Git-backed, clause-aware legal-document template manager. Stdlib-only Python.
Project description
template-vault-cli
A Git-backed, clause-aware package manager for legal-document templates. Public sources (Common Paper, YC SAFE, Bonterms) and your own house templates, in one searchable, composable, version-tracked vault. Stdlib-only Python. MIT.
Why it's different from a folder of .docx files: the CLI treats clauses
as first-class structural objects with provenance. You can fork a template,
swap a single clause from another template into it, and later pull upstream
parent improvements into your fork — meta.json records which clauses came
from where, so the merge is deterministic. An LLM can recommend
compose/swap; the execution stays rule-based and reproducible without one.
Install
pipx install template-vault-cli # recommended
# or
pip install template-vault-cli # stdlib-only, no isolation
pip install 'template-vault-cli[docx]' # +.docx ingestion (python-docx)
Python 3.9+. No third-party runtime dependencies in the default install —
[docx] adds python-docx only when you want to upload .docx files.
30-second first run
Three commands, zero file authoring — fetches a real public template into a fresh vault:
mkdir my-vault && cd my-vault
template-vault init
template-vault import common-paper-mutual-nda
template-vault list
You should see one template registered under nda/. From there, find,
info, clauses, compose, and swap all work against it. See the
end-to-end tour below for the
composition workflow.
What it does
- Stores templates as plain files in a Git repo. Multi-user sync =
git pull/git push. - Indexes them with a small
meta.jsonper template: category, jurisdiction, tags, summary. - Searches by category, tag, jurisdiction, or keyword (
find). - Composes new templates by forking + swapping clauses, with provenance recorded.
- Upgrades derived templates when their parents get new versions.
- Asks an LLM (Anthropic / OpenAI / OpenAI-compatible) for a recommendation, opt-in, metadata-only by default.
The CLI structures existing templates. It does not generate new clause text.
End-to-end: clause-aware composition
A runnable transcript using inline file content so you can copy-paste the whole block into a fresh directory:
mkdir tour && cd tour
template-vault init
cat > house.md <<'EOF'
# House NDA
## Purpose
Evaluate a relationship.
## Term and Survival
Two years from the Effective Date.
EOF
cat > yc.md <<'EOF'
# YC NDA
## Purpose
Exploring.
## Term and Survival
One year from the Effective Date.
EOF
template-vault upload house.md --category nda --name house \
--summary "house mutual" --non-interactive
template-vault upload yc.md --category nda --name yc \
--summary "yc-style" --non-interactive
# Fork the house NDA and swap one clause from the YC one.
template-vault compose --base nda/house --as nda/house-startup
template-vault swap nda/house-startup --clause "Term and Survival" --from nda/yc
template-vault info nda/house-startup
info shows clause_overrides: 1 with the entry "Term and Survival" from nda/yc@v1 — that's the provenance. When nda/house later gets a v2,
template-vault upgrade nda/house-startup pulls the parent's other clause
changes in but leaves the locally-swapped Term clause alone. That's the
whole point of recording the override.
For a tour of the public-source pattern, do the same dance but use import
instead of authoring files:
template-vault import common-paper-mutual-nda # → nda/common-paper-mutual
template-vault import common-paper-one-way-nda # → nda/common-paper-one-way
template-vault compare-clauses nda/common-paper-mutual nda/common-paper-one-way
Every swap appends to clause_overrides in meta.json. You — and upgrade
— always know which clauses came from where.
Command reference
template-vault init [--bare] [--path .]
template-vault upload <file>
--category <cat> --name <slug>
[--version v3] [--supersedes v2] [--summary "..."]
[--tags a,b] [--jurisdiction "California,Delaware"]
[--license MIT] [--llm-summarize]
[--amend v3 [--yes-amend]] # overwrite a version in place
template-vault list [--category nda] [--tag house-style] [--jurisdiction California]
template-vault find "<keyword>" [--top-k 10] [--json]
template-vault get <category>/<name>[@version] [--path-only]
template-vault info <category>/<name> [--json] # --json for scripts
template-vault diff <category>/<name> <version-a> <version-b>
template-vault history <category>/<name> [--json] # versions + swaps + amends timeline
template-vault export <category>/<name> --as docx [--output PATH] # needs [docx] extra
template-vault verify [--update-hashes] [--strict] # content-level sha256 check
# Clause-aware composition
template-vault clauses <category>/<name>
template-vault compose --base <ref> --as <category>/<new-name>
template-vault swap <target> --clause "<title>" --from <ref>
template-vault compare-clauses <a> <b> [--clause "<title>"]
template-vault upgrade <ref> [--accept-all] [--dry-run] [--interactive-explain]
template-vault clause-library [--threshold 0.85] [--extract] [--suggest-aliases]
# LLM (opt-in, metadata-only by default)
template-vault ask "<query>" [--with-content] [--top-k 5] [--llm anthropic]
template-vault ask "<query>" --json [--quiet] # quiet → JSON-only stdout
template-vault ask "<query>" --execute [--yes-execute] # run LLM-emitted compose/swap
# Public sources
template-vault sources [--sources path/to/internal-sources.json]
template-vault import <source-id> [--no-verify | --pin-hash] [--sources …]
# Sync + housekeeping
template-vault sync # git pull
template-vault publish # git push
template-vault doctor # vault integrity check (schema-level)
template-vault completion bash | zsh # emit shell completion script
Most write-side commands (compose, swap, upgrade, import, export)
accept --why for a short structured explanation of what they did. Color
output auto-detects TTY; honors the NO_COLOR
convention.
Privacy posture
asksends only template metadata (name, category, jurisdiction, tags, summary, clause titles) to the LLM by default.--with-contentadds short excerpts. In an interactive session it asks for confirmation showing the provider/model. In CI, you must pass--yes-sendor setNDA_VAULT_NO_CONFIRM=1. Otherwise it refuses.- See SECURITY.md for the full threat model.
Storage layout
your-vault/ ← a git repo
├── .vault.json ← vault config
├── nda/
│ ├── house-mutual/
│ │ ├── v1.md
│ │ ├── v2.md
│ │ ├── v3.md
│ │ └── meta.json
│ └── yc-startup-friendly/
│ ├── v1.md
│ └── meta.json
├── investment/
│ └── safe-post-money/
└── msa/
Categories are top-level dirs. Each template is a directory of versioned files
plus exactly one meta.json. See ARCHITECTURE.md for the
full schema and the clause-detection regex.
Suite
template-vault-cli belongs to a small contract-operations toolkit:
- nda-review-cli — drafts, reviews, negotiates NDAs against a house policy.
- docx2pdf-cli — DOCX → PDF.
- sign-cli — multi-provider e-signature with hash-chained audit logs.
Future integration: nda-review-cli draft --template-name <category>/<name>
will resolve via template-vault get if a vault is configured.
License
MIT for the code. The CLI fetches public-source templates from upstream URLs
at import time and does not bundle Common Paper, YC, Bonterms, or any
other party's text.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file template_vault_cli-0.4.0.tar.gz.
File metadata
- Download URL: template_vault_cli-0.4.0.tar.gz
- Upload date:
- Size: 76.0 kB
- Tags: Source
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.12
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
4fffc78f7e6227ec7c59ea9104b949300ca338e830627016b8b0d5024502373a
|
|
| MD5 |
c3667761382da81a28947bf0a503da5a
|
|
| BLAKE2b-256 |
c7c48a20f789f807d65eecc07c5fd0262ac57a3ef82a3b61019e49df3c0ffbe4
|
Provenance
The following attestation bundles were made for template_vault_cli-0.4.0.tar.gz:
Publisher:
publish.yml on DrBaher/template-vault-CLI
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
template_vault_cli-0.4.0.tar.gz -
Subject digest:
4fffc78f7e6227ec7c59ea9104b949300ca338e830627016b8b0d5024502373a - Sigstore transparency entry: 1510691373
- Sigstore integration time:
-
Permalink:
DrBaher/template-vault-CLI@87af215d11b8514f4a0e5a3d95a0e334cf188aab -
Branch / Tag:
refs/tags/v0.4.0 - Owner: https://github.com/DrBaher
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
publish.yml@87af215d11b8514f4a0e5a3d95a0e334cf188aab -
Trigger Event:
push
-
Statement type:
File details
Details for the file template_vault_cli-0.4.0-py3-none-any.whl.
File metadata
- Download URL: template_vault_cli-0.4.0-py3-none-any.whl
- Upload date:
- Size: 39.0 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.12
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
c3189a50feec69918a3d5a00aaf1c8e57710dc288cd843e47ca6de87855ddc14
|
|
| MD5 |
94640cb577f9cb044f24af74156ffc96
|
|
| BLAKE2b-256 |
d5ec550e9d8039f951bb10fde1f5a37d953a981b79de7921d843fba3bd03c4ad
|
Provenance
The following attestation bundles were made for template_vault_cli-0.4.0-py3-none-any.whl:
Publisher:
publish.yml on DrBaher/template-vault-CLI
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
template_vault_cli-0.4.0-py3-none-any.whl -
Subject digest:
c3189a50feec69918a3d5a00aaf1c8e57710dc288cd843e47ca6de87855ddc14 - Sigstore transparency entry: 1510691468
- Sigstore integration time:
-
Permalink:
DrBaher/template-vault-CLI@87af215d11b8514f4a0e5a3d95a0e334cf188aab -
Branch / Tag:
refs/tags/v0.4.0 - Owner: https://github.com/DrBaher
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
publish.yml@87af215d11b8514f4a0e5a3d95a0e334cf188aab -
Trigger Event:
push
-
Statement type: