This page is a design/reference spec. Release truth lives in the runtime capability manifest and shipped product docs.
MCP Core Specification
Owner: PhantomPM Integrations Team
Last Updated: 2026-02-13
Status: Beta
Goal
Define PHANTOM as a local MCP provider with stable, versioned capabilities for coding agents and IDE clients.
Current Implementation State
- MCP server package exists at
packages/mcp-server. - Stdio server path is available via
phantom mcp serve. - Tool contracts implemented:
context.add,context.search,prd.generate,swarm.analyze,bridge.translate_pm_to_dev. - Integration data model exists in config layer.
Target State
A local MCP core service with:
- capability discovery
- tool execution
- resource retrieval
- permission-aware behavior
Initial Capability Surface
Tools:
context.addcontext.searchprd.generateswarm.analyzebridge.translate_pm_to_dev
Resources:
- active project summary
- installed modules summary
- capability matrix snapshot
Tool Contract Shape
Each tool request includes:
toolargumentsrequest_id
Each response includes:
request_idstatusresulterrors[]when applicable
Initial Tool Input/Output Contracts
context.add- input:
path, optionalmode - output:
statswith files/types/languages/health
- input:
context.search- input:
query, optionallimit - output:
matches[]with path, snippet, and type
- input:
prd.generate- input:
title, optionalscope, optionalconstraints[] - output:
prd_id,markdown, optionaloutput_path
- input:
swarm.analyze- input:
question, optionalcontext_scope, optionalagents[] - output:
consensus,confidence,agent_reports[]
- input:
bridge.translate_pm_to_dev- input:
pm_intent, optionalproduct_constraints - output:
technical_tasks[],acceptance_criteria[],risks[]
- input:
Permission Model
- default allow for local read actions
- explicit policy checks for external side effects
- denial responses include remediation guidance
Observability
- request duration metrics
- error class counts
- adapter-level success/failure counters
Acceptance Criteria
- MCP capability listing is deterministic
- tool responses conform to documented schema
- permission denials are explicit and auditable