@harness-engineering/cli 1.8.0 → 1.8.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/agents/skills/claude-code/harness-autopilot/SKILL.md +2 -2
- package/dist/agents/skills/claude-code/harness-brainstorming/SKILL.md +5 -7
- package/dist/agents/skills/claude-code/harness-code-review/SKILL.md +2 -2
- package/dist/agents/skills/claude-code/harness-planning/SKILL.md +2 -2
- package/dist/agents/skills/claude-code/harness-roadmap/SKILL.md +4 -5
- package/dist/agents/skills/gemini-cli/add-harness-component/SKILL.md +192 -0
- package/dist/agents/skills/gemini-cli/add-harness-component/skill.yaml +32 -0
- package/dist/agents/skills/gemini-cli/align-documentation/SKILL.md +213 -0
- package/dist/agents/skills/gemini-cli/align-documentation/skill.yaml +31 -0
- package/dist/agents/skills/gemini-cli/check-mechanical-constraints/SKILL.md +191 -0
- package/dist/agents/skills/gemini-cli/check-mechanical-constraints/skill.yaml +32 -0
- package/dist/agents/skills/gemini-cli/cleanup-dead-code/SKILL.md +245 -0
- package/dist/agents/skills/gemini-cli/cleanup-dead-code/skill.yaml +33 -0
- package/dist/agents/skills/gemini-cli/detect-doc-drift/SKILL.md +179 -0
- package/dist/agents/skills/gemini-cli/detect-doc-drift/skill.yaml +30 -0
- package/dist/agents/skills/gemini-cli/enforce-architecture/SKILL.md +240 -0
- package/dist/agents/skills/gemini-cli/enforce-architecture/skill.yaml +34 -0
- package/dist/agents/skills/gemini-cli/harness-architecture-advisor/SKILL.md +397 -0
- package/dist/agents/skills/gemini-cli/harness-architecture-advisor/skill.yaml +48 -0
- package/dist/agents/skills/gemini-cli/harness-autopilot/SKILL.md +2 -2
- package/dist/agents/skills/gemini-cli/harness-brainstorming/SKILL.md +317 -0
- package/dist/agents/skills/gemini-cli/harness-brainstorming/skill.yaml +49 -0
- package/dist/agents/skills/gemini-cli/harness-code-review/SKILL.md +681 -0
- package/dist/agents/skills/gemini-cli/harness-code-review/skill.yaml +45 -0
- package/dist/agents/skills/gemini-cli/harness-debugging/SKILL.md +366 -0
- package/dist/agents/skills/gemini-cli/harness-debugging/skill.yaml +47 -0
- package/dist/agents/skills/gemini-cli/harness-diagnostics/SKILL.md +318 -0
- package/dist/agents/skills/gemini-cli/harness-diagnostics/skill.yaml +50 -0
- package/dist/agents/skills/gemini-cli/harness-execution/SKILL.md +382 -0
- package/dist/agents/skills/gemini-cli/harness-execution/skill.yaml +51 -0
- package/dist/agents/skills/gemini-cli/harness-git-workflow/SKILL.md +268 -0
- package/dist/agents/skills/gemini-cli/harness-git-workflow/skill.yaml +31 -0
- package/dist/agents/skills/gemini-cli/harness-integrity/SKILL.md +167 -0
- package/dist/agents/skills/gemini-cli/harness-integrity/skill.yaml +47 -0
- package/dist/agents/skills/gemini-cli/harness-onboarding/SKILL.md +288 -0
- package/dist/agents/skills/gemini-cli/harness-onboarding/skill.yaml +30 -0
- package/dist/agents/skills/gemini-cli/harness-parallel-agents/SKILL.md +171 -0
- package/dist/agents/skills/gemini-cli/harness-parallel-agents/skill.yaml +33 -0
- package/dist/agents/skills/gemini-cli/harness-planning/SKILL.md +389 -0
- package/dist/agents/skills/gemini-cli/harness-planning/skill.yaml +49 -0
- package/dist/agents/skills/gemini-cli/harness-pre-commit-review/SKILL.md +262 -0
- package/dist/agents/skills/gemini-cli/harness-pre-commit-review/skill.yaml +33 -0
- package/dist/agents/skills/gemini-cli/harness-refactoring/SKILL.md +169 -0
- package/dist/agents/skills/gemini-cli/harness-refactoring/skill.yaml +33 -0
- package/dist/agents/skills/gemini-cli/harness-roadmap/SKILL.md +4 -5
- package/dist/agents/skills/gemini-cli/harness-skill-authoring/SKILL.md +292 -0
- package/dist/agents/skills/gemini-cli/harness-skill-authoring/skill.yaml +32 -0
- package/dist/agents/skills/gemini-cli/harness-state-management/SKILL.md +309 -0
- package/dist/agents/skills/gemini-cli/harness-state-management/skill.yaml +32 -0
- package/dist/agents/skills/gemini-cli/harness-tdd/SKILL.md +177 -0
- package/dist/agents/skills/gemini-cli/harness-tdd/skill.yaml +48 -0
- package/dist/agents/skills/gemini-cli/harness-verification/SKILL.md +328 -0
- package/dist/agents/skills/gemini-cli/harness-verification/skill.yaml +42 -0
- package/dist/agents/skills/gemini-cli/harness-verify/SKILL.md +159 -0
- package/dist/agents/skills/gemini-cli/harness-verify/skill.yaml +40 -0
- package/dist/agents/skills/gemini-cli/initialize-harness-project/SKILL.md +224 -0
- package/dist/agents/skills/gemini-cli/initialize-harness-project/skill.yaml +31 -0
- package/dist/agents/skills/gemini-cli/validate-context-engineering/SKILL.md +150 -0
- package/dist/agents/skills/gemini-cli/validate-context-engineering/skill.yaml +31 -0
- package/dist/bin/harness.js +3 -3
- package/dist/{chunk-SJECMKSS.js → chunk-E2RTDBMG.js} +25 -13
- package/dist/{chunk-LNI4T7R6.js → chunk-KJANDVVC.js} +20 -18
- package/dist/{chunk-3JWCBVUZ.js → chunk-RT2LYQHF.js} +1 -1
- package/dist/{dist-NT3GXHQZ.js → dist-CCM3L3UE.js} +1 -1
- package/dist/{dist-BDO5GFEM.js → dist-K6KTTN3I.js} +3 -3
- package/dist/index.js +3 -3
- package/dist/validate-cross-check-ZGKFQY57.js +7 -0
- package/package.json +6 -6
- package/dist/agents/skills/node_modules/.bin/glob +0 -17
- package/dist/agents/skills/node_modules/.bin/vitest +0 -17
- package/dist/agents/skills/node_modules/.bin/yaml +0 -17
- package/dist/templates/advanced/docs/specs/.gitkeep +0 -0
- package/dist/templates/intermediate/docs/specs/.gitkeep +0 -0
- package/dist/validate-cross-check-2OPGCGGU.js +0 -7
|
@@ -0,0 +1,681 @@
|
|
|
1
|
+
# Harness Code Review
|
|
2
|
+
|
|
3
|
+
> Multi-phase code review pipeline — mechanical checks, graph-scoped context, parallel review agents, cross-agent deduplication, and structured output with technical rigor over social performance.
|
|
4
|
+
|
|
5
|
+
## When to Use
|
|
6
|
+
|
|
7
|
+
- When performing a code review (manual invocation or triggered by `on_pr` / `on_review`)
|
|
8
|
+
- When requesting a review of completed work (see Role A at the end of this document)
|
|
9
|
+
- When responding to review feedback (see Role C at the end of this document)
|
|
10
|
+
- NOT for in-progress work (complete the feature first)
|
|
11
|
+
- NOT for rubber-stamping (if you cannot find issues, look harder or state confidence level)
|
|
12
|
+
- NOT for style-only feedback (leave that to linters and mechanical checks)
|
|
13
|
+
|
|
14
|
+
## Process
|
|
15
|
+
|
|
16
|
+
The review runs as a 7-phase pipeline. Each phase has a clear input, output, and exit condition.
|
|
17
|
+
|
|
18
|
+
```
|
|
19
|
+
Phase 1: GATE ──→ Phase 2: MECHANICAL ──→ Phase 3: CONTEXT ──→ Phase 4: FAN-OUT
|
|
20
|
+
│
|
|
21
|
+
Phase 7: OUTPUT ←── Phase 6: DEDUP+MERGE ←── Phase 5: VALIDATE ←──────┘
|
|
22
|
+
```
|
|
23
|
+
|
|
24
|
+
| Phase | Tier | Purpose | Exit Condition |
|
|
25
|
+
| -------------- | ----- | -------------------------------------------------- | ----------------------------------------------------- |
|
|
26
|
+
| 1. GATE | fast | Skip ineligible PRs (CI mode only) | PR is eligible, or exit with reason |
|
|
27
|
+
| 2. MECHANICAL | none | Lint, typecheck, test, security scan | All pass → continue; any fail → report and stop |
|
|
28
|
+
| 3. CONTEXT | fast | Scope context per review domain | Context bundles assembled for each subagent |
|
|
29
|
+
| 4. FAN-OUT | mixed | Parallel review subagents | All subagents return findings in ReviewFinding schema |
|
|
30
|
+
| 5. VALIDATE | none | Exclude mechanical duplicates, verify reachability | Unvalidated findings discarded |
|
|
31
|
+
| 6. DEDUP+MERGE | none | Group, merge, assign final severity | Deduplicated finding list with merged evidence |
|
|
32
|
+
| 7. OUTPUT | none | Text output or inline GitHub comments | Review delivered, exit code set |
|
|
33
|
+
|
|
34
|
+
### Finding Schema
|
|
35
|
+
|
|
36
|
+
Each review agent produces findings in this common format:
|
|
37
|
+
|
|
38
|
+
```typescript
|
|
39
|
+
interface ReviewFinding {
|
|
40
|
+
id: string; // unique, for dedup
|
|
41
|
+
file: string; // file path
|
|
42
|
+
lineRange: [number, number]; // start, end
|
|
43
|
+
domain: 'compliance' | 'bug' | 'security' | 'architecture';
|
|
44
|
+
severity: 'critical' | 'important' | 'suggestion';
|
|
45
|
+
title: string; // one-line summary
|
|
46
|
+
rationale: string; // why this is an issue
|
|
47
|
+
suggestion?: string; // fix, if available
|
|
48
|
+
evidence: string[]; // supporting context from agent
|
|
49
|
+
validatedBy: 'mechanical' | 'graph' | 'heuristic';
|
|
50
|
+
}
|
|
51
|
+
```
|
|
52
|
+
|
|
53
|
+
### Flags
|
|
54
|
+
|
|
55
|
+
| Flag | Effect |
|
|
56
|
+
| ----------------- | ------------------------------------------------------------------------------------------- |
|
|
57
|
+
| `--comment` | Post inline comments to GitHub PR via `gh` CLI or GitHub MCP |
|
|
58
|
+
| `--deep` | Pass `--deep` to `harness-security-review` for threat modeling in the security fan-out slot |
|
|
59
|
+
| `--no-mechanical` | Skip mechanical checks (useful if already run in CI) |
|
|
60
|
+
| `--ci` | Enable eligibility gate, non-interactive output |
|
|
61
|
+
|
|
62
|
+
### Model Tiers
|
|
63
|
+
|
|
64
|
+
Tiers are abstract labels resolved at runtime from project config. If no config exists, all phases use the current model (no tiering).
|
|
65
|
+
|
|
66
|
+
| Tier | Default | Used By |
|
|
67
|
+
| ---------- | ------------ | ------------------------------------ |
|
|
68
|
+
| `fast` | haiku-class | GATE, CONTEXT |
|
|
69
|
+
| `standard` | sonnet-class | Compliance agent, Architecture agent |
|
|
70
|
+
| `strong` | opus-class | Bug Detection agent, Security agent |
|
|
71
|
+
|
|
72
|
+
### Review Learnings Calibration
|
|
73
|
+
|
|
74
|
+
Before starting the pipeline, check for a project-specific calibration file:
|
|
75
|
+
|
|
76
|
+
```bash
|
|
77
|
+
cat .harness/review-learnings.md 2>/dev/null
|
|
78
|
+
```
|
|
79
|
+
|
|
80
|
+
If `.harness/review-learnings.md` exists:
|
|
81
|
+
|
|
82
|
+
1. **Read the Useful Findings section.** Prioritize these categories during review — they have historically caught real issues in this project.
|
|
83
|
+
2. **Read the Noise / False Positives section.** De-prioritize or skip these categories — flagging them wastes the author's time and erodes trust in the review process.
|
|
84
|
+
3. **Read the Calibration Notes section.** Apply these project-specific overrides to your review judgment. These represent deliberate team decisions, not oversights.
|
|
85
|
+
|
|
86
|
+
If the file does not exist, proceed with default review focus areas. After completing the review, consider suggesting that the team create `.harness/review-learnings.md` if you notice patterns that would benefit from calibration.
|
|
87
|
+
|
|
88
|
+
## Pipeline Phases
|
|
89
|
+
|
|
90
|
+
### Phase 1: GATE
|
|
91
|
+
|
|
92
|
+
**Tier:** fast
|
|
93
|
+
**Mode:** CI only (`--ci` flag). When invoked manually, skip this phase entirely.
|
|
94
|
+
|
|
95
|
+
Check whether the PR should be reviewed at all. This prevents wasted compute in CI pipelines.
|
|
96
|
+
|
|
97
|
+
**Checks:**
|
|
98
|
+
|
|
99
|
+
1. **PR state:** Is the PR closed or merged? → Skip with reason "PR is closed."
|
|
100
|
+
2. **Draft status:** Is the PR marked as draft? → Skip with reason "PR is draft."
|
|
101
|
+
3. **Trivial change:** Is the diff documentation-only (all changed files are `.md`)? → Skip with reason "Documentation-only change."
|
|
102
|
+
4. **Already reviewed:** Has this exact commit range been reviewed before (check for prior review comment from this tool)? → Skip with reason "Already reviewed at {sha}."
|
|
103
|
+
|
|
104
|
+
```bash
|
|
105
|
+
# Check PR state
|
|
106
|
+
gh pr view --json state,isDraft,files
|
|
107
|
+
|
|
108
|
+
# Check if documentation-only
|
|
109
|
+
gh pr diff --name-only | grep -v '\.md$' | wc -l # 0 means docs-only
|
|
110
|
+
```
|
|
111
|
+
|
|
112
|
+
**Exit:** If any check triggers a skip, output the reason and exit with code 0. Otherwise, continue to Phase 2.
|
|
113
|
+
|
|
114
|
+
---
|
|
115
|
+
|
|
116
|
+
### Phase 2: MECHANICAL
|
|
117
|
+
|
|
118
|
+
**Tier:** none (no LLM)
|
|
119
|
+
**Mode:** Skipped if `--no-mechanical` flag is set.
|
|
120
|
+
|
|
121
|
+
Run mechanical checks to establish an exclusion boundary. Any issue caught mechanically is excluded from AI review (Phase 4) to prevent duplicate findings.
|
|
122
|
+
|
|
123
|
+
**Checks:**
|
|
124
|
+
|
|
125
|
+
1. **Harness validation:**
|
|
126
|
+
```bash
|
|
127
|
+
harness validate
|
|
128
|
+
harness check-deps
|
|
129
|
+
harness check-docs
|
|
130
|
+
```
|
|
131
|
+
2. **Security scan:** Run `run_security_scan` MCP tool on changed files. Record findings with rule ID, file, line, and remediation.
|
|
132
|
+
3. **Type checking:** Run the project's type checker (e.g., `tsc --noEmit`). Record any type errors.
|
|
133
|
+
4. **Linting:** Run the project's linter (e.g., `eslint`). Record any lint violations.
|
|
134
|
+
5. **Tests:** Run the project's test suite. Record any failures.
|
|
135
|
+
|
|
136
|
+
**Output:** A set of mechanical findings (file, line, tool, message). This set becomes the exclusion list for Phase 5.
|
|
137
|
+
|
|
138
|
+
**Exit:** If any mechanical check fails (harness validate, typecheck, or tests), report the mechanical failures in Strengths/Issues/Assessment format and stop the pipeline. The code has fundamental issues that must be fixed before AI review adds value. Lint warnings and security scan findings do not stop the pipeline — they are recorded for exclusion only.
|
|
139
|
+
|
|
140
|
+
---
|
|
141
|
+
|
|
142
|
+
### Phase 3: CONTEXT
|
|
143
|
+
|
|
144
|
+
**Tier:** fast
|
|
145
|
+
**Purpose:** Assemble scoped context bundles for each review domain. Each subagent in Phase 4 receives only the context relevant to its domain, not the full diff.
|
|
146
|
+
|
|
147
|
+
#### Change-Type Detection
|
|
148
|
+
|
|
149
|
+
Before scoping context, determine the change type. This shapes which review focus areas apply.
|
|
150
|
+
|
|
151
|
+
1. **Commit message prefix:** Parse the most recent commit message for conventional commit prefixes:
|
|
152
|
+
- `feat:` or `feature:` → **feature**
|
|
153
|
+
- `fix:` or `bugfix:` → **bugfix**
|
|
154
|
+
- `refactor:` → **refactor**
|
|
155
|
+
- `docs:` or `doc:` → **docs**
|
|
156
|
+
2. **Diff pattern heuristic:** If no prefix is found, examine the diff:
|
|
157
|
+
- New files added + tests added → likely **feature**
|
|
158
|
+
- Small changes to existing files + test added → likely **bugfix**
|
|
159
|
+
- File renames, moves, or restructuring with no behavior change → likely **refactor**
|
|
160
|
+
- Only `.md` files or comments changed → likely **docs**
|
|
161
|
+
3. **Default:** If detection is ambiguous, treat as **feature** (the most thorough review).
|
|
162
|
+
|
|
163
|
+
```bash
|
|
164
|
+
# Parse commit message prefix
|
|
165
|
+
git log --oneline -1 | head -1
|
|
166
|
+
|
|
167
|
+
# Check for new files
|
|
168
|
+
git diff --name-status HEAD~1 | grep "^A"
|
|
169
|
+
|
|
170
|
+
# Check if only docs changed
|
|
171
|
+
git diff --name-only HEAD~1 | grep -v '\.md$' | wc -l # 0 means docs-only
|
|
172
|
+
```
|
|
173
|
+
|
|
174
|
+
#### Context Scoping
|
|
175
|
+
|
|
176
|
+
Scope context per review domain. When a knowledge graph exists at `.harness/graph/`, use graph queries. Otherwise, fall back to file-based heuristics.
|
|
177
|
+
|
|
178
|
+
| Domain | With Graph | Without Graph (Fallback) |
|
|
179
|
+
| ----------------- | ------------------------------------------------------------------------ | --------------------------------------------------------------------------------------- |
|
|
180
|
+
| **Compliance** | Convention files (`CLAUDE.md`, `AGENTS.md`, `.harness/`) + changed files | Convention files + changed files (same — no graph needed) |
|
|
181
|
+
| **Bug Detection** | Changed files + direct dependencies via `query_graph` | Changed files + files imported by changed files (`grep import`) |
|
|
182
|
+
| **Security** | Security-relevant paths + data flow traversal via `query_graph` | Changed files + files containing security-sensitive patterns (auth, crypto, SQL, shell) |
|
|
183
|
+
| **Architecture** | Layer boundaries + import graph via `query_graph` + `get_impact` | Changed files + `harness check-deps` output |
|
|
184
|
+
|
|
185
|
+
#### 1:1 Context Ratio Rule
|
|
186
|
+
|
|
187
|
+
For every N lines of diff, gather approximately N lines of surrounding context:
|
|
188
|
+
|
|
189
|
+
- **Small diffs (<20 lines):** Gather proportionally more context — aim for 3:1 context-to-diff.
|
|
190
|
+
- **Medium diffs (20-200 lines):** Target 1:1 ratio. Read full files containing changes, plus immediate dependencies.
|
|
191
|
+
- **Large diffs (>200 lines):** 1:1 ratio is the floor. Prioritize ruthlessly. Flag large diffs as a review concern.
|
|
192
|
+
|
|
193
|
+
#### Context Gathering Priority Order
|
|
194
|
+
|
|
195
|
+
Gather context in this order until the ratio is met:
|
|
196
|
+
|
|
197
|
+
1. **Files directly imported/referenced by changed files** — read the modules the changed code calls or depends on.
|
|
198
|
+
2. **Corresponding test files** — find tests for changed code. If tests are missing, note this as a finding.
|
|
199
|
+
3. **Spec/design docs mentioning changed components** — search `docs/changes/`, `docs/design-docs/`, `docs/plans/`.
|
|
200
|
+
4. **Type definitions used by changed code** — read interfaces, types, schemas consumed or produced.
|
|
201
|
+
5. **Recent commits touching the same files** — see Commit History below.
|
|
202
|
+
|
|
203
|
+
#### Graph-Enhanced Context (when available)
|
|
204
|
+
|
|
205
|
+
When a knowledge graph exists at `.harness/graph/`, use graph queries for faster, more accurate context:
|
|
206
|
+
|
|
207
|
+
- `query_graph` — traverse dependency chain from changed files to find all imports and transitive dependencies
|
|
208
|
+
- `get_impact` — find all affected tests, docs, and downstream code
|
|
209
|
+
- `find_context_for` — assemble review context within token budget, ranked by relevance
|
|
210
|
+
|
|
211
|
+
Graph queries replace manual grep/find commands and discover transitive dependencies that file search misses. Fall back to file-based commands if no graph is available.
|
|
212
|
+
|
|
213
|
+
#### Context Assembly Commands
|
|
214
|
+
|
|
215
|
+
```bash
|
|
216
|
+
# 1. Get the diff and measure its size
|
|
217
|
+
git diff --stat HEAD~1 # or the relevant commit range
|
|
218
|
+
git diff HEAD~1 -- <file> # per-file diff
|
|
219
|
+
|
|
220
|
+
# 2. Find imports/references in changed files
|
|
221
|
+
grep -n "import\|require\|from " <changed-file>
|
|
222
|
+
|
|
223
|
+
# 3. Find corresponding test files
|
|
224
|
+
find . -name "*<module-name>*test*" -o -name "*<module-name>*spec*"
|
|
225
|
+
|
|
226
|
+
# 4. Search for spec/design references
|
|
227
|
+
grep -rl "<component-name>" docs/changes/ docs/design-docs/ docs/plans/
|
|
228
|
+
|
|
229
|
+
# 5. Find type definitions
|
|
230
|
+
grep -rn "interface\|type\|schema" <changed-file> | head -20
|
|
231
|
+
```
|
|
232
|
+
|
|
233
|
+
#### Commit History Context
|
|
234
|
+
|
|
235
|
+
Retrieve recent commit history for every affected file:
|
|
236
|
+
|
|
237
|
+
```bash
|
|
238
|
+
# Recent commits touching affected files (5 per file)
|
|
239
|
+
git log --oneline -5 -- <affected-file>
|
|
240
|
+
```
|
|
241
|
+
|
|
242
|
+
Use commit history to answer:
|
|
243
|
+
|
|
244
|
+
- **Is this a hotspot?** Changed 3+ times in last 5 commits → volatile, pay extra attention.
|
|
245
|
+
- **Was this recently refactored?** Recent "refactor" commits → check alignment with refactoring direction.
|
|
246
|
+
- **Who has been working here?** Multiple authors → look for conflicting assumptions.
|
|
247
|
+
- **What was the last change?** Bugfix followed by change in same area → yellow flag.
|
|
248
|
+
|
|
249
|
+
**Exit:** Context bundles are assembled for each of the four review domains. Continue to Phase 4.
|
|
250
|
+
|
|
251
|
+
---
|
|
252
|
+
|
|
253
|
+
### Phase 4: FAN-OUT
|
|
254
|
+
|
|
255
|
+
**Tier:** mixed (see per-agent tiers below)
|
|
256
|
+
**Purpose:** Run four parallel review subagents, each with domain-scoped context from Phase 3. Each agent produces findings in the `ReviewFinding` schema.
|
|
257
|
+
|
|
258
|
+
#### Compliance Agent (standard tier)
|
|
259
|
+
|
|
260
|
+
Reviews adherence to project conventions, standards, and documentation requirements.
|
|
261
|
+
|
|
262
|
+
**Input:** Compliance context bundle (convention files + changed files + change type)
|
|
263
|
+
|
|
264
|
+
**Focus by change type:**
|
|
265
|
+
|
|
266
|
+
_Feature:_
|
|
267
|
+
|
|
268
|
+
- [ ] **Spec alignment:** Does the implementation match the spec/design doc? Are all specified behaviors present?
|
|
269
|
+
- [ ] **API surface:** Are new public interfaces minimal and well-named? Could any new export be kept internal?
|
|
270
|
+
- [ ] **Backward compatibility:** Does this break existing callers? If so, is the migration path documented?
|
|
271
|
+
|
|
272
|
+
_Bugfix:_
|
|
273
|
+
|
|
274
|
+
- [ ] **Root cause identified:** Does the fix address the root cause, not just the symptom?
|
|
275
|
+
- [ ] **Original issue referenced:** Does the commit or PR reference the bug report or issue number?
|
|
276
|
+
- [ ] **No collateral changes:** Does the fix change only what is necessary?
|
|
277
|
+
|
|
278
|
+
_Refactor:_
|
|
279
|
+
|
|
280
|
+
- [ ] **Behavioral equivalence:** Do all existing tests still pass without modification?
|
|
281
|
+
- [ ] **No functionality changes:** Does the refactor introduce any new behavior?
|
|
282
|
+
|
|
283
|
+
_Docs:_
|
|
284
|
+
|
|
285
|
+
- [ ] **Accuracy vs. current code:** Do documented behaviors match what the code actually does?
|
|
286
|
+
- [ ] **Completeness:** Are all public interfaces documented?
|
|
287
|
+
- [ ] **Consistency:** Does new documentation follow existing style and terminology?
|
|
288
|
+
- [ ] **Links valid:** Do all internal links resolve?
|
|
289
|
+
|
|
290
|
+
**Output:** `ReviewFinding[]` with `domain: 'compliance'`
|
|
291
|
+
|
|
292
|
+
---
|
|
293
|
+
|
|
294
|
+
#### Bug Detection Agent (strong tier)
|
|
295
|
+
|
|
296
|
+
Reviews for logic errors, edge cases, and correctness issues.
|
|
297
|
+
|
|
298
|
+
**Input:** Bug detection context bundle (changed files + dependencies)
|
|
299
|
+
|
|
300
|
+
**Focus areas:**
|
|
301
|
+
|
|
302
|
+
- [ ] **Edge cases:** Boundary conditions (empty input, max values, null, concurrent access)
|
|
303
|
+
- [ ] **Error handling:** Errors handled at appropriate level, helpful messages, no silent swallowing
|
|
304
|
+
- [ ] **Logic errors:** Off-by-one, incorrect boolean logic, missing early returns
|
|
305
|
+
- [ ] **Race conditions:** Concurrent access to shared state, missing locks or atomic operations
|
|
306
|
+
- [ ] **Resource leaks:** Unclosed handles, missing cleanup in error paths
|
|
307
|
+
- [ ] **Type safety:** Type mismatches, unsafe casts, missing null checks
|
|
308
|
+
- [ ] **Test coverage:** Tests for happy path, error paths, and edge cases. Coverage meaningful, not just present.
|
|
309
|
+
- [ ] **Regression tests:** For bugfixes — test that would have caught the bug before the fix
|
|
310
|
+
|
|
311
|
+
**Output:** `ReviewFinding[]` with `domain: 'bug'`
|
|
312
|
+
|
|
313
|
+
---
|
|
314
|
+
|
|
315
|
+
#### Security Agent (strong tier) -- via harness-security-review
|
|
316
|
+
|
|
317
|
+
Invokes `harness-security-review` in changed-files mode as the security slot in the fan-out.
|
|
318
|
+
|
|
319
|
+
**Input:** Security context bundle (security-relevant paths + data flows)
|
|
320
|
+
|
|
321
|
+
**Invocation:** The pipeline invokes `harness-security-review` with scope `changed-files`. The skill:
|
|
322
|
+
|
|
323
|
+
- Skips its own Phase 1 (SCAN) -- reads mechanical findings from PipelineContext (Phase 2 already ran `run_security_scan`)
|
|
324
|
+
- Runs Phase 2 (REVIEW) -- OWASP baseline + stack-adaptive on changed files and their direct imports
|
|
325
|
+
- Skips Phase 3 (THREAT-MODEL) unless `--deep` was passed to code review
|
|
326
|
+
- Returns `ReviewFinding[]` with populated security fields (`cweId`, `owaspCategory`, `confidence`, `remediation`, `references`)
|
|
327
|
+
|
|
328
|
+
If `--deep` flag is set on code review, additionally pass `--deep` to `harness-security-review` for threat modeling.
|
|
329
|
+
|
|
330
|
+
**Focus areas:**
|
|
331
|
+
|
|
332
|
+
1. **Semantic security review** (issues mechanical scanners cannot catch):
|
|
333
|
+
- User input flowing through multiple functions to dangerous sinks (SQL, shell, HTML)
|
|
334
|
+
- Missing authorization checks on new or modified endpoints
|
|
335
|
+
- Sensitive data exposed in logs, error messages, or API responses
|
|
336
|
+
- Authentication bypass paths introduced by the change
|
|
337
|
+
- Insecure defaults in new configuration options
|
|
338
|
+
|
|
339
|
+
2. **Stack-adaptive focus:** Based on the project's tech stack:
|
|
340
|
+
- Node.js: prototype pollution, ReDoS, path traversal
|
|
341
|
+
- React: XSS, dangerouslySetInnerHTML, state injection
|
|
342
|
+
- Go: race conditions, integer overflow, unsafe pointer
|
|
343
|
+
- Python: pickle deserialization, SSTI, command injection
|
|
344
|
+
|
|
345
|
+
3. **CWE/OWASP references:** All security findings include `cweId`, `owaspCategory`, and `remediation` fields.
|
|
346
|
+
|
|
347
|
+
Security findings with confirmed vulnerabilities are always `severity: 'critical'`.
|
|
348
|
+
|
|
349
|
+
**Dedup with mechanical scan:** The pipeline's Phase 5 (VALIDATE) uses the exclusion set from Phase 2 mechanical findings to discard any security-review finding that overlaps with an already-reported mechanical finding. This prevents duplicate reporting of the same issue.
|
|
350
|
+
|
|
351
|
+
**Output:** `ReviewFinding[]` with `domain: 'security'`
|
|
352
|
+
|
|
353
|
+
---
|
|
354
|
+
|
|
355
|
+
#### Architecture Agent (standard tier)
|
|
356
|
+
|
|
357
|
+
Reviews for architectural violations, dependency direction, and design pattern compliance.
|
|
358
|
+
|
|
359
|
+
**Input:** Architecture context bundle (layer boundaries + import graph)
|
|
360
|
+
|
|
361
|
+
**Focus areas:**
|
|
362
|
+
|
|
363
|
+
- [ ] **Layer compliance:** Does the code respect the project's architectural layers? Are imports flowing in the correct direction?
|
|
364
|
+
- [ ] **Dependency direction:** Do modules depend on abstractions, not concretions? (Dependency Inversion)
|
|
365
|
+
- [ ] **Single Responsibility:** Does each module have one reason to change?
|
|
366
|
+
- [ ] **Open/Closed:** Can behavior be extended without modifying existing code?
|
|
367
|
+
- [ ] **Pattern consistency:** Does the code follow established codebase patterns? If introducing a new pattern, is it justified?
|
|
368
|
+
- [ ] **Separation of concerns:** Business logic separated from infrastructure? Each function/module does one thing?
|
|
369
|
+
- [ ] **DRY violations:** Duplicated logic that should be extracted — but NOT intentional duplication of things that will diverge.
|
|
370
|
+
- [ ] **Performance preserved:** Could restructuring introduce regressions (extra allocations, changed query patterns)?
|
|
371
|
+
|
|
372
|
+
**Output:** `ReviewFinding[]` with `domain: 'architecture'`
|
|
373
|
+
|
|
374
|
+
**Exit:** All four agents have returned their findings. Continue to Phase 5.
|
|
375
|
+
|
|
376
|
+
---
|
|
377
|
+
|
|
378
|
+
### Phase 5: VALIDATE
|
|
379
|
+
|
|
380
|
+
**Tier:** none (mechanical)
|
|
381
|
+
**Purpose:** Remove false positives by cross-referencing AI findings against mechanical results and graph reachability.
|
|
382
|
+
|
|
383
|
+
**Steps:**
|
|
384
|
+
|
|
385
|
+
1. **Mechanical exclusion:** For each finding from Phase 4, check if the same file + line range was already flagged by a mechanical check in Phase 2. If so, discard the AI finding — the mechanical check is authoritative and the issue is already reported.
|
|
386
|
+
|
|
387
|
+
2. **Graph reachability validation (if graph available):** For findings that claim an issue affects other parts of the system (e.g., "this change breaks callers"), verify via `query_graph` that the claimed dependency path exists. Discard findings with invalid reachability claims.
|
|
388
|
+
|
|
389
|
+
3. **Import-chain heuristic (fallback, no graph):** Follow imports 2 levels deep from the flagged file. If the finding claims impact on a file not reachable within 2 import hops, downgrade severity to `suggestion` rather than discarding.
|
|
390
|
+
|
|
391
|
+
**Exit:** Validated finding set. Continue to Phase 6.
|
|
392
|
+
|
|
393
|
+
---
|
|
394
|
+
|
|
395
|
+
### Phase 6: DEDUP + MERGE
|
|
396
|
+
|
|
397
|
+
**Tier:** none (mechanical)
|
|
398
|
+
**Purpose:** Eliminate redundant findings across agents and produce the final finding list.
|
|
399
|
+
|
|
400
|
+
**Steps:**
|
|
401
|
+
|
|
402
|
+
1. **Group by location:** Group findings by `file` + overlapping `lineRange`. Two findings overlap if their line ranges intersect or are within 3 lines of each other.
|
|
403
|
+
|
|
404
|
+
2. **Merge overlapping findings:** When multiple agents flag the same location:
|
|
405
|
+
- Keep the highest `severity` from any agent
|
|
406
|
+
- Combine `evidence` arrays from all agents
|
|
407
|
+
- Preserve the `rationale` with the strongest justification
|
|
408
|
+
- Merge `domain` tags (a finding can be both `bug` and `security`)
|
|
409
|
+
- Generate a single merged `id`
|
|
410
|
+
|
|
411
|
+
3. **Assign final severity:**
|
|
412
|
+
- **Critical** — Must fix before merge. Bugs, security vulnerabilities, failing harness checks, architectural violations that break boundaries.
|
|
413
|
+
- **Important** — Should fix before merge. Missing error handling, missing tests for critical paths, unclear naming.
|
|
414
|
+
- **Suggestion** — Consider for improvement. Style preferences, minor optimizations, alternative approaches. Does not block merge.
|
|
415
|
+
|
|
416
|
+
**Exit:** Deduplicated, severity-assigned finding list. Continue to Phase 7.
|
|
417
|
+
|
|
418
|
+
---
|
|
419
|
+
|
|
420
|
+
### Phase 7: OUTPUT
|
|
421
|
+
|
|
422
|
+
**Tier:** none
|
|
423
|
+
**Purpose:** Deliver the review in the requested format.
|
|
424
|
+
|
|
425
|
+
#### Text Output (default)
|
|
426
|
+
|
|
427
|
+
When rendering the review output, use conventional markdown patterns:
|
|
428
|
+
|
|
429
|
+
For strengths:
|
|
430
|
+
|
|
431
|
+
```
|
|
432
|
+
**[STRENGTH]** Clean separation between route handler and service logic
|
|
433
|
+
```
|
|
434
|
+
|
|
435
|
+
For issues by severity:
|
|
436
|
+
|
|
437
|
+
```
|
|
438
|
+
**[CRITICAL]** api/routes/users.ts:12-15 — Direct import from db/queries.ts bypasses service layer
|
|
439
|
+
**[IMPORTANT]** services/user-service.ts:45 — createUser does not handle duplicate email
|
|
440
|
+
**[SUGGESTION]** Consider extracting validation into a shared utility
|
|
441
|
+
```
|
|
442
|
+
|
|
443
|
+
Structure the review as:
|
|
444
|
+
|
|
445
|
+
**Strengths:** What is done well. Be specific. "Clean separation between X and Y" is useful. "Looks good" is not.
|
|
446
|
+
|
|
447
|
+
**Issues:** List each finding from Phase 6, grouped by severity:
|
|
448
|
+
|
|
449
|
+
- **Critical:** [findings with severity 'critical']
|
|
450
|
+
- **Important:** [findings with severity 'important']
|
|
451
|
+
- **Suggestion:** [findings with severity 'suggestion']
|
|
452
|
+
|
|
453
|
+
For each issue, provide:
|
|
454
|
+
|
|
455
|
+
1. The specific location (file and line range)
|
|
456
|
+
2. What the problem is (title)
|
|
457
|
+
3. Why it matters (rationale)
|
|
458
|
+
4. A suggested fix (if available)
|
|
459
|
+
|
|
460
|
+
**Assessment:** One of:
|
|
461
|
+
|
|
462
|
+
- **Approve** — No critical or important issues. Ready to merge.
|
|
463
|
+
- **Request Changes** — Critical or important issues must be addressed.
|
|
464
|
+
- **Comment** — Observations only, no blocking issues.
|
|
465
|
+
|
|
466
|
+
**Exit code:** 0 for Approve/Comment, 1 for Request Changes.
|
|
467
|
+
|
|
468
|
+
#### Inline GitHub Comments (`--comment` flag)
|
|
469
|
+
|
|
470
|
+
When `--comment` is set, post findings as inline PR comments via `gh` CLI or GitHub MCP:
|
|
471
|
+
|
|
472
|
+
- **Small fixes** (suggestion is < 10 lines): Post as committable suggestion block using GitHub's suggestion syntax.
|
|
473
|
+
- **Large fixes** (suggestion is >= 10 lines or no concrete suggestion): Post description + rationale as a regular comment.
|
|
474
|
+
- **Summary comment:** Post the Strengths/Issues/Assessment as a top-level PR review comment.
|
|
475
|
+
|
|
476
|
+
```bash
|
|
477
|
+
# Post a review with inline comments
|
|
478
|
+
gh pr review --event APPROVE|REQUEST_CHANGES|COMMENT --body "<summary>"
|
|
479
|
+
|
|
480
|
+
# Post inline comment with suggestion
|
|
481
|
+
gh api repos/{owner}/{repo}/pulls/{pr}/comments \
|
|
482
|
+
--field body="<rationale>\n\`\`\`suggestion\n<fix>\n\`\`\`" \
|
|
483
|
+
--field path="<file>" --field line=<line>
|
|
484
|
+
```
|
|
485
|
+
|
|
486
|
+
### Review Acceptance
|
|
487
|
+
|
|
488
|
+
After delivering the review output, request acceptance:
|
|
489
|
+
|
|
490
|
+
```json
|
|
491
|
+
emit_interaction({
|
|
492
|
+
path: "<project-root>",
|
|
493
|
+
type: "confirmation",
|
|
494
|
+
confirmation: {
|
|
495
|
+
text: "Review complete: <Assessment>. Accept review?",
|
|
496
|
+
context: "<N critical, N important, N suggestion findings>"
|
|
497
|
+
}
|
|
498
|
+
})
|
|
499
|
+
```
|
|
500
|
+
|
|
501
|
+
#### Handoff and Transition
|
|
502
|
+
|
|
503
|
+
After delivering the review output, write the handoff and conditionally transition:
|
|
504
|
+
|
|
505
|
+
Write `.harness/handoff.json`:
|
|
506
|
+
|
|
507
|
+
```json
|
|
508
|
+
{
|
|
509
|
+
"fromSkill": "harness-code-review",
|
|
510
|
+
"phase": "OUTPUT",
|
|
511
|
+
"summary": "<assessment summary>",
|
|
512
|
+
"assessment": "approve | request-changes | comment",
|
|
513
|
+
"findingCount": { "critical": 0, "important": 0, "suggestion": 0 },
|
|
514
|
+
"artifacts": ["<reviewed files>"]
|
|
515
|
+
}
|
|
516
|
+
```
|
|
517
|
+
|
|
518
|
+
**If assessment is "approve":**
|
|
519
|
+
|
|
520
|
+
Call `emit_interaction`:
|
|
521
|
+
|
|
522
|
+
```json
|
|
523
|
+
{
|
|
524
|
+
"type": "transition",
|
|
525
|
+
"transition": {
|
|
526
|
+
"completedPhase": "review",
|
|
527
|
+
"suggestedNext": "merge",
|
|
528
|
+
"reason": "Review approved with no blocking issues",
|
|
529
|
+
"artifacts": ["<reviewed files>"],
|
|
530
|
+
"requiresConfirmation": true,
|
|
531
|
+
"summary": "Review approved. <N> suggestions noted. Ready to create PR or merge."
|
|
532
|
+
}
|
|
533
|
+
}
|
|
534
|
+
```
|
|
535
|
+
|
|
536
|
+
If the user confirms: proceed to create PR or merge.
|
|
537
|
+
If the user declines: stop. The handoff is written for future invocation.
|
|
538
|
+
|
|
539
|
+
**If assessment is "request-changes":**
|
|
540
|
+
|
|
541
|
+
Do NOT emit a transition. Surface the critical and important findings to the user for resolution. After fixes are applied, re-run the review pipeline.
|
|
542
|
+
|
|
543
|
+
**If assessment is "comment":**
|
|
544
|
+
|
|
545
|
+
Do NOT emit a transition. Observations have been delivered. No further action is implied.
|
|
546
|
+
|
|
547
|
+
---
|
|
548
|
+
|
|
549
|
+
## Role A: Requesting a Review
|
|
550
|
+
|
|
551
|
+
_This section is not part of the pipeline. It documents the process for requesting a review from others._
|
|
552
|
+
|
|
553
|
+
When you have completed work and need it reviewed:
|
|
554
|
+
|
|
555
|
+
1. **Prepare the review context:**
|
|
556
|
+
- Commit range (exact SHAs or branch diff)
|
|
557
|
+
- Description (WHAT changed and WHY — not a commit-by-commit retelling)
|
|
558
|
+
- Plan reference (link to spec/plan if applicable)
|
|
559
|
+
- Test evidence (`harness validate` and test suite results)
|
|
560
|
+
- Harness check results (`harness validate`, `harness check-deps`)
|
|
561
|
+
|
|
562
|
+
2. **Dispatch the review:** Identify the right reviewer, provide the context package, state what kind of feedback you want.
|
|
563
|
+
|
|
564
|
+
3. **Wait.** Do not modify code under review. Note issues but do not push fixes until review is complete.
|
|
565
|
+
|
|
566
|
+
---
|
|
567
|
+
|
|
568
|
+
## Role C: Responding to Review Feedback
|
|
569
|
+
|
|
570
|
+
_This section is not part of the pipeline. It documents the process for responding to review feedback._
|
|
571
|
+
|
|
572
|
+
1. **Read all feedback first.** Understand the full picture before responding.
|
|
573
|
+
|
|
574
|
+
2. **Verify before implementing.** For each piece of feedback:
|
|
575
|
+
- Do you understand it? If not, ask for clarification.
|
|
576
|
+
- Is it correct? Verify the claim — reviewers make mistakes too.
|
|
577
|
+
- Is it actionable? Vague feedback requires clarification.
|
|
578
|
+
|
|
579
|
+
3. **Technical rigor over social performance:**
|
|
580
|
+
- Do NOT agree with feedback just to be agreeable. Push back with evidence if wrong.
|
|
581
|
+
- Do NOT implement every suggestion. Apply YAGNI.
|
|
582
|
+
- Do NOT make changes you do not understand. Ask for explanation.
|
|
583
|
+
- DO acknowledge when feedback is correct.
|
|
584
|
+
- DO push back when feedback contradicts the approved plan/spec.
|
|
585
|
+
|
|
586
|
+
4. **Implement fixes:** For each accepted piece of feedback: make the change, run tests, run `harness validate` and `harness check-deps`, commit with a message referencing the review feedback.
|
|
587
|
+
|
|
588
|
+
5. **Re-request review** with summary of changes, which feedback was addressed vs. pushed back on, and fresh harness check results.
|
|
589
|
+
|
|
590
|
+
---
|
|
591
|
+
|
|
592
|
+
## Harness Integration
|
|
593
|
+
|
|
594
|
+
- **`harness validate`** — Run in Phase 2 (MECHANICAL). Must pass for the pipeline to continue to AI review.
|
|
595
|
+
- **`harness check-deps`** — Run in Phase 2 (MECHANICAL). Failures are Critical issues that stop the pipeline.
|
|
596
|
+
- **`harness check-docs`** — Run in Phase 2 (MECHANICAL). Documentation drift findings are recorded for the exclusion set.
|
|
597
|
+
- **`harness cleanup`** — Optional check during Phase 2 for entropy accumulation in changed files.
|
|
598
|
+
- **Graph queries** — Used in Phase 3 (CONTEXT) for dependency-scoped context and in Phase 5 (VALIDATE) for reachability verification. Graceful fallback when no graph exists.
|
|
599
|
+
- **`emit_interaction`** -- Call after review approval to suggest transitioning to merge/PR creation. Only emitted on APPROVE assessment. Uses confirmed transition (waits for user approval).
|
|
600
|
+
|
|
601
|
+
## Success Criteria
|
|
602
|
+
|
|
603
|
+
- The pipeline runs all 7 phases in order when invoked manually (skipping GATE)
|
|
604
|
+
- The pipeline runs all 7 phases including GATE when invoked with `--ci`
|
|
605
|
+
- Mechanical failures in Phase 2 stop the pipeline before AI review (Phase 4)
|
|
606
|
+
- Each Phase 4 subagent receives only its domain-scoped context, not the full diff
|
|
607
|
+
- All findings use the ReviewFinding schema
|
|
608
|
+
- Mechanical findings from Phase 2 are excluded from Phase 4 output in Phase 5
|
|
609
|
+
- Cross-agent duplicate findings are merged in Phase 6
|
|
610
|
+
- Text output uses Strengths/Issues/Assessment format with Critical/Important/Suggestion severity
|
|
611
|
+
- `--comment` posts inline GitHub comments with committable suggestion blocks for small fixes
|
|
612
|
+
- `--deep` adds threat modeling to the Security agent
|
|
613
|
+
- No code merges with Critical issues unresolved
|
|
614
|
+
- No code merges with failing harness checks
|
|
615
|
+
- Response to feedback (Role C) is verified before implementation
|
|
616
|
+
- Pushback on incorrect feedback is evidence-based
|
|
617
|
+
|
|
618
|
+
## Examples
|
|
619
|
+
|
|
620
|
+
### Example: Pipeline Review of a New API Endpoint
|
|
621
|
+
|
|
622
|
+
**Phase 1 (GATE):** Skipped — manual invocation.
|
|
623
|
+
|
|
624
|
+
**Phase 2 (MECHANICAL):** `harness validate` passes. `harness check-deps` passes. Security scan finds no issues. `tsc --noEmit` passes. Lint passes.
|
|
625
|
+
|
|
626
|
+
**Phase 3 (CONTEXT):** Change type detected as `feature` (commit prefix `feat:`). Context bundles assembled:
|
|
627
|
+
|
|
628
|
+
- Compliance: `CLAUDE.md` + changed files
|
|
629
|
+
- Bug detection: `api/routes/users.ts`, `services/user-service.ts`, `db/queries.ts`
|
|
630
|
+
- Security: `api/routes/users.ts` (endpoint), `services/user-service.ts` (data flow)
|
|
631
|
+
- Architecture: import graph showing `routes → services → db` layers
|
|
632
|
+
|
|
633
|
+
**Phase 4 (FAN-OUT):** Four agents run in parallel:
|
|
634
|
+
|
|
635
|
+
- Compliance agent: 0 findings (spec alignment confirmed)
|
|
636
|
+
- Bug detection agent: 1 finding (missing duplicate email handling in createUser)
|
|
637
|
+
- Security agent: 0 findings (no vulnerabilities detected)
|
|
638
|
+
- Architecture agent: 1 finding (routes/users.ts imports directly from db/queries.ts)
|
|
639
|
+
|
|
640
|
+
**Phase 5 (VALIDATE):** No mechanical exclusions apply. Architecture finding validated by `check-deps` output showing layer violation.
|
|
641
|
+
|
|
642
|
+
**Phase 6 (DEDUP+MERGE):** No overlaps — 2 distinct findings in different files.
|
|
643
|
+
|
|
644
|
+
**Phase 7 (OUTPUT):**
|
|
645
|
+
|
|
646
|
+
**Strengths:**
|
|
647
|
+
|
|
648
|
+
- Clean separation between route handler and service logic
|
|
649
|
+
- Input validation using Zod schemas with clear error messages
|
|
650
|
+
- Comprehensive test coverage including error paths
|
|
651
|
+
|
|
652
|
+
**Issues:**
|
|
653
|
+
|
|
654
|
+
**Critical:**
|
|
655
|
+
|
|
656
|
+
- `api/routes/users.ts:12-15` — Direct import from `db/queries.ts` bypasses service layer. Must route through `services/user-service.ts`. (domain: architecture, validatedBy: heuristic)
|
|
657
|
+
|
|
658
|
+
**Important:**
|
|
659
|
+
|
|
660
|
+
- `services/user-service.ts:45` — `createUser` does not handle duplicate email. Database will throw constraint violation surfacing as 500. Should catch and return 409. (domain: bug, validatedBy: heuristic)
|
|
661
|
+
|
|
662
|
+
**Suggestion:** (none)
|
|
663
|
+
|
|
664
|
+
**Assessment:** Request Changes — one critical layer violation and one important missing error handler.
|
|
665
|
+
|
|
666
|
+
## Gates
|
|
667
|
+
|
|
668
|
+
- **Never skip mechanical checks without `--no-mechanical`.** If mechanical checks have not run (in CI or locally), they must run in Phase 2 before AI review.
|
|
669
|
+
- **Never merge with failing harness checks.** `harness validate` and `harness check-deps` must pass. This is a Critical issue, always.
|
|
670
|
+
- **Never implement feedback without verification.** Before changing code based on review feedback, verify the feedback is correct. Run the scenario. Read the code. Do not blindly comply.
|
|
671
|
+
- **Never agree performatively.** "Sure, I'll change that" without understanding why is forbidden. Every change must be understood.
|
|
672
|
+
- **Never skip the YAGNI check.** Every suggestion must answer: "Does this serve a current, concrete need?" Speculative improvements are rejected.
|
|
673
|
+
|
|
674
|
+
## Escalation
|
|
675
|
+
|
|
676
|
+
- **When reviewers disagree:** If two reviewers give contradictory feedback, escalate to the human or tech lead.
|
|
677
|
+
- **When review feedback changes the plan:** If feedback requires altering the approved plan or spec, pause the review. The plan must be updated first.
|
|
678
|
+
- **When you cannot reproduce a reported issue:** Ask the reviewer for exact reproduction steps.
|
|
679
|
+
- **When review is taking more than 2 rounds:** Something is fundamentally misaligned. Stop and discuss the approach synchronously.
|
|
680
|
+
- **When harness checks fail and you believe the check is wrong:** Do not override or skip. File an issue against the harness configuration.
|
|
681
|
+
- **When the pipeline produces a false positive after validation:** Add the pattern to `.harness/review-learnings.md` in the Noise / False Positives section for future calibration.
|