Quickstart
Initialize a Workspace
cd your-project
scafld initinit creates .scafld/, installs the managed core bundle under
.scafld/core/, and creates project-owned prompt files under
.scafld/prompts/.
For a new repository, generate a grounded config proposal before the first serious spec:
scafld configReview .scafld/config.proposed.yaml, follow its agent_instructions, and
copy only verified runtime policy into .scafld/config.yaml. Put agent-facing
guidance in AGENTS.md, CLAUDE.md, .claude/rules, or project prompts
instead of inventing config fields.
Create a Draft Spec
scafld plan add-auth --title "Add JWT authentication" --size medium --risk high --command "npm test"This writes .scafld/specs/drafts/add-auth.md. Open the file and tighten the
human-readable contract: objective, scope, context, phase changes, and
acceptance criteria.
Harden Before Approval
scafld harden add-authThe command enters HARDEN MODE and records a hardening round in the spec. Use the printed prompt to attack the plan before execution:
- what the product goal really is
- what artifact is authoritative when facts overlap
- which files and modules are in or out of bounds
- what can fail halfway and how a human recovers
- what invariants and golden examples prove the shape
When the answers are worked into the spec:
scafld harden add-auth --mark-passedHardening is not ceremony. It is the step that keeps the agent from discovering the definition of done while already changing code.
Approve and Build
scafld validate add-auth
scafld approve add-auth
scafld build add-authbuild activates approved work, runs acceptance criteria, writes evidence to
the session ledger, and projects the current state back into the spec.
Run Adversarial Review
Use an external challenger for real work:
scafld review add-auth --provider codex
scafld review add-auth --provider claude
scafld review add-auth --provider command --provider-command "./reviewer"
scafld review add-auth --print-contextWith no provider flag, scafld uses --provider auto and selects an installed
external challenger. If none is installed, review fails closed. Use
--provider local only for development smoke tests; local verdicts cannot
satisfy complete.
--print-context shows the exact deterministic brief before you spend a review
run.
Complete
scafld complete add-authcomplete archives only work with a passing codex, claude, command, or
audited human review in the session. If review returns a blocking finding,
repair the work, rerun build as needed, then rerun review.
Inspect State
scafld status add-auth
scafld list
scafld reportThe lifecycle stays deliberately small:
draft -> harden -> approved -> active -> review -> completedNext Steps
- Lifecycle -- states and transitions
- Spec Schema -- Markdown spec grammar
- CLI Reference -- command and flag surface
- Review -- adversarial review gate
