npm package discovery and stats viewer.

Discover Tips

  • General search

    [free text search, go nuts!]

  • Package details

    pkg:[package-name]

  • User packages

    @[username]

Sponsor

Optimize Toolset

I’ve always been into building performant and accessible sites, but lately I’ve been taking it extremely seriously. So much so that I’ve been building a tool to help me optimize and monitor the sites that I build to make sure that I’m making an attempt to offer the best experience to those who visit them. If you’re into performant, accessible and SEO friendly sites, you might like it too! You can check it out at Optimize Toolset.

About

Hi, 👋, I’m Ryan Hefner  and I built this site for me, and you! The goal of this site was to provide an easy way for me to check the stats on my npm packages, both for prioritizing issues and updates, and to give me a little kick in the pants to keep up on stuff.

As I was building it, I realized that I was actually using the tool to build the tool, and figured I might as well put this out there and hopefully others will find it to be a fast and useful way to search and browse npm packages as I have.

If you’re interested in other things I’m working on, follow me on Twitter or check out the open source projects I’ve been publishing on GitHub.

I am also working on a Twitter bot for this site to tweet the most popular, newest, random packages from npm. Please follow that account now and it will start sending out packages soon–ish.

Open Software & Tools

This site wouldn’t be possible without the immense generosity and tireless efforts from the people who make contributions to the world and share their work via open source initiatives. Thank you 🙏

© 2026 – Pkg Stats / Ryan Hefner

nanocures

v0.1.0

Published

Disease-discovery workspace built on NanoClaw with secure campaign workflows.

Readme

NanoCures

NanoCures is a NanoClaw-based disease-discovery workspace that mirrors the ClawCures feature set while leaning on NanoClaw's OS-level isolation, per-group sessions, sender allowlists, and explicit mount policy.

This fork was built against NanoClaw upstream commit a81e165 dated 2026-04-18. The implementation choices here follow the current NanoClaw architecture, customization, scheduling, and security docs:

  • https://github.com/qwibitai/nanoclaw
  • https://docs.nanoclaw.dev/concepts/architecture
  • https://docs.nanoclaw.dev/advanced/security-model
  • https://docs.nanoclaw.dev/features/customization
  • https://docs.nanoclaw.dev/features/scheduled-tasks
  • https://docs.nanoclaw.dev/integrations/skills-system

What It Adds

NanoCures keeps the ClawCures operating model, but exposes it as NanoClaw-native workflows:

  • ClawCures run -> /nanocures-run
  • ClawCures run-autonomous -> /nanocures-autonomous
  • ClawCures validate-plan -> /nanocures-validate-plan
  • ClawCures rank-portfolio -> /nanocures-rank-portfolio
  • Translational handoff generation -> /nanocures-translational-handoff
  • Regulatory evidence bundling -> /nanocures-regulatory-bundle
  • Clinical trial registry helpers -> /nanocures-clinical-trials

Supporting assets live in:

  • templates/ for reproducible plan, run, portfolio, and trial JSON
  • tools/nanocures-cli.mjs for deterministic validation, ranking, bundling, and registry operations
  • groups/main/CLAUDE.md and groups/global/CLAUDE.md for NanoCures operating policy

Security Model

NanoCures uses NanoClaw's security model directly instead of recreating app-level guardrails:

  • Main-group agents get the project root read-only and only the required writable mounts.
  • Additional mounts are validated against an external allowlist and are blocked entirely when that allowlist is absent.
  • Non-main groups remain read-only for additional mounts via nonMainReadOnly: true.
  • Sender allowlists stay outside the project root and should be enabled for any research group with more than one human participant.
  • Remote Control is limited to the main group, requires an allowed sender, and stays bound to the initiating sender/chat until closed.
  • Secrets stay out of containers; credentialed traffic is expected to flow through OneCLI Agent Vault.
  • Public literature, approved non-PHI datasets, and generated artifacts should be mounted separately instead of broad home-directory mounts.

More detail is in docs/NANOCURES_SECURITY.md and docs/FEATURE_MAPPING.md.

Quick Start

  1. Install host dependencies.
npm install
npm run build
./container/build.sh
  1. Set the default assistant identity.
export ASSISTANT_NAME=NanoCures
  1. Configure NanoClaw as usual with /setup, then copy the example mount policy and tighten it for your workstation:
mkdir -p ~/.config/nanoclaw
cp config-examples/mount-allowlist.json ~/.config/nanoclaw/mount-allowlist.json
  1. Use the NanoCures skills from the main control chat:
  • /nanocures-run
  • /nanocures-autonomous
  • /nanocures-validate-plan
  • /nanocures-rank-portfolio

Suggested Workspace Layout

  • groups/main/campaigns/ for run artifacts and generated plans
  • groups/main/portfolios/ for portfolio inputs and ranked outputs
  • groups/main/trials/ for the clinical trial registry JSON
  • groups/global/ for cross-group evidence standards and mission memory

Notes

  • This fork deliberately keeps NanoClaw's small core and adds disease-discovery behavior through memory, skills, templates, and thin deterministic tooling.
  • The helper CLI is designed for reproducible structure, not model inference. Claude Agent SDK inside NanoClaw remains the planner and analyst.
  • Do not mount PHI, credentials, or unrestricted home directories into NanoCures containers.