Help us improve
Share bugs, ideas, or general feedback.
From rune
Sets up Rune plugin: installs Python environment, collects Vault endpoint/token/TLS details, generates config, registers MCP servers. Quick update mode for vault fields via --vault-token or --vault-endpoint.
npx claudepluginhub cryptolabinc/rune --plugin runeHow this command is triggered — by the user, by Claude, or both
Slash command
/rune:configureclaude/This command is limited to the following tools:
The summary Claude sees in its command listing — used to decide when to auto-load this command
# /rune:configure — Full Setup & Configuration Single entrypoint after `claude plugin install rune`. Handles environment setup, credential collection, config generation, MCP server registration, and auto-activation. ## Quick Update Mode If $ARGUMENTS contains any of: `--vault-token`, `--vault-endpoint`: 1. Read existing `~/.rune/config.json` - If not found: respond "Not configured yet. Run `/rune:configure` without arguments first." and stop. 2. Update only the specified field(s): - `--vault-token <value>` → `vault.token` - `--vault-endpoint <value>` → `vault.endpoint` (auto-pr...
/setupConfigures Vault PKM plugin: sets Obsidian vault path and optional OpenAI API key plus permissions in ~/.claude/settings.json, checks scaffolding, verifies setup.
/context-hub-setupConfigures Context Hub dependencies by installing prerequisite plugins Serena and Context7, and setting up Forgetful MCP server with standard SQLite or custom PostgreSQL/HTTP options. Verifies setup status.
/setup-mcpGuides interactive MCP server setup wizard: checks prerequisites like uvx, backs up configs, verifies plugin installation, configures optional API keys.
/setupDetects installed AI CLIs (Codex, Gemini, Cursor, Copilot) via version probes, prompts to install cc-multi-cli-plugin for each if missing, supports --dry-run.
/setupSets up connect-apps plugin: prompts for Composio API key, validates it via Python/Bash, writes MCP config to ~/.mcp.json enabling actions in 500+ apps like Gmail, Slack, GitHub.
/configureGuides users through configuring HUD display options — layout, preset, language, and which elements to show or hide — while preserving advanced manual overrides.
Share bugs, ideas, or general feedback.
Single entrypoint after claude plugin install rune. Handles environment setup, credential collection, config generation, MCP server registration, and auto-activation.
If $ARGUMENTS contains any of: --vault-token, --vault-endpoint:
~/.rune/config.json
/rune:configure without arguments first." and stop.--vault-token <value> → vault.token--vault-endpoint <value> → vault.endpoint (auto-prepend tcp:// if no scheme)~/.rune/config.json with chmod 600metadata.lastUpdated to current ISO timestampreload_pipelines MCP tool to apply changes/rune:status to verify."Skip all steps below.
Find where the plugin is installed:
PLUGIN_ROOT=$(find ~/.claude/plugins/cache -name "plugin.json" -path "*/rune/*" -exec dirname {} \; 2>/dev/null | head -1 | xargs dirname 2>/dev/null)
.claude-plugin/plugin.jsonclaude plugin install rune first." and stop.Check if $PLUGIN_ROOT/.venv exists.
bash $PLUGIN_ROOT/scripts/install.sh
Check if ~/.rune/config.json already exists.
Ask user for each credential one at a time:
tcp://vault-TEAM.oci.envector.io:50051)
tcp://, http://, or https://), auto-prepend tcp://.vault.example.com:50051 → store as tcp://vault.example.com:50051evt_xxx)Then ask the TLS question:
"How does your Vault server handle TLS?"
Self-signed certificate — "My team uses a self-signed CA (provide CA cert path)"
~ expansion in the path~/.rune/certs/ca.pem (cp <user_path> ~/.rune/certs/ca.pem && chmod 600 ~/.rune/certs/ca.pem)ca_cert: "~/.rune/certs/ca.pem", tls_disable: falsePublic CA (default) — "Vault uses a publicly-signed certificate (e.g., Let's Encrypt)"
ca_cert: "", tls_disable: falseNo TLS — "Connect without TLS (not recommended — traffic is unencrypted)"
ca_cert: "", tls_disable: truemkdir -p ~/.rune && chmod 700 ~/.rune
Write the config file:
{
"vault": {"endpoint": "<vault_endpoint>", "token": "<vault_token>", "ca_cert": "<ca_cert_path or empty>", "tls_disable": false},
"state": "dormant",
"metadata": {"configVersion": "2.0", "lastUpdated": "<ISO timestamp>", "installedFrom": "<PLUGIN_ROOT>"}
}
Note: enVector credentials are no longer stored locally — they are delivered automatically via the Vault bundle at session start.
Then: chmod 600 ~/.rune/config.json
Run: bash $PLUGIN_ROOT/scripts/configure-claude-mcp.sh
This registers the envector MCP server via claude mcp add --scope user (Claude Code) and JSON merge (Claude Desktop).
Important: Do NOT change state to "active" here. Activation must happen via
/rune:activate, which calls reload_pipelines on the already-connected MCP server
to download the embedding model (~1.2GB) and initialize pipelines. If state is set
to "active" without reload_pipelines, the next Claude Code restart will attempt
model download during MCP server startup, exceeding the 30-second connection timeout.
Run infrastructure validation:
vault.endpoint:
http:// or https://: curl -sf <vault-endpoint>/healthtcp://: extract host and port, then test TCP connectivity:
python3 -c "import socket; s=socket.socket(); s.settimeout(10); s.connect(('<host>', <port>)); print('OK'); s.close()"
$PLUGIN_ROOT/.venv/bin/python3 -c "import mcp"If all checks pass:
state as "dormant" (do NOT set to "active")/rune:activate to enable organizational memory."If checks fail:
state as "dormant"/rune:activate."Show summary:
Rune Configuration Complete
============================
Config : ~/.rune/config.json
Plugin : <PLUGIN_ROOT>
Python : <PLUGIN_ROOT>/.venv
MCP : registered via claude mcp add (user scope)
State : <active|dormant>
Vault TLS : <enabled (system CA) | enabled (custom CA: <path>) | disabled>
Next steps:
1. Restart Claude Code to load the MCP server
2. After restart, run /rune:activate to download the embedding model and enable