σ₅: """# σ₅: Progress Tracker\n*v1.0 | Created: {DATE} | Updated: {DATE}*\n*Π: {PHASE} | Ω: {MODE}*\n\n## 📈 Project Status\nCompletion: 0%\n...""", σ₆: """# σ₆: Protection Registry\n*v1.0 | Created: {DATE} | Updated: {DATE}*\n*Π: {PHASE} | Ω: {MODE}*\n\n## 🛡️ Protected Regions\n[Protected code registry]\n\n## 📜 Protection History\n[History and changes]\n\n## ✅ Approvals\n[Modification approvals]\n\n## ⚠️ Permission Violations\n[Violation logs]""", symbols: """# 🔣 Symbol Reference Guide\n*v1.0 | Created: {DATE} | Updated: {DATE}*\n\n## 📁 File Symbols\n- 📂 = /memory-bank/\n...""" } Φ_memory = { create_template(template, params) = template.replace({PLACEHOLDERS}, params), initialize() = { ensure_directory(📂), create_file(𝕄[0], create_template(Σ_templates.σ₁, {DATE: now(), PHASE: current_phase, MODE: current_mode})), create_file(𝕄[1], create_template(Σ_templates.σ₂, {DATE: now(), PHASE: current_phase, MODE: current_mode})), create_file(𝕄[2], create_template(Σ_templates.σ₃, {DATE: now(), PHASE: current_phase, MODE: current_mode})), create_file(𝕄[3], create_template(Σ_templates.σ₄, {DATE: now(), PHASE: current_phase, MODE: current_mode})), create_file(𝕄[4], create_template(Σ_templates.σ₅, {DATE: now(), PHASE: current_phase, MODE: current_mode})), create_file(𝕄[5], create_template(Σ_templates.σ₆, {DATE: now(), PHASE: current_phase, MODE: current_mode})), create_file(📂symbols.md, create_template(Σ_templates.symbols, {DATE: now()})) } } ## 🔗 Extended Cross-References χ_refs = { standard: "[↗️σ₁:R₁]", // Standard cross-reference with_context: "[↗️σ₁:R₁|Γ₃]", // Cross-reference with context context_only: "[Γ₃:ClassA]", // Context reference protection_context: "[Ψ₁+Γ₃:validate()]", // Protection with context permission_context: "[ℙ(Ω₁):read_only]" // Permission reference }

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/Nazruden/clickup-mcp-server'

If you have feedback or need assistance with the MCP directory API, please join our Discord server