@bradygaster/squad-sdk 0.9.0 → 0.9.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (76) hide show
  1. package/README.md +296 -296
  2. package/dist/agents/history-shadow.js +30 -30
  3. package/dist/build/github-dist.js +42 -42
  4. package/dist/config/init.js +173 -173
  5. package/dist/sharing/consult.js +78 -78
  6. package/package.json +1 -1
  7. package/templates/casting/Futurama.json +9 -9
  8. package/templates/casting-history.json +4 -4
  9. package/templates/casting-policy.json +37 -37
  10. package/templates/casting-reference.md +104 -104
  11. package/templates/casting-registry.json +3 -3
  12. package/templates/ceremonies.md +41 -41
  13. package/templates/charter.md +53 -53
  14. package/templates/constraint-tracking.md +38 -38
  15. package/templates/cooperative-rate-limiting.md +229 -229
  16. package/templates/copilot-instructions.md +46 -46
  17. package/templates/history.md +10 -10
  18. package/templates/identity/now.md +9 -9
  19. package/templates/identity/wisdom.md +15 -15
  20. package/templates/issue-lifecycle.md +412 -412
  21. package/templates/keda-scaler.md +164 -164
  22. package/templates/machine-capabilities.md +74 -74
  23. package/templates/mcp-config.md +90 -90
  24. package/templates/multi-agent-format.md +28 -28
  25. package/templates/plugin-marketplace.md +49 -49
  26. package/templates/ralph-circuit-breaker.md +313 -313
  27. package/templates/raw-agent-output.md +37 -37
  28. package/templates/roster.md +60 -60
  29. package/templates/routing.md +39 -39
  30. package/templates/run-output.md +50 -50
  31. package/templates/schedule.json +19 -19
  32. package/templates/scribe-charter.md +119 -119
  33. package/templates/skill.md +24 -24
  34. package/templates/skills/agent-collaboration/SKILL.md +42 -42
  35. package/templates/skills/agent-conduct/SKILL.md +24 -24
  36. package/templates/skills/architectural-proposals/SKILL.md +151 -151
  37. package/templates/skills/ci-validation-gates/SKILL.md +84 -84
  38. package/templates/skills/cli-wiring/SKILL.md +47 -47
  39. package/templates/skills/client-compatibility/SKILL.md +89 -89
  40. package/templates/skills/cross-squad/SKILL.md +114 -114
  41. package/templates/skills/distributed-mesh/SKILL.md +287 -287
  42. package/templates/skills/distributed-mesh/mesh.json.example +30 -30
  43. package/templates/skills/distributed-mesh/sync-mesh.ps1 +111 -111
  44. package/templates/skills/distributed-mesh/sync-mesh.sh +104 -104
  45. package/templates/skills/docs-standards/SKILL.md +71 -71
  46. package/templates/skills/economy-mode/SKILL.md +114 -114
  47. package/templates/skills/external-comms/SKILL.md +329 -329
  48. package/templates/skills/gh-auth-isolation/SKILL.md +183 -183
  49. package/templates/skills/git-workflow/SKILL.md +204 -204
  50. package/templates/skills/github-multi-account/SKILL.md +95 -95
  51. package/templates/skills/history-hygiene/SKILL.md +36 -36
  52. package/templates/skills/humanizer/SKILL.md +105 -105
  53. package/templates/skills/init-mode/SKILL.md +102 -102
  54. package/templates/skills/model-selection/SKILL.md +117 -117
  55. package/templates/skills/nap/SKILL.md +24 -24
  56. package/templates/skills/personal-squad/SKILL.md +57 -57
  57. package/templates/skills/project-conventions/SKILL.md +56 -56
  58. package/templates/skills/release-process/SKILL.md +423 -423
  59. package/templates/skills/reskill/SKILL.md +92 -92
  60. package/templates/skills/reviewer-protocol/SKILL.md +79 -79
  61. package/templates/skills/secret-handling/SKILL.md +200 -200
  62. package/templates/skills/session-recovery/SKILL.md +155 -155
  63. package/templates/skills/squad-conventions/SKILL.md +69 -69
  64. package/templates/skills/test-discipline/SKILL.md +37 -37
  65. package/templates/skills/windows-compatibility/SKILL.md +74 -74
  66. package/templates/workflows/squad-ci.yml +24 -24
  67. package/templates/workflows/squad-docs.yml +54 -54
  68. package/templates/workflows/squad-heartbeat.yml +171 -171
  69. package/templates/workflows/squad-insider-release.yml +61 -61
  70. package/templates/workflows/squad-issue-assign.yml +161 -161
  71. package/templates/workflows/squad-label-enforce.yml +181 -181
  72. package/templates/workflows/squad-preview.yml +55 -55
  73. package/templates/workflows/squad-promote.yml +120 -120
  74. package/templates/workflows/squad-release.yml +77 -77
  75. package/templates/workflows/squad-triage.yml +260 -260
  76. package/templates/workflows/sync-squad-labels.yml +169 -169
@@ -1,200 +1,200 @@
1
- ---
2
- name: secret-handling
3
- description: Never read .env files or write secrets to .squad/ committed files
4
- domain: security, file-operations, team-collaboration
5
- confidence: high
6
- source: earned (issue #267 — credential leak incident)
7
- ---
8
-
9
- ## Context
10
-
11
- Spawned agents have read access to the entire repository, including `.env` files containing live credentials. If an agent reads secrets and writes them to `.squad/` files (decisions, logs, history), Scribe auto-commits them to git, exposing them in remote history. This skill codifies absolute prohibitions and safe alternatives.
12
-
13
- ## Patterns
14
-
15
- ### Prohibited File Reads
16
-
17
- **NEVER read these files:**
18
- - `.env` (production secrets)
19
- - `.env.local` (local dev secrets)
20
- - `.env.production` (production environment)
21
- - `.env.development` (development environment)
22
- - `.env.staging` (staging environment)
23
- - `.env.test` (test environment with real credentials)
24
- - Any file matching `.env.*` UNLESS explicitly allowed (see below)
25
-
26
- **Allowed alternatives:**
27
- - `.env.example` (safe — contains placeholder values, no real secrets)
28
- - `.env.sample` (safe — documentation template)
29
- - `.env.template` (safe — schema/structure reference)
30
-
31
- **If you need config info:**
32
- 1. **Ask the user directly** — "What's the database connection string?"
33
- 2. **Read `.env.example`** — shows structure without exposing secrets
34
- 3. **Read documentation** — check `README.md`, `docs/`, config guides
35
-
36
- **NEVER assume you can "just peek at .env to understand the schema."** Use `.env.example` or ask.
37
-
38
- ### Prohibited Output Patterns
39
-
40
- **NEVER write these to `.squad/` files:**
41
-
42
- | Pattern Type | Examples | Regex Pattern (for scanning) |
43
- |--------------|----------|-------------------------------|
44
- | API Keys | `OPENAI_API_KEY=sk-proj-...`, `GITHUB_TOKEN=ghp_...` | `[A-Z_]+(?:KEY|TOKEN|SECRET)=[^\s]+` |
45
- | Passwords | `DB_PASSWORD=super_secret_123`, `password: "..."` | `(?:PASSWORD|PASS|PWD)[:=]\s*["']?[^\s"']+` |
46
- | Connection Strings | `postgres://user:pass@host:5432/db`, `Server=...;Password=...` | `(?:postgres|mysql|mongodb)://[^@]+@|(?:Server|Host)=.*(?:Password|Pwd)=` |
47
- | JWT Tokens | `eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9...` | `eyJ[A-Za-z0-9_-]+\.eyJ[A-Za-z0-9_-]+\.[A-Za-z0-9_-]+` |
48
- | Private Keys | `-----BEGIN PRIVATE KEY-----`, `-----BEGIN RSA PRIVATE KEY-----` | `-----BEGIN [A-Z ]+PRIVATE KEY-----` |
49
- | AWS Credentials | `AKIA...`, `aws_secret_access_key=...` | `AKIA[0-9A-Z]{16}|aws_secret_access_key=[^\s]+` |
50
- | Email Addresses | `user@example.com` (PII violation per team decision) | `[a-zA-Z0-9._%+-]+@[a-zA-Z0-9.-]+\.[a-zA-Z]{2,}` |
51
-
52
- **What to write instead:**
53
- - Placeholder values: `DATABASE_URL=<set in .env>`
54
- - Redacted references: `API key configured (see .env.example)`
55
- - Architecture notes: "App uses JWT auth — token stored in session"
56
- - Schema documentation: "Requires OPENAI_API_KEY, GITHUB_TOKEN (see .env.example for format)"
57
-
58
- ### Scribe Pre-Commit Validation
59
-
60
- **Before committing `.squad/` changes, Scribe MUST:**
61
-
62
- 1. **Scan all staged files** for secret patterns (use regex table above)
63
- 2. **Check for prohibited file names** (don't commit `.env` even if manually staged)
64
- 3. **If secrets detected:**
65
- - STOP the commit (do NOT proceed)
66
- - Remove the file from staging: `git reset HEAD <file>`
67
- - Report to user:
68
- ```
69
- 🚨 SECRET DETECTED — commit blocked
70
-
71
- File: .squad/decisions/inbox/river-db-config.md
72
- Pattern: DATABASE_URL=postgres://user:password@localhost:5432/prod
73
-
74
- This file contains credentials and MUST NOT be committed.
75
- Please remove the secret, replace with placeholder, and try again.
76
- ```
77
- - Exit with error (never silently skip)
78
-
79
- 4. **If no secrets detected:**
80
- - Proceed with commit as normal
81
-
82
- **Implementation note for Scribe:**
83
- - Run validation AFTER staging files, BEFORE calling `git commit`
84
- - Use PowerShell `Select-String` or `git diff --cached` to scan staged content
85
- - Fail loud — secret leaks are unacceptable, blocking the commit is correct behavior
86
-
87
- ### Remediation — If a Secret Was Already Committed
88
-
89
- **If you discover a secret in git history:**
90
-
91
- 1. **STOP immediately** — do not make more commits
92
- 2. **Alert the user:**
93
- ```
94
- 🚨 CREDENTIAL LEAK DETECTED
95
-
96
- A secret was found in git history:
97
- Commit: abc1234
98
- File: .squad/decisions/inbox/agent-config.md
99
- Pattern: API_KEY=sk-proj-...
100
-
101
- This requires immediate remediation:
102
- 1. Revoke the exposed credential (regenerate API key, rotate password)
103
- 2. Remove from git history (git filter-repo or BFG)
104
- 3. Force-push the cleaned history
105
-
106
- Do NOT proceed with new work until this is resolved.
107
- ```
108
- 3. **Do NOT attempt to fix it yourself** — secret removal requires specialized tools
109
- 4. **Wait for user confirmation** before resuming work
110
-
111
- ## Examples
112
-
113
- ### ✓ Correct: Reading Config Schema
114
-
115
- **Agent needs to know what environment variables are required:**
116
-
117
- ```
118
- Agent: "What environment variables does this app need?"
119
- → Reads `.env.example`:
120
- OPENAI_API_KEY=sk-...
121
- DATABASE_URL=postgres://user:pass@localhost:5432/db
122
- REDIS_URL=redis://localhost:6379
123
-
124
- → Writes to .squad/decisions/inbox/river-env-setup.md:
125
- "App requires three environment variables:
126
- - OPENAI_API_KEY (OpenAI API key, format: sk-...)
127
- - DATABASE_URL (Postgres connection string)
128
- - REDIS_URL (Redis connection string)
129
- See .env.example for full schema."
130
- ```
131
-
132
- ### ✗ Incorrect: Reading Live Credentials
133
-
134
- **Agent needs to know database schema:**
135
-
136
- ```
137
- Agent: (reads .env)
138
- DATABASE_URL=postgres://admin:super_secret_pw@prod.example.com:5432/appdb
139
-
140
- → Writes to .squad/decisions/inbox/river-db-schema.md:
141
- "Database connection: postgres://admin:super_secret_pw@prod.example.com:5432/appdb"
142
-
143
- 🚨 VIOLATION: Live credential written to committed file
144
- ```
145
-
146
- **Correct approach:**
147
- ```
148
- Agent: (reads .env.example OR asks user)
149
- User: "It's a Postgres database, schema is in migrations/"
150
-
151
- → Writes to .squad/decisions/inbox/river-db-schema.md:
152
- "Database: Postgres (connection configured in .env). Schema defined in db/migrations/."
153
- ```
154
-
155
- ### ✓ Correct: Scribe Pre-Commit Validation
156
-
157
- **Scribe is about to commit:**
158
-
159
- ```powershell
160
- # Stage files
161
- git add .squad/
162
-
163
- # Scan staged content for secrets
164
- $stagedContent = git diff --cached
165
- $secretPatterns = @(
166
- '[A-Z_]+(?:KEY|TOKEN|SECRET)=[^\s]+',
167
- '(?:PASSWORD|PASS|PWD)[:=]\s*["'']?[^\s"'']+',
168
- 'eyJ[A-Za-z0-9_-]+\.eyJ[A-Za-z0-9_-]+\.[A-Za-z0-9_-]+'
169
- )
170
-
171
- $detected = $false
172
- foreach ($pattern in $secretPatterns) {
173
- if ($stagedContent -match $pattern) {
174
- $detected = $true
175
- Write-Host "🚨 SECRET DETECTED: $($matches[0])"
176
- break
177
- }
178
- }
179
-
180
- if ($detected) {
181
- # Remove from staging, report, exit
182
- git reset HEAD .squad/
183
- Write-Error "Commit blocked — secret detected in staged files"
184
- exit 1
185
- }
186
-
187
- # Safe to commit
188
- git commit -F $msgFile
189
- ```
190
-
191
- ## Anti-Patterns
192
-
193
- - ❌ Reading `.env` "just to check the schema" — use `.env.example` instead
194
- - ❌ Writing "sanitized" connection strings that still contain credentials
195
- - ❌ Assuming "it's just a dev environment" makes secrets safe to commit
196
- - ❌ Committing first, scanning later — validation MUST happen before commit
197
- - ❌ Silently skipping secret detection — fail loud, never silent
198
- - ❌ Trusting agents to "know better" — enforce at multiple layers (prompt, hook, architecture)
199
- - ❌ Writing secrets to "temporary" files in `.squad/` — Scribe commits ALL `.squad/` changes
200
- - ❌ Extracting "just the host" from a connection string — still leaks infrastructure topology
1
+ ---
2
+ name: secret-handling
3
+ description: Never read .env files or write secrets to .squad/ committed files
4
+ domain: security, file-operations, team-collaboration
5
+ confidence: high
6
+ source: earned (issue #267 — credential leak incident)
7
+ ---
8
+
9
+ ## Context
10
+
11
+ Spawned agents have read access to the entire repository, including `.env` files containing live credentials. If an agent reads secrets and writes them to `.squad/` files (decisions, logs, history), Scribe auto-commits them to git, exposing them in remote history. This skill codifies absolute prohibitions and safe alternatives.
12
+
13
+ ## Patterns
14
+
15
+ ### Prohibited File Reads
16
+
17
+ **NEVER read these files:**
18
+ - `.env` (production secrets)
19
+ - `.env.local` (local dev secrets)
20
+ - `.env.production` (production environment)
21
+ - `.env.development` (development environment)
22
+ - `.env.staging` (staging environment)
23
+ - `.env.test` (test environment with real credentials)
24
+ - Any file matching `.env.*` UNLESS explicitly allowed (see below)
25
+
26
+ **Allowed alternatives:**
27
+ - `.env.example` (safe — contains placeholder values, no real secrets)
28
+ - `.env.sample` (safe — documentation template)
29
+ - `.env.template` (safe — schema/structure reference)
30
+
31
+ **If you need config info:**
32
+ 1. **Ask the user directly** — "What's the database connection string?"
33
+ 2. **Read `.env.example`** — shows structure without exposing secrets
34
+ 3. **Read documentation** — check `README.md`, `docs/`, config guides
35
+
36
+ **NEVER assume you can "just peek at .env to understand the schema."** Use `.env.example` or ask.
37
+
38
+ ### Prohibited Output Patterns
39
+
40
+ **NEVER write these to `.squad/` files:**
41
+
42
+ | Pattern Type | Examples | Regex Pattern (for scanning) |
43
+ |--------------|----------|-------------------------------|
44
+ | API Keys | `OPENAI_API_KEY=sk-proj-...`, `GITHUB_TOKEN=ghp_...` | `[A-Z_]+(?:KEY|TOKEN|SECRET)=[^\s]+` |
45
+ | Passwords | `DB_PASSWORD=super_secret_123`, `password: "..."` | `(?:PASSWORD|PASS|PWD)[:=]\s*["']?[^\s"']+` |
46
+ | Connection Strings | `postgres://user:pass@host:5432/db`, `Server=...;Password=...` | `(?:postgres|mysql|mongodb)://[^@]+@|(?:Server|Host)=.*(?:Password|Pwd)=` |
47
+ | JWT Tokens | `eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9...` | `eyJ[A-Za-z0-9_-]+\.eyJ[A-Za-z0-9_-]+\.[A-Za-z0-9_-]+` |
48
+ | Private Keys | `-----BEGIN PRIVATE KEY-----`, `-----BEGIN RSA PRIVATE KEY-----` | `-----BEGIN [A-Z ]+PRIVATE KEY-----` |
49
+ | AWS Credentials | `AKIA...`, `aws_secret_access_key=...` | `AKIA[0-9A-Z]{16}|aws_secret_access_key=[^\s]+` |
50
+ | Email Addresses | `user@example.com` (PII violation per team decision) | `[a-zA-Z0-9._%+-]+@[a-zA-Z0-9.-]+\.[a-zA-Z]{2,}` |
51
+
52
+ **What to write instead:**
53
+ - Placeholder values: `DATABASE_URL=<set in .env>`
54
+ - Redacted references: `API key configured (see .env.example)`
55
+ - Architecture notes: "App uses JWT auth — token stored in session"
56
+ - Schema documentation: "Requires OPENAI_API_KEY, GITHUB_TOKEN (see .env.example for format)"
57
+
58
+ ### Scribe Pre-Commit Validation
59
+
60
+ **Before committing `.squad/` changes, Scribe MUST:**
61
+
62
+ 1. **Scan all staged files** for secret patterns (use regex table above)
63
+ 2. **Check for prohibited file names** (don't commit `.env` even if manually staged)
64
+ 3. **If secrets detected:**
65
+ - STOP the commit (do NOT proceed)
66
+ - Remove the file from staging: `git reset HEAD <file>`
67
+ - Report to user:
68
+ ```
69
+ 🚨 SECRET DETECTED — commit blocked
70
+
71
+ File: .squad/decisions/inbox/river-db-config.md
72
+ Pattern: DATABASE_URL=postgres://user:password@localhost:5432/prod
73
+
74
+ This file contains credentials and MUST NOT be committed.
75
+ Please remove the secret, replace with placeholder, and try again.
76
+ ```
77
+ - Exit with error (never silently skip)
78
+
79
+ 4. **If no secrets detected:**
80
+ - Proceed with commit as normal
81
+
82
+ **Implementation note for Scribe:**
83
+ - Run validation AFTER staging files, BEFORE calling `git commit`
84
+ - Use PowerShell `Select-String` or `git diff --cached` to scan staged content
85
+ - Fail loud — secret leaks are unacceptable, blocking the commit is correct behavior
86
+
87
+ ### Remediation — If a Secret Was Already Committed
88
+
89
+ **If you discover a secret in git history:**
90
+
91
+ 1. **STOP immediately** — do not make more commits
92
+ 2. **Alert the user:**
93
+ ```
94
+ 🚨 CREDENTIAL LEAK DETECTED
95
+
96
+ A secret was found in git history:
97
+ Commit: abc1234
98
+ File: .squad/decisions/inbox/agent-config.md
99
+ Pattern: API_KEY=sk-proj-...
100
+
101
+ This requires immediate remediation:
102
+ 1. Revoke the exposed credential (regenerate API key, rotate password)
103
+ 2. Remove from git history (git filter-repo or BFG)
104
+ 3. Force-push the cleaned history
105
+
106
+ Do NOT proceed with new work until this is resolved.
107
+ ```
108
+ 3. **Do NOT attempt to fix it yourself** — secret removal requires specialized tools
109
+ 4. **Wait for user confirmation** before resuming work
110
+
111
+ ## Examples
112
+
113
+ ### ✓ Correct: Reading Config Schema
114
+
115
+ **Agent needs to know what environment variables are required:**
116
+
117
+ ```
118
+ Agent: "What environment variables does this app need?"
119
+ → Reads `.env.example`:
120
+ OPENAI_API_KEY=sk-...
121
+ DATABASE_URL=postgres://user:pass@localhost:5432/db
122
+ REDIS_URL=redis://localhost:6379
123
+
124
+ → Writes to .squad/decisions/inbox/river-env-setup.md:
125
+ "App requires three environment variables:
126
+ - OPENAI_API_KEY (OpenAI API key, format: sk-...)
127
+ - DATABASE_URL (Postgres connection string)
128
+ - REDIS_URL (Redis connection string)
129
+ See .env.example for full schema."
130
+ ```
131
+
132
+ ### ✗ Incorrect: Reading Live Credentials
133
+
134
+ **Agent needs to know database schema:**
135
+
136
+ ```
137
+ Agent: (reads .env)
138
+ DATABASE_URL=postgres://admin:super_secret_pw@prod.example.com:5432/appdb
139
+
140
+ → Writes to .squad/decisions/inbox/river-db-schema.md:
141
+ "Database connection: postgres://admin:super_secret_pw@prod.example.com:5432/appdb"
142
+
143
+ 🚨 VIOLATION: Live credential written to committed file
144
+ ```
145
+
146
+ **Correct approach:**
147
+ ```
148
+ Agent: (reads .env.example OR asks user)
149
+ User: "It's a Postgres database, schema is in migrations/"
150
+
151
+ → Writes to .squad/decisions/inbox/river-db-schema.md:
152
+ "Database: Postgres (connection configured in .env). Schema defined in db/migrations/."
153
+ ```
154
+
155
+ ### ✓ Correct: Scribe Pre-Commit Validation
156
+
157
+ **Scribe is about to commit:**
158
+
159
+ ```powershell
160
+ # Stage files
161
+ git add .squad/
162
+
163
+ # Scan staged content for secrets
164
+ $stagedContent = git diff --cached
165
+ $secretPatterns = @(
166
+ '[A-Z_]+(?:KEY|TOKEN|SECRET)=[^\s]+',
167
+ '(?:PASSWORD|PASS|PWD)[:=]\s*["'']?[^\s"'']+',
168
+ 'eyJ[A-Za-z0-9_-]+\.eyJ[A-Za-z0-9_-]+\.[A-Za-z0-9_-]+'
169
+ )
170
+
171
+ $detected = $false
172
+ foreach ($pattern in $secretPatterns) {
173
+ if ($stagedContent -match $pattern) {
174
+ $detected = $true
175
+ Write-Host "🚨 SECRET DETECTED: $($matches[0])"
176
+ break
177
+ }
178
+ }
179
+
180
+ if ($detected) {
181
+ # Remove from staging, report, exit
182
+ git reset HEAD .squad/
183
+ Write-Error "Commit blocked — secret detected in staged files"
184
+ exit 1
185
+ }
186
+
187
+ # Safe to commit
188
+ git commit -F $msgFile
189
+ ```
190
+
191
+ ## Anti-Patterns
192
+
193
+ - ❌ Reading `.env` "just to check the schema" — use `.env.example` instead
194
+ - ❌ Writing "sanitized" connection strings that still contain credentials
195
+ - ❌ Assuming "it's just a dev environment" makes secrets safe to commit
196
+ - ❌ Committing first, scanning later — validation MUST happen before commit
197
+ - ❌ Silently skipping secret detection — fail loud, never silent
198
+ - ❌ Trusting agents to "know better" — enforce at multiple layers (prompt, hook, architecture)
199
+ - ❌ Writing secrets to "temporary" files in `.squad/` — Scribe commits ALL `.squad/` changes
200
+ - ❌ Extracting "just the host" from a connection string — still leaks infrastructure topology