AI governance platform — policy enforcement for AI-assisted development. Four enforcement layers (IDE, MCP, Git hooks, PR Gate), 739 detection rules, 18+ compliance frameworks.
Project description
MergeGuide
Product: MergeGuide Status: Inception Origin: Pivot from BCP (Build Control Plane) Phase 30 postmortem Date: 2026-01-17
Executive Summary
MergeGuide is a developer-transparent governance layer that embeds policy enforcement into existing development workflows. Rather than requiring developers to adopt a new build system, MergeGuide meets developers where they already work—in their IDEs, AI assistants, Git workflows, and pull requests.
The Pivot: From BCP to MergeGuide
What is BCP?
BCP (Build Control Plane) is an artifact-first, AI-assisted software build system built on AWS. It uses:
- AI Consultant (Claude via Bedrock) to convert natural language into structured PRDs
- Step Functions to orchestrate a governance pipeline
- Bedrock for code generation
- CodeBuild for testing
- Contract checking for output validation
- GitHub integration for PR creation
BCP works. It successfully builds CLI tools and CRUD applications with JSON persistence through a fully automated pipeline.
The Challenge That Prompted the Pivot
During Phase 30 (Complexity Limit Discovery), we systematically tested BCP's capabilities and discovered:
-
Technical ceiling is manageable - BCP reliably handles Level 1-3 complexity (CLI tools, CRUD apps). Failures at Level 4+ (web UIs, complex parsing) have clear mitigation paths.
-
The real problem is workflow disconnection - BCP requires developers to:
- Leave their IDE
- Use a separate Consultant interface
- Wait for batch pipeline execution
- Review PRs generated by an external system
-
Modern AI-assisted development is conversational - Tools like Claude Code and GitHub Copilot enable iterative, in-context development. Developers don't want to context-switch to a separate system.
-
Governance is valuable, but the delivery mechanism matters - The contract checking, evidence artifacts, and audit trails BCP provides are genuinely useful for enterprises. But they need to be delivered transparently within existing workflows.
The Core Insight
"The governance is interesting to companies that develop software; however, BCP lives completely disconnected to how developers work."
The value of BCP is not the batch pipeline—it's the governance capabilities:
- Policy enforcement
- Contract validation
- Evidence artifacts
- Audit trails
- Complexity guardrails
These capabilities can be delivered without requiring workflow changes.
The MergeGuide Approach
Design Philosophy
- Meet developers where they are - Integrate into IDEs, AI assistants, and Git workflows
- Transparent enforcement - Governance happens automatically, not as a separate step
- Defense in depth - Multiple layers catch issues at different points in the lifecycle
- Shift left - Catch violations early to reduce rework and frustration
- Fail closed at the gate - Server-side enforcement as the authoritative final check
The Four Solution Layers
Developer Intent → Code Generation → Local Commit → Push → PR → Merge
↓ ↓ ↓ ↓ ↓
[IDE Plugin] [MCP Server] [Git Hooks] [PR Gate]
A B C D
Option A: IDE Plugin (VS Code Extension)
- Real-time policy feedback during code authoring
- Inline warnings for violations
- Context-aware suggestions
- Advisory (developer can ignore)
Option B: MCP Server for Claude Code
- Governance tools exposed via Model Context Protocol
- AI assistant checks policies before suggesting code
- Seamless integration with Claude Code CLI
- Advisory (developer can ignore)
Option C: Git Hooks
- Pre-commit and pre-push validation
- Local enforcement before code leaves developer machine
- Bypassable with
--no-verify(by design—emergencies happen) - Distributed via package manager or org scripts
Option D: GitHub PR Gate (GitHub App)
- Server-side enforcement—cannot be bypassed
- Full PR diff analysis against org policies
- Evidence artifacts and audit trail
- Required status check for merge
Why Defense in Depth, Not Redundancy
| Layer | When | What It Catches | Enforcement Level |
|---|---|---|---|
| A: IDE Plugin | During authoring | Real-time violations | Advisory |
| B: MCP Server | During AI generation | AI suggesting non-compliant patterns | Advisory |
| C: Git Hooks | Pre-commit/pre-push | Local violations | Local (bypassable) |
| D: PR Gate | Before merge | Everything that escaped earlier | Server (authoritative) |
Each layer provides unique value:
- Different enforcement authority (advisory → local → server)
- Different feedback latency (immediate → seconds → minutes)
- Different context available (current file → staged changes → full PR)
Product Tiers
Tier 1: MergeGuide Essentials
- Components: PR Gate only (Option D)
- Value: Minimum viable governance with audit trail
- Target: Compliance-first organizations starting their governance journey
- Limitation: Issues caught late in cycle
Tier 2: MergeGuide Standard
- Components: PR Gate + MCP Server (D + B)
- Value: Real-time guidance during AI generation + server enforcement
- Target: Teams using Claude Code or similar AI assistants
- Benefit: Catch most issues early, guarantee enforcement
Tier 3: MergeGuide Enterprise
- Components: All four layers (A + B + C + D)
- Value: Complete shift-left + enforcement + audit
- Target: Enterprise with strict governance requirements
- Benefit: Maximum developer productivity with zero compliance escapes
Leveraging BCP Infrastructure
MergeGuide doesn't start from scratch. BCP provides battle-tested components:
Reusable from BCP
| BCP Component | MergeGuide Use |
|---|---|
| Contract checking logic | Policy validation engine |
| Evidence artifact patterns | Audit trail generation |
| Profile system | Policy configuration |
| S3 artifact storage | Evidence storage |
| Step Functions patterns | Async processing (PR Gate) |
What Changes
| BCP Approach | MergeGuide Approach |
|---|---|
| Batch pipeline execution | Event-driven hooks |
| Separate Consultant UI | Embedded in existing tools |
| Full code generation | Policy validation only |
| PRD → Code workflow | Code → Validation workflow |
Implementation Roadmap
Phase 1: PR Gate (Foundation)
Priority: Highest Rationale: Server-side enforcement is the authoritative layer. Start here.
- Build GitHub App with webhook handlers
- Implement policy engine (adapt BCP contract checking)
- Create evidence artifact storage
- Build admin dashboard for policy configuration
- Deploy as SaaS or self-hosted option
Phase 2: MCP Server
Priority: High Rationale: Claude Code is the modern development experience. Integrate early.
- Implement MCP protocol server
- Expose governance tools (check_policy, list_violations, get_guidance)
- Connect to same policy engine as PR Gate
- Distribute via npm/pip package
Phase 3: Git Hooks
Priority: Medium Rationale: Covers developers not using AI assistants.
- Create hook scripts (pre-commit, pre-push)
- Package for easy installation (husky, pre-commit framework)
- Connect to policy engine (local or remote)
- Provide offline mode with cached policies
Phase 4: IDE Plugin
Priority: Lower Rationale: Highest development effort, most competitive market.
- Build VS Code extension
- Implement Language Server Protocol for diagnostics
- Real-time policy checking as code changes
- Integrate with existing linter infrastructure
Technical Architecture
Policy Engine (Core)
The heart of MergeGuide is a policy engine that:
- Accepts code diffs or full files
- Evaluates against configured policies
- Returns violations with remediation guidance
- Generates evidence artifacts
+---------------------------------------------------------+
| Policy Engine |
+---------------------------------------------------------+
| Input: Code diff, file content, or PR metadata |
| Policies: Org-configured rules (security, style, deps) |
| Output: Violations[], Evidence artifact, Pass/Fail |
+---------------------------------------------------------+
^ ^ ^
| | |
+------+------+ +-----+------+ +-----+------+
| PR Gate | | MCP Server | | Git Hooks |
| (GitHub) | | (Claude) | | (Local) |
+-------------+ +------------+ +-------------+
Policy Configuration
Policies are defined per-organization and can include:
- Security: No hardcoded secrets, no vulnerable dependencies
- Dependencies: Allowed/blocked packages, version constraints
- Patterns: Required error handling, logging standards
- Complexity: Max file size, function length, cyclomatic complexity
- Custom: Organization-specific rules via plugin system
Evidence Artifacts
Every policy evaluation produces an evidence artifact:
{
"artifact_type": "mergeguide_evaluation",
"timestamp": "2026-01-17T15:30:00Z",
"source": "pr_gate",
"repository": "org/repo",
"ref": "feature-branch",
"commit_sha": "abc123",
"policies_evaluated": ["security-v2", "deps-v1"],
"result": "pass",
"violations": [],
"evidence_hash": "sha256:..."
}
Key Learnings from BCP Phase 30
What Works
- Contract checking - Validating outputs against expected structure is reliable
- Evidence artifacts - Immutable audit trail is valuable for compliance
- Profile-based configuration - Different policies for different contexts
- Fail-closed enforcement - Default deny with explicit allow is the right model
What to Avoid
- Batch workflows - Developers want immediate feedback, not queued jobs
- Separate UIs - Every context switch is adoption friction
- AI code generation as core value - The market is commoditizing; governance is the differentiator
- Complexity without escape hatches - Always provide bypass for emergencies (with audit)
Complexity Ceiling Insights
BCP's Phase 30 testing revealed that AI code generation has a complexity ceiling around Level 3 (CRUD CLI apps). This reinforces the pivot:
- Don't try to generate complex code
- Instead, validate code that developers (with AI assistance) write
- The governance layer doesn't have the same complexity constraints
Open Questions
- Pricing model - Per-seat? Per-repo? Per-evaluation?
- Self-hosted vs SaaS - Enterprise will want self-hosted; startups want SaaS
- Policy marketplace - Should there be shareable/purchasable policy packs?
- AI-assisted remediation - Should MergeGuide suggest fixes, or just identify violations?
- Integration depth - How much BCP infrastructure to reuse vs. rebuild cleanly?
Next Steps
- Validate PR Gate MVP - Build minimal GitHub App with basic policy checking
- Define policy schema - How are policies defined, versioned, distributed?
- Identify design partners - Find 2-3 organizations to pilot with
- Competitive analysis - Map existing solutions (Snyk, SonarQube, etc.)
- Decide build vs. buy - Which components to build, which to integrate?
File Index
development/
├── README.md # This document
├── docs/
│ ├── architecture.md # Technical architecture details
│ ├── product_tiers.md # Product packaging strategy
│ ├── implementation_roadmap.md # Phased build plan
│ └── bcp_learnings.md # Lessons from BCP Phase 30
├── reference/
│ ├── bcp_governance/ # Relevant BCP governance code
│ ├── infrastructure/ # IaC patterns from BCP
│ └── phase30_analysis/ # Phase 30 test results
├── solutions/
│ ├── pr_gate/ # Option D specification
│ ├── mcp_server/ # Option B specification
│ ├── ide_plugin/ # Option A specification
│ └── git_hooks/ # Option C specification
└── hydration/
└── mergeguide_index.md # Hydration index for Claude Code
References
- BCP Phase 30 Complexity Testing:
reference/phase30_analysis/ - BCP Contract Check Implementation:
reference/bcp_governance/contract_check/ - BCP Evidence Patterns:
reference/bcp_governance/evidence_patterns/ - Model Context Protocol: https://modelcontextprotocol.io/
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file mergeguide-1.0.0.tar.gz.
File metadata
- Download URL: mergeguide-1.0.0.tar.gz
- Upload date:
- Size: 283.2 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.12.3
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
55bc822213dcf4ba0329cb71cbc166eb3998be39931c0d24a7b528278b720d40
|
|
| MD5 |
188e4a5064a77e64e9e4937ad85c2055
|
|
| BLAKE2b-256 |
ab474ff0145a5746783a4d816daa8badcf2214d6af20daa2bd1a3598c0510d2f
|
File details
Details for the file mergeguide-1.0.0-py3-none-any.whl.
File metadata
- Download URL: mergeguide-1.0.0-py3-none-any.whl
- Upload date:
- Size: 325.3 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.12.3
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
5429d913cc3f6c1d16040492ede5f1ac0f070f6c1851b6b68fbd4e451ee8faf7
|
|
| MD5 |
c4246dc6c85eed37dcde1a25acd1123e
|
|
| BLAKE2b-256 |
95d271ca9d5d29a76142de5d5f4cd54015cdbf4d32e96022313ac4c8320575f3
|