MCP Catalogs
Home

speclock

by sgroy10·24·Score 46

SpecLock is an AI constraint engine with 51 MCP tools that enforces project rules across AI coding sessions.

ai-llmsecuritydeveloper-tools
6
Forks
1
Open issues
1 mo ago
Last commit
2d ago
Indexed

Overview

SpecLock prevents AI coding assistants from violating project constraints by analyzing requests semantically and blocking actions that violate defined rules. It supports both advisory and hard enforcement modes, with enterprise features including AES-256-GCM encryption, HMAC audit chains, and RBAC. The system uses semantic analysis rather than keyword matching to detect euphemistic attacks, temporal evasion, and compound sentence violations.

Try asking AI

After installing, here are 5 things you can ask your AI assistant:

you:Enforcing security constraints to prevent unauthorized access to payment systems
you:Maintaining database consistency across multiple AI coding sessions
you:Preventing AI assistants from modifying critical business logic
you:How does SpecLock differ from AI memory tools?
you:What enforcement modes are available?

When to choose this

Choose SpecLock when you need to enforce constraints across AI coding sessions and protect critical systems from unintended modifications, especially in teams or projects with strict governance requirements.

When NOT to choose this

Avoid SpecLock if you're looking for simple AI memory tools without enforcement capabilities, or if you need very fine-grained control over individual AI actions rather than high-level constraints.

Tools this server exposes

12 tools extracted from the README
  • speclock_init

    Initialize SpecLock in project

  • speclock_get_context

    Get full context pack including goals and locks

  • speclock_set_goal

    Set project goal

  • speclock_add_lock

    Add constraint and auto-guard files

  • speclock_remove_lock

    Soft-delete a lock

  • speclock_add_decision

    Record architectural decision

  • speclock_add_note

    Add pinned note to project

  • speclock_set_deploy_facts

    Record deployment configuration

  • speclock_check

    Test if an action would conflict with locks

  • speclock_list_locks

    Show all current locks

  • speclock_enforce

    Change enforcement mode between hard and advisory

  • speclock_override

    Override a lock with a reason

Comparable tools

mem0claude-memorycursor-rules

Installation

Installation

npx speclock protect              # Install in your project
speclock mcp install claude-code  # Wire up MCP for Claude Code
speclock doctor                   # Verify everything is set up correctly

For Claude Desktop, add to your config.json:

{
  "mcpServers": {
    "speclock": {
      "command": "npx",
      "args": ["-y", "speclock", "serve", "--project", "."]
    }
  }
}

FAQ

How does SpecLock differ from AI memory tools?
Unlike memory tools that only remember context, SpecLock actively enforces constraints and blocks AI from violating project rules.
What enforcement modes are available?
SpecLock offers advisory mode (default, shows warnings) and hard mode (blocks violations with MCP errors).

On Hacker News

Recent discussion from the developer community.

Compare speclock with

GitHub →

Last updated · Auto-generated from public README + GitHub signals.