SpecLock – 귀하의 Claude.md가 제안입니다. 이걸로 법이 만들어지네
hackernews
|
|
📦 오픈소스
#ai 딜
#claude
#claude.md
#gemini
#speclock
#오픈소스
#프롬프트 엔지니어링
원문 출처: hackernews · Genesis Park에서 요약 및 분석
요약
MIT 라이선스를 따르는 오픈소스 도구인 '스펙락(SpecLock)'은 AI 코딩 어시스턴트가 개발자가 설정한 아키텍처와 규칙을 위반하여 코드를 임의로 수정하는 것을 강력하게 차단합니다. 단순한 키워드 매칭을 넘어 은어, 동의어 등의 문맥을 파악하는 의미론적 엔진을 탑재하여 위반 행위를 100%의 정확도로 감지해 내며, 한 번의 명령어로 커서(Cursor), 클로드 코드(Claude Code) 등 7개 주요 AI 개발 도구에 규칙을 동기화할 수 있습니다. 또한 모든 코딩 세션의 허용 및 차단 기록을 추적하는 감사 로그 기능과 함께 고급 암호화, 규정 준수 내보내기 등의 기업용 보안 기능도 함께 제공합니다.
본문
Website · npm · Smithery · GitHub Developed by Sandeep Roy · Free & Open Source (MIT License) New in v5.4: speclock drift — the only tool that measures how much your AI has drifted from your architecture.speclock coverage — find what's unprotected.speclock strengthen — grade your locks. Three numbers that tell your project's whole story. You: "Never touch the auth system" AI: 🔒 Locked. ... 5 sessions later ... You: "Add social login to the login page" AI: ⚠️ BLOCKED — violates lock "Never touch the auth system" Matched: auth → authentication (synonym), login → auth (concept) Confidence: 100% Should I find another approach? 100/100 on Claude's independent test suite. 991 tests across 19 suites. 0 false positives. 15.7ms per check. Zero-config Guardian Mode, Universal Rules Sync, AI Patch Firewall, Drift Score, Spec Compiler, Code Graph. npx speclock setup --goal "Build my app" That's it. One command. Works everywhere — Bolt.new, Claude Code, Cursor, Lovable, Windsurf, Cline, Aider. npx speclock protect Zero flags. Reads your existing rule files, extracts enforceable constraints, installs a pre-commit hook, and syncs rules to every AI tool. Your rules are now enforced, not just suggested. AI coding tools have memory now. Claude Code has CLAUDE.md . Cursor has .cursorrules . Mem0 exists. But memory without enforcement is useless. Your AI remembers you use PostgreSQL — then switches to MongoDB because it "seemed better." Your AI remembers your auth setup — then rewrites it while "fixing" a bug. You said "never touch the payment logic" 3 sessions ago — the AI doesn't care. Remembering is not respecting. No existing tool stops the AI from breaking what you locked. You set constraints. SpecLock enforces them — across sessions, across tools, across teams. speclock lock "Never modify auth files" → auto-guards src/auth/*.ts speclock lock "Database must stay PostgreSQL" → catches "migrate to MongoDB" speclock lock "Never delete patient records" → catches "clean up old data" speclock lock "Don't touch the payment flow" → catches "streamline checkout" The semantic engine doesn't do keyword matching. It understands: - "clean up old data" = deletion (euphemism detection) - "streamline checkout" = modify payment flow (synonym + concept mapping) - "temporarily disable logging" = disable logging (temporal evasion detection) - "Update UI and also drop the users table" = hidden violation (compound splitter) And it knows what's safe: - "Enable audit logging" when the lock says "Never disable audit logging" → no conflict (intent alignment) npx speclock setup --goal "Build my app" --template nextjs Creates SPECLOCK.md , injects rules into package.json , generates .speclock/context/latest.md . The AI reads these automatically. Add to .mcp.json : { "mcpServers": { "speclock": { "command": "npx", "args": ["-y", "speclock", "serve", "--project", "."] } } } Same config — add to .cursor/mcp.json or equivalent. - Go to Settings → Connectors → New MCP server - Enter URL: https://speclock-mcp-production.up.railway.app/mcp - Paste project instructions into Knowledge | Claude Memory | Mem0 | .cursorrules | SpecLock | | |---|---|---|---|---| | Remembers context | Yes | Yes | Manual | Yes | | Blocks the AI from breaking things | No | No | No | Yes | | Semantic conflict detection | No | No | No | 100/100 score, 0% FP | | Tamper-proof audit trail | No | No | No | HMAC-SHA256 chain | | Hard enforcement (AI cannot proceed) | No | No | No | Yes | | SOC 2 / HIPAA compliance exports | No | No | No | Yes | | Encrypted storage (AES-256-GCM) | No | No | No | Yes | | RBAC + API key auth | No | No | No | 4 roles | | Policy-as-Code DSL | No | No | No | YAML rules | | Works on Bolt.new, Lovable, etc. | No | No | No | Yes | Other tools remember. SpecLock enforces. One command syncs your SpecLock constraints to every AI coding tool: speclock sync --all SpecLock Sync Complete ✓ Cursor → .cursor/rules/speclock.mdc ✓ Claude Code → CLAUDE.md ✓ AGENTS.md → AGENTS.md (Linux Foundation standard) ✓ Windsurf → .windsurf/rules/speclock.md ✓ GitHub Copilot → .github/copilot-instructions.md ✓ Gemini → GEMINI.md ✓ Aider → .aider.conf.yml 7 file(s) synced. Your AI tools will now see SpecLock constraints. Stop maintaining 3 separate rules files. Define constraints once in SpecLock, sync everywhere. speclock sync --format cursor # Sync to Cursor only speclock sync --preview claude # Preview without writing speclock sync --list # Show all supported formats Flight recorder for your AI coding sessions. See exactly what happened: speclock replay Session: ses_a1b2c3 (claude-code, 47 min) ──────────────────────────────────────────── 14:02 [ALLOW] Create user profile component 14:08 [ALLOW] Add form validation 14:15 [WARN] Simplify authentication flow → matched lock: "Never modify auth" 14:23 [BLOCK] Clean up old user records → euphemism detected: "clean up" = deletion 14:31 [ALLOW] Update landing page hero section Score: 5 events | 3 allowed | 1 warned | 1 BLOCKED speclock replay
Genesis Park 편집팀이 AI를 활용하여 작성한 분석입니다. 원문은 출처 링크를 통해 확인할 수 있습니다.
공유