Integration Guide: require-kit and guardkit¶
Version: 1.0.0 Last Updated: 2025-11-03 Status: Production
Prerequisites¶
- Python 3.10 or later (required by both require-kit and guardkit)
- pip (Python package installer)
- git (for repository cloning)
- bash shell (macOS, Linux, or Windows WSL2)
Both packages require Python 3.10+ for ecosystem consistency. This ensures compatibility with modern Python features (PEP 604 union types) and alignment with AI/ML tooling standards.
Table of Contents¶
- Prerequisites
- Clarification Philosophy
- Overview
- Feature Planning vs Task Generation
- Integration Architecture
- Installation Scenarios
- Feature Availability Matrix
- Common Workflows
- Troubleshooting
- Migration Guides
Clarification Philosophy¶
RequireKit asks clarifying questions to improve requirement specifications, not to make implementation decisions. This is a key distinction from implementation-focused systems.
When RequireKit Asks Questions¶
| Command | Has Clarification | Purpose |
|---|---|---|
/gather-requirements |
Yes (3-phase) | Comprehensive requirements discovery |
/epic-create |
Yes | Scope, success criteria, stakeholders |
/feature-create |
Yes | Scope, acceptance criteria, dependencies |
/formalize-ears |
Yes | EARS pattern selection, completeness |
/generate-bdd |
No | Deterministic transformation |
/epic-generate-features |
No | Systematic analysis |
/feature-generate-tasks |
No | Rule-based generation |
Question Types by Domain¶
RequireKit Questions (Technology-Agnostic): - "What is explicitly OUT OF SCOPE?" - "What measurable outcomes define success?" - "Which requirements does this implement?" - "What are the testable acceptance criteria?" - "Is this triggered by an event or always active?"
NOT RequireKit Questions (Technology-Specific): - "JWT or server-side sessions?" → GuardKit/Implementation - "Redux, Zustand, or Context API?" → GuardKit/Implementation - "REST or GraphQL?" → GuardKit/Implementation - "PostgreSQL or MongoDB?" → GuardKit/Implementation
Why This Matters¶
RequireKit outputs must be technology-agnostic so they can: 1. Work with any implementation system 2. Be consumed by GuardKit or other task execution systems 3. Remain valid regardless of technology choices 4. Be understood by non-technical stakeholders
Clarification at Specification vs Implementation¶
SPECIFICATION IMPLEMENTATION
(RequireKit) (GuardKit/Other)
│ │
┌────────────────────┼──────────────────────────────────┼─────────────────┐
│ │ │ │
│ "What problem?" │ "What capability?" "How to build?" "What tech?" │
│ "Who uses it?" │ "What acceptance?" "What pattern?" "What lib?" │
│ "Why needed?" │ "What success?" "What arch?" "What DB?" │
│ │ │ │
└────────────────────┼──────────────────────────────────┼─────────────────┘
│ │
TECHNOLOGY-AGNOSTIC TECHNOLOGY-SPECIFIC
Integration with GuardKit¶
When using RequireKit with GuardKit:
- RequireKit handles specification clarification:
- Epic scope and success criteria
- Feature acceptance criteria
- EARS pattern selection
-
BDD scenario completeness
-
GuardKit handles implementation clarification:
- Technology choices
- Architecture patterns
- Error handling approaches
- Performance trade-offs
This separation ensures: - No duplicate questions - Clear responsibility boundaries - Optimal user experience - Technology decisions deferred to implementation time
Skipping Clarification¶
All RequireKit clarifications are optional. Users can:
- Use --quick flag to skip questions
- Provide parameters directly in the command
- Let AI auto-detect patterns (with --auto flag)
Examples:
# With clarification (interactive)
/epic-create "User Management"
# Without clarification (direct)
/epic-create "User Management" priority:high quarter:Q1-2024 --quick
# EARS with explicit pattern (skip pattern questions)
/formalize-ears "Users login" --pattern event-driven
# EARS auto-detect (skip clarification)
/formalize-ears "Users login" --auto
Overview¶
What is require-kit?¶
require-kit is a standalone requirements management toolkit that helps teams capture, formalize, and organize software requirements using industry-proven methodologies:
- EARS Notation: Clear, unambiguous requirements specification
- BDD/Gherkin Scenarios: Testable acceptance criteria
- Epic/Feature Hierarchy: Structured project organization
- Technology Agnostic: Works with any implementation system or PM tool
Use require-kit when you need: - Clear requirements documentation - Requirements traceability - BDD scenario generation - PM tool export capabilities - Requirements-driven development process
What is guardkit?¶
guardkit is a standalone task execution workflow system that provides structured implementation, testing, and quality gates:
- Task Execution: TDD-driven implementation workflow
- Quality Gates: Automated testing, coverage, and code review
- Architectural Review: Pattern compliance and design validation
- Test Orchestration: Comprehensive test execution and reporting
Use guardkit when you need: - Structured implementation workflow - Automated quality gates - Test-driven development - Code review and architectural compliance - Rapid task execution
When to Use Which?¶
Decision Tree:
├── Do you need requirements documentation?
│ ├── Yes → Start with require-kit
│ └── No → Consider guardkit only
│
├── Do you need task execution workflow?
│ ├── Yes → Use guardkit
│ └── No → require-kit only is sufficient
│
└── Do you need full requirements-to-implementation traceability?
├── Yes → Use both (full integration)
└── No → Use standalone package(s)
Bidirectional Optional Integration¶
Both packages are fully functional independently with no hard dependencies:
- require-kit: Works standalone, optionally enhanced by guardkit
- guardkit: Works standalone, optionally enhanced by require-kit
- Integration: Automatic detection via marker files when both installed
- No Lock-In: Install or remove either package without affecting the other
This architecture provides maximum flexibility for teams to adopt the workflow that fits their needs.
Feature Planning vs Task Generation¶
RequireKit and GuardKit provide complementary commands for different stages of feature development. Understanding when to use each command prevents confusion and ensures optimal workflow.
When to Use /feature-plan (guardkit)¶
The /feature-plan command is for planning and evaluation of new features:
- Planning new features from scratch with natural language descriptions
- Evaluating technical approaches and trade-offs before commitment
- Quick feature exploration to understand complexity and effort
- Getting effort estimates before starting implementation
- Making architectural decisions (e.g., "Should we use WebSockets or SSE?")
Input: Natural language description (e.g., "implement dark mode")
Output: Technical analysis, decision checkpoint (A/R/I/C), optional subtask generation
Example:
/feature-plan "add real-time notifications with WebSocket support"
# Analyzes technical options, estimates effort, presents decision checkpoint
When to Use /feature-generate-tasks (require-kit)¶
The /feature-generate-tasks command is for transforming structured specifications into tasks:
- You have a structured feature specification (FEAT-XXX) with requirements
- You need tasks exported to PM tools (Jira, Linear, GitHub, Azure DevOps)
- You need hierarchical task IDs for tracking (TASK-001.2.01 format)
- You want tasks derived from EARS requirements and BDD scenarios
- You need traceability from requirements to implementation tasks
Input: Feature ID with linked requirements and BDD scenarios (e.g., FEAT-001)
Output: Multiple task markdown files ready for PM tool export
Example:
/feature-generate-tasks FEAT-001
# Generates TASK-001.1.01, TASK-001.1.02, etc. with full traceability
Typical Combined Workflow¶
When using both packages together, the commands complement each other at different stages:
# Stage 1: Quick Planning (guardkit)
/feature-plan "implement user authentication"
# → Technical analysis, approach decision, effort estimate
# Stage 2: Formal Requirements (require-kit) - if needed
/gather-requirements
/formalize-ears
# → docs/requirements/REQ-001.md (EARS notation)
# Stage 3: Feature Specification (require-kit)
/feature-create "User Authentication" epic:EPIC-001
# → docs/features/FEAT-001.md (structured spec)
# Stage 4: BDD Scenarios (require-kit)
/generate-bdd FEAT-001
# → docs/bdd/BDD-001.feature (Gherkin scenarios)
# Stage 5: Task Generation (require-kit)
/feature-generate-tasks FEAT-001
# → tasks/backlog/TASK-001.1.01.md, TASK-001.1.02.md, etc.
# → PM tool export ready
# Stage 6: Implementation (guardkit)
/task-work TASK-001.1.01
# → Implementation with quality gates
Comparison Matrix¶
| Aspect | /feature-plan |
/feature-generate-tasks |
|---|---|---|
| Purpose | Planning & evaluation | Task generation |
| Input | Natural language description | Structured feature spec (FEAT-XXX) |
| Output | Analysis + decision checkpoint | Exportable task files |
| PM Tool Export | No | Yes (Jira, Linear, GitHub, Azure DevOps) |
| Traceability | No | Yes (REQ → Feature → Task) |
| Hierarchical IDs | No | Yes (TASK-001.2.01 format) |
| Requirements Linking | No | Yes (links to REQ-XXX, BDD-XXX) |
| Best For | Early planning, approach decisions | Structured task breakdown |
Decision Tree¶
Do you have a structured feature specification (FEAT-XXX)?
├── Yes → Use /feature-generate-tasks FEAT-XXX
│ (Generates PM-exportable tasks with traceability)
│
└── No → Do you need to evaluate approaches first?
├── Yes → Use /feature-plan "description"
│ (Technical analysis, effort estimation)
│
└── No → Do you need formal requirements?
├── Yes → Start with /gather-requirements
│ (Then /feature-create, then /feature-generate-tasks)
│
└── No → Use /task-create directly (guardkit)
(Skip to implementation)
Key Insight¶
These commands are NOT redundant - they serve different workflow stages:
/feature-plananswers: "What approach should we take? How complex will this be?"/feature-generate-tasksanswers: "What specific tasks are needed? How do they link to requirements?"
Use /feature-plan for exploration and decisions, then /feature-generate-tasks when you have structured specifications ready for implementation.
Integration Architecture¶
Marker File Detection¶
Both packages detect each other automatically using marker files in ~/.agentecflow/:
~/.agentecflow/
├── require-kit.marker # Created when require-kit installed
├── guardkit.marker # Created when guardkit installed
├── bin/ # Shared command executables
└── lib/ # Shared library code
How it works:
- Installation: Each package creates its marker file during installation
- Detection: Commands check for marker files at runtime
- Feature Enhancement: When both markers exist, integration features activate
- Graceful Degradation: Missing marker = standalone mode, no errors
Check your installation:
# List installed packages
ls ~/.agentecflow/*.marker
# Expected outputs:
# require-kit only: require-kit.marker
# guardkit only: guardkit.marker
# Both integrated: require-kit.marker + guardkit.marker
Dependency Inversion Principle¶
The integration follows the Dependency Inversion Principle (DIP) to avoid circular dependencies:
High-Level Module: require-kit
├── Requirements Gathering
├── EARS Formalization
├── BDD Scenario Generation
├── Task Specification Generation
└── Outputs → PM Tools, guardkit (when installed)
Low-Level Module: guardkit
├── Task Execution
├── Quality Gates
├── Test Orchestration
└── Inputs ← Task Specifications (from require-kit or PM tools)
Key Principle: guardkit does NOT look "up" to require-kit. The data flows one direction:
- require-kit generates requirements, BDD scenarios, and task specifications
- guardkit executes tasks using specifications from any source
- No circular dependency: guardkit never calls require-kit commands
Why BDD Mode was Removed from guardkit¶
Historical Context: Early versions of guardkit included a "BDD mode" that would call require-kit commands to generate feature files during task execution.
Problem: This violated DIP by making the lower-level module (guardkit) depend on the higher-level module (require-kit):
Solution: BDD mode was removed. The correct flow is:
CORRECT (Current Design):
require-kit → generates → BDD scenarios → consumed by → guardkit tests
(higher) (artifact) (lower)
For Users: If you need BDD-driven workflows:
- Use
/generate-bddin require-kit to create scenarios - Export scenarios to your test framework
- Execute tests with
/task-workin guardkit - guardkit uses the BDD scenarios as acceptance criteria (data flow, not code dependency)
Unidirectional Data Flow¶
┌─────────────────────────────────────────────────────────┐
│ require-kit (Requirements Management) │
│ ┌─────────────┐ ┌──────────────┐ ┌──────────────┐ │
│ │Requirements │──→│ BDD Scenarios│──→│Task Specs │ │
│ └─────────────┘ └──────────────┘ └──────────────┘ │
└────────────────────────────┬────────────────────────────┘
│ (data artifacts)
↓
┌─────────────────────────────────────────────────────────┐
│ guardkit (Task Execution) │
│ ┌─────────────┐ ┌──────────────┐ ┌──────────────┐ │
│ │Task Work │──→│ Quality Gates│──→│Completion │ │
│ └─────────────┘ └──────────────┘ └──────────────┘ │
└─────────────────────────────────────────────────────────┘
Alternative Sources:
┌─────────────────┐
│ PM Tools │──→ Task Specs ──→ guardkit
│ (Jira, Linear) │
└─────────────────┘
Installation Scenarios¶
Scenario 1: require-kit Only¶
Use Case: Requirements team without implementation workflow, or teams using external PM tools for task execution.
Installation:
git clone https://github.com/requirekit/require-kit.git
cd require-kit
./installer/scripts/install.sh
Verification:
ls ~/.agentecflow/require-kit.marker
# Should exist
/gather-requirements --version
# Should show require-kit version
Available Commands:
# Requirements Management
/gather-requirements # Interactive Q&A
/formalize-ears # Convert to EARS notation
/generate-bdd # Generate Gherkin scenarios
# Epic/Feature Management
/epic-create "Title"
/feature-create "Title" epic:EPIC-XXX
/hierarchy-view EPIC-XXX
# Export (Specification Only - requires custom implementation)
# /feature-sync FEAT-XXX --jira # See docs/integration/pm-tools.md
# /feature-sync FEAT-XXX --linear # Metadata ready, API not implemented
Output Artifacts:
docs/requirements/REQ-XXX.md- EARS requirementsdocs/bdd/BDD-XXX.feature- Gherkin scenariosdocs/epics/EPIC-XXX.md- Epic specificationsdocs/features/FEAT-XXX.md- Feature specifications (with PM-ready metadata)
What's NOT Available:
- Task execution workflow (
/task-workcommand) - Automated quality gates
- Test orchestration
- Code review automation
Scenario 2: guardkit Only¶
Use Case: Lean startup, rapid iteration, teams without formal requirements process.
Installation:
Verification:
ls ~/.agentecflow/guardkit.marker
# Should exist
/task-work --version
# Should show guardkit version
Available Commands:
# Task Management
/task-create "Title"
/task-work TASK-XXX
/task-work TASK-XXX --micro # Micro-task workflow
/task-complete TASK-XXX
# Task States
/task-status # Show all tasks
/task-status TASK-XXX # Show specific task
/task-block TASK-XXX "reason" # Block task
/task-unblock TASK-XXX # Unblock task
Output Artifacts:
tasks/backlog/TASK-XXX.md- Task filestasks/in_progress/TASK-XXX.md- Active taskstasks/completed/TASK-XXX.md- Completed tasks- Test results and coverage reports
- Code review reports
What's NOT Available:
- EARS requirements formalization
- BDD scenario generation
- Epic/feature hierarchy
- Requirements traceability
- PM tool export
Scenario 3: Full Integration¶
Use Case: Enterprise teams needing complete requirements-to-implementation traceability.
Installation (Either Order):
# Option A: Install require-kit first
git clone https://github.com/requirekit/require-kit.git
cd require-kit
./installer/scripts/install.sh
cd ..
git clone https://github.com/guardkit/guardkit.git
cd guardkit
./installer/scripts/install.sh
# Option B: Install guardkit first (same result)
Verification:
ls ~/.agentecflow/*.marker
# Should show: require-kit.marker + guardkit.marker
/gather-requirements --version
/task-work --version
# Both should respond
Available Commands: ALL commands from both packages
Enhanced Features:
/task-workloads requirements context from require-kit/feature-generate-tasksautomatically creates executable tasks- Full traceability: REQ → BDD → FEAT → TASK → Code
- Quality gates verify against BDD acceptance criteria
Output Artifacts: All artifacts from both packages, fully linked
Feature Availability Matrix¶
| Feature | require-kit Only | guardkit Only | Both Integrated |
|---|---|---|---|
| Requirements Management | |||
| EARS Requirements | ✅ Full | ❌ | ✅ Full |
| Requirements Gathering | ✅ Interactive | ❌ | ✅ Interactive |
| Requirements Traceability | ✅ Full | ❌ | ✅ Enhanced |
| BDD/Testing | |||
| BDD Scenario Generation | ✅ Gherkin | ❌ | ✅ Gherkin |
| BDD-Driven Testing | ⚠️ Manual | ⚠️ Manual | ✅ Automated |
| Test Execution | ❌ | ✅ Full | ✅ Full |
| Test Coverage | ❌ | ✅ ≥80% | ✅ ≥80% |
| Project Organization | |||
| Epic Management | ✅ Full | ❌ | ✅ Full |
| Feature Management | ✅ Full | ❌ | ✅ Full |
| Task Management | ⚠️ Specs Only | ✅ Full | ✅ Enhanced |
| Hierarchy View | ✅ Epic→Feature | ⚠️ Task Only | ✅ Epic→Feature→Task |
| Task Execution | |||
| Task Workflow | ❌ | ✅ Full | ✅ Full |
| TDD Mode | ❌ | ✅ | ✅ |
| Micro-Task Mode | ❌ | ✅ | ✅ |
| Quality Gates | ❌ | ✅ Full | ✅ Enhanced |
| Code Quality | |||
| Architectural Review | ❌ | ✅ Full | ✅ Enhanced |
| Code Review | ❌ | ✅ SOLID/DRY | ✅ SOLID/DRY |
| Plan Audit | ❌ | ✅ Scope Creep | ✅ Scope Creep |
| Complexity Evaluation | ❌ | ✅ 1-10 | ✅ 1-10 |
| Integration | |||
| PM Tool Export | ⚠️ Metadata Ready (API not implemented) | ❌ | ⚠️ Metadata Ready |
| Requirements Context | ✅ Local | ❌ | ✅ Injected to Tasks |
| BDD → Task Link | ⚠️ Manual | ❌ | ✅ Automatic |
Legend: - ✅ = Fully available - ⚠️ = Partially available or manual process - ❌ = Not available
Common Workflows¶
Workflow 1: Requirements-Driven Development (Full Integration)¶
Prerequisites: Both require-kit and guardkit installed
Complete Workflow:
# Phase 1: Requirements Gathering (require-kit)
/gather-requirements
# Interactive Q&A captures complete requirements
# Phase 2: Formalize Requirements (require-kit)
/formalize-ears
# Output: docs/requirements/REQ-001.md (EARS notation)
# Phase 3: Create Epic (require-kit)
/epic-create "User Authentication System"
# Output: docs/epics/EPIC-001.md
# Phase 4: Create Feature (require-kit)
/feature-create "Login Functionality" epic:EPIC-001
# Output: docs/features/FEAT-001.md
# Phase 5: Generate BDD Scenarios (require-kit)
/generate-bdd FEAT-001
# Output: docs/bdd/BDD-001.feature (Gherkin scenarios)
# Phase 6: Generate Task Specifications (require-kit)
/feature-generate-tasks FEAT-001
# Output: tasks/backlog/TASK-001.md (with links to REQ, BDD, FEAT)
# Phase 7: Execute Task (guardkit)
/task-work TASK-001
# - Loads requirements context from REQ-001
# - References BDD-001 for acceptance criteria
# - Implements with TDD workflow
# - Runs quality gates
# Output: Implementation with test coverage
# Phase 8: Complete Task (guardkit)
/task-complete TASK-001
# - Verifies all tests passing
# - Confirms coverage ≥80%
# - Archives with full traceability
Result: Complete traceability chain:
REQ-001 → BDD-001 → FEAT-001 → TASK-001 → Implementation
(EARS) (Gherkin) (Feature) (Task) (Code + Tests)
Workflow 2: Lean Startup (guardkit Only)¶
Prerequisites: guardkit only
Rapid Iteration Workflow:
# Create task from user story or issue
/task-create "Add email validation to signup form"
# Output: tasks/backlog/TASK-042.md
# Execute immediately
/task-work TASK-042
# - TDD implementation
# - Quality gates (tests, coverage)
# - No requirements overhead
# Complete quickly
/task-complete TASK-042
# Output: Working feature with tests
# Iterate fast
/task-create "Improve validation error messages"
/task-work TASK-043
/task-complete TASK-043
When to Add require-kit: When you need to scale, add compliance, or require traceability:
# Install require-kit
cd ../require-kit
./installer/scripts/install.sh
# Now add requirements retroactively
/gather-requirements # Document existing features
/formalize-ears # Create EARS requirements
/epic-create "User Management"
/feature-create "Signup Validation" epic:EPIC-001
# Link existing tasks to features
# Edit tasks/completed/TASK-042.md frontmatter:
# feature: FEAT-001
# Continue with full workflow for new features
Workflow 3: Requirements with PM-Ready Metadata (require-kit Only)¶
Prerequisites: require-kit only
PM Tool Preparation Workflow:
Note: The
/feature-synccommand is specification-only. RequireKit provides structured metadata in feature files ready for export, but actual API integration requires MCP server or custom implementation. See docs/integration/pm-tools.md.
# Gather and formalize requirements
/gather-requirements
/formalize-ears
# Output: docs/requirements/REQ-001.md
# Create epic and features
/epic-create "E-Commerce Platform"
/feature-create "Shopping Cart" epic:EPIC-001
/feature-create "Checkout Process" epic:EPIC-001
# Generate BDD acceptance criteria
/generate-bdd FEAT-001
/generate-bdd FEAT-002
# Generate task specifications
/feature-generate-tasks FEAT-001
/feature-generate-tasks FEAT-002
# Feature files now contain PM-ready metadata:
# - docs/features/FEAT-001.md has YAML frontmatter with:
# - pm_metadata.jira (project, issue_type, priority)
# - pm_metadata.linear (team, priority)
# - Structured for easy API integration
# - See docs/integration/pm-tools.md for field mappings
# To actually export to PM tools:
# 1. Build custom integration using structured metadata
# 2. Or implement MCP server for PM tool APIs
# 3. Or manually create tickets using metadata as reference
Result: Requirements managed in require-kit with structured metadata ready for PM tool integration.
Troubleshooting¶
Integration Not Detected¶
Symptoms: - Commands from one package don't recognize the other - Feature availability doesn't show integration features - Commands work but lack enhanced context
Solutions:
- Check marker files exist:
- Verify marker file format:
cat ~/.agentecflow/require-kit.marker
# Expected content:
# {
# "package": "require-kit",
# "version": "1.0.0",
# "installed_at": "2025-11-03T10:00:00Z"
# }
- Re-run installers if marker files missing:
cd /path/to/require-kit
./installer/scripts/install.sh --repair
cd /path/to/guardkit
./installer/scripts/install.sh --repair
- Check for conflicting installations:
# Only one installation should exist
find ~ -name "require-kit.marker" -o -name "guardkit.marker"
# If multiple found, uninstall and reinstall
Commands Not Available¶
Symptoms:
- /command-name responds with "command not found"
- Shell doesn't recognize commands
Solutions:
- Verify PATH includes agentecflow bin:
- Add to PATH if missing (add to
~/.bashrcor~/.zshrc):
- Check command executables exist:
- Restart shell/terminal:
BDD Mode Questions¶
Question: "Why doesn't guardkit have a BDD mode anymore?"
Answer: BDD mode was intentionally removed to respect the Dependency Inversion Principle and avoid circular dependencies between packages.
The Old Design (Violated DIP):
guardkit /task-work --bdd
↓ (calls)
require-kit /generate-bdd
↓ (generates)
BDD scenarios
↓ (used by)
guardkit tests
This made guardkit (lower-level) depend on require-kit (higher-level), which is a DIP violation.
The Correct Design (Current):
require-kit /generate-bdd
↓ (generates)
BDD scenarios (artifact)
↓ (consumed by)
guardkit tests (data dependency only)
How to Use BDD with Integration:
- Generate BDD scenarios first (require-kit):
- Reference in task specifications:
- Execute task (guardkit loads BDD as acceptance criteria):
/task-work TASK-001
# guardkit reads BDD-001.feature for acceptance criteria
# implements tests based on scenarios
# no code dependency on require-kit
Restoration Documentation: If your team requires the old BDD mode behavior (accepting the DIP violation tradeoff), see docs/architecture/bdd-mode-restoration.md (coming in future release).
Feature Detection Issues¶
Symptoms: - Feature matrix shows incorrect availability - Commands behave unexpectedly
Diagnostic Commands:
# Check feature detection
python3 -c "
import sys
sys.path.insert(0, '$HOME/.agentecflow/lib')
from feature_detection import get_available_features
import json
print(json.dumps(get_available_features(), indent=2))
"
# Expected output:
# {
# "require_kit": true,
# "guardkit": true,
# "integration": true,
# "features": {
# "requirements": true,
# "bdd": true,
# "task_execution": true,
# ...
# }
# }
Solutions:
- If feature detection fails, verify Python path:
- Check for multiple installations:
- Clear and reinstall:
Migration Guides¶
From Monolithic ai-engineer to Split Packages¶
Context: The original ai-engineer system was split into require-kit and guardkit to provide standalone, composable packages.
Migration Steps:
- Uninstall old system:
-
Determine your needs:
-
Requirements + Implementation → Install both packages
- Requirements only → Install require-kit
-
Implementation only → Install guardkit
-
Install new packages (see Installation Scenarios above)
-
Migrate existing files:
# Old structure:
# .ai-engineer/requirements/
# .ai-engineer/bdd/
# .ai-engineer/tasks/
# New structure:
# docs/requirements/
# docs/bdd/
# tasks/
# Copy files if needed
cp -r ~/.ai-engineer/requirements docs/
cp -r ~/.ai-engineer/bdd docs/
cp -r ~/.ai-engineer/tasks tasks/
- Verify commands work:
Backward Compatibility: Old marker files and command names are NOT compatible. Clean installation required.
From require-kit Standalone to Full Integration¶
When to Migrate: When you want to add implementation workflow and quality gates to your requirements process.
Migration Steps:
- Install guardkit:
- Verify integration:
-
No data migration needed: All existing requirements, BDD, epics, and features remain unchanged.
-
New capabilities available immediately:
# Tasks now link to requirements
/feature-generate-tasks FEAT-001
# Output: tasks with requirements context
# Execute with full context
/task-work TASK-001
# Loads REQ-001 and BDD-001 automatically
- Update workflows: Start using combined workflow (see Workflow 1 above).
No Breaking Changes: All existing require-kit commands continue to work identically.
From guardkit Standalone to Full Integration¶
When to Migrate: When you want to add requirements traceability and BDD scenarios to your task execution workflow.
Migration Steps:
- Install require-kit:
- Verify integration:
- Optionally add requirements to existing tasks:
# For critical/completed tasks, add requirements retroactively
/gather-requirements
# Answer questions about existing feature
/formalize-ears
# Output: docs/requirements/REQ-010.md
# Edit completed task frontmatter
# tasks/completed/TASK-042.md:
# requirements: [REQ-010]
- Use full workflow for new features:
# New features start with requirements
/gather-requirements
/formalize-ears
/epic-create "Feature Area"
/feature-create "New Feature" epic:EPIC-001
/generate-bdd FEAT-001
/feature-generate-tasks FEAT-001
# Execute as before, now with context
/task-work TASK-043
No Breaking Changes: All existing guardkit commands continue to work identically. Existing tasks without requirements continue to execute normally.
Additional Resources¶
Documentation¶
- require-kit: README.md, CLAUDE.md
- guardkit: guardkit README
- Architecture: docs/architecture/bidirectional-integration.md
Command References¶
- require-kit Commands: See
.claude/commands/for command specifications - guardkit Commands: See guardkit repository
.claude/commands/
Support¶
- GitHub Issues: require-kit issues
- GitHub Issues: guardkit issues
- Email: support@yourorganization.com
Terminology¶
Consistent terminology across documentation:
- Package names: require-kit, guardkit (lowercase, hyphenated)
- Files: lowercase-with-hyphens.md
- Package: Use "package" not "tool" or "system"
- Integration: Bidirectional optional integration (not "dependency")
- Marker: Detection mechanism (not "flag" or "config")
Document Version: 1.0.0 Last Updated: 2025-11-03 Authoritative Source: This guide in require-kit repository guardkit Copy: Linked from guardkit repository (not duplicated)