
Security News
Attackers Are Hunting High-Impact Node.js Maintainers in a Coordinated Social Engineering Campaign
Multiple high-impact npm maintainers confirm they have been targeted in the same social engineering campaign that compromised Axios.
dear-claude
Advanced tools
MCP server that triggers local Claude Code instances from external platforms (GitHub, Linear, Jira, GitLab, Notion, Obsidian) when 'Dear Claude' is mentioned
MCP server that triggers local Claude Code instances from external platforms.
Say "Dear Claude" in Linear, GitHub, Jira, GitLab, Notion, or Obsidian — and a Claude Code instance spins up to handle it.
Your notes become architecture. Your tasks become pull requests.
Dear Claude is an MCP (Model Context Protocol) server that watches your project management tools for the phrase "Dear Claude". When detected, it spawns a local Claude Code instance that:
No Anthropic API keys needed. Works with your existing Claude Code subscription. 100% local and private — your code never leaves your machine.
| Platform | Trigger on issue/PR | Trigger on comment | Comment back | Emoji reactions | Sub-tasks | PR/MR review |
|---|---|---|---|---|---|---|
| GitHub | Yes | Yes | Yes | Yes | - | Yes |
| Linear | Yes | Yes | Yes | Yes | Yes | - |
| Jira | Yes | Yes | Yes | - | Yes | - |
| GitLab | Yes | Yes | Yes | Yes | - | Yes |
| Notion | Yes | Yes | Yes | - | - | - |
| Obsidian | Yes | - | Yes | - | - | - |
Instances from any platform get API access to all configured platforms. This enables workflows like:
claude mcp add dear-claude -- bunx dear-claude start --mcp
That's it. Start Claude Code and Dear Claude is ready.
claude command available)bunx)If you prefer manual configuration, add to ~/.claude.json under mcpServers:
{
"mcpServers": {
"dear-claude": {
"command": "bunx",
"args": ["dear-claude", "start", "--mcp"],
"env": {
"DEAR_CLAUDE_PORT": "3334",
"GITHUB_CLIENT_ID": "...",
"GITHUB_CLIENT_SECRET": "...",
"GITHUB_WEBHOOK_SECRET": "...",
"LINEAR_CLIENT_ID": "...",
"LINEAR_CLIENT_SECRET": "...",
"LINEAR_WEBHOOK_SECRET": "..."
}
}
}
}
Then start Claude Code:
claude
The MCP server starts automatically, sets up Tailscale Funnel, and prints your public webhook URLs.
Dear Claude uses Tailscale Funnel for stable public HTTPS URLs to receive webhooks. Setup is mostly automatic.
Install Tailscale:
# macOS
brew install tailscale
# Linux
curl -fsSL https://tailscale.com/install.sh | sh
Authenticate: tailscale up
Enable Funnel in the admin console: https://login.tailscale.com/admin/acls
"funnel" capability to your ACL policyThe server auto-configures Funnel on startup. Your public URL will be:
https://<your-hostname>.ts.net/dc
Tip: Run
tailscale serve status --jsonto verify your config. The health check auto-repairs the Funnel config every 10 seconds.
https://<your-hostname>.ts.net/dchttps://<your-hostname>.ts.net/dc/oauth/callback/githubhttps://<your-hostname>.ts.net/dc/webhook/githubGITHUB_CLIENT_ID=Iv1.abc123...
GITHUB_CLIENT_SECRET=abc123...
GITHUB_WEBHOOK_SECRET=your-webhook-secret
https://<your-hostname>.ts.net/dc/setup/githubrepo, write:discussionGITHUB_ACCESS_TOKEN=ghp_...Note: With a PAT alone you won't get webhook-triggered instances. You'd use the
spawn_instanceMCP tool or/api/spawnendpoint instead.
| Environment Variable | Description |
|---|---|
GITHUB_CLIENT_ID | GitHub App client ID |
GITHUB_CLIENT_SECRET | GitHub App client secret |
GITHUB_WEBHOOK_SECRET | Webhook signature verification secret |
GITHUB_ACCESS_TOKEN | Personal access token (alternative to OAuth) |
https://<your-hostname>.ts.net/dc/oauth/callback/linearhttps://<your-hostname>.ts.net/dc/webhook/linearLINEAR_CLIENT_ID=your-client-id
LINEAR_CLIENT_SECRET=your-client-secret
LINEAR_WEBHOOK_SECRET=your-signing-secret
https://<your-hostname>.ts.net/dc/setup/linearAfter OAuth, only issues/comments from your authenticated Linear account trigger Claude.
Alternative: Use a Personal API Key (LINEAR_ACCESS_TOKEN=lin_api_...) from Linear Settings → Account → API.
| Environment Variable | Description |
|---|---|
LINEAR_CLIENT_ID | OAuth client ID |
LINEAR_CLIENT_SECRET | OAuth client secret |
LINEAR_WEBHOOK_SECRET | Webhook signing secret |
LINEAR_ACCESS_TOKEN | Personal API key (alternative to OAuth) |
JIRA_DOMAIN=mycompany # Your Jira subdomain (mycompany.atlassian.net)
JIRA_USER_EMAIL=you@example.com # Your Atlassian account email
JIRA_API_TOKEN=ATATT3x... # The API token you just created
JIRA_WEBHOOK_SECRET=optional-secret # Optional shared secret
https://<your-hostname>.ts.net/dc/webhook/jira
JIRA_WEBHOOK_SECRET, append it: ?secret=YOUR_SECRETissue_created, issue_updated, comment_createdClaude can create sub-tasks, transition issue status, and add comments via the Jira REST API v2.
| Environment Variable | Description |
|---|---|
JIRA_DOMAIN | Jira subdomain (e.g. mycompany for mycompany.atlassian.net) |
JIRA_USER_EMAIL | Your Atlassian email |
JIRA_API_TOKEN | API token from Atlassian |
JIRA_WEBHOOK_SECRET | Optional shared secret for webhook verification |
api, read_repository, write_repositoryGITLAB_ACCESS_TOKEN=glpat-...
GITLAB_WEBHOOK_SECRET=your-secret
https://<your-hostname>.ts.net/dc/webhook/gitlabGITLAB_WEBHOOK_SECRETFor self-hosted GitLab, also set GITLAB_URL=https://your-gitlab-instance.com.
| Environment Variable | Description |
|---|---|
GITLAB_ACCESS_TOKEN | Personal access token |
GITLAB_WEBHOOK_SECRET | Webhook secret token |
GITLAB_URL | GitLab instance URL (default: https://gitlab.com) |
NOTION_ACCESS_TOKEN=ntn_...https://<your-hostname>.ts.net/dc/oauth/callback/notionNOTION_CLIENT_ID=your-client-id
NOTION_CLIENT_SECRET=your-secret
https://<your-hostname>.ts.net/dc/setup/notionNotion doesn't have native webhooks yet. To trigger Claude from Notion:
https://<your-hostname>.ts.net/dc/webhook/notionNOTION_WEBHOOK_SECRET if you want signature verification| Environment Variable | Description |
|---|---|
NOTION_ACCESS_TOKEN | Internal integration token |
NOTION_CLIENT_ID | OAuth client ID |
NOTION_CLIENT_SECRET | OAuth client secret |
NOTION_WEBHOOK_SECRET | Webhook verification secret |
Obsidian integration works via filesystem watching — no webhooks needed. Claude watches your vault for files containing "Dear Claude" and responds by appending to the same file.
OBSIDIAN_VAULT_PATH=/Users/yourname/Documents/MyVault
.md file and save.Claude's response appears as a callout block appended to the same note. The frontmatter gets a claude-status field (processing → done / error).
How it works:
.md file changes in the vault.obsidian/, .trash/, and dotfile directories[[other-note]]) — Claude resolves and reads them| Environment Variable | Description |
|---|---|
OBSIDIAN_VAULT_PATH | Absolute path to your Obsidian vault |
OBSIDIAN_WATCH_DEBOUNCE_MS | Debounce delay in ms (default: 2000) |
Write "Dear Claude" (case-insensitive, with a space) anywhere in:
.md filesGitHub PR Comment:
Dear Claude, please review this code for bugs and security issues.
Claude responds on GitHub:
Claude Instance Started (Instance:
abc12345) Processing your request...
Task Completed Found 2 issues:
- SQL injection in
user.ts:45- Missing input validation in
api.ts:102Created PR #15 with fixes.
Claude instances can spawn other instances for parallel work:
Dear Claude, code tasks 1-5 in parallel. Each task should be a separate branch.
Claude will:
/api/spawn endpoint# Server
DEAR_CLAUDE_PORT=3334
TAILSCALE_HOSTNAME= # Optional: auto-detected
# GitHub
GITHUB_CLIENT_ID=
GITHUB_CLIENT_SECRET=
GITHUB_WEBHOOK_SECRET=
GITHUB_ACCESS_TOKEN=
# Linear
LINEAR_CLIENT_ID=
LINEAR_CLIENT_SECRET=
LINEAR_WEBHOOK_SECRET=
LINEAR_ACCESS_TOKEN=
# Jira Cloud
JIRA_DOMAIN=mycompany
JIRA_USER_EMAIL=you@example.com
JIRA_API_TOKEN=
JIRA_WEBHOOK_SECRET=
# GitLab
GITLAB_ACCESS_TOKEN=
GITLAB_WEBHOOK_SECRET=
GITLAB_URL= # Default: https://gitlab.com
# Notion
NOTION_CLIENT_ID=
NOTION_CLIENT_SECRET=
NOTION_WEBHOOK_SECRET=
NOTION_ACCESS_TOKEN=
# Obsidian
OBSIDIAN_VAULT_PATH=
OBSIDIAN_WATCH_DEBOUNCE_MS=2000
# Optional
GIPHY_API_KEY= # For fun GIF reactions in responses
# Start the server (standalone mode)
bun run src/index.ts start
# Start as MCP server (stdio, for Claude Code)
bun run src/index.ts start --mcp
# Check server and platform status
bun run src/index.ts status
# List instances
bun run src/index.ts instances
# Setup instructions for a platform
bun run src/index.ts setup <platform>
When running as an MCP server inside Claude Code, these tools are available:
| Tool | Description |
|---|---|
list_platforms | List configured platforms and their status |
list_instances | List all Claude instances (filter by status) |
get_instance_status | Get detailed status of a specific instance |
get_instance_messages | Get conversation history for an instance |
kill_instance | Terminate a running instance |
get_running_instances | List currently running instance IDs |
spawn_instance | Spawn a new Claude instance for a task |
get_project_instances | List all instances in a project group |
The server also exposes REST endpoints on localhost:3334:
| Endpoint | Method | Description |
|---|---|---|
/health | GET | Health check + platform status |
/webhook/:platform | POST | Webhook receiver |
/api/instances | GET | List instances (?project_id= filter) |
/api/instances/:id | GET | Get instance details + children |
/api/instances/:id/kill | POST | Kill a running instance |
/api/spawn | POST | Spawn a new instance programmatically |
/api/platforms | GET | List configured platforms |
/setup/:platform | GET | Start OAuth flow |
/oauth/callback/:platform | GET | OAuth callback |
{
"prompt": "Implement the login page",
"repo_url": "https://github.com/owner/repo",
"branch": "feature/login",
"base_branch": "main",
"parent_instance_id": "optional-parent-id",
"project_id": "optional-project-id"
}
Webhooks / File Watcher
┌────────┐ ┌────────┐ ┌──────┐ ┌────────┐ ┌──────────┐ ┌────────┐
│ GitHub │ │ Linear │ │ Jira │ │ GitLab │ │ Obsidian │ │ Notion │
└───┬────┘ └───┬────┘ └──┬───┘ └───┬────┘ └────┬─────┘ └───┬────┘
│ │ │ │ │ │
└──────────┴────┬────┴─────────┴────────────┴────────────┘
│
▼
┌─────────────────────┐
│ Tailscale Funnel │
│ (Public HTTPS URL) │
└─────────┬───────────┘
│
▼
┌─────────────────────┐
│ dear-claude │
│ MCP Server │
│ │
│ • Trigger detection │
│ • Instance manager │
│ • Platform adapters │
│ • Spawn API │
│ • SQLite DB │
└─────────┬───────────┘
│
▼
┌─────────────────────┐
│ Claude Code │
│ Instances │
│ (Agent SDK) │
│ │
│ • Git worktrees │
│ • Cross-platform │
│ API access │
│ • Child spawning │
└─────────────────────┘
PENDING → RUNNING → IDLE → (follow-up) → RUNNING → IDLE → ... → EXPIRED (7 days)
↘ COMPLETED
↘ FAILED
# Install dependencies
bun install
# Run dev mode
bun run dev
# Type check
bunx tsc --noEmit
# Build
bun run build
# Run tests
bun test
sudo systemctl start tailscaled && tailscale up (Linux)tailscale serve/tailscale funnel command may have overwritten it. The health check auto-repairs within 10 seconds. Verify with tailscale serve status --json.bun run src/index.ts status to verify the server is up. Test with curl https://<your-hostname>.ts.net/dc/health.issue_comment events. To trigger on a new PR, post a comment — PR descriptions alone won't trigger.https://<your-hostname>.ts.net/dc/setup/<platform> to re-authenticate.data/dear-claude.db and re-authenticate.claude) is installed and accessible in your PATH.data/workspaces/. Ensure write permissions.MIT
FAQs
MCP server that triggers local Claude Code instances from external platforms (GitHub, Linear, Jira, GitLab, Notion, Obsidian) when 'Dear Claude' is mentioned
We found that dear-claude demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Security News
Multiple high-impact npm maintainers confirm they have been targeted in the same social engineering campaign that compromised Axios.

Security News
Axios compromise traced to social engineering, showing how attacks on maintainers can bypass controls and expose the broader software supply chain.

Security News
Node.js has paused its bug bounty program after funding ended, removing payouts for vulnerability reports but keeping its security process unchanged.