Ecosystem / 01 Ecosystem

Ecosystem

Stackbilder is built on multiple complementary tools that enforce governance across the full development lifecycle.

The Pieces

ToolLicenseRole
Charter (@stackbilt/cli)Apache-2.0 (open source)Local + CI governance runtime with ADF context compiler
AEGIS (@stackbilt/aegis-core)Open sourceInter-agent orchestration framework and MCP-based task management
StackbilderCommercialUnified platform on stackbilder.com — architecture generation, scaffold engine, Evidence Engine, Worker Observability, Consultations, img-forge

Charter and AEGIS are the open-source foundations. Stackbilder is the commercial platform that wraps them.

Service Map

ServiceURLPurpose
Stackbilderstackbilder.comUnified platform Worker — UI, REST API, scaffold engine, governance, Evidence Engine, Observability
Authauth.stackbilt.devAuthentication service (Better Auth + D1, OAuth, SSO) — service binding from Stackbilder
img-forgeimgforge.stackbilt.devMulti-provider image generation gateway — service binding from Stackbilder
MCP gatewaymcp.stackbilt.dev/mcpOAuth-authenticated MCP Worker that proxies to TarotScript / img-forge / Engine / Deployer. Sibling consumer of the platform’s product workers (see MCP Gateway)
Trust verifiertrust.stackbilder.com/evidence/:hashPublic Evidence Engine receipt verifier (anti-probe semantics)

How They Fit Together

                                      ┌──────────────────────┐
                                      │  AI agent / LM       │
                                      │  (Claude Code, etc.) │
                                      └──────────┬───────────┘
                                                 │  OAuth + MCP

                                      ┌──────────────────────┐
                                      │  mcp.stackbilt.dev   │
   ┌─ human ─►─ stackbilder.com ──┐   │   (MCP gateway)      │
   │              (web UI + API)  │   └──────────┬───────────┘
   │                              │              │
   │                              ▼              ▼
   │                     ┌─────────────────────────────────────┐
   │                     │  Backend product Workers            │
   │                     │  ─ tarotscript-worker (scaffold)    │
   │                     │  ─ img-forge-mcp                    │
   │                     │  ─ stackbilt-engine (architecture)  │
   │                     │  ─ stackbilt-deployer (CF deploy)   │
   │                     │  ─ edge-auth (entitlements + quota) │
   │                     └─────────────────────────────────────┘

   └─ CLI ─►─ Charter (charter blast / surface) ──► same backends via API

A single user prompt — “build me an X” — flows through whichever consumer is closest:

IDEA


runFullFlowAsync(idea)              ← invoked from web UI, MCP tool, or REST
  → PRODUCT → UX → RISK → ARCHITECT → TDD → SPRINT

       └── inline governance: blessed-pattern enforcement,
           red-team review, ADR persistence (Pro/Team tiers)


getFlowScaffold(flowId) → deployable project


Charter: validate + drift → commit and stack compliance


SHIPPED (governed)

Charter: Local Enforcement + ADF Context Compiler

Charter runs in your terminal and CI pipeline. It validates commit trailers, scores drift against your blessed stack, and blocks merges on violations. Zero SaaS dependency - all checks are deterministic and local.

Charter also ships ADF (Attention-Directed Format) - a modular, AST-backed context system that replaces monolithic .cursorrules and claude.md files with compiled, trigger-routed .ai/ modules. ADF treats LLM context as a compiled language: emoji-decorated semantic keys, typed patch operations, manifest-driven progressive disclosure, and metric ceilings with CI evidence gating.

npm install --save-dev @stackbilt/cli
npx charter setup --preset fullstack --ci github --yes
npx charter adf init    # scaffold .ai/ context directory

Governance commands: validate, drift, audit, classify, hook install. ADF commands: adf init, adf fmt, adf patch, adf bundle, adf sync, adf evidence.

For quantitative analysis of ADF’s impact on autonomous system architecture, see the Context-as-Code white paper.

Stackbilder: Architecture + Scaffold + Trust

The 6-mode pipeline (PRODUCT → UX → RISK → ARCHITECT → TDD → SPRINT) produces structured artifacts with cross-referenced IDs. After completion, the scaffold engine generates a deployable Cloudflare Workers project. On Pro/Team, additional capabilities run alongside the scaffold pipeline:

  • Evidence Engine — content E-E-A-T validation and tamper-evident receipts (stackbilder.com/api/v1/evidence/*, see API Reference)
  • Worker Observability — hosted telemetry ingest + dashboard
  • Consultations — CISO and CTO advisory flows backed by structured prompts and receipt-bound deliverables
  • Inline governance — blessed-pattern enforcement, red-team review, ADR persistence (replaces the previously-standalone Compass service binding)

Available via:

  • Browser UI at stackbilder.com (interactive, human users)
  • REST API at stackbilder.com/api/* (direct HTTP — Charter CLI, server-to-server, CI; see API Reference)
  • MCP gateway at mcp.stackbilt.dev/mcp (OAuth-authenticated agent access; routes scaffold/image/deploy tools to the same backend Workers — see MCP Gateway)

Lightweight Agent Pattern

The recommended agent workflow downloads ~40KB total (down from 300KB+):

runFullFlowAsync → getFlowSummary polls → getArtifact per mode → getFlowScaffold

Governance Modes by Plan

PlanMax ModeBehavior
FreePASSIVELog only — never blocks
ProADVISORYWarn on issues, flow continues
TeamENFORCEDBlock on FAIL, require remediation

When governance mode is capped by plan tier, a soft upsell prompt appears in the governanceState response.

Blessed Patterns

The platform maintains a ledger of approved technology patterns. These are injected into the ARCHITECT prompt automatically when governance is enabled. Example:

  • Compute: Cloudflare Workers (not AWS Lambda)
  • Database: Cloudflare D1 (not PostgreSQL)
  • Cache: Cloudflare KV (not Redis)
  • Queue: Cloudflare Queues (not SQS)

Worker Observability: ODD-Driven Monitoring

@stackbilt/worker-observability is the OSS library (Apache-2.0). The hosted Pro product on stackbilder.com wraps it with D1 storage and a dashboard.

ODD Pillars (Observability → Debugging → Diagnostics)

PillarSignalLibrary classD1 tables
ObservabilityMetrics, request counts, healthMetricsCollector, Loggertraces, metrics
DebuggingTraces, spans, correlated logsTracer, Spanspans, logs
DiagnosticsAlerts, SLI/SLO statusAlertManager, SLIMonitoralert_incidents

Tier Gating

FeatureFreePro ($29/mo)
Retention24h30d
Workers1Unlimited
Traces + logsHealth status onlyFull drilldown
SLI/SLO trackingYes
Alert historyYes

Integration (3 lines)

import { createMonitoring } from '@stackbilt/worker-observability';
const obs = createMonitoring({
  service: 'my-worker',
  version: '1.0.0',
  stackbilt: {
    endpoint: 'https://stackbilder.com/api/observe/ingest',
    token: env.STACKBILT_TOKEN,
  },
});

Governance-First Development

Every significant decision flows through governance before implementation:

  1. Pre-approval — Stackbilder validates the idea against policy during the PRODUCT/RISK modes
  2. Architecture — Stackbilder generates a governed blueprint with blessed patterns injected into ARCHITECT
  3. Review — Inline red-team review runs against the architecture output
  4. Record — ADRs are persisted to the governance ledger (when autoPersist: true)
  5. Scaffold — Stackbilder generates deployable project files
  6. Commit — Charter enforces Governed-By: trailer compliance at the repo level
  7. Evidence — Charter validates ADF metric ceilings (adf evidence --auto-measure --ci)
  8. CI — Charter blocks merges on drift violations or metric ceiling breaches

Authentication

Stackbilder issues two credential types, both accepted at every endpoint:

  • Session cookiebetter-auth.session_token, set during OAuth sign-in (GitHub, Google) at auth.stackbilt.dev. Used by the browser UI.
  • API keyAuthorization: Bearer ea_*, issued from /settings. Used by Charter CLI, server-to-server pipelines, and MCP-style consumers.

API key resolution: GET /api/account/me returns the caller’s identity (userId, orgId, plan) — useful for tier-aware routing in CI scripts.