Implement universal compliance workflow and remove project-type-specific tools#18
Merged
oscarvalenzuelab merged 1 commit intomainfrom Nov 11, 2025
Merged
Conversation
…fic tools
CHANGES:
1. DELETED generate_mobile_legal_summary
- Removed specialized mobile tool that didn't scale
- No need for project-type-specific tools (mobile, desktop, etc.)
2. CREATED run_compliance_check - Universal Workflow Tool
- ONE tool that works for ANY project type (mobile, desktop, saas, embedded, etc.)
- Executes complete standard workflow:
* scan_directory (licenses + packages)
* generate_legal_notices (purl2notices - complete NOTICE file)
* validate_policy (ospac - with default or custom policy)
* generate_sbom (documentation)
* check vulnerabilities (optional)
* Return APPROVED/REJECTED decision + risk level
- Distribution type is just a parameter, not separate workflows
- Generates artifacts: NOTICE.txt + sbom.json
- Returns comprehensive report with actionable recommendations
3. UPDATED SERVER INSTRUCTIONS
- Added universal workflow guidance
- Clear option 1 (one-shot) vs option 2 (manual orchestration)
- Emphasized: NO project-type-specific tools exist
- generate_legal_notices is PRIMARY tool for ALL legal documentation
4. ENHANCED TOOL DESCRIPTIONS (Priority 1 improvements)
- scan_directory: Marked as FIRST STEP, added workflow examples
- generate_legal_notices: Marked as PRIMARY TOOL with complete workflows
- validate_license_list: Added QUICK validation positioning
- All tools include: WHEN TO USE, WHEN NOT TO USE, WORKFLOW POSITION
5. UPDATED ALL CONFIGURATION FILES
- Replaced generate_mobile_legal_summary with run_compliance_check
- .cursor/mcp.json.example
- .kiro/settings/mcp.json.example
- examples/mcp_client_config.json
- guides/IDE_INTEGRATION_GUIDE.md
- README.md
RATIONALE:
- Don't create specialized tools for each distribution type (mobile, desktop, embedded, etc.)
- Use ONE standardized workflow that works for EVERYTHING
- Distribution type is policy validation context, not separate workflow
- If user doesn't specify type, use default policy
- Scales better - works for any future distribution type without code changes
STANDARD WORKFLOW NOW:
1. scan_directory (discover)
2. generate_legal_notices with purl2notices (ALWAYS for complete docs)
3. validate with ospac using appropriate policy
4. generate_sbom
5. check vulnerabilities
6. Decision: APPROVED/REJECTED with risk assessment
Addresses feedback: "Why mobile-specific tool? Doesn't scale. Need universal approach."
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Summary
Replaces project-type-specific tools with a universal compliance workflow that works for ANY distribution type (mobile, desktop, SaaS, embedded, etc.).
Changes
1. Removed
generate_mobile_legal_summary2. Added
run_compliance_check- Universal Workflow ToolSingle tool that executes complete compliance workflow for ANY project type:
Automatic workflow:
Outputs:
NOTICE.txt- Complete legal notices with copyright extractionsbom.json- Software Bill of Materials3. Enhanced Tool Descriptions (Agent Usability)
All tools now include structured guidance:
Key improvements:
generate_legal_noticesmarked as PRIMARY TOOL for legal docsscan_directorymarked as FIRST STEPvalidate_license_listpositioned for QUICK validation4. Updated Server Instructions
5. Updated All Configuration Files
Replaced
generate_mobile_legal_summarywithrun_compliance_checkin:.cursor/mcp.json.example.kiro/settings/mcp.json.exampleexamples/mcp_client_config.jsonguides/IDE_INTEGRATION_GUIDE.mdREADME.mdRationale
Problem: Creating specialized tools for each distribution type doesn't scale:
generate_mobile_*,generate_desktop_*,generate_embedded_*, etc.Solution: Universal standardized workflow:
Standard Workflow (Works for Everything)
Option 1 - One-Shot (Recommended):
Option 2 - Manual Steps:
Benefits
✅ Simplifies agent decision-making - clear which tool to use
✅ Reduces tool count - one universal tool vs many specialized ones
✅ Consistent workflow - same process for all project types
✅ Better scalability - works for any distribution type
✅ Default policy support - works without configuration
✅ Clear guidance - agents understand tool purposes and sequences
Testing
Tested workflow execution:
Breaking Changes
Removed:
generate_mobile_legal_summaryMigration: Use
run_compliance_checkinstead, or manually callgenerate_legal_noticeswhich is the primary tool for legal documentation.Note:
generate_legal_noticeswas always the correct tool for complete legal documentation. The mobile tool was redundant and caused confusion.