Org-level contribution standards, on every stage
Deterministic pre-merge checks that don't depend on .cursorrules or READMEs. AI assists with analysis. Enforcement is rule-based, not LLM-based.
Explains risk when PRs modify auth/ without security review
Flags PRs with >500 LOC and suggests splitting
Warns about deploys on Fridays after 3pm
How it works
On every PR and push, Warestack loads your active checks, enriches with PR data (files, reviews, CODEOWNERS), runs condition-based evaluation, and posts violations as GitHub check runs and PR comments.
Supported contribution standards
Each standard maps to a condition Warestack evaluates on every PR. Checks are configured and managed through the dashboard — no manual file editing required.
| Parameter | What it enforces | Severity |
|---|---|---|
| require_linked_issue | PRs must reference an issue (e.g. Fixes #123) | high |
| require_code_owner_reviewers | CODEOWNERS for modified paths must be requested as reviewers | high |
| max_lines | Total additions + deletions ≤ threshold per PR | medium |
| min_approvals | Minimum number of approvals before merge | high |
| security_patterns | Detect hardcoded secrets or sensitive data in diffs | critical |
| diff_restricted_patterns | Flag restricted patterns (console.log, TODO) in added lines | medium |
| block_on_unresolved_comments | Block merge when unresolved review threads exist | high |
| require_tests | Source changes must include corresponding test file changes | medium |
| require_signed_commits | All commits must be cryptographically signed (GPG/SSH) | high |
| title_pattern | PR title must match a defined convention (e.g. feat|fix|chore) | low |
| no_force_push | Reject force pushes to protected branches | critical |
| block_self_approval | PR authors cannot approve their own code | high |
Capabilities
Pre-merge approval
Validate every PR against org-level contribution standards before it reaches main. Enforce linked issues, CODEOWNERS reviewers, PR size limits, title conventions, and more — all managed from your Warestack dashboard.
Pre-deploy gates
Add deployment checkpoints that verify compliance, deployment freeze windows, and architectural constraints before code ships to production.
Risk scoring
Score each PR by policy violations, complexity, security surface, and contributor history. Route senior reviewers to what actually matters.
Progressive enforcement
Start with warnings, graduate to soft blocks, then hard blocks. Contributors can acknowledge violations with a reason when the rule does not fit the case.
Drift detection
Monitor for policy violations over time and compliance regression across teams and repos. Surface the gaps before they compound.
Spec-incomplete blocking
Block or warn on PRs linked to under-scoped Linear or Jira tasks — missing acceptance criteria, vague descriptions, or no linked design docs. Pairs with Unified Delivery Data for detection.
Risk signals
Each PR is scored across multiple risk dimensions. Scores compound — a large PR touching critical paths with no tests scores highest.
Size risk
Many files changed, thousands of lines, many commits
Critical path
Changes to auth, payments, config, secrets, database schemas
Test coverage
PR removes tests or adds code without tests
Dependency changes
New deps, version bumps, unverified packages
Contributor history
First-time contributor, low PR acceptance rate
Reverts
PR reverts previous changes
Security-sensitive
Modifies CI/CD, infra code, secrets handling
Breaking changes
Modifies public APIs, migrations
Rule matches
Severity of matched contribution standards compounds the risk score