@aryaminus/controlkeel-opencode 0.2.17 → 0.2.19
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.opencode/skills/agent-integration/SKILL.md +49 -0
- package/.opencode/skills/agent-integration/agents/openai.yaml +11 -0
- package/.opencode/skills/agent-integration/references/target-matrix.md +21 -0
- package/.opencode/skills/benchmark-operator/SKILL.md +33 -0
- package/.opencode/skills/benchmark-operator/agents/openai.yaml +12 -0
- package/.opencode/skills/benchmark-operator/references/benchmark-playbook.md +6 -0
- package/.opencode/skills/cloudflare-agent/SKILL.md +366 -0
- package/.opencode/skills/cloudflare-agent/references/cloudflare-integration.md +226 -0
- package/.opencode/skills/compliance-audit/SKILL.md +34 -0
- package/.opencode/skills/compliance-audit/agents/openai.yaml +12 -0
- package/.opencode/skills/compliance-audit/references/control-matrix.md +51 -0
- package/.opencode/skills/controlkeel-governance/SKILL.md +89 -0
- package/.opencode/skills/controlkeel-governance/agents/openai.yaml +12 -0
- package/.opencode/skills/controlkeel-governance/references/workflow.md +28 -0
- package/.opencode/skills/cost-optimization/SKILL.md +36 -0
- package/.opencode/skills/cost-optimization/agents/openai.yaml +12 -0
- package/.opencode/skills/cost-optimization/references/budget-playbook.md +18 -0
- package/.opencode/skills/domain-audit/SKILL.md +41 -0
- package/.opencode/skills/domain-audit/agents/openai.yaml +12 -0
- package/.opencode/skills/domain-audit/references/domain-review-matrix.md +71 -0
- package/.opencode/skills/policy-training/SKILL.md +35 -0
- package/.opencode/skills/policy-training/agents/openai.yaml +12 -0
- package/.opencode/skills/policy-training/references/promotion-rules.md +6 -0
- package/.opencode/skills/proof-memory/SKILL.md +39 -0
- package/.opencode/skills/proof-memory/agents/openai.yaml +11 -0
- package/.opencode/skills/proof-memory/references/proof-workflow.md +6 -0
- package/.opencode/skills/security-review/SKILL.md +34 -0
- package/.opencode/skills/security-review/agents/openai.yaml +12 -0
- package/.opencode/skills/security-review/references/review-checklist.md +69 -0
- package/.opencode/skills/ship-readiness/SKILL.md +35 -0
- package/.opencode/skills/ship-readiness/agents/openai.yaml +12 -0
- package/.opencode/skills/ship-readiness/references/release-checklist.md +8 -0
- package/package.json +1 -1
|
@@ -0,0 +1,35 @@
|
|
|
1
|
+
---
|
|
2
|
+
name: policy-training
|
|
3
|
+
description: "Train, inspect, promote, and archive ControlKeel router and budget-hint policy artifacts. Use this only for operator-initiated policy work."
|
|
4
|
+
license: Apache-2.0
|
|
5
|
+
compatibility:
|
|
6
|
+
- codex
|
|
7
|
+
- claude-standalone
|
|
8
|
+
- claude-plugin
|
|
9
|
+
- copilot-plugin
|
|
10
|
+
- github-repo
|
|
11
|
+
- open-standard
|
|
12
|
+
disable-model-invocation: true
|
|
13
|
+
metadata:
|
|
14
|
+
author: controlkeel
|
|
15
|
+
version: "2.0"
|
|
16
|
+
category: policy
|
|
17
|
+
ck_mcp_tools:
|
|
18
|
+
- ck_outcome_tracker
|
|
19
|
+
---
|
|
20
|
+
|
|
21
|
+
# Policy Training Skill
|
|
22
|
+
|
|
23
|
+
Use this skill only when the task is offline policy training or artifact promotion.
|
|
24
|
+
|
|
25
|
+
## Workflow
|
|
26
|
+
|
|
27
|
+
1. Confirm whether you are training `router` or `budget_hint`.
|
|
28
|
+
2. Use public and held-out benchmark data appropriately.
|
|
29
|
+
3. Review promotion gates and never weaken deterministic controls.
|
|
30
|
+
4. Summarize held-out metrics against the heuristic baseline before promotion.
|
|
31
|
+
5. Consider real-world success inputs using `ck_outcome_tracker` (leaderboards, recorded session outcomes).
|
|
32
|
+
|
|
33
|
+
## Additional resources
|
|
34
|
+
|
|
35
|
+
- [Promotion rules](references/promotion-rules.md)
|
|
@@ -0,0 +1,12 @@
|
|
|
1
|
+
interface:
|
|
2
|
+
display_name: "Policy Training"
|
|
3
|
+
short_description: "Operate CK router and budget-hint artifact training safely."
|
|
4
|
+
brand_color: "#7c2d12"
|
|
5
|
+
policy:
|
|
6
|
+
allow_implicit_invocation: false
|
|
7
|
+
dependencies:
|
|
8
|
+
tools:
|
|
9
|
+
- type: "mcp"
|
|
10
|
+
value: "controlkeel"
|
|
11
|
+
description: "ControlKeel MCP server"
|
|
12
|
+
|
|
@@ -0,0 +1,6 @@
|
|
|
1
|
+
# Promotion Rules
|
|
2
|
+
|
|
3
|
+
- Router artifacts must improve held-out utility without degrading catch rate or expected-rule hit rate.
|
|
4
|
+
- Budget-hint artifacts may raise `allow` to `warn`, but never weaken deterministic `warn` or `block`.
|
|
5
|
+
- Training is offline and operator initiated; runtime inference remains pure Elixir.
|
|
6
|
+
|
|
@@ -0,0 +1,39 @@
|
|
|
1
|
+
---
|
|
2
|
+
name: proof-memory
|
|
3
|
+
description: "Use ControlKeel proof bundles, typed memory, workspace snapshots, transcript summaries, and resume packets before closing or resuming work. Activate this when you need durable evidence or historical context."
|
|
4
|
+
license: Apache-2.0
|
|
5
|
+
compatibility:
|
|
6
|
+
- codex
|
|
7
|
+
- claude-standalone
|
|
8
|
+
- claude-plugin
|
|
9
|
+
- copilot-plugin
|
|
10
|
+
- github-repo
|
|
11
|
+
- open-standard
|
|
12
|
+
metadata:
|
|
13
|
+
author: controlkeel
|
|
14
|
+
version: "2.0"
|
|
15
|
+
category: proof
|
|
16
|
+
ck_mcp_tools:
|
|
17
|
+
- ck_context
|
|
18
|
+
- ck_memory_search
|
|
19
|
+
- ck_memory_record
|
|
20
|
+
- ck_memory_archive
|
|
21
|
+
- ck_regression_result
|
|
22
|
+
---
|
|
23
|
+
|
|
24
|
+
# Proof and Memory Skill
|
|
25
|
+
|
|
26
|
+
Use this skill when you need the durable system-of-record view instead of only the live session state.
|
|
27
|
+
|
|
28
|
+
## Workflow
|
|
29
|
+
|
|
30
|
+
1. Call `ck_context`.
|
|
31
|
+
2. Review `proof_summary`, `memory_hits`, `workspace_context`, `context_reacquisition`, `instruction_hierarchy`, `recent_events`, and `resume_packet`.
|
|
32
|
+
3. Use the proof bundle to understand deploy readiness, regression evidence, open findings, and rollback expectations.
|
|
33
|
+
4. Use `ck_memory_search` when prior decisions, checkpoints, or findings need explicit retrieval instead of relying only on passive memory hits.
|
|
34
|
+
5. Use `ck_memory_record` to preserve new decisions or operator intent that future agents should recover explicitly.
|
|
35
|
+
6. Use `ck_memory_archive` to retire stale or superseded memories so retrieval quality does not decay.
|
|
36
|
+
|
|
37
|
+
## Additional resources
|
|
38
|
+
|
|
39
|
+
- [Proof workflow](references/proof-workflow.md)
|
|
@@ -0,0 +1,11 @@
|
|
|
1
|
+
interface:
|
|
2
|
+
display_name: "Proof and Memory"
|
|
3
|
+
short_description: "Use CK proof bundles, typed memory, workspace context, and resume packets."
|
|
4
|
+
brand_color: "#0f172a"
|
|
5
|
+
policy:
|
|
6
|
+
allow_implicit_invocation: true
|
|
7
|
+
dependencies:
|
|
8
|
+
tools:
|
|
9
|
+
- type: "mcp"
|
|
10
|
+
value: "controlkeel"
|
|
11
|
+
description: "ControlKeel MCP server"
|
|
@@ -0,0 +1,6 @@
|
|
|
1
|
+
# Proof Workflow
|
|
2
|
+
|
|
3
|
+
- Before completion, verify that the latest proof bundle reflects the current task state.
|
|
4
|
+
- When resuming paused work, use the resume packet plus memory hits, explicit memory search, workspace context, context reacquisition signals, and recent transcript events before making changes.
|
|
5
|
+
- If external QA systems report browser or regression failures, record them through `ck_regression_result` before treating the proof as deploy-ready.
|
|
6
|
+
- Treat proof bundles as immutable evidence snapshots, not editable state.
|
|
@@ -0,0 +1,34 @@
|
|
|
1
|
+
---
|
|
2
|
+
name: security-review
|
|
3
|
+
description: "Run a structured security review before marking a task done. Use this for code, config, architecture, or release reviews that need OWASP, baseline pack, and domain-pack coverage."
|
|
4
|
+
license: Apache-2.0
|
|
5
|
+
compatibility:
|
|
6
|
+
- codex
|
|
7
|
+
- claude-standalone
|
|
8
|
+
- claude-plugin
|
|
9
|
+
- copilot-plugin
|
|
10
|
+
- github-repo
|
|
11
|
+
- open-standard
|
|
12
|
+
metadata:
|
|
13
|
+
author: controlkeel
|
|
14
|
+
version: "2.0"
|
|
15
|
+
category: security
|
|
16
|
+
ck_mcp_tools:
|
|
17
|
+
- ck_validate
|
|
18
|
+
- ck_context
|
|
19
|
+
- ck_finding
|
|
20
|
+
- ck_regression_result
|
|
21
|
+
---
|
|
22
|
+
|
|
23
|
+
# Security Review Skill
|
|
24
|
+
|
|
25
|
+
Use this skill before closing a task, approving a proof bundle, or reviewing a risky diff.
|
|
26
|
+
|
|
27
|
+
## Review flow
|
|
28
|
+
|
|
29
|
+
1. Call `ck_context` to load the domain pack, risk tier, open findings, instruction hierarchy, and design-drift signals.
|
|
30
|
+
2. Run `ck_validate` on the relevant code or config slices, including trust-boundary metadata when the proposed action was influenced by web, tool, skill, or mixed-provenance content.
|
|
31
|
+
3. Walk the review checklist in [references/review-checklist.md](references/review-checklist.md).
|
|
32
|
+
4. Persist any missed issue with `ck_finding`.
|
|
33
|
+
5. If external security or regression systems produce exploit or browser evidence, record that through `ck_regression_result` when it affects release readiness.
|
|
34
|
+
6. Summarize blockers, warnings, and follow-up proof requirements.
|
|
@@ -0,0 +1,12 @@
|
|
|
1
|
+
interface:
|
|
2
|
+
display_name: "Security Review"
|
|
3
|
+
short_description: "Structured CK security review for code, config, and release gating."
|
|
4
|
+
brand_color: "#b91c1c"
|
|
5
|
+
policy:
|
|
6
|
+
allow_implicit_invocation: true
|
|
7
|
+
dependencies:
|
|
8
|
+
tools:
|
|
9
|
+
- type: "mcp"
|
|
10
|
+
value: "controlkeel"
|
|
11
|
+
description: "ControlKeel MCP server"
|
|
12
|
+
|
|
@@ -0,0 +1,69 @@
|
|
|
1
|
+
# Security Review Checklist
|
|
2
|
+
|
|
3
|
+
Use this checklist before task completion, proof approval, or release review.
|
|
4
|
+
Each item lists a concrete verification step. Run `ck_validate` for automated pattern
|
|
5
|
+
detection, then manually verify items that require architectural or process judgment.
|
|
6
|
+
|
|
7
|
+
## Baseline
|
|
8
|
+
|
|
9
|
+
- **Secrets**: Verify no hardcoded API keys, tokens, passwords, private keys, or connection strings exist in source code, config files, environment files, or test fixtures. Run `ck_validate` and confirm zero `security.hardcoded_secret` findings. Check that CI/CD secret management uses vault references, not plaintext values.
|
|
10
|
+
- **Injection (SQL)**: Verify all database queries use parameterized statements, Ecto-style bindings, or query builders. Search for string concatenation in SQL query construction. Run `ck_validate` and confirm zero `security.sql_injection` findings.
|
|
11
|
+
- **Injection (shell)**: Verify no shell commands are constructed by interpolating user input directly into command strings. Use argument arrays or validated allowlists instead. Run `ck_validate` and confirm zero `security.shell_injection` findings.
|
|
12
|
+
- **Injection (HTML/XSS)**: Verify no `innerHTML` assignments from untrusted input. Confirm Phoenix HEEx templates escape by default and any `raw` or `phx-no-curly-interpolation` usage is audited. Run `ck_validate` and confirm zero `security.xss` findings.
|
|
13
|
+
|
|
14
|
+
## Authentication and Authorization
|
|
15
|
+
|
|
16
|
+
- **Authentication on protected routes**: Verify every route that accesses user-scoped data requires authentication. Confirm middleware or plugs check session or token validity before controller action. Check that API endpoints validate bearer tokens against active, non-expired, non-revoked credentials.
|
|
17
|
+
- **Authorization checks**: Verify each protected endpoint checks the caller's role or scope before performing the action. Confirm ownership checks (user can only access their own resources) are enforced at the data layer, not just the UI layer. Check that admin-only endpoints are not reachable by non-admin tokens even with direct API calls.
|
|
18
|
+
- **Session management**: Verify session tokens expire within a reasonable timeframe. Confirm session invalidation on password change and logout. Check that concurrent session limits are enforced if applicable.
|
|
19
|
+
- **Service account controls**: Verify service accounts have scoped permissions (not blanket admin). Confirm service account tokens have short expiry and support revocation. Check that service account activity is logged.
|
|
20
|
+
|
|
21
|
+
## Input Validation and Output Encoding
|
|
22
|
+
|
|
23
|
+
- **Input validation**: Verify all user-supplied input is validated for type, length, format, and range before processing. Confirm file uploads are validated for type and size, and scanned for malware if applicable. Check that JSON/XML parsers are configured to reject oversized or malformed payloads.
|
|
24
|
+
- **Output encoding**: Verify all dynamic content rendered in HTML is contextually encoded (HTML body, attribute, JavaScript, URL). Confirm API responses use structured JSON, not string interpolation of user data. Check that error messages do not leak internal state, stack traces, or database details.
|
|
25
|
+
- **File handling**: Verify uploaded files are stored outside the web root. Confirm file paths are validated to prevent directory traversal. Check that file content types are verified by inspection, not just the client-supplied MIME type.
|
|
26
|
+
|
|
27
|
+
## API Security
|
|
28
|
+
|
|
29
|
+
- **CORS policy**: Verify CORS is not configured as `*` for authenticated endpoints. Confirm allowed origins are explicitly enumerated. Check that credential-bearing requests are not sent to overly broad origins.
|
|
30
|
+
- **Rate limiting**: Verify rate limiting is active on authentication, registration, and password-reset endpoints. Confirm rate limits are scoped per identity (not just per IP) where applicable. Check that rate-limit headers are not informative to attackers.
|
|
31
|
+
- **Request size limits**: Verify maximum request body size is configured and enforced. Confirm file upload size limits are applied at the reverse proxy and application level. Check that JSON payload depth is bounded.
|
|
32
|
+
- **TLS enforcement**: Verify all production endpoints redirect HTTP to HTTPS. Confirm HSTS headers are set. Check that TLS configuration follows current best practices (TLS 1.2+, strong cipher suites).
|
|
33
|
+
|
|
34
|
+
## Data Protection
|
|
35
|
+
|
|
36
|
+
- **Encryption at rest**: Verify sensitive data fields (PII, financial, health, credentials) are encrypted in the database. Confirm encryption keys are managed through a vault or KMS, not stored alongside the data. Check that key rotation is supported and documented.
|
|
37
|
+
- **Encryption in transit**: Verify all internal service-to-service communication uses TLS or equivalent. Confirm database connections use SSL. Check that external API calls use HTTPS and validate certificates.
|
|
38
|
+
- **Logging hygiene**: Verify no sensitive data (passwords, tokens, SSNs, card numbers, health data) appears in application logs. Confirm log levels in production do not emit debug data that includes request bodies with PII. Check that error tracking (Sentry, etc.) is configured to scrub sensitive fields.
|
|
39
|
+
- **Data masking in responses**: Verify API responses mask or omit sensitive fields for non-privileged scopes. Confirm pagination responses do not leak record counts that could enable enumeration attacks. Check that error responses do not include internal identifiers or stack traces.
|
|
40
|
+
|
|
41
|
+
## Dependency and Supply Chain
|
|
42
|
+
|
|
43
|
+
- **Dependency audit**: Verify all direct and transitive dependencies are at non-vulnerable versions. Run `ck_validate` or equivalent dependency scanner. Confirm a process exists for timely patching of critical CVEs. Check that dependency pinning is used in production builds.
|
|
44
|
+
- **Lock file integrity**: Verify lock files are committed and not modified without review. Confirm CI verifies lock file consistency. Check that dependency resolution does not silently upgrade versions.
|
|
45
|
+
- **Container image hygiene**: Verify base images are minimal and up-to-date. Confirm images do not run as root. Check that no unnecessary packages or shells are included in production images.
|
|
46
|
+
|
|
47
|
+
## Infrastructure and Deployment
|
|
48
|
+
|
|
49
|
+
- **Environment separation**: Verify production credentials are not used in development or staging environments. Confirm environment-specific configuration is loaded from vault or environment variables, not hardcoded. Check that test fixtures use synthetic data, not production data.
|
|
50
|
+
- **Secret rotation**: Verify database credentials, API keys, and signing keys are rotated on a defined schedule. Confirm rotation does not cause downtime. Check that old credentials are invalidated promptly after rotation.
|
|
51
|
+
- **Backup and recovery**: Verify backups are encrypted and access-controlled. Confirm backup restoration has been tested within the retention period. Check that backup data includes integrity checksums.
|
|
52
|
+
- **Infrastructure as code**: Verify all infrastructure changes go through version-controlled configuration (not manual console changes). Confirm infrastructure configuration is reviewed before application. Check that drift detection is active.
|
|
53
|
+
|
|
54
|
+
## Domain overlays
|
|
55
|
+
|
|
56
|
+
Apply the relevant domain-specific checks from [domain-review-matrix.md](../domain-audit/references/domain-review-matrix.md) in addition to the above.
|
|
57
|
+
|
|
58
|
+
- **Healthcare**: PHI access, encryption, minimum necessary, audit logging, breach process.
|
|
59
|
+
- **Finance**: card data isolation, tokenization, immutable financial records, segregation of duties.
|
|
60
|
+
- **Education**: student-record disclosure and age/consent requirements, FERPA compliance.
|
|
61
|
+
- **HR**: discriminatory criteria and employee/candidate PII exposure, compensation visibility.
|
|
62
|
+
- **Legal**: privilege handling, retention, and document protection, conflict checking.
|
|
63
|
+
- **Marketing/Sales/Real Estate**: consent, CRM PII, fair-housing constraints, contract handling.
|
|
64
|
+
- **Government**: records retention, benefits fairness, approval chain integrity.
|
|
65
|
+
- **Insurance**: claims fairness, medical-adjacent privacy, denial review.
|
|
66
|
+
- **E-commerce**: card scope, refund controls, fraud detection.
|
|
67
|
+
- **Logistics**: custody integrity, dispatch safety, carrier data protection.
|
|
68
|
+
- **Manufacturing**: QA holds, traceability, safety interlocks.
|
|
69
|
+
- **Nonprofit**: donor privacy, grant restrictions, beneficiary data protection.
|
|
@@ -0,0 +1,35 @@
|
|
|
1
|
+
---
|
|
2
|
+
name: ship-readiness
|
|
3
|
+
description: "Check install-to-first-finding metrics, funnel stage, findings state, proofs, and approvals before calling a session ready to ship."
|
|
4
|
+
license: Apache-2.0
|
|
5
|
+
compatibility:
|
|
6
|
+
- codex
|
|
7
|
+
- claude-standalone
|
|
8
|
+
- claude-plugin
|
|
9
|
+
- copilot-plugin
|
|
10
|
+
- github-repo
|
|
11
|
+
- open-standard
|
|
12
|
+
metadata:
|
|
13
|
+
author: controlkeel
|
|
14
|
+
version: "2.0"
|
|
15
|
+
category: release
|
|
16
|
+
ck_mcp_tools:
|
|
17
|
+
- ck_context
|
|
18
|
+
- ck_deployment_advisor
|
|
19
|
+
---
|
|
20
|
+
|
|
21
|
+
# Ship Readiness Skill
|
|
22
|
+
|
|
23
|
+
Use this skill when the operator asks whether a mission or session is ready for release.
|
|
24
|
+
|
|
25
|
+
## Workflow
|
|
26
|
+
|
|
27
|
+
1. Check session metrics and current funnel stage.
|
|
28
|
+
2. Verify there are no unresolved blockers.
|
|
29
|
+
3. Confirm proof state and rollback guidance.
|
|
30
|
+
4. Summarize approvals, rejections, and any remaining human work.
|
|
31
|
+
5. Provide automatic deployment resources via `ck_deployment_advisor` (Dockerize, CI pipes) for the relevant stack (Phoenix, etc.).
|
|
32
|
+
|
|
33
|
+
## Additional resources
|
|
34
|
+
|
|
35
|
+
- [Release checklist](references/release-checklist.md)
|
|
@@ -0,0 +1,12 @@
|
|
|
1
|
+
interface:
|
|
2
|
+
display_name: "Ship Readiness"
|
|
3
|
+
short_description: "Release gating and session-readiness checks for CK."
|
|
4
|
+
brand_color: "#4f46e5"
|
|
5
|
+
policy:
|
|
6
|
+
allow_implicit_invocation: true
|
|
7
|
+
dependencies:
|
|
8
|
+
tools:
|
|
9
|
+
- type: "mcp"
|
|
10
|
+
value: "controlkeel"
|
|
11
|
+
description: "ControlKeel MCP server"
|
|
12
|
+
|
|
@@ -0,0 +1,8 @@
|
|
|
1
|
+
# Release Checklist
|
|
2
|
+
|
|
3
|
+
- No blocked findings remain unresolved.
|
|
4
|
+
- Required approvals are completed.
|
|
5
|
+
- Latest proof bundle is deploy-ready or clearly states why not.
|
|
6
|
+
- Budget state is healthy enough for the remaining deployment workflow.
|
|
7
|
+
- Ship metrics do not show an incomplete funnel stage for the active session.
|
|
8
|
+
|
package/package.json
CHANGED