Get the FREE Ultimate OpenClaw Setup Guide →

speckit-analyze

Scanned
npx machina-cli add skill dceoy/speckit-agent-skills/speckit-analyze --openclaw
Files (1)
SKILL.md
7.4 KB

Spec Kit Analyze Skill

When to Use

  • You have spec.md, plan.md, and tasks.md and need a read-only consistency analysis before implementation.

Inputs

  • specs/<feature>/spec.md, plan.md, tasks.md
  • .specify/memory/constitution.md
  • Any user concerns or focus areas from the request

Goal

Identify inconsistencies, duplications, ambiguities, and underspecified items across the three core artifacts (spec.md, plan.md, tasks.md) before implementation. This skill MUST run only after a complete tasks.md exists (typically after speckit-tasks).

Operating Constraints

STRICTLY READ-ONLY: Do not modify any files. Output a structured analysis report. Offer an optional remediation plan (user must explicitly approve before any follow-up edits are performed manually).

Constitution Authority: The project constitution (.specify/memory/constitution.md) is non-negotiable within this analysis scope. Constitution conflicts are automatically CRITICAL and require adjustment of the spec, plan, or tasks—not dilution, reinterpretation, or silent ignoring of the principle. If a principle itself needs to change, that must occur in a separate, explicit constitution update outside this skill.

Workflow

1. Initialize Analysis Context

Run .specify/scripts/bash/check-prerequisites.sh --json --require-tasks --include-tasks once from repo root and parse JSON for FEATURE_DIR and AVAILABLE_DOCS. Derive absolute paths:

  • SPEC = FEATURE_DIR/spec.md
  • PLAN = FEATURE_DIR/plan.md
  • TASKS = FEATURE_DIR/tasks.md

Abort with an error message if any required file is missing (instruct the user to run the missing prerequisite skill or script). For single quotes in args like "I'm Groot", use escape syntax: e.g 'I'''m Groot' (or double-quote if possible: "I'm Groot").

2. Load Artifacts (Progressive Disclosure)

Load only the minimal necessary context from each artifact:

From spec.md:

  • Overview/Context
  • Functional Requirements
  • Non-Functional Requirements
  • User Stories
  • Edge Cases (if present)

From plan.md:

  • Architecture/stack choices
  • Data Model references
  • Phases
  • Technical constraints

From tasks.md:

  • Task IDs
  • Descriptions
  • Phase grouping
  • Parallel markers [P]
  • Referenced file paths

From constitution:

  • Load .specify/memory/constitution.md for principle validation

3. Build Semantic Models

Create internal representations (do not include raw artifacts in output):

  • Requirements inventory: Each functional + non-functional requirement with a stable key (derive slug based on imperative phrase; e.g., "User can upload file" → user-can-upload-file)
  • User story/action inventory: Discrete user actions with acceptance criteria
  • Task coverage mapping: Map each task to one or more requirements or stories (inference by keyword / explicit reference patterns like IDs or key phrases)
  • Constitution rule set: Extract principle names and MUST/SHOULD normative statements

4. Detection Passes (Token-Efficient Analysis)

Focus on high-signal findings. Limit to 50 findings total; aggregate remainder in overflow summary.

A. Duplication Detection

  • Identify near-duplicate requirements
  • Mark lower-quality phrasing for consolidation

B. Ambiguity Detection

  • Flag vague adjectives (fast, scalable, secure, intuitive, robust) lacking measurable criteria
  • Flag unresolved placeholders (TODO, TKTK, ???, <placeholder>, etc.)

C. Underspecification

  • Requirements with verbs but missing object or measurable outcome
  • User stories missing acceptance criteria alignment
  • Tasks referencing files or components not defined in spec/plan

D. Constitution Alignment

  • Any requirement or plan element conflicting with a MUST principle
  • Missing mandated sections or quality gates from constitution

E. Coverage Gaps

  • Requirements with zero associated tasks
  • Tasks with no mapped requirement/story
  • Non-functional requirements not reflected in tasks (e.g., performance, security)

F. Inconsistency

  • Terminology drift (same concept named differently across files)
  • Data entities referenced in plan but absent in spec (or vice versa)
  • Task ordering contradictions (e.g., integration tasks before foundational setup tasks without dependency note)
  • Conflicting requirements (e.g., one requires Next.js while other specifies Vue)

5. Severity Assignment

Use this heuristic to prioritize findings:

  • CRITICAL: Violates constitution MUST, missing core spec artifact, or requirement with zero coverage that blocks baseline functionality
  • HIGH: Duplicate or conflicting requirement, ambiguous security/performance attribute, untestable acceptance criterion
  • MEDIUM: Terminology drift, missing non-functional task coverage, underspecified edge case
  • LOW: Style/wording improvements, minor redundancy not affecting execution order

6. Produce Compact Analysis Report

Output a Markdown report (no file writes) with the following structure:

Specification Analysis Report

IDCategorySeverityLocation(s)SummaryRecommendation
A1DuplicationHIGHspec.md:L120-134Two similar requirements ...Merge phrasing; keep clearer version

(Add one row per finding; generate stable IDs prefixed by category initial.)

Coverage Summary Table:

Requirement KeyHas Task?Task IDsNotes

Constitution Alignment Issues: (if any)

Unmapped Tasks: (if any)

Metrics:

  • Total Requirements
  • Total Tasks
  • Coverage % (requirements with >=1 task)
  • Ambiguity Count
  • Duplication Count
  • Critical Issues Count

7. Provide Next Actions

At end of report, output a concise Next Actions block:

  • If CRITICAL issues exist: Recommend resolving before speckit-implement
  • If only LOW/MEDIUM: User may proceed, but provide improvement suggestions
  • Provide explicit next-step suggestions: e.g., "Run speckit-specify to refine requirements", "Run speckit-plan to adjust architecture", "Manually edit tasks.md to add coverage for 'performance-metrics'"

8. Offer Remediation

Ask the user: "Would you like me to suggest concrete remediation edits for the top N issues?" (Do NOT apply them automatically.)

Outputs

  • Read-only analysis report in the response (no file writes)

Operating Principles

Context Efficiency

  • Minimal high-signal tokens: Focus on actionable findings, not exhaustive documentation
  • Progressive disclosure: Load artifacts incrementally; don't dump all content into analysis
  • Token-efficient output: Limit findings table to 50 rows; summarize overflow
  • Deterministic results: Rerunning without changes should produce consistent IDs and counts

Analysis Guidelines

  • NEVER modify files (this is read-only analysis)
  • NEVER hallucinate missing sections (if absent, report them accurately)
  • Prioritize constitution violations (these are always CRITICAL)
  • Use examples over exhaustive rules (cite specific instances, not generic patterns)
  • Report zero issues gracefully (emit success report with coverage statistics)

Context

the user's request and any stated focus areas

Source

git clone https://github.com/dceoy/speckit-agent-skills/blob/main/skills/speckit-analyze/SKILL.mdView on GitHub

Overview

Speckit-analyze performs a non-destructive review of spec.md, plan.md, and tasks.md to identify inconsistencies, duplications, ambiguities, and underspecified items before implementation. It MUST run only after a complete tasks.md exists (typically after speckit-tasks) and uses the project constitution to validate alignment, outputting a structured report plus an optional remediation plan if approved.

How This Skill Works

On invocation, it loads minimal context from spec.md, plan.md, tasks.md, and constitution.md as defined, builds semantic models such as a requirements inventory and task coverage mapping, and runs targeted detection passes for duplication, ambiguity, underspecification, and constitution alignment. The result is a structured analysis report highlighting issues and optional remediation suggestions.

When to Use It

  • You have spec.md, plan.md, and tasks.md and need a read-only consistency check before implementation.
  • You want to validate cross-artifact coherence after speckit-tasks completes tasks.md.
  • Constitution or principle alignment needs verification against MUST/SHOULD statements.
  • You need to surface ambiguities or underspecified items that could block implementation.
  • You want an optional remediation plan that requires explicit approval before edits.

Quick Start

  1. Step 1: Ensure prerequisites are met and all three artifacts exist (spec.md, plan.md, tasks.md) and constitution loaded.
  2. Step 2: Run speckit-analyze to generate the read-only analysis report.
  3. Step 3: Review the findings and, if needed, request an approved remediation plan before edits.

Best Practices

  • Run only after a complete tasks.md exists.
  • Never modify artifacts; rely on the read-only output.
  • Cross-check all high-priority requirements for measurable criteria.
  • Use the remediation plan only after explicit approval.
  • Keep the analysis report versioned with feature context.

Example Use Cases

  • Spec states a performance goal but plan omits measurement and tasks reference it; analysis flags underspecification and suggests a measurable acceptance criterion.
  • Duplicate requirement phrasing detected across spec and plan; consolidation recommended.
  • Ambiguous terms like fast or scalable found without metrics; remediation plan includes definitions.
  • A task references a file not defined in spec or plan; flagged as missing linkage.
  • Constitution says data must be encrypted in transit; plan lacks crypto model; flagged as non-compliant with CRITICAL alignment.

Frequently Asked Questions

Add this skill to your agents
Sponsor this space

Reach thousands of developers