npm package discovery and stats viewer.

Discover Tips

  • General search

    [free text search, go nuts!]

  • Package details

    pkg:[package-name]

  • User packages

    @[username]

Sponsor

Optimize Toolset

I’ve always been into building performant and accessible sites, but lately I’ve been taking it extremely seriously. So much so that I’ve been building a tool to help me optimize and monitor the sites that I build to make sure that I’m making an attempt to offer the best experience to those who visit them. If you’re into performant, accessible and SEO friendly sites, you might like it too! You can check it out at Optimize Toolset.

About

Hi, 👋, I’m Ryan Hefner  and I built this site for me, and you! The goal of this site was to provide an easy way for me to check the stats on my npm packages, both for prioritizing issues and updates, and to give me a little kick in the pants to keep up on stuff.

As I was building it, I realized that I was actually using the tool to build the tool, and figured I might as well put this out there and hopefully others will find it to be a fast and useful way to search and browse npm packages as I have.

If you’re interested in other things I’m working on, follow me on Twitter or check out the open source projects I’ve been publishing on GitHub.

I am also working on a Twitter bot for this site to tweet the most popular, newest, random packages from npm. Please follow that account now and it will start sending out packages soon–ish.

Open Software & Tools

This site wouldn’t be possible without the immense generosity and tireless efforts from the people who make contributions to the world and share their work via open source initiatives. Thank you 🙏

© 2026 – Pkg Stats / Ryan Hefner

dev-playbooks

v1.1.0

Published

AI-powered spec-driven development workflow

Readme

DevBooks

An agentic AI development workflow for Claude Code / Codex CLI

Turn large changes into a controlled, traceable, verifiable loop: Skills + quality gates + role isolation.

npm License: MIT

DevBooks Workflow


Why DevBooks?

AI coding assistants are powerful, but often unpredictable:

| Pain point | Outcome | |------|------| | AI self-declares "done" | Tests fail, edge cases are missed | | Writing tests and code in the same chat | Tests turn into “pass tests” instead of spec verification | | No verification gates | False completion silently ships | | Only works for greenfield (0→1) | Brownfield repos have no on-ramp | | Too few commands | Complex changes are not just "spec/apply/archive" |

DevBooks provides:

  • Evidence-based done: completion is defined by tests/build/evidence, not AI self-evaluation
  • Enforced role isolation: Test Owner and Coder must work in separate conversations
  • Multiple quality gates: green evidence checks, task completion, role boundary checks
  • 18 Skills: proposal, design, review, entropy metrics, and full workflow coverage

How It Works

Hard constraint: Test Owner and Coder must work in separate conversations. This is not a suggestion. Coder cannot modify tests/**. "Done" is defined by tests/build verification, not AI self-evaluation.


Quick Start

Supported AI tools

| Tool | Support Level | Config File | |------|---------------|-------------| | Claude Code | Full Skills | CLAUDE.md | | Codex CLI | Full Skills | AGENTS.md | | Qoder | Full Skills | AGENTS.md | | Cursor | Rules | .cursor/rules/ | | Windsurf | Rules | .windsurf/rules/ | | Gemini CLI | Rules | GEMINI.md | | Continue | Rules | .continue/rules/ | | GitHub Copilot | Instructions | .github/copilot-instructions.md |

Tip: Use natural language to invoke skills, e.g., "Run devbooks-proposal-author skill to create a proposal for adding OAuth2 authentication"

Install & init

Install via npm (recommended):

# global install
npm install -g dev-playbooks

# init inside your project
dev-playbooks init

One-off usage:

npx dev-playbooks@latest init

From source (contributors):

../scripts/install-skills.sh

Install targets

After initialization:

  • Claude Code: ~/.claude/skills/devbooks-*
  • Codex CLI: ~/.codex/skills/devbooks-*
  • Qoder: ~/.qoder/ (manual setup required)

Quick integration

DevBooks uses two directory roots:

| Directory | Purpose | Default | |------|------|--------| | <truth-root> | Current specs (read-only truth) | dev-playbooks/specs/ | | <change-root> | Change packages (workspace) | dev-playbooks/changes/ |

See docs/devbooks-setup-guide.md, or use the "Quick Start" prompt in that guide to let your assistant configure it automatically.


Day-to-Day Change Workflow

Use Router (recommended)

Run devbooks-router skill: <your request>

Router analyzes your request and outputs an execution plan (which skill to run next).

Direct skill invocation

Once you know the flow, call the Skills directly:

1) Proposal stage (no coding)

Run devbooks-proposal-author skill to create a proposal: Add OAuth2 user authentication

Artifacts: proposal.md (required), design.md, tasks.md

2) Apply stage (role isolation enforced)

You must use two separate conversations:

# Chat A - Test Owner
Run devbooks-test-owner skill for change add-oauth2

# Chat B - Coder
Run devbooks-coder skill for change add-oauth2
  • Test Owner: writes verification.md + tests, runs Red first
  • Coder: implements per tasks.md, makes gates Green (cannot modify tests)

3) Review stage

Run devbooks-code-review skill for change add-oauth2

4) Archive stage

Run devbooks-spec-gardener skill for change add-oauth2

Skills Reference

Proposal stage

| Skill | Description | |-------|-------------| | devbooks-router | Route to the right Skill | | devbooks-proposal-author | Create a change proposal | | devbooks-impact-analysis | Cross-module impact analysis | | devbooks-proposal-challenger | Challenge a proposal | | devbooks-proposal-judge | Adjudicate a proposal | | devbooks-design-doc | Create a design doc | | devbooks-spec-contract | Define specs & contracts | | devbooks-implementation-plan | Create an implementation plan |

Apply stage

| Skill | Description | |-------|-------------| | devbooks-test-owner | Test Owner role (separate chat required) | | devbooks-coder | Coder role (separate chat required) | | devbooks-design-backport | Backport discoveries to design |

Review stage

| Skill | Description | |-------|-------------| | devbooks-code-review | Code review (readability/consistency) | | devbooks-test-reviewer | Test quality and coverage review |

Archive stage

| Skill | Description | |-------|-------------| | devbooks-spec-gardener | Maintain/dedupe specs | | devbooks-delivery-workflow | End-to-end delivery workflow |

Standalone Skills

| Skill | Description | |-------|-------------| | devbooks-entropy-monitor | System entropy metrics | | devbooks-brownfield-bootstrap | Brownfield project bootstrap |


DevBooks Comparisons

vs. OpenSpec

OpenSpec is a lightweight spec-driven framework with three core commands (proposal/apply/archive), organizing changes by feature folders.

OpenSpec's limitations:

  • No role isolation, AI may self-verify "done"
  • No quality gates, false completion is hard to catch
  • Only 3 commands, insufficient coverage for complex changes

DevBooks solutions:

  • Enforced role isolation: Test Owner and Coder must work in separate conversations, preventing self-verification
  • 5+ quality gates: Green evidence checks, task completion rate, role boundary checks
  • 18 Skills: Full coverage from proposal to implementation to archive

vs. spec-kit

GitHub spec-kit is a spec-driven toolkit with a constitution file, multi-step refinement, and structured planning.

spec-kit's limitations:

  • Focused on greenfield (0→1) projects, limited brownfield support
  • No enforced role isolation, tests and implementation may get confused
  • Relies on manual checks, no runtime verification

DevBooks solutions:

  • Brownfield-first: devbooks-brownfield-bootstrap auto-generates baseline specs
  • Enforced role isolation: Test authoring and implementation are physically separated
  • Runtime gates: Automated verification, not dependent on manual checks

vs. Kiro.dev

Kiro is an AWS agentic IDE with a three-phase workflow (EARS requirements, design, tasks).

Kiro's limitations:

  • Specs and implementation artifacts stored separately, hard to trace
  • No enforced role isolation
  • Requires a specific IDE environment

DevBooks solutions:

  • Change packages: proposal/design/spec/plan/verification/evidence centralized, full traceability
  • Enforced role isolation: Hard boundary between Test Owner and Coder
  • Tool-agnostic: Supports Claude Code, Codex CLI, Cursor, and more

vs. no spec

Without specs, the assistant generates code from vague prompts, leading to unpredictable output, scope creep, and "hallucinated completion".

DevBooks brings:

  • Specs agreed before implementation, clear and controlled scope
  • Quality gates verify real completion
  • Role isolation prevents self-verification
  • Complete evidence chain per change

Core Principles

| Principle | Meaning | |------|------| | Protocol first | truth/change/archive live in the repo, not only in chat logs | | Anchor first | done is defined by tests/static checks/build/evidence | | Role isolation | Test Owner and Coder must work in separate conversations | | Truth root separation | <truth-root> is read-only truth; <change-root> is the workspace | | Structural gates | prioritize complexity/coupling/test quality, not proxy metrics |


Advanced Features

DevBooks uses quality gates to block “false done”:

| Gate | Trigger mode | What it checks | |------|----------|----------| | Green evidence | archive, strict | evidence/green-final/ exists and is non-empty | | Task completion | strict | all tasks are done or SKIP-APPROVED | | Test failure block | archive, strict | no failures in green evidence | | P0 skip approval | strict | P0 skips require an approval record | | Role boundary | apply --role | Coder cannot modify tests/, Test Owner cannot modify src/ |

Core scripts (in ../skills/devbooks-delivery-workflow/scripts/):

  • change-check.sh --mode proposal|apply|archive|strict
  • handoff-check.sh - handoff boundary checks
  • audit-scope.sh - full audit scan
  • progress-dashboard.sh - progress visualization

When the technical approach is uncertain:

  1. Create a prototype: change-scaffold.sh <change-id> --prototype
  2. Test Owner with --prototype: characterization tests (no Red baseline required)
  3. Coder with --prototype: output to prototype/src/ (isolates main src)
  4. Promote or discard: prototype-promote.sh <change-id>

Prototype mode prevents experimental code from polluting the main tree.

Scripts live in ../skills/devbooks-delivery-workflow/scripts/.

DevBooks tracks four dimensions of system entropy:

| Metric | What it measures | |------|----------| | Structural entropy | module complexity and coupling | | Change entropy | change patterns and volatility | | Test entropy | coverage/quality decay over time | | Dependency entropy | external dependency health |

Use devbooks-entropy-monitor skill to generate reports and identify refactor opportunities.

Scripts (in ../skills/devbooks-entropy-monitor/scripts/): entropy-measure.sh, entropy-report.sh

When <truth-root> is empty:

Run devbooks-brownfield-bootstrap skill

Generates:

  • project profile and glossary
  • baseline specs from existing code
  • minimal verification anchors
  • module dependency map
  • technical debt hotspots

DevBooks Skills support graceful MCP (Model Context Protocol) degradation: you can run the full workflow without MCP/CKB; when CKB (Code Knowledge Base) is detected, DevBooks automatically enables graph-based capabilities for more accurate “scope/reference/call chain” analysis.

What is it for?

  • More accurate impact analysis: upgrades from “file-level guesses” to “symbol references + call graphs”
  • More focused reviews: automatically pulls hotspots and prioritizes high-risk areas (tech debt/high churn)
  • Less manual grep: reduces noise and repeated confirmation in large repos

MCP status and behavior

| MCP status | Behavior | |----------|------| | CKB available | Enhanced mode: symbol-level impact/references/call graph/hotspots (mcp__ckb__analyzeImpact, mcp__ckb__findReferences, mcp__ckb__getCallGraph, mcp__ckb__getHotspots) | | CKB unavailable | Basic mode: Grep + Glob text search (full functionality, lower precision) |

Auto detection

  • Skills that depend on MCP call mcp__ckb__getStatus first (2s timeout)
  • Timeout/failure → silently falls back to basic mode (non-blocking)
  • No manual “basic/enhanced” switch required

To enable enhanced mode: configure CKB per docs/Recommended-MCP.md and manually generate index.scip.

For strict proposal review, use separate conversations for Challenger and Judge:

Three roles (must work in separate conversations):

  1. Author: creates and defends the proposal (use devbooks-proposal-author)
  2. Challenger: challenges assumptions, finds gaps, identifies risks (use devbooks-proposal-challenger)
  3. Judge: makes the final decision and records rationale (use devbooks-proposal-judge)

Important: The three roles must work in separate conversations to avoid role confusion and self-verification.

Decision: Approved, Revise, Rejected


Migration from Other Frameworks

DevBooks provides migration scripts to help you transition from other spec-driven development tools.

Migrate from OpenSpec

If you're currently using OpenSpec with an openspec/ directory:

# Using CLI (recommended)
dev-playbooks migrate --from openspec

# Preview changes first
dev-playbooks migrate --from openspec --dry-run

# Keep original directory after migration
dev-playbooks migrate --from openspec --keep-old

What gets migrated:

  • openspec/specs/dev-playbooks/specs/
  • openspec/changes/dev-playbooks/changes/
  • openspec/project.mddev-playbooks/project.md
  • All path references are automatically updated
  • AI tool command directories are cleaned up (.claude/commands/openspec/, etc.)

Migrate from GitHub spec-kit

If you're using GitHub spec-kit with specs/ and memory/ directories:

# Using CLI (recommended)
dev-playbooks migrate --from speckit

# Preview changes first
dev-playbooks migrate --from speckit --dry-run

# Keep original directories after migration
dev-playbooks migrate --from speckit --keep-old

Mapping rules:

| Spec-Kit | DevBooks | |----------|----------| | memory/constitution.md | dev-playbooks/specs/_meta/constitution.md | | specs/[feature]/spec.md | changes/[feature]/design.md | | specs/[feature]/plan.md | changes/[feature]/proposal.md | | specs/[feature]/tasks.md | changes/[feature]/tasks.md | | specs/[feature]/quickstart.md | changes/[feature]/verification.md | | specs/[feature]/contracts/ | changes/[feature]/specs/ |

Migration Features

Both migration scripts support:

  • Idempotent execution: Safe to run multiple times
  • Checkpoints: Resume from where you left off if interrupted
  • Dry-run mode: Preview changes before applying
  • Automatic backup: Original files are backed up to .devbooks/backup/
  • Reference updates: Path references in documents are automatically updated

Post-Migration Steps

After migration:

  1. Run dev-playbooks init to set up DevBooks Skills
  2. Review migrated files in dev-playbooks/
  3. Update verification.md files with proper AC mappings
  4. Run devbooks-brownfield-bootstrap skill if you need baseline specs

Directory Structure

dev-playbooks/
├── README.md              # This document
├── constitution.md        # Project constitution (GIP principles)
├── project.md             # Project context (tech stack/conventions)
├── specs/                 # Current specs (read-only truth)
│   ├── _meta/             # Metadata (glossary, project profile)
│   └── architecture/      # Architecture specs (fitness-rules)
├── changes/               # Change packages (workspace)
├── scripts/               # Helper scripts
└── docs/                  # Documentation
    ├── devbooks-setup-guide.md   # Configuration guide
    ├── workflow-diagram.svg      # Workflow visualization
    └── Recommended-MCP.md        # MCP configuration

Documentation


License

MIT