Skip to main content

A governed development framework for AI-assisted engineering

Project description

vaultspec-core

Python CI Docker MCP uv License: MIT


A research and decision driven framework for your coding agents - with a paper trail

Vaultspec is a spec-driven development rulebook for your AI coders. It enforces a structured pipeline around AI-assisted development - research, decide, plan, execute, review - and provides tools to manage the document storage.

Each stage produces durable markdown artifacts in your repository that allow collaborating agents to share context and you to track development progress.


How it works

vaultspec-core structures AI-assisted development into a repeatable pipeline centered around features. Two directories form the backbone:

  • .vaultspec/ holds the framework configuration - rules, templates, agent personas, and system prompts that shape how AI tools behave.
  • .vault/ is the paper trail - research notes, architecture decision records (ADRs), implementation plans, execution logs, and review and audit trails.

Two entry points ship with the framework:

  • vaultspec-core is the CLI that manages your workspace - installing, syncing, and validating framework resources. See the CLI reference for the full command surface.
  • MCP server exposes vault discovery and document creation to MCP-capable clients like Claude Code. Invoked via uv run python -m vaultspec_core.mcp_server.app (a vaultspec-mcp console script is also installed but module invocation is preferred to avoid binary locking on Windows). See the MCP reference for setup and tool documentation.

The framework manual walks through the development workflow and explains how to customize rules, skills, agents, and system prompts.


Getting started

Prerequisites

  • Python 3.13 or later
  • uv - a fast Python package manager

Install from source

vaultspec-core is not yet published on PyPI. Install from the repository:

git clone https://github.com/wgergely/vaultspec-core.git
cd vaultspec-core
uv sync

vaultspec-core --version

Initialize a workspace

vaultspec-core install --target ./my-project

This scaffolds .vaultspec/ and .vault/ inside the target directory, seeds the builtin rules, agents, skills, and templates, syncs resources to provider config directories, and writes an .mcp.json for MCP-capable clients.

To install for a specific AI tool only:

vaultspec-core install claude --target ./my-project

After editing any framework files under .vaultspec/, re-sync to push changes to provider directories:

vaultspec-core sync

Start using it

Open your AI tool in the project directory. The install step synced rules, skills, and agent personas into each provider's config directory (.claude/, .gemini/, .agents/, .codex/) and wrote an .mcp.json for MCP-capable clients. Your AI tool will pick these up automatically.

The framework requires research and architectural decisions before coding begins. Just describe what you want to build in natural language:

"Research options for adding full-text search to the API"

The synced rules guide the AI to follow the pipeline - it will produce structured research findings in .vault/research/, then progress through architectural decisions, planning, execution, and review. Each stage writes records to .vault/ and references the output of earlier stages.

You can also invoke skills explicitly to start a specific stage. The bundled skills (vaultspec-research, vaultspec-adr, vaultspec-write, vaultspec-execute, vaultspec-code-review) read the relevant vault records and structure the AI's output accordingly.

The framework manual walks through each stage in detail with examples.


The development workflow

Every feature flows through five stages. The AI does the analytical work; you approve each checkpoint before the next stage starts.

Stage You The AI
Research Review and approve the findings Explores the problem, documents options
Decide Approve the decision record Drafts an ADR based on research
Plan Review and approve the implementation plan Breaks the decision into concrete steps
Execute Stay available if the AI gets stuck Works through each step autonomously
Review Read the report and decide if the work ships Audits the result, flags any issues

Everything produced - findings, ADRs, plans, execution records, and review reports - is saved in .vault/.


Working with the vault

The vault subcommand manages documents in .vault/. A few common operations:

# Scaffold a new document from a template

vaultspec-core vault add research --feature search-api

# List and inspect documents

vaultspec-core vault list --feature search-api
vaultspec-core vault stats --feature search-api

# Validate frontmatter, links, and cross-references (--fix to auto-repair)

vaultspec-core vault check all --fix

# Visualize the dependency graph for a feature

vaultspec-core vault graph --feature search-api

Valid document types: adr, audit, exec, plan, reference, research. Generated feature indexes live in .vault/index/ and are managed by vault feature index. See the CLI reference for the full command surface.


Schema migrations

When a release of vaultspec-core changes the on-disk shape of .vault/, the new layout is delivered through a versioned migration registry rather than a recurring pre-commit hook. Each registered migration runs once per upgrade and never again. Three triggers cover every consumer path:

  • vaultspec-core install --upgrade runs every pending migration after re-seeding builtins.
  • Any vault subcommand (e.g. vault add, vault feature index, vault check) lazily applies pending migrations before its primary action, so consumers who never run install --upgrade still observe the new layout.
  • vaultspec-core migrations status and vaultspec-core migrations run give explicit control for operators who prefer manual application.

The registry compares each migration's target_version against the workspace manifest's vaultspec_version; entries whose target exceeds the manifest run in version order, then the manifest version is bumped on success. A migration that raises leaves the manifest version unchanged, so the next invocation re-attempts.


Further reading

Guide What it covers
Framework manual Development workflow, skills, and customization
CLI reference All commands, flags, and options for vaultspec-core
MCP reference MCP server tools, setup, and configuration

Getting help

Open an issue on GitHub.


Contributing and license

Contributions are welcome - bug reports, feature ideas, or pull requests. Browse what's in progress on GitHub Issues.

vaultspec-core is released under the MIT License.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

vaultspec_core-0.1.18.tar.gz (1.3 MB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

vaultspec_core-0.1.18-py3-none-any.whl (563.6 kB view details)

Uploaded Python 3

File details

Details for the file vaultspec_core-0.1.18.tar.gz.

File metadata

  • Download URL: vaultspec_core-0.1.18.tar.gz
  • Upload date:
  • Size: 1.3 MB
  • Tags: Source
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: uv/0.11.10 {"installer":{"name":"uv","version":"0.11.10","subcommand":["publish"]},"python":null,"implementation":{"name":null,"version":null},"distro":{"name":"Ubuntu","version":"24.04","id":"noble","libc":null},"system":{"name":null,"release":null},"cpu":null,"openssl_version":null,"setuptools_version":null,"rustc_version":null,"ci":true}

File hashes

Hashes for vaultspec_core-0.1.18.tar.gz
Algorithm Hash digest
SHA256 a65eb726ec2c6c51c02715a674665d949ea49a8134fb50d3d55e2b34a2974ba6
MD5 6a16695cd919bf916968df920f209659
BLAKE2b-256 fb88182f4a58782077ee978ce841d9c3fe759115062cc94af5f2ef6fada314f1

See more details on using hashes here.

File details

Details for the file vaultspec_core-0.1.18-py3-none-any.whl.

File metadata

  • Download URL: vaultspec_core-0.1.18-py3-none-any.whl
  • Upload date:
  • Size: 563.6 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: uv/0.11.10 {"installer":{"name":"uv","version":"0.11.10","subcommand":["publish"]},"python":null,"implementation":{"name":null,"version":null},"distro":{"name":"Ubuntu","version":"24.04","id":"noble","libc":null},"system":{"name":null,"release":null},"cpu":null,"openssl_version":null,"setuptools_version":null,"rustc_version":null,"ci":true}

File hashes

Hashes for vaultspec_core-0.1.18-py3-none-any.whl
Algorithm Hash digest
SHA256 32feda72de1a91c55c22dc379fca1f5245d6d1d452b6410b4052c0dcba65b556
MD5 c596622cbcc665f86444e32aa23eb091
BLAKE2b-256 3f76d2078ca446dc78018c452b3d880d55d586052409958b97a513df52c280f6

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page