Claude Code
Project Wizard
Give Claude Code the context it needs — security rules, architecture docs, and team conventions. Configured in 30 seconds, downloaded as a zip.
Configure & Download
Fill in your project details — they get pre-written into every generated file. No blanks to hunt down afterwards.
cp -r my-app/. your-project/ chmod +x .claude/hooks/*.py .claude/hooks/*.sh claude . # CLAUDE.md auto-loads ✅ Claude Code is powerful.
But it's flying blind in your project.
Without proper context, AI makes wrong assumptions, ignores your conventions, and sometimes does dangerous things.
repeated context setup
patterns blocked by hooks
download your zip
pre-filled with your project info
- 😵 Doesn't know your architecture — writes code in the wrong layer
- 😵 Ignores your conventions — inconsistent style, wrong patterns
- 😵 No guardrails — could push to main, delete files, run unsafe commands
- 😵 Forgets decisions your team made — reinvents the wheel every session
- 😵 CLAUDE.md is vague or nonexistent — "use best practices" means nothing
- 🎯 Knows your exact architecture, layer boundaries, and why they exist
- 🎯 Follows your code style, naming conventions, and team patterns
- 🎯 Security hooks block 20+ dangerous commands before they run
- 🎯 ADR system preserves every architectural decision across sessions
- 🎯 Specific, actionable CLAUDE.md — not just "use best practices"
Everything Claude Code needs
to work correctly
One zip file. Unzip into your project. Claude auto-loads everything.
rm -rf, force push, eval(), prompt injection, and 20+ other attack patterns — before they execute.src/ but must ask before touching package.json or running git commands. Secrets files are fully blocked..claude/rules/ are lazy-loaded only when relevant. Security rules apply near auth code. API rules apply near routes. Save tokens, boost accuracy.From zero to configured in 3 steps
Which situation describes you?
Each phase builds on the previous — upgrading later only adds files, nothing to redo. Pick the one that fits right now.
rm -rf, force push, eval(), reading .env, and 20+ other attack patterns — automatically, before execution..claude/rules/ are loaded only when Claude works in matching directories. Security rules near auth code. API rules near routes. Saves tokens, improves accuracy.audit.jsonl for review. A separate hook scans all tool output for prompt injection patterns before Claude acts on them.This is just the beginning
The generator is free and open source. We're building smarter tools — VS Code extension, GitHub Action CI integration, and AI-powered auto-fill. Drop your email to get notified when they ship.
Go deeper with official docs
Everything you need to understand how Claude Code works under the hood.
Phase 1 — Equipped for solo projects that need basic permissions + architecture docs.
Phase 2 — Collaborative ⭐ is the recommended starting point for teams of 2–5 — hooks, stack templates, and a decision log. 30 minutes of setup that saves hours of confusion.
Phase 3 — Battle-Tested if you're live in production and need full 7-layer security, audit trail, and CI/CD.
Every phase is a superset of the previous — you can always upgrade later without redoing anything.
validate-command.py hook blocks dangerous bash patterns like rm -rf /, git push --force, eval(), and network exfiltration attempts. The protect-files.py hook prevents Claude from reading or writing your .env files, secrets, or even modifying CLAUDE.md itself. These aren't just advisory rules — they actually intercept and block execution.