✓ Verified 💻 Development ✓ Enhanced Data

Wreckit Ralph

Bulletproof AI code verification.

Rating
4.8 (380 reviews)
Downloads
49,159 downloads
Version
1.0.0

Overview

Bulletproof AI code verification.

Complete Documentation

View Source →

Reckit — Bulletproof AI Code Verification

Build it. Break it. Prove it works.

Philosophy

AI can't verify itself. Structure the pipeline so it can't silently agree with itself. Separate Builder/Tester/Breaker roles across fresh contexts. Use independent oracles.

Full 14-step framework: references/verification-framework.md

Modes

Auto-detected from context:

ModeTriggerDescription
🟢 BUILDEmpty repo + PRDFull pipeline for greenfield
🟡 REBUILDExisting code + migration specBUILD + behavior capture + replay
🔴 FIXExisting code + bug reportFix, verify, check regressions
🔵 AUDITExisting code, no changesVerify and report only

Gates

Read the gate file before executing it. Each contains: question, checks, pass/fail criteria.

GateBUILDREBUILDFIXAUDITFile
AI Slop Scanreferences/gates/slop-scan.md
Type Checkreferences/gates/type-check.md
Ralph Loopreferences/gates/ralph-loop.md
Test Qualityreferences/gates/test-quality.md
Mutation Killreferences/gates/mutation-kill.md
Cross-Verifyreferences/gates/cross-verify.md
Behavior Capturereferences/gates/behavior-capture.md
Regressionreferences/gates/regression.md
SASTreferences/gates/sast.md
LLM-as-Judgeoptoptoptoptreferences/gates/llm-judge.md
Design Reviewreferences/gates/design-review.md
CI Integrationreferences/gates/ci-integration.md
Proof Bundlereferences/gates/proof-bundle.md

Scripts

Deterministic helpers — run these, don't rewrite them:

Core (all modes):

  • scripts/project-type.sh [path] — classify project context + calibration profile (skip_gates, thresholds, tolerated warns)
  • scripts/detect-stack.sh [path] — auto-detect language, framework, test runner → JSON
  • scripts/check-deps.sh [path] — verify all deps exist in registries (hallucination check)
  • scripts/slop-scan.sh [path] — semantic slop scan (tracked vs untracked debt, categorized output) → JSON
  • scripts/type-check.sh [path] — run type checker (tsc/mypy/cargo/go vet) → JSON
  • scripts/ralph-loop.sh [path] — validate IMPLEMENTATION_PLAN.md structure → JSON
  • scripts/coverage-stats.sh [path] — extract raw coverage numbers from test runner
  • scripts/mutation-test.sh [path] [test-cmd] — mutation testing (mutmut/cargo-mutants/Stryker/AI)
  • scripts/mutation-test-stryker.sh [path] — Stryker-specific mutation testing → JSON
  • scripts/red-team.sh [path] — SAST + 20+ vulnerability patterns → JSON
  • scripts/regex-complexity.sh [path] [--context library|app] — targeted ReDoS analysis → JSON
  • scripts/proof-bundle.sh [path] [mode] — corroboration-based aggregation + proof bundle writer
  • scripts/run-all-gates.sh [path] [mode] [--log-file] — sequential gate runner with telemetry + adaptive skipping/tolerance
Mode-specific:
  • scripts/behavior-capture.sh [path] — capture golden fixtures before rebuild (REBUILD)
  • scripts/design-review.sh [path] — dep graph, coupling, circular deps (AUDIT/REBUILD) → JSON
  • scripts/ci-integration.sh [path] — CI config detection and scoring → JSON
  • scripts/differential-test.sh [path] — oracle comparison, golden tests (BUILD/REBUILD) → JSON
Extended verification:
  • scripts/dynamic-analysis.sh [path] — memory leaks, race conditions, FD leaks → JSON
  • scripts/perf-benchmark.sh [path] — benchmark detection + regression vs baseline → JSON
  • scripts/property-test.sh [path] — property-based/fuzz testing, generates stubs → JSON
Bootstrap:
  • scripts/run-audit.sh [path] [mode] [--spawn] — generate orchestrator task + optional spawn

Swarm Architecture

For multi-gate parallel execution, read references/swarm/orchestrator.md.

Quick overview:

text
Main agent → wreckit orchestrator (depth 1)
  ├─ Planning: Architect worker
  ├─ Building: Sequential Implementer workers
  ├─ Verification: Parallel gate workers
  ├─ Sequential: Cross-verify / regression / judge
  └─ Decision: Proof bundle → Ship / Caution / Blocked

Critical: Read references/swarm/collect.md before spawning workers. Never fabricate results. Wait for all workers to report back. Worker output format: references/swarm/handoff.md.

Config required:

json
{ "agents.defaults.subagents": { "maxSpawnDepth": 2, "maxChildrenPerAgent": 8 } }

Decision Framework

VerdictCriteria
ShipNo hard blocks; no corroborated multi-domain fail evidence above block threshold
Caution ⚠️Single non-hard fail, warning-only risk, or corroboration below block threshold
Blocked 🚫Any hard block OR corroborated non-hard failure pattern (multi-signal, multi-domain, high-confidence)
Hard-block + corroboration rule details: references/gates/corroboration.md

Supported Languages & Stacks

LanguageGates AvailableNotes
TypeScript/JS11/11Full support via Stryker, tsc, vitest/jest
Python11/11Full support via mutmut, mypy/pyright, pytest
Rust11/11Full support via cargo-mutants, cargo check/test
Go11/11Full support via go vet, go test
Swift (SPM)9/11mutation = AI-estimated CAUTION, cross-verify = manual
Swift (Xcode)7/11type-check = xcodebuild, mutation = AI-estimated, coverage = limited
iOS apps7/11Same as Xcode projects
Java/Kotlin10/11Gradle/Maven, mutation via PIT (manual setup)
Shell8/11shellcheck, limited mutation testing

Swift Notes

  • Mutation testing requires manual verification — no automated mutation testing tool exists for Swift as of 2026. The mutation gate uses AI-estimated analysis (counts mutation surface, compares to test count) and always outputs CAUTION, never SHIP.
  • SPM projects get high-confidence type checking via swift build (the compiler IS the type checker).
  • Xcode projects get medium-confidence type checking via xcodebuild with auto-detected schemes.
  • Dependency checking lists SPM dependencies but notes that no automated CVE database exists for Swift packages — manual review is always recommended.
  • CocoaPods projects: pod outdated is checked if Podfile present.
  • Build systems detected: SPM, xcodebuild, CocoaPods, Carthage, mixed.

Running an Audit (Single-Agent, No Swarm)

For small projects or when swarm isn't needed, run gates sequentially:

  • scripts/detect-stack.sh → know your target (language, test cmd, type checker)
  • scripts/check-deps.sh → verify deps are real (not hallucinated)
  • scripts/slop-scan.sh → find placeholders, template artifacts, empty stubs
  • Run type checker (from detect-stack output) → references/gates/type-check.md
  • Run tests + scripts/coverage-stats.shreferences/gates/test-quality.md
  • scripts/mutation-test.shreferences/gates/mutation-kill.md (uses mutmut/cargo-mutants/Stryker if available)
  • scripts/red-team.shreferences/gates/sast.md (20+ vulnerability patterns, JSON report)
  • scripts/design-review.shreferences/gates/design-review.md (dep graph, circular deps, god modules)
  • scripts/ci-integration.shreferences/gates/ci-integration.md (CI config detection + scoring)
  • scripts/dynamic-analysis.shreferences/gates/dynamic-analysis.md (memory leaks, race conditions)
  • scripts/perf-benchmark.shreferences/gates/performance.md (benchmark detection + regression)
  • scripts/property-test.shreferences/gates/property-based.md (fuzzing, invariant checks)
  • scripts/differential-test.shreferences/gates/differential.md (oracle comparison, metamorphic tests)
  • echo '[...gate-results-json...]' | scripts/proof-bundle.sh [path] [mode] → writes .wreckit/proof.json, dashboard.json, decision.md

Quick Start

text
"Use wreckit to audit [project]. Don't change anything."
"Use wreckit to build [project] from this PRD."
"Use wreckit to fix [bug]. Prove nothing else breaks."
"Use wreckit to rebuild [project] in [framework]."

Dashboard

assets/dashboard/ contains a local web dashboard for viewing proof bundles across repos. Run: node assets/dashboard/server.mjs (port 3939). Reads .wreckit/dashboard.json from projects.

Codex CLI Notes (2026-02-22)

When using Codex CLI to build/run projects:

  • --full-auto sandbox blocks npm install network access (ENOTFOUND registry.npmjs.org)
  • Fix: use --dangerously-bypass-approvals-and-sandbox flag instead
  • Auth: echo "$OPENAI_API_KEY" | codex login --with-api-key stores credentials to ~/.codex/auth.json
  • Config: ~/.codex/config.toml with model = "gpt-5.2-codex" and [shell_environment_policy] inherit = "all"
  • gpt-5.3-codex is Copilot/VS Code only — not available via direct API. Use gpt-5.2-codex.

Installation

Terminal bash

openclaw install wreckit-ralph
    
Copied!

💻Code Examples

**Quick overview:**

quick-overview.txt
Main agent → wreckit orchestrator (depth 1)
  ├─ Planning: Architect worker
  ├─ Building: Sequential Implementer workers
  ├─ Verification: Parallel gate workers
  ├─ Sequential: Cross-verify / regression / judge
  └─ Decision: Proof bundle → Ship / Caution / Blocked
example.txt
"Use wreckit to audit [project]. Don't change anything."
"Use wreckit to build [project] from this PRD."
"Use wreckit to fix [bug]. Prove nothing else breaks."
"Use wreckit to rebuild [project] in [framework]."

Tags

#web_and-frontend-development #code

Quick Info

Category Development
Model Claude 3.5
Complexity One-Click
Author christiancattaneo
Last Updated 3/10/2026
🚀
Optimized for
Claude 3.5
🧠

Ready to Install?

Get started with this skill in seconds

openclaw install wreckit-ralph