Skip to content

Z-M-Huang/vcp

Repository files navigation

中文文档

VCP Logo VCP — Multi-AI Pipelines with Built-in Security

VCP — Vibe Coding Protocol

Multi-AI development pipelines with built-in security enforcement.

Visitors GitHub release GitHub license GitHub last commit Windows macOS Linux

41 Standards 12 Scopes OWASP Top 10 21 Skills 9 Agents 6 Hooks

One AI writing and reviewing its own code is like grading your own homework. VCP orchestrates multiple AI models through structured pipelines — then enforces 41 security and quality standards with real-time blocking.

Multi-AI Pipeline Orchestration
❌ VCP Security Gate — BLOCKED:
   CWE-798: Hardcoded secret detected. Use environment variables or a secret manager.

Table of Contents


Quick Start

Prerequisites: Claude Code and Bun. See the Getting Started guide for full setup.

# Add the VCP marketplace
/plugin marketplace add Z-M-Huang/vcp

# Install the plugin
/plugin install vcp@vcp

# Initialize your project
/vcp-init

That's it. Standards are injected at session start, dangerous patterns are blocked on every write, and 10 scanning skills are available on demand.

Docker

Prefer a containerized environment? VCP provides a ready-to-use Docker image with Claude Code, Codex CLI, Gemini CLI, and all dependencies pre-installed:

cd docker/
cp .env.example .env
# Edit .env with your API keys and host paths
docker compose up -d
docker exec -it vcp-docker bash

See docker/README.md for full setup instructions, volume mounts, and platform-specific configuration.


Three Plugins, One Protocol

VCP ships three complementary plugins:

Plugin What It Does Install
VCP Standards enforcement — 41 standards, real-time blocking, 10 skills /plugin install vcp@vcp
Dev Buddy Multi-AI pipeline — configurable stages with role-based prompts, cross-model review gates, specialist analysis team /plugin install vcp@dev-buddy
mcp-doc Documentation manifest generator — indexes project docs as MCP resources with search, path-lookup, and tree-view tools /install vcp@mcp-doc

Use VCP alone for standards enforcement. Add Dev Buddy when you want structured multi-AI workflows with cross-model review.


Why This Matters

Without guardrails vs With VCP

AI coding assistants produce code fast. They also produce code that's 2.74x more likely to contain security vulnerabilities, 40% more complex, and architecturally unsound at scale:

Problem Data Source
Security vulnerabilities 2.74x higher rate than human code; 45% of AI code has vulnerabilities CodeRabbit 2025, Veracode 2025
Code duplication 8-fold increase across 211M lines analyzed GitClear 2024
Complexity growth 40% increase in AI-assisted repositories CMU 2025
Hallucinated packages ~20% of recommendations reference non-existent packages Lasso Security
Refactoring collapse Dropped from 25% to <10% of changed lines GitClear 2024

The death spiral: AI generates working code fast. A bug appears. AI patches the symptom, not the root cause. The patch breaks assumptions elsewhere. Each fix compounds the problem — hack on top of hack. The codebase becomes unmaintainable within months.

VCP breaks this cycle by making the AI aware of engineering principles before it writes code, not after.


The Echo Chamber Problem

The Echo Chamber Problem

When a single AI family writes and reviews code, it shares the same training biases, the same blind spots, and the same failure modes. A Claude model reviewing Claude-generated code — or GPT reviewing GPT — misses the same classes of bugs because the models share architectural lineage and training distributions. Cross-model review breaks this pattern: routing code through independent models from different providers catches issues that same-family review consistently overlooks. Dev Buddy makes this practical with structured pipelines that enforce cross-model review at every stage.


Dev Buddy — Multi-AI Pipeline

Multi-AI Pipeline Orchestration

One AI writing and reviewing its own code is like grading your own homework. Dev Buddy implements a Ralph loop workflow — fresh context per iteration, specs on disk, iterate until correct. It orchestrates multiple AI models through 6 stages with task-based dependencies that literally prevent skipping stages.

The 6 Stages

Stage What Happens Multi-AI
Discovery Explore codebase + running app. Map code paths, patterns, impact points. Source of truth audit. Yes
Requirements + UAT Define ACs (Given/When/Then + misinterpretation + partial implementation trap). Design Playwright UAT scenarios. Yes
Decomposition Break into ~50 LOC units. Each unit gets its own plan file with interface contracts, test stubs, and data flow traces. Yes
Build Per-unit implementation with fresh context. Orchestrator independently runs backpressure. Single
Code Review Flow tracing (point + path + intent). Stub/orphan detection. Cross-unit integration. Yes
UAT Execute Playwright tests + all mechanical backpressure against running app. Single

Two nested loops + review gate:

  • Inner (BUILD -> CODE REVIEW): per-unit Ralph loop — fresh context from disk, implement, mechanical backpressure (test/typecheck/lint), retry up to max_build_attempts. Code review can send units back for rework.
  • Outer (UAT): integration Ralph loop — real Playwright UAT against running app. Failures identify affected units and loop back through BUILD and CODE REVIEW.
  • User checkpoints after Discovery, Requirements, and Decompose — approve, reject, or provide additional context.

Enforcement Stack

Layer 1: Unit plan + contracts   <- intent, data flow traces, authoritative sources
Layer 2: Mechanical backpressure <- compilation, types, lint errors
Layer 3: Orchestrator verify     <- subagent lies, missing sections, source violations
Layer 4: Code review (multi-AI)  <- flow tracing, stub detection, drift probe
Layer 5: UAT (Playwright)        <- real user scenario failures
Layer 6: User checkpoint         <- everything above missed
Layer 7: TaskManagement          <- process compliance (no skipping)
Layer 8: Plan files on disk      <- state survival after compaction

Quick Start

# Install dev-buddy alongside VCP
/plugin install vcp@dev-buddy

# Run the full Ralph workflow
/dev-buddy-ralph Add user authentication with JWT

# Configure pipeline stages and providers via web portal
/dev-buddy-config
Real pipeline in action — 5 concurrent reviews across MiniMax, Qwen, Kimi, GLM, Codex

VCP — Three-Layer Enforcement

Three-Layer Enforcement: Prevent, Scan, Block

No single layer catches everything. Layer 1 prevents violations at the source. Layer 3 blocks the most dangerous patterns instantly. Layer 2 catches the nuanced issues through deep analysis. Together they provide defense in depth.

Layer 1: Proactive Context — Prevent Before Writing

At session start, VCP injects a compact summary of all applicable rules into the AI's context. The AI internalizes security, architecture, testing, and quality rules while it writes code — preventing violations at the source.

Run /vcp-context to re-inject rules at any time (useful after context compaction in long sessions).

Layer 2: On-Demand Scanning — Deep Analysis

Skills scan code against 41 standards across 12 scopes using AI-driven analysis:

Skill What It Does
/vcp-audit Full audit against all applicable standards — security, architecture, quality, compliance
/vcp-pre-commit-review Reviews all changed files before commit, produces PASS/BLOCK verdict
/vcp-dependency-check Lockfile hygiene, version ranges, package existence, typosquatting detection
/vcp-review-tests Test quality: over-mocking, tautological tests, missing edge cases
/vcp-coverage-gaps Maps source to test files, finds untested functions and missing edge cases
/vcp-test-plan Generates test plans with unit/integration tests, edge cases, and mock guidance
/vcp-root-cause-check Analyzes bug fixes for root cause vs. symptom patching

Layer 3: Real-Time Blocking — Stop Dangerous Code Instantly

A security gate hook runs on every Write, Edit, and Bash call, blocking dangerous patterns before they reach disk:

21 patterns across 9 CWEs — click to expand
CWE What It Catches
CWE-798 Hardcoded secrets, AWS keys, private keys, JWT tokens, DB connection strings, Bearer tokens, API key prefixes
CWE-89 SQL injection via string concatenation and template literals
CWE-95 Code injection via dangerous dynamic code execution with user input
CWE-79 XSS via innerHTML with variable assignment
CWE-502 Insecure deserialization: unsafe Python object loading, unsafe YAML, node-serialize
CWE-643 XPath injection via string concatenation
CWE-1321 Prototype pollution via __proto__ or constructor.prototype
CWE-1336 Server-side template injection (SSTI): Jinja2, Handlebars with variable input
CWE-116 Encoded data piped to shell execution

Coverage Backed by Industry Standards

VCP standards are mapped against authoritative security frameworks:

  • OWASP Top 10:2025 — All 10 categories covered
  • OWASP Agentic AI Security Top 10 (ASI) — All 10 categories covered (ASI01–ASI10)
  • CWE Top 25:2024 — 19/25 covered (6 uncovered are memory-safety, out of scope for managed languages)
  • OWASP API Security Top 10:2023 — All 10 categories addressed
  • OWASP ASVS v5.0 — 15/17 chapters covered
  • OWASP Docker Security — 11/13 controls covered

Standards Coverage

41 standards across 12 scopes:

Scope Standards What They Cover
Core (always active) 12 Security, architecture, root cause analysis, code quality, error handling, testing, dependency management, secure defaults, API misuse prevention, attack surface analysis, data flow security, concurrency security
Web Frontend 4 XSS prevention, CSP, accessibility (WCAG 2.2), performance, component structure
Web Backend 6 Injection prevention, API design, data access, WebSocket/SSE, caching security, backend structure
Database 2 Encryption (TDE, column-level, key management), schema security (RLS, masking, audit)
Mobile 2 Keychain/KeyStore, certificate pinning, deep links, biometrics, attestation, platform configuration
Desktop 1 Electron context isolation, Tauri capabilities, IPC validation, code signing
CLI 1 Shell injection, argument injection, exit codes, signal handling
DevOps 4 Containers, CI/CD, Infrastructure as Code, Kubernetes
Agentic AI 5 Agent security (prompt injection, code execution, memory poisoning), tool security (MCP vetting, allowlists), permissions (least privilege, rogue detection), supply chain (MCP integrity, model provenance), communication (inter-agent auth, cascading failures) — OWASP ASI Top 10
Compliance — GDPR 1 Data deletion, retention, consent, PII handling
Compliance — PCI DSS 1 Tokenization, card masking, CDE isolation
Compliance — HIPAA 1 PHI encryption, audit logging, retention, minimum necessary
Compliance — Accessibility 1 ADA, Section 508/504, EAA, PSBAR, AODA, ACA, EN 301 549, WCAG conformance mapping, accessibility statements, VPAT/ACR

All standards follow a consistent format: WHY (the principle), WHAT (numbered actionable rules), HOW (code examples and anti-patterns). See standards/README.md for the format specification.


Organization-Wide Standards

VCP's manifest system lets organizations enforce their own rules across all projects and developers — alongside or instead of VCP defaults.

Root Manifest (manifest.json)
├── core scope     → https://your-org.github.io/standards/scopes/core.json
│   ├── core-security.md      (VCP default)
│   ├── core-architecture.md  (VCP default)
│   └── org-coding-style.md   (your custom standard)
├── web-backend    → https://your-org.github.io/standards/scopes/web-backend.json
│   ├── web-backend-security.md   (VCP default)
│   └── org-api-conventions.md    (your custom standard)
└── org-internal   → https://your-org.github.io/standards/scopes/org-internal.json
    ├── org-logging-policy.md     (your custom standard)
    └── org-data-classification.md (your custom standard)
Set up for your organization — click to expand

1. Create your standards

Write markdown files following the VCP format spec. Each standard has YAML frontmatter, a principle, numbered rules with code examples, and anti-patterns.

2. Create scope manifests

JSON files listing your standards with severity and tags:

{
  "scope": "org-internal",
  "standards": [
    {
      "id": "org-logging-policy",
      "url": "https://your-org.github.io/standards/org-logging-policy.md",
      "severity": "high",
      "tags": ["logging", "compliance"]
    }
  ]
}

3. Create a root manifest

Point to your scope manifests (include VCP defaults or replace them):

{
  "version": "2.0",
  "repository": "https://github.com/your-org/vcp-standards",
  "scopes": {
    "core": {
      "manifest": "https://your-org.github.io/standards/scopes/core.json",
      "applies": "always"
    },
    "org-internal": {
      "manifest": "https://your-org.github.io/standards/scopes/org-internal.json",
      "applies": "always"
    }
  }
}

4. Point VCP to your manifest

Set the URL globally (applies to all projects) or per-project:

# Global — all projects on this machine use your org's standards
/vcp-config global set standards_url https://your-org.github.io/standards/manifest.json

# Per-project — override for a specific repo
/vcp-config set standards_url https://your-org.github.io/standards/manifest.json

What this enables:

  • Consistent enforcement — Every developer using AI coding tools follows the same rules
  • Mix and match — Include VCP's default standards alongside your own, or replace them entirely
  • Central updates — Update a standard once, every project picks it up on next session
  • Schema validation — Manifests are validated against published JSON schemas for correctness

Configuration

VCP uses two config files — click to expand
File Scope Purpose
~/.vcp/config.json Global (machine-wide) Standards URL, plugin path, default severity/scopes/compliance/ignore
.vcp/config.json Project Scopes, compliance frameworks, severity threshold, frameworks, exclude patterns, ignore rules

Manage via natural language with /vcp-config:

/vcp-config ignore core-architecture          # Suppress a standard
/vcp-config ignore core-security/rule-3       # Suppress a specific rule
/vcp-config ignore CWE-798                    # Suppress a security gate pattern
/vcp-config enable database scope             # Toggle a scope
/vcp-config add gdpr compliance               # Add a compliance framework
/vcp-config set severity to high              # Change severity threshold
/vcp-config global show                       # View global config

Core Philosophy

  1. Security comes first. No feature is worth a vulnerability.
  2. Architecture comes second. Every change respects the system's structure.
  3. Fix the root cause, not the symptom. Trace bugs to where they originate. Break the death spiral.
  4. Principled, not prescriptive. Explain WHY, not just WHAT. Allow alternatives that satisfy the principle.
  5. AI-parseable. Standards are structured for machine consumption — consistent format, unambiguous rules.

Documentation

Full documentation is on the VCP Wiki:


How to Contribute

  • Report a vibe coding problem — Encountered a real issue from AI-generated code? Open a problem report. Your experience directly informs which standards we prioritize.
  • Propose a new standard — Have an idea that would prevent a class of AI coding problems? Propose a standard. Review the format spec first.
  • Contribute to existing standards — Pick an open issue, read the requirements, and submit a PR.

Repo Structure

Project layout — click to expand
vcp/
├── standards/           # 41 AI-optimized principled standards across 12 scopes
│   ├── manifest.json    # Root manifest — full HTTPS URLs, org-customizable
│   ├── scopes/          # Per-scope manifest files
│   ├── core-*.md        # Universal: security, architecture, testing, etc.
│   ├── web-*.md         # Frontend and backend web standards
│   ├── database-*.md    # Encryption, schema security
│   ├── mobile-*.md      # Credential storage, cert pinning, biometrics
│   ├── desktop-*.md     # Electron/Tauri isolation, IPC security
│   ├── cli-*.md         # Shell injection, argument injection, exit codes
│   ├── devops-*.md      # Containers, CI/CD, IaC, Kubernetes
│   ├── agentic-ai-*.md  # Agent security, tool security, permissions, supply chain, communication
│   └── compliance-*.md  # GDPR, PCI DSS, HIPAA, Accessibility
├── schemas/             # JSON schemas for config and manifest validation
├── plugins/vcp/         # VCP plugin — standards enforcement (skills, hooks, agents)
├── plugins/dev-buddy/   # Dev Buddy plugin — multi-AI pipeline orchestration
├── plugins/mcp-doc/     # mcp-doc plugin — documentation manifest generator
├── docker/              # Docker image — Claude Code, Codex CLI, Gemini CLI
└── .claude-plugin/      # Marketplace manifest

References

Research

Frameworks


License

Apache License 2.0

About

Vibe Coding Protocal - Security-first protocol for AI-generated code, multiple standards with real-time enforcement and multi-AI pipeline orchestration

Topics

Resources

License

Stars

Watchers

Forks

Packages

 
 
 

Contributors