Docs.
Start here
Section titled “Start here”Pick the entry that matches what you’re trying to do.
Choose an audit path, install the skills, run the first audit, and review the generated artifacts.
first audit→ReadFull specification29 clauses across 7 pillars. The normative document: every MUST, MUST when applicable, SHOULD, and MAY.
spec rev v0.1.2→AuditNo-install promptDrop a no-install audit prompt into a tool-using agent and produce stamped artifacts.
prompt path→ReferenceLevels overview5 levels, L0-L4. Each level adds one gate on top of the previous.
level ladder→At a glance
Section titled “At a glance”The spec is small on purpose. One page of normative text, one ladder of conformance levels, one canonical loop for verifying conformance.
Docs by section
Section titled “Docs by section”The sidebar, breadcrumbs, pagination, source links, search index, and
this overview all derive from docs.config.json.
| Section | Pages | Entries |
|---|---|---|
| Start | 3 | Overview · Quickstart · Adoption guide |
| Specification | 6 | Full specification · Pillars overview · Levels overview · Coverage map · Rule catalog · Threat model template |
| Audit | 4 | How the audit works · The profile · No-install prompt · A stamped audit |
| Skills | 3 | ai-contributor-audit-profile · ai-contributor-audit · ai-contributor-audit-fix |
| Project | 7 | Release Changelog · Contributing · Authors · Tooling · Security policy · Glossary · Published pages |
The seven pillars
Section titled “The seven pillars”Each pillar groups clauses that share a concern. Names, ranges, icons, and descriptions come from the rule catalog projection.
Engineering Foundation
The reproducible environment, static correctness, architecture boundaries, and pre-commit / CI gates that make any change reviewable.
Security
Secrets handling, dependency and CI/CD security, authorization boundaries, and threat modeling.
Quality & Reliability
Runtime validation, testing strategy, accessibility, failure handling and observability, and performance and reliability.
Release
Supply-chain transparency, branch protection, and release governance.
AI Agents
How AI agents, shared skills, MCP servers, and delegated agents are governed in the repository.
AI Risk
AI-specific risks (prompt injection, untrusted input, capability scoping, allowlists, cost ceilings) and data protection for AI workflows.
Oversight
Human approval, guardrail evidence, policy ownership, AI licensing and attribution, AI credential lifecycle, model/provider changes, and AI incident response.
Conformance levels
Section titled “Conformance levels”The level ladder describes how much of the workflow an AI tool participates in. Each level is cumulative.
Full normative requirements per level are on the Levels overview page.
How to read these docs
Section titled “How to read these docs”Use the Quickstart if you want to run an audit now. Use the Adoption guide if you are changing a repository. Use the Rule catalog if you are building tooling. Use Published pages to inspect what this site publishes and where each page comes from.
Versioning and stability
Section titled “Versioning and stability”The site renders the pinned specification revision. Audit artifacts pin the spec revision they were stamped against, and the validator cross-checks that stamp. See Releases for the version timeline.
Contributing
Section titled “Contributing”Issues, pull requests, and audits of real repositories are welcome. Start with Contributing and the Security policy.