Documentation

One workspace for every AI coding assistant. Get started in 10 seconds.

Quick Start

Six steps to full API governance. No accounts, no API keys.

0

Try it first

Get an instant health grade for your API spec. No install needed.

npx delimit-cli scan openapi.yaml   # health grade + recommendations
npx delimit-cli try                  # zero-risk demo with sample API
1

Install

Detects your AI assistants (Claude Code, Codex, Cursor, Gemini CLI) and configures them all.

npx delimit-cli setup && source ~/.bashrc
2

Initialize Governance

Creates a .delimit/policies.yml with your chosen preset (strict, default, or relaxed).

npx delimit-cli init --preset default
3

Lint Your API

Check your OpenAPI spec for breaking changes and policy violations.

npx delimit-cli lint api/openapi.yaml
4

Add the GitHub Action

Create .github/workflows/api-check.yml to lint every PR automatically.

name: API Contract Check
on: pull_request

jobs:
  api-check:
    runs-on: ubuntu-latest
    permissions:
      pull-requests: write
    steps:
      - uses: actions/checkout@v4

      - uses: delimit-ai/delimit-action@v1
        with:
          spec: api/openapi.yaml
5

View the Dashboard

Sign in with GitHub to see governance history, audit trails, and team management.

Open Dashboard

What is Delimit?

Delimit gives your AI coding assistant persistent memory, governance, and cross-model continuity. It works two ways:

GitHub Action

Diffs your OpenAPI spec on every PR. Posts breaking changes, semver classification, and migration guidance as a PR comment.

View on Marketplace →

MCP Toolkit

Governance tools for AI coding assistants (Claude Code, Codex, Cursor, Gemini CLI). Lint, diff, policy enforcement, and more -- all local, no API keys.

npx delimit-cli setup

Both run entirely locally. No external services, no accounts, no data leaving your machine.

Enforcement Modes

Delimit has three enforcement modes that control how governance decisions are applied. These work across all AI assistants and the GitHub Action.

BehaviorAdvisoryGuarded (default)Enforce
PR comments + annotationsYesYesYes
Critical actions blockedNoYesYes
High-risk actions blockedNoWarnedYes
Fails CI on breaking changesNoNoYes
Best forEvaluationDay-to-dayProduction APIs

Guarded mode is the default. It blocks dangerous operations like destructive deploys while allowing normal development. Switch modes anytime:

# GitHub Action
- uses: delimit-ai/delimit-action@v1
  with:
    spec: api/openapi.yaml
    mode: enforce

# MCP (all assistants)
# Create ~/.delimit/enforcement_mode with: advisory, guarded, or enforce

CLI Reference

The CLI works locally and in any CI system. Install globally or use npx.

delimit scan [path]

Instant health grade for your API spec (A-F) across 5 dimensions: completeness, security, consistency, documentation, best practices. No install needed.

npx delimit-cli scan openapi.yaml    # grade a specific spec
npx delimit-cli scan                  # auto-detect specs in current directory

delimit try

Zero-risk governance demo. Creates a sample API with breaking changes, runs the full governance pipeline, and saves a Markdown report to delimit-report.md.

npx delimit-cli try

delimit setup [--dry-run]

Detect installed AI assistants and configure MCP tools for all of them. Use --dry-run to preview changes without writing anything.

npx delimit-cli setup              # install into all AI assistants
npx delimit-cli setup --dry-run    # preview what will change

delimit init [--preset]

Create a .delimit/policies.yml file with a preset. Options: strict, default, relaxed.

npx delimit-cli init                  # default preset
npx delimit-cli init --preset strict   # all violations are errors
npx delimit-cli init --preset relaxed  # all violations are warnings

delimit lint [spec] [--policy]

Validate a spec against the base version and check for policy violations.

npx delimit-cli lint api/openapi.yaml
npx delimit-cli lint api/openapi.yaml --policy strict
npx delimit-cli lint old.yaml new.yaml

delimit diff <old> <new>

Compare two specs and report all changes with semver classification.

npx delimit-cli diff old-api.yaml new-api.yaml

delimit explain <old> <new>

Generate a human-readable migration guide from the diff between two specs.

npx delimit-cli explain old-api.yaml new-api.yaml --template migration

delimit doctor

Check your setup health. Verifies MCP configuration, Python dependencies, and tool availability.

npx delimit-cli doctor

delimit activate <key>

Activate a Pro license key to unlock advanced features.

npx delimit-cli activate YOUR_LICENSE_KEY

delimit uninstall [--dry-run]

Clean removal from all AI assistants (Claude Code, Codex, Cursor, Gemini CLI). Creates backups before removing. Use --dry-run to preview what will be removed.

npx delimit-cli uninstall              # remove with backups
npx delimit-cli uninstall --dry-run    # preview removal

Tool Reference

Delimit exposes tools through the MCP protocol. Your AI coding assistant can call any of these directly -- just describe what you want in natural language. The "Say this" column shows example prompts that trigger each tool.

Free tools are unlimited. Pro tools require an active license (deliberation is limited to 3 per month on the free tier).

API Governance

Free

Detect breaking changes, enforce policies, and classify API diffs.

ToolWhat it doesSay this
delimit_lintCheck specs for breaking changes and policy violations"lint my API spec"
delimit_diffCompare two API specs and list all changes"diff old.yaml new.yaml"
delimit_semverClassify changes as MAJOR/MINOR/PATCH"what semver bump is this?"
delimit_explainGenerate a human-readable change explanation"explain the changes"
delimit_policyView and manage governance policies"show current policies"
delimit_zero_specExtract a spec from source code (FastAPI, Express, NestJS)"generate a spec from my code"
delimit_impactAnalyze downstream impact of API changes"what is the impact of these changes?"

Ledger

Free

Persistent task tracking that survives across sessions and AI assistants.

ToolWhat it doesSay this
delimit_ledger_addAdd a task to the ledger"add to ledger: refactor auth module"
delimit_ledger_listList all ledger items"show the ledger"
delimit_ledger_doneMark an item complete"mark LED-001 done"
delimit_ledger_contextGet top priority items for session start"what's on the ledger?"

Security

Free

Scan for vulnerabilities, detect secrets, and audit dependencies.

ToolWhat it doesSay this
delimit_security_auditFull security audit (dependencies, patterns, and secrets)"run a security audit"
delimit_security_scanQuick security scan for common issues"scan for vulnerabilities"

Governance

Free

System health, compliance checks, and policy evaluation.

ToolWhat it doesSay this
delimit_gov_healthCheck governance system health"governance status"
delimit_gov_statusDetailed governance status report"show governance details"
delimit_gov_evaluateEvaluate a project against policies"evaluate this project"
delimit_gov_runRun all governance checks"run governance checks"
delimit_gov_verifyVerify governance compliance"verify compliance"
delimit_gov_policyView policy configuration"show policies"

Deliberation

Pro

Multi-model AI debate and consensus for architectural decisions.

ToolWhat it doesSay this
delimit_deliberateSend a question to multiple AI models for debate and consensus"deliberate: should we use REST or GraphQL?"
delimit_modelsView and manage configured AI models"show available models"

Memory & Context

Pro

Store and retrieve information across sessions.

ToolWhat it doesSay this
delimit_memory_storeSave information for future recall"remember this architecture decision"
delimit_memory_searchSearch stored memories"search memory for auth"
delimit_memory_recentGet recently stored memories"what do you remember?"
delimit_context_initInitialize a context namespace"init context for project-x"
delimit_context_writeWrite an artifact to context storage"save this plan"
delimit_context_readRead an artifact from context storage"read the plan"
delimit_context_listList all context artifacts"list saved artifacts"

Deploy

Pro

Plan, build, publish, and verify deployments.

ToolWhat it doesSay this
delimit_deploy_planCreate a deployment plan"plan deployment"
delimit_deploy_buildBuild a project for deployment"build the project"
delimit_deploy_publishPublish or deploy a project"deploy to production"
delimit_deploy_statusCheck deployment status"deploy status"
delimit_deploy_verifyVerify deployment health"verify the deploy"

Secrets

Pro

Securely store, retrieve, and manage credentials locally.

ToolWhat it doesSay this
delimit_secret_storeStore a credential securely"store my API key"
delimit_secret_getRetrieve a stored credential"get the API key"
delimit_secret_listList stored secrets (values are not shown)"list secrets"
delimit_secret_revokeRevoke a stored credential"revoke that key"

Observability

Free

System health, metrics, and log searching.

ToolWhat it doesSay this
delimit_obs_statusSystem health overview"system status"
delimit_obs_metricsCPU, memory, and disk metrics"show metrics"
delimit_obs_logsSearch system logs"search logs for errors"

Design & Testing

Free

UI component scanning, accessibility audits, and test generation.

ToolWhat it doesSay this
delimit_design_component_libraryScan and catalog UI components in a project"catalog my components"
delimit_design_validate_responsiveCheck responsive design implementation"validate responsive design"
delimit_story_accessibilityRun a WCAG accessibility audit"check accessibility"
delimit_test_generateGenerate test skeletons from source code"generate tests for this file"
delimit_test_smokeRun smoke tests"run smoke tests"

Automation

Pro

Autonomous daemon, content generation, and scheduling.

ToolWhat it doesSay this
delimit_daemon_statusCheck autonomous daemon status"daemon status"
delimit_daemon_runRun a daemon iteration"run daemon"
delimit_social_generateGenerate social media content"draft a tweet about the release"
delimit_content_scheduleView the content publishing schedule"show content schedule"

The tools listed above are the primary interface. Additional internal tools exist for system orchestration, but the ones above cover every user-facing capability. All tools run locally on your machine.

GitHub Action

Add breaking change detection to any repository. The action runs on every pull request, diffs your OpenAPI spec against the base branch, and posts a comment with breaking changes, semver classification, and a migration guide.

Zero-Config Setup

Delimit auto-detects your OpenAPI spec. No inputs required:

name: API Governance
on: pull_request
jobs:
  check:
    runs-on: ubuntu-latest
    permissions: { pull-requests: write }
    steps:
      - uses: actions/checkout@v4
        with: { fetch-depth: 0 }
      - uses: delimit-ai/delimit-action@v1

Full Configuration

name: API Contract Check
on: pull_request

jobs:
  api-check:
    runs-on: ubuntu-latest
    permissions:
      pull-requests: write
    steps:
      - uses: actions/checkout@v4

      - uses: delimit-ai/delimit-action@v1
        with:
          # Single file mode -- auto-fetches base branch version
          spec: api/openapi.yaml

          # Or explicit comparison mode
          # old_spec: api/openapi-base.yaml
          # new_spec: api/openapi.yaml

          # Mode: advisory (default) or enforce
          mode: advisory

          # Policy: path to custom policy file or preset name
          # policy: .delimit/policies.yml
          # policy: strict

Input Reference

InputRequiredDescription
spec*Path to your OpenAPI spec. Auto-fetches the base branch version for comparison.
old_spec*Path to the baseline spec. Use with new_spec for explicit comparison.
new_spec*Path to the proposed spec. Use with old_spec.
modeNoadvisory (default) or enforce. Enforce fails the check on violations.
policyNoPath to a custom policy YAML file, or a preset name (strict, default, relaxed).

* Provide either spec alone, or both old_spec and new_spec.

Policy Presets

Delimit ships with 3 built-in presets that control how violations are treated.

strict

All violations are errors. Any breaking change fails the check.

default

Balanced. Endpoint/method removal and required param addition are errors. Type changes are warnings.

relaxed

All violations are warnings. Nothing blocks the build.

Custom Policies

Create .delimit/policies.yml to define your own rules:

# .delimit/policies.yml
override_defaults: false

rules:
  - id: protect_v1_api
    name: Protect V1 API
    description: V1 endpoints are frozen
    change_types:
      - endpoint_removed
      - method_removed
      - field_removed
    severity: error
    action: forbid
    conditions:
      path_pattern: "^/v1/.*"
    message: "V1 API is frozen. Changes must be made in V2."

  - id: warn_response_type_change
    name: Warn Response Type Changes
    change_types:
      - type_changed
    severity: warning
    action: warn
    conditions:
      path_pattern: ".*:2\\d\\d.*"
    message: "Type changed at {path} - verify client compatibility."

Available Change Types

Change typeBreakingDescription
endpoint_removedYesAn API endpoint path was removed
method_removedYesAn HTTP method was removed from an endpoint
required_param_addedYesA new required parameter was added
param_removedYesA parameter was removed
response_removedYesA response status code was removed
required_field_addedYesA new required field was added to a request body
field_removedYesA field was removed from a response
type_changedYesA field's type was changed
format_changedYesA field's format was changed
enum_value_removedYesAn allowed enum value was removed
endpoint_addedNoA new endpoint was added
method_addedNoA new HTTP method was added
optional_param_addedNoA new optional parameter was added
response_addedNoA new response status code was added
optional_field_addedNoA new optional field was added
enum_value_addedNoA new enum value was added
description_changedNoA description was modified

Semver Classification

Delimit deterministically classifies every diff into a semver bump:

  • major -- any breaking change detected
  • minor -- additive changes only (new endpoints, optional fields)
  • patch -- non-functional changes only (descriptions)
  • none -- no changes detected

Supported Formats

  • OpenAPI 3.0 and 3.1
  • Swagger 2.0
  • YAML and JSON spec files

Don't Have an OpenAPI Spec?

Many teams don't maintain an explicit API spec. Delimit can help:

Zero-Spec Extraction

Auto-extract an OpenAPI spec from your source code. Supports FastAPI, Express, and NestJS.

npx delimit-cli zero-spec ./src

Start With a Minimal Spec

Create a basic openapi.yaml with just your endpoints listed. Delimit will track changes from there. Even a skeleton with paths and methods is enough to detect removals and additions.

Generated Specs

If your spec is generated from code (FastAPI auto-docs, NestJS Swagger), just point Delimit at the generated file. The diff happens at the spec level, not the source level. Common locations: docs/openapi.json, swagger.json, or your framework's output path.

FAQ

What data does Delimit collect?

Only tool call events for governance tracking. No source code is sent to any server. The CLI and MCP tools run entirely on your machine. The hosted dashboard (app.delimit.ai) stores account data and governance history if you choose to sign in, but the core tools are fully local.

Can I use Delimit with private repos?

Yes. Everything runs locally on your machine. Your API specs, source code, and governance policies never leave your local filesystem. The GitHub Action runs inside your own CI environment.

What happens if I exceed the free tier?

Deliberation is limited to 3 per month on the free tier. All other tools -- linting, diffing, ledger, security, governance, observability, design, and testing -- are unlimited.

Which AI assistants are supported?

Delimit works with Claude Code, Codex (ChatGPT CLI), Cursor, and Gemini CLI. The npx delimit-cli setup command detects which assistants you have installed and configures them all.

How do I uninstall Delimit?

Run the uninstall command. It removes MCP configuration from all AI assistants and cleans up local data.

npx delimit-cli uninstall

Is Delimit open source?

The CLI, MCP tools, and GitHub Action are MIT licensed and fully open source. The hosted dashboard (app.delimit.ai) is a proprietary service. You can use everything locally without ever creating an account.

What if my OpenAPI spec is auto-generated?

Delimit works with any spec file checked into git, whether hand-written or generated. If your spec is generated from code (e.g., via FastAPI, NestJS Swagger, or a build step), just point Delimit at the generated output file. The diff happens at the spec level, not the source level.

Does Delimit work with monorepos?

Yes. Set old_spec and new_spec to the path within your monorepo. You can run multiple Delimit steps in one workflow for different services.

What about gRPC / protobuf APIs?

Delimit operates on the OpenAPI/Swagger layer. If your gRPC service has a REST gateway that generates an OpenAPI spec, Delimit can diff that. For proto-level breaking change detection, use Buf.