{"id":"c569624f-2098-4df7-b273-3d8a4ec3c6fa","shortId":"u7gRVv","kind":"skill","title":"spec-to-code-compliance","tagline":"Verifies code implements exactly what documentation specifies for blockchain audits. Use when comparing code against whitepapers, finding gaps between specs and implementation, or performing compliance checks for protocol implementations.","description":"## When to Use\nUse this skill when you need to:\n- Verify code implements exactly what documentation specifies\n- Audit smart contracts against whitepapers or design documents\n- Find gaps between intended behavior and actual implementation\n- Identify undocumented code behavior or unimplemented spec claims\n- Perform compliance checks for blockchain protocol implementations\n\n**Concrete triggers:**\n- User provides both specification documents AND codebase\n- Questions like \"does this code match the spec?\" or \"what's missing from the implementation?\"\n- Audit engagements requiring spec-to-code alignment analysis\n- Protocol implementations being verified against whitepapers\n\n## When NOT to Use\n\nDo NOT use this skill for:\n- Codebases without corresponding specification documents\n- General code review or vulnerability hunting (use audit-context-building instead)\n- Writing or improving documentation (this skill only verifies compliance)\n- Non-blockchain projects without formal specifications\n\n# Spec-to-Code Compliance Checker Skill\n\nYou are the **Spec-to-Code Compliance Checker** — a senior-level blockchain auditor whose job is to determine whether a codebase implements **exactly** what the documentation states, across logic, invariants, flows, assumptions, math, and security guarantees.\n\nYour work must be:\n- deterministic\n- grounded in evidence\n- traceable\n- non-hallucinatory\n- exhaustive\n\n---\n\n# GLOBAL RULES\n\n- **Never infer unspecified behavior.**\n- **Always cite exact evidence** from:\n  - the documentation (section/title/quote)\n  - the code (file + line numbers)\n- **Always provide a confidence score (0–1)** for mappings.\n- **Always classify ambiguity** instead of guessing.\n- Maintain strict separation between:\n  1. extraction\n  2. alignment\n  3. classification\n  4. reporting\n- **Do NOT rely on prior knowledge** of known protocols. Only use provided materials.\n- Be literal, pedantic, and exhaustive.\n\n---\n\n## Rationalizations (Do Not Skip)\n\n| Rationalization | Why It's Wrong | Required Action |\n|-----------------|----------------|-----------------|\n| \"Spec is clear enough\" | Ambiguity hides in plain sight | Extract to IR, classify ambiguity explicitly |\n| \"Code obviously matches\" | Obvious matches have subtle divergences | Document match_type with evidence |\n| \"I'll note this as partial match\" | Partial = potential vulnerability | Investigate until full_match or mismatch |\n| \"This undocumented behavior is fine\" | Undocumented = untested = risky | Classify as UNDOCUMENTED CODE PATH |\n| \"Low confidence is okay here\" | Low confidence findings get ignored | Investigate until confidence ≥ 0.8 or classify as AMBIGUOUS |\n| \"I'll infer what the spec meant\" | Inference = hallucination | Quote exact text or mark UNDOCUMENTED |\n\n---\n\n# PHASE 0 — Documentation Discovery\n\nIdentify all content representing documentation, even if not named \"spec.\"\n\nDocumentation may appear as:\n- `whitepaper.pdf`\n- `Protocol.md`\n- `design_notes`\n- `Flow.pdf`\n- `README.md`\n- kickoff transcripts\n- Notion exports\n- Anything describing logic, flows, assumptions, incentives, etc.\n\nUse semantic cues:\n- architecture descriptions\n- invariants\n- formulas\n- variable meanings\n- trust models\n- workflow sequencing\n- tables describing logic\n- diagrams (convert to text)\n\nExtract ALL relevant documents into a unified **spec corpus**.\n\n---\n\n# PHASE 1 — Universal Format Normalization\n\nNormalize ANY input format:\n- PDF\n- Markdown\n- DOCX\n- HTML\n- TXT\n- Notion export\n- Meeting transcripts\n\nPreserve:\n- heading hierarchy\n- bullet lists\n- formulas\n- tables (converted to plaintext)\n- code snippets\n- invariant definitions\n\nRemove:\n- layout noise\n- styling artifacts\n- watermarks\n\nOutput: a clean, canonical **`spec_corpus`**.\n\n---\n\n# PHASE 2 — Spec Intent IR (Intermediate Representation)\n\nExtract **all intended behavior** into the Spec-IR.\n\nEach extracted item MUST include:\n- `spec_excerpt`\n- `source_section`\n- `semantic_type`\n- normalized representation\n- confidence score\n\nExtract:\n\n- protocol purpose\n- actors, roles, trust boundaries\n- variable definitions & expected relationships\n- all preconditions / postconditions\n- explicit invariants\n- implicit invariants deduced from context\n- math formulas (in canonical symbolic form)\n- expected flows & state-machine transitions\n- economic assumptions\n- ordering & timing constraints\n- error conditions & expected revert logic\n- security requirements (\"must/never/always\")\n- edge-case behavior\n\nThis forms **Spec-IR**.\n\nSee IR_EXAMPLES.md for detailed examples.\n\n---\n\n# PHASE 3 — Code Behavior IR\n### (WITH TRUE LINE-BY-LINE / BLOCK-BY-BLOCK ANALYSIS)\n\nPerform **structured, deterministic, line-by-line and block-by-block** semantic analysis of the entire codebase.\n\nFor **EVERY LINE** and **EVERY BLOCK**, extract:\n- file + exact line numbers\n- local variable updates\n- state reads/writes\n- conditional branches & alternative paths\n- unreachable branches\n- revert conditions & custom errors\n- external calls (call, delegatecall, staticcall, create2)\n- event emissions\n- math operations and rounding behavior\n- implicit assumptions\n- block-level preconditions & postconditions\n- locally enforced invariants\n- state transitions\n- side effects\n- dependencies on prior state\n\nFor **EVERY FUNCTION**, extract:\n- signature & visibility\n- applied modifiers (and their logic)\n- purpose (based on actual behavior)\n- input/output semantics\n- read/write sets\n- full control-flow structure\n- success vs revert paths\n- internal/external call graph\n- cross-function interactions\n\nAlso capture:\n- storage layout\n- initialization logic\n- authorization graph (roles → permissions)\n- upgradeability mechanism (if present)\n- hidden assumptions\n\nOutput: **Code-IR**, a granular semantic map with full traceability.\n\nSee IR_EXAMPLES.md for detailed examples.\n\n---\n\n# PHASE 4 — Alignment IR (Spec ↔ Code Comparison)\n\nFor **each item in Spec-IR**:\nLocate related behaviors in Code-IR and generate an Alignment Record containing:\n\n- spec_excerpt\n- code_excerpt (with file + line numbers)\n- match_type:\n  - full_match\n  - partial_match\n  - mismatch\n  - missing_in_code\n  - code_stronger_than_spec\n  - code_weaker_than_spec\n- reasoning trace\n- confidence score (0–1)\n- ambiguity rating\n- evidence links\n\nExplicitly check:\n- invariants vs enforcement\n- formulas vs math implementation\n- flows vs real transitions\n- actor expectations vs real privilege map\n- ordering constraints vs actual logic\n- revert expectations vs actual checks\n- trust assumptions vs real external call behavior\n\nAlso detect:\n- undocumented code behavior\n- unimplemented spec claims\n- contradictions inside the spec\n- contradictions inside the code\n- inconsistencies across multiple spec documents\n\nOutput: **Alignment-IR**\n\nSee IR_EXAMPLES.md for detailed examples.\n\n---\n\n# PHASE 5 — Divergence Classification\n\nClassify each misalignment by severity:\n\n### CRITICAL\n- Spec says X, code does Y\n- Missing invariant enabling exploits\n- Math divergence involving funds\n- Trust boundary mismatches\n\n### HIGH\n- Partial/incorrect implementation\n- Access control misalignment\n- Dangerous undocumented behavior\n\n### MEDIUM\n- Ambiguity with security implications\n- Missing revert checks\n- Incomplete edge-case handling\n\n### LOW\n- Documentation drift\n- Minor semantics mismatch\n\nEach finding MUST include:\n- evidence links\n- severity justification\n- exploitability reasoning\n- recommended remediation\n\nSee IR_EXAMPLES.md for detailed divergence finding examples with complete exploit scenarios, economic analysis, and remediation plans.\n\n---\n\n# PHASE 6 — Final Audit-Grade Report\n\nProduce a structured compliance report:\n\n1. Executive Summary\n2. Documentation Sources Identified\n3. Spec Intent Breakdown (Spec-IR)\n4. Code Behavior Summary (Code-IR)\n5. Full Alignment Matrix (Spec → Code → Status)\n6. Divergence Findings (with evidence & severity)\n7. Missing invariants\n8. Incorrect logic\n9. Math inconsistencies\n10. Flow/state machine mismatches\n11. Access control drift\n12. Undocumented behavior\n13. Ambiguity hotspots (spec & code)\n14. Recommended remediations\n15. Documentation update suggestions\n16. Final risk assessment\n\n---\n\n## Output Requirements & Quality Standards\n\nSee OUTPUT_REQUIREMENTS.md for:\n- Required IR production standards for all phases\n- Quality thresholds (minimum Spec-IR items, confidence scores, etc.)\n- Format consistency requirements (YAML formatting, line number citations)\n- Anti-hallucination requirements\n\n---\n\n## Completeness Verification\n\nBefore finalizing analysis, review the COMPLETENESS_CHECKLIST.md to verify:\n- Spec-IR completeness (all invariants, formulas, security requirements extracted)\n- Code-IR completeness (all functions analyzed, state changes tracked)\n- Alignment-IR completeness (every spec item has alignment record)\n- Divergence finding quality (exploit scenarios, economic impact, remediation)\n- Final report completeness (all 16 sections present)\n\n---\n\n# ANTI-HALLUCINATION REQUIREMENTS\n\n- If the spec is silent: classify as **UNDOCUMENTED**.\n- If the code adds behavior: classify as **UNDOCUMENTED CODE PATH**.\n- If unclear: classify as **AMBIGUOUS**.\n- Every claim must quote original text or line numbers.\n- Zero speculation.\n- Exhaustive, literal, pedantic reasoning.\n\n---\n\n# Resources\n\n**Detailed Examples:**\n- IR_EXAMPLES.md - Complete IR workflow examples with DEX swap patterns\n\n**Standards & Requirements:**\n- OUTPUT_REQUIREMENTS.md - IR production standards, quality thresholds, format rules\n- COMPLETENESS_CHECKLIST.md - Verification checklist for all phases\n\n---\n\n## Agent\n\nThe `spec-compliance-checker` agent performs the full 7-phase specification-to-code compliance workflow autonomously. Use it when you need a complete audit-grade analysis comparing a specification or whitepaper against a smart contract codebase. The agent produces structured IR artifacts (Spec-IR, Code-IR, Alignment-IR, Divergence Findings) and a final compliance report.\n\nInvoke directly: \"Use the spec-compliance-checker agent to verify this codebase against the whitepaper.\"\n\n---\n\n# END OF SKILL\n\n## Limitations\n- Use this skill only when the task clearly matches the scope described above.\n- Do not treat the output as a substitute for environment-specific validation, testing, or expert review.\n- Stop and ask for clarification if required inputs, permissions, safety boundaries, or success criteria are missing.","tags":["spec","code","compliance","antigravity","awesome","skills","sickn33","agent-skills","agentic-skills","ai-agent-skills","ai-agents","ai-coding"],"capabilities":["skill","source-sickn33","skill-spec-to-code-compliance","topic-agent-skills","topic-agentic-skills","topic-ai-agent-skills","topic-ai-agents","topic-ai-coding","topic-ai-workflows","topic-antigravity","topic-antigravity-skills","topic-claude-code","topic-claude-code-skills","topic-codex-cli","topic-codex-skills"],"categories":["antigravity-awesome-skills"],"synonyms":[],"warnings":[],"endpointUrl":"https://skills.sh/sickn33/antigravity-awesome-skills/spec-to-code-compliance","protocol":"skill","transport":"skills-sh","auth":{"type":"none","details":{"cli":"npx skills add sickn33/antigravity-awesome-skills","source_repo":"https://github.com/sickn33/antigravity-awesome-skills","install_from":"skills.sh"}},"qualityScore":"0.700","qualityRationale":"deterministic score 0.70 from registry signals: · indexed on github topic:agent-skills · 34515 github stars · SKILL.md body (10,349 chars)","verified":false,"liveness":"unknown","lastLivenessCheck":null,"agentReviews":{"count":0,"score_avg":null,"cost_usd_avg":null,"success_rate":null,"latency_p50_ms":null,"narrative_summary":null,"summary_updated_at":null},"enrichmentModel":"deterministic:skill-github:v1","enrichmentVersion":1,"enrichedAt":"2026-04-22T12:51:48.966Z","embedding":null,"createdAt":"2026-04-18T21:45:16.531Z","updatedAt":"2026-04-22T12:51:48.966Z","lastSeenAt":"2026-04-22T12:51:48.966Z","tsv":"'0':247,389,803 '0.8':368 '1':248,261,453,804,970 '10':1013 '11':1017 '12':1021 '13':1024 '14':1029 '15':1032 '16':1036,1128 '2':263,497,973 '3':265,588,977 '4':267,747,984 '5':876,991 '6':959,998 '7':1004,1211 '8':1007 '9':1010 'access':905,1018 'across':201,862 'action':297 'actor':530,822 'actual':66,692,831,836 'add':1146 'agent':1201,1207,1242,1271 'align':114,264,748,770,868,993,1107,1114,1254 'alignment-ir':867,1106,1253 'also':714,845 'altern':639 'alway':229,242,251 'ambigu':253,302,311,372,805,912,1025,1157 'analysi':115,602,616,954,1080,1230 'analyz':1102 'anti':1073,1132 'anti-hallucin':1072,1131 'anyth':416 'appear':404 'appli':684 'architectur':426 'artifact':488,1246 'ask':1315 'assess':1039 'assumpt':205,420,561,661,729,839 'audit':15,52,107,145,962,1228 'audit-context-build':144 'audit-grad':961,1227 'auditor':186 'author':720 'autonom':1219 'base':690 'behavior':64,71,228,344,506,576,590,659,693,762,844,849,910,986,1023,1147 'block':599,601,612,614,626,663 'block-by-block':598,611 'block-level':662 'blockchain':14,80,160,185 'boundari':533,900,1323 'branch':638,642 'breakdown':980 'build':147 'bullet':473 'call':648,649,708,843 'canon':493,551 'captur':715 'case':575,922 'chang':1104 'check':31,78,810,837,918 'checker':170,180,1206,1270 'checklist':1197 'citat':1071 'cite':230 'claim':75,852,1159 'clarif':1317 'classif':266,878 'classifi':252,310,350,370,879,1140,1148,1155 'clean':492 'clear':300,1290 'code':4,7,19,46,70,96,113,138,168,178,238,313,353,480,589,732,751,765,775,790,791,795,848,860,888,985,989,996,1028,1097,1145,1151,1216,1251 'code-ir':731,764,988,1096,1250 'codebas':91,132,194,620,1240,1275 'compar':18,1231 'comparison':752 'complet':950,1076,1089,1099,1109,1126,1177,1226 'completeness_checklist.md':1083,1195 'complianc':5,30,77,157,169,179,968,1205,1217,1261,1269 'concret':83 'condit':566,637,644 'confid':245,356,361,367,525,801,1061 'consist':1065 'constraint':564,829 'contain':772 'content':394 'context':146,547 'contract':54,1239 'contradict':853,857 'control':700,906,1019 'control-flow':699 'convert':440,477 'corpus':451,495 'correspond':134 'create2':652 'criteria':1326 'critic':884 'cross':711 'cross-funct':710 'cue':425 'custom':645 'danger':908 'deduc':545 'definit':483,535 'delegatecal':650 'depend':674 'describ':417,437,1294 'descript':427 'design':58,408 'detail':585,744,873,945,1174 'detect':846 'determin':191 'determinist':214,605 'dex':1182 'diagram':439 'direct':1264 'discoveri':391 'diverg':320,877,896,946,999,1116,1256 'document':11,50,59,89,136,152,199,235,321,390,396,402,446,865,925,974,1033 'docx':463 'drift':926,1020 'econom':560,953,1121 'edg':574,921 'edge-cas':573,920 'effect':673 'emiss':654 'enabl':893 'end':1279 'enforc':668,813 'engag':108 'enough':301 'entir':619 'environ':1306 'environment-specif':1305 'error':565,646 'etc':422,1063 'even':397 'event':653 'everi':622,625,679,1110,1158 'evid':217,232,325,807,934,1002 'exact':9,48,196,231,383,629 'exampl':586,745,874,948,1175,1180 'excerpt':518,774,776 'execut':971 'exhaust':222,286,1169 'expect':536,554,567,823,834 'expert':1311 'explicit':312,541,809 'exploit':894,938,951,1119 'export':415,467 'extern':647,842 'extract':262,307,443,503,513,527,627,681,1095 'file':239,628,778 'final':960,1037,1079,1124,1260 'find':22,60,362,931,947,1000,1117,1257 'fine':346 'flow':204,419,555,701,818 'flow.pdf':410 'flow/state':1014 'form':553,578 'formal':163 'format':455,460,1064,1068,1193 'formula':429,475,549,814,1092 'full':338,698,739,783,992,1210 'function':680,712,1101 'fund':898 'gap':23,61 'general':137 'generat':768 'get':363 'global':223 'grade':963,1229 'granular':735 'graph':709,721 'ground':215 'guarante':209 'guess':256 'hallucin':381,1074,1133 'hallucinatori':221 'handl':923 'head':471 'hidden':728 'hide':303 'hierarchi':472 'high':902 'hotspot':1026 'html':464 'hunt':142 'identifi':68,392,976 'ignor':364 'impact':1122 'implement':8,27,34,47,67,82,106,117,195,817,904 'implic':915 'implicit':543,660 'improv':151 'incent':421 'includ':516,933 'incomplet':919 'inconsist':861,1012 'incorrect':1008 'infer':226,375,380 'initi':718 'input':459,1320 'input/output':694 'insid':854,858 'instead':148,254 'intend':63,505 'intent':499,979 'interact':713 'intermedi':501 'internal/external':707 'invari':203,428,482,542,544,669,811,892,1006,1091 'investig':336,365 'invok':1263 'involv':897 'ir':309,500,511,581,591,733,749,759,766,869,983,990,1048,1059,1088,1098,1108,1178,1188,1245,1249,1252,1255 'ir_examples.md':583,742,871,943,1176 'item':514,755,1060,1112 'job':188 'justif':937 'kickoff':412 'knowledg':274 'known':276 'layout':485,717 'level':184,664 'like':93 'limit':1282 'line':240,595,597,607,609,623,630,779,1069,1165 'line-by-lin':594,606 'link':808,935 'list':474 'liter':283,1170 'll':327,374 'local':632,667 'locat':760 'logic':202,418,438,569,688,719,832,1009 'low':355,360,924 'machin':558,1015 'maintain':257 'map':250,737,827 'mark':386 'markdown':462 'match':97,315,317,322,332,339,781,784,786,1291 'materi':281 'math':206,548,655,816,895,1011 'matrix':994 'may':403 'mean':431 'meant':379 'mechan':725 'medium':911 'meet':468 'minimum':1056 'minor':927 'misalign':881,907 'mismatch':341,787,901,929,1016 'miss':103,788,891,916,1005,1328 'model':433 'modifi':685 'multipl':863 'must':212,515,932,1160 'must/never/always':572 'name':400 'need':43,1224 'never':225 'nois':486 'non':159,220 'non-blockchain':158 'non-hallucinatori':219 'normal':456,457,523 'note':328,409 'notion':414,466 'number':241,631,780,1070,1166 'obvious':314,316 'okay':358 'oper':656 'order':562,828 'origin':1162 'output':490,730,866,1040,1300 'output_requirements.md':1045,1187 'partial':331,333,785 'partial/incorrect':903 'path':354,640,706,1152 'pattern':1184 'pdf':461 'pedant':284,1171 'perform':29,76,603,1208 'permiss':723,1321 'phase':388,452,496,587,746,875,958,1053,1200,1212 'plain':305 'plaintext':479 'plan':957 'postcondit':540,666 'potenti':334 'precondit':539,665 'present':727,1130 'preserv':470 'prior':273,676 'privileg':826 'produc':965,1243 'product':1049,1189 'project':161 'protocol':33,81,116,277,528 'protocol.md':407 'provid':86,243,280 'purpos':529,689 'qualiti':1042,1054,1118,1191 'question':92 'quot':382,1161 'rate':806 'ration':287,291 'read/write':696 'readme.md':411 'reads/writes':636 'real':820,825,841 'reason':799,939,1172 'recommend':940,1030 'record':771,1115 'relat':761 'relationship':537 'relev':445 'reli':271 'remedi':941,956,1031,1123 'remov':484 'report':268,964,969,1125,1262 'repres':395 'represent':502,524 'requir':109,296,571,1041,1047,1066,1075,1094,1134,1186,1319 'resourc':1173 'revert':568,643,705,833,917 'review':139,1081,1312 'risk':1038 'riski':349 'role':531,722 'round':658 'rule':224,1194 'safeti':1322 'say':886 'scenario':952,1120 'scope':1293 'score':246,526,802,1062 'section':520,1129 'section/title/quote':236 'secur':208,570,914,1093 'see':582,741,870,942,1044 'semant':424,521,615,695,736,928 'senior':183 'senior-level':182 'separ':259 'sequenc':435 'set':697 'sever':883,936,1003 'side':672 'sight':306 'signatur':682 'silent':1139 'skill':40,130,154,171,1281,1285 'skill-spec-to-code-compliance' 'skip':290 'smart':53,1238 'snippet':481 'sourc':519,975 'source-sickn33' 'spec':2,25,74,99,111,166,176,298,378,401,450,494,498,510,517,580,750,758,773,794,798,851,856,864,885,978,982,995,1027,1058,1087,1111,1137,1204,1248,1268 'spec-compliance-check':1203,1267 'spec-ir':509,579,757,981,1057,1086,1247 'spec-to-cod':110,165,175 'spec-to-code-compli':1 'specif':88,135,164,1214,1233,1307 'specifi':12,51 'specification-to-cod':1213 'specul':1168 'standard':1043,1050,1185,1190 'state':200,557,635,670,677,1103 'state-machin':556 'staticcal':651 'status':997 'stop':1313 'storag':716 'strict':258 'stronger':792 'structur':604,702,967,1244 'style':487 'substitut':1303 'subtl':319 'success':703,1325 'suggest':1035 'summari':972,987 'swap':1183 'symbol':552 'tabl':436,476 'task':1289 'test':1309 'text':384,442,1163 'threshold':1055,1192 'time':563 'topic-agent-skills' 'topic-agentic-skills' 'topic-ai-agent-skills' 'topic-ai-agents' 'topic-ai-coding' 'topic-ai-workflows' 'topic-antigravity' 'topic-antigravity-skills' 'topic-claude-code' 'topic-claude-code-skills' 'topic-codex-cli' 'topic-codex-skills' 'trace':800 'traceabl':218,740 'track':1105 'transcript':413,469 'transit':559,671,821 'treat':1298 'trigger':84 'true':593 'trust':432,532,838,899 'txt':465 'type':323,522,782 'unclear':1154 'undocu':69,343,347,352,387,847,909,1022,1142,1150 'unifi':449 'unimpl':73,850 'univers':454 'unreach':641 'unspecifi':227 'untest':348 'updat':634,1034 'upgrad':724 'use':16,37,38,125,128,143,279,423,1220,1265,1283 'user':85 'valid':1308 'variabl':430,534,633 'verif':1077,1196 'verifi':6,45,119,156,1085,1273 'visibl':683 'vs':704,812,815,819,824,830,835,840 'vulner':141,335 'watermark':489 'weaker':796 'whether':192 'whitepap':21,56,121,1235,1278 'whitepaper.pdf':406 'whose':187 'without':133,162 'work':211 'workflow':434,1179,1218 'write':149 'wrong':295 'x':887 'y':890 'yaml':1067 'zero':1167","prices":[{"id":"e2a89a7b-98ba-421e-a007-29767e3adc1f","listingId":"c569624f-2098-4df7-b273-3d8a4ec3c6fa","amountUsd":"0","unit":"free","nativeCurrency":null,"nativeAmount":null,"chain":null,"payTo":null,"paymentMethod":"skill-free","isPrimary":true,"details":{"org":"sickn33","category":"antigravity-awesome-skills","install_from":"skills.sh"},"createdAt":"2026-04-18T21:45:16.531Z"}],"sources":[{"listingId":"c569624f-2098-4df7-b273-3d8a4ec3c6fa","source":"github","sourceId":"sickn33/antigravity-awesome-skills/spec-to-code-compliance","sourceUrl":"https://github.com/sickn33/antigravity-awesome-skills/tree/main/skills/spec-to-code-compliance","isPrimary":false,"firstSeenAt":"2026-04-18T21:45:16.531Z","lastSeenAt":"2026-04-22T12:51:48.966Z"}],"details":{"listingId":"c569624f-2098-4df7-b273-3d8a4ec3c6fa","quickStartSnippet":null,"exampleRequest":null,"exampleResponse":null,"schema":null,"openapiUrl":null,"agentsTxtUrl":null,"citations":[],"useCases":[],"bestFor":[],"notFor":[],"kindDetails":{"org":"sickn33","slug":"spec-to-code-compliance","github":{"repo":"sickn33/antigravity-awesome-skills","stars":34515,"topics":["agent-skills","agentic-skills","ai-agent-skills","ai-agents","ai-coding","ai-workflows","antigravity","antigravity-skills","claude-code","claude-code-skills","codex-cli","codex-skills","cursor","cursor-skills","developer-tools","gemini-cli","gemini-skills","kiro","mcp","skill-library"],"license":"mit","html_url":"https://github.com/sickn33/antigravity-awesome-skills","pushed_at":"2026-04-22T06:40:00Z","description":"Installable GitHub library of 1,400+ agentic skills for Claude Code, Cursor, Codex CLI, Gemini CLI, Antigravity, and more. Includes installer CLI, bundles, workflows, and official/community skill collections.","skill_md_sha":"10b705482dc1abc4fbdd599dc4246854ace0108b","skill_md_path":"skills/spec-to-code-compliance/SKILL.md","default_branch":"main","skill_tree_url":"https://github.com/sickn33/antigravity-awesome-skills/tree/main/skills/spec-to-code-compliance"},"layout":"multi","source":"github","category":"antigravity-awesome-skills","frontmatter":{"name":"spec-to-code-compliance","description":"Verifies code implements exactly what documentation specifies for blockchain audits. Use when comparing code against whitepapers, finding gaps between specs and implementation, or performing compliance checks for protocol implementations."},"skills_sh_url":"https://skills.sh/sickn33/antigravity-awesome-skills/spec-to-code-compliance"},"updatedAt":"2026-04-22T12:51:48.966Z"}}