Skip to main content

A governed development framework for AI-assisted engineering

Project description

vaultspec-core

Python CI Docker MCP uv License: MIT


A research and decision driven framework for your coding agents - with a paper trail

Vaultspec is a spec-driven development rulebook for your AI coders. It enforces a structured pipeline around AI-assisted development - research, decide, plan, execute, review - and provides tools to manage the document storage.

Each stage produces durable markdown artifacts in your repository that allow collaborating agents to share context and you to track development progress.


How it works

vaultspec-core structures AI-assisted development into a repeatable pipeline centered around features. Two directories form the backbone:

  • .vaultspec/ holds the framework configuration - rules, templates, agent personas, and system prompts that shape how AI tools behave.
  • .vault/ is the paper trail - research notes, architecture decision records (ADRs), implementation plans, execution logs, and review and audit trails.

Two entry points ship with the framework:

  • vaultspec-core is the CLI that manages your workspace - installing, syncing, and validating framework resources. See the CLI reference for the full command surface.
  • MCP server exposes vault discovery and document creation to MCP-capable clients like Claude Code. Invoked via uv run python -m vaultspec_core.mcp_server.app (a vaultspec-mcp console script is also installed but module invocation is preferred to avoid binary locking on Windows). See the MCP reference for setup and tool documentation.

The framework manual walks through the development workflow and explains how to customize rules, skills, agents, and system prompts.


Getting started

Prerequisites

  • Python 3.13 or later
  • uv - a fast Python package manager

Install from source

vaultspec-core is not yet published on PyPI. Install from the repository:

git clone https://github.com/wgergely/vaultspec-core.git
cd vaultspec-core
uv sync

vaultspec-core --version

Initialize a workspace

vaultspec-core install --target ./my-project

This scaffolds .vaultspec/ and .vault/ inside the target directory, seeds the builtin rules, agents, skills, and templates, syncs resources to provider config directories, and writes an .mcp.json for MCP-capable clients.

To install for a specific AI tool only:

vaultspec-core install claude --target ./my-project

After editing any framework files under .vaultspec/, re-sync to push changes to provider directories:

vaultspec-core sync

Start using it

Open your AI tool in the project directory. The install step synced rules, skills, and agent personas into each provider's config directory (.claude/, .gemini/, .agents/, .codex/) and wrote an .mcp.json for MCP-capable clients. Your AI tool will pick these up automatically.

The framework requires research and architectural decisions before coding begins. Just describe what you want to build in natural language:

"Research options for adding full-text search to the API"

The synced rules guide the AI to follow the pipeline - it will produce structured research findings in .vault/research/, then progress through architectural decisions, planning, execution, and review. Each stage writes records to .vault/ and references the output of earlier stages.

You can also invoke skills explicitly to start a specific stage. The bundled skills (vaultspec-research, vaultspec-adr, vaultspec-write, vaultspec-execute, vaultspec-code-review) read the relevant vault records and structure the AI's output accordingly.

The framework manual walks through each stage in detail with examples.


The development workflow

Every feature flows through five stages. The AI does the analytical work; you approve each checkpoint before the next stage starts.

Stage You The AI
Research Review and approve the findings Explores the problem, documents options
Decide Approve the decision record Drafts an ADR based on research
Plan Review and approve the implementation plan Breaks the decision into concrete steps
Execute Stay available if the AI gets stuck Works through each step autonomously
Review Read the report and decide if the work ships Audits the result, flags any issues

Everything produced - findings, ADRs, plans, execution records, and review reports - is saved in .vault/.


Working with the vault

The vault subcommand manages documents in .vault/. A few common operations:

# Scaffold a new document from a template

vaultspec-core vault add research --feature search-api

# List and inspect documents

vaultspec-core vault list --feature search-api
vaultspec-core vault stats --feature search-api

# Validate frontmatter, links, and cross-references (--fix to auto-repair)

vaultspec-core vault check all --fix

# Visualize the dependency graph for a feature

vaultspec-core vault graph --feature search-api

Valid document types: adr, audit, exec, plan, reference, research. See the CLI reference for the full command surface.


Further reading

Guide What it covers
Framework manual Development workflow, skills, and customization
CLI reference All commands, flags, and options for vaultspec-core
MCP reference MCP server tools, setup, and configuration

Getting help

Open an issue on GitHub.


Contributing and license

Contributions are welcome - bug reports, feature ideas, or pull requests. Browse what's in progress on GitHub Issues.

vaultspec-core is released under the MIT License.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

vaultspec_core-0.1.8.tar.gz (1.8 MB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

vaultspec_core-0.1.8-py3-none-any.whl (373.8 kB view details)

Uploaded Python 3

File details

Details for the file vaultspec_core-0.1.8.tar.gz.

File metadata

  • Download URL: vaultspec_core-0.1.8.tar.gz
  • Upload date:
  • Size: 1.8 MB
  • Tags: Source
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: uv/0.11.6 {"installer":{"name":"uv","version":"0.11.6","subcommand":["publish"]},"python":null,"implementation":{"name":null,"version":null},"distro":{"name":"Ubuntu","version":"24.04","id":"noble","libc":null},"system":{"name":null,"release":null},"cpu":null,"openssl_version":null,"setuptools_version":null,"rustc_version":null,"ci":true}

File hashes

Hashes for vaultspec_core-0.1.8.tar.gz
Algorithm Hash digest
SHA256 fc8c6738238238a7a44c40468db3a1d739f9f246d1516c1bbafc37b337107a7d
MD5 20126a55b5ef639d5253b1551baa64fe
BLAKE2b-256 e50546eb43959c010bcddf7a7422ccf04a97c0118cf53595729d41df88b5bce6

See more details on using hashes here.

File details

Details for the file vaultspec_core-0.1.8-py3-none-any.whl.

File metadata

  • Download URL: vaultspec_core-0.1.8-py3-none-any.whl
  • Upload date:
  • Size: 373.8 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: uv/0.11.6 {"installer":{"name":"uv","version":"0.11.6","subcommand":["publish"]},"python":null,"implementation":{"name":null,"version":null},"distro":{"name":"Ubuntu","version":"24.04","id":"noble","libc":null},"system":{"name":null,"release":null},"cpu":null,"openssl_version":null,"setuptools_version":null,"rustc_version":null,"ci":true}

File hashes

Hashes for vaultspec_core-0.1.8-py3-none-any.whl
Algorithm Hash digest
SHA256 dda16c1264db9516861956a51922df3c2ec3b92d7ecd32558b4b02c67e491795
MD5 aa5705da8c407a745da098df90a57ff9
BLAKE2b-256 3775cc36bb8cc73df09217832d5ebf10d4ba823ec38d8eae94abba9bcd849d0f

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page