speclock

SpecLock is an AI constraint/policy enforcement system for coding agents. It defines text and typed constraints (locks), reviews intended changes (including diff-based review), blocks or warns on violations via a hard/enforcement mode, and provides auditing (HMAC chain) plus encryption and RBAC for enterprise use. It also exposes MCP tooling and a REST API for automated review/checking, with a Python SDK and ROS2 integration described.

Evaluated Mar 30, 2026 (22d ago)
Homepage ↗ Repo ↗ DevTools ai-constraints policy-as-code mcp mcp-server api-gateway diff-review rbac audit-trail encryption typed-constraints python-sdk ros2
⚙ Agent Friendliness
52
/ 100
Can an agent use this?
🔒 Security
57
/ 100
Is it safe for agents?
⚡ Reliability
32
/ 100
Does it work consistently?

Score Breakdown

⚙ Agent Friendliness

MCP Quality
70
Documentation
55
Error Messages
0
Auth Simplicity
75
Rate Limits
10

🔒 Security

TLS Enforcement
70
Auth Strength
75
Scope Granularity
35
Dep. Hygiene
55
Secret Handling
45

The provided content claims AES-256-GCM encryption, PBKDF2 key derivation, HMAC-SHA256 chained audit logs, and RBAC with API keys. However, the excerpt does not provide verifiable implementation details (e.g., where secrets are stored/logged, key management boundaries, TLS requirements, or whether API keys are rotated/expiring). Rate-limit and error semantics are not specified, which can indirectly affect security posture (e.g., brute force/abuse handling).

⚡ Reliability

Uptime/SLA
0
Version Stability
55
Breaking Changes
40
Error Recovery
35
AF Security Reliability

Best When

You run AI-assisted or autonomous code changes and need consistent cross-session enforcement of rules (especially for sensitive modules like auth/payments/data) with review and audit trails.

Avoid When

You cannot integrate the enforcement layer into your agents’ toolchain, or you need a well-defined OpenAPI spec/SDK docs with concrete, verifiable error/rate-limit semantics.

Use Cases

  • Prevent AI coding agents from modifying locked areas (e.g., auth, payments, regulated data)
  • Guardrails for autonomous code changes across sessions/tools/teams using policy-as-code
  • Diff-based patch review to detect destructive schema/interface changes
  • Blast-radius and lock-to-file mapping for informed approvals
  • Runtime/telemetry/ROS2 constraint enforcement for robots/autonomous systems
  • Auditability for compliance-oriented change control

Not For

  • General-purpose policy enforcement where formal, provable guarantees are required without model/semantic uncertainty
  • Environments where there is no ability to integrate the MCP server/REST endpoints into the agent workflow
  • Use cases requiring strict SLA-backed uptime guarantees (SLA not evidenced in provided content)

Interface

REST API
Yes
GraphQL
No
gRPC
No
MCP Server
Yes
SDK
Yes
Webhooks
No

Authentication

Methods: API key auth RBAC roles (viewer/developer/architect/admin)
OAuth: No Scopes: No

Documentation describes API key creation with roles; it does not describe OAuth/SSO flows in the provided content and does not clearly specify fine-grained scopes beyond roles.

Pricing

Free tier: Yes
Requires CC: No

Provided content emphasizes free & open source and mentions LLM usage for compilation; no concrete hosted pricing tiers or limits are evidenced in the excerpt.

Agent Metadata

Pagination
none
Idempotent
False
Retry Guidance
Not documented

Known Gotchas

  • Enforcement mode (hard vs advisory) must be correctly enabled; otherwise the agent may only receive warnings.
  • Semantic classification and diff review may block even when intent seems safe; agents should be prepared to use override/approval flows.
  • Patch gateway review requires supplying accurate file lists and (for review-diff) diffs; missing/incorrect inputs may change verdict quality.
  • Audit chain/encryption/auth features imply configuration requirements (e.g., encryption key) that an agent setup step must handle.

Alternatives

Full Evaluation Report

Comprehensive deep-dive: security analysis, reliability audit, agent experience review, cost modeling, competitive positioning, and improvement roadmap for speclock.

AI-powered analysis · PDF + markdown · Delivered within 30 minutes

$99

Package Brief

Quick verdict, integration guide, cost projections, gotchas with workarounds, and alternatives comparison.

Delivered within 10 minutes

$3

Score Monitoring

Get alerted when this package's AF, security, or reliability scores change significantly. Stay ahead of regressions.

Continuous monitoring

$3/mo

Scores are editorial opinions as of 2026-03-30.

8642
Packages Evaluated
17761
Need Evaluation
586
Need Re-evaluation
Community Powered