Skip to main content

ICDEV™ — Intelligent Certified Development Platform. AI-powered SDLC with NIST 800-53 RMF compliance, multi-agent orchestration, FORGE framework, and ANVIL build workflow.

Project description

License Python 3.9+ Compliance Frameworks Tools Agents Languages

ICDEV™ — Intelligent Certified Development Platform

A system that builds systems.

ICDEV™ is an AI-powered meta-builder that generates complete, autonomous applications — each with its own agent architecture, compliance automation, testing pipeline, and CI/CD integration. Describe what you need in plain English. Get an ATO-ready system with 42 compliance framework mappings, 15 coordinating AI agents, and every artifact you need for Authority to Operate.

These aren't templates. They're living systems that can build their own features.

One developer built this. Imagine what your team could do with it.

DISCLAIMER: This repository does NOT contain classified or Controlled Unclassified Information (CUI). Terms like "CUI", "SECRET", "IL4", "IL5", "IL6" appear throughout as configuration values and template strings — not as indicators that this repository itself is classified. Classification terminology references publicly available U.S. government standards (EO 13526, 32 CFR Part 2002, NIST SP 800-53). File headers containing [TEMPLATE: CUI // SP-CTI] are template markers demonstrating the format ICDEV™ applies to generated artifacts.


A System That Builds Systems

Most developer tools help you write code faster. ICDEV™ does something fundamentally different: it generates entire applications — each with its own multi-agent architecture, compliance automation, testing pipeline, memory system, and CI/CD integration. The generated application isn't a starter kit. It's an autonomous engineering platform that can build its own features using the same methodology that built it.

GovProposal is the proof. ICDEV™ generated GovProposal — a complete government proposal lifecycle management platform with a 14-step section workflow, color team review cycle, compliance matrix, timeline tracking, and assignment management. Then ICDEV™ connected it to a GovCon Intelligence pipeline that automatically discovers government opportunities, extracts requirements, maps capabilities, and drafts proposal responses.

Together, they form a self-reinforcing flywheel:

SAM.gov RFPs → Mine requirement patterns → Map to ICDEV™ capabilities → Identify gaps →
Build enhancements → Draft proposals via GovProposal → Win → Deliver ICDEV™ on-prem → Repeat

How ICDEV™ Built GovProposal

ICDEV™ generated GovProposal the same way it generates any application — through the FORGE framework and ANVIL workflow. GovProposal inherited:

What It Got How It Works
6-layer FORGE framework Frameworks, Orchestration, Routines, Guidance, Evidence — separating deterministic logic from AI
Multi-agent architecture 5 core agents (Orchestrator, Architect, Builder, Knowledge, Monitor) + 2 ATO agents
229-table database Append-only audit trail (NIST AU compliant), proposal lifecycle tables, compliance matrices
42 compliance frameworks Dual-hub crosswalk engine — implement a control once, map to FedRAMP, CMMC, CJIS, HIPAA, and 38 more
9-step testing pipeline Syntax → lint → unit → BDD → SAST → E2E → vision → acceptance → security gates
CI/CD integration GitHub + GitLab dual-platform, webhook-triggered workflows
Memory system Long-term facts, daily logs, semantic search — learns from every proposal cycle

But GovProposal isn't just a child app. ICDEV™ then layered on the GovCon Intelligence pipeline — 11 specialized tools that automate the entire government contracting capture process:

The ICDEV™ → GovProposal Workflow

┌─────────────────────────────────────────────────────────────────────────────┐
│                         ICDEV™ — GovCon Intelligence                         │
│                                                                             │
│  ┌──────────────┐    ┌──────────────┐    ┌──────────────┐    ┌───────────┐ │
│  │   DISCOVER   │───▶│   EXTRACT    │───▶│     MAP      │───▶│   DRAFT   │ │
│  │              │    │              │    │              │    │           │ │
│  │ SAM.gov API  │    │ "Shall/must/ │    │ Match reqs   │    │ qwen3     │ │
│  │ scan opps +  │    │  will" regex │    │ to ICDEV™     │    │ drafts →  │ │
│  │ track awards │    │ extraction   │    │ capability   │    │ Claude    │ │
│  │              │    │ + domain     │    │ catalog      │    │ reviews   │ │
│  │ 8 NAICS      │    │   classify   │    │ (30 entries) │    │           │ │
│  │ codes        │    │ + cluster    │    │ L/M/N grade  │    │ HITL gate │ │
│  └──────────────┘    └──────────────┘    └──────────────┘    └───────────┘ │
│         │                   │                    │                  │       │
│         │                   │                    │                  │       │
│         ▼                   ▼                    ▼                  ▼       │
│  ┌─────────────────────────────────────────────────────────────────────┐   │
│  │                   GovCon API Bridge (20+ endpoints)                  │   │
│  │  /sam/import → /auto-compliance → /auto-draft → /drafts/approve     │   │
│  └─────────────────────────────────────────────────────────────────────┘   │
│                                    │                                       │
└────────────────────────────────────┼───────────────────────────────────────┘
                                     │
                                     ▼
┌─────────────────────────────────────────────────────────────────────────────┐
│                    GovProposal — Proposal Lifecycle Platform                 │
│                                                                             │
│  ┌─────────────────┐  ┌──────────────────┐  ┌──────────────────────────┐   │
│  │   OPPORTUNITIES  │  │    SECTIONS      │  │    COMPLIANCE MATRIX     │   │
│  │                  │  │                  │  │                          │   │
│  │ proposal_        │  │ 14-step pipeline:│  │ L → compliant            │   │
│  │ opportunities    │  │ not_started →    │  │ M → partial              │   │
│  │ (imported from   │  │ outlining →      │  │ N → non_compliant        │   │
│  │  SAM.gov scan)   │  │ drafting →       │  │                          │   │
│  │                  │  │ reviewing →      │  │ Auto-populated from      │   │
│  │ licensing_model: │  │ final →          │  │ capability mapping       │   │
│  │ on_prem_free |   │  │ submitted        │  │ scores                   │   │
│  │ saas_paid |      │  │                  │  │                          │   │
│  │ negotiated       │  │ AI drafts →      │  │ Covers all "shall"       │   │
│  │                  │  │ human approves → │  │ statements extracted     │   │
│  │                  │  │ section content   │  │ from RFP                 │   │
│  └─────────────────┘  └──────────────────┘  └──────────────────────────┘   │
│                                                                             │
│  ┌─────────────────┐  ┌──────────────────┐  ┌──────────────────────────┐   │
│  │   COLOR TEAM    │  │    TIMELINE      │  │    ASSIGNMENT MATRIX     │   │
│  │   REVIEWS       │  │                  │  │                          │   │
│  │                  │  │ Gantt chart      │  │ Who writes what          │   │
│  │ Pink → Red →    │  │ milestones,      │  │ per-section role         │   │
│  │ Gold → White →  │  │ deadlines,       │  │ tracking, workload       │   │
│  │ Final           │  │ countdown        │  │ balancing                │   │
│  └─────────────────┘  └──────────────────┘  └──────────────────────────┘   │
│                                                                             │
└─────────────────────────────────────────────────────────────────────────────┘
                                     │
                                     ▼
┌─────────────────────────────────────────────────────────────────────────────┐
│                          CROSS-ENGINE INTELLIGENCE                          │
│                                                                             │
│  ┌────────────────────────┐           ┌────────────────────────────────┐   │
│  │    Innovation Engine    │           │       Creative Engine          │   │
│  │                         │           │                                │   │
│  │  SAM.gov requirement    │           │  Award leaderboard data →     │   │
│  │  patterns registered    │           │  competitive gap analysis     │   │
│  │  as innovation signals  │           │  against government           │   │
│  │                         │           │  contractors                   │   │
│  │  Enables: "Is cATO      │           │                                │   │
│  │  appearing more in      │           │  Enables: identify where      │   │
│  │  RFPs this quarter?"    │           │  competitors are winning      │   │
│  └────────────────────────┘           └────────────────────────────────┘   │
│                                                                             │
└─────────────────────────────────────────────────────────────────────────────┘

Step by step:

  1. DISCOVER — ICDEV™ scans SAM.gov's Opportunities API for solicitations, pre-solicitations, and RFIs across 8 NAICS codes. Award notices feed competitive intelligence.

  2. EXTRACT — Deterministic regex extracts every "shall", "must", and "will" statement from RFP descriptions. Each is domain-classified (DevSecOps, AI/ML, ATO/RMF, Cloud, Security, Compliance, Agile, Data, Management) and clustered into patterns using keyword fingerprinting.

  3. MAP — Extracted requirements are matched against ICDEV™'s declarative capability catalog (~30 entries covering 42 compliance frameworks, 15 agents, and 500+ tools). Each requirement gets an L/M/N grade:

    • L (≥ 80% coverage) — ICDEV™ fully meets this requirement
    • M (40–79%) — partial capability, enhancement recommended
    • N (< 40%) — gap identified, cross-registered to Innovation Engine for prioritized development
  4. DRAFT — Two-tier LLM pipeline: qwen3 generates a compact draft incorporating capability evidence, tool references, and compliance controls. Claude reviews and polishes. The draft is stored with status='draft' — a human must approve before it enters the proposal.

  5. BRIDGE — The GovCon API (20+ REST endpoints) moves data from ICDEV™'s intelligence tools into GovProposal's lifecycle tables:

    • SAM.gov opportunities → proposal_opportunities (with licensing model tracking)
    • "Shall" statements → proposal_compliance_matrix (L/M/N auto-populated)
    • AI drafts → proposal_section_drafts → human approves → proposal_sections
  6. LIFECYCLE — GovProposal manages the rest: 14-step section workflow, color team reviews (Pink → Red → Gold → White → Final), timeline tracking with countdown to submission, assignment matrix, and compliance matrix with donut/bar charts.

The Flywheel Effect

This isn't a linear pipeline — it's a compounding cycle:

  • Win a contract → customer gets ICDEV™ deployed on-prem (free for winners)
  • Deliver → ICDEV™'s capabilities proven in production = stronger past performance evidence
  • Learn → requirement patterns from real contracts improve capability mapping
  • Build → gaps identified by the MAP stage drive ICDEV™ development priorities
  • Repeat → next proposal has better evidence, higher L/M/N scores, stronger drafts

Every proposal ICDEV™ writes makes the next one better. The product IS the proposal evidence.


Why ICDEV™

For Government Contractors

Challenge How ICDEV™ Solves It Benefit
Monitoring SAM.gov is manual and error-prone Automated scanning of 8 NAICS codes with deduplication and caching Never miss an opportunity. Surface patterns across hundreds of RFPs.
Compliance matrices take weeks to populate L/M/N auto-grading from capability catalog with keyword-overlap scoring Compliance matrix populated in seconds, not weeks. Fully auditable.
Proposal writing is expensive ($50K–$500K per response) Two-tier LLM drafting with reusable knowledge base and HITL approval Draft responses in hours with evidence baked in. Human reviews, not writes from scratch.
No visibility into competitive landscape Award tracker + competitor profiler from SAM.gov award data Know who wins what, at what value, in which NAICS codes.
Past performance is hard to articulate ICDEV™'s own capability catalog IS the evidence "We have 42 compliance frameworks" isn't marketing — it's SELECT COUNT(*) from the same DB.

For Government Agencies (Evaluators)

Challenge How ICDEV™ Helps Benefit
Proposals claim capabilities they can't deliver ICDEV™'s proposals reference actual tools, actual test results, actual compliance mappings Every claim is verifiable against the delivered platform.
ATO takes 12–18 months after award ICDEV™ generates ATO artifacts (SSP, POAM, STIG, SBOM, OSCAL) automatically ATO acceleration from day one of delivery. cATO-ready.
Vendor lock-in ICDEV™ is open source (Apache 2.0), runs on 6 cloud providers or fully air-gapped No proprietary dependencies. Full source code. Deploy anywhere.
Difficulty evaluating technical depth L/M/N grading is deterministic and reproducible Same input always produces same compliance grade. Auditable.

What No Other Tool Does

  1. The product writes its own proposals. ICDEV™ generates the application AND writes the proposal to sell it. The capability evidence in the proposal comes from the same codebase that gets delivered. No other GovCon tool is simultaneously the proposal platform and the delivered product.

  2. Deterministic compliance grading. Every "shall" statement in an RFP gets a machine-scored coverage grade (L/M/N) against a declarative capability catalog. This isn't LLM-generated opinion — it's keyword-overlap scoring that produces identical results every time. Air-gap safe.

  3. Cross-engine intelligence. SAM.gov data doesn't just feed proposals. Requirement patterns flow into the Innovation Engine for trend detection ("is cATO appearing more in RFPs?"). Award data flows into the Creative Engine for competitive positioning. Three engines sharing intelligence, each getting smarter.

  4. 42 compliance frameworks, one implementation. Implement a NIST 800-53 control once. The dual-hub crosswalk engine automatically maps it to FedRAMP, CMMC, CJIS, HIPAA, PCI DSS, ISO 27001, and 35+ more. This works for proposals too — the compliance matrix covers every framework the RFP requires.

  5. Self-reinforcing economics. Winners get ICDEV™ deployed free on-prem. This means every win creates a production reference, every production deployment generates telemetry that improves the next proposal, and every gap identified during delivery becomes a development priority. Commercial competitors charge for both the proposal tool AND the delivered platform. ICDEV™ is both.

  6. Air-gap native. Every tool works without internet access. Regex-based requirement extraction (not LLM). Keyword-overlap scoring (not embeddings). SQLite database (not cloud). Ollama for local LLM inference. Designed for SIPR/JWICS from day one.


From Idea to ATO in One Pipeline

Most GovTech teams spend 12-18 months and millions of dollars getting from "we need an app" to a signed ATO. ICDEV™ compresses this into a single, auditable pipeline:

"We need a mission planning tool for IL5"
        │
        ▼
┌─ INTAKE ──────────────────────────────────────────────┐
│  AI-driven conversational requirements gathering       │
│  → Extracts requirements, detects gaps, flags ATO risk │
│  → Scores readiness across 5 dimensions                │
│  → Auto-detects applicable compliance frameworks       │
└───────────────────────────┬───────────────────────────┘
                            ▼
┌─ SIMULATE ────────────────────────────────────────────┐
│  Digital Program Twin — what-if before you build       │
│  → 6-dimension simulation (schedule, cost, risk,       │
│    compliance, technical, staffing)                     │
│  → Monte Carlo estimation (10,000 iterations)          │
│  → 3 Courses of Action: Speed / Balanced / Full        │
└───────────────────────────┬───────────────────────────┘
                            ▼
┌─ GENERATE ────────────────────────────────────────────┐
│  Full application in 12 deterministic steps            │
│  → 300+ files: agents, tools, goals, tests, CI/CD     │
│  → 229-table database with append-only audit trail     │
│  → FORGE framework + ANVIL workflow baked in          │
│  → Connected to 100+ cloud MCP servers (AWS/Azure/GCP/OCI/IBM) │
└───────────────────────────┬───────────────────────────┘
                            ▼
┌─ BUILD ───────────────────────────────────────────────┐
│  TDD workflow: RED → GREEN → REFACTOR                  │
│  → 6 languages: Python, Java, Go, Rust, C#, TypeScript │
│  → 9-step test pipeline (unit → BDD → E2E → gates)    │
│  → SAST, dependency audit, secret detection, SBOM      │
└───────────────────────────┬───────────────────────────┘
                            ▼
┌─ COMPLY ──────────────────────────────────────────────┐
│  ATO package generated automatically                   │
│  → SSP covering 17 FIPS 200 control families           │
│  → POAM, STIG checklist, SBOM, OSCAL artifacts         │
│  → Crosswalk maps controls across all 42 frameworks    │
│  → cATO monitoring with evidence freshness tracking     │
└───────────────────────────┬───────────────────────────┘
                            ▼
                    ATO-ready application

Every step is auditable. Every artifact is traceable. Every control is mapped.


How It Actually Works

Step 1: Requirements Intake (RICOAS)

You describe what you need in plain English. ICDEV™'s Requirements Analyst agent runs a conversational intake session that:

  • Extracts requirements automatically — categorized into 6 types (functional, non-functional, security, compliance, interface, data) at 4 priority levels

  • Detects ambiguities — 7 pattern categories flag vague language ("as needed", "TBD", "etc.") for clarification

  • Flags ATO boundary impact — every requirement is classified into 4 tiers:

    • GREEN — no boundary change
    • YELLOW — minor adjustment (SSP addendum)
    • ORANGE — significant change (ISSO review required)
    • RED — ATO-invalidating (full stop, alternative COAs generated)
  • Auto-detects compliance frameworks — mentions of "HIPAA", "CUI", "CJIS", etc. trigger the applicable assessors

  • Scores readiness across 5 weighted dimensions:

    Dimension Weight What It Measures
    Completeness 25% Requirement types covered, total count vs target
    Clarity 25% Unresolved ambiguities, conversational depth
    Feasibility 20% Timeline, budget, and team indicators present
    Compliance 15% Security requirements and framework selection
    Testability 15% Requirements with acceptance criteria

    Score ≥ 0.7 → proceed to decomposition. Score ≥ 0.8 → proceed to COA generation.

  • Decomposes into SAFe hierarchy — Epic → Capability → Feature → Story → Enabler, each with WSJF scoring, T-shirt sizing, and auto-generated BDD acceptance criteria (Gherkin)

Step 2: Simulation (Digital Program Twin)

Before writing a single line of code, ICDEV™ simulates the program across 6 dimensions:

  • Schedule — Monte Carlo with 10,000 iterations, P50/P80/P95 confidence intervals
  • Cost — $125-200/hr blended rate × estimated effort, low/high ranges
  • Risk — probability × impact register, categorized by NIST risk factors
  • Compliance — NIST controls affected, framework coverage gaps
  • Technical — architecture complexity, integration density
  • Staffing — team size, ramp-up timeline, skill requirements

Then generates 3 Courses of Action:

COA Scope Timeline Cost Risk
Speed P1 requirements only (MVP) 1-2 PIs S-M Higher
Balanced P1 + P2 requirements 2-3 PIs M-L Moderate
Comprehensive Full scope 3-5 PIs L-XL Lowest

Each COA includes an architecture summary, PI roadmap, risk register, compliance impact analysis, resource plan, and cost estimate. RED-tier requirements automatically get alternative COAs that achieve the same mission intent within the existing ATO boundary.

Step 3: Application Generation

This is where ICDEV™ does what no other tool does. From the approved blueprint, it generates a complete, working application in 12 deterministic steps:

Step What Gets Generated
1. Directory Tree 40+ directories following FORGE structure
2. Tools All deterministic Python scripts, adapted with app-specific naming and ports
3. Agent Infrastructure 5-7 AI agent definitions with Agent Cards, MCP server stubs, config
4. Memory System MEMORY.md, daily logs, SQLite database, semantic search capability
5. Database Standalone init script creating capability-gated tables
6. Goals & Hard Prompts 8 essential workflow definitions, adapted for the child app
7. Args & Context YAML config files, compliance catalogs, language profiles
8. A2A Callback Client JSON-RPC client for parent-child communication
9. CI/CD GitHub + GitLab pipelines, slash commands, .gitignore, requirements.txt
10. Cloud MCP Config Connected to 100+ cloud-provider MCP servers (AWS, Azure, GCP, OCI, IBM)
11. CLAUDE.md Dynamic documentation (Jinja2) — only documents present capabilities
12. Audit & Registration Logged to append-only audit trail, registered in child registry, genome manifest

The generated application isn't a template. It's a living system with its own FORGE framework, ANVIL workflow, multi-agent architecture, memory system, compliance automation, and CI/CD pipeline. It inherits ICDEV™'s capabilities but is independently deployable.

Before generation, ICDEV™ scores fitness across 6 dimensions to determine the right architecture:

Dimension Weight What It Measures
Data Complexity 10% CRUD vs event-sourced vs graph models
Decision Complexity 25% Workflow branching, ML inference, classification
User Interaction 20% NLQ, conversational UI, dashboards
Integration Density 15% APIs, webhooks, multi-agent mesh
Compliance Sensitivity 15% CUI/SECRET, FedRAMP, CMMC, FIPS requirements
Scale Variability 15% Burst traffic, auto-scaling, real-time streaming

Score ≥ 6.0 → full agent architecture. 4.0–5.9 → hybrid. < 4.0 → traditional.

Step 4: Build (TDD + Security)

Every feature is built using the ANVIL workflow with true TDD:

[Model] → Architect → Trace → Link → Assemble → [Critique] → Stress-test

The optional ANVIL Critique phase runs multi-agent adversarial review between Assemble and Stress-test. Security, Compliance, and Knowledge agents independently critique the plan in parallel, producing GO/NOGO/CONDITIONAL consensus before stress-testing begins.

The 9-step testing pipeline runs automatically:

  1. py_compile — syntax validation
  2. Ruff — linting (replaces flake8 + isort + black)
  3. pytest — unit/integration tests with coverage
  4. behave — BDD scenario tests from generated Gherkin
  5. Bandit — SAST security scan
  6. Playwright — E2E browser tests
  7. Vision validation — LLM-based screenshot analysis
  8. Acceptance validation — criteria verification against test evidence
  9. Security gates — CUI markings, STIG (0 CAT1), secret detection

Step 5: Compliance (Automatic ATO Package)

ICDEV™ generates every artifact you need for ATO:

  • System Security Plan (SSP) — covers all 17 FIPS 200 control families (AC, AT, AU, CA, CM, CP, IA, IR, MA, MP, PE, PL, PS, RA, SA, SC, SI) with dynamic baseline selection from FIPS 199 categorization
  • Plan of Action & Milestones (POAM) — auto-populated from scan findings
  • STIG Checklist — mapped to application technology stack
  • Software Bill of Materials (SBOM) — CycloneDX format, regenerated every build
  • OSCAL artifacts — machine-readable, validated against NIST Metaschema
  • Control crosswalks — implement AC-2 once, ICDEV™ maps it to FedRAMP, CMMC, 800-171, CJIS, HIPAA, PCI DSS, ISO 27001, and 35+ more
  • cATO evidence — continuous monitoring with freshness tracking and automated evidence collection
  • eMASS sync — push/pull artifacts to eMASS

The dual-hub crosswalk engine eliminates duplicate assessments:

                    ┌─────────────────┐
                    │  NIST 800-53    │  ← US Hub
                    │    Rev 5        │
                    └────────┬────────┘
            ┌────────────────┼────────────────┐
            │                │                │
       ┌────┴────┐     ┌────┴────┐     ┌────┴────┐
       │FedRAMP  │     │  CMMC   │     │800-171  │
       │Mod/High │     │  L2/L3  │     │  Rev 2  │
       └─────────┘     └─────────┘     └─────────┘
            │                │
       ┌────┴────┐     ┌────┴────┐
       │  CJIS   │     │ HIPAA   │     ...and 15+ more
       │ HITRUST │     │ PCI DSS │
       │  SOC 2  │     │ISO27001 │  ← Bridge to Int'l Hub
       └─────────┘     └─────────┘

Quick Start

Option 1: Install from PyPI (recommended)

# Install ICDEV™
pip install icdev

# Add LLM providers (pick what you need)
pip install icdev[llm]          # OpenAI, Anthropic, Bedrock, Gemini, Ollama
pip install icdev[full]         # Everything: all LLM providers + search + testing + security

# Initialize databases (234 tables)
icdev-init-db

# Start the dashboard
icdev-dashboard
# → http://localhost:5000

# Start the unified MCP server (241 tools for Claude Code / AI IDEs)
icdev-mcp

Available extras:

Extra What it adds
icdev[llm] OpenAI, Anthropic, Bedrock, Google GenAI, Ollama
icdev[llm-azure] Azure OpenAI
icdev[llm-vertex] Google Vertex AI
icdev[llm-oci] Oracle Cloud GenAI
icdev[llm-ibm] IBM watsonx.ai
icdev[llm-all] All LLM providers
icdev[search] Semantic + keyword search (numpy, rank_bm25)
icdev[testing] pytest, behave, ruff, pydantic
icdev[security] bandit, pip-audit, detect-secrets, cyclonedx-bom
icdev[full] Everything above

Option 2: Install from source

# Clone and install
git clone https://github.com/icdev-ai/icdev.git
cd icdev
pip install -r requirements.txt

# Initialize databases (234 tables)
python tools/db/init_icdev_db.py

# Start the dashboard
python tools/dashboard/app.py
# → http://localhost:5000

Option 3: Modular installation

# Interactive wizard
python tools/installer/installer.py --interactive

# Profile-based (pick your mission)
python tools/installer/installer.py --profile dod_team --compliance fedramp_high,cmmc
python tools/installer/installer.py --profile healthcare --compliance hipaa,hitrust
python tools/installer/installer.py --profile isv_startup --platform docker

Generate your first application:

# Assess fitness for agentic architecture
python tools/builder/agentic_fitness.py --spec "Mission planning tool for IL5 with CUI markings" --json

# Generate blueprint from scorecard
python tools/builder/app_blueprint.py --fitness-scorecard scorecard.json \
  --user-decisions '{}' --app-name "mission-planner" --json

# Generate the full application (12 steps, 300+ files)
python tools/builder/child_app_generator.py --blueprint blueprint.json \
  --project-path ./output --name "mission-planner" --json

Or use Claude Code:

/icdev-intake        # Start conversational requirements intake
/icdev-simulate      # Run Digital Program Twin simulation
/icdev-agentic       # Generate the full application
/icdev-build         # TDD build (RED → GREEN → REFACTOR)
/icdev-comply        # Generate ATO artifacts
/icdev-transparency  # AI transparency & accountability audit
/icdev-accountability # AI accountability — oversight, CAIO, appeals, incidents
/audit               # 33-check production readiness audit

42 Compliance Frameworks

Category Frameworks
Federal NIST 800-53 Rev 5, NIST 800-171, FedRAMP (Moderate/High/20x), CMMC Level 2/3, FIPS 199/200, CNSSI 1253
DoD DoDI 5000.87 DES, MOSA (10 U.S.C. §4401), CSSP (DI 8530.01), cATO Monitoring
Healthcare HIPAA Security Rule, HITRUST CSF v11
Financial PCI DSS v4.0, SOC 2 Type II
Law Enforcement CJIS Security Policy
International ISO/IEC 27001:2022, ISO/IEC 42001:2023, EU AI Act (Annex III)
AI/ML Security NIST AI RMF 1.0, MITRE ATLAS, OWASP LLM Top 10, OWASP Agentic AI, OWASP ASI, SAFE-AI
AI Transparency OMB M-25-21 (High-Impact AI), OMB M-26-04 (Unbiased AI), NIST AI 600-1 (GenAI), GAO-21-519SP (AI Accountability)
Architecture NIST 800-207 Zero Trust, CISA Secure by Design, IEEE 1012 IV&V
Explainability XAI Compliance, Model Cards, System Cards, Confabulation Detection, Fairness Assessment

Multi-Agent Architecture (15 Agents)

Tier Agents Role
Core Orchestrator, Architect Task routing, system design
Domain Builder, Compliance, Security, Infrastructure, MBSE, Modernization, Requirements Analyst, Supply Chain, Simulation, DevSecOps/ZTA, Gateway Specialized domain work
Support Knowledge, Monitor Self-healing, observability

Agents communicate via A2A protocol (JSON-RPC 2.0 over mutual TLS). Each publishes an Agent Card at /.well-known/agent.json. Workflows use DAG-based parallel execution with domain authority vetoes.

Orchestration Controls:

  • Dispatcher mode — Orchestrator delegates only, never executes tools directly (FORGE enforcement)
  • Declarative prompt chains — YAML-driven sequential LLM-to-LLM reasoning (plan → critique → refine)
  • Session purpose tracking — NIST AU-3 audit traceability for every agent session
  • Async result injection — high-priority mailbox delivery for completed background tasks
  • Tiered file access — zero_access / read_only / no_delete defense-in-depth for sensitive files

6 First-Class Languages — Build New or Modernize Legacy

Government agencies and defense contractors sit on millions of lines of legacy code — COBOL, Fortran, Struts, .NET Framework, Python 2 — with the original developers long gone and zero institutional knowledge left. Hiring is impossible: nobody wants to maintain a 20-year-old Java 6 monolith on WebLogic. The code works, but it's a ticking time bomb of tech debt, unpatched CVEs, and expired ATOs.

ICDEV™ solves this from both directions:

Build new — scaffold, TDD, lint, scan, and generate code in any of 6 languages with compliance baked in from line one:

Language Scaffold TDD Lint SAST BDD Code Gen
Python Flask/FastAPI pytest ruff bandit behave yes
Java Spring Boot JUnit checkstyle SpotBugs Cucumber yes
Go net/http, Gin go test golangci-lint gosec godog yes
Rust Actix-web cargo test clippy cargo-audit cucumber-rs yes
C# ASP.NET Core xUnit analyzers SecurityCodeScan SpecFlow yes
TypeScript Express Jest eslint eslint-security cucumber-js yes

Modernize legacy — when the original team is gone, ICDEV™ becomes the team:

  • 7R Assessment — automated analysis scores each application across Rehost, Replatform, Refactor, Rearchitect, Rebuild, Replace, and Retire using a weighted multi-criteria decision matrix. No tribal knowledge required — ICDEV™ reads the code.
  • Architecture Extraction — static analysis maps the dependency graph, identifies coupling hotspots, measures complexity, and generates documentation that never existed. Works on codebases with zero comments and zero docs.
  • Cross-Language Translation — 5-phase hybrid pipeline translates between any of the 30 language pairs (Extract → Type-Check → Translate → Assemble → Validate+Repair). Migrating a Python 2 Flask app to Go? A legacy Java 8 monolith to modern Spring Boot? A .NET Framework service to ASP.NET Core? ICDEV™ generates pass@k candidate translations, validates with compiler feedback, and auto-repairs failures — up to 3 repair cycles per unit.
  • Strangler Fig Tracking — for large monoliths that can't be rewritten overnight, ICDEV™ manages the gradual migration: dual-system traceability, feature-by-feature cutover tracking, and a compliance bridge that maintains ≥95% ATO control coverage throughout the entire transition.
  • Framework Migration — declarative JSON mapping rules handle Struts → Spring Boot, Django 2 → Django 4, Rails 5 → Rails 7, Express → Fastify, and more. Add new migration paths without writing code.
  • ATO Compliance Bridge — this is the killer feature for modernization. Legacy apps often have existing ATOs. ICDEV™ ensures the modernized application inherits the original control mappings through the crosswalk engine, so you don't lose years of compliance work. The bridge validates coverage every PI and blocks deployment if it drops below 95%.

The bottom line: you don't need the original developers. You don't need a team that knows the legacy stack. ICDEV™ analyzes the codebase, scores the migration strategy, translates the code, and maintains ATO coverage — with an append-only audit trail documenting every decision for your ISSO.


6 Cloud Providers

Provider Environment LLM Integration
AWS GovCloud us-gov-west-1 Amazon Bedrock (Claude, Titan)
Azure Government USGov Virginia Azure OpenAI
GCP Assured Workloads Vertex AI (Gemini, Claude)
OCI Government Cloud OCI GenAI (Cohere, Llama)
IBM Cloud for Government watsonx.ai (Granite, Llama)
Local Air-Gapped Ollama (Llama, Mistral, CodeGemma)

All 6 providers have full Infrastructure-as-Code generators — Terraform modules with VPC/VNet/VCN networking, IAM, KMS encryption, container orchestration (EKS/AKS/GKE/OKE/IKS), and compliance-hardened defaults per cloud. Generated applications connect to 100+ cloud-provider MCP servers automatically based on target CSP.


FORGE Framework

ICDEV™'s core architecture separates deterministic tools from probabilistic AI:

┌──────────────────────────────────────────────────────┐
│  Goals         →  What to achieve (48 workflows)      │
│  Orchestration →  AI decides tool order (LLM layer)   │
│  Tools         →  Deterministic scripts (500+ tools)  │
│  Context       →  Static reference (42 catalogs)      │
│  Hard Prompts  →  Reusable LLM templates              │
│  Args          →  YAML/JSON config (40+ files)        │
└──────────────────────────────────────────────────────┘

Why? LLMs are probabilistic. Business logic must be deterministic. 90% accuracy per step = ~59% over 5 steps. FORGE fixes this by keeping AI in the orchestration layer and critical logic in deterministic Python scripts.

Generated child applications inherit the full FORGE framework — they aren't wrappers or templates, they're autonomous systems that can build their own features using the same methodology.


Architecture

┌──────────────────────────────────────────────────────────┐
│                  Claude Code / AI IDE                      │
│            (39 slash commands, 250+ MCP tools)             │
├──────────────────────────────────────────────────────────┤
│                 Unified MCP Gateway                        │
│          (single server, all 250+ tools, lazy-loaded)       │
├──────────┬──────────┬───────────┬───────────┬────────────┤
│   Core   │  Domain  │  Domain   │  Domain   │  Support   │
│          │          │           │           │            │
│ Orchestr │ Builder  │ MBSE      │ DevSecOps │ Knowledge  │
│ Architect│ Complnce │ Modernize │ Gateway   │ Monitor    │
│          │ Security │ Req.Anlst │           │            │
│          │ Infra    │ SupplyChn │           │            │
│          │          │ Simulatn  │           │            │
├──────────┴──────────┴───────────┴───────────┴────────────┤
│                   FORGE Framework                         │
│       Goals │ Tools │ Args │ Context │ Hard Prompts        │
├──────────────────────────────────────────────────────────┤
│  SQLite (dev) / PostgreSQL (prod)  │   Multi-Cloud CSP    │
│  210 tables, append-only audit     │  AWS │Azure│GCP│OCI  │
│  Per-tenant DB isolation           │  IBM │Local/Air-Gap   │
└──────────────────────────────────────────────────────────┘

Dashboard

python tools/dashboard/app.py
# → http://localhost:5000
Page Purpose
/ Home with auto-notifications and pipeline status
/projects Project listing with compliance posture
/agents Agent registry with heartbeat monitoring
/monitoring System health with status icons
/wizard Getting Started wizard (3 questions → workflow)
/query Natural language compliance queries
/chat Multi-agent chat interface
/children Generated child application registry with health monitoring
/traces Distributed trace explorer with span waterfall
/provenance W3C PROV lineage viewer
/xai Explainable AI dashboard with SHAP analysis
/ai-transparency AI Transparency: model cards, system cards, AI inventory, fairness, GAO readiness
/ai-accountability AI Accountability: oversight plans, CAIO registry, appeals, incidents, ethics reviews, reassessment
/code-quality Code Quality Intelligence: AST metrics, smell detection, maintainability trend, runtime feedback
/orchestration Real-time orchestration: agent grid, workflow DAG, SSE mailbox feed, prompt chains, ANVIL critiques
/cpmp Contract Performance Management: EVM, CPARS prediction, deliverables, subcontractors, portfolio health
/cpmp/cor COR portal: government read-only contract oversight (deliverables, EVM, CPARS)
/proposals GovProposal lifecycle: opportunities, sections, compliance matrix, timeline, reviews
/govcon GovCon Intelligence: SAM.gov scanning, pipeline status, domain distribution
/govcon/requirements Requirement pattern analysis: frequency, domain heatmap, trend detection
/govcon/capabilities ICDEV™ capability coverage: L/M/N grading, gaps, enhancement recommendations
/network/canvas Network Design Canvas: topology builder, drag-and-drop, cloud architecture diagrams
/network/compliance Network compliance audit: STIG findings, ACAS/Nessus vulnerability overlay, heat maps
/network/facilities Facilities management: rack layouts, power/cooling, cable tracking
/sre SRE Operations: runbook library, incident tracking, toil budgets, SLO monitoring
/pipeline Pipeline Canvas: visual CI/CD pipeline design with drag-and-drop stages

Auth: per-user API keys (SHA-256 hashed), 6 RBAC roles (admin, pm, developer, isso, co, cor). Optional BYOK (bring-your-own LLM keys) with AES-256 encryption.


MCP Server Integration

All 250+ tools exposed through a single MCP gateway. Works with any AI coding assistant:

{
  "mcpServers": {
    "icdev-unified": {
      "command": "python",
      "args": ["tools/mcp/unified_server.py"]
    }
  }
}

Compatible with: Claude Code, OpenAI Codex, Google Gemini, GitHub Copilot, Cursor, Windsurf, Amazon Q, JetBrains/Junie, Cline, Aider.


Security

Defense-in-depth by default:

  • STIG-hardened containers — non-root, read-only rootfs, all capabilities dropped
  • Append-only audit trail — no UPDATE/DELETE on audit tables, NIST AU compliant
  • CUI markings — applied at generation time per impact level (IL4/IL5/IL6)
  • Mutual TLS — all inter-agent communication within K8s
  • Prompt injection detection — 5-category scanner for AI-specific threats
  • MITRE ATLAS red teaming — adversarial testing against 6 techniques
  • Behavioral drift detection — z-score baseline monitoring for all agents
  • Tool chain validation — blocks dangerous execution sequences
  • MCP RBAC — per-tool, per-role deny-first authorization
  • AI transparency — model cards, system cards, AI use case inventory, confabulation detection, fairness assessment per OMB M-25-21/M-26-04, NIST AI 600-1, and GAO-21-519SP
  • AI accountability — human oversight plans, CAIO designation, appeal tracking, AI incident response, ethics reviews, reassessment scheduling, cross-framework accountability audit
  • Dispatcher mode — Orchestrator agent enforced as delegate-only, cannot execute tools directly
  • Tiered file access control — zero_access (.env, *.pem, *.tfstate), read_only (lock files, catalogs), no_delete (CLAUDE.md, goals, IaC)
  • Session purpose tracking — NIST AU-3 compliant session intent declaration with SHA-256 integrity hashing
  • ANVIL adversarial critique — multi-agent plan review with GO/NOGO/CONDITIONAL consensus before stress-testing
  • Self-healing — confidence-based remediation (≥0.7 auto-fix, 0.3–0.7 suggest, <0.3 escalate)

Deployment

Desktop (Development)

pip install -r requirements.txt
python tools/dashboard/app.py

Kubernetes (Production)

kubectl apply -f k8s/
# Includes: namespace, network policies (default deny), 15 agent deployments,
# dashboard, API gateway, HPA auto-scaling, pod disruption budgets

Helm (On-Premises / Air-Gapped)

helm install icdev deploy/helm/ --values deploy/helm/values-on-prem.yaml

Installation Profiles

Profile Compliance Best For
ISV Startup None SaaS products, rapid prototyping
DoD Team FedRAMP + CMMC + FIPS + cATO Defense software
Healthcare HIPAA + HITRUST + SOC 2 Health IT / EHR
Financial PCI DSS + SOC 2 + ISO 27001 FinTech / Banking
Law Enforcement CJIS + FIPS 199/200 Criminal justice systems
GovCloud Full All 42 frameworks Maximum compliance

Project Structure

icdev/
├── goals/                # 47 workflow definitions
├── tools/                # 500+ tools across 44 categories
│   ├── compliance/       # 25+ framework assessors, crosswalk, OSCAL
│   ├── security/         # SAST, AI security, ATLAS, prompt injection
│   ├── builder/          # TDD, scaffolding, app generation, 6 languages
│   ├── requirements/     # RICOAS intake, gap detection, SAFe decomposition
│   ├── simulation/       # Digital Program Twin, Monte Carlo, COA generation
│   ├── dashboard/        # Flask web UI, auth, RBAC, real-time events, orchestration dashboard
│   ├── agent/            # Multi-agent orchestration, DAG workflows, prompt chains, ANVIL critique
│   ├── cloud/            # 6 CSP abstractions, region validation
│   ├── saas/             # Multi-tenant platform layer
│   ├── mcp/              # Unified MCP gateway (250+ tools)
│   ├── modernization/    # 7R assessment, legacy migration
│   ├── observability/    # Tracing, provenance, AgentSHAP, XAI
│   ├── innovation/       # Autonomous self-improvement engine
│   ├── creative/         # Customer-centric feature discovery
│   ├── govcon/           # GovCon Intelligence — SAM.gov capture pipeline
│   ├── network/          # Network Design Canvas — topology, ACAS/Nessus overlay, NL queries, cloud arch
│   ├── infra/            # IaC generators — Terraform for AWS, Azure, GCP, OCI, IBM Cloud
│   ├── sre/              # SRE Operations — runbooks, incident tracking, toil budgets, SLO monitoring
│   ├── pipeline/         # Pipeline Canvas — visual CI/CD pipeline design
│   └── ...               # 30+ more specialized categories
├── args/                 # 30+ YAML/JSON configuration files
├── context/              # 42 compliance catalogs, language profiles
├── hardprompts/          # Reusable LLM instruction templates
├── tests/                # 130 test files
├── k8s/                  # Production Kubernetes manifests
├── docker/               # STIG-hardened Dockerfiles
├── deploy/helm/          # Helm chart for on-prem deployment
├── .claude/commands/     # 38 Claude Code slash commands
└── CLAUDE.md             # Comprehensive architecture documentation

Network Design Canvas

Interactive topology builder for designing, documenting, and auditing network architectures — from rack-level facilities to cloud-scale deployments.

Capability Description
Topology Builder Drag-and-drop canvas with 200+ device types (routers, switches, firewalls, servers, IoT, OT/ICS) and automatic link routing
Cloud Architecture Generate cloud diagrams for all 6 CSPs — VPC/VNet/VCN, subnets, security groups, load balancers, managed services
ACAS/Nessus Overlay Import .nessus scan files, auto-match hosts to topology nodes, render vulnerability heat maps with severity badges
Natural Language Queries Ask plain-English questions about any topology ("What happens if Core-Switch goes down?", "Show all paths between A and B") — powered by deterministic graph algorithms with local LLM fallback
STIG Compliance Audit Per-device STIG finding tracking, CAT I/II/III severity, audit history, exportable checklists
Inventory Export Export device inventory to CSV, JSON, or YAML with filtering by type, location, STIG status
Facilities Management Rack elevation diagrams, power/cooling tracking, cable management

Air-gap safe — all JavaScript vendored locally (JointJS, D3, Backbone), zero CDN dependencies.


SRE Operations

Site Reliability Engineering dashboard for managing operational excellence:

  • Runbook Library — searchable runbook catalog with step-by-step procedures, linked to services and alerts
  • Incident Tracking — incident lifecycle from detection to postmortem, with timeline and impact analysis
  • Toil Budgets — track and reduce toil with per-team budgets and automation ROI tracking
  • SLO Monitoring — service level objective tracking with error budget burn-rate alerts

Pipeline Canvas

Visual CI/CD pipeline design tool with drag-and-drop stage composition:

  • Design pipelines visually with connected stages (build, test, scan, deploy, gate)
  • Export to GitLab CI and GitHub Actions YAML
  • Compliance gate integration — security scan and approval stages auto-inserted based on impact level
  • Template library for common patterns (TDD, DevSecOps, cATO continuous monitoring)

Testing

# All tests (130 test files, 1600+ tests)
pytest tests/ -v --tb=short

# BDD scenario tests
behave features/

# E2E browser tests (Playwright)
python tools/testing/e2e_runner.py --run-all

# Production readiness audit (38 checks, 7 categories)
python tools/testing/production_audit.py --human --stream

# Code quality self-analysis
python tools/analysis/code_analyzer.py --project-dir tools/ --json

Dependency License Notice

Most dependencies use permissive licenses (MIT, BSD, Apache 2.0). Notable exceptions:

Package License Notes
psycopg2-binary LGPL Permits use in proprietary software via dynamic linking (standard pip install)
docutils BSD / GPL / Public Domain Triple-licensed; used under BSD

Run pip-licenses -f markdown to audit all dependency licenses.


Contributing

We welcome contributions. ICDEV™ uses a Contributor License Agreement (CLA) to support dual licensing. The CLA does not transfer your copyright — you retain full ownership of your work.

Attribution

See NOTICE for third-party acknowledgments, standards references, and architectural inspirations.

License

ICDEV™ is dual-licensed:

  • Open SourceApache License 2.0 Free for use, modification, and distribution with patent protection.

  • CommercialCommercial License Enterprise support, custom SLAs, and dedicated compliance consulting.

Contact


Built by one developer. Ready for your entire team.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

icdev-1.2.8.tar.gz (4.9 MB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

icdev-1.2.8-py3-none-any.whl (5.1 MB view details)

Uploaded Python 3

File details

Details for the file icdev-1.2.8.tar.gz.

File metadata

  • Download URL: icdev-1.2.8.tar.gz
  • Upload date:
  • Size: 4.9 MB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.14.0

File hashes

Hashes for icdev-1.2.8.tar.gz
Algorithm Hash digest
SHA256 ff6f6fdfc5836fa51d9905a45fab8e84c334ba09d4f35a85bc696f367d6f07a3
MD5 dc409000f54e78415c6e77ad97d94240
BLAKE2b-256 b1255a5720088e7017654093c17f732329a8c44797107f8fdf7d42363de7f099

See more details on using hashes here.

File details

Details for the file icdev-1.2.8-py3-none-any.whl.

File metadata

  • Download URL: icdev-1.2.8-py3-none-any.whl
  • Upload date:
  • Size: 5.1 MB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.14.0

File hashes

Hashes for icdev-1.2.8-py3-none-any.whl
Algorithm Hash digest
SHA256 3aead9049335c6be5f8037c9179a7c82910503dd8764a96c01ea576f40dd370a
MD5 c69dc25c2942dfbe695592fcea94180b
BLAKE2b-256 04eec2d3217dd5fd3b5aa6ab48948e54337236ab71ddda31670ff5fdb2c81943

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page