@accelerationguy/accel 1.0.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (376) hide show
  1. package/CLAUDE.md +19 -0
  2. package/LICENSE +33 -0
  3. package/README.md +275 -0
  4. package/bin/install.js +661 -0
  5. package/docs/getting-started.md +164 -0
  6. package/docs/module-guide.md +139 -0
  7. package/modules/drive/LICENSE +21 -0
  8. package/modules/drive/PAUL-VS-GSD.md +171 -0
  9. package/modules/drive/README.md +555 -0
  10. package/modules/drive/assets/terminal.svg +67 -0
  11. package/modules/drive/bin/install.js +210 -0
  12. package/modules/drive/integration.js +76 -0
  13. package/modules/drive/package.json +38 -0
  14. package/modules/drive/src/commands/add-phase.md +36 -0
  15. package/modules/drive/src/commands/apply.md +83 -0
  16. package/modules/drive/src/commands/assumptions.md +37 -0
  17. package/modules/drive/src/commands/audit.md +57 -0
  18. package/modules/drive/src/commands/complete-milestone.md +36 -0
  19. package/modules/drive/src/commands/config.md +175 -0
  20. package/modules/drive/src/commands/consider-issues.md +41 -0
  21. package/modules/drive/src/commands/discover.md +48 -0
  22. package/modules/drive/src/commands/discuss-milestone.md +33 -0
  23. package/modules/drive/src/commands/discuss.md +34 -0
  24. package/modules/drive/src/commands/flows.md +73 -0
  25. package/modules/drive/src/commands/handoff.md +201 -0
  26. package/modules/drive/src/commands/help.md +525 -0
  27. package/modules/drive/src/commands/init.md +54 -0
  28. package/modules/drive/src/commands/map-codebase.md +34 -0
  29. package/modules/drive/src/commands/milestone.md +34 -0
  30. package/modules/drive/src/commands/pause.md +44 -0
  31. package/modules/drive/src/commands/plan-fix.md +216 -0
  32. package/modules/drive/src/commands/plan.md +36 -0
  33. package/modules/drive/src/commands/progress.md +138 -0
  34. package/modules/drive/src/commands/register.md +29 -0
  35. package/modules/drive/src/commands/remove-phase.md +37 -0
  36. package/modules/drive/src/commands/research-phase.md +209 -0
  37. package/modules/drive/src/commands/research.md +47 -0
  38. package/modules/drive/src/commands/resume.md +49 -0
  39. package/modules/drive/src/commands/status.md +78 -0
  40. package/modules/drive/src/commands/unify.md +87 -0
  41. package/modules/drive/src/commands/verify.md +60 -0
  42. package/modules/drive/src/references/checkpoints.md +234 -0
  43. package/modules/drive/src/references/context-management.md +219 -0
  44. package/modules/drive/src/references/git-strategy.md +206 -0
  45. package/modules/drive/src/references/loop-phases.md +254 -0
  46. package/modules/drive/src/references/plan-format.md +263 -0
  47. package/modules/drive/src/references/quality-principles.md +152 -0
  48. package/modules/drive/src/references/research-quality-control.md +247 -0
  49. package/modules/drive/src/references/sonarqube-integration.md +244 -0
  50. package/modules/drive/src/references/specialized-workflow-integration.md +186 -0
  51. package/modules/drive/src/references/subagent-criteria.md +179 -0
  52. package/modules/drive/src/references/tdd.md +219 -0
  53. package/modules/drive/src/references/work-units.md +161 -0
  54. package/modules/drive/src/rules/commands.md +108 -0
  55. package/modules/drive/src/rules/references.md +107 -0
  56. package/modules/drive/src/rules/style.md +123 -0
  57. package/modules/drive/src/rules/templates.md +51 -0
  58. package/modules/drive/src/rules/workflows.md +133 -0
  59. package/modules/drive/src/templates/CONTEXT.md +88 -0
  60. package/modules/drive/src/templates/DEBUG.md +164 -0
  61. package/modules/drive/src/templates/DISCOVERY.md +148 -0
  62. package/modules/drive/src/templates/HANDOFF.md +77 -0
  63. package/modules/drive/src/templates/ISSUES.md +93 -0
  64. package/modules/drive/src/templates/MILESTONES.md +167 -0
  65. package/modules/drive/src/templates/PLAN.md +328 -0
  66. package/modules/drive/src/templates/PROJECT.md +219 -0
  67. package/modules/drive/src/templates/RESEARCH.md +130 -0
  68. package/modules/drive/src/templates/ROADMAP.md +328 -0
  69. package/modules/drive/src/templates/SPECIAL-FLOWS.md +70 -0
  70. package/modules/drive/src/templates/STATE.md +210 -0
  71. package/modules/drive/src/templates/SUMMARY.md +221 -0
  72. package/modules/drive/src/templates/UAT-ISSUES.md +139 -0
  73. package/modules/drive/src/templates/codebase/architecture.md +259 -0
  74. package/modules/drive/src/templates/codebase/concerns.md +329 -0
  75. package/modules/drive/src/templates/codebase/conventions.md +311 -0
  76. package/modules/drive/src/templates/codebase/integrations.md +284 -0
  77. package/modules/drive/src/templates/codebase/stack.md +190 -0
  78. package/modules/drive/src/templates/codebase/structure.md +287 -0
  79. package/modules/drive/src/templates/codebase/testing.md +484 -0
  80. package/modules/drive/src/templates/config.md +181 -0
  81. package/modules/drive/src/templates/milestone-archive.md +236 -0
  82. package/modules/drive/src/templates/milestone-context.md +190 -0
  83. package/modules/drive/src/templates/paul-json.md +147 -0
  84. package/modules/drive/src/vector-config/PAUL +26 -0
  85. package/modules/drive/src/vector-config/PAUL.manifest +11 -0
  86. package/modules/drive/src/workflows/apply-phase.md +393 -0
  87. package/modules/drive/src/workflows/audit-plan.md +344 -0
  88. package/modules/drive/src/workflows/complete-milestone.md +479 -0
  89. package/modules/drive/src/workflows/configure-special-flows.md +283 -0
  90. package/modules/drive/src/workflows/consider-issues.md +172 -0
  91. package/modules/drive/src/workflows/create-milestone.md +268 -0
  92. package/modules/drive/src/workflows/debug.md +292 -0
  93. package/modules/drive/src/workflows/discovery.md +187 -0
  94. package/modules/drive/src/workflows/discuss-milestone.md +245 -0
  95. package/modules/drive/src/workflows/discuss-phase.md +231 -0
  96. package/modules/drive/src/workflows/init-project.md +698 -0
  97. package/modules/drive/src/workflows/map-codebase.md +459 -0
  98. package/modules/drive/src/workflows/pause-work.md +259 -0
  99. package/modules/drive/src/workflows/phase-assumptions.md +181 -0
  100. package/modules/drive/src/workflows/plan-phase.md +385 -0
  101. package/modules/drive/src/workflows/quality-gate.md +263 -0
  102. package/modules/drive/src/workflows/register-manifest.md +107 -0
  103. package/modules/drive/src/workflows/research.md +241 -0
  104. package/modules/drive/src/workflows/resume-project.md +200 -0
  105. package/modules/drive/src/workflows/roadmap-management.md +334 -0
  106. package/modules/drive/src/workflows/transition-phase.md +368 -0
  107. package/modules/drive/src/workflows/unify-phase.md +290 -0
  108. package/modules/drive/src/workflows/verify-work.md +241 -0
  109. package/modules/forge/README.md +281 -0
  110. package/modules/forge/bin/install.js +200 -0
  111. package/modules/forge/package.json +32 -0
  112. package/modules/forge/skillsmith/rules/checklists-rules.md +42 -0
  113. package/modules/forge/skillsmith/rules/context-rules.md +43 -0
  114. package/modules/forge/skillsmith/rules/entry-point-rules.md +44 -0
  115. package/modules/forge/skillsmith/rules/frameworks-rules.md +43 -0
  116. package/modules/forge/skillsmith/rules/tasks-rules.md +52 -0
  117. package/modules/forge/skillsmith/rules/templates-rules.md +43 -0
  118. package/modules/forge/skillsmith/skillsmith.md +82 -0
  119. package/modules/forge/skillsmith/tasks/audit.md +277 -0
  120. package/modules/forge/skillsmith/tasks/discover.md +145 -0
  121. package/modules/forge/skillsmith/tasks/distill.md +276 -0
  122. package/modules/forge/skillsmith/tasks/scaffold.md +349 -0
  123. package/modules/forge/specs/checklists.md +193 -0
  124. package/modules/forge/specs/context.md +223 -0
  125. package/modules/forge/specs/entry-point.md +320 -0
  126. package/modules/forge/specs/frameworks.md +228 -0
  127. package/modules/forge/specs/rules.md +245 -0
  128. package/modules/forge/specs/tasks.md +344 -0
  129. package/modules/forge/specs/templates.md +335 -0
  130. package/modules/forge/terminal.svg +70 -0
  131. package/modules/ignition/README.md +245 -0
  132. package/modules/ignition/bin/install.js +184 -0
  133. package/modules/ignition/checklists/planning-quality.md +55 -0
  134. package/modules/ignition/data/application/config.md +21 -0
  135. package/modules/ignition/data/application/guide.md +51 -0
  136. package/modules/ignition/data/application/skill-loadout.md +11 -0
  137. package/modules/ignition/data/campaign/config.md +18 -0
  138. package/modules/ignition/data/campaign/guide.md +36 -0
  139. package/modules/ignition/data/campaign/skill-loadout.md +10 -0
  140. package/modules/ignition/data/client/config.md +18 -0
  141. package/modules/ignition/data/client/guide.md +36 -0
  142. package/modules/ignition/data/client/skill-loadout.md +11 -0
  143. package/modules/ignition/data/utility/config.md +18 -0
  144. package/modules/ignition/data/utility/guide.md +31 -0
  145. package/modules/ignition/data/utility/skill-loadout.md +8 -0
  146. package/modules/ignition/data/workflow/config.md +19 -0
  147. package/modules/ignition/data/workflow/guide.md +41 -0
  148. package/modules/ignition/data/workflow/skill-loadout.md +10 -0
  149. package/modules/ignition/integration.js +54 -0
  150. package/modules/ignition/package.json +35 -0
  151. package/modules/ignition/seed.md +81 -0
  152. package/modules/ignition/tasks/add-type.md +164 -0
  153. package/modules/ignition/tasks/graduate.md +182 -0
  154. package/modules/ignition/tasks/ideate.md +221 -0
  155. package/modules/ignition/tasks/launch.md +137 -0
  156. package/modules/ignition/tasks/status.md +71 -0
  157. package/modules/ignition/templates/planning-application.md +193 -0
  158. package/modules/ignition/templates/planning-campaign.md +138 -0
  159. package/modules/ignition/templates/planning-client.md +149 -0
  160. package/modules/ignition/templates/planning-utility.md +112 -0
  161. package/modules/ignition/templates/planning-workflow.md +125 -0
  162. package/modules/ignition/terminal.svg +74 -0
  163. package/modules/mission-control/CONTEXT-CONTINUITY-SPEC.md +293 -0
  164. package/modules/mission-control/CONTEXT-ENGINEERING-GUIDE.md +282 -0
  165. package/modules/mission-control/README.md +91 -0
  166. package/modules/mission-control/assets/terminal.svg +80 -0
  167. package/modules/mission-control/examples/entities.example.json +133 -0
  168. package/modules/mission-control/examples/projects.example.json +318 -0
  169. package/modules/mission-control/examples/state.example.json +183 -0
  170. package/modules/mission-control/examples/vector.example.json +245 -0
  171. package/modules/mission-control/mission-control/checklists/install-verification.md +46 -0
  172. package/modules/mission-control/mission-control/frameworks/framework-registry.md +83 -0
  173. package/modules/mission-control/mission-control/mission-control.md +83 -0
  174. package/modules/mission-control/mission-control/tasks/insights.md +73 -0
  175. package/modules/mission-control/mission-control/tasks/install.md +194 -0
  176. package/modules/mission-control/mission-control/tasks/status.md +125 -0
  177. package/modules/mission-control/schemas/entities.schema.json +89 -0
  178. package/modules/mission-control/schemas/projects.schema.json +221 -0
  179. package/modules/mission-control/schemas/state.schema.json +108 -0
  180. package/modules/mission-control/schemas/vector.schema.json +200 -0
  181. package/modules/momentum/README.md +678 -0
  182. package/modules/momentum/bin/install.js +563 -0
  183. package/modules/momentum/integration.js +131 -0
  184. package/modules/momentum/package.json +42 -0
  185. package/modules/momentum/schemas/entities.schema.json +89 -0
  186. package/modules/momentum/schemas/projects.schema.json +221 -0
  187. package/modules/momentum/schemas/state.schema.json +108 -0
  188. package/modules/momentum/src/commands/audit-claude-md.md +31 -0
  189. package/modules/momentum/src/commands/audit.md +33 -0
  190. package/modules/momentum/src/commands/groom.md +35 -0
  191. package/modules/momentum/src/commands/history.md +27 -0
  192. package/modules/momentum/src/commands/pulse.md +33 -0
  193. package/modules/momentum/src/commands/scaffold.md +33 -0
  194. package/modules/momentum/src/commands/status.md +28 -0
  195. package/modules/momentum/src/commands/surface-convert.md +35 -0
  196. package/modules/momentum/src/commands/surface-create.md +34 -0
  197. package/modules/momentum/src/commands/surface-list.md +27 -0
  198. package/modules/momentum/src/commands/vector-hygiene.md +33 -0
  199. package/modules/momentum/src/framework/context/momentum-principles.md +71 -0
  200. package/modules/momentum/src/framework/frameworks/audit-strategies.md +53 -0
  201. package/modules/momentum/src/framework/frameworks/satellite-registration.md +44 -0
  202. package/modules/momentum/src/framework/tasks/audit-claude-md.md +68 -0
  203. package/modules/momentum/src/framework/tasks/audit.md +64 -0
  204. package/modules/momentum/src/framework/tasks/groom.md +164 -0
  205. package/modules/momentum/src/framework/tasks/history.md +34 -0
  206. package/modules/momentum/src/framework/tasks/pulse.md +83 -0
  207. package/modules/momentum/src/framework/tasks/scaffold.md +202 -0
  208. package/modules/momentum/src/framework/tasks/status.md +35 -0
  209. package/modules/momentum/src/framework/tasks/surface-convert.md +143 -0
  210. package/modules/momentum/src/framework/tasks/surface-create.md +184 -0
  211. package/modules/momentum/src/framework/tasks/surface-list.md +42 -0
  212. package/modules/momentum/src/framework/tasks/vector-hygiene.md +160 -0
  213. package/modules/momentum/src/framework/templates/workspace-json.md +96 -0
  214. package/modules/momentum/src/hooks/_template.py +129 -0
  215. package/modules/momentum/src/hooks/active-hook.py +178 -0
  216. package/modules/momentum/src/hooks/backlog-hook.py +115 -0
  217. package/modules/momentum/src/hooks/mission-control-insights.py +169 -0
  218. package/modules/momentum/src/hooks/momentum-pulse-check.py +351 -0
  219. package/modules/momentum/src/hooks/operator.py +53 -0
  220. package/modules/momentum/src/hooks/psmm-injector.py +67 -0
  221. package/modules/momentum/src/hooks/satellite-detection.py +248 -0
  222. package/modules/momentum/src/packages/momentum-mcp/index.js +119 -0
  223. package/modules/momentum/src/packages/momentum-mcp/package.json +10 -0
  224. package/modules/momentum/src/packages/momentum-mcp/tools/entities.js +226 -0
  225. package/modules/momentum/src/packages/momentum-mcp/tools/operator.js +106 -0
  226. package/modules/momentum/src/packages/momentum-mcp/tools/projects.js +322 -0
  227. package/modules/momentum/src/packages/momentum-mcp/tools/psmm.js +206 -0
  228. package/modules/momentum/src/packages/momentum-mcp/tools/state.js +199 -0
  229. package/modules/momentum/src/packages/momentum-mcp/tools/surfaces.js +404 -0
  230. package/modules/momentum/src/skill/momentum.md +111 -0
  231. package/modules/momentum/src/tasks/groom.md +164 -0
  232. package/modules/momentum/src/templates/operator.json +66 -0
  233. package/modules/momentum/src/templates/workspace.json +111 -0
  234. package/modules/momentum/terminal.svg +77 -0
  235. package/modules/radar/README.md +1552 -0
  236. package/modules/radar/commands/audit.md +233 -0
  237. package/modules/radar/commands/guardrails.md +194 -0
  238. package/modules/radar/commands/init.md +207 -0
  239. package/modules/radar/commands/playbook.md +176 -0
  240. package/modules/radar/commands/remediate.md +156 -0
  241. package/modules/radar/commands/report.md +172 -0
  242. package/modules/radar/commands/resume.md +176 -0
  243. package/modules/radar/commands/status.md +148 -0
  244. package/modules/radar/commands/transform.md +205 -0
  245. package/modules/radar/commands/validate.md +177 -0
  246. package/modules/radar/docs/ARCHITECTURE.md +336 -0
  247. package/modules/radar/docs/GETTING-STARTED.md +287 -0
  248. package/modules/radar/docs/standards/agents.md +197 -0
  249. package/modules/radar/docs/standards/commands.md +250 -0
  250. package/modules/radar/docs/standards/domains.md +191 -0
  251. package/modules/radar/docs/standards/personas.md +211 -0
  252. package/modules/radar/docs/standards/rules.md +218 -0
  253. package/modules/radar/docs/standards/runtime.md +445 -0
  254. package/modules/radar/docs/standards/schemas.md +269 -0
  255. package/modules/radar/docs/standards/tools.md +273 -0
  256. package/modules/radar/docs/standards/workflows.md +254 -0
  257. package/modules/radar/docs/terminal.svg +72 -0
  258. package/modules/radar/docs/validation/convention-compliance-report.md +183 -0
  259. package/modules/radar/docs/validation/cross-reference-report.md +195 -0
  260. package/modules/radar/docs/validation/validation-summary.md +118 -0
  261. package/modules/radar/docs/validation/version-manifest.yaml +363 -0
  262. package/modules/radar/install.sh +711 -0
  263. package/modules/radar/integration.js +53 -0
  264. package/modules/radar/src/core/agents/architect.md +25 -0
  265. package/modules/radar/src/core/agents/compliance-officer.md +25 -0
  266. package/modules/radar/src/core/agents/data-engineer.md +25 -0
  267. package/modules/radar/src/core/agents/devils-advocate.md +22 -0
  268. package/modules/radar/src/core/agents/performance-engineer.md +25 -0
  269. package/modules/radar/src/core/agents/principal-engineer.md +23 -0
  270. package/modules/radar/src/core/agents/reality-gap-analyst.md +22 -0
  271. package/modules/radar/src/core/agents/security-engineer.md +25 -0
  272. package/modules/radar/src/core/agents/senior-app-engineer.md +25 -0
  273. package/modules/radar/src/core/agents/sre.md +25 -0
  274. package/modules/radar/src/core/agents/staff-engineer.md +23 -0
  275. package/modules/radar/src/core/agents/test-engineer.md +25 -0
  276. package/modules/radar/src/core/personas/architect.md +111 -0
  277. package/modules/radar/src/core/personas/compliance-officer.md +104 -0
  278. package/modules/radar/src/core/personas/data-engineer.md +113 -0
  279. package/modules/radar/src/core/personas/devils-advocate.md +105 -0
  280. package/modules/radar/src/core/personas/performance-engineer.md +119 -0
  281. package/modules/radar/src/core/personas/principal-engineer.md +119 -0
  282. package/modules/radar/src/core/personas/reality-gap-analyst.md +111 -0
  283. package/modules/radar/src/core/personas/security-engineer.md +108 -0
  284. package/modules/radar/src/core/personas/senior-app-engineer.md +111 -0
  285. package/modules/radar/src/core/personas/sre.md +117 -0
  286. package/modules/radar/src/core/personas/staff-engineer.md +109 -0
  287. package/modules/radar/src/core/personas/test-engineer.md +109 -0
  288. package/modules/radar/src/core/workflows/disagreement-resolution.md +183 -0
  289. package/modules/radar/src/core/workflows/phase-0-context.md +148 -0
  290. package/modules/radar/src/core/workflows/phase-1-reconnaissance.md +169 -0
  291. package/modules/radar/src/core/workflows/phase-2-domain-audits.md +190 -0
  292. package/modules/radar/src/core/workflows/phase-3-cross-domain.md +177 -0
  293. package/modules/radar/src/core/workflows/phase-4-adversarial-review.md +165 -0
  294. package/modules/radar/src/core/workflows/phase-5-report.md +189 -0
  295. package/modules/radar/src/core/workflows/phase-checkpoint.md +222 -0
  296. package/modules/radar/src/core/workflows/session-handoff.md +152 -0
  297. package/modules/radar/src/domains/00-context.md +201 -0
  298. package/modules/radar/src/domains/01-architecture.md +248 -0
  299. package/modules/radar/src/domains/02-data.md +224 -0
  300. package/modules/radar/src/domains/03-correctness.md +230 -0
  301. package/modules/radar/src/domains/04-security.md +274 -0
  302. package/modules/radar/src/domains/05-compliance.md +228 -0
  303. package/modules/radar/src/domains/06-testing.md +228 -0
  304. package/modules/radar/src/domains/07-reliability.md +246 -0
  305. package/modules/radar/src/domains/08-performance.md +247 -0
  306. package/modules/radar/src/domains/09-maintainability.md +271 -0
  307. package/modules/radar/src/domains/10-operability.md +250 -0
  308. package/modules/radar/src/domains/11-change-risk.md +246 -0
  309. package/modules/radar/src/domains/12-team-risk.md +221 -0
  310. package/modules/radar/src/domains/13-risk-synthesis.md +202 -0
  311. package/modules/radar/src/rules/agent-boundaries.md +78 -0
  312. package/modules/radar/src/rules/disagreement-protocol.md +76 -0
  313. package/modules/radar/src/rules/epistemic-hygiene.md +78 -0
  314. package/modules/radar/src/schemas/confidence.md +185 -0
  315. package/modules/radar/src/schemas/disagreement.md +238 -0
  316. package/modules/radar/src/schemas/finding.md +287 -0
  317. package/modules/radar/src/schemas/report-section.md +150 -0
  318. package/modules/radar/src/schemas/signal.md +108 -0
  319. package/modules/radar/src/tools/checkov.md +463 -0
  320. package/modules/radar/src/tools/git-history.md +581 -0
  321. package/modules/radar/src/tools/gitleaks.md +447 -0
  322. package/modules/radar/src/tools/grype.md +611 -0
  323. package/modules/radar/src/tools/semgrep.md +378 -0
  324. package/modules/radar/src/tools/sonarqube.md +550 -0
  325. package/modules/radar/src/tools/syft.md +539 -0
  326. package/modules/radar/src/tools/trivy.md +439 -0
  327. package/modules/radar/src/transform/agents/change-risk-modeler.md +24 -0
  328. package/modules/radar/src/transform/agents/execution-validator.md +24 -0
  329. package/modules/radar/src/transform/agents/guardrail-generator.md +24 -0
  330. package/modules/radar/src/transform/agents/pedagogy-agent.md +24 -0
  331. package/modules/radar/src/transform/agents/remediation-architect.md +24 -0
  332. package/modules/radar/src/transform/personas/change-risk-modeler.md +95 -0
  333. package/modules/radar/src/transform/personas/execution-validator.md +95 -0
  334. package/modules/radar/src/transform/personas/guardrail-generator.md +103 -0
  335. package/modules/radar/src/transform/personas/pedagogy-agent.md +105 -0
  336. package/modules/radar/src/transform/personas/remediation-architect.md +95 -0
  337. package/modules/radar/src/transform/rules/change-risk-rules.md +87 -0
  338. package/modules/radar/src/transform/rules/safety-governance.md +87 -0
  339. package/modules/radar/src/transform/schemas/change-risk.md +139 -0
  340. package/modules/radar/src/transform/schemas/intervention-level.md +207 -0
  341. package/modules/radar/src/transform/schemas/playbook.md +205 -0
  342. package/modules/radar/src/transform/schemas/verification-plan.md +134 -0
  343. package/modules/radar/src/transform/workflows/phase-6-remediation.md +148 -0
  344. package/modules/radar/src/transform/workflows/phase-7-risk-validation.md +161 -0
  345. package/modules/radar/src/transform/workflows/phase-8-execution-planning.md +159 -0
  346. package/modules/radar/src/transform/workflows/transform-safety.md +158 -0
  347. package/modules/vector/.vector-template/sessions/.gitkeep +0 -0
  348. package/modules/vector/.vector-template/vector.json +72 -0
  349. package/modules/vector/AUDIT-CLAUDEMD.md +154 -0
  350. package/modules/vector/INSTALL.md +185 -0
  351. package/modules/vector/LICENSE +21 -0
  352. package/modules/vector/README.md +409 -0
  353. package/modules/vector/VECTOR-BLOCK.md +57 -0
  354. package/modules/vector/assets/terminal.svg +68 -0
  355. package/modules/vector/bin/install.js +455 -0
  356. package/modules/vector/bin/migrate-v1-to-v2.sh +492 -0
  357. package/modules/vector/commands/help.md +46 -0
  358. package/modules/vector/hooks/vector-hook.py +775 -0
  359. package/modules/vector/mcp/index.js +118 -0
  360. package/modules/vector/mcp/package.json +10 -0
  361. package/modules/vector/mcp/tools/decisions.js +269 -0
  362. package/modules/vector/mcp/tools/domains.js +361 -0
  363. package/modules/vector/mcp/tools/staging.js +252 -0
  364. package/modules/vector/mcp/tools/vector-json.js +647 -0
  365. package/modules/vector/package.json +38 -0
  366. package/modules/vector/schemas/vector.schema.json +237 -0
  367. package/package.json +39 -0
  368. package/shared/branding/branding.js +70 -0
  369. package/shared/config/defaults.json +59 -0
  370. package/shared/events/README.md +175 -0
  371. package/shared/events/event-bus.js +134 -0
  372. package/shared/events/event_bus.py +255 -0
  373. package/shared/events/integrations.js +161 -0
  374. package/shared/events/schemas/audit-complete.schema.json +21 -0
  375. package/shared/events/schemas/phase-progress.schema.json +23 -0
  376. package/shared/events/schemas/plan-created.schema.json +21 -0
@@ -0,0 +1,87 @@
1
+ ---
2
+ id: change-risk-rules
3
+ name: Change Risk Rules
4
+ scope: transform_agents
5
+ priority: critical
6
+ ---
7
+
8
+ ## Purpose
9
+
10
+ Without change-risk rules, Transform agents produce remediation plans that ignore the collateral damage of fixes. A technically correct fix that touches 30 files, introduces 3 new dependencies, and modifies untested code paths is not a good fix — it is a new source of risk that may exceed the original finding's impact. These rules enforce that every remediation is assessed for its own risk, not just for its correctness.
11
+
12
+ Change-risk rules prevent two specific failure modes. First, optimistic risk assessment — agents that claim "low blast radius" without actually tracing the dependency chain, or "low regression risk" without checking test coverage. Second, risk-intervention disconnect — agents that produce high-risk change plans at high intervention levels, creating authoritative-sounding remediation that is actually dangerous to apply.
13
+
14
+ Every risk claim must be backed by evidence. "This change is isolated" is not a risk assessment — it is an assertion. "This change modifies `config/database.py` which is imported by `config/__init__.py` and consumed by 3 modules (`app.py`, `workers/sync.py`, `scripts/migrate.py`)" is a risk assessment. The difference is that the second statement is falsifiable — someone can verify the import chain.
15
+
16
+ Every rule in this file has `priority: critical`. Violations invalidate the output.
17
+
18
+ ## Rules
19
+
20
+ ### 1. Mandatory Blast Radius Assessment
21
+
22
+ **Statement:** Every remediation playbook must include a blast radius assessment with a score (1-5), evidence citing specific files and dependency chains, and a complete list of affected files. No playbook may claim "this change is isolated" or "low blast radius" without enumerating what the change touches and tracing at least one level of downstream consumers.
23
+
24
+ **Rationale:** Blast radius is the most commonly under-estimated risk dimension because it requires tracing dependencies, which is tedious. Agents naturally default to "this is a small change" without verifying the claim. A one-line change to a utility function imported by 40 modules has a blast radius of 40, not 1. Without mandatory enumeration, blast radius assessments are wishes, not measurements.
25
+
26
+ **Enforcement:** Playbook schema validation (@schema:playbook) rejects any playbook where `blast_radius_evidence` is empty or contains no file path references. The `affected_files` list in the corresponding change-risk assessment (@schema:change-risk) must contain at least one entry. If the blast radius score is 1 or 2, the evidence must explain why downstream impact is limited (e.g., "no downstream consumers" or "interface unchanged, only internal implementation modified"). Low scores without explanation are flagged for review.
27
+
28
+ ### 2. Coupling Analysis Before Structural Changes
29
+
30
+ **Statement:** Any remediation that adds, removes, or modifies dependencies between modules, packages, services, or external systems must include a coupling analysis. New dependencies must be justified — why this dependency is necessary, what alternatives were considered, and what happens if the dependency fails or is removed. Changes that tighten coupling (increase the dependency count or create bidirectional dependencies) must acknowledge this in the risk metadata.
31
+
32
+ **Rationale:** The most dangerous remediation patterns are those that "fix" a finding by introducing a new dependency. Externalizing configuration into a secrets manager fixes hardcoded credentials but introduces a runtime dependency on an external service. This is often the right tradeoff — but it must be an acknowledged, assessed tradeoff, not an invisible side effect. Without coupling analysis, Transform optimizes for finding resolution at the expense of system simplicity.
33
+
34
+ **Enforcement:** Change-risk assessment validation (@schema:change-risk) checks that `new_dependencies` is populated (even if empty, indicating no new dependencies). If `new_dependencies` contains any entries and `coupling_risk_score` is below 3, the evidence must explain why the new dependency does not significantly increase coupling. The coupling risk evidence must reference the specific interfaces or import relationships affected.
35
+
36
+ ### 3. Regression Probability with Evidence
37
+
38
+ **Statement:** Every change-risk assessment must state the regression probability with evidence grounded in test coverage data. If test coverage data is available, cite the coverage percentage for the affected files. If test coverage data is unavailable, state this explicitly — "no test coverage data available" is valid evidence; "low regression risk" without data is not. Changes to files with zero test coverage must include an explicit warning: "UNTESTED CODE PATH — no existing tests cover this modification."
39
+
40
+ **Rationale:** Regression probability without test coverage data is speculation. An agent that claims "low regression risk" for a change to an untested module is not being conservative — it is being dishonest about its knowledge. The presence or absence of tests is the single strongest predictor of whether a change will introduce regressions. Requiring evidence forces agents to check rather than assume.
41
+
42
+ **Enforcement:** Change-risk assessment validation (@schema:change-risk) checks that `regression_probability_evidence` contains either a coverage percentage reference or an explicit "no coverage data" statement. If `test_coverage_pct` is 0 and `regression_probability_score` is below 3, the evidence must justify why zero test coverage does not indicate elevated regression risk (e.g., "generated file, not executed directly"). If `test_coverage_pct` is 0 and no justification is provided, the minimum valid `regression_probability_score` is 3 (medium risk).
43
+
44
+ ### 4. Unsafe Context Downgrade
45
+
46
+ **Statement:** If any single risk dimension in a change-risk assessment scores 4 or higher (out of 5), the change is flagged as unsafe and automatically downgraded to Suggesting intervention level regardless of finding confidence or severity. The unsafe flag must identify which dimension triggered it and provide the specific evidence. A change can only exit unsafe status through re-assessment that brings all dimensions below 4.
47
+
48
+ **Rationale:** High-risk changes at high intervention levels are the most dangerous output Transform can produce. An Authorizing-level playbook with blast radius 4/5 is telling the system "this change is ready for execution" while simultaneously acknowledging that it ripples widely through the codebase. The unsafe context downgrade is a circuit breaker — it ensures that changes with any extreme risk dimension are constrained to informational output only, where the cost of a mistake is lowest.
49
+
50
+ **Enforcement:** Workflow validation checks all four risk dimensions in the change-risk assessment (@schema:change-risk). If any dimension's score is ≥4: (1) the playbook's intervention level is overridden to `suggesting`, (2) the playbook must include an unsafe context flag identifying the triggering dimension, score, and evidence, (3) the change-risk assessment's `recommendation` must be `human_review_required` or `reject`. This override is not optional and cannot be bypassed by the agent.
51
+
52
+ ### 5. Risk-Recommendation Alignment
53
+
54
+ **Statement:** The `overall_risk` classification and `recommendation` in a change-risk assessment must be logically consistent. High or critical risk cannot produce a "proceed" recommendation. Low risk with a "reject" recommendation must be explicitly justified. The valid default mappings are: low→proceed, medium→proceed_with_caution, high→human_review_required, critical→reject. Deviations from these defaults require justification in the risk summary.
55
+
56
+ **Rationale:** Disconnects between risk assessment and recommendation undermine trust in the entire assessment. If an agent rates a change as "high risk" but recommends "proceed," the human reviewer must decide which signal to trust — the quantitative assessment or the qualitative recommendation. This ambiguity defeats the purpose of structured risk assessment. Risk-recommendation alignment ensures that the assessment's conclusion follows from its evidence, and deviations are conscious choices, not oversights.
57
+
58
+ **Enforcement:** Change-risk assessment validation (@schema:change-risk) checks that `recommendation` matches the default mapping for `overall_risk`. If the recommendation deviates from the default (e.g., medium risk with `proceed` instead of `proceed_with_caution`), the `risk_summary` must contain an explicit justification for the deviation. Assessments with misaligned risk and recommendation and no justification are validation errors.
59
+
60
+ ## DO
61
+
62
+ - Change-risk assessment for a configuration change: "Blast radius 2/5 — change modifies `config/database.py` (3 lines). Downstream consumer: `config/__init__.py` imports `DB_USER`, `DB_PASS`, `DB_HOST`. Variable names unchanged, so `app.py`, `workers/sync.py`, `scripts/migrate.py` which import from `config` are unaffected at the interface level."
63
+
64
+ - Regression probability assessment with coverage data: "Regression probability 2/5 — `tests/test_config.py` covers 78% of `config/database.py`. 4 existing test cases will need environment variable fixtures after the change. No test-free code paths are being modified."
65
+
66
+ - Unsafe context downgrade applied: "Change-risk dimension blast_radius scores 4/5 (change modifies the base `HttpClient` class used by 47 modules). UNSAFE CONTEXT — downgrading to Suggesting intervention level. Blast radius evidence: `grep -r 'import.*HttpClient' src/` returns 47 unique files. This change requires human architectural review before any structured remediation plan."
67
+
68
+ - New dependency justified: "Coupling risk 2/5 — introduces `python-dotenv` (no transitive dependencies, 15M weekly downloads, MIT license). Alternative considered: manual `os.environ` without `.env` support. Rejected because local development requires `.env` file loading. If `python-dotenv` is unavailable, application still works — `load_dotenv()` is called but failure is non-fatal when environment variables are set directly."
69
+
70
+ - Low-coverage warning: "UNTESTED CODE PATH — `config/database.py` has 0% test coverage per coverage.py. No existing tests validate database configuration loading. Regression probability elevated to 4/5. Recommend writing tests before applying this remediation."
71
+
72
+ ## DON'T
73
+
74
+ - Change-risk assessment with blast radius 1/5 and evidence: "This is a small change."
75
+ **Why this is wrong:** "Small change" is a judgment, not evidence. Blast radius evidence must cite specific files and trace at least one level of downstream consumers. A one-line change to a utility function can have a blast radius of 5/5 if 50 modules import it.
76
+
77
+ - Regression probability 1/5 with no mention of test coverage.
78
+ **Why this is wrong:** Regression probability without test coverage data is speculation. Score of 1 implies high confidence that no regressions will occur — this requires evidence (high test coverage, additive-only change, no behavior modification). Without coverage data, the minimum defensible score is 3 for any change that modifies existing behavior.
79
+
80
+ - Change-risk assessment with overall_risk: high and recommendation: proceed.
81
+ **Why this is wrong:** High risk and "proceed" are contradictory. If the risk is high, the recommendation must be at least `human_review_required`. A "proceed" recommendation for a high-risk change tells the reviewer "go ahead" while the assessment says "this is dangerous" — the disconnect erodes trust in the entire assessment system.
82
+
83
+ - Playbook at Authorizing level with blast_radius score 4/5 in the change-risk assessment.
84
+ **Why this is wrong:** Any risk dimension scoring 4+ triggers the unsafe context downgrade. The playbook must be constrained to Suggesting level. There is no mechanism to keep it at Authorizing — the circuit breaker is automatic and non-overridable.
85
+
86
+ - Coupling risk assessment: "No new dependencies" when the change adds `import redis` to a module that previously had no Redis dependency.
87
+ **Why this is wrong:** Adding an import to a new package is a new dependency. The `new_dependencies` list must include `redis`. Coupling risk evidence must address the runtime dependency on a Redis server — what happens if Redis is unavailable, is there a fallback, does this change the deployment requirements?
@@ -0,0 +1,87 @@
1
+ ---
2
+ id: safety-governance
3
+ name: Safety Governance
4
+ scope: transform_agents
5
+ priority: critical
6
+ ---
7
+
8
+ ## Purpose
9
+
10
+ Without safety governance rules, Transform agents produce overconfident remediation plans, escalate intervention levels without evidence, bypass confidence requirements when findings feel important, and — most dangerously — blur the boundary between producing plans and executing changes. These are the hard boundaries of the Transform system.
11
+
12
+ Safety governance prevents the failure mode that makes AI-assisted remediation dangerous: well-structured, authoritative-sounding change plans built on insufficient evidence. A playbook that reaches Authorizing level with medium-confidence findings is not "slightly optimistic" — it is a change specification that a human reviewer may trust because the system presented it at a high governance tier. The tier itself becomes a false signal of evidence strength.
13
+
14
+ These rules are non-negotiable. Unlike Core epistemic rules where a quality violation degrades output, a Transform safety violation can cause damage to the target codebase. A playbook that bypasses confidence gating and reaches Drive for execution planning has passed through every safety gate and acquired a veneer of legitimacy. If the underlying evidence was insufficient, the damage is amplified by the system's own authority.
15
+
16
+ Every rule in this file has `priority: critical`. Violations invalidate the output.
17
+
18
+ ## Rules
19
+
20
+ ### 1. No Auto-Execution
21
+
22
+ **Statement:** Radar Transform NEVER applies changes to the target codebase. Transform produces plans, assessments, and verification procedures. It does not modify source files, configuration files, database schemas, infrastructure definitions, or any artifact in the target project's working tree. Drive mediates all codebase modifications with human oversight.
23
+
24
+ **Rationale:** The separation between diagnosis/planning and execution is a hard architectural boundary, not a configurable preference. If Transform could execute changes, a single miscalibrated confidence score or an incorrect risk assessment would result in codebase damage with no human checkpoint. The execution boundary exists because the cost of a false positive in planning (a bad plan that gets rejected) is negligible, while the cost of a false positive in execution (a bad change that gets applied) can be severe.
25
+
26
+ **Enforcement:** No Transform workflow includes file-modification steps outside `.radar/` operational directory. If a Transform agent produces output that includes write operations to the target codebase (file creation, file modification, file deletion), the output is a critical violation and must be rejected at workflow validation. There is no trusted mode, no bypass flag, no override mechanism. This is enforced at the workflow definition level — Transform workflows simply do not have write access to the target tree.
27
+
28
+ ### 2. Conservative Bias
29
+
30
+ **Statement:** Transform agents must default to the lowest intervention level that serves the user's needs. When uncertain about the appropriate intervention level, agents must downgrade — Authorizing becomes Planning, Planning becomes Suggesting. Escalation beyond the default requires explicit evidence justification citing specific sources.
31
+
32
+ **Rationale:** The default behavior of language models is to present recommendations with high confidence and strong language. In the context of remediation planning, this natural tendency maps to intervention level inflation — a suggestion becomes a plan, a plan becomes an authorization. Conservative bias corrects for this by requiring agents to actively justify escalation rather than passively assuming it. The asymmetry is deliberate: under-escalation wastes a developer's time reading a suggestion when they could have had a plan. Over-escalation risks codebase damage from an insufficiently-evidenced change.
33
+
34
+ **Enforcement:** Every playbook's intervention level must include an escalation justification when the level is Planning or above. The justification must cite: (1) the finding confidence that gates this level, (2) the number and type of evidence sources, and (3) for Authorizing/Executing, the change-risk assessment score. Playbooks without escalation justification are capped at Suggesting. Workflow validation checks that the justification references exist and are consistent with the claimed level.
35
+
36
+ ### 3. Confidence Gating
37
+
38
+ **Statement:** The intervention level of a playbook is hard-gated by the source finding's confidence (@schema:confidence overall derivation). The minimum thresholds are: Suggesting requires any confidence (low, medium, or high); Planning requires medium or high confidence with at least 2 independent evidence sources; Authorizing requires high confidence with at least 3 cross-validated evidence sources; Executing requires high confidence with at least 3 cross-validated evidence sources. No mechanism exists to override these thresholds.
39
+
40
+ **Rationale:** Confidence gating prevents the most dangerous scenario: a high-intervention remediation plan built on weak evidence. Without gating, a Transform agent could observe a single Semgrep signal, assess it as critical severity, and produce an Authorizing-level playbook — creating a change specification that carries the system's authority but rests on a single tool output. Confidence gating ensures that the evidence bar rises with the intervention level. Severity does not override confidence: a critical-severity finding with low confidence is still capped at Suggesting.
41
+
42
+ **Enforcement:** Schema validation at @schema:playbook rejects any playbook where the declared intervention level exceeds the confidence gate. Validation checks: (1) finding's confidence overall meets or exceeds the level's minimum, (2) the number of distinct evidence sources in the finding meets or exceeds the level's minimum, (3) for Authorizing/Executing, at least one evidence source must corroborate another (cross-validation). Evidence source counting uses @schema:finding Layer 2 (evidence sourcing) — each distinct source type (tool signal, manual observation, documentation reference, test result) counts as one source regardless of how many instances of that type exist.
43
+
44
+ ### 4. Liability Escalation
45
+
46
+ **Statement:** At Suggesting and Planning levels, Radar operates as an Advisor — it provides information and recommendations with no expectation that its output will be applied without independent verification. At Authorizing and Executing levels, Radar operates as an Architectural Actor — its output is intended to be applied to the codebase, and it must include explicit confidence statements and liability disclaimers. Higher liability postures require higher confidence and lower change risk.
47
+
48
+ **Rationale:** The liability distinction is not cosmetic. When a system produces a suggestion, the human reviewer treats it as input to their own decision-making process. When a system produces an authorization-level change specification, the human reviewer is more likely to trust the system's assessment and approve without deep review — the tier itself signals "this has been thoroughly vetted." If the vetting was insufficient, the tier becomes a vector for false authority. Liability escalation ensures that the output explicitly states its evidential basis and limitations at the levels where humans are most likely to defer to the system.
49
+
50
+ **Enforcement:** Authorizing and Executing-level playbooks must include a disclaimer section with: (1) confidence statement citing the finding's confidence and evidence source count, (2) risk statement citing the change-risk assessment's overall risk, (3) limitation acknowledgment identifying any evidence gaps or assumptions. Missing disclaimers are validation errors. The disclaimer must be a substantive assessment, not boilerplate — "This plan has been reviewed" is not a valid disclaimer.
51
+
52
+ ### 5. Intervention Level Immutability After Approval
53
+
54
+ **Statement:** Once a playbook is assigned an intervention level and approved at that level by a human reviewer, the level cannot be upgraded without a full re-assessment including updated evidence review, confidence re-evaluation, and risk re-assessment. Downgrading is always permitted without re-assessment. This prevents post-approval escalation where a Planning-level playbook is silently upgraded to Authorizing after human review.
55
+
56
+ **Rationale:** Post-approval escalation is a subtle but dangerous failure mode. A human reviews a Planning-level playbook with the understanding that it is a recommendation. If the system later upgrades it to Authorizing without re-review, the human's approval — given at a lower tier — is retroactively applied to a higher tier. The human did not consent to Authorizing-level output. Immutability after approval ensures that escalation always triggers re-review.
57
+
58
+ **Enforcement:** Playbook metadata includes an `approved_at_level` field that records the level at which human approval was granted. Workflow validation rejects any execution at a level higher than `approved_at_level`. Downgrade workflows do not require re-approval. Upgrade workflows must reset `approved_at_level` to null and re-enter the approval pipeline.
59
+
60
+ ## DO
61
+
62
+ - Playbook assigned Suggesting level with note: "Single Semgrep signal (S-SEM-047). No corroborating evidence from other tools or manual review. Confidence low. Capped at Suggesting per confidence gating rule."
63
+
64
+ - Playbook downgraded from Planning to Suggesting after re-assessment: "Initial assessment cited 2 evidence sources, but both are from the same Semgrep rule set — counting as 1 independent source. Downgrading to Suggesting. Planning requires 2 independent sources."
65
+
66
+ - Authorizing-level playbook includes disclaimer: "Based on 3 independent evidence sources (Semgrep signal S-SEM-047, manual code review observation, Gitleaks detection GL-012) with overall confidence high. Change risk assessment CR-001 rates overall risk as low. Limitation: test coverage for the affected module is 78% — regression probability score of 2/5 reflects this gap. This remediation plan should be reviewed by a qualified engineer before application."
67
+
68
+ - Agent produces Planning-level playbook for a critical-severity finding with medium confidence: "Finding F-04-001 is severity critical but confidence medium (2 evidence sources). Confidence gates intervention at Planning. Cannot escalate to Authorizing without a third independent evidence source achieving high confidence. Severity does not override confidence."
69
+
70
+ - Transform workflow produces playbooks and risk assessments as `.radar/` artifacts without modifying target codebase files. All output written to `.radar/transform/output/`.
71
+
72
+ ## DON'T
73
+
74
+ - Playbook assigned Authorizing level for a finding with confidence medium.
75
+ **Why this is wrong:** Authorizing requires high confidence with 3+ cross-validated evidence sources. Medium confidence is hard-capped at Planning. The severity of the finding is irrelevant to the confidence gate — a critical-severity finding with medium confidence is still capped at Planning.
76
+
77
+ - Transform agent modifies `src/config/database.py` directly to implement the remediation.
78
+ **Why this is wrong:** Transform never modifies target codebase files. It produces plans; Drive executes plans with human oversight. There is no "just this once" exception, no "it's a trivial change" bypass. The execution boundary is absolute.
79
+
80
+ - Playbook at Planning level with escalation justification: "This seems like it should be at least Planning level given the severity."
81
+ **Why this is wrong:** "Seems like" is not evidence. Escalation justification must cite specific confidence levels and evidence source counts. Severity does not justify escalation — confidence does.
82
+
83
+ - Planning-level playbook approved by human, then silently upgraded to Authorizing by the system for inclusion in a Drive execution plan.
84
+ **Why this is wrong:** The human approved at Planning level — they consented to a recommendation, not an execution specification. Upgrading without re-review retroactively elevates the human's consent. Escalation requires re-assessment and re-approval.
85
+
86
+ - Authorizing-level playbook with disclaimer: "This plan has been thoroughly reviewed and is ready for implementation."
87
+ **Why this is wrong:** This is boilerplate, not a substantive disclaimer. A valid disclaimer cites the specific confidence, evidence count, risk assessment, and limitations. "Thoroughly reviewed" is a conclusion, not an assessment.
@@ -0,0 +1,139 @@
1
+ ---
2
+ id: change-risk
3
+ name: Change Risk Assessment
4
+ version: 1.0.0
5
+ used_by:
6
+ - change-risk-modeler
7
+ - execution-validator
8
+ ---
9
+
10
+ ## Purpose
11
+
12
+ A Change Risk Assessment is a multi-dimensional risk evaluation for a proposed change to the target codebase. Every change that Transform considers — from a single-line configuration fix to a multi-file architectural refactor — must be assessed across four risk dimensions before a recommendation is issued.
13
+
14
+ Risk assessment exists because fixes have costs. A remediation that addresses a medium-severity finding but introduces high coupling risk and touches untested code paths may cause more damage than the original issue. Without structured risk assessment, Transform optimizes for "fix count" rather than "net improvement" — producing technically correct remediations that are practically dangerous.
15
+
16
+ Each risk dimension captures a different failure mode of change: blast radius measures how widely a change ripples, coupling risk measures whether the fix creates new dependencies, regression probability measures the likelihood of breaking existing functionality, and architectural tension measures whether the fix conflicts with the codebase's design direction. All four dimensions must be scored with evidence — a score without evidence is an unsupported assertion.
17
+
18
+ The overall risk classification and recommendation are derived from the dimensional scores but are not mechanical averages. A change with three dimensions at 1/5 and one dimension at 5/5 is not "low risk" — the critical dimension dominates. This mirrors the conservative derivation principle from @schema:confidence: the weakest dimension determines the overall posture.
19
+
20
+ Change Risk Assessments are consumed by the safety governance rules to gate intervention levels. High-risk changes are automatically constrained to lower intervention levels regardless of finding confidence.
21
+
22
+ ## Template
23
+
24
+ ```markdown
25
+ ### {change_id}
26
+
27
+ **Findings Addressed:** {finding_refs}
28
+ **Overall Risk:** {overall_risk}
29
+ **Recommendation:** {recommendation}
30
+
31
+ ---
32
+
33
+ #### Blast Radius
34
+
35
+ **Score:** {blast_radius_score}/5
36
+ **Evidence:** {blast_radius_evidence}
37
+ **Affected Files:** {affected_files}
38
+
39
+ #### Coupling Risk
40
+
41
+ **Score:** {coupling_risk_score}/5
42
+ **Evidence:** {coupling_risk_evidence}
43
+ **New Dependencies:** {new_dependencies}
44
+
45
+ #### Regression Probability
46
+
47
+ **Score:** {regression_probability_score}/5
48
+ **Evidence:** {regression_probability_evidence}
49
+ **Test Coverage:** {test_coverage_pct}%
50
+
51
+ #### Architectural Tension
52
+
53
+ **Score:** {architectural_tension_score}/5
54
+ **Evidence:** {architectural_tension_evidence}
55
+ **Design Conflicts:** {design_conflicts}
56
+
57
+ ---
58
+
59
+ #### Risk Summary
60
+
61
+ {risk_summary}
62
+ ```
63
+
64
+ ## Field Reference
65
+
66
+ | Field | Type | Required | Description | Valid Values |
67
+ |-------|------|----------|-------------|--------------|
68
+ | `change_id` | string | yes | Unique change identifier. Format: `CR-{NNN}` where NNN is sequence. | Pattern: `CR-\d{3}` |
69
+ | `finding_refs` | list of strings | yes | Finding IDs this change addresses. A single change may remediate multiple related findings. Each must match a valid finding ID from @schema:finding. | List of `F-\d{2}-\d{3}` patterns. Minimum 1 entry. |
70
+ | `blast_radius_score` | integer | yes | How widely the change ripples through the codebase. | 1 (single file, no downstream consumers) to 5 (cross-service, multiple deployment units affected) |
71
+ | `blast_radius_evidence` | string | yes | Justification referencing specific dependency chains, import trees, or API contracts affected. | Free-form. Must cite concrete files or modules. |
72
+ | `affected_files` | list of strings | yes | Every file that will be directly modified or created by this change. | File paths relative to project root. Minimum 1 entry. |
73
+ | `coupling_risk_score` | integer | yes | Whether the change introduces or tightens coupling between components. | 1 (no new coupling, change is internal to one module) to 5 (creates hard dependency on external system or service) |
74
+ | `coupling_risk_evidence` | string | yes | Justification referencing specific interfaces, imports, or dependency relationships that are created or modified. | Free-form. Must cite concrete interfaces or dependencies. |
75
+ | `new_dependencies` | list of strings | yes | New package dependencies, service dependencies, or interface contracts introduced by this change. Empty list if no new dependencies. | List of dependency identifiers (package names, service names, API contracts). |
76
+ | `regression_probability_score` | integer | yes | Likelihood the change breaks existing functionality. | 1 (additive change, no existing behavior modified) to 5 (modifies core logic path with no test coverage) |
77
+ | `regression_probability_evidence` | string | yes | Justification referencing test coverage data, affected code paths, and historical change failure rates. | Free-form. Must cite test files, coverage metrics, or historical data. |
78
+ | `test_coverage_pct` | number | yes | Test coverage percentage for the files being modified. If unknown, state 0 with evidence explaining why coverage data is unavailable. | 0-100. |
79
+ | `architectural_tension_score` | integer | yes | Whether the change conflicts with the codebase's architectural direction or established patterns. | 1 (aligns with existing patterns) to 5 (contradicts established architecture, requires pattern migration) |
80
+ | `architectural_tension_evidence` | string | yes | Justification referencing architectural patterns, design documents, or established conventions in the codebase. | Free-form. Must cite concrete patterns or conventions. |
81
+ | `design_conflicts` | list of strings | yes | Specific architectural patterns or design decisions that this change conflicts with. Empty list if no conflicts. | List of pattern descriptions or document references. |
82
+ | `overall_risk` | enum | yes | Aggregate risk classification. Not a mechanical average — the highest-scoring dimension dominates. A single dimension at 5 with three at 1 is still high risk. | `low` (max dimension ≤2), `medium` (max dimension 3), `high` (max dimension 4), `critical` (any dimension 5) |
83
+ | `recommendation` | enum | yes | Action recommendation derived from overall risk. Must be logically consistent with the risk classification. | `proceed` (low risk, no special precautions), `proceed_with_caution` (medium risk, additional verification recommended), `human_review_required` (high risk, human must approve before execution), `reject` (critical risk, change should not be applied as designed) |
84
+ | `risk_summary` | string | yes | 2-4 sentence synthesis explaining the overall risk posture, the dominant risk dimension, and why the recommendation follows from the assessment. | Free-form. Must reference the specific dimensions that drive the recommendation. |
85
+
86
+ ## Validation Rules
87
+
88
+ 1. `change_id` must be unique across the entire audit. No two change risk assessments may share an ID. Format must match `CR-{NNN}`.
89
+ 2. `finding_refs` must contain at least one entry. Each entry must reference a valid finding ID from the current audit. A change that addresses no findings is purposeless.
90
+ 3. All four risk dimensions must have a score (integer 1-5), evidence (non-empty string), and dimension-specific sub-fields populated. A score without evidence is an unsupported assertion — it cannot be challenged or verified.
91
+ 4. `overall_risk` must reflect the dominant dimension: if any dimension scores 5, overall must be `critical`; if max dimension is 4, overall must be `high`; if max is 3, overall must be `medium`; if max is ≤2, overall must be `low`. Overriding this mapping requires explicit justification in `risk_summary`.
92
+ 5. `recommendation` must be logically consistent with `overall_risk`: `critical` risk cannot produce `proceed` or `proceed_with_caution`; `low` risk with `reject` must justify in `risk_summary`. The valid combinations are: low→proceed, medium→proceed_with_caution, high→human_review_required, critical→reject. Deviations require justification.
93
+ 6. `affected_files` must list every file that will be directly modified. An empty list is invalid — every change touches at least one file. Files listed here must be verifiable against the actual change.
94
+ 7. `test_coverage_pct` of 0 is valid only when accompanied by evidence explaining why coverage data is unavailable (no test suite, no coverage tooling, files are generated). A 0 without explanation is suspicious and should trigger reviewer attention.
95
+ 8. `risk_summary` must reference the specific dimension(s) that drive the recommendation. A generic summary like "this change is low risk" without citing which dimensions support that conclusion is invalid.
96
+
97
+ ## Examples
98
+
99
+ ### Example: Low-Risk Configuration Change
100
+
101
+ ```markdown
102
+ ### CR-001
103
+
104
+ **Findings Addressed:** F-04-001
105
+ **Overall Risk:** low
106
+ **Recommendation:** proceed
107
+
108
+ ---
109
+
110
+ #### Blast Radius
111
+
112
+ **Score:** 2/5
113
+ **Evidence:** Change is confined to `config/database.py` (3 lines modified) and `requirements.txt` (1 line added). The `config/__init__.py` module imports `DB_USER`, `DB_PASS`, `DB_HOST` from `database.py` — these variable names are unchanged, so downstream consumers are unaffected. No API contracts change. No deployment configuration changes beyond environment variable provisioning.
114
+ **Affected Files:** config/database.py, requirements.txt, .env.example, .gitignore
115
+
116
+ #### Coupling Risk
117
+
118
+ **Score:** 2/5
119
+ **Evidence:** Introduces runtime dependency on `python-dotenv` package (well-maintained, 15M weekly downloads, no transitive dependencies). Introduces implicit dependency on environment variable availability — application will fail to start without `DB_USER`, `DB_PASS`, `DB_HOST` set. This is intentional fail-closed behavior.
120
+ **New Dependencies:** python-dotenv
121
+
122
+ #### Regression Probability
123
+
124
+ **Score:** 2/5
125
+ **Evidence:** `tests/test_config.py` has 4 test cases covering database configuration import. Tests currently import the hardcoded values directly. After change, tests will need either a `.env` file in the test environment or environment variables set in the test runner. Test coverage for `config/` module is 78% per coverage.py output.
126
+ **Test Coverage:** 78%
127
+
128
+ #### Architectural Tension
129
+
130
+ **Score:** 1/5
131
+ **Evidence:** Environment-based configuration is already the established pattern in this codebase. `config/api.py` (line 8) uses `os.environ["API_KEY"]`. `config/redis.py` (line 5) uses `os.environ["REDIS_URL"]`. The database configuration is the only module still using hardcoded values — this change makes it consistent with the existing pattern.
132
+ **Design Conflicts:** []
133
+
134
+ ---
135
+
136
+ #### Risk Summary
137
+
138
+ This is a low-risk configuration change. The highest-scoring dimensions (blast radius and regression probability, both 2/5) are driven by the test fixture update needed and the new `python-dotenv` dependency, neither of which introduces meaningful risk. The change aligns with established codebase patterns (architectural tension 1/5) and the fail-closed behavior of `os.environ["KEY"]` is a deliberate safety property. Recommendation: proceed without special precautions.
139
+ ```
@@ -0,0 +1,207 @@
1
+ ---
2
+ id: intervention-level
3
+ name: Intervention Level
4
+ version: 1.0.0
5
+ used_by:
6
+ - remediation-architect
7
+ - change-risk-modeler
8
+ - execution-validator
9
+ ---
10
+
11
+ ## Purpose
12
+
13
+ An Intervention Level defines a governance tier that controls what Transform is permitted to do for a given remediation. The four tiers — Suggesting, Planning, Authorizing, Executing — form an escalation ladder where each level requires stronger evidence, higher confidence, and lower risk than the one below it.
14
+
15
+ Intervention levels exist because remediation carries liability. A suggestion ("consider externalizing secrets") carries minimal risk — if it is wrong, the developer ignores it. An execution plan handed to Drive for implementation carries substantial risk — if it is wrong, the codebase is damaged. The governance tiers ensure that the level of Transform's involvement is proportional to the strength of evidence supporting the remediation.
16
+
17
+ The key design principle is conservative escalation: Transform defaults to the lowest level that serves the user, and escalation requires explicit evidence justification. A finding with medium confidence cannot produce an Authorizing-level playbook regardless of severity — confidence gates intervention, not severity. This prevents the most dangerous failure mode: high-confidence-sounding remediation built on weak evidence.
18
+
19
+ Each level also carries a liability posture. At Suggesting and Planning levels, Radar is an Advisor — it provides information and recommendations. At Authorizing and Executing levels, Radar is an Architectural Actor — it produces artifacts intended to be applied to the codebase, which requires explicit disclaimers and higher evidence thresholds.
20
+
21
+ This schema is the single source of truth for governance tiers. Safety rules (@rules in `src/transform/rules/`) enforce constraints against these tier definitions. Playbooks (@schema:playbook) declare which tier they operate at. The verification pipeline (@schema:verification-plan) is required for Authorizing and Executing tiers.
22
+
23
+ ## Template
24
+
25
+ ```markdown
26
+ ### Level: {level}
27
+
28
+ **Liability Posture:** {liability_posture}
29
+ **Requires Human Approval:** {requires_human_approval}
30
+ **Requires Disclaimer:** {requires_disclaimer}
31
+
32
+ ---
33
+
34
+ #### Confidence Requirements
35
+
36
+ **Minimum Finding Confidence:** {minimum_finding_confidence}
37
+ **Minimum Evidence Sources:** {minimum_evidence_sources}
38
+
39
+ #### Risk Constraints
40
+
41
+ **Allowed When Risk High:** {allowed_when_risk_high}
42
+
43
+ #### Description
44
+
45
+ {level_description}
46
+
47
+ #### Permitted Outputs
48
+
49
+ {permitted_outputs}
50
+ ```
51
+
52
+ ## Field Reference
53
+
54
+ | Field | Type | Required | Description | Valid Values |
55
+ |-------|------|----------|-------------|--------------|
56
+ | `level` | enum | yes | The intervention tier. Each tier represents an escalation in Transform's involvement and the evidence required to justify it. | `suggesting`, `planning`, `authorizing`, `executing` |
57
+ | `liability_posture` | enum | yes | The legal/professional posture Radar assumes at this level. Determines disclaimer requirements and confidence thresholds. | `advisor` (suggesting, planning), `architectural_actor` (authorizing, executing) |
58
+ | `requires_human_approval` | boolean | yes | Whether a human must explicitly approve before output at this level can be acted upon. | `false` (suggesting, planning), `true` (authorizing, executing) |
59
+ | `requires_disclaimer` | boolean | yes | Whether output at this level must include an explicit confidence statement and liability disclaimer. | `false` (suggesting), `false` (planning), `true` (authorizing), `true` (executing) |
60
+ | `minimum_finding_confidence` | enum | yes | Minimum confidence (@schema:confidence overall derivation) a finding must have for a playbook at this level. Findings below this threshold are rejected regardless of severity. | `low` (suggesting), `medium` (planning), `high` (authorizing), `high` (executing) |
61
+ | `minimum_evidence_sources` | integer | yes | Minimum number of independent evidence sources required. Evidence sources are distinct tool signals, code analysis observations, or documentation references — not repetitions of the same source. | 1 (suggesting), 2 (planning), 3 (authorizing), 3 (executing) |
62
+ | `allowed_when_risk_high` | boolean | yes | Whether this intervention level is permitted when any change-risk dimension (@schema:change-risk) exceeds a score of 4. High-risk changes are automatically constrained to lower tiers. | `true` (suggesting), `true` (planning), `false` (authorizing), `false` (executing) |
63
+ | `level_description` | string | yes | Human-readable description of what this level means, what Transform produces at this level, and what the user should expect. | Free-form, 2-4 sentences. |
64
+ | `permitted_outputs` | string | yes | What Transform is allowed to produce at this level. Each higher level includes all outputs from lower levels plus additional artifacts. | Free-form, bulleted list. |
65
+
66
+ ## Validation Rules
67
+
68
+ 1. `level` must be one of the four enumerated values. No intermediate levels, no custom levels, no "between planning and authorizing."
69
+ 2. `liability_posture` must match the level: suggesting and planning are always `advisor`; authorizing and executing are always `architectural_actor`. There is no configuration that makes an Authorizing-level playbook carry Advisor liability — the liability follows the level.
70
+ 3. `minimum_finding_confidence` must be enforced as a hard gate: a finding with confidence `low` cannot produce a playbook at `planning` level or above. A finding with confidence `medium` cannot produce a playbook at `authorizing` level or above. Violations are rejected at schema validation, not treated as warnings.
71
+ 4. `minimum_evidence_sources` must count independent sources. The same Semgrep rule cited three times is 1 source, not 3. A Semgrep signal plus a manual code review observation plus a test coverage gap is 3 sources.
72
+ 5. `allowed_when_risk_high` is a hard constraint: if any dimension in the change-risk assessment scores 4 or 5 and `allowed_when_risk_high` is `false`, the playbook must be downgraded to a level where this constraint is `true`. There is no override mechanism.
73
+ 6. `requires_disclaimer` at `true` means the playbook must include a confidence statement ("Based on [N] evidence sources with overall confidence [level]") and a liability acknowledgment ("This remediation plan should be reviewed by a qualified engineer before application"). Missing disclaimers at Authorizing/Executing levels are validation errors.
74
+ 7. Intervention levels are monotonically escalating: a playbook can be downgraded (Authorizing → Planning) at any time without re-assessment, but upgrading (Planning → Authorizing) requires meeting the higher level's thresholds and producing the additional required artifacts (verification plan, change-risk assessment).
75
+
76
+ ## Examples
77
+
78
+ ### Tier Definitions
79
+
80
+ #### Suggesting
81
+
82
+ ```markdown
83
+ ### Level: suggesting
84
+
85
+ **Liability Posture:** advisor
86
+ **Requires Human Approval:** false
87
+ **Requires Disclaimer:** false
88
+
89
+ ---
90
+
91
+ #### Confidence Requirements
92
+
93
+ **Minimum Finding Confidence:** low
94
+ **Minimum Evidence Sources:** 1
95
+
96
+ #### Risk Constraints
97
+
98
+ **Allowed When Risk High:** true
99
+
100
+ #### Description
101
+
102
+ The lowest intervention level. Radar identifies a potential improvement and describes it at a high level. No structured plan, no code examples, no risk assessment. The output is informational — "you might want to look at this." Suitable for low-confidence findings, exploratory observations, and cases where the evidence is suggestive but not conclusive.
103
+
104
+ #### Permitted Outputs
105
+
106
+ - Finding reference with brief remediation description
107
+ - Abstract pattern recommendation (Layer 1 only)
108
+ - No code examples, no risk metadata, no verification steps
109
+ ```
110
+
111
+ #### Planning
112
+
113
+ ```markdown
114
+ ### Level: planning
115
+
116
+ **Liability Posture:** advisor
117
+ **Requires Human Approval:** false
118
+ **Requires Disclaimer:** false
119
+
120
+ ---
121
+
122
+ #### Confidence Requirements
123
+
124
+ **Minimum Finding Confidence:** medium
125
+ **Minimum Evidence Sources:** 2
126
+
127
+ #### Risk Constraints
128
+
129
+ **Allowed When Risk High:** true
130
+
131
+ #### Description
132
+
133
+ Transform produces a structured remediation plan with all four transformation layers, before/after code examples, and risk metadata. The output is a complete playbook that a developer could follow to implement the fix. However, Radar is still in Advisor posture — the plan is a recommendation, not an instruction. Planning-level playbooks do not require a formal verification plan or change-risk assessment, though they include inline risk metadata.
134
+
135
+ #### Permitted Outputs
136
+
137
+ - Full playbook with all four transformation layers
138
+ - Before/after code examples
139
+ - Inline risk metadata (4 dimensions with scores and evidence)
140
+ - Verification steps (how to confirm the fix works)
141
+ - Educational context (optional)
142
+ ```
143
+
144
+ #### Authorizing
145
+
146
+ ```markdown
147
+ ### Level: authorizing
148
+
149
+ **Liability Posture:** architectural_actor
150
+ **Requires Human Approval:** true
151
+ **Requires Disclaimer:** true
152
+
153
+ ---
154
+
155
+ #### Confidence Requirements
156
+
157
+ **Minimum Finding Confidence:** high
158
+ **Minimum Evidence Sources:** 3
159
+
160
+ #### Risk Constraints
161
+
162
+ **Allowed When Risk High:** false
163
+
164
+ #### Description
165
+
166
+ Transform produces a fully specified change package: playbook, formal change-risk assessment, and verification plan with pre/post/regression checks and rollback procedure. At this level, Radar is an Architectural Actor — the output is intended to be applied to the codebase, contingent on human approval. The higher evidence requirements (3+ independent sources, high confidence) and risk constraints (no high-risk changes) ensure that only well-evidenced, low-to-medium-risk remediations reach this level. Human review is mandatory.
167
+
168
+ #### Permitted Outputs
169
+
170
+ - Full playbook (all Planning outputs)
171
+ - Formal change-risk assessment (@schema:change-risk)
172
+ - Verification plan with pre/post/regression checks (@schema:verification-plan)
173
+ - Rollback procedure
174
+ - Confidence statement and liability disclaimer (required)
175
+ ```
176
+
177
+ #### Executing
178
+
179
+ ```markdown
180
+ ### Level: executing
181
+
182
+ **Liability Posture:** architectural_actor
183
+ **Requires Human Approval:** true
184
+ **Requires Disclaimer:** true
185
+
186
+ ---
187
+
188
+ #### Confidence Requirements
189
+
190
+ **Minimum Finding Confidence:** high
191
+ **Minimum Evidence Sources:** 3
192
+
193
+ #### Risk Constraints
194
+
195
+ **Allowed When Risk High:** false
196
+
197
+ #### Description
198
+
199
+ The highest intervention level. Transform produces all Authorizing-level artifacts plus a Drive-consumable execution plan. The output is designed to be handed to Drive for human-supervised change orchestration — Drive breaks the change into steps, executes them with human checkpoints, and runs the verification plan. Radar Transform never executes changes directly; Drive mediates all codebase modifications. The same evidence and risk thresholds as Authorizing apply — Executing is Authorizing plus the Drive integration layer.
200
+
201
+ #### Permitted Outputs
202
+
203
+ - All Authorizing outputs
204
+ - Drive-consumable execution plan (phased steps with checkpoints)
205
+ - Execution ordering and dependency specification
206
+ - Integration metadata for Drive's planning workflow
207
+ ```