{
  "protocolVersion": "0.3.0",
  "name": "Closeread",
  "description": "48-hour codebase audit for indie SaaS founders selling on Acquire. Produces a 25-to-40-page packet covering license posture, dependency CVEs, credential exposure, architecture single-points-of-failure, test coverage, error log assessment, IP ownership, and third-party API risk. Every finding is ranked by deal-impact and ends with a 'What this means for your buyer' paragraph the seller can paste into a data room.",
  "url": "https://closeread.io",
  "documentationUrl": "https://closeread.io/audit-packet-template-v2",
  "version": "0.1.0",
  "provider": {
    "organization": "Closeread",
    "url": "https://closeread.io"
  },
  "iconUrl": "https://closeread.io/avatar/primary.png",
  "preferredTransport": "JSONRPC",
  "additionalInterfaces": [
    {
      "transport": "HTTP",
      "url": "https://closeread.io/intake"
    }
  ],
  "capabilities": {
    "streaming": false,
    "pushNotifications": false,
    "stateTransitionHistory": true,
    "extendedAgentCard": false
  },
  "defaultInputModes": [
    "text/plain",
    "application/json"
  ],
  "defaultOutputModes": [
    "text/markdown",
    "application/pdf",
    "application/json"
  ],
  "skills": [
    {
      "id": "code_audit",
      "name": "Codebase Audit",
      "description": "Performs a full technical due diligence audit on a customer-provided code repository. Returns a structured packet covering license posture, software composition analysis, credential inventory, architecture overview, test coverage, error log assessment, IP ownership, third-party API risk, and an explicit list of what was not audited. Customer signs NDA, grants read access, audit executes in a disposable sandbox that is destroyed within 24 hours of delivery.",
      "tags": [
        "audit",
        "due-diligence",
        "security",
        "sca",
        "acquire",
        "m-and-a"
      ],
      "examples": [
        "Audit github.com/example/saas-app for an upcoming Acquire listing",
        "Run a Closeread mini-audit on my Next.js + Postgres SaaS",
        "Pre-data-room scan of my Laravel monolith"
      ],
      "inputModes": [
        "text/plain",
        "application/json"
      ],
      "outputModes": [
        "text/markdown",
        "application/pdf"
      ]
    },
    {
      "id": "mini_audit",
      "name": "Mini-Audit (Free Tier)",
      "description": "Free top-5-findings preview from a public GitHub URL. No NDA, no sandbox access to private code. Surfaces obvious license, dependency, and credential issues a buyer's first-hour scan would catch. Output includes a Stripe link to upgrade to the full 48-hour audit.",
      "tags": [
        "audit",
        "preview",
        "free"
      ],
      "examples": [
        "Mini-audit github.com/example/open-source-project",
        "Show me what a Closeread audit would find on this repo"
      ],
      "inputModes": [
        "text/plain"
      ],
      "outputModes": [
        "text/markdown"
      ]
    }
  ],
  "securitySchemes": {
    "intakeForm": {
      "type": "http",
      "scheme": "none",
      "description": "Intake currently runs through a human-readable form at https://closeread.io/intake plus Stripe checkout at https://buy.stripe.com/dRm9AU4VO62YdKT8A04ow00. Programmatic agent-to-agent invocation will require a bearer token issued on intake completion. Until then, agent-side callers should send a structured intake message to freeguy@closeread.io and a human-mediated handshake will follow."
    }
  },
  "security": [],
  "supportsAuthenticatedExtendedCard": false
}
