
Security News
OpenClaw Advisory Surge Highlights Gaps Between GHSA and CVE Tracking
A recent burst of security disclosures in the OpenClaw project is drawing attention to how vulnerability information flows across advisory and CVE systems.
@cubis/foundry
Advanced tools
Workflow-first installer for multi-platform AI agent environments.
Last updated: 2026-03-03.
cbx installs workflows, skills, wrappers, and rule files for:
Skill install default is profile-based:
core--skill-profile web-backend for broader web/backend stack--all-skills for full workflow + MCP catalog installcbx_config.json only)/plan, /create, etc.)AGENTS.md, GEMINI.md, etc.)ENGINEERING_RULES.md, TECH.md)npm install -g @cubis/foundry
Recommended environment setup:
export POSTMAN_API_KEY_DEFAULT="<your-postman-api-key>"
export STITCH_API_KEY_DEFAULT="<your-stitch-api-key>" # Antigravity StitchMCP only
cbx workflows install --platform codex --bundle agent-environment-setup --postman
Important:
--yes if you want interactive Postman workspace selection.workspaceId.cbx workflows install --platform antigravity --bundle agent-environment-setup --postman
This also manages default StitchMCP wiring for Antigravity.
cbx workflows install --platform copilot --bundle agent-environment-setup --postman
Default install scope is global.
Behavior:
ENGINEERING_RULES.md, TECH.md) are workspace files.Codex:
~/.agents/skills<workspace>/.agents/workflows<workspace>/AGENTS.md~/.codex/AGENTS.mdAntigravity:
~/.gemini/antigravity/skills<workspace>/.agent/workflows<workspace>/.agent/rules/GEMINI.md~/.gemini/GEMINI.mdCopilot:
~/.copilot/skills<workspace>/.github/copilot/workflows<workspace>/AGENTS.md and <workspace>/.github/copilot-instructions.md~/.copilot/copilot-instructions.mdcbx_config.json only)cbx_config.json is the single supported credentials/config source.
Paths:
~/.cbx/cbx_config.json<workspace>/cbx_config.jsonPostman and Stitch now support multiple named profiles with active selection.
{
"postman": {
"profiles": [
{
"name": "default",
"apiKeyEnvVar": "POSTMAN_API_KEY_DEFAULT",
"workspaceId": null
}
],
"activeProfileName": "default",
"mcpUrl": "https://mcp.postman.com/minimal"
},
"stitch": {
"profiles": [
{
"name": "default",
"apiKeyEnvVar": "STITCH_API_KEY_DEFAULT"
}
],
"activeProfileName": "default",
"mcpUrl": "https://stitch.googleapis.com/mcp"
},
"mcp": {
"runtime": "docker",
"fallback": "local",
"docker": {
"image": "ghcr.io/cubetiq/foundry-mcp:<package-version>",
"updatePolicy": "pinned"
},
"catalog": {
"toolSync": true
}
}
}
Inline keys are no longer allowed. Use env-var aliases only.
# List profiles
cbx workflows config keys list --service all --scope global
# Add profile (env-alias-first)
cbx workflows config keys add --service postman --name team-a --env-var POSTMAN_API_KEY_TEAM_A --scope global
cbx workflows config keys add --service stitch --name prod --env-var STITCH_API_KEY_PROD --scope global
# Switch active profile
cbx workflows config keys use --service postman --name team-a --scope global
# Remove non-active profile
cbx workflows config keys remove --service postman --name old-profile --scope global
# Migrate legacy inline keys to env aliases
cbx workflows config keys migrate-inline --scope global --redact
# Doctor check for inline keys / unsafe headers
cbx workflows config keys doctor --scope global
Alias commands are also available:
cbx skills config keys ...cbx workflows install --platform codex --bundle agent-environment-setup --postman
If active Postman env var (for example POSTMAN_API_KEY_DEFAULT) is available and --yes is not used, installer can show workspace chooser and save selected workspaceId in active Postman profile.
--postman now installs side-by-side MCP topology by default:
postman)StitchMCP for Antigravity)cubis-foundry via cbx mcp serve --transport stdio --scope auto)To opt out of Foundry MCP registration during install:
cbx workflows install --platform codex --bundle agent-environment-setup --postman --no-foundry-mcp
cbx workflows install --platform codex --bundle agent-environment-setup --postman --postman-workspace-id "<workspace-id>" --yes
Clear workspace ID:
cbx workflows install --platform codex --bundle agent-environment-setup --postman --postman-workspace-id null --yes
If config already exists and you want to overwrite saved values:
cbx workflows install --platform codex --bundle agent-environment-setup --postman --overwrite --yes
Antigravity includes managed Stitch MCP support using active Stitch profile from cbx_config.json.
Default managed command template:
{
"StitchMCP": {
"$typeName": "exa.cascade_plugins_pb.CascadePluginCommandTemplate",
"command": "npx",
"args": [
"-y",
"mcp-remote",
"https://stitch.googleapis.com/mcp",
"--header",
"X-Goog-Api-Key: ${STITCH_API_KEY_DEFAULT}"
],
"env": {}
}
}
Managed MCP definition files (.cbx/mcp/...):
~/.cbx/mcp/<platform>/postman.json<workspace>/.cbx/mcp/<platform>/postman.jsonRuntime target patching:
Codex:
~/.codex/config.toml (via codex mcp add/remove)<workspace>/.vscode/mcp.jsoncubis-foundry (command: cbx mcp serve --transport stdio --scope auto)Antigravity:
~/.gemini/settings.json (mcpServers)<workspace>/.gemini/settings.json (mcpServers)cubis-foundry (command template)Copilot:
~/.copilot/mcp-config.json (servers)<workspace>/.vscode/mcp.json (servers)cubis-foundry (stdio command server)cbx workflows install --platform <codex|antigravity|copilot> --bundle agent-environment-setup
cbx workflows remove <bundle-or-workflow> --platform <platform>
cbx workflows prune-skills --platform <platform> --scope <project|global> --skill-profile <core|web-backend|full> [--include-mcp] [--dry-run]
cbx workflows doctor --platform <platform> --scope <project|global>
cbx workflows sync-rules --platform <platform> --scope <project|global>
MCP runtime flags (install):
cbx workflows install --platform codex --bundle agent-environment-setup --postman \
--mcp-runtime docker \
--mcp-fallback local \
--mcp-image ghcr.io/cubetiq/foundry-mcp:<package-version> \
--mcp-update-policy pinned \
--mcp-build-local # optional: build image locally instead of docker pull
When --mcp-runtime docker is selected and Docker is available, install now prepares the image automatically:
docker pull)--mcp-build-local is setMCP tool catalog commands:
cbx mcp tools sync --service all --scope global
cbx mcp tools list --service postman --scope global
cbx mcp tools list --service stitch --scope global
Notes:
cbx mcp tools sync requires POSTMAN_API_KEY_DEFAULT.--service stitch or --service all, it also requires STITCH_API_KEY_DEFAULT.Foundry local serve command (canonical entrypoint for MCP client registration):
# stdio (default)
cbx mcp serve --transport stdio --scope auto
# http for local smoke/debug
cbx mcp serve --transport http --scope auto --host 127.0.0.1 --port 3100
# verify vault only
cbx mcp serve --scan-only
MCP Docker runtime commands:
# Inspect runtime/container state
cbx mcp runtime status --scope global --name cbx-mcp
# Start runtime container (pull/build image first as needed)
cbx mcp runtime up --scope global --name cbx-mcp --port 3310 --fallback local
# Recreate existing container
cbx mcp runtime up --scope global --name cbx-mcp --replace --fallback local
# Stop/remove runtime container
cbx mcp runtime down --name cbx-mcp
Docker E2E MCP check (single command):
npm run test:mcp:docker
If port 3310 is already in use (for example by an existing cbx-mcp runtime), use a different port:
CBX_MCP_PORT=3999 npm run test:mcp:docker
Optional strict key mode:
CBX_MCP_REQUIRE_KEYS=1 npm run test:mcp:docker
Context budget reporting (from MCP skill tools):
structuredContent.metrics with deterministic estimates.fullCatalogEstimatedTokensresponseEstimatedTokensselectedSkillsEstimatedTokens or loadedSkillEstimatedTokensestimatedSavingsVsFullCatalogestimatedSavingsVsFullCatalogPercentskill_budget_report for consolidated Skill Log + Context Budget.ceil(char_count / charsPerToken) (default charsPerToken=4), not provider billing tokens.Install profile flags:
# default core profile (workflow skills only)
cbx workflows install --platform codex --bundle agent-environment-setup
# expanded workflow profile
cbx workflows install --platform codex --bundle agent-environment-setup --skill-profile web-backend
# include MCP catalog with profile
cbx workflows install --platform codex --bundle agent-environment-setup --skill-profile web-backend --include-mcp
# full workflow + MCP catalogs
cbx workflows install --platform codex --bundle agent-environment-setup --all-skills
# Show config (+ computed status block)
cbx workflows config --scope global --show
# Edit active Postman workspace ID
cbx workflows config --scope global --edit
cbx workflows config --scope global --workspace-id "<workspace-id>"
cbx workflows config --scope global --clear-workspace-id
# Switch MCP runtime preference quickly
cbx workflows config --scope project --mcp-runtime local
cbx workflows config --scope project --mcp-runtime docker --mcp-fallback local
--show now includes computed status:
cbx rules init --platform <platform> --scope project --overwrite
cbx rules tech-md --overwrite
cbx rules tech-md --overwrite --compact
cbx skills ... remains as a compatibility alias for cbx workflows ....
MCP startup failed: Environment variable POSTMAN_API_KEY_* ... is not setCause:
Fix:
export POSTMAN_API_KEY_DEFAULT="<key>"
cbx workflows config --scope global --show
Then confirm status.postman.effectiveSource is env.
apiKeySource looks unset even after exportUse:
cbx workflows config --scope global --show
Check these fields:
status.postman.storedSourcestatus.postman.effectiveSourcestatus.postman.effectiveEnvVarIf stored source is env but effective source is unset, your env var alias is missing in the running process.
If installer says config was skipped:
--overwrite, orcbx workflows config / cbx workflows config keys ... to mutate existing config.Cause:
/workflows/skills.Fix:
# Ensure host skill vault exists
ls ~/.agents/skills
# Recreate runtime
cbx mcp runtime up --scope global --name cbx-mcp --replace
# Check mount hint
cbx mcp runtime status --scope global --name cbx-mcp
If ~/.agents/skills is missing, runtime still starts but will warn and skill discovery may return zero.
cbx mcp runtime up runs HTTP transport in Docker for shared local endpoint (http://127.0.0.1:<port>/mcp).cbx mcp serve --transport stdio runs local stdio transport for command-based MCP clients.cubis-foundry) for direct client integrations; use Docker runtime for explicit HTTP endpoint use cases.127.0.0.1:<port>/mcpIf Docker runtime starts but MCP endpoint is unreachable:
# Check health and hints
cbx mcp runtime status --scope project --name cbx-mcp
# Switch this project to local runtime
cbx workflows config --scope project --mcp-runtime local
# Use direct local server path
cbx mcp serve --transport stdio --scope auto
Installer now auto-cleans nested duplicate skills (for example duplicates under postman/*).
Run refresh install:
cbx workflows install --platform codex --bundle agent-environment-setup --overwrite --yes
cbx_config.jsonBehavior is now hard-fail. Create/repair cbx_config.json first:
cbx workflows config --scope global --clear-workspace-id
cbx_config.json is now the only supported config source for Postman/Stitch credentials.profiles[] + activeProfileName).config keys commands added (list/add/use/remove).config --show now reports stored vs effective auth source.npm install -g @cubis/foundry
cbx workflows install --platform codex --bundle agent-environment-setup --overwrite --yes
cbx workflows config --scope global --show
FAQs
Cubis Foundry CLI for workflow-first AI agent environments
The npm package @cubis/foundry receives a total of 2,094 weekly downloads. As such, @cubis/foundry popularity was classified as popular.
We found that @cubis/foundry demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 2 open source maintainers collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Security News
A recent burst of security disclosures in the OpenClaw project is drawing attention to how vulnerability information flows across advisory and CVE systems.

Research
/Security News
Mixed-script homoglyphs and a lookalike domain mimic imToken’s import flow to capture mnemonics and private keys.

Security News
Latio’s 2026 report recognizes Socket as a Supply Chain Innovator and highlights our work in 0-day malware detection, SCA, and auto-patching.