Comprehensive developer toolkit providing reusable skills for Java/Spring Boot, TypeScript/NestJS/React/Next.js, Python, PHP, AWS CloudFormation, AI/RAG, DevOps, and more.
90
90%
Does it follow best practices?
Impact
Pending
No eval scenarios have been run
Risky
Do not use without reviewing
Guide for integrating with NotebookLM and SonarQube through MCP servers.
This plugin provides two MCP server integrations:
| MCP Server | Purpose | Requires |
|---|---|---|
notebooklm-mcp | RAG capabilities, research notebooks, artifact generation | uv, Chrome browser |
sonarqube-mcp | Quality gates, issue discovery, code analysis | Docker, SonarQube credentials |
1. Install Dependencies
# Install uv package manager (if not installed)
curl -LsSf https://astral.sh/uv/install.sh | sh
# Install notebooklm-mcp-cli
uv tool install notebooklm-mcp-cli
# Verify installation
nlm --version2. Authenticate
# Login with Chrome browser (opens browser for cookie extraction)
nlm login
# Verify authentication
nlm login --check
# For multiple accounts, use profiles
nlm login --profile work
nlm login switch work3. Troubleshoot
# Run diagnostics
nlm doctor
nlm doctor --verboseThe NotebookLM MCP server provides the following tools:
Notebook Management
notebook_list - List all notebooksnotebook_get - Get notebook detailsnotebook_create - Create a new notebooknotebook_query - Query notebook sources with AInotebook_rename - Rename a notebooknotebook_delete - Delete a notebookSource Management
source_list - List sources in a notebooksource_add - Add URL, text, file, YouTube, or Drive sourcesource_get - Get source contentsource_delete - Delete a sourcesource_rename - Rename a sourcesource_stale - Check for stale Drive sourcessource_sync - Sync stale Drive sourcesStudio Content
studio_create - Create audio, video, report, quiz, mind map, etc.studio_status - Check generation statusstudio_revise - Revise slides in an existing deckstudio_delete - Delete a studio artifactDownload
download_artifact - Download audio, video, report, etc.Research
research_start - Start web or Drive researchresearch_status - Poll for research completionresearch_import - Import research results as sourcesAuth Management
refresh_auth - Refresh authentication tokensserver_info - Check server versionQuery a Research Notebook
# 1. List notebooks
nlm notebook list
# 2. Set an alias for easy reference
nlm alias set myproject <notebook-id>
# 3. Query the notebook
nlm notebook query myproject "What are the login requirements?"Build a Documentation Notebook
# 1. Create notebook
nlm notebook create "API Documentation"
# 2. Add sources (only user-provided URLs)
nlm source add myproject --url "https://docs.example.com/api" --wait
nlm source add myproject --file openapi.yaml --wait
# 3. Generate briefing document
nlm report create myproject --format "Briefing Doc" --confirm
# 4. Download when ready
nlm studio status myproject
nlm download report myproject <artifact-id> --output api-brief.mdGenerate a Podcast from Documentation
# 1. Add user-provided sources
nlm source add myproject --url "<user-url>" --wait
# 2. Generate audio podcast
nlm audio create myproject --format deep_dive --length long --confirm
# 3. Poll for completion and download
nlm studio status myproject
nlm download audio myproject <artifact-id> --output podcast.mp3nlm login again when operations fail.1. Install Docker
SonarQube MCP runs as a Docker container. Ensure Docker is installed and running.
2. Configure Credentials
For SonarQube Server (self-hosted or remote):
export SONARQUBE_TOKEN="squ_your_token"
export SONARQUBE_URL="https://sonarqube.mycompany.com"
# For local Docker instances:
export SONARQUBE_URL="http://host.docker.internal:9000"For SonarCloud:
export SONARQUBE_TOKEN="squ_your_token"
export SONARQUBE_ORG="your-org-key"
# SONARQUBE_URL is not needed for SonarCloud3. Get Credentials
User > My Account > Security > Generate TokensThe SonarQube MCP server provides the following tools:
Quality Gates
get_project_quality_gate_status - Check if a project passes its quality gateIssue Management
search_sonar_issues_in_projects - Search for issues by severity, project, or PRchange_sonar_issue_status - Mark issues as false positive, accepted, or reopenCode Analysis
analyze_code_snippet - Analyze a file or code snippet before committing (shift-left)show_rule - Get rule documentation with fix examplesMetrics
get_component_measures - Retrieve project metrics (coverage, bugs, complexity, etc.)Check Quality Gate Before Merge
{
"name": "get_project_quality_gate_status",
"arguments": {
"projectKey": "my-backend-api",
"pullRequest": "234"
}
}Find Critical Issues
{
"name": "search_sonar_issues_in_projects",
"arguments": {
"projects": ["my-backend-api"],
"severities": ["BLOCKER", "HIGH"],
"ps": 50
}
}Pre-Push Analysis (Shift-Left)
{
"name": "analyze_code_snippet",
"arguments": {
"projectKey": "my-typescript-app",
"fileContent": "async function fetchUser(id: string) {\n const query = `SELECT * FROM users WHERE id = ${id}`;\n return db.execute(query);\n}",
"language": "typescript"
}
}Understand a Rule
{
"name": "show_rule",
"arguments": {
"key": "typescript:S1082"
}
}paging.total in responses.The plugin includes wrapper scripts that handle dependency checking:
Location: scripts/wrap-notebooklm-mcp.sh
The wrapper:
uvx is installednotebooklm-mcp-cli is availableManual test:
# Test the wrapper directly
./scripts/wrap-notebooklm-mcp.sh --helpLocation: scripts/wrap-sonarqube-mcp.sh
The wrapper:
mcp/sonarqube Docker imageManual test:
# Test the wrapper directly
SONARQUBE_TOKEN="test" SONARQUBE_URL="http://localhost:9000" \
./scripts/wrap-sonarqube-mcp.sh --help| Issue | Solution |
|---|---|
| "CLI not found" | Install with uv tool install notebooklm-mcp-cli |
| "Authentication failed" | Run nlm login again |
| "Rate limit exceeded" | Wait and retry; free tier has ~50 queries/day |
| "Source processing stuck" | Use --wait flag when adding sources |
| Issue | Solution |
|---|---|
| "Docker not found" | Install Docker Desktop |
| "Docker daemon not running" | Start Docker Desktop or Docker service |
| "Token not set" | Set SONARQUBE_TOKEN environment variable |
| "Organization not set" | Set SONARQUBE_ORG for SonarCloud |
| "Connection refused" | Check SONARQUBE_URL; use host.docker.internal for local |
docs
plugins
developer-kit-ai
developer-kit-aws
agents
docs
skills
aws
aws-cli-beast
aws-cost-optimization
aws-drawio-architecture-diagrams
aws-sam-bootstrap
aws-cloudformation
aws-cloudformation-auto-scaling
aws-cloudformation-bedrock
aws-cloudformation-cloudfront
aws-cloudformation-cloudwatch
aws-cloudformation-dynamodb
aws-cloudformation-ec2
aws-cloudformation-ecs
aws-cloudformation-elasticache
references
aws-cloudformation-iam
references
aws-cloudformation-lambda
aws-cloudformation-rds
aws-cloudformation-s3
aws-cloudformation-security
aws-cloudformation-task-ecs-deploy-gh
aws-cloudformation-vpc
references
developer-kit-core
agents
commands
skills
developer-kit-devops
developer-kit-java
agents
commands
docs
skills
aws-lambda-java-integration
aws-rds-spring-boot-integration
aws-sdk-java-v2-bedrock
aws-sdk-java-v2-core
aws-sdk-java-v2-dynamodb
aws-sdk-java-v2-kms
aws-sdk-java-v2-lambda
aws-sdk-java-v2-messaging
aws-sdk-java-v2-rds
aws-sdk-java-v2-s3
aws-sdk-java-v2-secrets-manager
clean-architecture
graalvm-native-image
langchain4j-ai-services-patterns
references
langchain4j-mcp-server-patterns
references
langchain4j-rag-implementation-patterns
references
langchain4j-spring-boot-integration
langchain4j-testing-strategies
langchain4j-tool-function-calling-patterns
langchain4j-vector-stores-configuration
references
qdrant
references
spring-ai-mcp-server-patterns
spring-boot-actuator
spring-boot-cache
spring-boot-crud-patterns
spring-boot-dependency-injection
spring-boot-event-driven-patterns
spring-boot-openapi-documentation
spring-boot-project-creator
spring-boot-resilience4j
spring-boot-rest-api-standards
spring-boot-saga-pattern
spring-boot-security-jwt
assets
references
scripts
spring-boot-test-patterns
spring-data-jpa
references
spring-data-neo4j
references
unit-test-application-events
unit-test-bean-validation
unit-test-boundary-conditions
unit-test-caching
unit-test-config-properties
references
unit-test-controller-layer
unit-test-exception-handler
references
unit-test-json-serialization
unit-test-mapper-converter
references
unit-test-parameterized
unit-test-scheduled-async
references
unit-test-service-layer
references
unit-test-utility-methods
unit-test-wiremock-rest-api
references
developer-kit-php
developer-kit-project-management
developer-kit-python
developer-kit-specs
commands
docs
hooks
test-templates
tests
skills
developer-kit-tools
developer-kit-typescript
agents
docs
hooks
rules
skills
aws-cdk
aws-lambda-typescript-integration
better-auth
clean-architecture
drizzle-orm-patterns
dynamodb-toolbox-patterns
references
nestjs
nestjs-best-practices
nestjs-code-review
nestjs-drizzle-crud-generator
nextjs-app-router
nextjs-authentication
nextjs-code-review
nextjs-data-fetching
nextjs-deployment
nextjs-performance
nx-monorepo
react-code-review
react-patterns
shadcn-ui
tailwind-css-patterns
tailwind-design-system
references
turborepo-monorepo
typescript-docs
typescript-security-review
zod-validation-utilities
references
github-spec-kit