Back to Home
acartag7 icon

specwright

Verified Safe

by acartag7

Overview

Spec-driven AI software development platform that turns vague feature requests into executable plans, leveraging AI for planning, chunking, execution, and review with transparent oversight.

Installation

Run Command
pnpm --filter @specwright/mcp dev

Environment Variables

  • ANTHROPIC_API_KEY
  • CLAUDE_CODE_OAUTH_TOKEN
  • OPENCODE_URL
  • DB_PATH
  • CLAUDE_PATH
  • MAX_WORKERS
  • CHUNK_TIMEOUT_MS
  • SPECWRIGHT_EXECUTOR_TYPE
  • SPECWRIGHT_EXECUTOR_ENDPOINT
  • SPECWRIGHT_EXECUTOR_MODEL
  • SPECWRIGHT_EXECUTOR_TIMEOUT
  • SPECWRIGHT_EXECUTOR_MAX_TOKENS
  • SPECWRIGHT_PLANNER_TYPE
  • SPECWRIGHT_PLANNER_CLI_PATH
  • SPECWRIGHT_REVIEWER_TYPE
  • SPECWRIGHT_REVIEWER_CLI_PATH
  • SPECWRIGHT_REVIEWER_AUTO_APPROVE
  • SPECWRIGHT_MAX_ITERATIONS
  • SPECWRIGHT_USE_HTTP_API

Security Notes

The codebase demonstrates strong security practices, particularly in handling external command execution. It extensively uses `child_process.spawnSync` and `child_process.spawn` for interacting with `git`, `gh` (GitHub CLI), `opencode`, and `claude` CLIs. Arguments are consistently passed as arrays with `shell: false`, effectively mitigating shell command injection risks. A dedicated `path-validation.ts` module ensures project paths are normalized, within the user's home directory, and do not access sensitive system locations, preventing path traversal attacks. These deliberate security patterns are even highlighted in internal documentation. No `eval` or code obfuscation is present. The primary security considerations stem from the inherent trust placed in external CLI tools (`opencode`, `claude`) and the network interactions with AI APIs, though these are handled with best practices for credentials (environment variables).

Similar Servers

Stats

Interest Score0
Security Score9
Cost ClassHigh
Avg Tokens5000
Stars0
Forks0
Last Update2026-01-19

Tags

AIDevelopmentCode GenerationProject ManagementCode ReviewGit IntegrationOrchestrationMonorepo