Case study: vault memory, GitHub, and shipping audit

This page summarizes a multi-turn Cursor session: memory_ingest / memory_recall into an Obsidian vault, GitHub triage and new issues, backlog ordering, and implementation of the first enterprise vertical slice — optional audit (#89) — plus docs, Helm, and website alignment.

Context

  • ClawQL MCP exposes optional tools behind CLAWQL_ENABLE_* flags.
  • Durable context belongs in memory_ingest / memory_recall; ephemeral scratch belongs in cache() — not the vault.
  • The session combined external threads (analysis, vision docs, ecosystem posts), live issue lists, and repo work in one arc.

Vault memory ingests

Representative vault pages (stable titles, append: true where notes already existed):

ThemeExamples
Repo / release analysisGrok cross-check vs v3.2.3, suggested issue titles, follow-on design (schedule, sandbox, synthetics, cache vs memory).
Product visionClawQL-Agent roadmap, enterprise (DORA/DACI), x402 / public gateway, payment discovery, clawql.com gateway notes.
EcosystemgRPC transport + Gallery / LinkedIn narrative; third-party model tweets (flagged for verification).
Workflowcache vs memory_ingest — when to use which.
ExecutionOpen-issues snapshot, #39#69 dedupe, #88–#91 created.

Rule of thumb: ingest decisions, debugging conclusions, and contracts; avoid secrets in vault text.

Issues and housekeeping

ActionDetail
Closed duplicate#39 in favor of #69 (iac_inspect).
New issues#88 gateway / x402 / discovery; #89 enterprise epic; #90 synthetics + schedule; #91 Gallery gRPC (upstream issues disabled).
Starter artifactwebsite/public/.well-known/payments.json + /.well-known/* headers — supports #88 / docs deploy #87.

Prioritization snapshot

Discussed ordering across #76–#78, #68–#71, #87, and the new #88–#91. Chosen implementation target: #89 — design plus one shipped tool before broader metrics / governance.

Work completed: enterprise audit (#89)

  1. Design: docs/enterprise-mcp-tools.md.
  2. Code: clawql-auditappend / list / clear; CLAWQL_ENABLE_AUDIT; wiring in tools.ts.
  3. Tests: dedicated audit tests + optional-flags + stdio listing when the flag is on.
  4. Surface area: .env.example, root README, CHANGELOG, Helm chart, K8s / Helm docs, website tool pages, Cursor vault skill.

Test bar: npm test green after the change set.

Outcomes and follow-ups

OutcomeNotes
VaultSearchable graph for roadmap, payments, gRPC — refresh stale cross-links when recalling.
Tracker#89 remains an epic until additional enterprise tools land; audit satisfies the first slice.
Next#76–#78, #88 hardening, #91 Gallery PRs, #90 synthetics.
SiteConfirm /.well-known/payments.json on docs.clawql.com after deploys.

References

Was this page helpful?