Validation-first workflow for AI-assisted development.
Project description
SpecGuard
SpecGuard blocks weak specs before AI coding agents turn them into defective code.
SpecGuard is a Validation-First Workflow (VFW) for AI-assisted development. It turns specs into reviewed, testable, implementation-ready packages before AI coding begins.
It is not a prompt-to-code generator. SpecGuard helps you prepare an approved spec package before an external Codex, Claude Code, or another coding agent writes application code.
Demo Video
Watch the full-resolution MP4 demo
The demo follows this flow:
- Install SpecGuard with
pip install spec-guard. - Copy the example spec with
specguard example copy your-feature-name --force. - Insert a vulnerable spec. In v0.3.0, the packaged example intentionally includes a vulnerable spec by default so users can see a blocking SpecGuard Review.
- Review the SpecGuard findings.
- Fix the weak areas directly, or ask an AI assistant to strengthen the spec by giving it the SpecGuard Review findings.
- Run SpecGuard Review again and confirm it reaches READY or READY_WITH_WARNINGS before implementation handoff.
Step 2 is for testing the example package. In real development, write your own product spec under specs/<your-feature-name>/ instead of relying on the example package.
After your real spec passes, give implementation-output.md to your AI coding agent to start spec-based implementation.
Workflow At A Glance
Discovery -> Spec Package -> Technical Design -> SpecGuard Review
-> Test -> Contract -> Implementation Handoff
-> External AI Implementation -> Pull Request -> SpecGuard PR Review
SpecGuard owns the validation path through Implementation Handoff. The user or an external coding agent owns implementation after the handoff, then SpecGuard PR Review can compare the pull request back to the approved spec package.
Core Reviews
SpecGuard has two review checkpoints:
SpecGuard Reviewruns before implementation. Default low mode uses a fast heuristic review, blocks Critical findings, and reports Major or Minor findings as warnings.SpecGuard PR Reviewruns after implementation. It compares the approved spec package and implementation handoff against a pull request diff, then posts an advisory review comment.
For review levels, LLM detail review, cache behavior, and experimental Spec Revision, see Core Reviews.
Codex App Plugin
SpecGuard includes a Codex plugin scaffold under plugins/specguard/. The plugin does not replace the CLI; it helps Codex run the existing specguard command, read structured review artifacts, and summarize the next action.
To use it from the Codex app:
Supported versions: Python 3.11, 3.12, or 3.13, and a Codex CLI version that supports codex plugin marketplace. This setup has been verified with Codex CLI 0.130.0.
-
Install the SpecGuard CLI in the environment where Codex will run:
pip install spec-guard specguard --help
-
Add the repo-scoped SpecGuard marketplace:
codex plugin marketplace add KoreaNirsa/spec-guard --ref main
-
Restart or refresh Codex if the plugin directory does not update immediately.
-
In the Codex plugin directory, select the
SpecGuard Pluginssource and installSpecGuard.
-
Prepare your target project folder. If you do not have a project yet, create one first:
mkdir your-codex-project-folder cd your-codex-project-folder
-
Prepare a spec package. To test SpecGuard with the sample package, run:
specguard example copy specs/your-feature-name --force
-
Open
your-codex-project-folderin Codex, then ask:Run SpecGuard on specs/your-feature-name.
The default plugin path remains the heuristic CLI gate: specguard run <package> --no-llm --no-follow-up. Installing the plugin does not install the SpecGuard CLI. This is a custom repo marketplace, not the official OpenAI Plugin Directory.
For setup details, validation scenarios, and plugin boundaries, see Codex Plugin Guide.
Setup To User Flow
This is the shortest path from installation to a reviewed implementation PR:
pip install spec-guard
specguard auth setup --mode codex --model gpt-5.4
specguard init your-feature-name
# Optional: test with the packaged example spec before writing your own.
specguard example copy your-feature-name --force
specguard run specs/your-feature-name
Write or replace the draft spec under specs/your-feature-name/. If you want to test with the packaged sample first, copy the example spec with specguard example copy your-feature-name --force, then run SpecGuard.
SpecGuard guards spec validation. When the spec is safe enough, specguard run exits with PASS and reports READY or READY_WITH_WARNINGS. At that point, give implementation-output.md to an external AI coding agent to start spec-based implementation.
After implementation, SpecGuard PR Review can compare GitHub PR code against the approved spec requirements and leave a comment when the PR appears to drift from the spec. To install it, run:
specguard actions install-pr-review
Then configure the GitHub Actions secret and repository variable:
SPECGUARD_OPENAI_API_KEY=sk-...
SPECGUARD_PR_REVIEW_MODEL=gpt-5.4-nano
For Codex setup, example packages, LLM review options, follow-up menus, implementation handoff, and PR review setup, see Setup To User Flow.
Benchmark Summary
The calibrated gate-only benchmark evaluates 98 English spec packages across practical domains such as auth, billing, document sharing, webhooks, payments, inventory, support, admin roles, privacy, API keys, SSO, cache, returns, ledger, promotions, and background jobs. The v0.3.2 benchmark path adds 98 corresponding Korean gate-only cases and reports English and Korean metrics separately.
The benchmark asks one practical question: how much of the implementation handoff can SpecGuard guard before an AI coding agent starts writing code?
| Gate-Only Guard Signal | English 98 | Korean 98 |
|---|---|---|
| Weak specs blocked before implementation | 63/65 | 65/65 |
| Weak-spec block rate | 96.9% | 100.0% |
| Ready specs incorrectly blocked | 0/33 | 0/33 |
| False positive rate | 0.0% | 0.0% |
| Weak specs missed | 2/65 | 0/65 |
| False negative rate | 3.1% | 0.0% |
In the original #136 code-generation baseline, raw weak specs exposed contract defects in 11 of 12 cases. With the calibrated local gate, SpecGuard now blocks 10 of those 11 observed exposure paths before implementation handoff, increasing prevented exposure from 27.3% to 90.9%.
This means SpecGuard is acting as a strong pre-implementation guard layer: it stops most unsafe or underspecified inputs before code generation, while leaving all ready-reference specs implementation-allowed in the current English and Korean gate-only runs.
The remaining known English gate-only misses are fault_title_no_trim and weak_document_share_client_enforced. Korean support is currently a deterministic low-mode claim for explicit unsafe wording, not a full Korean production-support claim. Full methodology, suite breakdown, case-level results, version metadata, and limitations are available in the Spec-Driven Benchmark.
Core Value
AI coding works best when the implementation input is explicit. SpecGuard focuses on the parts that often fail before code is written:
- unclear requirements
- hidden assumptions
- missing authorization or ownership rules
- weak acceptance criteria
- undefined errors, retries, timeouts, and state transitions
- contracts that do not match the intended behavior
The user owns the spec. SpecGuard drafts, challenges, and validates the implementation basis around it.
Documentation
- Setup To User Flow: installation, Codex setup, example packages, validation loops, implementation handoff, and PR review setup.
- Core Reviews: SpecGuard Review, SpecGuard PR Review, LLM detail review, cache behavior, and experimental Spec Revision.
- Language Support: Korean default documentation support, English support, doc status, and Korean benchmark claim boundaries.
- Codex Plugin Guide: local Codex app plugin setup, MVP workflow, validation scenarios, and plugin boundaries.
- Plugin Result Contract: stable
readiness-review.jsonfields and file-based states for Codex plugin consumers. - Readiness Rules: review levels, READY thresholds, contract requirements, and Strict E2E verification rules.
- CI And PR Gates: readiness gate installation, required-check guidance, and PR review separation.
- CLI Reference: common commands,
runoptions, and CI-friendly examples. - Development: local source setup, tests, and packaged-example smoke testing.
- Workflow Guide
- Discovery Guide
- Spec-Driven Benchmark
- Contributing
License
Apache License 2.0
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file spec_guard-0.4.0.tar.gz.
File metadata
- Download URL: spec_guard-0.4.0.tar.gz
- Upload date:
- Size: 191.5 kB
- Tags: Source
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.12
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
1181922a51f8487c2c697b58450d5a827d123647dc339dce0a7d9bc9ea628def
|
|
| MD5 |
1d260284a5593602b6edb5b194e819a5
|
|
| BLAKE2b-256 |
df03467027c7b2e02c5596c9aad47b899603b6ac5d567138e7fac4e273ad9567
|
Provenance
The following attestation bundles were made for spec_guard-0.4.0.tar.gz:
Publisher:
publish-pypi.yml on KoreaNirsa/spec-guard
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
spec_guard-0.4.0.tar.gz -
Subject digest:
1181922a51f8487c2c697b58450d5a827d123647dc339dce0a7d9bc9ea628def - Sigstore transparency entry: 1562190994
- Sigstore integration time:
-
Permalink:
KoreaNirsa/spec-guard@725415045dfd2fce6cf914db40420271a53cb678 -
Branch / Tag:
refs/tags/v0.4.0 - Owner: https://github.com/KoreaNirsa
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
publish-pypi.yml@725415045dfd2fce6cf914db40420271a53cb678 -
Trigger Event:
push
-
Statement type:
File details
Details for the file spec_guard-0.4.0-py3-none-any.whl.
File metadata
- Download URL: spec_guard-0.4.0-py3-none-any.whl
- Upload date:
- Size: 159.7 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.12
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
c9105739b84ed63d7c0265e41ee626d95f81144b29cfecaf910d8b33072a9aa7
|
|
| MD5 |
7964851756bc728c88b784360458084b
|
|
| BLAKE2b-256 |
2d91edc7ae62829f640dd7c5abc9519401ea396cf975a518c2246253ba60768c
|
Provenance
The following attestation bundles were made for spec_guard-0.4.0-py3-none-any.whl:
Publisher:
publish-pypi.yml on KoreaNirsa/spec-guard
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
spec_guard-0.4.0-py3-none-any.whl -
Subject digest:
c9105739b84ed63d7c0265e41ee626d95f81144b29cfecaf910d8b33072a9aa7 - Sigstore transparency entry: 1562191068
- Sigstore integration time:
-
Permalink:
KoreaNirsa/spec-guard@725415045dfd2fce6cf914db40420271a53cb678 -
Branch / Tag:
refs/tags/v0.4.0 - Owner: https://github.com/KoreaNirsa
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
publish-pypi.yml@725415045dfd2fce6cf914db40420271a53cb678 -
Trigger Event:
push
-
Statement type: