A governed development framework for AI-assisted engineering
Project description
vaultspec-core
A research and decision driven framework for your coding agents - with a paper trail
Vaultspec is a spec-driven development rulebook for your AI coders. It enforces a structured pipeline around AI-assisted development - research, decide, plan, execute, review - and provides tools to manage the document storage.
Each stage produces durable markdown artifacts in your repository that allow collaborating agents to share context and you to track development progress.
How it works
vaultspec-core structures AI-assisted development into a repeatable pipeline centered around features. Two directories form the backbone:
.vaultspec/holds the framework configuration - rules, templates, agent personas, and system prompts that shape how AI tools behave..vault/is the paper trail - research notes, architecture decision records (ADRs), implementation plans, execution logs, and review and audit trails.
Two entry points ship with the framework:
vaultspec-coreis the CLI that manages your workspace - installing, syncing, and validating framework resources. See the CLI reference for the full command surface.- MCP server exposes vault discovery and document creation to MCP-capable clients like Claude Code. Invoked via
uv run python -m vaultspec_core.mcp_server.app(avaultspec-mcpconsole script is also installed but module invocation is preferred to avoid binary locking on Windows). See the MCP reference for setup and tool documentation.
The framework manual walks through the development workflow and explains how to customize rules, skills, agents, and system prompts.
Getting started
Prerequisites
- Python 3.13 or later
- uv - a fast Python package manager
Install from source
vaultspec-core is not yet published on PyPI. Install from the repository:
git clone https://github.com/wgergely/vaultspec-core.git
cd vaultspec-core
uv sync
vaultspec-core --version
Initialize a workspace
vaultspec-core install --target ./my-project
This scaffolds .vaultspec/ and .vault/ inside the target directory, seeds the builtin rules, agents, skills, and templates, syncs resources to provider config directories, and writes an .mcp.json for MCP-capable clients.
To install for a specific AI tool only:
vaultspec-core install claude --target ./my-project
After editing any framework files under .vaultspec/, re-sync to push changes to provider directories:
vaultspec-core sync
Start using it
Open your AI tool in the project directory. The install step synced rules, skills, and agent personas into each provider's config directory (.claude/, .gemini/, .agents/, .codex/) and wrote an .mcp.json for MCP-capable clients. Your AI tool will pick these up automatically.
The framework requires research and architectural decisions before coding begins. Just describe what you want to build in natural language:
"Research options for adding full-text search to the API"
The synced rules guide the AI to follow the pipeline - it will produce structured research findings in .vault/research/, then progress through architectural decisions, planning, execution, and review. Each stage writes records to .vault/ and references the output of earlier stages.
You can also invoke skills explicitly to start a specific stage. The bundled skills (vaultspec-research, vaultspec-adr, vaultspec-write, vaultspec-execute, vaultspec-code-review) read the relevant vault records and structure the AI's output accordingly.
The framework manual walks through each stage in detail with examples.
The development workflow
Every feature flows through five stages. The AI does the analytical work; you approve each checkpoint before the next stage starts.
| Stage | You | The AI |
|---|---|---|
| Research | Review and approve the findings | Explores the problem, documents options |
| Decide | Approve the decision record | Drafts an ADR based on research |
| Plan | Review and approve the implementation plan | Breaks the decision into concrete steps |
| Execute | Stay available if the AI gets stuck | Works through each step autonomously |
| Review | Read the report and decide if the work ships | Audits the result, flags any issues |
Everything produced - findings, ADRs, plans, execution records, and review reports - is saved in .vault/.
Working with the vault
The vault subcommand manages documents in .vault/. A few common operations:
# Scaffold a new document from a template
vaultspec-core vault add research --feature search-api
# List and inspect documents
vaultspec-core vault list --feature search-api
vaultspec-core vault stats --feature search-api
# Validate frontmatter, links, and cross-references (--fix to auto-repair)
vaultspec-core vault check all --fix
# Visualize the dependency graph for a feature
vaultspec-core vault graph --feature search-api
Valid document types: adr, audit, exec, plan, reference, research. Generated feature indexes live in .vault/index/ and are managed by vault feature index. See the CLI reference for the full command surface.
Schema migrations
When a release of vaultspec-core changes the on-disk shape of .vault/, the new layout is delivered through a versioned migration registry rather than a recurring pre-commit hook. Each registered migration runs once per upgrade and never again. Three triggers cover every consumer path:
vaultspec-core install --upgraderuns every pending migration after re-seeding builtins.- Any
vaultsubcommand (e.g.vault add,vault feature index,vault check) lazily applies pending migrations before its primary action, so consumers who never runinstall --upgradestill observe the new layout. vaultspec-core migrations statusandvaultspec-core migrations rungive explicit control for operators who prefer manual application.
The registry compares each migration's target_version against the workspace manifest's vaultspec_version; entries whose target exceeds the manifest run in version order, then the manifest version is bumped on success. A migration that raises leaves the manifest version unchanged, so the next invocation re-attempts.
Further reading
| Guide | What it covers |
|---|---|
| Framework manual | Development workflow, skills, and customization |
| CLI reference | All commands, flags, and options for vaultspec-core |
| MCP reference | MCP server tools, setup, and configuration |
Getting help
Open an issue on GitHub.
Contributing and license
Contributions are welcome - bug reports, feature ideas, or pull requests. Browse what's in progress on GitHub Issues.
vaultspec-core is released under the MIT License.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file vaultspec_core-0.1.18.tar.gz.
File metadata
- Download URL: vaultspec_core-0.1.18.tar.gz
- Upload date:
- Size: 1.3 MB
- Tags: Source
- Uploaded using Trusted Publishing? Yes
- Uploaded via: uv/0.11.10 {"installer":{"name":"uv","version":"0.11.10","subcommand":["publish"]},"python":null,"implementation":{"name":null,"version":null},"distro":{"name":"Ubuntu","version":"24.04","id":"noble","libc":null},"system":{"name":null,"release":null},"cpu":null,"openssl_version":null,"setuptools_version":null,"rustc_version":null,"ci":true}
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
a65eb726ec2c6c51c02715a674665d949ea49a8134fb50d3d55e2b34a2974ba6
|
|
| MD5 |
6a16695cd919bf916968df920f209659
|
|
| BLAKE2b-256 |
fb88182f4a58782077ee978ce841d9c3fe759115062cc94af5f2ef6fada314f1
|
File details
Details for the file vaultspec_core-0.1.18-py3-none-any.whl.
File metadata
- Download URL: vaultspec_core-0.1.18-py3-none-any.whl
- Upload date:
- Size: 563.6 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? Yes
- Uploaded via: uv/0.11.10 {"installer":{"name":"uv","version":"0.11.10","subcommand":["publish"]},"python":null,"implementation":{"name":null,"version":null},"distro":{"name":"Ubuntu","version":"24.04","id":"noble","libc":null},"system":{"name":null,"release":null},"cpu":null,"openssl_version":null,"setuptools_version":null,"rustc_version":null,"ci":true}
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
32feda72de1a91c55c22dc379fca1f5245d6d1d452b6410b4052c0dcba65b556
|
|
| MD5 |
c596622cbcc665f86444e32aa23eb091
|
|
| BLAKE2b-256 |
3f76d2078ca446dc78018c452b3d880d55d586052409958b97a513df52c280f6
|