If you've been using Optic to catch breaking changes in your OpenAPI specs, you've probably noticed: the repository was archived on January 12, 2026. The last issue, titled "No Longer Maintained," was opened four days earlier. The final release (v10.3.0) shipped, and that was it.

Optic was a good tool. It was backed by Y Combinator, had 1,500+ GitHub stars, and companies like Snyk used it in production. But it required a CLI setup, a config file, CI pipeline integration, and custom rulesets written in TypeScript. For many teams, that setup cost meant the tool never made it past the "we should try this" stage.

So what now?

The problem hasn't gone away

Breaking API changes still ship to production every day. A field gets renamed, an endpoint gets removed, a required parameter becomes optional — and downstream services break silently. If you've ever debugged a 500 error that turned out to be a renamed JSON field in an upstream service, you know the pain.

The need for automated breaking change detection in pull requests is arguably stronger than ever, with more teams adopting API-first development and microservice architectures.

What Optic did well

Optic brought several important ideas to the API governance space: diffing OpenAPI specs to find breaking changes, integrating results into code review, and applying custom linting rules to API design. It also supported generating OpenAPI specs from traffic, which was a unique feature for teams without existing specs.

What made it hard to adopt

For teams that just wanted "tell me if my PR breaks the API," Optic required significant setup:

This was powerful for platform teams with dedicated API governance roles. But for most engineering teams — the ones with 5–20 services, a few OpenAPI specs, and no dedicated API platform engineer — it was too much friction.

What I built instead

I ran into this exact problem at work. We had 4 microservices with OpenAPI specs, and breaking changes kept slipping through PRs. I tried Optic, spent an afternoon configuring it, and thought: why does this need a CI pipeline and a config file?

So I built CodeRifts — a GitHub App that does one thing well: it posts a full API governance report as a PR comment every time someone modifies an OpenAPI spec.

The setup is literally:

  1. Install the GitHub App (one click)
  2. Open a pull request

That's it. No config file. No CI changes. No CLI. It auto-discovers your OpenAPI specs (YAML or JSON, versions 2.0, 3.0, and 3.1) and analyzes them on every PR.

What the report includes

Every PR that touches a spec gets a comment with:

See a real example: Demo PR with full governance report →

Comparison: Optic vs CodeRifts

Optic (archived) CodeRifts
Setup time30–60 minutes30 seconds
Config requiredoptic.yml + CI pipelineNone (optional .coderifts.yml)
DeliveryCLI + GitHub ActionGitHub App (+ Web UI, API, CLI)
Breaking changesYesYes (10 types)
Risk scoringNoYes (0–100, 4 dimensions)
Policy engineTypeScript rulesetsYAML config-as-code
Security analysisNoYes (OWASP-aligned)
MaintenanceArchived Jan 2026Actively developed
PricingFree (open source)Free tier + Pro $49/repo/mo
(free during beta)

Other alternatives

If you liked Optic's CLI-first approach and want something you fully control, there are other options worth considering:

Each has tradeoffs. If all you need is a raw diff, oasdiff is great. If you want governance — risk scoring, policies, security checks, team routing — without the setup overhead, that's the gap CodeRifts fills.

Try CodeRifts — free during beta

All Pro features unlocked. No credit card required. Works in 30 seconds.

I'm the developer behind CodeRifts. If you've been using Optic and are looking for an alternative, I'd love to hear about your setup — what worked, what didn't, and what you'd want in a replacement. Reach out at hello@coderifts.com.