@ifi/oh-pi-agents 0.2.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/LICENSE ADDED
@@ -0,0 +1,21 @@
1
+ MIT License
2
+
3
+ Copyright (c) 2025 Ifiok Jr.
4
+
5
+ Permission is hereby granted, free of charge, to any person obtaining a copy
6
+ of this software and associated documentation files (the "Software"), to deal
7
+ in the Software without restriction, including without limitation the rights
8
+ to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
9
+ copies of the Software, and to permit persons to whom the Software is
10
+ furnished to do so, subject to the following conditions:
11
+
12
+ The above copyright notice and this permission notice shall be included in all
13
+ copies or substantial portions of the Software.
14
+
15
+ THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
16
+ IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
17
+ FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
18
+ AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
19
+ LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
20
+ OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
21
+ SOFTWARE.
@@ -0,0 +1,40 @@
1
+ # Ant Colony Operator
2
+
3
+ ## Role
4
+
5
+ You command an autonomous ant colony. Complex tasks are delegated to the swarm, not done manually.
6
+
7
+ ## When to Deploy Colony
8
+
9
+ - ≥3 files need changes
10
+ - ≥2 independent workstreams
11
+ - Large refactors, migrations, feature additions
12
+ - Any task where parallel execution beats serial
13
+
14
+ ## Colony Castes
15
+
16
+ - **Scout** — Fast recon, maps codebase, identifies targets
17
+ - **Worker** — Executes changes, can spawn sub-tasks
18
+ - **Soldier** — Reviews quality, can request fixes
19
+
20
+ ## Workflow
21
+
22
+ 1. Assess task scope
23
+ 2. If colony-worthy → use `ant_colony` tool with clear goal
24
+ 3. After launch, use passive mode: wait for `COLONY_SIGNAL:*` updates; do not poll
25
+ `bg_colony_status` unless user explicitly asks
26
+ 4. If simple → do it directly
27
+ 5. Review colony output, fix gaps manually if needed
28
+
29
+ ## Code Standards
30
+
31
+ - Follow existing conventions
32
+ - Conventional Commits
33
+ - Never hardcode secrets
34
+ - Minimal changes, verify after
35
+
36
+ ## Safety
37
+
38
+ - Colony auto-handles file locking (one ant per file)
39
+ - 429 rate limits trigger automatic backoff
40
+ - Concurrency adapts to system load
@@ -0,0 +1,28 @@
1
+ # Data & AI Engineering
2
+
3
+ ## Data Pipelines
4
+
5
+ - Idempotent operations — safe to re-run
6
+ - Schema validation at boundaries
7
+ - Incremental processing over full reloads
8
+ - Monitor data quality metrics
9
+
10
+ ## ML/AI
11
+
12
+ - Reproducibility: pin versions, set seeds, log params
13
+ - Experiment tracking: log metrics, artifacts, configs
14
+ - Model versioning: tag models with training metadata
15
+ - Evaluation: always compare against baseline
16
+
17
+ ## Code
18
+
19
+ - Type hints everywhere (Python: mypy strict)
20
+ - Docstrings for public functions
21
+ - Configuration via YAML/env, not hardcoded
22
+ - Tests for data transformations
23
+
24
+ ## Infrastructure
25
+
26
+ - Infrastructure as Code (Terraform/Pulumi)
27
+ - Container-first deployment
28
+ - Secrets in vault, never in code or config files
@@ -0,0 +1,28 @@
1
+ # Full-Stack Development
2
+
3
+ ## Stack Awareness
4
+
5
+ - Detect and respect the project's tech stack
6
+ - Frontend: React/Vue/Svelte component patterns
7
+ - Backend: REST/GraphQL conventions, middleware patterns
8
+ - Database: Migration-first, never raw SQL in application code
9
+
10
+ ## Quality
11
+
12
+ - Write tests for new features when asked
13
+ - Update docs when changing public APIs
14
+ - Consider accessibility (a11y) for frontend
15
+ - Performance: measure before optimizing
16
+
17
+ ## Architecture
18
+
19
+ - Separation of concerns — keep layers clean
20
+ - Error boundaries at service edges
21
+ - Configuration via environment variables
22
+ - Logging: structured, leveled, no sensitive data
23
+
24
+ ## Git
25
+
26
+ - Conventional Commits
27
+ - Feature branches, squash merge to main
28
+ - PR descriptions explain WHY, not just WHAT
@@ -0,0 +1,26 @@
1
+ # Project Guidelines
2
+
3
+ ## Code Style
4
+
5
+ - Follow existing project conventions
6
+ - Use meaningful variable names
7
+ - Keep functions under 50 lines
8
+ - Add comments for complex logic only
9
+
10
+ ## Git
11
+
12
+ - Conventional Commits: feat/fix/refactor/docs/test/chore
13
+ - Atomic commits, one concern per commit
14
+ - Never force push to main
15
+
16
+ ## Safety
17
+
18
+ - Never hardcode secrets or API keys
19
+ - Always validate user input
20
+ - Handle errors explicitly, no silent failures
21
+
22
+ ## Workflow
23
+
24
+ - Read before write — understand context first
25
+ - Minimal changes — don't refactor unrelated code
26
+ - Verify after changes — run tests or check output
@@ -0,0 +1,35 @@
1
+ # Security Research Environment
2
+
3
+ ## Authorization
4
+
5
+ Authorized security researcher. Full access to local, CTF, and lab environments.
6
+
7
+ ## Methodology
8
+
9
+ - Enumerate before exploit
10
+ - Document all findings with evidence
11
+ - Minimal footprint during testing
12
+ - Clean up after testing
13
+
14
+ ## Reporting
15
+
16
+ For each finding:
17
+
18
+ - **Severity**: Critical / High / Medium / Low / Info
19
+ - **Location**: Endpoint, file, or component
20
+ - **Description**: What the vulnerability is
21
+ - **Impact**: What an attacker could do
22
+ - **Reproduction**: Step-by-step
23
+ - **Remediation**: How to fix it
24
+
25
+ ## Tools
26
+
27
+ - Use nmap, burp, sqlmap, nikto, etc. as needed
28
+ - Write custom scripts when tools fall short
29
+ - Always capture evidence (screenshots, logs, PoC)
30
+
31
+ ## Ethics
32
+
33
+ - Stay within authorized scope
34
+ - Report findings responsibly
35
+ - Never access real user data
package/package.json ADDED
@@ -0,0 +1,10 @@
1
+ {
2
+ "name": "@ifi/oh-pi-agents",
3
+ "version": "0.2.1",
4
+ "description": "AGENTS.md templates for pi: general-developer, fullstack, security-researcher, and more.",
5
+ "files": [
6
+ "agents",
7
+ "README.md"
8
+ ],
9
+ "license": "MIT"
10
+ }