Skip to main content

Smart reviewers, commands, and session search for Claude Code

Project description

claude-jacked

A control panel for Claude Code. Smart reviewers, security automation, session search, and a web dashboard to manage it all — without touching a config file.

jacked dashboard — accounts


What You Get

  • Stop clicking "approve" on every terminal command — Claude Code asks permission for every bash command it runs. The security gatekeeper handles the safe ones automatically, so you only get interrupted when something is actually risky.
  • Catch bugs before they ship/dcr spawns parallel reviewers across 11 lenses (security, performance, logic, observability, data integrity, and more) in recursive waves until everything passes clean. 10 built-in agents, always available.
  • Find any past conversation — Search your Claude history by describing what you were working on. Works across machines, works across teammates. (requires [search] extra)
  • Manage everything from a web dashboard — Toggle features on and off, configure the security system, monitor decisions, track usage — all from your browser. No config files, no terminal commands.

Quick Start

Option 1: Let Claude Install It

Paste this into Claude Code and it handles everything:

Install claude-jacked for me. Use AskUserQuestion to ask me which features I want:

1. First check if uv and jacked are already installed (if uv is missing: curl -LsSf https://astral.sh/uv/install.sh | sh)
2. Ask me which install tier I want:
   - BASE (Recommended): Smart reviewers, commands, behavioral rules, web dashboard
   - SEARCH: Everything above + search past Claude sessions across machines (requires Qdrant Cloud)
   - SECURITY: Everything above + auto-approve safe bash commands (fewer permission prompts)
   - ALL: Everything
3. Install based on my choice:
   - BASE: uv tool install claude-jacked && jacked install --force
   - SEARCH: uv tool install "claude-jacked[search]" && jacked install --force
   - SECURITY: uv tool install claude-jacked && jacked install --force --security
   - ALL: uv tool install "claude-jacked[all]" && jacked install --force --security
4. If I chose SEARCH or ALL, help me set up Qdrant Cloud credentials
5. Verify with: jacked --help
6. Launch the dashboard: jacked webux

Option 2: Manual Install

Run once from anywhere — installs globally to ~/.claude/ and applies to all your Claude Code sessions:

uv tool install claude-jacked
jacked install --force
jacked webux              # opens your dashboard at localhost:8321

Don't have uv? Install it first: curl -LsSf https://astral.sh/uv/install.sh | sh (Mac/Linux) or powershell -c "irm https://astral.sh/uv/install.ps1 | iex" (Windows)

Option 3: Install as a Plugin (Teams)

Add to your team's Claude Code environment — no Python install needed:

/plugin marketplace add jackneil/claude-jacked
/plugin install jacked@jacked-marketplace

Commands are namespaced as /jacked:dcr, /jacked:qa, etc. Includes all 14 commands and 10 agents. Does not include the Python-powered features (dashboard, gatekeeper, session search) — use Option 1 or 2 for those.

Want more? Add optional extras:

# Add session search (needs Qdrant Cloud ~$30/mo)
uv tool install "claude-jacked[search]" --force && jacked install --force

# Add security gatekeeper (auto-approves safe bash commands, included in base install)
jacked install --force --security

# Everything (base + search)
uv tool install "claude-jacked[all]" --force && jacked install --force --security

Your Dashboard

The web dashboard ships with every install. Run jacked webux to open it.

Toggle Features On and Off

Enable or disable any of the 10 built-in code reviewers and 7 slash commands with one click. Each card shows what it does so you know what you're turning on.

Settings — Agents

Monitor Security Decisions

Every tool call the gatekeeper evaluates is logged — bash commands, file operations, web access, and more. See the decision, the method used, the full command, and the LLM's reasoning — all filterable by session and method. Approve commands directly from the log viewer with "Always Allow."

Gatekeeper Logs

Track Everything

Approval rates, which evaluation methods are being used, command frequency, and system health — all at a glance.

Analytics

More Dashboard Views

Security Gatekeeper Configuration — Configure the multi-tier evaluation pipeline, toggle per-tool interception, choose the LLM model, set the evaluation method, manage API keys, and edit the LLM prompt — all from the Gatekeeper tab.

Settings — Gatekeeper

Feature Toggles — Toggle hooks (session indexing, sound notifications) and knowledge documents (behavioral rules, skills, reference docs) on and off.

Settings — Features

Commands — Enable or disable any of the 14 slash commands.

Settings — Commands

Permissions Panel — Manage allowed commands with project-level vs global scope. Add new allow rules or promote commands from the log viewer with "Always Allow."

Security Profiles — Export, import, and backup your gatekeeper configuration. Share security settings across machines or teams.

Analytics Dashboard — Charts, heatmap, command frequency breakdown, and drill-down by session or method.


Table of Contents


What's Included

Base (uv tool install claude-jacked)

Feature What It Does
10 Code Reviewers Automatic checks for bugs, security issues, complexity, missing tests
14 Slash Commands /dc, /dcr, /pr, /learn, /redo, /techdebt, /audit-rules, /qa, /ux, /swarm, /swarm-research, /release, /whats-next, /jacked-setup
Behavioral Rules Smart defaults that make Claude follow better workflows
Sound Notifications Audio alerts when Claude needs input or finishes (via --sounds)
Web Dashboard 5-page local dashboard — manage everything from your browser
Account Management Track Claude accounts, usage limits, subscription status
Feature Toggles Enable/disable any reviewer, command, or hook from the dashboard
Analytics Approval rates, command usage, charts, heatmap, drill-down
Security Profiles Export, import, and backup gatekeeper configurations
Permissions Management "Always Allow" from logs, project-level vs global permission scopes

Search Extra (uv tool install "claude-jacked[search]")

Feature What It Does
Session Search Find any past Claude conversation by describing what you were working on
Cross-Machine Sync Start on desktop, continue on laptop — your history follows you
Team Sharing Search your teammates' sessions (with their permission)

Security Gatekeeper (activate with jacked install --security)

Feature What It Does
Security Gatekeeper Intercepts all tool calls — auto-approves safe ones, blocks dangerous ones, asks about the rest
Tool Registry Per-tool enable/disable toggles from the dashboard (Bash, Read, Edit, Write, Grep, Glob, Web, MCP)
Shell Injection Defense Detects shell operators (&&, `
Path Safety Blocks access to sensitive files (.env, .ssh/, credentials) across all file tools
File Context Analysis Reads referenced scripts and evaluates what code actually does
Command Categories Configurable per-category behavior (allow/ask/evaluate) for network, packages, git, docker, etc.
Customizable Prompt Tune the safety evaluation via the dashboard or ~/.claude/gatekeeper-prompt.txt
Permission Audit Scans your permission rules for dangerous wildcards that bypass the gatekeeper
Session-Tagged Logs Every decision tagged with session ID for multi-session tracking
Log Redaction Passwords, API keys, and tokens automatically redacted from logs

Web Dashboard

jacked webux                    # Opens dashboard at localhost:8321
jacked webux --port 9000        # Custom port
jacked webux --no-browser       # Start server without opening browser

The dashboard is a local web app that runs on your machine. All data stays in ~/.claude/jacked.db — nothing is sent anywhere.

5 pages: Accounts, Installations, Settings (tabbed: Agents / Commands / Gatekeeper / Features / Plugins / Claude Code / Advanced / Profiles), Logs, Analytics.


Security Gatekeeper

The security gatekeeper intercepts all tool calls Claude makes — bash commands, file reads/writes, web access, and MCP tools — and decides whether to auto-approve, block, or ask you. Each tool type gets the appropriate level of scrutiny. Most decisions resolve in under 2 milliseconds.

How It Works

The hook uses an empty matcher to intercept every tool call, then dispatches by tool type:

  • Bash commands go through the full multi-tier evaluation chain (see below)
  • File tools (Read, Edit, Write, Grep, Glob) get path-safety checks for sensitive files and directories
  • Web tools (WebFetch, WebSearch) are auto-approved with audit logging (read-only access)
  • MCP tools are auto-approved with audit logging (user opted in via toggle)

Each tool can be individually enabled or disabled from the dashboard via the tool registry (Settings > Gatekeeper > Tools).

Bash Evaluation Chain

A multi-tier chain, fastest first:

Tier Speed What It Does
Deny patterns <1ms Blocks dangerous commands with labeled reasons (sudo, rm -rf, reverse shells, DROP, etc.)
Command categories <1ms Configurable per-category behavior — allow, ask, or evaluate (network, packages, git, docker, etc.)
Path safety <1ms Blocks bash commands targeting sensitive files (.env, .ssh/, credentials, keystores)
Permission rules <1ms Checks commands already approved in your Claude settings
Local allowlist <1ms Matches safe patterns (specific git/gh/docker/make subcommands, pytest, etc.)
LLM evaluation ~2s Sends ambiguous commands to an LLM with file context for judgment

Commands containing shell operators (&&, ||, ;, |, etc.) always go to the LLM — they're never auto-approved by the local allowlist.

Always Allow

Approve commands directly from the Logs page. Click "Always Allow" on any logged command to add it to your permission rules. Permissions can be scoped to the current project or applied globally.

Install / Uninstall

jacked install --force --security

To remove just the security hook:

jacked uninstall --security

Configuration

Configure the gatekeeper from the dashboard (Settings > Gatekeeper tab) or the CLI:

  • LLM model: Haiku (fastest, cheapest), Sonnet, or Opus
  • Evaluation method: API First, CLI First, API Only, or CLI Only
  • Custom prompt: Edit the LLM evaluation prompt from the dashboard or via jacked gatekeeper show

Faster LLM Evaluation

With an Anthropic API key, the gatekeeper calls the API directly (~2s) instead of spawning a CLI process (~8s):

export ANTHROPIC_API_KEY="sk-..."

Or set the API key in the dashboard under Settings > Gatekeeper > API Key Override.

Debug Logging

Every decision is logged to ~/.claude/hooks-debug.log, tagged with session IDs:

2025-02-07T11:36:34 [87fd8847] EVALUATING: ls -la /tmp
2025-02-07T11:36:34 [87fd8847] LOCAL SAID: YES (0.001s)
2025-02-07T11:36:34 [87fd8847] DECISION: ALLOW (0.001s)

Or view decisions in the dashboard under Logs — filterable, searchable, exportable.

Permission Audit

If you've set broad permission wildcards in Claude Code (like Bash(python:*)), those commands bypass the gatekeeper entirely. The audit catches this:

jacked gatekeeper audit           # Scan permission rules
jacked gatekeeper audit --log     # Also review recent auto-approved commands

Sensitive data (passwords, API keys, tokens) is automatically redacted from all logs.


Session Search

Once installed with the [search] extra, search your past Claude sessions from within Claude Code.

Finding Past Work

/jacked user authentication login
Search Results:
#  Score  User  Age      Repo           Preview
1  92%    YOU   3d ago   my-app         Implementing JWT auth with refresh tokens...
2  85%    YOU   2w ago   api-server     Adding password reset flow...
3  78%    @sam  1w ago   shared-lib     OAuth2 integration with Google...

Resuming Work from Another Computer

/jacked that shopping cart feature I was building

Claude finds it and you can continue right where you left off.

Team Sharing

Share knowledge across your team by using the same cloud database:

# Everyone uses the same database
export QDRANT_CLAUDE_SESSIONS_ENDPOINT="https://team-cluster.qdrant.io"
export QDRANT_CLAUDE_SESSIONS_API_KEY="team-api-key"

# Each person sets their own name
export JACKED_USER_NAME="sarah"
/jacked how did Sam implement the payment system

Built-in Reviewers and Commands

Quick Commands

Type these directly in Claude Code:

Command What It Does
/dc Double-check — Reviews your recent work for bugs, security issues, and problems
/dcr Recursive Review — Spawns parallel reviewers across 11 lenses (security, performance, logic, UX, observability, data integrity, etc.) in waves until all pass clean
/swarm Swarm — Parallel implementation across 3-8 coordinated agents with file-level isolation
/swarm-research Divergent Research — Spawns 2-5 independent agents from different angles, synthesizes proposals, then verifies + attacks with devil's advocate
/qa QA Testing — Browser-based QA testing of UI changes with Playwright or Chrome DevTools MCP
/ux UX Testing — Parallel browser-based UX checks across multiple pages and aspects simultaneously
/whats-next Roadmap Advisor — Analyzes plans, issues, commits, and lifecycle stage to recommend highest-yield next work
/pr Pull Request — Checks PR status, creates/updates PRs with proper issue linking
/release Release — Full release pipeline: bump version, push, CI, GitHub Release, PyPI publish
/learn Learn — Distills a lesson from the current session into a CLAUDE.md rule
/redo Redo — Scraps the current approach and re-implements cleanly with full hindsight
/techdebt Tech Debt — Scans for TODOs, oversized files, missing tests, dead code
/audit-rules Audit Rules — Checks CLAUDE.md for duplicates, contradictions, stale rules
/jacked-setup Repo Setup — Generates repo-specific configs for /whats-next, /qa, /ux, /dcr — faster repeat runs

Smart Reviewers

These work automatically when Claude thinks they'd help, or you can ask for them:

Reviewer What It Catches
Double-check Security holes, authentication gaps, data leaks
Code Simplicity Over-complicated code, unnecessary abstractions
Error Handler Missing error handling, potential crashes
Test Coverage Untested code, missing edge cases

Example: After building a new feature:

Use the double-check reviewer to review what we just built

QA Browser Testing

The /qa command runs browser-based QA on UI changes from the current session. It detects modified UI files (JS, CSS, HTML, Vue, Svelte, etc.), opens the app in a browser, and runs visual checks, interactive tests, and console error scans. Auto-suggested via a Stop hook when UI files are modified. Requires Playwright MCP or Claude-in-Chrome.


Sound Notifications

Get audio alerts so you don't have to watch the terminal:

jacked install --force --sounds
  • Notification sound — Plays when Claude needs your input
  • Completion sound — Plays when Claude finishes a task

Works on Windows, Mac, and Linux. To remove: jacked uninstall --sounds


Uninstall / Troubleshooting

Uninstall

jacked uninstall && uv tool uninstall claude-jacked

Your cloud database stays intact — reinstall anytime without losing history.

Common Issues

"jacked: command not found" — Run uv tool update-shell and restart your terminal.

Search isn't working — You need Qdrant Cloud set up first. Ask Claude: Help me set up Qdrant Cloud for jacked

Sessions not showing up — Run jacked backfill to index existing sessions.

Windows errors — Claude Code on Windows uses Git Bash, which can have path issues. Ask Claude: Help me fix jacked path issues on Windows


Cloud Database Setup (Qdrant)

Only needed for the [search] extra. The base install works without Qdrant.

  1. Install the search extra: uv tool install "claude-jacked[search]"
  2. Go to cloud.qdrant.io and create an account
  3. Create a cluster (paid tier ~$30/month required)
  4. Copy your cluster URL and API key
  5. Add to your shell profile:
export QDRANT_CLAUDE_SESSIONS_ENDPOINT="https://your-cluster.qdrant.io"
export QDRANT_CLAUDE_SESSIONS_API_KEY="your-api-key"
  1. Restart terminal and run:
jacked backfill    # Index existing sessions
jacked status      # Verify connectivity

Security Note

Your conversations are sent to Qdrant Cloud (if using [search]). This includes everything you and Claude discuss, code snippets, and file paths.

Recommendations: Don't paste passwords or API keys in Claude sessions. Keep your Qdrant API key private. For sensitive work, consider self-hosting Qdrant.


Version History

Version Changes
0.24.0 Plugin marketplace — repo doubles as a Claude Code plugin marketplace for team distribution. Zero file duplication.
0.23.x /swarm-research — divergent research skill (2-5 parallel agents from different angles, synthesis, devil's advocate). Observability & Data Integrity lenses added to DCR (11 lenses total). New wild cards, pre-mortem scenarios, and reviewer personas.
0.22.0 Chrome DevTools MCP integration for /qa and /ux browser testing.
0.21.0 One-click upgrade from the dashboard (upgrade + reinstall + restart).
0.20.x DCR plan-mode support — review plan docs while in plan mode. Dynamic skills dashboard. Simplicity & Reuse lens.
0.19.x /ux parallel browser testing — spawns 2-4 agents testing different UX aspects simultaneously. /jacked-setup standalone generation for /qa, /ux, /dcr, /whats-next.
0.18.x /dcr recursive review — parallel waves of focused reviewers with lens pairing, personas, wild cards, and pre-mortem analysis.
0.17.x /release workflow — bump version, push, CI, GitHub Release, PyPI publish.
0.16.x /swarm — coordinated parallel implementation across 3-8 agent teammates.
0.15.x /whats-next — roadmap advisor with lifecycle detection, tier-based prioritization.
0.9.1 Catch-all PreToolUse hook — intercepts all tools (file tools get path-safety checks, web/MCP tools get auto-approve with logging, Bash keeps full eval chain). Tool registry with per-tool enable/disable. Labeled deny patterns for clearer audit logs. /qa command + Stop hook for browser QA. oauthAccount seeding, plugin toggle fix.
0.9.0 Analytics dashboard with charts, heatmap, and drill-down. Security profiles — export, import, and backup gatekeeper configurations. Profile API endpoints + Settings UI panel.
0.8.0 Permissions panel — manage allowed commands with project-level vs global scope. "Always Allow" from log rows. Method filter on log viewer.
0.7.5 Workspace trust, per-account config directories.
0.7.4 Per-account launch isolation, credential helpers extraction.
0.7.3 Credential sync hardening, gatekeeper security audit.
0.7.2 Fix "Set Active" on macOS — Keychain write.
0.7.1 macOS Keychain credential support, gatekeeper settings tab, uv migration.
0.7.0 Multi-account credential sync, WebSocket dashboard, session dedup.
0.6.0–0.6.1 Per-row badges, background op auto-approve, mobile responsive dashboard, security hardening.
0.5.0 Guardrails framework, lessons dashboard viewer, hardlink installs, jacked check-version command. Security hardening (shell operator regex, tightened safe prefixes, session-tagged logs, LLM reason logging).
0.4.0 Web dashboard with 5-page local UI (Accounts, Installations, Settings, Logs, Analytics). Feature toggle API — enable/disable agents, commands, hooks, knowledge from the browser. Settings redesigned as tabbed interface. Account management with OAuth, usage monitoring, multi-account priority ordering. Gatekeeper log viewer with session filtering, search, export, purge. Analytics dashboard. Web deps (FastAPI, uvicorn) now included in base install.
0.3.11 Security hardening: shell operator detection, tightened safe prefixes, expanded deny patterns, file context prompt injection defense, path traversal prevention. Session ID tags in logs. LLM reason logging. 375 tests.
0.3.10 Fix format string explosion, qdrant test skip fix.
0.3.9 Permission safety audit, README catchup.
0.3.8 Log redaction, psql deny patterns, customizable LLM prompt.
0.3.7 JSON LLM responses, parse_llm_response(), 148 unit tests.

Advanced / Technical Reference

CLI Command Reference
# Search
jacked search "query"              # Search all sessions
jacked search "query" --mine       # Only your sessions
jacked search "query" --user name  # Specific teammate
jacked search "query" --repo path  # Boost specific repo

# Session Management
jacked sessions                    # List indexed sessions
jacked retrieve <session_id>       # Get session content
jacked retrieve <id> --mode full   # Get full transcript
jacked delete <session_id>         # Remove from index
jacked cleardb                     # Delete all your data

# Setup
jacked install --force              # Install agents, commands, rules
jacked install --force --security  # Also add security gatekeeper hook
jacked install --force --sounds    # Also add sound notifications
jacked uninstall                   # Remove from Claude Code
jacked uninstall --sounds          # Remove only sounds
jacked uninstall --security        # Remove only security hook
jacked backfill                    # Index all existing sessions
jacked status                      # Check connectivity
jacked check-version               # Check for newer version

# Security Gatekeeper
jacked gatekeeper show             # Print current LLM prompt
jacked gatekeeper reset            # Reset prompt to built-in default
jacked gatekeeper diff             # Compare custom vs built-in prompt
jacked gatekeeper audit            # Audit permission rules
jacked gatekeeper audit --log      # Also scan recent auto-approved commands

# Security Profiles
jacked profiles list               # List saved profiles
jacked profiles export <name>      # Export current config as a named profile
jacked profiles import <path>      # Import a profile from a JSON file
jacked profiles delete <name>      # Delete a saved profile

# Dashboard
jacked webux                       # Open web dashboard
jacked webux --port 9000           # Custom port
jacked webux --no-browser          # Server only, no auto-open

# Slash Commands
# /dc /dcr /pr /learn /redo /techdebt /audit-rules /qa /ux
# /swarm /swarm-research /release /whats-next /jacked-setup
Environment Variables

Required (for [search] only):

Variable Description
QDRANT_CLAUDE_SESSIONS_ENDPOINT Your Qdrant Cloud URL
QDRANT_CLAUDE_SESSIONS_API_KEY Your Qdrant API key

Optional:

Variable Default Description
JACKED_USER_NAME git username Your name for team attribution
JACKED_TEAMMATE_WEIGHT 0.8 How much to weight teammate results
JACKED_OTHER_REPO_WEIGHT 0.7 How much to weight other repos
JACKED_TIME_DECAY_HALFLIFE_WEEKS 35 How fast old sessions lose relevance
JACKED_HOOK_DEBUG (unset) Set to 1 for verbose security hook logging
ANTHROPIC_API_KEY (unset) Enables fast (~2s) LLM evaluation in security hook
Web Dashboard Architecture

The dashboard is a local web application:

  • Backend: FastAPI (Python) serving a REST API
  • Database: SQLite at ~/.claude/jacked.db
  • Frontend: Vanilla JS + Tailwind CSS (no build step, no npm)
  • Server: Uvicorn, runs at localhost:8321

All data stays on your machine. The dashboard reads Claude Code's configuration files (~/.claude/settings.json, ~/.claude/agents/, etc.) and provides a visual interface for managing them.

API endpoints: /api/health, /api/features, /api/settings/*, /api/auth/*, /api/analytics/*, /api/logs/*, /api/profiles/*, /api/permissions/*

How It Works (Technical)
+---------------------------------------------------------+
|  YOUR MACHINE                                           |
|                                                         |
|  Claude Code                                            |
|  +-- Stop hook -> jacked index (after every response)   |
|  +-- /jacked skill -> search + load context             |
|                                                         |
|  ~/.claude/projects/                                    |
|  +-- {repo}/                                            |
|      +-- {session}.jsonl  <-- parsed and indexed        |
+---------------------------------------------------------+
                            |
                            | HTTPS
                            v
+---------------------------------------------------------+
|  QDRANT CLOUD                                           |
|                                                         |
|  - Server-side embedding (no local ML needed)           |
|  - Vectors + transcripts stored                         |
|  - Accessible from any machine                          |
+---------------------------------------------------------+

Indexing: After each Claude response, a hook automatically indexes the session. The indexer extracts plan files, agent summaries, labels, and user messages.

Retrieval modes: smart (default), full, plan, agents, labels

All Agents
Agent Description
double-check-reviewer CTO/CSO-level review for security, auth gaps, data leaks
code-simplicity-reviewer Reviews for over-engineering and unnecessary complexity
defensive-error-handler Audits error handling and adds defensive patterns
git-pr-workflow-manager Manages branches, commits, and PR organization
pr-workflow-checker Checks PR status and handles PR lifecycle
issue-pr-coordinator Scans issues, groups related ones, manages PR workflows
test-coverage-engineer Analyzes and improves test coverage
test-coverage-improver Adds doctests and test files systematically
readme-maintainer Keeps README in sync with code changes
wiki-documentation-architect Creates/maintains GitHub Wiki documentation
Hook Configuration

The jacked install command adds hooks to ~/.claude/settings.json:

{
  "hooks": {
    "Stop": [
      {
        "matcher": "",
        "hooks": [{"type": "command", "command": "jacked index --repo \"$CLAUDE_PROJECT_DIR\"", "async": true}]
      },
      {
        "matcher": "",
        "hooks": [{"type": "command", "command": "python /path/to/qa_suggest.py", "async": true}]
      }
    ],
    "PreToolUse": [{
      "matcher": "",
      "hooks": [{"type": "command", "command": "python /path/to/security_gatekeeper.py", "timeout": 30}]
    }]
  }
}

The PreToolUse matcher is an empty string (catch-all) — the gatekeeper script internally dispatches by tool type and checks the tool registry for per-tool enable/disable settings.

Guided Install Prompt (Full)

Copy this into Claude Code for a guided installation:

Install claude-jacked for me. Use the AskUserQuestion tool to guide me through options.

PHASE 1 - DIAGNOSTICS:
- Detect OS (Windows/Mac/Linux)
- Check: uv --version (if missing: curl -LsSf https://astral.sh/uv/install.sh | sh on Mac/Linux, powershell -c "irm https://astral.sh/uv/install.ps1 | iex" on Windows)
- Check: jacked --version (to see if already installed)
- Check ~/.claude/settings.json for existing hooks

PHASE 2 - ASK USER PREFERENCES:
Use AskUserQuestion with these options:

Question: "Which jacked features do you want?"
Options:
- BASE (Recommended): Smart reviewers, commands, behavioral rules, web dashboard. No external services needed.
- SEARCH: Everything in BASE + search past Claude sessions across machines. Requires Qdrant Cloud (~$30/mo).
- SECURITY: Everything in BASE + auto-approve safe bash commands. Fewer permission prompts.
- ALL: Everything. Requires Qdrant Cloud + Anthropic API key for fastest security evaluation.

PHASE 3 - INSTALL:
Based on user choice:
- BASE: uv tool install claude-jacked && jacked install --force
- SEARCH: uv tool install "claude-jacked[search]" && jacked install --force
- SECURITY: uv tool install claude-jacked && jacked install --force --security
- ALL: uv tool install "claude-jacked[all]" && jacked install --force --security

PHASE 4 - POST-INSTALL:
- Launch dashboard: jacked webux
- If SEARCH or ALL: help set up Qdrant Cloud credentials
- If SECURITY or ALL: show how to monitor gatekeeper in the dashboard (Logs page)

PHASE 5 - VERIFY:
- jacked --help
- jacked webux (confirm dashboard opens)
Windows Troubleshooting

Claude Code uses Git Bash on Windows, which can cause path issues.

If "jacked" isn't found:

uv tool update-shell
# Then restart your terminal

If paths are getting mangled:

# Find the uv tools bin directory
uv tool dir
# Use the full path to jacked if needed

License

MIT

Credits

Built for Claude Code by Anthropic. Uses Qdrant for search.

Project details


Release history Release notifications | RSS feed

Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

claude_jacked-0.25.0.tar.gz (1.2 MB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

claude_jacked-0.25.0-py3-none-any.whl (540.1 kB view details)

Uploaded Python 3

File details

Details for the file claude_jacked-0.25.0.tar.gz.

File metadata

  • Download URL: claude_jacked-0.25.0.tar.gz
  • Upload date:
  • Size: 1.2 MB
  • Tags: Source
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.13.7

File hashes

Hashes for claude_jacked-0.25.0.tar.gz
Algorithm Hash digest
SHA256 1fa7da5b57376df491f679a2b906ba7f1544e3e6d6cec771ac7b6fd0cf2ded9a
MD5 4583311bcbf679c046fc27e5ba884b98
BLAKE2b-256 eef28c4a0a7509c3d3d53a21913b4028d81f61d4b869585df53e6e68fd4b4da6

See more details on using hashes here.

Provenance

The following attestation bundles were made for claude_jacked-0.25.0.tar.gz:

Publisher: publish.yml on jackneil/claude-jacked

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

File details

Details for the file claude_jacked-0.25.0-py3-none-any.whl.

File metadata

  • Download URL: claude_jacked-0.25.0-py3-none-any.whl
  • Upload date:
  • Size: 540.1 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.13.7

File hashes

Hashes for claude_jacked-0.25.0-py3-none-any.whl
Algorithm Hash digest
SHA256 9077347093c2c34f32a0a48b0dbd937e9cd3f099bad78ee051b4d7aedd1dd668
MD5 6ff42daa040eee731ca703f2d26189df
BLAKE2b-256 301d8c07e82736efd2af92de48fd4836d605eea20431259c45005faa989d8a0a

See more details on using hashes here.

Provenance

The following attestation bundles were made for claude_jacked-0.25.0-py3-none-any.whl:

Publisher: publish.yml on jackneil/claude-jacked

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page