You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: CHANGELOG.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -63,7 +63,7 @@ and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0
63
63
64
64
- New `/clarify` command template to surface up to 5 targeted clarification questions for an existing spec and persist answers into a Clarifications section in the spec.
65
65
- New `/analyze` command template providing a non-destructive cross-artifact discrepancy and alignment report (spec, clarifications, plan, tasks, constitution) inserted after `/tasks` and before `/implement`.
66
-
- Note: Constitution rules are explicitly treated as non-negotiable; any conflict is a CRITICAL finding requiring artifact remediation, not weakening of principles.
66
+
- Note: Constitution rules are explicitly treated as non-negotiable; any conflict is a CRITICAL finding requiring artifact remediation, not weakening of principles.
Copy file name to clipboardExpand all lines: CONTRIBUTING.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,4 +1,4 @@
1
-
##Contributing to Spec Kit
1
+
# Contributing to Spec Kit
2
2
3
3
Hi there! We're thrilled that you'd like to contribute to Spec Kit. Contributions to this project are [released](https://help.github.com/articles/github-terms-of-service/#6-contributions-under-repository-license) to the public under the [project's open source license](LICENSE).
@@ -253,7 +253,7 @@ Additional commands for enhanced quality and validation:
253
253
254
254
Spec-Driven Development is a structured process that emphasizes:
255
255
256
-
-**Intent-driven development** where specifications define the "_what_" before the "_how_"
256
+
-**Intent-driven development** where specifications define the "*what*" before the "*how*"
257
257
-**Rich specification creation** using guardrails and organizational principles
258
258
-**Multi-step refinement** rather than one-shot code generation from prompts
259
259
-**Heavy reliance** on advanced AI model capabilities for specification interpretation
@@ -383,7 +383,7 @@ This step creates or updates the `.specify/memory/constitution.md` file with you
383
383
With your project principles established, you can now create the functional specifications. Use the `/speckit.specify` command and then provide the concrete requirements for the project you want to develop.
384
384
385
385
>[!IMPORTANT]
386
-
>Be as explicit as possible about _what_ you are trying to build and _why_. **Do not focus on the tech stack at this point**.
386
+
>Be as explicit as possible about *what* you are trying to build and *why*. **Do not focus on the tech stack at this point**.
Copy file name to clipboardExpand all lines: SECURITY.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
-
Thanks for helping make GitHub safe for everyone.
1
+
# Security Policy
2
2
3
-
# Security
3
+
Thanks for helping make GitHub safe for everyone.
4
4
5
5
GitHub takes the security of our software products and services seriously, including all of the open source code repositories managed through our GitHub organizations, such as [GitHub](https://github.com/GitHub).
6
6
@@ -16,13 +16,13 @@ Instead, please send an email to opensource-security[@]github.com.
16
16
17
17
Please include as much of the information listed below as you can to help us better understand and resolve the issue:
18
18
19
-
* The type of issue (e.g., buffer overflow, SQL injection, or cross-site scripting)
20
-
* Full paths of source file(s) related to the manifestation of the issue
21
-
* The location of the affected source code (tag/branch/commit or direct URL)
22
-
* Any special configuration required to reproduce the issue
23
-
* Step-by-step instructions to reproduce the issue
24
-
* Proof-of-concept or exploit code (if possible)
25
-
* Impact of the issue, including how an attacker might exploit the issue
19
+
- The type of issue (e.g., buffer overflow, SQL injection, or cross-site scripting)
20
+
- Full paths of source file(s) related to the manifestation of the issue
21
+
- The location of the affected source code (tag/branch/commit or direct URL)
22
+
- Any special configuration required to reproduce the issue
23
+
- Step-by-step instructions to reproduce the issue
24
+
- Proof-of-concept or exploit code (if possible)
25
+
- Impact of the issue, including how an attacker might exploit the issue
26
26
27
27
This information will help us triage your report more quickly.
Copy file name to clipboardExpand all lines: templates/commands/clarify.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -93,11 +93,11 @@ Execution steps:
93
93
- Each question must be answerable with EITHER:
94
94
- A short multiple‑choice selection (2–5 distinct, mutually exclusive options), OR
95
95
- A one-word / short‑phrase answer (explicitly constrain: "Answer in <=5 words").
96
-
- Only include questions whose answers materially impact architecture, data modeling, task decomposition, test design, UX behavior, operational readiness, or compliance validation.
97
-
- Ensure category coverage balance: attempt to cover the highest impact unresolved categories first; avoid asking two low-impact questions when a single high-impact area (e.g., security posture) is unresolved.
- Favor clarifications that reduce downstream rework risk or prevent misaligned acceptance tests.
100
-
- If more than 5 categories remain unresolved, select the top 5 by (Impact * Uncertainty) heuristic.
96
+
- Only include questions whose answers materially impact architecture, data modeling, task decomposition, test design, UX behavior, operational readiness, or compliance validation.
97
+
- Ensure category coverage balance: attempt to cover the highest impact unresolved categories first; avoid asking two low-impact questions when a single high-impact area (e.g., security posture) is unresolved.
- Favor clarifications that reduce downstream rework risk or prevent misaligned acceptance tests.
100
+
- If more than 5 categories remain unresolved, select the top 5 by (Impact * Uncertainty) heuristic.
101
101
102
102
4. Sequential questioning loop (interactive):
103
103
- Present EXACTLY ONE question at a time.
@@ -115,8 +115,8 @@ Execution steps:
115
115
|--------|-------------|
116
116
| A | <OptionAdescription> |
117
117
| B | <OptionBdescription> |
118
-
| C | <OptionCdescription> | (add D/E as needed up to 5)
119
-
| Short | Provide a different short answer (<=5 words) | (Include only if free-form alternative is appropriate)
118
+
| C | <OptionCdescription> (add D/E as needed up to 5)|
119
+
| Short | Provide a different short answer (<=5 words) (Include only if free-form alternative is appropriate)|
120
120
121
121
- After the table, add: `You can reply with the option letter (e.g., "A"), accept the recommendation by saying "yes" or "recommended", or provide your own short answer.`
122
122
- For short‑answer style (no meaningful discrete options):
0 commit comments