Skip to content

joaoariedi/ai-assisted-development-framework

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

29 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

πŸ€– AI Development Framework v4.3

A systematic Claude Code configuration for spec-driven development (SDD) with quality gates, custom agents, automated hooks, security guardrails, and a full specification pipeline. Balances security, performance, maintainability, and efficacy at every step.


⚑ Quick Start

1️⃣ Install via Dotfiles

# Clone the dotfiles repo (or your own fork)
git clone git@github.com:joaoariedi/dotfiles.git ~/dotfiles

# Symlink Claude Code config into ~/.claude/
cd ~/dotfiles && stow claude

# Verify symlinks
ls -la ~/.claude/
# CLAUDE.md β†’ ../dotfiles/claude/.claude/CLAUDE.md
# commands/ β†’ ../dotfiles/claude/.claude/commands/
# agents/   β†’ ../dotfiles/claude/.claude/agents/
# hooks/    β†’ ../dotfiles/claude/.claude/hooks/
# skills/   β†’ ../dotfiles/claude/.claude/skills/
# rules/    β†’ ../dotfiles/claude/.claude/rules/
# mcp.json  β†’ ../dotfiles/claude/.claude/mcp.json

2️⃣ Create Machine-Local Settings

settings.json contains hooks and env vars. It's machine-specific and not managed by stow:

cat > ~/.claude/settings.json << 'EOF'
{
  "permissions": {
    "allow": [
      "Bash($HOME/.claude/hooks/speckit-helper.sh:*)"
    ]
  },
  "env": {
    "CLAUDE_CODE_EXPERIMENTAL_AGENT_TEAMS": "1"
  },
  "hooks": {
    "PreToolUse": [
      { "matcher": "Bash", "hooks": [{ "type": "command", "command": "~/.claude/hooks/quality-before-commit.sh", "timeout": 120 }] },
      { "matcher": "Edit|Write", "hooks": [{ "type": "command", "command": "~/.claude/hooks/block-sensitive-files.sh" }] }
    ],
    "PostToolUse": [
      { "matcher": "Edit|Write", "hooks": [
        { "type": "command", "command": "~/.claude/hooks/format-after-edit.sh", "timeout": 15 },
        { "type": "command", "command": "~/.claude/hooks/run-tests-after-edit.sh", "timeout": 30 }
      ]}
    ],
    "Notification": [
      { "matcher": "", "hooks": [{ "type": "command", "command": "~/.claude/hooks/notify-on-block.sh", "timeout": 5 }] }
    ],
    "Stop": [
      { "matcher": "", "hooks": [{ "type": "command", "command": "~/.claude/hooks/stop-quality-check.sh", "timeout": 10 }] }
    ]
  }
}
EOF

⚠️ Important: The speckit-helper.sh permission is required for all spec-kit commands to work. Claude Code blocks $(), ||, and | operators in pre-flight commands, so all logic is routed through the helper script.

3️⃣ Verify Installation

cd ~/any-project
claude
> /context          # should detect tech stack and structure
> /speckit.init     # bootstraps .specify/ for spec-driven dev

After stow claude, every new Claude Code session loads the rules, agents, commands, and skills automatically. If you have an existing ~/.claude/ config, back it up first (mv ~/.claude ~/.claude.backup); to pick up newly-added files later, restow with stow -R claude.


πŸ–₯️ Reference Deployment

This is the topology I run the framework on. The framework itself is host-agnostic β€” this section just documents one tested setup with explicit trust boundaries.

πŸ”€ Two-Machine Topology

Role OS Production Access Always-On Used For
πŸ’» Primary laptop Manjaro Linux βœ… Full ❌ No Day-to-day dev, production deploys, attended sessions
πŸ–§ Always-on remote workstation Arch Linux ❌ GitHub only βœ… Yes Long-running tasks, mobile resume target, off-hours work

Both machines share the same dotfiles (stow claude), so Claude Code behaviour is identical on each: same agents, hooks, skills, rules, MCPs. Only the per-host settings.json (env vars, hook timeouts) differs.

πŸ›‘οΈ Trust Boundaries

The blast-radius asymmetry is deliberate:

  • πŸ” Production credentials live only on the laptop. It is offline most of the time and physically attended.
  • 🌐 The always-on workstation can reach GitHub but not production. A compromise of the higher-exposure host (always online) cannot pivot into production systems.
  • πŸ”— Network is Tailscale-only. Strict ACLs constrain which hosts can reach which services β€” no public IPs, no port-forwarding, no inbound exposure.
  • πŸ‘οΈ Wazuh monitors the whole stack β€” file-integrity monitoring, auth events, command auditing β€” across both machines and any production hosts.

🌐 Why the Topology Matters for AI Agents

Claude Code's session-portability features pair naturally with this setup:

  • ▢️ Start a long-running task on the always-on workstation before stepping away
  • πŸ”„ Resume from the laptop later via /teleport (see Multi-Environment Workflows)
  • πŸ“± Or β€” start on mobile (claude.ai/code), pull into the laptop terminal when home

Critically, the always-on workstation can autonomously work on GitHub repos (review PR feedback, run CI, commit fixes) without ever holding production credentials. The laptop holds the keys; the always-on host holds the time.


🧬 Development Lifecycle

The framework provides three workflow paths. Choose the one that matches your task:

⚑ Quick Fix Path (trivial changes)

For typos, config updates, formatting fixes, and dependency bumps:

/speckit.fix "fix typo in error message"   β†’ apply fix β†’ verify β†’ commit

The triviality gate ensures only genuinely trivial changes bypass the full pipeline. If your change modifies logic, APIs, or schemas, you'll be redirected to the Standard path.

πŸ“‹ Standard SDD Path (features, refactors, bug fixes)

The full spec-driven development pipeline from idea to implementation:

/context              β†’ 🧭 orient (detect stack, tools, structure)
/speckit.init         β†’ πŸ—οΈ bootstrap (once per project)
/speckit.constitution β†’ πŸ“œ define principles (once per project)
/speckit.brainstorm   β†’ πŸ’‘ Socratic design exploration (refine the idea) ← NEW
/speckit.specify      β†’ ✍️ write spec (scenarios, requirements, criteria)
/speckit.clarify      β†’ πŸ” resolve ambiguities (optional)
/speckit.plan         β†’ πŸ“ design (affected files, data model, API contracts)
/speckit.review       β†’ πŸ”Ž challenge the plan (scope, architecture, tests) ← NEW
/speckit.tasks        β†’ πŸ“‹ generate task list (phased, with dependencies)
/speckit.checklist    β†’ βœ… pre-implementation gate (optional)
/speckit.analyze      β†’ πŸ”¬ consistency check (optional)
/speckit.implement    β†’ πŸ§ͺ TDD execution (red-green cycle)
/quality              β†’ πŸ›‘οΈ final quality gate

Specifications live in .specify/specs/<branch>/ and are committed to version control. A constitution in .specify/memory/constitution.md defines project-level governance principles that every plan is validated against.

πŸ—οΈ Brownfield Path (existing code)

For projects with existing code that lack formal specifications:

/speckit.baseline     β†’ πŸ“Š reverse-engineer spec from code ← NEW
/speckit.review       β†’ πŸ”Ž review the inferred spec/plan
/speckit.tasks        β†’ πŸ“‹ generate tasks for enhancements
/speckit.implement    β†’ πŸ§ͺ execute with quality gates

βš–οΈ The Four Balances

Every decision in the framework balances four concerns:

Concern How the Framework Addresses It
πŸ”’ Security Hooks block sensitive files, gitleaks secrets scanning, OWASP LLM rules, forensic-specialist agent
⚑ Performance performance-audit skill, quality-guardian benchmarks, CI optimization (cancel-in-progress, staged-files-only lint)
πŸ›οΈ Maintainability SOLID principle checks, code quality limits, systematic-debugging skill, cross-cutting change maps
🎯 Efficacy Iron Laws prevent false completions, spec compliance gates, verification-before-completion skill

πŸ” Request Flow & Stack Composition

The framework composes 5 layers β€” methodology (spec-kit), agent runtime (Claude Code), specialised sub-agents, integrations (MCP, hooks, rtk, security CLIs), and models (Opus 4.7 / Sonnet 4.6 / Haiku 4.5) β€” with cross-cutting governance for quality, security, context, and memory. A single SDD request traverses every layer:

sequenceDiagram
    autonumber
    actor Dev as Developer
    participant FW as L1 Β· Methodology<br/>(spec-kit)
    participant CC as L2 Β· Claude Code<br/>(main agent)
    participant Sub as L2 Β· Sub-Agent<br/>(test-specialist)
    participant MCP as L3 Β· MCP / Hooks
    participant RTK as L3 Β· rtk proxy
    participant Mod as L4 Β· Opus 4.7

    Dev->>FW: /speckit.brainstorm "user auth idea"
    FW->>CC: socratic exploration
    CC->>Mod: refine concept (Q&A)
    Mod-->>CC: refined direction
    CC-->>Dev: βœ“ confirmed concept
    Dev->>FW: /speckit.specify "user auth"
    FW->>CC: invoke pipeline (spec β†’ plan β†’ tasks)
    CC->>Mod: reason about spec
    Mod-->>CC: spec draft + plan
    CC->>Sub: dispatch (one-shot, isolated ctx)
    Sub->>RTK: rtk pytest -q
    RTK-->>Sub: compressed digest (β‰ˆ10% tokens)
    Sub->>Mod: analyse failing tests
    Mod-->>Sub: fix proposal
    Sub-->>CC: digest only (200 tok vs 5 000)
    CC->>MCP: PreToolUse hook (gitleaks, sensitive-file block)
    MCP-->>CC: βœ“ safe to write
    CC->>Mod: synthesise final patch
    Mod-->>CC: code + tests
    CC-->>Dev: spec + tests + commit ready
Loading

What the flow reveals

  • L1 (methodology) shapes thinking, not state. spec-kit / /speckit.brainstorm defines structure but holds no conversation context.
  • Sub-agents isolate context. Dispatched in fresh contexts and discarded β€” only the digest returns. Primary defence against the >40% "Dumb Zone".
  • rtk compresses CLI output (60–90%) before it reaches the main context β€” the highest-leverage token optimisation in the framework.
  • MCP / Hooks enforce safety boundaries the model cannot bypass (gitleaks, sensitive-file block, format-after-edit).
  • Models are stateless β€” every layer above exists to give them the right context and route their output safely.

Currently In Use vs Available

Component Status Notes
spec-kit (SDD) βœ… active Full pipeline incl. /speckit.brainstorm β†’ specify β†’ plan β†’ tasks β†’ implement
OpenSpec βšͺ not adopted Alternative spec workflow
Superpowers βšͺ pattern reference Skill-pack architecture is the influence
Claude Code βœ… primary runtime Opus 4.7 / 1M ctx default
Codex Β· Opencode Β· Cursor Β· Aider βšͺ alternatives Same methodology layer would still apply
MCP: github, voicemode βœ… active See ~/.claude/mcp.json
MCP: Semgrep, Snyk, SonarQube βšͺ optional Add only when CLI scans aren't enough
rtk βœ… available (auto-detected per machine) 60–90% token reduction on common dev commands
Fabric βšͺ pattern reference Reusable prompt-pattern library
gitleaks Β· semgrep Β· trivy Β· ruff Β· gosec βœ… via Bash Quality / security CLIs
Opus 4.7 / Sonnet 4.6 / Haiku 4.5 βœ… via Anthropic Model selection per task
GPT Β· Gemini Β· Qwen Β· Llama βšͺ alternatives Foundation models from other providers

πŸ›‘οΈ Automated Quality Gates

Seven hooks enforce quality automatically β€” no manual intervention needed:

  • πŸ” Pre-commit β€” secrets detection (gitleaks) + language-specific linting blocks the commit on errors
  • πŸ”’ File protection β€” writes to .env, *.key, *.pem, credentials, and .git/ internals are blocked
  • 🎨 Auto-format β€” formatters run after every edit (ruff, biome, gofmt, rustfmt)
  • πŸ§ͺ Auto-test β€” test suite runs after source file edits (throttled 15s, non-blocking)
  • πŸ“Š Reminders β€” alerts if source files were edited but tests weren't run
  • πŸ”” Notifications β€” desktop alerts when the agent needs human input (Linux/macOS)

The quality-guardian agent validates before commit/PR/merge with secrets scanning, SAST, supply chain checks, SOLID architectural analysis, performance validation, and Iron Law enforcement.

πŸ” Security Posture

The framework implements layered defenses against OWASP LLM vulnerabilities:

Layer Mechanism Covers
Enforcement Hooks Sensitive file blocking, secrets detection, pre-commit quality
Guidance Rules OWASP LLM Top 10, MCP security, code quality, SOLID principles
Analysis Skills & Agents Security review, forensic investigation, quality gates
Efficacy Iron Laws Verification-before-completion, systematic-debugging

MCP servers follow strict security posture β€” OAuth 2.1 for production, least privilege, input validation, and human-in-the-loop for high-impact actions.


⚑ Performance & Reasoning

🧠 Ultrathink

Type ultrathink in any prompt to bump that turn to high reasoning effort. Use it for:

  • πŸ—οΈ Complex architectural analysis or ambiguous requirements
  • πŸ”’ Security-sensitive code reviews
  • πŸ› Debugging race conditions or subtle bugs
  • πŸ”„ Multi-file refactoring decisions

The effort boost reverts after the response β€” no persistent mode change needed.

πŸŽ›οΈ Model Selection

Mode How Best For
πŸ”΄ Opus (default) Standard mode Complex architecture, security reviews
⚑ Fast Mode Toggle with /fast Quick iterations, bug fixes, exploration
🧠 Ultrathink Add ultrathink to prompt Deep reasoning on single turn
🟒 Haiku Agent frontmatter model: haiku Lightweight search, simple edits
🟑 Sonnet Agent frontmatter model: sonnet Standard agent work

Effort levels: max (via /model only) > high (ultrathink) > medium (default) > low

πŸ“¦ Context Management

For long-running sessions, the framework uses the Document & Clear pattern:

  1. πŸ’Ύ Checkpoint β€” write session state to a progress file (decisions, files changed, next steps)
  2. 🧹 Clear β€” run /clear to reset the context window
  3. ▢️ Resume β€” read the progress file and continue from "Next steps"

See context-management.md rule for detailed guidance and project scaling strategies (small/medium/large).

🌐 Multi-Environment Workflows

  • πŸ“± Remote Control β€” start work locally with claude, resume from any device via claude.ai/code
  • πŸš€ Teleport β€” pull cloud/web sessions into local terminal with /teleport
  • πŸ”„ Sessions maintain full context across terminal, IDE, web, and mobile

πŸ•΅οΈ Agents

Five specialized agents with no built-in equivalent:

πŸ§ͺ test-specialist

Creates comprehensive test suites after implementation. Analyzes existing test patterns, designs unit/integration/E2E tests, runs coverage analysis. Supports Jest, Vitest, pytest, cargo test, go test, and more.

When to use: After implementing a feature, when you need thorough test coverage.

πŸ›‘οΈ quality-guardian

The quality gate for all code changes. Runs a 7-step validation pipeline:

  1. πŸ”§ Tool discovery and configuration
  2. πŸ”‘ Secrets detection (mandatory, blocks on findings)
  3. πŸ“ Code quality validation (lint, types, formatting)
  4. πŸ”’ Security assessment (delegates to security-review skill + LLM security rules)
  5. ⚑ Performance validation (delegates to performance-audit skill)
  6. πŸ›οΈ Architectural pattern validation β€” SOLID principle checks with chain-of-thought for OCP and DIP
  7. πŸ§ͺ Regression prevention (full test suite)

Enforces Iron Laws from verification-before-completion and systematic-debugging skills.

When to use: Before any commit, PR, or merge. Spawned automatically by /quality.

πŸ” code-reviewer

Two-stage code review specialist. Stage 1 validates spec compliance (implementation matches plan, all FRs addressed, no scope creep). Stage 2 checks code quality (SOLID, architecture, error handling, security, naming, test coverage).

Produces a structured review report with APPROVE / REQUEST_CHANGES / NEEDS_DISCUSSION verdict.

When to use: Before PR creation, after implementation. Distinct from review-coordinator (which manages the PR lifecycle).

πŸ“ review-coordinator

Manages the PR lifecycle β€” creation, review coordination, feedback integration, and merge. Generates comprehensive PR descriptions with quality metrics. Supports GitHub and GitLab.

When to use: When creating PRs or managing review workflows.

πŸ”’ forensic-specialist

Cybersecurity specialist for defensive forensics. Handles incident response, threat hunting, malware analysis, IOC generation with STIX/TAXII format, and MITRE ATT&CK mapping. Maintains proper chain of custody documentation.

When to use: When a system may be compromised, for security audits, or proactive threat hunting.

Built-in agents handle general tasks: Explore (codebase search), Plan (architecture), general-purpose (implementation).

🀝 Agent Teams (Experimental)

For parallel work across services or modules, Agent Teams provide peer-to-peer mesh orchestration:

TeamCreate β†’ TaskCreate β†’ spawn teammates β†’ SendMessage β†’ shutdown β†’ TeamDelete
Pattern Use Case
Parallel impl Multi-service feature (API + frontend + worker)
Test-driven TDD with parallel test writing
Full pipeline End-to-end: impl + tests + quality + review + PR
Research + build Deep codebase research while implementing

Requires CLAUDE_CODE_EXPERIMENTAL_AGENT_TEAMS=1 (included in settings.json above).


🧠 Skills

Six skills used by agents and commands internally:

Skill Purpose Auto-invoked?
πŸ”Ž context-analysis Project structure detection, tech stack analysis Yes β€” proactively on new codebases
πŸ”’ security-review Code security checklist (secrets, SAST, SQLi, XSS, auth, supply chain SCA) Yes β€” proactively on PRs
βœ… verification-before-completion Evidence-first completion gate with Iron Law β€” must run proof commands before claiming done Yes β€” proactively before completion
πŸ› systematic-debugging 4-phase root cause investigation (read β†’ reproduce β†’ evidence β†’ fix) with Iron Law Yes β€” proactively on bugs
⚑ performance-audit N+1 queries, blocking I/O, memory leaks, algorithm complexity No β€” explicit only
πŸ“„ spec-template Structured Given/When/Then specification generation No β€” speckit pipeline only

The two new skills enforce Iron Laws β€” non-negotiable rules that prevent false completion claims and shotgun debugging. Each includes a rationalization prevention table to counter common excuses.


πŸ› οΈ Slash Commands

Command Args Description
/agent <task> Start full development workflow with planning and task tracking
/context β€” Analyze project tech stack, tools, and structure
/pr-summary β€” Generate PR description from current branch diff
/quality β€” Run comprehensive quality checks (spawns quality-guardian)
/security-scan β€” Scan staged changes for secrets, SQLi, XSS
/speckit.init β€” Bootstrap .specify/ directory in current project
/speckit.constitution β€” Create/update project governance principles
/speckit.brainstorm <idea> Socratic design exploration before specification
/speckit.specify <feature> Generate spec with scenarios, requirements, criteria
/speckit.clarify β€” Scan spec for ambiguities, ask targeted questions
/speckit.plan β€” Generate implementation plan from spec
/speckit.review β€” Read-only plan review gate (scope, architecture, tests)
/speckit.tasks β€” Generate phased task list from plan and spec
/speckit.checklist β€” Generate requirement quality checklists
/speckit.analyze β€” Read-only cross-artifact consistency analysis
/speckit.implement β€” Execute TDD implementation with quality gates
/speckit.baseline <module> Reverse-engineer spec from existing code (brownfield)
/speckit.fix <description> Quick-fix bypass for trivial changes

βš™οΈ Hooks

Shell-script hooks run automatically via settings.json:

Hook Trigger What It Does
πŸ” quality-before-commit.sh PreToolUse on Bash Intercepts git commit β€” runs gitleaks + language-specific linters, blocks on errors
πŸ”’ block-sensitive-files.sh PreToolUse on Edit|Write Blocks writes to .env*, *.key, *.pem, credentials*, .git/*, secrets/
🎨 format-after-edit.sh PostToolUse on Edit|Write Auto-formats edited files (ruff, biome/prettier, gofmt, rustfmt), 10s throttle
πŸ§ͺ run-tests-after-edit.sh PostToolUse on Edit|Write Auto-runs test suite after source edits, 15s throttle, non-blocking
πŸ”” notify-on-block.sh Notification Desktop alert when agent needs attention (notify-send / osascript)
πŸ“Š stop-quality-check.sh Stop event Reminds if source files were edited but tests not run
πŸ”§ speckit-helper.sh Pre-flight commands Routes backtick logic to avoid Claude Code permission errors

πŸ“ Rules

Modular policies loaded into every session automatically:

Rule Covers
πŸ“ code-quality.md Function/file size limits, SOLID principles, testing, verification-before-completion, Iron Laws, security test files
πŸ”€ git-workflow.md Commit format, branch naming, co-authoring, staging
πŸ”„ agent-workflow.md 4-phase workflow, Agent Teams, CLAUDE.md template guidance (change maps, guardrails, trust boundaries)
πŸ”§ quality-tooling.md Per-language tools, tiered validation, lefthook, pre-commit/pre-push separation, CI best practices
πŸ” pipeline-security.md ASPM services, open-source security tools, strategic selection guide
πŸ›‘οΈ llm-security.md OWASP LLM Top 10 mitigations (prompt injection, excessive agency, data leakage, supply chain)
πŸ”Œ mcp-security.md MCP server auth, input validation, tool poisoning defense, server curation
πŸ“¦ context-management.md Document & Clear pattern, compact context priorities, project scaling by size

πŸ“Š Quality Standards

Functions:   < 50 lines
Files:       < 500 lines
Complexity:  < 10 (cyclomatic)
SOLID:       OCP + DIP violations flagged in changed code
Iron Laws:   verification-before-completion + systematic-debugging

Enforced by code-quality.md rule and quality-guardian agent. Test coverage follows project-configured thresholds.


πŸ“¦ Spec-Kit Artifacts

Each feature generates artifacts in .specify/specs/<branch>/:

Artifact Generated By Purpose
spec.md /speckit.specify or /speckit.baseline User scenarios, functional requirements, success criteria
plan.md /speckit.plan Design, affected files, constitution compliance
tasks.md /speckit.tasks Phased task list with IDs and dependencies
research.md /speckit.plan Resolved clarifications
checklists/*.md /speckit.checklist Requirement quality checklists
data-model.md /speckit.plan Schema changes (if applicable)
contracts/ /speckit.plan API contracts (if applicable)

.specify/ Directory Structure

.specify/
β”œβ”€β”€ memory/
β”‚   └── constitution.md         # project governance principles
β”œβ”€β”€ templates/
β”‚   β”œβ”€β”€ spec.md                 # specification template
β”‚   β”œβ”€β”€ plan.md                 # plan template
β”‚   β”œβ”€β”€ tasks.md                # task list template
β”‚   └── checklist.md            # checklist template
└── specs/
    └── feature-name/           # one directory per feature (kebab-case)
        β”œβ”€β”€ spec.md
        β”œβ”€β”€ plan.md
        β”œβ”€β”€ tasks.md
        β”œβ”€β”€ research.md
        └── checklists/

πŸ“‹ Task Management

The framework uses Claude Code's built-in task tracker:

Tool Usage
TaskCreate Mandatory for any task with >2 steps
TaskUpdate Mark ONE task in_progress at a time; completed immediately after
TaskGet Read full task details before starting work
TaskList Check progress and find next available tasks

πŸ”Œ MCP Integration

{
  "mcpServers": {
    "github": {
      "transport": "http",
      "url": "https://api.githubcopilot.com/mcp/v1",
      "scope": "user",
      "description": "GitHub PR/Issue automation for review-coordinator agent"
    }
  }
}

Add security MCP servers only when CLI tools are insufficient β€” each server adds context overhead. See mcp-security.md rule for evaluation criteria.


πŸ“ Dotfiles Package Structure

~/dotfiles/claude/
β”œβ”€β”€ .claude/
β”‚   β”œβ”€β”€ CLAUDE.md               # core config (loaded into system prompt)
β”‚   β”œβ”€β”€ mcp.json                # MCP servers (GitHub)
β”‚   β”œβ”€β”€ agents/                 # 5 custom agents
β”‚   β”œβ”€β”€ commands/               # 18 slash commands (5 standard + 13 speckit)
β”‚   β”œβ”€β”€ hooks/                  # 7 lifecycle hooks (shell scripts)
β”‚   β”œβ”€β”€ rules/                  # 8 modular policy files
β”‚   └── skills/                 # 6 internal skills
└── .stow-local-ignore          # excludes README from stow

πŸ™ Inspirations & Acknowledgments

This framework was shaped by patterns observed in several projects:

Project Author Key Contributions
superpowers Jesse Vincent Iron Laws, rationalization prevention tables, Socratic brainstorming with hard gate, verification-before-completion, systematic debugging methodology, evidence-first workflow
spec-kit GitHub Spec-driven development (SDD) pipeline β€” the specify β†’ plan β†’ tasks β†’ implement workflow that forms the framework's core
FrankYomik Fabio Akita Cross-cutting change maps, trust boundary documentation, domain-first CLAUDE.md structure
FrankSherlock Fabio Akita "What NOT to change" guardrails, architecture-as-constraints pattern, _-prefixed research directories
FrankMD Fabio Akita AGENTS.md as tool-agnostic contributor guide, concise do/don't lists
FrankMega Fabio Akita Lefthook parallel hooks, security-specific test files, pre-commit vs pre-push separation, staged-files-only linting
speckit-agent-skills dceoy speckit.baseline concept β€” reverse-engineering specs from existing code
speckit-wiggum-toolkit leonardoFu speckit.research and speckit.reflect concepts β€” formalized research and retrospective phases

πŸ“„ License

MIT License β€” see LICENSE


Framework Version: 4.3.0 Β |Β  Last Updated: 2026-03-31 Β |Β  Compatibility: Claude Code with sub-agents, hooks, skills, MCP, spec-kit, Agent Teams

About

No description, website, or topics provided.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages