Org-level contribution standards, on every stage

Deterministic pre-merge checks that don't depend on .cursorrules or READMEs. AI assists with analysis. Enforcement is rule-based, not LLM-based.

Security File Guard

Explains risk when PRs modify auth/ without security review

Large PR Alert

Flags PRs with >500 LOC and suggests splitting

Deploy Window

Warns about deploys on Fridays after 3pm

Guides, doesn't block
50+ built-in checks
Team-specific, plain English

How it works

On every PR and push, Warestack loads your active checks, enriches with PR data (files, reviews, CODEOWNERS), runs condition-based evaluation, and posts violations as GitHub check runs and PR comments.

PR / Push Event
Checks Loaded
Conditions Evaluated
Check Run + Comment

Supported contribution standards

Each standard maps to a condition Warestack evaluates on every PR. Checks are configured and managed through the dashboard — no manual file editing required.

ParameterWhat it enforcesSeverity
require_linked_issuePRs must reference an issue (e.g. Fixes #123)high
require_code_owner_reviewersCODEOWNERS for modified paths must be requested as reviewershigh
max_linesTotal additions + deletions ≤ threshold per PRmedium
min_approvalsMinimum number of approvals before mergehigh
security_patternsDetect hardcoded secrets or sensitive data in diffscritical
diff_restricted_patternsFlag restricted patterns (console.log, TODO) in added linesmedium
block_on_unresolved_commentsBlock merge when unresolved review threads existhigh
require_testsSource changes must include corresponding test file changesmedium
require_signed_commitsAll commits must be cryptographically signed (GPG/SSH)high
title_patternPR title must match a defined convention (e.g. feat|fix|chore)low
no_force_pushReject force pushes to protected branchescritical
block_self_approvalPR authors cannot approve their own codehigh

Capabilities

Pre-merge approval

Validate every PR against org-level contribution standards before it reaches main. Enforce linked issues, CODEOWNERS reviewers, PR size limits, title conventions, and more — all managed from your Warestack dashboard.

Pre-deploy gates

Add deployment checkpoints that verify compliance, deployment freeze windows, and architectural constraints before code ships to production.

Risk scoring

Score each PR by policy violations, complexity, security surface, and contributor history. Route senior reviewers to what actually matters.

Progressive enforcement

Start with warnings, graduate to soft blocks, then hard blocks. Contributors can acknowledge violations with a reason when the rule does not fit the case.

Drift detection

Monitor for policy violations over time and compliance regression across teams and repos. Surface the gaps before they compound.

Spec-incomplete blocking

Block or warn on PRs linked to under-scoped Linear or Jira tasks — missing acceptance criteria, vague descriptions, or no linked design docs. Pairs with Unified Delivery Data for detection.

Risk signals

Each PR is scored across multiple risk dimensions. Scores compound — a large PR touching critical paths with no tests scores highest.

Size risk

Many files changed, thousands of lines, many commits

Critical path

Changes to auth, payments, config, secrets, database schemas

Test coverage

PR removes tests or adds code without tests

Dependency changes

New deps, version bumps, unverified packages

Contributor history

First-time contributor, low PR acceptance rate

Reverts

PR reverts previous changes

Security-sensitive

Modifies CI/CD, infra code, secrets handling

Breaking changes

Modifies public APIs, migrations

Rule matches

Severity of matched contribution standards compounds the risk score

Frequently asked questions

Pattern-enriched metadata means that Warestack automatically attaches additional context to every code-related event — from pull requests and commits to CI/CD pipelines and chat discussions. Instead of storing only what happened (e.g., a PR was merged), Warestack also tracks how it happened — such as review latency, file types, number of reverts, and links to discussion threads. This transforms raw activity into structured, queryable knowledge that can later be used for analytics, governance, or AI-powered insights.
Each entity (PR, commit, issue, or deployment) is enriched with metrics like:

Review latency – how long a review took
LOC change volume – code churn and size metrics
Reviewer density – number and type of reviewers involved
Risk and anomaly scores – based on learned historical data
Cross-tool context – Slack mentions, Jira/Linear issues, CI test failures

This rich metadata enables pattern recognition and cross-system reasoning, making it easier to spot regressions or risky behaviors early.
Warestack allows you to define pattern checks declaratively in YAML format. Each check describes a dependency or rule that should be enforced — for example:

- description: "Pull requests that modify .sql files must provide a .migration.sql file."
  event_types: ["pull_request"]
  parameters:
    file_pattern_dependency:
      source_pattern: "*.sql"
      dependent_pattern: "*.migration.sql"
Once defined, these checks can be activated through the UI, automated via the CLI, or embedded in your organization's governance templates. This makes checks portable, auditable, and version-controlled alongside your code.
Warestack maintains a shared reference graph between entities using temporal and semantic keys (e.g., PR ID, commit hash, message reference). This allows correlating a Slack discussion or Jira issue directly to the related PR or deployment, enabling causal and temporal analysis.

For example, a Slack message referencing "fix in PR-482" is automatically linked to the corresponding GitHub PR, its merge commit, and the subsequent deployment event.
All normalized and enriched data is exposed via a REST and SQL API. Developers can query through natural language or deterministic SQL for reproducible analytics. Warestack supports event streaming for real-time dashboards and rule triggers through its agentic rule engine.
Yes. Every detected pattern can trigger actions across your stack — including:

Posting alerts to Slack or Microsoft Teams
Creating Linear or Jira issues automatically
Adding comments on GitHub pull requests
Updating dashboards or exporting structured reports

Integrations can be configured via YAML, API, or through the Warestack UI. This way, your team's checks become active guardrails across the entire development workflow — enforcing consistency, security, and accountability without slowing developers down.

© 2026 Warestack Inc.