USPTO Final Petition Decisions MCP Server
A high-performance Model Context Protocol (MCP) server for the USPTO Final Petition Decisions API with token-saving context reduction capabilities, user-customizable fields, and cross-MCP integration for complete patent lifecycle analysis.
π Documentation
Document | Description |
Complete cross-platform setup with automated scripts | |
Function examples, workflows, and integration patterns | |
Detailed guide to sophisticated prompt templates for legal & research workflows | |
Comprehensive guidance on customizing field sets for the minimal and balanced tools | |
Comprehensive security best practices | |
Automated secret detection and prevention guide | |
Test suite documentation and API key setup | |
MIT License terms and conditions |
β‘Quick Start
Windows Install
Run PowerShell as Administrator, then:
The PowerShell script will:
β Check for and auto-install uv (via winget or PowerShell script)
β Install dependencies and create executable
β Prompt for USPTO API key (required) and Mistral API key (optional) or Detect if you had installed the developer's other USPTO MCPs and ask if want to use existing keys from those installation.
π If entering in API keys, the script will automatically store API keys securely using Windows DPAPI encryption
β Ask if you have USPTO PFW MCP already installed, and if so will used the USPTO PFW MCP's default centralized proxy
β Ask if you want Claude Desktop integration configured
π Offer secure configuration method (recommended) or traditional method (API keys in plain text in the MCP JSON file)
β Backups and then automatically merge with existing Claude Desktop config (preserves other MCP servers)
β Provide installation summary and next steps
Claude Desktop Configuration - Manual installs
Proxy Configuration Notes:
CENTRALIZED_PROXY_PORT:
Set to
"none"for standalone use (not recommended)Set to 8080 When USPTO PFW MCP is installed and PFW is using its default port for the local proxy. (If PFW is not using its default port change this value to match)
FPD_PROXY_PORT: Local proxy port (default:
8081, avoids conflict with PFW on8080)Only used in standalone mode (no PFW MCP detected)
When PFW MCP is installed, FPD automatically uses PFW's centralized proxy (port
8080), but will fall back to FPD's local proxy portCentralized Proxy Benefits: Single port for all USPTO MCPs, 7-day persistent links, unified rate limiting
π Key Features
βοΈUser-Customizable Fields - Configure field sets through YAML without code changes
π―Context Reduction - Get focused responses instead of massive API dumps (80-99% reduction)
πProgressive Disclosure Strategy - Minimal discovery β Balanced analysis β Document extraction
πPetition-Type Focused Search - Specialized tools for art unit and application-specific searches
β¨Intelligent Document Extraction - Auto-optimized hybrid extraction (free PyPDF2 β Mistral OCR fallback) with secure browser downloads
πCentralized Proxy Integration - Auto-detects PFW MCP and uses unified proxy (port 8080) for persistent links and cross-MCP downloads
πSecure Browser Downloads - Click proxy URLs to download PDFs directly while keeping API keys secure
ποΈAdvanced OCR Capabilities - Extract text from scanned PDFs using Mistral OCR when needed
π Document Bag Integration - Full petition document access alongside structured petition data
π°Mistral OCR Cost Transparency - Real-time cost calculation when using Mistral OCR
π Secure API Key Storage - Optional Windows DPAPI encryption keeps API keys secure (no plain text in config files)
πHigh Performance - Retry logic with exponential backoff, rate limiting compliance
π‘οΈ Production Ready - Enhanced error handling, structured logging with request IDs, comprehensive security guidelines
π»Cross-Platform - Works seamlessly on Linux and Windows
πComplete API Coverage - All USPTO Final Petition Decisions endpoints supported
πCross-MCP Integration - Seamless integration with Patent File Wrapper and PTAB MCPs for complete lifecycle analysis
Workflow Design - All Performed by the LLM with Minimal User Guidance
User Requests the following:
"Find all petitions filed by TechCorp and tell me about any red flags"
"Show me revival petitions for art unit 2128 - I'm analyzing abandonment patterns"
"Get me the petition history for application 17414168"
"Research this company's petition track record and correlate with their PTAB challenges" - * Requires that the USPTO Patent Trial and Appeal Board (PTAB) be installed - uspto_ptab_mcp and also recommended to ask LLM to perform a fpd_get_guidance tool call prior to this or any cross MCP prompt (see quick reference chart for section selection, additional details in Usage Examples)
"Analyze this art unit's prosecution quality by looking at petition frequency and types"
LLM Performs these steps:
Step 1: Discovery (Minimal) β Step 2: Selection and Analysis (Balanced - Optional) β Step 3: Detailed Petition Review β Step 4 (Optional): Select specific petition documents for examination β Step 5 (Optional): Retrieve document_id(s) from documentBag β Step 6 (Optional): Document Extraction for LLM use and/or Download Links of PDFs for user's use
The field configuration supports an optimized research progression:
Discovery (Minimal) returns 50-100 petitions efficiently without document bloat
Selection and Analysis (Balanced - Optional) from the retrieved select likely petition(s). Optional balanced search(es) performed if needed in advanced workflows and/or cross-MCP workflows with Patent File Wrapper or PTAB
Detailed Petition Review via
fpd_get_petition_detailsfor selected petitions with complete structured data for LLM's use in analysisSelect specific petition documents for examination (Optional) e.g. Decision letters, petition filings, supporting evidence
Retrieve document_id(s) from documentBag (Optional) use
fpd_get_petition_detailswithinclude_documents=Trueto get the document_id(s)Document Extraction for LLM use and/or Download Links (Optional) Document extraction via intelligent hybrid tool that auto-optimizes for cost and quality, and Downloads of the documents as PDFs uses URLs from an HTTP proxy that obscures the USPTO's API key from chat history
π― Prompt Templates
This MCP server includes sophisticated AI-optimized prompt templates for complex petition workflows. For detailed documentation on all templates, features, and usage examples, see PROMPTS.md.
Quick Template Overview
Category | Templates | Purpose |
Legal Analysis |
,
,
| Due diligence, PTAB risk assessment, litigation preparation |
Research & Prosecution |
,
,
| Art unit analysis, examiner behavior, abandonment patterns |
Document Management |
,
| Organized retrieval, comprehensive lifecycle analysis |
Key Features Across All Templates:
Enhanced Input Processing - Flexible identifier support (petition IDs, application numbers, company names)
Smart Validation - Automatic format detection and guidance
Cross-MCP Integration - Seamless workflows with PFW, PTAB, and Citations MCPs
Context Optimization - Token reduction through progressive disclosure
π Available Functions
Search Functions (4 Focused Tools)
Function (Display Name) | Context Reduction | Use Case |
(Search petitions minimal) | typical 95-99% | Ultra-fast petition discovery (user-customizable minimal fields) |
(Search petitions balanced) | typical 80-88% | Key fields for detailed analysis (no documentBag) |
(Search petitions by art unit) | typical 80-88% | Art unit quality assessment with date range filtering |
(Search petitions by application) | typical 80-88% | Complete petition history for specific application |
Search Strategies
Specialized Search Strategies
Art Unit Quality Assessment - Use
fpd_search_petitions_by_art_unitto analyze petition patterns across art units for examiner behavior and technology difficulty assessmentApplication Petition History - Use
fpd_search_petitions_by_applicationto get complete petition timeline for specific applications during prosecutionCross-MCP Integration - Link petition data with PFW prosecution history using
applicationNumberTextand PTAB challenges usingpatentNumberRed Flag Identification - Focus on revival petitions (37 CFR 1.137), examiner disputes (37 CFR 1.181), and denied decisions for prosecution quality analysis
Query Examples
Document Processing Functions
Function (Display Name) | Purpose | Requirements |
(Get petition details) | Full petition details by UUID with optional documentBag | USPTO_API_KEY |
(FPD get document content) | Intelligent document extraction with cost transparency | USPTO_API_KEY (+ MISTRAL_API_KEY for OCR fallback) |
(FPD get document download) | Secure browser-accessible download URLs | USPTO_API_KEY |
Document Processing Capabilities
Petition Details Tier (: Complete petition data retrieval
UUID-based lookup - Find petition by unique identifier
Optional document bag - Include/exclude documents based on need
LLM-optimized parsing - Extracts issues, rules cited, statutes, decision details
Cross-reference fields - applicationNumberText, patentNumber, groupArtUnitNumber for cross-MCP workflows
Intelligent Extraction Tier (: Hybrid auto-optimized extraction
Smart method selection - Automatically tries PyPDF2 first (free), falls back to Mistral OCR (API key needed) when needed
Cost optimization - Only pay for OCR when PyPDF2 extraction fails quality check
Quality detection - Automatically determines if extraction is usable or requires OCR
Transparent reporting - Shows which method was used and associated costs
Unified interface - Single tool handles all document types (eliminates tool confusion)
Advanced capabilities - Extracts text from scanned documents using Mistral OCR
Cost - Free for text-based PDFs, ~$0.001/page for scanned OCR using Mistral
Browser Download Tier (: Secure proxy downloads with enhanced filenames
Click-to-download URLs that work directly in any browser
Centralized proxy integration - If set up, auto-detects PFW MCP and uses unified proxy (port 8080) for all USPTO documents downloads, will fall back to local proxy if issues detected with centralized proxy.
Persistent links - 7-day encrypted links when using PFW centralized proxy (work across MCP restarts)
Unified architecture - Single HTTP proxy (port 8080) for all USPTO MCPs when PFW installed
Standalone fallback - Local proxy (port 8081) when PFW not detected
Enhanced filenames - Professional format with petition date, app/patent numbers, and description
Format:
PET-2013-09-10_APP-13632078_PAT-8803593_PATENT_PROSECUTION_HIGHWAY_DECISION.pdfChronological sorting by petition filing date
Instant context for patent attorneys and file management
API key security - USPTO credentials never exposed in chat history or browser
Rate limiting compliance - Automatic enforcement of USPTO's 5 downloads per 10 seconds
LLM Guidance Function
Function (Display Name) | Purpose | Requirements |
(FPD get guidance) | Context-efficient sectioned LLM guidance (80-95% token reduction) | None |
Context-Efficient Guidance System
NEW: - Solves MCP Resources visibility problem with selective guidance sections:
π― Quick Refrence Chart - What section for your question?
β π "Find petitions by company/art unit" β tools
β π© "Identify petition red flags" β red_flags
β π "Download petition documents" β documents
β π€ "Correlate petitions with prosecution" β workflows_pfw
β βοΈ "Analyze petition + PTAB patterns" β workflows_ptab
β π "Citation quality + petition correlation" β workflows_citations
β π’ "Complete portfolio due diligence" β workflows_complete
β π "Research CFR rules with Assistant" β workflows_assistant
β π― "Ultra-minimal PFW + FPD workflows" β ultra_context
β π° "Reduce extraction costs" β cost
The tool provides specific workflows, field recommendations, API call optimization strategies, anti-patterns to avoid, and cross-MCP integration patterns for maximum efficiency. See USAGE_EXAMPLES.md for detailed examples and integration workflows.
π» Usage Examples & Integration Workflows
For comprehensive usage examples, including:
Basic petition searches (company, type, outcome)
Art unit quality assessment (petition frequency, types, examiner disputes)
Application petition history (complete lifecycle tracking)
Cross-MCP integration workflows (FPD + PFW + PTAB + Pinecone)
Red flag identification (revival petitions, examiner disputes, denied petitions)
Document extraction and downloads (hybrid PyPDF2/OCR approach)
Cost optimization strategies
See the detailed USAGE_EXAMPLES.md documentation.
π§ Field Customization
The MCP server supports user-customizable field sets through YAML configuration for optimal context reduction. You can modify field sets without changing any code!
Configuration file: field_configs.yaml (in project root)
For complete customization guidance, including progressive workflow strategies, token optimization, and advanced field selection patterns, see CUSTOMIZATION.md.
π Cross-MCP Integration
This MCP is designed to work seamlessly with other USPTO MCPs and knowledge bases for comprehensive patent lifecycle analysis:
Related USPTO MCP Servers
MCP Server | Purpose | GitHub Repository |
USPTO Patent File Wrapper (PFW) | Prosecution history & documents | |
USPTO Final Petition Decisions (FPD) | Petition decisions during prosecution | |
USPTO Enhanced Citations | AI-extracted citation intelligence from Office Actions mailed Oct 2017-present (apps filed 2015+) | |
USPTO Patent Trial and Appeal Board (PTAB) | Post-grant challenges | |
Pinecone Assistant MCP | Patent law knowledge base with AI-powered chat and citations (MPEP, examination guidance) - 1 API key, limited free tier | |
Pinecone RAG MCP | Patent law knowledge base with custom embeddings (MPEP, examination guidance) - Requires Pinecone + embedding model, monthly resetting free tier |
Integration Overview
The Final Petition Decisions (FPD) MCP bridges prosecution and post-grant challenges, tracking procedural petitions that reveal prosecution quality issues. When combined with the other MCPs, it enables:
FPD + PFW: Understand petition context by cross-referencing with prosecution history
FPD + PFW + Enhanced Citations: Correlate petition patterns with examiner citation quality for comprehensive prosecution assessment (Oct 2017+ applications)
FPD + PTAB: Correlate petition red flags with post-grant challenge outcomes
PFW + FPD + PTAB: Complete patent lifecycle tracking from filing through post-grant challenges
PFW + FPD + Enhanced Citations: Art unit quality assessment with citation intelligence and petition pattern analysis
FPD + Pinecone (Assistant or RAG): Research MPEP guidance and petition standards before extracting expensive documents
Key Integration Patterns
Cross-Referencing Fields:
applicationNumberText- Primary key linking petitions to PFW prosecution and Enhanced CitationspatentNumber- Secondary key linking granted patents to PTAB challengesgroupArtUnitNumber- Art unit analysis across all MCPs (FPD, PFW, Enhanced Citations, PTAB)firstApplicantName- Party matching across MCPsexaminerCitedReferenceIndicator(Citations MCP) - Examiner vs applicant citation analysis for petition quality correlation
Progressive Workflow:
Discovery (FPD): Find petitions using minimal search
Prosecution Context (PFW): Cross-reference petition applications with prosecution history
Citation Intelligence (Enhanced Citations): Analyze examiner citation quality for applications with petitions (Oct 2017+ only)
Challenge Assessment (PTAB): Check if patents with petition red flags faced post-grant challenges
Knowledge Research (RAG): Research MPEP petition guidance if available
Detailed Analysis (FPD): Extract petition documents for Director's reasoning
Risk Scoring: Quantify prosecution quality based on petition patterns, citation quality, and outcomes
For detailed integration workflows, cross-referencing examples, and complete use cases, see USAGE_EXAMPLES.md.
πCentralized Proxy Integration (PFW + FPD)
When both PFW and FPD MCPs are installed, FPD automatically integrates with PFW's centralized proxy for unified document management:
Architecture Benefits:
Single Port - One HTTP server (port 8080) for all USPTO document downloads
Persistent Links - 7-day encrypted links via PFW's SQLite database (work across MCP restarts)
Unified Rate Limiting - Shared USPTO limits (5 requests/10 seconds) across all MCPs
Cross-MCP Caching - PFW caches documents from all USPTO MCPs for faster access
Automatic Detection - FPD detects PFW at startup and switches to centralized mode
How It Works:
FPD extracts PDF download URL from USPTO API response
FPD generates enhanced filename:
PET-{date}_APP-{app}_PAT-{patent}_{description}.pdfFPD registers document with PFW:
POST /register-fpd-document(includes enhanced filename)PFW stores metadata in database (petition_id, download_url, api_key, enhanced_filename)
FPD returns download link:
http://localhost:8080/download/{petition_id}/{doc_id}User clicks link β PFW fetches from USPTO β streams PDF with enhanced filename
Link persists for 7 days and works across MCP restarts
Standalone Mode:
Without PFW: FPD uses local proxy (port 8081) for immediate session-based downloads
Enhanced filenames still work (same generation logic used locally)
Graceful fallback ensures FPD works independently with full filename functionality
π Performance Comparison
Method | Response Size | Context Usage | Features |
Direct curl | ~100KB+ | High | Raw API access |
MCP Balanced | ~10KB | Medium | Key fields for analysis |
MCP Minimal | ~2KB | Very Low | Essential data only |
π§ͺ Testing
Core Tests (Essential)
With uv (Recommended):
With traditional Python:
Expected Outputs
test_basic.py:
See tests/README.md for comprehensive testing guide.
π Project Structure
π Troubleshooting
Common Issues
API Key Issues
For Claude Desktop: API keys in config file are sufficient
For test scripts: Environment variables must be set
Setting USPTO API Key:
Windows Command Prompt:
set USPTO_API_KEY=your_keyWindows PowerShell:
$env:USPTO_API_KEY="your_key"Linux/macOS:
export USPTO_API_KEY=your_key
Setting Mistral API Key (for OCR):
Windows Command Prompt:
set MISTRAL_API_KEY=your_keyWindows PowerShell:
$env:MISTRAL_API_KEY="your_key"Linux/macOS:
export MISTRAL_API_KEY=your_key
uv vs pip Issues
uv advantages: Better dependency resolution, faster installs
Mixed installation: Can use both
uv syncandpip install -e .Testing: Use
uv runprefix for uv-managed projects
Fields Not Returning Data
Cause: Field name not in YAML config
Solution: Edit
field_configs.yamlto include desired fields
Authentication Errors
Cause: Missing or invalid API key
Solution: Verify
USPTO_API_KEYenvironment variable or Claude Desktop config
MCP Server Won't Start
Cause: Missing dependencies or incorrect paths
Solution: Re-run setup script, restart all PowerShell windows, restart Claude Desktop (or other MCP Client) and verify configuration
If problems persist: Reset the MCP installation (see "Resetting MCP Installation" below)
Virtual Environment Issues (Windows Setup)
Symptom: "No pyvenv.cfg file" errors during
windows_setup.ps1Cause: Claude Desktop locks
.venvfiles when running, preventing proper virtual environment creationSolution:
Close Claude Desktop completely before running setup script
Remove
.venvfolder:Remove-Item ./.venv -Force -Recurse -ErrorAction SilentlyContinueRun
.\deploy\windows_setup.ps1again
Resetting MCP Installation
If you need to completely reset the MCP installation to run the Windows Quick installer again:
Linux/macOS Reset:
Getting Help
Check the test scripts for working examples
Review the field configuration in
field_configs.yamlVerify your Claude Desktop configuration matches the provided templates in INSTALL.md
π‘οΈ Security & Production Readiness
Enhanced Error Handling
Retry logic with exponential backoff - Automatic retries for transient failures (3 attempts with 1s, 2s, 4s delays)
Smart retry strategy - Doesn't retry authentication errors or client errors (4xx)
Structured logging - Request ID tracking for better debugging and monitoring
Production-grade resilience - Handles timeouts, network issues, and API rate limits gracefully
Configurable timeouts - USPTO_TIMEOUT and USPTO_DOWNLOAD_TIMEOUT environment variables for API request tuning
Security Features
π Windows DPAPI Secure Storage - API keys encrypted with Windows Data Protection API (user-specific encryption)
Environment variable API keys - No hardcoded credentials anywhere in codebase
Zero plain text API keys - Secure storage option eliminates API keys from Claude Desktop config files
Cross-platform security - Automatic fallback to environment variables on non-Windows systems
Secure test patterns - Test files use environment variables with fallbacks
Comprehensive .gitignore - Prevents accidental credential commits
Security guidelines - Complete documentation for secure development practices
Automated secret scanning - CI/CD and pre-commit hooks prevent API key leaks (detect-secrets)
20+ secret types detected - AWS keys, GitHub tokens, JWT, private keys, API keys, and more
Prompt injection detection - 70+ pattern detection system protects against AI-specific attacks
Baseline management - Tracks known placeholders while catching real secrets
Field name constants - Eliminates magic strings, reduces typo-based security issues
Request Tracking & Debugging
All API requests include unique request IDs (8-char UUIDs) for correlation:
Documentation
SECURITY_GUIDELINES.md- Comprehensive security best practicesSECURITY_SCANNING.md- Automated secret detection and prevention guidetests/README.md- Complete testing guide with API key setupEnhanced error messages with request IDs for better support
π Contributing
Fork the repository
Create a feature branch
Add tests for new functionality
Ensure all tests pass
Submit a pull request
π License
MIT License
β οΈ Disclaimer
THIS SOFTWARE IS PROVIDED "AS IS" AND WITHOUT WARRANTY OF ANY KIND.
The author makes no representations or warranties, express or implied, including but not limited to:
Accuracy & AI-Generated Content: No guarantee of data accuracy, completeness, or fitness for any purpose. Users are specifically cautioned that outputs generated or assisted by Artificial Intelligence (AI) components, including but not limited to text, data, or analyses, may be inaccurate, incomplete, fictionalized, or represent "hallucinations" (confabulations) by the AI model.
Availability: USPTO API and Mistral API dependencies may cause service interruptions.
Legal Compliance: Users are solely responsible for ensuring their use of this software, and any submissions or actions taken based on its outputs, strictly comply with all applicable laws, regulations, and policies, including but not limited to:
The latest Guidance on Use of Artificial Intelligence-Based Tools in Practice Before the United States Patent and Trademark Office (USPTO Guidance).
The USPTO's Duty of Candor and Good Faith (e.g., 37 CFR 1.56, 11.303), which includes a duty to disclose material information and correct errors.
The USPTO's signature requirements (e.g., 37 CFR 1.4(d), 2.193(c), 11.18), certifying human review and reasonable inquiry.
All rules regarding inventorship (e.g., each claimed invention must have at least one human inventor).
Legal Advice: This tool provides data access and processing only, not legal counsel. All results must be independently verified, critically analyzed, and professionally judged by qualified legal professionals.
Commercial Use: Users must verify USPTO and Mistral terms for commercial applications.
Confidentiality & Data Security: The author makes no representations regarding the confidentiality or security of any data, including client-sensitive or technical information, input by the user into the software's AI components or transmitted to third-party AI services (e.g., Mistral API). Users are responsible for understanding and accepting the privacy policies, data retention practices, and security measures of any integrated third-party AI services.
Foreign Filing Licenses & Export Controls: Users are solely responsible for ensuring that the input or processing of any data, particularly technical information, through this software's AI components does not violate U.S. foreign filing license requirements (e.g., 35 U.S.C. 184, 37 CFR Part 5) or export control regulations (e.g., EAR, ITAR). This includes awareness of potential "deemed exports" if foreign persons access such data or if AI servers are located outside the United States.
LIMITATION OF LIABILITY: Under no circumstances shall the author be liable for any direct, indirect, incidental, special, or consequential damages arising from use of this software, even if advised of the possibility of such damages.
USER RESPONSIBILITY: YOU ARE SOLELY RESPONSIBLE FOR THE INTEGRITY AND COMPLIANCE OF ALL FILINGS AND ACTIONS TAKEN BEFORE THE USPTO.
Independent Verification: All outputs, analyses, and content generated or assisted by AI within this software MUST be thoroughly reviewed, independently verified, and corrected by a human prior to any reliance, action, or submission to the USPTO or any other entity. This includes factual assertions, legal contentions, citations, evidentiary support, and technical disclosures.
Duty of Candor & Good Faith: You must adhere to your duty of candor and good faith with the USPTO, including the disclosure of any material information (e.g., regarding inventorship or errors) and promptly correcting any inaccuracies in the record.
Signature & Certification: You must personally sign or insert your signature on any correspondence submitted to the USPTO, certifying your personal review and reasonable inquiry into its contents, as required by 37 CFR 11.18(b). AI tools cannot sign documents, nor can they perform the required human inquiry.
Confidential Information: DO NOT input confidential, proprietary, or client-sensitive information into the AI components of this software without full client consent and a clear understanding of the data handling practices of the underlying AI providers. You are responsible for preventing inadvertent or unauthorized disclosure.
Export Controls: Be aware of and comply with all foreign filing license and export control regulations when using this tool with sensitive technical data.
Service Compliance: Ensure compliance with all USPTO (e.g., Terms of Use for USPTO websites, USPTO.gov account policies, restrictions on automated data mining) and Mistral terms of service. AI tools cannot obtain USPTO.gov accounts.
Security: Maintain secure handling of API credentials and client information.
Testing: Test thoroughly before production use.
Professional Judgment: This tool is a supplement, not a substitute, for your own professional judgment and expertise.
By using this software, you acknowledge that you have read this disclaimer and agree to use the software at your own risk, accepting full responsibility for all outcomes and compliance with relevant legal and ethical obligations.
Note for Legal Professionals: While this tool provides access to patent research tools commonly used in legal practice, it is a data retrieval and AI-assisted processing system only. All results require independent verification, critical professional analysis, and cannot substitute for qualified legal counsel or the exercise of your personal professional judgment and duties outlined in the USPTO Guidance on AI Use.
π Related Links
Acknowledgments
USPTO for providing the Final Petition Decisions API
Model Context Protocol for the MCP specification
Claude Code for exceptional development assistance, architectural guidance, documentation creation, PowerShell automation, test organization, and comprehensive code development throughout this project
Claude Desktop for additional development support and testing assistance
Questions? See INSTALL.md for complete cross-platform installation guide or review the test scripts for working examples.