44 tools from the SpecLock - AI Constraint Engine MCP Server, categorised by risk level.
View the SpecLock - AI Constraint Engine policy →speclock_check_conflict Check if a proposed action conflicts with any active SpecLock. In hard mode, blocks above threshold. speclock_check_typed Check proposed values against typed constraints. speclock_detect_drift Scan recent changes for constraint violations. speclock_get_changes Get recent file changes tracked by SpecLock. speclock_get_context THE KEY TOOL. Returns the full structured context pack. speclock_get_events Get the event log, optionally filtered by type. speclock_list_typed_locks List all typed constraints with current thresholds. speclock_override_history Show lock override history. speclock_repo_status Get current git repository status. speclock_verify_audit Verify the integrity of the HMAC audit chain. speclock_add_decision Record an architectural or design decision. 2/5 speclock_add_lock Add a non-negotiable constraint (SpecLock). 2/5 speclock_add_note Add a pinned note for reference. 2/5 speclock_add_typed_lock Add typed constraint (numerical/range/state/temporal). 2/5 speclock_apply_template Apply a pre-built constraint template (nextjs, react, express, supabase, stripe, security-hardened). 2/5 speclock_audit Audit staged files against active locks. 2/5 speclock_auto_guard Auto-guard files related to lock keywords. 2/5 speclock_blast_radius Calculate blast radius — transitive dependents, impact %, depth. 2/5 speclock_checkpoint Create a named git tag checkpoint for easy rollback. 2/5 speclock_export_compliance Generate compliance reports (SOC 2, HIPAA, CSV). 2/5 speclock_guard_file Add SPECLOCK-GUARD header to lock specific files. 3/5 speclock_health Health check with completeness score and multi-agent timeline. 2/5 speclock_init Initialize SpecLock in the current project directory. 2/5 speclock_log_change Manually log a significant change. 2/5 speclock_map_locks Map active locks to actual code files via the dependency graph. 2/5 speclock_override_lock Override a lock with justification. Logged to audit trail. 2/5 speclock_policy_evaluate Evaluate policy-as-code rules against proposed actions. 2/5 speclock_policy_manage Policy CRUD: list, add, remove policy rules. 2/5 speclock_report Violation report — how many times SpecLock blocked changes. 2/5 speclock_review_patch ALLOW/WARN/BLOCK verdict — combines semantic conflict + lock-file mapping + blast radius. 2/5 speclock_review_patch_diff Diff-native review — parses actual diffs for interface breaks, protected symbols, dependency drift, schema changes. 2/5 speclock_semantic_audit Semantic pre-commit: analyzes code changes vs locks. 2/5 speclock_session_summary End the current session and record what was accomplished. 2/5 speclock_set_deploy_facts Record deployment configuration facts. 2/5 speclock_set_enforcement Set enforcement mode: advisory (warn) or hard (block). 2/5 speclock_set_goal Set or update the project goal. 2/5 speclock_suggest_locks AI-powered lock suggestions based on project patterns. 2/5 speclock_telemetry Opt-in usage analytics summary. 2/5 speclock_update_threshold Update typed lock thresholds dynamically. 2/5 speclock_build_graph Build/refresh code dependency graph from imports (JS/TS/Python). 3/5 speclock_compile_spec Compile natural language (PRDs, READMEs) into structured constraints via Gemini Flash. 3/5 speclock_parse_diff Parse unified diff into structured changes — imports, exports, symbols, routes, schema detection. 3/5 speclock_session_briefing Start a new session and get a full briefing. 3/5 The SpecLock - AI Constraint Engine MCP server exposes 44 tools across 4 categories: Read, Write, Destructive, Execute.
Use Intercept, the open-source MCP proxy. Write YAML rules for each tool — rate limits, argument validation, or deny rules — then run Intercept in front of the SpecLock - AI Constraint Engine server.
SpecLock - AI Constraint Engine tools are categorised as Read (10), Write (29), Destructive (1), Execute (4). Each category has a recommended default policy.
Open source. One binary. Zero dependencies.
npx -y @policylayer/intercept