rm -rf /Mass deletion of root or wide paths.
Nanostack helps an agent challenge scope, plan the change, build, review, audit, test, and ship with a record of what happened. Use the default sprint, or build your own workflow stack on top.
Verified adapters today: Claude Code · Cursor · OpenAI Codex · OpenCode · Gemini CLI.
The skill files are plain text, so other agents may load them. Only those five have a verified adapter in this repo.
The default sprint turns a vague request into a scoped, reviewed, audited, tested change with a PR and a sprint journal. Each phase reads the artifact the previous phase wrote, so context does not vanish between steps. The framework layer lets you add your own phases on top.
Think, plan, build, review, security, qa, and ship. Seven phases that keep product thinking, planning, implementation, review, audit, verification, and release connected.
Each phase saves a structured artifact under .nanostack/. Downstream phases read it through the resolver instead of relying on chat memory. New artifacts carry a SHA-256 integrity field.
Add custom skills, wire them with phase_graph, and the same lifecycle handles routing, artifacts, journals, analytics, and conductor scheduling. Create a skill →
A full delivery loop. Not just code generation. The agent pushes back on scope, ships what matters, and leaves a record behind.
I need Stripe payments. Users should subscribe to a monthly plan.
Checkout + webhook. Let's go.
The default sprint is the workflow Nanostack ships out of the box. It keeps product thinking, planning, implementation, review, security, QA, and shipping connected through artifacts.
This is the default. Add your own phases or create custom skills to extend it.
/review, /security and /qa support --quick, --standard, --thorough. All commands →
Security by oktsec
Guard evaluates commands before the agent executes them. Block rules run before the allowlist, so a safe binary with a dangerous argument still gets stopped.
rm -rf /Mass deletion of root or wide paths.
git push --forceHistory destruction on protected branches.
DROP TABLEDatabase destruction without an explicit WHERE guard.
kubectl deleteInfrastructure destruction on production namespaces.
curl | shRemote code execution through pipe-to-shell.
--no-verifySafety bypass on commit and push hooks.
Write, Edit, and MultiEdit go through their own hook. It blocks protected paths, credential files, credential JSON basenames, and system secret directories after resolving symlinks.
Safe templates such as .env.example and credentials.example.json remain usable.
Hard blocking depends on the host. Claude Code can enforce through hooks. Other verified adapters may run the same workflow as guided instructions or reported checks, depending on their capability file. The source of truth is adapters/<host>.json in the repo.
Each phase writes a structured artifact. The next phase reads it through the resolver. New artifacts carry an integrity hash, so strict consumers can refuse to read a corrupted upstream.
Every phase writes JSON under .nanostack/. New artifacts carry a SHA-256 integrity field. Schemas catch malformed outputs before downstream phases depend on them.
find-artifact.sh can verify integrity, and strict consumers can require it with --require-integrity. Legacy artifacts are marked instead of silently pretending to be structured evidence.
Every skill starts with resolve.sh. It returns upstream artifacts, past solutions, config, phase_context, routing.trust, and upstream_status in one JSON object.
Custom phases declare dependencies in phase_graph. Session state, next-step output, conductor scheduling, guard concurrency, journals, analytics, and discard all read the same graph.
/compound and sprint journals turn solved problems into reusable knowledge, still stored locally under .nanostack/. /nano and /review search past solutions before planning.
Nanostack is not only the default sprint. It is a framework for adding phases that match how your team ships.
bin/create-skill.sh license-audit --concurrency read --depends-on build bin/check-custom-skill.sh .nanostack/skills/license-audit
The skill can save artifacts, read upstream context, appear in journals and analytics, and be scheduled by the conductor. resolve.sh returns phase_kind: "custom", and upstream artifacts are driven by depends_on or phase_graph.
The compliance-release example adds /license-audit, /privacy-check, and /release-readiness before /ship. It is not a certification product. It is a worked example of a domain workflow with contract checks and runtime E2E coverage.
49 static contract checks. A 15-cell, 51-assertion runtime harness in the opt-in E2E workflow.
Each example runs the default sprint on a tiny app. Start with what you know, then move up.
Detects your agents, installs the skills, and runs setup. Then run /nano-run in your agent to configure the project.
Does not modify your code.
Targets: claude, codex, cursor, opencode, gemini, auto.
/nano-update
Requires macOS, Linux, or Windows through Git Bash or WSL. Requires git and jq. The installer itself is run through npx.
By default, sprint artifacts, plans, journals, and know-how stay under .nanostack/ on your machine. Nanostack does not send your code, prompts, project names, or file paths to a Nanostack server.
Your AI agent provider may still process the context you give it. Use your provider's privacy settings and your own data policies for sensitive work.
/think supports local_only, private, and public search modes, so sensitive ideas do not require public web search.
Telemetry is opt-in and limited to aggregate usage events. If enabled, it is documented in TELEMETRY.md.
Build your own stack when the workflow needs to match your team.