Skip to content

mistakeknot/Clavain

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

1,102 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Clavain

Tests

Clavain is the reference Claude Code rig for Sylveste, the platform that orchestrates agents by human/machine comparative advantage. It codifies product and engineering discipline into composable workflows for building software from brainstorm to ship, using Claude, Codex, and Oracle-style second opinions where their different failure modes help. Through knowledge compounding, doc freshness monitoring, domain-aware agent generation, and session evidence capture, Clavain gets better at building your project the more you use it.

Before installing, point Claude Code at this directory and ask it to review the plugin against how you like to work. It's especially helpful to run /insights first so Claude Code can evaluate Clavain against your actual historical usage patterns.

Install

Want the full platform? Clavain is part of Sylveste, which installs the companion ecosystem, Go services, and TUI tools in one command. See the Sylveste Quick Start.

# Full rig install (recommended): installs Clavain + companions, MCP servers, env vars, and conflict resolution
npx @gensysven/agent-rig install mistakeknot/Clavain

# Plugin only (no companions or environment setup)
claude plugin install clavain@interagency-marketplace

# Local development
claude --plugin-dir /path/to/Clavain

Uninstall

# Remove Clavain + companions from Claude Code
bash scripts/uninstall.sh

# Remove Clavain only, keep companions
bash scripts/uninstall.sh --keep-companions

# Full platform uninstall (from Sylveste repo)
bash install.sh --uninstall

Prerequisites

Go 1.22+ is required — clavain-cli is a Go binary built from source. Install from go.dev/dl.

Codex install

Clavain can also run in Codex via native skill discovery and generated prompt wrappers.

Quick path:

curl -fsSL https://raw.githubusercontent.com/mistakeknot/Clavain/main/.codex/agent-install.sh | bash -s -- --update --json

Then restart Codex.

The default Codex bootstrap now installs the recommended Interverse companion set as well, not just Clavain itself.

Migrating from superpowers or compound-engineering? The ecosystem installer (install-codex-interverse.sh install) automatically removes known legacy prompt wrappers, legacy ~/.codex/skills/* artifacts (symlink or directory), and legacy superpowers clone artifacts with backup-first safety (~/.codex/.clavain-backups/<timestamp>/).

From a local clone:

make codex-refresh
make codex-doctor
make codex-doctor-json

Detailed guide: docs/README.codex.md
Single-file bootstrap target: .codex/INSTALL.md

Who this Is for

Clavain serves three concentric circles, inner circle first:

  1. Personal rig. Optimized relentlessly for one product-minded engineer's workflow. The primary goal is to make a single person as effective as a full team without losing the fun parts of building.
  2. Reference implementation. Shows what's possible with disciplined multi-agent engineering and sets conventions for plugin structure, skill design, and agent orchestration.
  3. Research artifact. Demonstrates what disciplined human-AI collaboration looks like in practice by solving real problems under real constraints and publishing the results.

Clavain is not the best workflow for everyone, but it can, at the very least, provide some inspiration for your own approach to Claude Code.

Philosophy

Most agent tools skip the product phases: brainstorm, strategy, specification: and jump straight to code generation. Clavain makes them first-class. The brainstorm and strategy phases are real product capabilities, not engineering context-setting.

A few operating principles that shape every design decision:

Refinement > production. The review phases matter more than the building phases. Resolving ambiguity during planning is far cheaper than dealing with it during execution.

Composition > integration. Small, focused tools composed together beat large integrated platforms. The inter-* constellation, Unix philosophy, modpack metaphor: it's turtles all the way down.

Human attention is the bottleneck. Optimize for the human's time, not the agent's. Multi-agent output must be presented so humans can review quickly and confidently, not just cheaply.

Multi-AI > single-vendor. No one model is best at everything. Clavain is built on Claude Code and uses Codex and Oracle-style review as complements: architecturally multi-model while remaining platform-native.

Discipline before automation. Encode judgment into checks before removing the human. Agents without discipline ship slop.

The full set of operating principles and the project roadmap live in docs/vision.md.

Development model

Clavain-first, then generalize out. Capabilities are built tightly integrated, battle-tested through real use, and only extracted into companion plugins when the patterns stabilize. The inter-* constellation represents crystallized research outputs: each companion started as a tightly-coupled feature inside Clavain that earned its independence through repeated, successful use.

This inverts the typical "design the API first" approach: build too-tightly-coupled on purpose, discover the natural seams through practice, and only then extract.

Companion Crystallized Insight
interphase Phase tracking and gates are generalizable
interflux Multi-agent review is generalizable
interline Statusline rendering is generalizable
interpath Product artifact generation is generalizable
interwatch Doc freshness monitoring is generalizable

What Clavain Is not

Not a framework. The inter-* constellation offers composable pieces anyone can adopt independently, but Clavain itself is not designed to be "framework-agnostic" or "configurable for any workflow." It is an opinionated rig that also happens to produce reusable components.

Not for non-builders. Clavain is for people who build software with agents. It is not a no-code tool, not an AI assistant for non-technical users, not a chatbot framework.

Platform-native, not vendor-neutral. Clavain is built on Claude Code. It dispatches to Codex CLI, Oracle-style review, and other model lanes as complements, but it is not trying to be a universal agent orchestrator for any LLM platform.

Workflow

For simple requests, /sprint add user export feature orchestrates the full lifecycle: brainstorm, plan, review the plan with multiple subagents, implement, review the implementation, resolve issues, and run quality gates. The human focuses on the usual suspects: product strategy, user pain points, and finding new leverage points.

For new projects (or existing projects you want to bring into the ecosystem), start with /project-onboard: it introspects the repo, asks a few questions, then sets up beads tracking, CLAUDE.md/AGENTS.md, docs structure, observability, and seeds initial content via interpath. After that, /sprint handles the development lifecycle.

For more complex endeavors, each piece works standalone. The following review of the /sprint lifecycle provides a brief explanation of all the different parts of Clavain:

The /sprint lifecycle

/sprint chains nine steps together. Each one can also be invoked standalone:

/brainstorm  →  /strategy  →  /write-plan  →  /work*  →  /flux-drive  →  /review  →  /resolve  →  /quality-gates  →  ship
   explore      structure       plan          execute     review plan     review code    fix issues    final check     commit

* When interserve mode is active, /write-plan executes via Codex Delegation and /work is skipped.

Even with clear requirements, starting with /brainstorm forces articulation of requirements and user journeys before touching code: Clavain often catches edge cases that weren't considered. /strategy then structures the brainstorm into a PRD with discrete features and creates beads for tracking: this convergent step catches scope creep and missing acceptance criteria before any planning starts. After that, /write-plan creates a structured implementation plan: and when interserve mode is active, it also dispatches execution through Codex agents, making the /work step unnecessary. /flux-drive then reviews the plan (or, under interserve, the executed result) with up to 4 tiers of agents before the code review phase.

Auto-proceed authorization

By default every irreversible op — bd close, git push, bash .beads/push.sh, ic publish --patch — prompts for confirmation. Inside a vetted /clavain:work or /clavain:sprint flow that's redundant friction; the discipline already ran tests, review, and quality gates. The auto-proceed authz layer lets those vetted ops proceed without a prompt, logs every decision to a per-project audit table, and keeps confirm as the floor for everything else.

Install (one-time):

mkdir -p ~/.clavain
cp /path/to/Clavain/config/policy.yaml.example ~/.clavain/policy.yaml

Run a sprint as usual. /clavain:sprint persists vetting signals (vetted_at, vetted_sha, tests_passed, sprint_or_work_flow) as bead labels after tests and after quality gates pass. At ship time the gate wrappers read those signals and proceed automatically when the policy's requires block is satisfied.

Inspect decisions:

clavain-cli policy list                # effective merged policy + sha256 hash
clavain-cli policy audit --since=1d    # recent auto/confirmed/blocked decisions
clavain-cli policy explain bead-close --bead=iv-xyz
clavain-cli policy lint                # spec invariants + gate-coverage check

Spec: docs/canon/policy-merge.md (merge order, allow_override, mode floors) and docs/canon/authz-cross-project-consistency.md (cross-repo op semantics). Wrappers live in scripts/gates/; the .clavain/gates/ registry declares which ops have wrappers so policy lint can flag any gate without a matching rule.

Signing audit records (v1.5)

Every gate wrapper signs its authorization row with Ed25519 after recording it, so the audit table is tamper-evident post-write. policy audit --verify checks every post-cutover row against the project pubkey and exits non-zero on any mismatch.

One-time bootstrap per project:

bash /path/to/Clavain/scripts/authz-init.sh

That script migrates the project's .clavain/intercore.db to the current schema, installs ~/.clavain/policy.yaml from the example if absent, generates .clavain/keys/authz-project.{key,pub} (mode 0400 / 0444) if absent, signs the cutover marker + any unsigned post-cutover rows, and runs policy audit --verify as a sanity check. Every step is idempotent; rerunning it is safe.

Day-to-day:

clavain-cli policy audit --verify            # walk + verify every row; exit 1 on any failure
clavain-cli policy verify --json             # same, emits per-row JSON report
clavain-cli policy rotate-key                # archive old keypair, generate fresh pair
clavain-cli policy quarantine --before-key=<fp> --reason="..."  # record key-compromise event

The private key never leaves .clavain/keys/authz-project.key — the gate wrappers shell out to clavain-cli policy sign which reads it only long enough to sign one batch of rows. The pubkey (.clavain/keys/authz-project.pub) is safe to commit so verifiers can check signatures without filesystem access to the signer.

Trust claim is tamper-evident-post-write, not tamper-proof: an attacker who can invoke the gate CLI with the key readable can forge signatures. Detection works against direct-SQL mutations, backup tampering, and history-rewrite attempts by anyone who cannot invoke the CLI. Full model: docs/canon/authz-signing-trust-model.md. Payload spec: docs/canon/authz-signing-payload.md.

Reviewing things with /flux-drive

/flux-drive, named after the Flux Review, is the most versatile standalone command. You can point it at a file, a plan, or an entire repo and it determines which reviewer agents are relevant for the given context. It selects from three categories of review agents:

  • Project Agents: Per-project fd-*.md agents that live in your repo and know your specific codebase (bootstrapped via Codex when interserve mode is active)
  • Plugin Agents: Built-in reviewer agents that auto-detect project docs: when CLAUDE.md/AGENTS.md exist, they provide codebase-aware analysis; otherwise they fall back to general best practices
  • Cross-AI (Oracle): model-diverse perspective on complex decisions

It only launches what's relevant. A simple markdown doc might get 2 agents; a full repo review might get 8. The agents run in parallel in the background, and you get a synthesized report with findings prioritized by severity. Over time, flux-drive builds a knowledge layer from review findings: patterns discovered in one review are injected as context into future reviews.

When Oracle is part of the review, flux-drive chains into the interpeer stack: comparing what Claude-based agents found against what the Oracle lane found, flagging disagreements, and optionally escalating critical decisions to a full multi-model council.

Cross-Agent review with /interpeer

Different models and agents genuinely see different things, and the disagreements between them are often more valuable than what either finds alone. Cross-agent review with /interpeer is especially valuable after a flux-drive run.

The /interpeer stack escalates in depth:

Mode What it does Speed
/interpeer Quick Claude↔Codex second opinion Seconds
/interpeer deep Oracle analysis with prompt optimization and human review Minutes
/interpeer council Full LLM Council: multi-model consensus Slow
/interpeer mine Post-processor: turns disagreements into tests and specs N/A

/interpeer defaults to quick mode: it auto-detects whether you're running in Claude Code or Codex CLI and calls the other one. For deeper analysis, deep mode builds optimized prompts for Oracle and shows you the enhanced prompt before sending. council mode runs a full multi-model review when the stakes are high: critical architecture or security decisions where you want genuine consensus, not just one model's opinion.

mine mode is particularly useful for complex, ambiguous contexts. It takes the disagreements between models and converts them into concrete artifacts: tests that would prove one side right, spec clarifications that would resolve ambiguity, and stakeholder questions that surface hidden assumptions.

Token efficiency with /interserve

Because Codex CLI has far higher usage limits than Claude Code, /interserve lets Claude orchestrate while Codex does the heavy lifting. Claude reads, plans, and writes detailed prompts: then dispatches to Codex agents for implementation. Claude crafts a megaprompt, dispatches it, reads the verdict from Codex, and decides if it's acceptable. Claude plays the tech lead, Codex plays the engineering team.

For multi-task work, /interserve parallelizes naturally. Five independent changes get five Codex agents dispatched simultaneously. Claude collects the results and commits.

Structured debate

/debate runs a structured 2-round argument between Claude and Codex before implementing a complex task. Each writes an independent position, then responds to the other's. If they fundamentally disagree on architecture or security, Oracle gets called in as a tiebreaker. The output is a synthesis with clear options for you to choose from.

Worth running before any architectural decision with genuine uncertainty. The debate itself costs less than building the wrong thing.

Scoped delegation with tokens (v2)

Auto-proceed authz v1.5 answers "is this op allowed right now?" by reading policy. v2 adds a second layer — opaque, signed, time-boxed tokens — that let a vetted agent grant scoped permission to another agent, or to a one-shot command, without loosening policy for anyone else. Tokens short-circuit the policy check when they match; policy still governs every token-less op.

When to use a token

  • Delegation. Claude has vetted a change and wants Codex to ship it. Issue a token scoped to the exact op + target, pass it to Codex.
  • Scoped one-shot grant. ic publish --patch for a single plugin after a bead landed — token lives for one command, no ambient permission.
  • Cross-session hand-off. Sprint closed in session A; session B needs to push without re-running the vetting flow.

Issue

clavain-cli policy token issue --op=<op> --target=<t> --for=<agent> --ttl=60m

Present — one-shot, preferred (no shell history leakage):

CLAVAIN_AUTHZ_TOKEN=$(clavain-cli policy token issue --op=ic-publish-patch --target=my-plugin --for=claude --ttl=60m) \
  ic publish --patch

The env var lives only for this one command. Do NOT export it.

Present — interactive, with eval-clear: if the token genuinely needs to persist across several commands, use:

CLAVAIN_AUTHZ_TOKEN=<string>
# ... do the work ...
eval $(clavain-cli policy token consume --token="$CLAVAIN_AUTHZ_TOKEN" --expect-op=... --expect-target=...)

Output is sentinel-wrapped: # authz-unset-begin\nunset CLAVAIN_AUTHZ_TOKEN\n# authz-unset-end. Verify the sentinels before eval-ing output from an untrusted binary.

Delegate

clavain-cli policy token delegate --from=<parent> --to=<child-agent> --ttl=<d>

Proof-of-possession required — CLAVAIN_AGENT_ID must equal the parent token's agent_id. Scope can never widen: --op and --target override flags are deliberately absent.

Revoke

clavain-cli policy token revoke --token=<id>             # revoke one
clavain-cli policy token revoke --cascade --token=<root> # revoke a root + all descendants

--cascade is refused on non-root tokens (see docs/canon/authz-token-model.md for rationale).

Audit

clavain-cli policy audit --tokens   # delegation tree per root

Every consume writes a v1.5-shaped authorizations row with vetting.via="token". The existing policy audit --verify continues to walk the signature chain; v2 doesn't change the signing model.

Full semantics: docs/canon/authz-token-model.md.

What's included

Skills

Skills are workflow disciplines: they guide how you work, not what tools to call. Each one is a markdown playbook that Claude follows step by step.

Skill What it does
Core Lifecycle
writing-plans Create implementation plans with bite-sized tasks
executing-plans Execute plans with review checkpoints
landing-a-change Trunk-based finish checklist
Code Discipline
refactor-safely Disciplined refactoring with duplication detection
Multi-Agent
subagent-driven-development Parallel subagent execution
dispatching-parallel-agents When and how to parallelize
code-review-discipline Request reviews and handle feedback with technical rigor
interserve Codex dispatch: megaprompt, parallel delegation, debate, Oracle escalation
Knowledge & Docs
engineering-docs Capture solved problems as searchable docs
file-todos File-based todo tracking across sessions
Setup
project-onboard One-command project setup: introspect, scaffold, seed content
Utilities
using-clavain Bootstrap routing: maps tasks to the right component
using-tmux-for-interactive-commands Interactive CLI tools in tmux
upstream-sync Track updates from upstream tool repos

Skills extracted to companion plugins: interpeer (cross-AI review: interpeer, prompterpeer, winterpeer, splinterpeer), intertest (quality disciplines: systematic-debugging, test-driven-development, verification-before-completion), interdev (meta-tooling: working-with-claude-code, developing-claude-code-plugins, create-agent-skills, writing-skills).

Agents

Agents are specialized execution units dispatched by skills and commands. They run as subagents with their own context window.

Review: specialized reviewers handle planning, migration, and code-quality tasks. Broader review and research swarms live in companion plugins such as interflux and intercraft.

Workflow: PR comment resolution and bug reproduction validation.

Commands

Slash commands are the user-facing entry points. Most of them load a skill underneath.

Command What it does
/sprint Full autonomous lifecycle: brainstorm through ship
/project-onboard Set up a new/existing project with full automation (beads, docs, observability)
/setup Bootstrap the modpack: install plugins, disable conflicts, verify servers
/brainstorm Explore before planning
/strategy Structure brainstorm into PRD with trackable beads
/write-plan Create implementation plan
/flux-drive Multi-agent document/repo review
/work Execute a plan autonomously
/review Multi-agent code review
/review-discipline Disciplined code review and feedback triage
/execute-plan Execute plan in batches with checkpoints
/plan-review Parallel plan review
/quality-gates Gate orchestrator — delegates review to flux-drive, enforces pass/fail
/interserve Run Codex-first execution flow for larger scope work
/fixbuild Fast build-error fix loop: run, parse, fix, re-run
/tdd Run RED-GREEN-REFACTOR for a task before coding
/smoke-test End-to-end smoke test: detect app, walk user journeys, report results
/repro-first-debugging Disciplined bug investigation
/debate Structured Claude↔Codex debate
/refactor Plan and execute safe refactors with risk controls
/interpeer Quick cross-AI peer review
/verify Run completion verification before declaring work done
/migration-safety Data migration risk assessment
/compound Document solved problems
/changelog Generate changelog from recent merges
/clodex-toggle Toggle Codex-first execution mode
/model-routing Toggle subagent model tier (economy vs quality)
/codex-bootstrap Refresh Codex discovery links and run health checks
/todos Manage file-based todo tracking
/land Run landing checklist for trunk-based handoff
/triage Categorize and prioritize findings
/resolve Resolve findings from any source (auto-detects TODOs, PR comments, or todo files)
/create-agent-skill Create new skills or agents
/generate-command Generate new commands
/heal-skill Fix broken skills
/pr-triage Triage open PR backlog with parallel review agents
/review-doc Quick single-pass document refinement (lighter than flux-drive)
/upstream-sync Check upstream repos for updates
/sprint-status Deep scan of sprint workflow state: sessions, pipeline, beads
/flux-gen Generate project-specific review agents from detected domain profiles
/help Show Clavain commands organized by daily drivers first
/doctor Quick health check: MCP servers, tools, beads, plugin conflicts

(All commands are prefixed with /clavain: when invoked.)

Hooks

  • SessionStart: Injects the using-clavain routing table into every session (start, resume, clear, compact). When interserve mode is active, injects the behavioral contract for Codex delegation (session-start.sh).
  • PreToolUse: Guards ~/.claude/plugins/cache/ from accidental edits (guard-plugin-cache.sh).
  • PostToolUse: Auto-publish on git push in plugin repos (auto-publish.sh). Bead-agent binding on Bash (bead-agent-bind.sh). Catalog reminder on file edits (catalog-reminder.sh). Plugin edit validation (validate-plugin-edit.sh).
  • Stop: Auto-stop actions: compound check, session handoff, uncommitted work detection (auto-stop-actions.sh).
  • SessionEnd: Syncs dotfile changes at end of session (dotfiles-sync.sh).

MCP servers (via companions)

MCP server capability comes from companion plugins in the rig:

  • context7: Library documentation lookup via Context7 (required companion)
  • qmd: Semantic search (lives in the interflux companion plugin)

The agent rig

Clavain is designed as an agent rig, inspired by PC game mod packs. It is an opinionated integration layer that configures companion plugins into a cohesive rig. Instead of duplicating their capabilities, Clavain routes to them and wires them together.

Required companions

Plugin Why
context7 Runtime doc fetching. Clavain's skills use it to pull library docs without bundling them.
explanatory-output-style Educational insights in output. Injected via SessionStart hook.

Recommended

Plugin What it adds
interpeer Cross-AI peer review: quick, deep (Oracle), council, mine
intertest Quality disciplines: TDD, systematic debugging, verification gates
interdev Developer tooling: Claude Code reference, skill/plugin authoring
interdoc AGENTS.md generation for any repo
interclode Codex CLI dispatch infrastructure: powers /interserve
agent-sdk-dev Agent SDK scaffolding
plugin-dev Plugin development tools
serena Semantic code analysis via LSP-like tools
tool-time Tool usage analytics across sessions

Disabled (Conflicts)

Clavain replaces these plugins with its own opinionated equivalents. Keeping both causes duplicate agents and confusing routing.

Plugin Clavain Replacement
superpowers Clavain is the successor — all skills, commands, and workflows superseded
compound-engineering Clavain is the successor — all workflows superseded
code-review /review + /flux-drive + 2 review agents
pr-review-toolkit Same agent types exist in Clavain's review roster
code-simplifier interflux:review:fd-quality agent
commit-commands landing-a-change skill
feature-dev /work + /sprint + /brainstorm
claude-md-management engineering-docs skill
frontend-design interform:distinctive-design skill
hookify Clavain manages hooks directly

Customization

Clavain is opinionated but not rigid. A few things worth knowing:

Reviewers are auto-selected. flux-drive picks from 7 core review agents based on the document profile. Each agent auto-detects language and project conventions. Additional specialists (plan-reviewer, data-migration-expert, and intercraft's agent-native-reviewer) are available for direct use via /review and /quality-gates.

Skills can be overridden. If you disagree with how test-driven-development works, you can create your own skill with the same name in a local plugin that loads after Clavain. Last-loaded wins.

Codex dispatch is optional. Everything works fine with Claude making changes directly. /interserve is there for when you want the orchestration pattern, not a requirement.

Oracle requires setup. The cross-AI features (/interpeer deep, /interpeer council, flux-drive Cross-AI) need Oracle installed and configured. Without it, those features are simply skipped: nothing breaks.

Architecture

skills/       # discipline skills (SKILL.md each)
agents/       # review and workflow agents
commands/     # slash commands
hooks/        # Claude Code hook registrations
config/       # dispatch routing
scripts/      # debate, codex dispatch, codex auto-refresh, upstream sync

Full directory tree and component conventions: see AGENTS.md.

How the routing works

The using-clavain skill is injected into every session via the SessionStart hook. It provides a 3-layer routing system:

  1. Stage: What phase are you in? (explore / plan / execute / debug / review / ship / meta)
  2. Domain: What kind of work? (code / data / deploy / docs / research / workflow)
  3. Concern: What review concern? (architecture / safety / correctness / quality / user-product / performance)

This routes to the right skill, agent, or command for each task. You don't need to memorize the full list: the routing table is always in context.

Troubleshooting

For full plugin and marketplace documentation, see the official Claude Code plugin guide.

Plugin install fails with "Source path does not exist"

✘ Failed to install plugin "context7@claude-plugins-official": Source path does not exist: /Users/...

The local marketplace clone is stale or corrupted. The official claude-plugins-official marketplace is auto-provisioned by Claude Code — remove the cached copy and restart:

rm -rf ~/.claude/plugins/marketplaces/claude-plugins-official
claude   # restart — Claude Code re-provisions the official marketplace automatically

Or refresh from within Claude Code:

/plugin marketplace update claude-plugins-official

Error path shows a different user's home directory

If the error references /Users/someone-else/ instead of your home directory, the marketplace cache was created by a different user account on the same machine. Same fix — remove and restart:

rm -rf ~/.claude/plugins/marketplaces/claude-plugins-official

Marketplace commands reference

# Add a marketplace
/plugin marketplace add owner/repo

# List all marketplaces
/plugin marketplace list

# Refresh a marketplace
/plugin marketplace update marketplace-name

# Install a plugin
/plugin install plugin-name@marketplace-name

# Check for errors
/plugin   # then go to the Errors tab

interagency-marketplace not found

If Clavain's companion plugins fail to install, add the marketplace manually:

/plugin marketplace add mistakeknot/interagency-marketplace

Credits

Named after one of the protagonists from Alastair Reynolds's Revelation Space series. Built on the work of:

License

MIT

About

General-purpose engineering discipline plugin for Claude Code. 17 skills, 6 agents, 51 commands.

Resources

License

Contributing

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors