npm package discovery and stats viewer.

Discover Tips

  • General search

    [free text search, go nuts!]

  • Package details

    pkg:[package-name]

  • User packages

    @[username]

Sponsor

Optimize Toolset

I’ve always been into building performant and accessible sites, but lately I’ve been taking it extremely seriously. So much so that I’ve been building a tool to help me optimize and monitor the sites that I build to make sure that I’m making an attempt to offer the best experience to those who visit them. If you’re into performant, accessible and SEO friendly sites, you might like it too! You can check it out at Optimize Toolset.

About

Hi, 👋, I’m Ryan Hefner  and I built this site for me, and you! The goal of this site was to provide an easy way for me to check the stats on my npm packages, both for prioritizing issues and updates, and to give me a little kick in the pants to keep up on stuff.

As I was building it, I realized that I was actually using the tool to build the tool, and figured I might as well put this out there and hopefully others will find it to be a fast and useful way to search and browse npm packages as I have.

If you’re interested in other things I’m working on, follow me on Twitter or check out the open source projects I’ve been publishing on GitHub.

I am also working on a Twitter bot for this site to tweet the most popular, newest, random packages from npm. Please follow that account now and it will start sending out packages soon–ish.

Open Software & Tools

This site wouldn’t be possible without the immense generosity and tireless efforts from the people who make contributions to the world and share their work via open source initiatives. Thank you 🙏

© 2026 – Pkg Stats / Ryan Hefner

orchestray

v2.0.13

Published

Multi-agent orchestration plugin for Claude Code

Readme

Orchestray

Multi-agent orchestration plugin for Claude Code. Automatically detects complex tasks, decomposes them across specialized AI agents, and produces fully audited output — without manual configuration.

What it does

You type a prompt. Orchestray's PM agent scores its complexity. If it warrants orchestration, the PM decomposes the task, assigns agents (architect, developer, reviewer, custom specialists), coordinates their work, and delivers a consolidated result with full audit trail.

Simple prompts pass through to normal Claude Code behavior. Complex prompts get the full treatment.

Key features

  • Auto-trigger — complexity scoring detects when orchestration helps, self-calibrates over time
  • Smart model routing — assigns Haiku/Sonnet/Opus per subtask based on complexity, tracks cost savings; routing decisions are persisted to .orchestray/state/routing.jsonl and hook-enforced on every Agent(), Explore(), and Task() spawn, surviving context compaction and session reloads
  • Mid-task elicitation — agents can pause to ask the user a structured ≤5-field form via mcp__orchestray__ask_user and resume with the answers; no orchestration unwind required
  • Hook-enforced MCP retrieval — pre-decomposition pattern_find, kb_search, and history_find_similar_tasks calls are verified by gate-agent-spawn.js via a checkpoint ledger (.orchestray/state/mcp-checkpoint.jsonl) before the first orchestration spawn; falls back gracefully via mcp_enforcement config flags with no session restart required; the mcp_enforcement block is automatically migrated into .orchestray/config.json on first 2.0.13+ use
  • PM-driven per-orchestration events.jsonl rotation — at orchestration completion, the PM cleanup sequence atomically archives audit rows for the completed orchestration to .orchestray/history/<orch-id>/events.jsonl, keeping the live file bounded; the rotation is crash-safe via a three-state sentinel and idempotent on restart
  • Explore dispatch coverage — Claude Code's built-in Explore and Task dispatches are now gated alongside Agent() spawns so their model routing decisions are enforced and audited
  • GitHub Issue integration — orchestrate directly from GitHub issues via gh CLI
  • CI/CD feedback loop — run CI after orchestration, auto-fix failures up to N retries
  • Shift-left security — dedicated Security Engineer agent auto-invoked on security-sensitive tasks
  • Pipeline templates — 7 workflow archetypes for consistent decomposition (bug fix, feature, refactor, migration, etc.)
  • TDD mode — test-first orchestration: architect → tester → developer → reviewer
  • Mid-orchestration control — checkpoints between groups to review, modify, or abort
  • User playbooks — project-specific instructions injected into agent delegation prompts
  • Parallel execution — independent subtasks run concurrently via subagents
  • Verify-fix loops — reviewer failures route back to developer with specific feedback
  • Correction memory — learns from verify-fix loops, prevents repeated mistakes
  • Cost prediction — estimates orchestration cost from historical data before execution
  • Persistent specialists — dynamic agents that prove useful get saved for reuse
  • Pattern learning — extracts reusable strategies from past orchestrations
  • Team features — shared config, shared patterns, daily/weekly cost budgets
  • Agent Teams — opt-in dual-mode execution for tasks needing inter-agent communication
  • Prompt tiering — 3-tier PM prompt architecture, significant token reduction for simple tasks
  • Orchestration contracts — machine-verifiable quality gates with file ownership tracking
  • Consequence forecasting — predicts downstream effects before execution, validates after
  • ROI scorecard — per-orchestration value visibility with cost savings breakdown
  • Diff-scoped review — reviewer focuses on changed files only, reducing noise
  • Adaptive turn budgets — dynamic turn limits based on subtask complexity
  • Agent introspection — Haiku distiller extracts reasoning traces after each agent, eliminating redundant exploration downstream
  • Cognitive backpressure — agents signal confidence at checkpoints; PM reacts to low-confidence before proceeding
  • Disagreement surfacing — design trade-offs from reviews presented as structured decisions, not verify-fix loops
  • Drift Sentinel — architectural drift detection via auto-extracted invariants and static rules
  • Visual Orchestration — multi-modal screenshot review for UI changes (opt-in)
  • Full audit trail — per-agent tokens, cost breakdown, routing decisions, model savings
  • Orchestration Threads — cross-session continuity via compressed thread summaries that carry forward decisions and open items
  • Outcome Tracking — deferred quality validation via lazy probe execution when you return to delivered files
  • Adaptive Personas — auto-generated project-tuned behavioral directives injected into agent delegations
  • Replay Analysis — counterfactual reasoning on friction orchestrations to extract improvement patterns

Install

npx orchestray --global

This installs agents, skills, and hooks into ~/.claude/. No --plugin-dir flag needed — Claude Code discovers them automatically.

For project-local install:

npx orchestray --local

Uninstall

npx orchestray --global --uninstall

Usage

Orchestray activates automatically on complex prompts. You can also use slash commands:

| Command | What it does | |---------|-------------| | /orchestray:run [task] | Manually trigger orchestration | | /orchestray:issue [#/url] | Orchestrate from a GitHub issue | | /orchestray:status | Check orchestration state | | /orchestray:config | View/modify settings | | /orchestray:report | Generate audit report with cost breakdown | | /orchestray:playbooks | Manage project-specific playbooks | | /orchestray:specialists | Manage persistent specialist agents | | /orchestray:workflows | Manage custom YAML workflow definitions | | /orchestray:learn [id] | Extract patterns / promote to team / capture corrections | | /orchestray:resume | Resume interrupted orchestration | | /orchestray:analytics | Performance stats + pattern dashboard | | /orchestray:patterns | Pattern effectiveness dashboard | | /orchestray:review-pr [#/url] | Review a GitHub pull request | | /orchestray:kb | View and manage the knowledge base | | /orchestray:update | Update Orchestray to the latest version |

Agent roles

| Agent | Role | |-------|------| | PM | Orchestrator — decomposes tasks, assigns work, monitors progress, routes models | | Architect | Design-only — produces design documents and technical decisions | | Developer | Implements code changes | | Refactorer | Systematic code transformation without behavior change | | Reviewer | Read-only review across 7 dimensions: correctness, quality, security, performance, docs, operability, API compatibility | | Security Engineer | Shift-left security — design threat review and implementation audit (read-only) | | Inventor | First-principles creation of novel tools, DSLs, and custom solutions with working prototypes | | Debugger | Systematic bug investigation and root cause analysis (read-only) | | Tester | Dedicated test writing, coverage analysis, and test strategy | | Documenter | Documentation creation and maintenance | | Specialists | Dynamic agents generated during orchestration; successful ones are saved to .orchestray/specialists/ for reuse |

Configuration

Run /orchestray:config to view all settings. Key options:

complexity_threshold    Score threshold for auto-orchestration (default: 4)
auto_review             Auto-spawn reviewer after developer (default: true)
model_floor             Minimum model tier: haiku/sonnet/opus (default: sonnet)
security_review         Security review mode: auto/manual/off (default: auto)
tdd_mode                Prefer TDD orchestration flow (default: false)
confirm_before_execute  Show preview before execution (default: false)
enable_checkpoints      Pause between groups for review (default: false)
ci_command              CI check after orchestration (default: null)
post_to_issue           Comment results on GitHub issue (default: false)
daily_cost_limit_usd    Daily spending limit (default: null)
weekly_cost_limit_usd   Weekly spending limit (default: null)

mcp_enforcement.pattern_find              Hook enforcement mode: hook/prompt/allow (default: hook)
mcp_enforcement.kb_search                 Hook enforcement mode: hook/prompt/allow (default: hook)
mcp_enforcement.history_find_similar_tasks  Hook enforcement mode: hook/prompt/allow (default: hook)
mcp_enforcement.pattern_record_application  Advisory only — not gate-enforced; suppresses pattern_record_skipped advisory event when set to "prompt" or "allow" (default: hook)
mcp_enforcement.unknown_tool_policy       block/warn/allow — policy for unrecognised dispatch names (default: block)
mcp_enforcement.global_kill_switch        true restores 2.0.11 enforcement behaviour; no session restart needed (default: false)

audit.max_events_bytes_for_scan   Maximum bytes of events.jsonl scanned per hook invocation;
                                  override with ORCHESTRAY_MAX_EVENTS_BYTES env var (default: materially
                                  larger than the 2.0.12 cap; set lower on constrained environments)

The mcp_enforcement block is automatically added to .orchestray/config.json on the first UserPromptSubmit after upgrading to 2.0.13+ — no manual migration needed.

Health Signals

/orchestray:analytics includes a Health Signals section that:

  • Warns when mcp_enforcement.global_kill_switch is true in .orchestray/config.json (the gate is bypassed; all MCP checkpoint enforcement is off)
  • Scans recent events.jsonl for unpaired kill_switch_activated events to surface an active kill-switch window that was never closed

If the kill switch is active, the analytics output shows a bold warning with the config key and file path needed to clear it.

How it works

User prompt
    |
    v
Complexity scoring (0-12)
    |
    +-- Score < threshold --> Normal Claude Code
    |
    +-- Score >= threshold --> PM orchestration
            |
            v
        Task decomposition
            |
            v
        Model routing (Haiku/Sonnet/Opus per subtask)
            |
            v
        Agent spawning (parallel where safe)
            |
            v
        Result collection + verify-fix loops
            |
            v
        Pattern extraction + audit report

Runtime state

All orchestration state lives in .orchestray/ (gitignored):

.orchestray/
  state/          # Active orchestration state
  kb/             # Shared knowledge base
  audit/          # Event logs and metrics
  history/        # Archived orchestrations
  specialists/    # Persistent specialist registry
  patterns/       # Extracted learning patterns (gitignored)
  playbooks/      # User-authored project playbooks
  config.json     # User configuration (gitignored)
  team-config.json # Team-shared configuration (version-controlled)
  team-patterns/  # Team-shared patterns (version-controlled)
  workflows/      # Custom YAML workflow definitions (version-controlled)

Requirements

  • Claude Code v2.0.0+
  • Claude Code 2.1.59+ recommended — the BUG-A fix in 2.0.13 depends on the PostToolUse payload shape captured against CC 2.1.59; earlier versions may produce outcome: "skipped" rows in the MCP checkpoint ledger
  • Agent Teams features require v2.1.32+ (opt-in)

Agent Teams features (TaskCreated / TaskCompleted / TeammateIdle hooks) require Claude Code v2.1.32+ with the experimental flag CLAUDE_CODE_EXPERIMENTAL_AGENT_TEAMS=1 set in the environment or settings.json. Without the flag, these hooks are installed but dormant — nothing breaks, they simply never fire.

Troubleshooting

Gate blocks first spawn after upgrade

If gate-agent-spawn.js blocks the PM's first Agent() call after upgrading to 2.0.13+, the most likely cause is that the automatic W11 migration did not yet run (it fires on the next UserPromptSubmit, not at install time). Try the following in order:

  1. Wait for the sweep. On the next user prompt the bin/post-upgrade-sweep.js hook will run and flip any BUG-B-poisoned rows in .orchestray/state/mcp-checkpoint.jsonl. If the gate then passes, you're done.
  2. Nuclear option — kill switch. Set mcp_enforcement.global_kill_switch: true in .orchestray/config.json to bypass the checkpoint gate entirely and complete the in-flight orchestration. Clear it once you're done. No session restart is required.
  3. Manual sentinel reset. If the sweep appears stuck, delete .orchestray/state/.mcp-checkpoint-migrated-2013 to force it to re-run on the next prompt.

Reference: bin/post-upgrade-sweep.js is the automatic recovery path. mcp_enforcement.global_kill_switch is the always-available manual escape hatch.

License

MIT