Scope creep in AI-generated code is a distinct failure mode from human-authored scope creep: the AI adds entire subsystems — admin dashboards, SSO flows, multi-tenancy layers — that were never requested, each carrying its own attack surface, maintenance cost, and regression risk. An unreviewed team collaboration system added without a PRD requirement means unapproved access control logic is live in production, and any bug in that logic is your liability. ISO 25010:2011 maintainability penalizes excess implementation directly: code that does not correspond to a requirement has no spec to validate it against and no owner to maintain it.
Critical because unrequested subsystems introduce unreviewed security logic and maintenance burden with no specification to validate correctness against.
Audit each out-of-scope addition before deciding whether to keep or remove it. For each flagged module:
src/app/ routes for missing auth guards.# Remove the orphaned route and its data layer
rm -rf src/app/(admin)/teams
npx prisma migrate dev --name remove_teams_scope_creep
Leaving unrequested code in place means you own its security posture indefinitely.
goal-alignment.scope-accuracy.no-significant-scope-creepcritical"PRD describes a simple note-taking app. Codebase includes a full team collaboration system (/teams, /invites, /permissions) not mentioned in PRD." Max 500 chars.src/app/, components, and database tables, then rerun migrations.