Bulletproof AI code verification.
The agent IS the engine. No external CI required. Spawns parallel verification workers that slop-scan, type-check, mutation-test, and cross-verify before shipping. Ship proof, not vibes.
How it works
Natural language to your OpenClaw agent: "Use wreckit to audit this project"
Slop scan, type check, SAST, mutation testing, dynamic analysis, and more — in parallel.
Ship ✅, Caution ⚠️, or Blocked 🚫 — plus a signed proof bundle in .wreckit/
Modes
New project from PRD
Full pipeline for greenfield projects with verification guardrails from day one.
Existing code + migration spec
BUILD + behavior capture + regression replay for safe migrations.
Bug fix with proof
Fix, verify, prove nothing else broke. Signed evidence of safety.
Verify existing code, no changes
Read-only analysis. Full gate suite. No modifications to your codebase.
Verification
Detects placeholder code, template artifacts, empty stubs.
tsc / mypy / cargo check / go vet — zero unresolved errors.
Adversarial builder-breaker loop pressure-tests logic.
Coverage depth, assertion density, and test structure scoring.
mutmut / Stryker / cargo-mutants — verifies tests catch regressions.
Independent agent corroborates the builder's claims.
Golden fixtures captured before rebuild/fix.
Byte-for-byte replay with LLM-as-judge diff approval.
20+ vulnerability patterns, ReDoS analysis.
Memory leaks, race conditions, FD leaks at runtime.
Dep graph, circular deps, coupling, god modules.
CI config detection and pipeline scoring.
Benchmark detection + regression vs captured baseline.
Writes .wreckit/proof.json, dashboard.json, decision.md.
Usage
"Use wreckit to audit ~/Projects/myapp. Don't change anything."
"Use wreckit to build a REST API from this PRD."
"Use wreckit to fix this bug. Prove nothing else breaks."
"Use wreckit to rebuild this codebase in TypeScript."
wreckit is an OpenClaw skill — you talk to your agent, it runs wreckit.
Chat Flow
You
Use wreckit to audit ~/Projects/checkout. Don't change anything.
Mode: AUDIT — read-only verification
wreckit
Running 14 verification gates against ~/Projects/checkout. Stack detected: TypeScript / Next.js / Vitest.
14 gates queued
wreckit
Mutation gate found one weak assertion cluster in checkout/payment.ts. Kill rate 71% — below 80% threshold.
Gate: Mutation Kill — CAUTION
wreckit
Final verdict: CAUTION ⚠️. 13 gates passed, 1 below threshold. Proof bundle written to .wreckit/proof.json
Artifact: .wreckit/proof.json
Scripts
The heart of wreckit. Each script is a standalone gate — run them individually or let the orchestrator run the full pipeline.
Full sequential pipeline with telemetry
Semantic slop detection — placeholders, stubs, dead code
tsc / mypy / cargo check / go vet
20+ SAST vulnerability patterns + ReDoS
mutmut / Stryker / cargo-mutants / AI fallback
Corroborated verdict + .wreckit/ artifacts
Memory leaks, race conditions, FD leaks
Dep graph, circular deps, coupling analysis
Proof bundle
wreckit writes a tamper-evident proof bundle in .wreckit/ with gate output, thresholds, and final verdict reasoning. Review exactly why a release was approved — or blocked.
.wreckit/
├── proof.json ← machine-readable verdict
├── dashboard.json ← external tooling schema
├── decision.md ← human-readable reasoning
└── raw/ ← raw script output per gate
{
"verdict": "SHIP",
"run_id": "a3f8c2d1-9e4b-4a7c-b8f6-2d1e3a5c7b9d",
"git_sha": "abc123f",
"timestamp": "2026-03-20T04:22:11Z",
"gates": {
"slop_scan": { "status": "PASS", "density": 1.2 },
"type_check": { "status": "PASS", "errors": 0 },
"ralph_loop": { "status": "PASS", "exploits": 0 },
"test_quality": { "status": "PASS", "coverage": 92 },
"mutation": { "status": "PASS", "kill_rate": 94 },
"cross_verify": { "status": "PASS", "oracle_agrees": true },
"sast": { "status": "PASS", "blockers": 0 },
"dynamic": { "status": "PASS", "leaks": 0 },
"design": { "status": "PASS", "circular_deps": 0 },
"red_team": { "status": "PASS", "blockers": 0 }
}
}Verdicts
All gates passed. Evidence thresholds satisfied. Safe to deploy.
Some gates flagged risk. Review the proof bundle before promoting.
Critical issues detected. Release should not proceed.
Get started
# Via ClawHub (recommended)
$ clawhub install wreckit
# Then use it:
"Use wreckit to audit ~/Projects/myapp"