Skip to content

docs: Add Claude Code baseline: CLAUDE.md#731

Open
medmes wants to merge 5 commits intokyma-project:mainfrom
medmes:feat/claude-code-baseline
Open

docs: Add Claude Code baseline: CLAUDE.md#731
medmes wants to merge 5 commits intokyma-project:mainfrom
medmes:feat/claude-code-baseline

Conversation

@medmes
Copy link
Copy Markdown
Member

@medmes medmes commented May 7, 2026

Summary

  • Adds CLAUDE.md at repo root so every Claude Code session starts with accurate context about this repo
  • Covers: the two-component architecture (listener library vs SKR webhook binary), the three Go modules and where to run commands, make targets per module, listener's public API surface (SKREventListener, WatchEvent, GenericEvent), runtime-watcher webhook behaviour, all env vars with defaults, the TLS 1.3 / CVE-2023-44487 constraint, and links to docs/

Motivation

Part of the Jellyfish team initiative to add Claude Code baseline context to all team repos (see kyma-project/lifecycle-manager#3241). This is the runtime-watcher complement to lifecycle-manager#3248.

Test plan

  • Open a Claude Code session in this repo and confirm CLAUDE.md loads with correct module structure and API surface

@medmes medmes requested a review from a team as a code owner May 7, 2026 08:39
@medmes medmes linked an issue May 7, 2026 that may be closed by this pull request
3 tasks
@medmes medmes changed the title Add Claude Code baseline: CLAUDE.md docs: Add Claude Code baseline: CLAUDE.md May 7, 2026
medmes added 4 commits May 8, 2026 11:54
Elevates the CVE-2023-44487 / TLS 1.3 constraints already present in
Code conventions into a dedicated Security guardrails section with explicit
rationale for each constraint to prevent accidental weakening.
Covers container image (BDBA), Go module SCA (Mend), and Go SAST
(Checkmarx). Highlights FIPS constraint on crypto fixes, CVE-2023-44487
mitigation in TLS config, and multi-module triage workflow.
Brings runtime-watcher to full parity: principal-engineer agent (Opus,
security-first review — TLS/mTLS/FIPS/listener-API focus), go-conventions
rule (loads on *.go: FIPS + TLS CVE mitigations inline with golangci.yaml).
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Spike: Agentic AI coding support

1 participant