Forensic-grade engineering for high-stakes mobile applications.
In the world of mobile development, "move fast and break things" is often the default setting. For social apps or prototypes, this is fine. But in Mission-Critical environments—FinTech, MedTech, Aerospace, and Enterprise—failure is not an option.
Standard Flutter tooling prioritizes development speed and flexibility. However, flexibility is the enemy of reliability. It leaves the door open for architectural drift, circular dependencies, and unhandled runtime states.
☝️ This is a liability problem.
The Mission-Critical Flutter CLI (MCF) is the enforcement arm of the Mission-Critical methodology. It generates applications that are correct by construction, enforcing rigorous architectural isolation and type safety from the very first line of code.
mcf_cli is intentionally strict. Drawing inspiration from the Joint Strike Fighter (JSF) C++ Coding Standards, it operates on the principle that the architecture should physically prevent developers from making mistakes.
While clean architecture guidelines exist, they rely on developer discipline. A developer can import a Repository into a Widget, or forget to handle a loading state, or use the ! operator because they are in a rush.
mcf_cli takes a paternalistic stance. It generates code where:
- Isolation is physical: The directory structure makes illegal imports obvious.
- Safety is mandatory: Linter rules prevent
dynamictypes and implicit casts. - State is exhaustive: You cannot add a UI state without handling it.
The goal is to shift the burden of safety from developer memory to tooling enforcement.
dart pub global activate mcf_cliScaffold a complete forensic-grade application skeleton.
mcf new my_secure_appCreate a vertical slice (Domain, Data, Presentation) with 100% test coverage.
cd my_secure_app
mcf feature --name authenticationRun the deep-inspection tool to verify architectural integrity.
mcf auditmcf new doesn't just create folders; it sets up a Composition Root, installs very_good_analysis with custom strict overrides, and configures a Golden Test harness.
mcf feature generates the "Muscle" of your app. It creates the Entity, Repository (Interface & Implementation), Cubit, and State simultaneously. It automatically injects Reentrancy Guards into your logic to prevent race conditions.
mcf audit is your CI/CD gatekeeper. It scans your codebase for violations of the MCF rules (e.g., Domain layer importing Flutter, usage of the ! operator, missing copyright headers) and fails the build if your architecture has drifted.
The generated structure mandates Visual Regression Testing for all critical UI components, ensuring that pixel-perfect rendering is locked in over time.
✅ FinTech & Banking
✅ MedTech & Healthcare
✅ Enterprise & Government
✅ Large Teams
❌ Hackathons
❌ Simple MVP Prototypes
❌ Solo Hobby Projects
- Domain: Pure logic. No Flutter, JSON, DB.
- Data: Networking, DTOs, storage.
- Presentation: UI only. No logic.
✔ Constraint: Presentation never imports Data.
The ! operator causes runtime crashes. The audit tool flags any usage.
All generated Cubits use sealed state classes, forcing exhaustive UI handling.
Generated Cubits prevent multiple async triggers (e.g., double-taps on buttons).
Add this to CI/CD:
mcf auditIf a developer breaks architecture boundaries, the audit fails.
We welcome contributions from engineers who care about software quality.
- Report bugs
- Suggest rules
- Improve documentation
Released under the MIT License.
"The difference between a prototype and a product is not features; it is predictability."