Skip to content

Integration Guide: require-kit and guardkit

Version: 1.0.0 Last Updated: 2025-11-03 Status: Production

Prerequisites

  • Python 3.10 or later (required by both require-kit and guardkit)
  • pip (Python package installer)
  • git (for repository cloning)
  • bash shell (macOS, Linux, or Windows WSL2)

Both packages require Python 3.10+ for ecosystem consistency. This ensures compatibility with modern Python features (PEP 604 union types) and alignment with AI/ML tooling standards.

Table of Contents


Clarification Philosophy

RequireKit asks clarifying questions to improve requirement specifications, not to make implementation decisions. This is a key distinction from implementation-focused systems.

When RequireKit Asks Questions

Command Has Clarification Purpose
/gather-requirements Yes (3-phase) Comprehensive requirements discovery
/epic-create Yes Scope, success criteria, stakeholders
/feature-create Yes Scope, acceptance criteria, dependencies
/formalize-ears Yes EARS pattern selection, completeness
/generate-bdd No Deterministic transformation
/epic-generate-features No Systematic analysis
/feature-generate-tasks No Rule-based generation

Question Types by Domain

RequireKit Questions (Technology-Agnostic): - "What is explicitly OUT OF SCOPE?" - "What measurable outcomes define success?" - "Which requirements does this implement?" - "What are the testable acceptance criteria?" - "Is this triggered by an event or always active?"

NOT RequireKit Questions (Technology-Specific): - "JWT or server-side sessions?" → GuardKit/Implementation - "Redux, Zustand, or Context API?" → GuardKit/Implementation - "REST or GraphQL?" → GuardKit/Implementation - "PostgreSQL or MongoDB?" → GuardKit/Implementation

Why This Matters

RequireKit outputs must be technology-agnostic so they can: 1. Work with any implementation system 2. Be consumed by GuardKit or other task execution systems 3. Remain valid regardless of technology choices 4. Be understood by non-technical stakeholders

Clarification at Specification vs Implementation

                    SPECIFICATION                     IMPLEMENTATION
                    (RequireKit)                      (GuardKit/Other)
                         │                                  │
    ┌────────────────────┼──────────────────────────────────┼─────────────────┐
    │                    │                                  │                 │
    │  "What problem?"   │  "What capability?"   "How to build?"  "What tech?" │
    │  "Who uses it?"    │  "What acceptance?"   "What pattern?"  "What lib?"  │
    │  "Why needed?"     │  "What success?"      "What arch?"     "What DB?"   │
    │                    │                                  │                 │
    └────────────────────┼──────────────────────────────────┼─────────────────┘
                         │                                  │
                    TECHNOLOGY-AGNOSTIC              TECHNOLOGY-SPECIFIC

Integration with GuardKit

When using RequireKit with GuardKit:

  1. RequireKit handles specification clarification:
  2. Epic scope and success criteria
  3. Feature acceptance criteria
  4. EARS pattern selection
  5. BDD scenario completeness

  6. GuardKit handles implementation clarification:

  7. Technology choices
  8. Architecture patterns
  9. Error handling approaches
  10. Performance trade-offs

This separation ensures: - No duplicate questions - Clear responsibility boundaries - Optimal user experience - Technology decisions deferred to implementation time

Skipping Clarification

All RequireKit clarifications are optional. Users can: - Use --quick flag to skip questions - Provide parameters directly in the command - Let AI auto-detect patterns (with --auto flag)

Examples:

# With clarification (interactive)
/epic-create "User Management"

# Without clarification (direct)
/epic-create "User Management" priority:high quarter:Q1-2024 --quick

# EARS with explicit pattern (skip pattern questions)
/formalize-ears "Users login" --pattern event-driven

# EARS auto-detect (skip clarification)
/formalize-ears "Users login" --auto


Overview

What is require-kit?

require-kit is a standalone requirements management toolkit that helps teams capture, formalize, and organize software requirements using industry-proven methodologies:

  • EARS Notation: Clear, unambiguous requirements specification
  • BDD/Gherkin Scenarios: Testable acceptance criteria
  • Epic/Feature Hierarchy: Structured project organization
  • Technology Agnostic: Works with any implementation system or PM tool

Use require-kit when you need: - Clear requirements documentation - Requirements traceability - BDD scenario generation - PM tool export capabilities - Requirements-driven development process

What is guardkit?

guardkit is a standalone task execution workflow system that provides structured implementation, testing, and quality gates:

  • Task Execution: TDD-driven implementation workflow
  • Quality Gates: Automated testing, coverage, and code review
  • Architectural Review: Pattern compliance and design validation
  • Test Orchestration: Comprehensive test execution and reporting

Use guardkit when you need: - Structured implementation workflow - Automated quality gates - Test-driven development - Code review and architectural compliance - Rapid task execution

When to Use Which?

Decision Tree:
├── Do you need requirements documentation?
│   ├── Yes → Start with require-kit
│   └── No → Consider guardkit only
├── Do you need task execution workflow?
│   ├── Yes → Use guardkit
│   └── No → require-kit only is sufficient
└── Do you need full requirements-to-implementation traceability?
    ├── Yes → Use both (full integration)
    └── No → Use standalone package(s)

Bidirectional Optional Integration

Both packages are fully functional independently with no hard dependencies:

  • require-kit: Works standalone, optionally enhanced by guardkit
  • guardkit: Works standalone, optionally enhanced by require-kit
  • Integration: Automatic detection via marker files when both installed
  • No Lock-In: Install or remove either package without affecting the other

This architecture provides maximum flexibility for teams to adopt the workflow that fits their needs.


Feature Planning vs Task Generation

RequireKit and GuardKit provide complementary commands for different stages of feature development. Understanding when to use each command prevents confusion and ensures optimal workflow.

When to Use /feature-plan (guardkit)

The /feature-plan command is for planning and evaluation of new features:

  • Planning new features from scratch with natural language descriptions
  • Evaluating technical approaches and trade-offs before commitment
  • Quick feature exploration to understand complexity and effort
  • Getting effort estimates before starting implementation
  • Making architectural decisions (e.g., "Should we use WebSockets or SSE?")

Input: Natural language description (e.g., "implement dark mode")

Output: Technical analysis, decision checkpoint (A/R/I/C), optional subtask generation

Example:

/feature-plan "add real-time notifications with WebSocket support"
# Analyzes technical options, estimates effort, presents decision checkpoint

When to Use /feature-generate-tasks (require-kit)

The /feature-generate-tasks command is for transforming structured specifications into tasks:

  • You have a structured feature specification (FEAT-XXX) with requirements
  • You need tasks exported to PM tools (Jira, Linear, GitHub, Azure DevOps)
  • You need hierarchical task IDs for tracking (TASK-001.2.01 format)
  • You want tasks derived from EARS requirements and BDD scenarios
  • You need traceability from requirements to implementation tasks

Input: Feature ID with linked requirements and BDD scenarios (e.g., FEAT-001)

Output: Multiple task markdown files ready for PM tool export

Example:

/feature-generate-tasks FEAT-001
# Generates TASK-001.1.01, TASK-001.1.02, etc. with full traceability

Typical Combined Workflow

When using both packages together, the commands complement each other at different stages:

# Stage 1: Quick Planning (guardkit)
/feature-plan "implement user authentication"
# → Technical analysis, approach decision, effort estimate

# Stage 2: Formal Requirements (require-kit) - if needed
/gather-requirements
/formalize-ears
# → docs/requirements/REQ-001.md (EARS notation)

# Stage 3: Feature Specification (require-kit)
/feature-create "User Authentication" epic:EPIC-001
# → docs/features/FEAT-001.md (structured spec)

# Stage 4: BDD Scenarios (require-kit)
/generate-bdd FEAT-001
# → docs/bdd/BDD-001.feature (Gherkin scenarios)

# Stage 5: Task Generation (require-kit)
/feature-generate-tasks FEAT-001
# → tasks/backlog/TASK-001.1.01.md, TASK-001.1.02.md, etc.
# → PM tool export ready

# Stage 6: Implementation (guardkit)
/task-work TASK-001.1.01
# → Implementation with quality gates

Comparison Matrix

Aspect /feature-plan /feature-generate-tasks
Purpose Planning & evaluation Task generation
Input Natural language description Structured feature spec (FEAT-XXX)
Output Analysis + decision checkpoint Exportable task files
PM Tool Export No Yes (Jira, Linear, GitHub, Azure DevOps)
Traceability No Yes (REQ → Feature → Task)
Hierarchical IDs No Yes (TASK-001.2.01 format)
Requirements Linking No Yes (links to REQ-XXX, BDD-XXX)
Best For Early planning, approach decisions Structured task breakdown

Decision Tree

Do you have a structured feature specification (FEAT-XXX)?
├── Yes → Use /feature-generate-tasks FEAT-XXX
│         (Generates PM-exportable tasks with traceability)
└── No → Do you need to evaluate approaches first?
         ├── Yes → Use /feature-plan "description"
         │         (Technical analysis, effort estimation)
         └── No → Do you need formal requirements?
                  ├── Yes → Start with /gather-requirements
                  │         (Then /feature-create, then /feature-generate-tasks)
                  └── No → Use /task-create directly (guardkit)
                           (Skip to implementation)

Key Insight

These commands are NOT redundant - they serve different workflow stages:

  • /feature-plan answers: "What approach should we take? How complex will this be?"
  • /feature-generate-tasks answers: "What specific tasks are needed? How do they link to requirements?"

Use /feature-plan for exploration and decisions, then /feature-generate-tasks when you have structured specifications ready for implementation.


Integration Architecture

Marker File Detection

Both packages detect each other automatically using marker files in ~/.agentecflow/:

~/.agentecflow/
├── require-kit.marker          # Created when require-kit installed
├── guardkit.marker           # Created when guardkit installed
├── bin/                        # Shared command executables
└── lib/                        # Shared library code

How it works:

  1. Installation: Each package creates its marker file during installation
  2. Detection: Commands check for marker files at runtime
  3. Feature Enhancement: When both markers exist, integration features activate
  4. Graceful Degradation: Missing marker = standalone mode, no errors

Check your installation:

# List installed packages
ls ~/.agentecflow/*.marker

# Expected outputs:
# require-kit only:  require-kit.marker
# guardkit only:   guardkit.marker
# Both integrated:   require-kit.marker + guardkit.marker

Dependency Inversion Principle

The integration follows the Dependency Inversion Principle (DIP) to avoid circular dependencies:

High-Level Module: require-kit
    ├── Requirements Gathering
    ├── EARS Formalization
    ├── BDD Scenario Generation
    ├── Task Specification Generation
    └── Outputs → PM Tools, guardkit (when installed)

Low-Level Module: guardkit
    ├── Task Execution
    ├── Quality Gates
    ├── Test Orchestration
    └── Inputs ← Task Specifications (from require-kit or PM tools)

Key Principle: guardkit does NOT look "up" to require-kit. The data flows one direction:

  1. require-kit generates requirements, BDD scenarios, and task specifications
  2. guardkit executes tasks using specifications from any source
  3. No circular dependency: guardkit never calls require-kit commands

Why BDD Mode was Removed from guardkit

Historical Context: Early versions of guardkit included a "BDD mode" that would call require-kit commands to generate feature files during task execution.

Problem: This violated DIP by making the lower-level module (guardkit) depend on the higher-level module (require-kit):

VIOLATION (Old Design):
guardkit → calls → require-kit commands
(lower)               (higher)

Solution: BDD mode was removed. The correct flow is:

CORRECT (Current Design):
require-kit → generates → BDD scenarios → consumed by → guardkit tests
(higher)                  (artifact)                     (lower)

For Users: If you need BDD-driven workflows:

  1. Use /generate-bdd in require-kit to create scenarios
  2. Export scenarios to your test framework
  3. Execute tests with /task-work in guardkit
  4. guardkit uses the BDD scenarios as acceptance criteria (data flow, not code dependency)

Unidirectional Data Flow

┌─────────────────────────────────────────────────────────┐
│ require-kit (Requirements Management)                   │
│ ┌─────────────┐   ┌──────────────┐   ┌──────────────┐ │
│ │Requirements │──→│ BDD Scenarios│──→│Task Specs    │ │
│ └─────────────┘   └──────────────┘   └──────────────┘ │
└────────────────────────────┬────────────────────────────┘
                             │ (data artifacts)
┌─────────────────────────────────────────────────────────┐
│ guardkit (Task Execution)                             │
│ ┌─────────────┐   ┌──────────────┐   ┌──────────────┐ │
│ │Task Work    │──→│ Quality Gates│──→│Completion    │ │
│ └─────────────┘   └──────────────┘   └──────────────┘ │
└─────────────────────────────────────────────────────────┘

Alternative Sources:
┌─────────────────┐
│ PM Tools        │──→ Task Specs ──→ guardkit
│ (Jira, Linear) │
└─────────────────┘

Installation Scenarios

Scenario 1: require-kit Only

Use Case: Requirements team without implementation workflow, or teams using external PM tools for task execution.

Installation:

git clone https://github.com/requirekit/require-kit.git
cd require-kit
./installer/scripts/install.sh

Verification:

ls ~/.agentecflow/require-kit.marker
# Should exist

/gather-requirements --version
# Should show require-kit version

Available Commands:

# Requirements Management
/gather-requirements          # Interactive Q&A
/formalize-ears              # Convert to EARS notation
/generate-bdd                # Generate Gherkin scenarios

# Epic/Feature Management
/epic-create "Title"
/feature-create "Title" epic:EPIC-XXX
/hierarchy-view EPIC-XXX

# Export (Specification Only - requires custom implementation)
# /feature-sync FEAT-XXX --jira      # See docs/integration/pm-tools.md
# /feature-sync FEAT-XXX --linear    # Metadata ready, API not implemented

Output Artifacts:

  • docs/requirements/REQ-XXX.md - EARS requirements
  • docs/bdd/BDD-XXX.feature - Gherkin scenarios
  • docs/epics/EPIC-XXX.md - Epic specifications
  • docs/features/FEAT-XXX.md - Feature specifications (with PM-ready metadata)

What's NOT Available:

  • Task execution workflow (/task-work command)
  • Automated quality gates
  • Test orchestration
  • Code review automation

Scenario 2: guardkit Only

Use Case: Lean startup, rapid iteration, teams without formal requirements process.

Installation:

git clone https://github.com/guardkit/guardkit.git
cd guardkit
./installer/scripts/install.sh

Verification:

ls ~/.agentecflow/guardkit.marker
# Should exist

/task-work --version
# Should show guardkit version

Available Commands:

# Task Management
/task-create "Title"
/task-work TASK-XXX
/task-work TASK-XXX --micro          # Micro-task workflow
/task-complete TASK-XXX

# Task States
/task-status                         # Show all tasks
/task-status TASK-XXX               # Show specific task
/task-block TASK-XXX "reason"       # Block task
/task-unblock TASK-XXX              # Unblock task

Output Artifacts:

  • tasks/backlog/TASK-XXX.md - Task files
  • tasks/in_progress/TASK-XXX.md - Active tasks
  • tasks/completed/TASK-XXX.md - Completed tasks
  • Test results and coverage reports
  • Code review reports

What's NOT Available:

  • EARS requirements formalization
  • BDD scenario generation
  • Epic/feature hierarchy
  • Requirements traceability
  • PM tool export

Scenario 3: Full Integration

Use Case: Enterprise teams needing complete requirements-to-implementation traceability.

Installation (Either Order):

# Option A: Install require-kit first
git clone https://github.com/requirekit/require-kit.git
cd require-kit
./installer/scripts/install.sh

cd ..
git clone https://github.com/guardkit/guardkit.git
cd guardkit
./installer/scripts/install.sh

# Option B: Install guardkit first (same result)

Verification:

ls ~/.agentecflow/*.marker
# Should show: require-kit.marker + guardkit.marker

/gather-requirements --version
/task-work --version
# Both should respond

Available Commands: ALL commands from both packages

Enhanced Features:

  • /task-work loads requirements context from require-kit
  • /feature-generate-tasks automatically creates executable tasks
  • Full traceability: REQ → BDD → FEAT → TASK → Code
  • Quality gates verify against BDD acceptance criteria

Output Artifacts: All artifacts from both packages, fully linked


Feature Availability Matrix

Feature require-kit Only guardkit Only Both Integrated
Requirements Management
EARS Requirements ✅ Full ✅ Full
Requirements Gathering ✅ Interactive ✅ Interactive
Requirements Traceability ✅ Full ✅ Enhanced
BDD/Testing
BDD Scenario Generation ✅ Gherkin ✅ Gherkin
BDD-Driven Testing ⚠️ Manual ⚠️ Manual ✅ Automated
Test Execution ✅ Full ✅ Full
Test Coverage ✅ ≥80% ✅ ≥80%
Project Organization
Epic Management ✅ Full ✅ Full
Feature Management ✅ Full ✅ Full
Task Management ⚠️ Specs Only ✅ Full ✅ Enhanced
Hierarchy View ✅ Epic→Feature ⚠️ Task Only ✅ Epic→Feature→Task
Task Execution
Task Workflow ✅ Full ✅ Full
TDD Mode
Micro-Task Mode
Quality Gates ✅ Full ✅ Enhanced
Code Quality
Architectural Review ✅ Full ✅ Enhanced
Code Review ✅ SOLID/DRY ✅ SOLID/DRY
Plan Audit ✅ Scope Creep ✅ Scope Creep
Complexity Evaluation ✅ 1-10 ✅ 1-10
Integration
PM Tool Export ⚠️ Metadata Ready (API not implemented) ⚠️ Metadata Ready
Requirements Context ✅ Local ✅ Injected to Tasks
BDD → Task Link ⚠️ Manual ✅ Automatic

Legend: - ✅ = Fully available - ⚠️ = Partially available or manual process - ❌ = Not available


Common Workflows

Workflow 1: Requirements-Driven Development (Full Integration)

Prerequisites: Both require-kit and guardkit installed

Complete Workflow:

# Phase 1: Requirements Gathering (require-kit)
/gather-requirements
# Interactive Q&A captures complete requirements

# Phase 2: Formalize Requirements (require-kit)
/formalize-ears
# Output: docs/requirements/REQ-001.md (EARS notation)

# Phase 3: Create Epic (require-kit)
/epic-create "User Authentication System"
# Output: docs/epics/EPIC-001.md

# Phase 4: Create Feature (require-kit)
/feature-create "Login Functionality" epic:EPIC-001
# Output: docs/features/FEAT-001.md

# Phase 5: Generate BDD Scenarios (require-kit)
/generate-bdd FEAT-001
# Output: docs/bdd/BDD-001.feature (Gherkin scenarios)

# Phase 6: Generate Task Specifications (require-kit)
/feature-generate-tasks FEAT-001
# Output: tasks/backlog/TASK-001.md (with links to REQ, BDD, FEAT)

# Phase 7: Execute Task (guardkit)
/task-work TASK-001
# - Loads requirements context from REQ-001
# - References BDD-001 for acceptance criteria
# - Implements with TDD workflow
# - Runs quality gates
# Output: Implementation with test coverage

# Phase 8: Complete Task (guardkit)
/task-complete TASK-001
# - Verifies all tests passing
# - Confirms coverage ≥80%
# - Archives with full traceability

Result: Complete traceability chain:

REQ-001 → BDD-001 → FEAT-001 → TASK-001 → Implementation
(EARS)    (Gherkin) (Feature)  (Task)     (Code + Tests)

Workflow 2: Lean Startup (guardkit Only)

Prerequisites: guardkit only

Rapid Iteration Workflow:

# Create task from user story or issue
/task-create "Add email validation to signup form"
# Output: tasks/backlog/TASK-042.md

# Execute immediately
/task-work TASK-042
# - TDD implementation
# - Quality gates (tests, coverage)
# - No requirements overhead

# Complete quickly
/task-complete TASK-042
# Output: Working feature with tests

# Iterate fast
/task-create "Improve validation error messages"
/task-work TASK-043
/task-complete TASK-043

When to Add require-kit: When you need to scale, add compliance, or require traceability:

# Install require-kit
cd ../require-kit
./installer/scripts/install.sh

# Now add requirements retroactively
/gather-requirements  # Document existing features
/formalize-ears      # Create EARS requirements
/epic-create "User Management"
/feature-create "Signup Validation" epic:EPIC-001

# Link existing tasks to features
# Edit tasks/completed/TASK-042.md frontmatter:
# feature: FEAT-001

# Continue with full workflow for new features

Workflow 3: Requirements with PM-Ready Metadata (require-kit Only)

Prerequisites: require-kit only

PM Tool Preparation Workflow:

Note: The /feature-sync command is specification-only. RequireKit provides structured metadata in feature files ready for export, but actual API integration requires MCP server or custom implementation. See docs/integration/pm-tools.md.

# Gather and formalize requirements
/gather-requirements
/formalize-ears
# Output: docs/requirements/REQ-001.md

# Create epic and features
/epic-create "E-Commerce Platform"
/feature-create "Shopping Cart" epic:EPIC-001
/feature-create "Checkout Process" epic:EPIC-001

# Generate BDD acceptance criteria
/generate-bdd FEAT-001
/generate-bdd FEAT-002

# Generate task specifications
/feature-generate-tasks FEAT-001
/feature-generate-tasks FEAT-002

# Feature files now contain PM-ready metadata:
# - docs/features/FEAT-001.md has YAML frontmatter with:
#   - pm_metadata.jira (project, issue_type, priority)
#   - pm_metadata.linear (team, priority)
# - Structured for easy API integration
# - See docs/integration/pm-tools.md for field mappings

# To actually export to PM tools:
# 1. Build custom integration using structured metadata
# 2. Or implement MCP server for PM tool APIs
# 3. Or manually create tickets using metadata as reference

Result: Requirements managed in require-kit with structured metadata ready for PM tool integration.


Troubleshooting

Integration Not Detected

Symptoms: - Commands from one package don't recognize the other - Feature availability doesn't show integration features - Commands work but lack enhanced context

Solutions:

  1. Check marker files exist:
ls -la ~/.agentecflow/*.marker

# Should see both:
# require-kit.marker
# guardkit.marker
  1. Verify marker file format:
cat ~/.agentecflow/require-kit.marker

# Expected content:
# {
#   "package": "require-kit",
#   "version": "1.0.0",
#   "installed_at": "2025-11-03T10:00:00Z"
# }
  1. Re-run installers if marker files missing:
cd /path/to/require-kit
./installer/scripts/install.sh --repair

cd /path/to/guardkit
./installer/scripts/install.sh --repair
  1. Check for conflicting installations:
# Only one installation should exist
find ~ -name "require-kit.marker" -o -name "guardkit.marker"

# If multiple found, uninstall and reinstall

Commands Not Available

Symptoms: - /command-name responds with "command not found" - Shell doesn't recognize commands

Solutions:

  1. Verify PATH includes agentecflow bin:
echo $PATH | grep agentecflow

# Should show: ...:/Users/yourusername/.agentecflow/bin:...
  1. Add to PATH if missing (add to ~/.bashrc or ~/.zshrc):
export PATH="$HOME/.agentecflow/bin:$PATH"

# Reload shell
source ~/.bashrc  # or source ~/.zshrc
  1. Check command executables exist:
ls -la ~/.agentecflow/bin/

# Should show command wrappers for both packages
  1. Restart shell/terminal:
# Sometimes needed for PATH changes
exec $SHELL

BDD Mode Questions

Question: "Why doesn't guardkit have a BDD mode anymore?"

Answer: BDD mode was intentionally removed to respect the Dependency Inversion Principle and avoid circular dependencies between packages.

The Old Design (Violated DIP):

guardkit /task-work --bdd
    ↓ (calls)
require-kit /generate-bdd
    ↓ (generates)
BDD scenarios
    ↓ (used by)
guardkit tests

This made guardkit (lower-level) depend on require-kit (higher-level), which is a DIP violation.

The Correct Design (Current):

require-kit /generate-bdd
    ↓ (generates)
BDD scenarios (artifact)
    ↓ (consumed by)
guardkit tests (data dependency only)

How to Use BDD with Integration:

  1. Generate BDD scenarios first (require-kit):
/generate-bdd FEAT-001
# Output: docs/bdd/BDD-001.feature
  1. Reference in task specifications:
# tasks/backlog/TASK-001.md frontmatter
bdd_scenarios: [BDD-001]
  1. Execute task (guardkit loads BDD as acceptance criteria):
/task-work TASK-001
# guardkit reads BDD-001.feature for acceptance criteria
# implements tests based on scenarios
# no code dependency on require-kit

Restoration Documentation: If your team requires the old BDD mode behavior (accepting the DIP violation tradeoff), see docs/architecture/bdd-mode-restoration.md (coming in future release).

Feature Detection Issues

Symptoms: - Feature matrix shows incorrect availability - Commands behave unexpectedly

Diagnostic Commands:

# Check feature detection
python3 -c "
import sys
sys.path.insert(0, '$HOME/.agentecflow/lib')
from feature_detection import get_available_features
import json
print(json.dumps(get_available_features(), indent=2))
"

# Expected output:
# {
#   "require_kit": true,
#   "guardkit": true,
#   "integration": true,
#   "features": {
#     "requirements": true,
#     "bdd": true,
#     "task_execution": true,
#     ...
#   }
# }

Solutions:

  1. If feature detection fails, verify Python path:
ls ~/.agentecflow/lib/feature_detection.py
# Should exist
  1. Check for multiple installations:
find ~ -type d -name ".agentecflow" 2>/dev/null

# Should only find one: ~/.agentecflow
  1. Clear and reinstall:
rm -rf ~/.agentecflow
# Reinstall both packages

Migration Guides

From Monolithic ai-engineer to Split Packages

Context: The original ai-engineer system was split into require-kit and guardkit to provide standalone, composable packages.

Migration Steps:

  1. Uninstall old system:
# If you have old ai-engineer installed
rm -rf ~/.agentecflow
# or use uninstaller if provided
  1. Determine your needs:

  2. Requirements + Implementation → Install both packages

  3. Requirements only → Install require-kit
  4. Implementation only → Install guardkit

  5. Install new packages (see Installation Scenarios above)

  6. Migrate existing files:

# Old structure:
# .ai-engineer/requirements/
# .ai-engineer/bdd/
# .ai-engineer/tasks/

# New structure:
# docs/requirements/
# docs/bdd/
# tasks/

# Copy files if needed
cp -r ~/.ai-engineer/requirements docs/
cp -r ~/.ai-engineer/bdd docs/
cp -r ~/.ai-engineer/tasks tasks/
  1. Verify commands work:
/gather-requirements --version
/task-work --version

Backward Compatibility: Old marker files and command names are NOT compatible. Clean installation required.

From require-kit Standalone to Full Integration

When to Migrate: When you want to add implementation workflow and quality gates to your requirements process.

Migration Steps:

  1. Install guardkit:
cd /path/to/guardkit
./installer/scripts/install.sh
  1. Verify integration:
ls ~/.agentecflow/*.marker
# Should show both markers
  1. No data migration needed: All existing requirements, BDD, epics, and features remain unchanged.

  2. New capabilities available immediately:

# Tasks now link to requirements
/feature-generate-tasks FEAT-001
# Output: tasks with requirements context

# Execute with full context
/task-work TASK-001
# Loads REQ-001 and BDD-001 automatically
  1. Update workflows: Start using combined workflow (see Workflow 1 above).

No Breaking Changes: All existing require-kit commands continue to work identically.

From guardkit Standalone to Full Integration

When to Migrate: When you want to add requirements traceability and BDD scenarios to your task execution workflow.

Migration Steps:

  1. Install require-kit:
cd /path/to/require-kit
./installer/scripts/install.sh
  1. Verify integration:
ls ~/.agentecflow/*.marker
# Should show both markers
  1. Optionally add requirements to existing tasks:
# For critical/completed tasks, add requirements retroactively
/gather-requirements
# Answer questions about existing feature

/formalize-ears
# Output: docs/requirements/REQ-010.md

# Edit completed task frontmatter
# tasks/completed/TASK-042.md:
# requirements: [REQ-010]
  1. Use full workflow for new features:
# New features start with requirements
/gather-requirements
/formalize-ears
/epic-create "Feature Area"
/feature-create "New Feature" epic:EPIC-001
/generate-bdd FEAT-001
/feature-generate-tasks FEAT-001

# Execute as before, now with context
/task-work TASK-043

No Breaking Changes: All existing guardkit commands continue to work identically. Existing tasks without requirements continue to execute normally.


Additional Resources

Documentation

Command References

  • require-kit Commands: See .claude/commands/ for command specifications
  • guardkit Commands: See guardkit repository .claude/commands/

Support


Terminology

Consistent terminology across documentation:

  • Package names: require-kit, guardkit (lowercase, hyphenated)
  • Files: lowercase-with-hyphens.md
  • Package: Use "package" not "tool" or "system"
  • Integration: Bidirectional optional integration (not "dependency")
  • Marker: Detection mechanism (not "flag" or "config")

Document Version: 1.0.0 Last Updated: 2025-11-03 Authoritative Source: This guide in require-kit repository guardkit Copy: Linked from guardkit repository (not duplicated)