Skip to main content

Validation-first workflow for AI-assisted development.

Project description

SpecGuard banner

SpecGuard

SpecGuard blocks weak specs before AI coding agents turn them into defective code.

SpecGuard is a Validation-First Workflow (VFW) for AI-assisted development. It turns specs into reviewed, testable, implementation-ready packages before AI coding begins.

It is not a prompt-to-code generator. SpecGuard helps you prepare an approved spec package before an external Codex, Claude Code, or another coding agent writes application code.

Demo Video

SpecGuard demo walkthrough

Watch the full-resolution MP4 demo

The demo follows this flow:

  1. Install SpecGuard with pip install spec-guard.
  2. Copy the example spec with specguard example copy your-feature-name --force.
  3. Insert a vulnerable spec. In v0.3.0, the packaged example intentionally includes a vulnerable spec by default so users can see a blocking SpecGuard Review.
  4. Review the SpecGuard findings.
  5. Fix the weak areas directly, or ask an AI assistant to strengthen the spec by giving it the SpecGuard Review findings.
  6. Run SpecGuard Review again and confirm it reaches READY or READY_WITH_WARNINGS before implementation handoff.

Step 2 is for testing the example package. In real development, write your own product spec under specs/<your-feature-name>/ instead of relying on the example package.

After your real spec passes, give implementation-output.md to your AI coding agent to start spec-based implementation.

Workflow At A Glance

Discovery -> Spec Package -> Technical Design -> SpecGuard Review
-> Test -> Contract -> Implementation Handoff
-> External AI Implementation -> Pull Request -> SpecGuard PR Review

SpecGuard owns the validation path through Implementation Handoff. The user or an external coding agent owns implementation after the handoff, then SpecGuard PR Review can compare the pull request back to the approved spec package.

Core Reviews

SpecGuard has two review checkpoints:

  • SpecGuard Review runs before implementation. Default low mode uses a fast heuristic review, blocks Critical findings, and reports Major or Minor findings as warnings.
  • SpecGuard PR Review runs after implementation. It compares the approved spec package and implementation handoff against a pull request diff, then posts an advisory review comment.

For review levels, LLM detail review, cache behavior, and experimental Spec Revision, see Core Reviews.

Codex App Plugin

SpecGuard includes a Codex plugin scaffold under plugins/specguard/. The plugin does not replace the CLI; it helps Codex run the existing specguard command, read structured review artifacts, and summarize the next action.

To use it from the Codex app:

Supported versions: Python 3.11, 3.12, or 3.13, and a Codex CLI version that supports codex plugin marketplace. This setup has been verified with Codex CLI 0.130.0.

  1. Install the SpecGuard CLI in the environment where Codex will run:

    pip install spec-guard
    specguard --help
    
  2. Add the repo-scoped SpecGuard marketplace:

    codex plugin marketplace add KoreaNirsa/spec-guard --ref main
    
  3. Restart or refresh Codex if the plugin directory does not update immediately.

  4. In the Codex plugin directory, select the SpecGuard Plugins source and install SpecGuard.

image
  1. Prepare your target project folder. If you do not have a project yet, create one first:

    mkdir your-codex-project-folder
    cd your-codex-project-folder
    
  2. Prepare a spec package. To test SpecGuard with the sample package, run:

    specguard example copy specs/your-feature-name --force
    
  3. Open your-codex-project-folder in Codex, then ask:

    Run SpecGuard on specs/your-feature-name.
    

The default plugin path remains the heuristic CLI gate: specguard run <package> --no-llm --no-follow-up. Installing the plugin does not install the SpecGuard CLI. This is a custom repo marketplace, not the official OpenAI Plugin Directory.

For setup details, validation scenarios, and plugin boundaries, see Codex Plugin Guide.

Setup To User Flow

This is the shortest path from installation to a reviewed implementation PR:

pip install spec-guard
specguard auth setup --mode codex --model gpt-5.4
specguard init your-feature-name

# Optional: test with the packaged example spec before writing your own.
specguard example copy your-feature-name --force

specguard run specs/your-feature-name

Write or replace the draft spec under specs/your-feature-name/. If you want to test with the packaged sample first, copy the example spec with specguard example copy your-feature-name --force, then run SpecGuard.

SpecGuard guards spec validation. When the spec is safe enough, specguard run exits with PASS and reports READY or READY_WITH_WARNINGS. At that point, give implementation-output.md to an external AI coding agent to start spec-based implementation.

After implementation, SpecGuard PR Review can compare GitHub PR code against the approved spec requirements and leave a comment when the PR appears to drift from the spec. To install it, run:

specguard actions install-pr-review

Then configure the GitHub Actions secret and repository variable:

SPECGUARD_OPENAI_API_KEY=sk-...
SPECGUARD_PR_REVIEW_MODEL=gpt-5.4-nano

For Codex setup, example packages, LLM review options, follow-up menus, implementation handoff, and PR review setup, see Setup To User Flow.

Benchmark Summary

The calibrated gate-only benchmark evaluates 98 English spec packages across practical domains such as auth, billing, document sharing, webhooks, payments, inventory, support, admin roles, privacy, API keys, SSO, cache, returns, ledger, promotions, and background jobs. The v0.3.2 benchmark path adds 98 corresponding Korean gate-only cases and reports English and Korean metrics separately.

The benchmark asks one practical question: how much of the implementation handoff can SpecGuard guard before an AI coding agent starts writing code?

Gate-Only Guard Signal English 98 Korean 98
Weak specs blocked before implementation 63/65 65/65
Weak-spec block rate 96.9% 100.0%
Ready specs incorrectly blocked 0/33 0/33
False positive rate 0.0% 0.0%
Weak specs missed 2/65 0/65
False negative rate 3.1% 0.0%

In the original #136 code-generation baseline, raw weak specs exposed contract defects in 11 of 12 cases. With the calibrated local gate, SpecGuard now blocks 10 of those 11 observed exposure paths before implementation handoff, increasing prevented exposure from 27.3% to 90.9%.

This means SpecGuard is acting as a strong pre-implementation guard layer: it stops most unsafe or underspecified inputs before code generation, while leaving all ready-reference specs implementation-allowed in the current English and Korean gate-only runs.

The remaining known English gate-only misses are fault_title_no_trim and weak_document_share_client_enforced. Korean support is currently a deterministic low-mode claim for explicit unsafe wording, not a full Korean production-support claim. Full methodology, suite breakdown, case-level results, version metadata, and limitations are available in the Spec-Driven Benchmark.

Core Value

AI coding works best when the implementation input is explicit. SpecGuard focuses on the parts that often fail before code is written:

  • unclear requirements
  • hidden assumptions
  • missing authorization or ownership rules
  • weak acceptance criteria
  • undefined errors, retries, timeouts, and state transitions
  • contracts that do not match the intended behavior

The user owns the spec. SpecGuard drafts, challenges, and validates the implementation basis around it.

Documentation

  • Setup To User Flow: installation, Codex setup, example packages, validation loops, implementation handoff, and PR review setup.
  • Core Reviews: SpecGuard Review, SpecGuard PR Review, LLM detail review, cache behavior, and experimental Spec Revision.
  • Language Support: Korean default documentation support, English support, doc status, and Korean benchmark claim boundaries.
  • Codex Plugin Guide: local Codex app plugin setup, MVP workflow, validation scenarios, and plugin boundaries.
  • Plugin Result Contract: stable readiness-review.json fields and file-based states for Codex plugin consumers.
  • Readiness Rules: review levels, READY thresholds, contract requirements, and Strict E2E verification rules.
  • CI And PR Gates: readiness gate installation, required-check guidance, and PR review separation.
  • CLI Reference: common commands, run options, and CI-friendly examples.
  • Development: local source setup, tests, and packaged-example smoke testing.
  • Workflow Guide
  • Discovery Guide
  • Spec-Driven Benchmark
  • Contributing

License

Apache License 2.0

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

spec_guard-0.4.0.tar.gz (191.5 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

spec_guard-0.4.0-py3-none-any.whl (159.7 kB view details)

Uploaded Python 3

File details

Details for the file spec_guard-0.4.0.tar.gz.

File metadata

  • Download URL: spec_guard-0.4.0.tar.gz
  • Upload date:
  • Size: 191.5 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.13.12

File hashes

Hashes for spec_guard-0.4.0.tar.gz
Algorithm Hash digest
SHA256 1181922a51f8487c2c697b58450d5a827d123647dc339dce0a7d9bc9ea628def
MD5 1d260284a5593602b6edb5b194e819a5
BLAKE2b-256 df03467027c7b2e02c5596c9aad47b899603b6ac5d567138e7fac4e273ad9567

See more details on using hashes here.

Provenance

The following attestation bundles were made for spec_guard-0.4.0.tar.gz:

Publisher: publish-pypi.yml on KoreaNirsa/spec-guard

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

File details

Details for the file spec_guard-0.4.0-py3-none-any.whl.

File metadata

  • Download URL: spec_guard-0.4.0-py3-none-any.whl
  • Upload date:
  • Size: 159.7 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.13.12

File hashes

Hashes for spec_guard-0.4.0-py3-none-any.whl
Algorithm Hash digest
SHA256 c9105739b84ed63d7c0265e41ee626d95f81144b29cfecaf910d8b33072a9aa7
MD5 7964851756bc728c88b784360458084b
BLAKE2b-256 2d91edc7ae62829f640dd7c5abc9519401ea396cf975a518c2246253ba60768c

See more details on using hashes here.

Provenance

The following attestation bundles were made for spec_guard-0.4.0-py3-none-any.whl:

Publisher: publish-pypi.yml on KoreaNirsa/spec-guard

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page