Geoffrussy is a Go 1.24 AI-driven software delivery orchestrator that guides projects through a staged pipeline:
interview → design → plan → review → develop
It uses SQLite (via mattn/go-sqlite3, requires CGO), Cobra for CLI, Bubbletea for TUI, and supports 16 AI providers through an OpenAI-compatible interface pattern.
- Structured interview flow that captures requirements and stores them in project state
- Architecture generation and incremental refinement, then dev plan generation (tasks + phases)
- Review step that validates plan quality before execution
- Execution engine with live monitoring, pause/resume, skip, and blocker handling
- Built-in quota, token and cost tracking, and provider rate-limit persistence to SQLite
- MCP server for agent integrations (JSON-RPC over stdio)
- Go 1.24 (or newer)
- A C toolchain for SQLite (CGO) — required for
mattn/go-sqlite3
git clone https://github.com/mojomast/geoffrussy.git
cd geoffrussy
make build
./bin/geoffrussy versiongeoffrussy init
geoffrussy config --set-key # add provider keys
geoffrussy config --set-model # select models/defaults
geoffrussy interview
geoffrussy design
geoffrussy plan
geoffrussy review
geoffrussy developgeoffrussy init --non-interactive --api-key-openai "$OPENAI_KEY"geoffrussy status # interactive TUI by default
geoffrussy status --tui=false
geoffrussy stats
geoffrussy quota --refreshGeoffrussy ships adapters for many providers. Examples include: openai, openai-codex, anthropic, ollama (local), opencode (CLI bridge), zai, kimi, firmware, requesty, openrouter, groq, together, deepinfra, fireworks, perplexity, and mistral.
- Project state DB:
.geoffrussy/state.db(project-local) - Runtime logs:
.geoffrussy/logs/ - Generated architecture JSON:
.geoffrussy/architecture.json - User config:
~/.geoffrussy/config.yaml(API keys stored in system keyring when available)
- Path sanitizer prevents directory traversal and rejects symlinks that resolve outside the project root
- Sensitive data is scrubbed from logs automatically (logger sanitizes common API key/token patterns)
See docs/archive/reports/SECURITY_AUDIT.md for a deeper audit.
Start the MCP server to expose the workflow for agents/automation:
geoffrussy mcp-server --project-path /absolute/path/to/project --debugThis server implements a stdio JSON-RPC 2.0 interface used by agent clients.
init,interview,design,plan,review,developstatus,stats,quota,checkpoint,rollback,resume,navigateconfig,mcp-server,version
docs/README.md- documentation indexdocs/SETUP.md- installation and provider authdocs/COMMANDS.md- command referencedocs/WORKFLOW.md- stage-by-stage workflow and state transitionsdocs/PROVIDERS.md- provider capabilities and model selection behaviordocs/TUI.md- TUI controls and usagedocs/mcp-integration.md- MCP setup, tools, resources
Contributions welcome — see CONTRIBUTING.md for guidelines and workflow.
make fmt
make lint
go test ./...MIT. See LICENSE.