SPECLOCK - AI CONSTRAINT ENGINE TOOLS

44 tools from the SpecLock - AI Constraint Engine MCP Server, categorised by risk level.

View the SpecLock - AI Constraint Engine policy →

READ TOOLS

10

WRITE TOOLS

29
speclock_add_decision Record an architectural or design decision. 2/5 speclock_add_lock Add a non-negotiable constraint (SpecLock). 2/5 speclock_add_note Add a pinned note for reference. 2/5 speclock_add_typed_lock Add typed constraint (numerical/range/state/temporal). 2/5 speclock_apply_template Apply a pre-built constraint template (nextjs, react, express, supabase, stripe, security-hardened). 2/5 speclock_audit Audit staged files against active locks. 2/5 speclock_auto_guard Auto-guard files related to lock keywords. 2/5 speclock_blast_radius Calculate blast radius — transitive dependents, impact %, depth. 2/5 speclock_checkpoint Create a named git tag checkpoint for easy rollback. 2/5 speclock_export_compliance Generate compliance reports (SOC 2, HIPAA, CSV). 2/5 speclock_guard_file Add SPECLOCK-GUARD header to lock specific files. 3/5 speclock_health Health check with completeness score and multi-agent timeline. 2/5 speclock_init Initialize SpecLock in the current project directory. 2/5 speclock_log_change Manually log a significant change. 2/5 speclock_map_locks Map active locks to actual code files via the dependency graph. 2/5 speclock_override_lock Override a lock with justification. Logged to audit trail. 2/5 speclock_policy_evaluate Evaluate policy-as-code rules against proposed actions. 2/5 speclock_policy_manage Policy CRUD: list, add, remove policy rules. 2/5 speclock_report Violation report — how many times SpecLock blocked changes. 2/5 speclock_review_patch ALLOW/WARN/BLOCK verdict — combines semantic conflict + lock-file mapping + blast radius. 2/5 speclock_review_patch_diff Diff-native review — parses actual diffs for interface breaks, protected symbols, dependency drift, schema changes. 2/5 speclock_semantic_audit Semantic pre-commit: analyzes code changes vs locks. 2/5 speclock_session_summary End the current session and record what was accomplished. 2/5 speclock_set_deploy_facts Record deployment configuration facts. 2/5 speclock_set_enforcement Set enforcement mode: advisory (warn) or hard (block). 2/5 speclock_set_goal Set or update the project goal. 2/5 speclock_suggest_locks AI-powered lock suggestions based on project patterns. 2/5 speclock_telemetry Opt-in usage analytics summary. 2/5 speclock_update_threshold Update typed lock thresholds dynamically. 2/5

DESTRUCTIVE TOOLS

1

EXECUTE TOOLS

4
How many tools does the SpecLock - AI Constraint Engine MCP server have? +

The SpecLock - AI Constraint Engine MCP server exposes 44 tools across 4 categories: Read, Write, Destructive, Execute.

How do I enforce policies on SpecLock - AI Constraint Engine tools? +

Use Intercept, the open-source MCP proxy. Write YAML rules for each tool — rate limits, argument validation, or deny rules — then run Intercept in front of the SpecLock - AI Constraint Engine server.

What risk categories do SpecLock - AI Constraint Engine tools fall into? +

SpecLock - AI Constraint Engine tools are categorised as Read (10), Write (29), Destructive (1), Execute (4). Each category has a recommended default policy.

Enforce policies on SpecLock - AI Constraint Engine

Open source. One binary. Zero dependencies.

npx -y @policylayer/intercept
github.com/policylayer/intercept →
// GET IN TOUCH

Have a question or want to learn more? Send us a message.

Message sent.

We'll get back to you soon.