@kenkaiiii/ggcoder 4.3.173 → 4.3.174

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1 +1 @@
1
- {"version":3,"file":"prompt-commands.d.ts","sourceRoot":"","sources":["../../src/core/prompt-commands.ts"],"names":[],"mappings":"AAAA;;;GAGG;AAEH,MAAM,WAAW,aAAa;IAC5B,IAAI,EAAE,MAAM,CAAC;IACb,OAAO,EAAE,MAAM,EAAE,CAAC;IAClB,WAAW,EAAE,MAAM,CAAC;IACpB,MAAM,EAAE,MAAM,CAAC;CAChB;AAED,eAAO,MAAM,eAAe,EAAE,aAAa,EAgmC1C,CAAC;AAEF,gDAAgD;AAChD,wBAAgB,gBAAgB,CAAC,IAAI,EAAE,MAAM,GAAG,aAAa,GAAG,SAAS,CAExE"}
1
+ {"version":3,"file":"prompt-commands.d.ts","sourceRoot":"","sources":["../../src/core/prompt-commands.ts"],"names":[],"mappings":"AAAA;;;GAGG;AAEH,MAAM,WAAW,aAAa;IAC5B,IAAI,EAAE,MAAM,CAAC;IACb,OAAO,EAAE,MAAM,EAAE,CAAC;IAClB,WAAW,EAAE,MAAM,CAAC;IACpB,MAAM,EAAE,MAAM,CAAC;CAChB;AAED,eAAO,MAAM,eAAe,EAAE,aAAa,EAopC1C,CAAC;AAEF,gDAAgD;AAChD,wBAAgB,gBAAgB,CAAC,IAAI,EAAE,MAAM,GAAG,aAAa,GAAG,SAAS,CAExE"}
@@ -6,102 +6,154 @@ export const PROMPT_COMMANDS = [
6
6
  {
7
7
  name: "scan",
8
8
  aliases: [],
9
- description: "Find dead code, bugs, and security issues",
10
- prompt: `Find quick wins in this codebase. Spawn 5 sub-agents in parallel using the subagent tool (call the subagent tool 5 times in a single response, each with a different task), each focusing on one area. Adapt each area to what's relevant for THIS project's stack and architecture.
9
+ description: "Find confirmed dead code only",
10
+ prompt: `# Scan: Confirmed Dead Code Review
11
11
 
12
- **Agent 1 - Performance**: Inefficient algorithms, unnecessary work, missing early returns, blocking operations, things that scale poorly
12
+ Find dead code in this codebase. Do not look for bugs, security issues, performance issues, style issues, or refactors. This command is report-first: do not edit or delete anything until the user chooses an option at the end.
13
13
 
14
- **Agent 2 - Dead Weight**: Unused code, unreachable paths, stale comments/TODOs, obsolete files, imports to nowhere
14
+ ## Phase 1: Parallel dead-code search
15
15
 
16
- **Agent 3 - Lurking Bugs**: Unhandled edge cases, missing error handling, resource leaks, race conditions, silent failures
16
+ Spawn exactly 3 sub-agents in parallel using the subagent tool (call the subagent tool 3 times in a single response), each with a different validation angle:
17
17
 
18
- **Agent 4 - Security**: Hardcoded secrets, injection risks, exposed sensitive data, overly permissive access, unsafe defaults
18
+ **Agent 1 - Static Reachability**: Check exports, imports, call sites, route registration, command registration, component usage, tests, package entrypoints, and public API surfaces. Identify candidates only when references appear absent or unreachable.
19
19
 
20
- **Agent 5 - Dependencies & Config**: Unused packages, vulnerable dependencies, misconfigured settings, dead environment variables, orphaned config files
20
+ **Agent 2 - Runtime & Dynamic Usage**: Check dynamic loading, reflection, string-based references, plugin systems, CLI commands, routes, config keys, generated-code hooks, framework conventions, side-effect imports, and files used outside TypeScript import graphs.
21
21
 
22
- ## The Only Valid Findings
22
+ **Agent 3 - Historical & Boundary Safety**: Check git history, package manifests, build configs, docs, examples, scripts, CI, release artifacts, and external-facing filenames/API names that may be consumed by users even if unused internally.
23
23
 
24
- A finding is ONLY valid if it falls into one of these categories:
24
+ Each sub-agent must return only candidates with file:line ranges, estimated line counts, validation evidence, and reasons removal may be unsafe. Finding nothing is valid.
25
25
 
26
- 1. **Dead** - Code that literally does nothing. Unused, unreachable, no-op.
27
- 2. **Broken** - Will cause errors, crashes, or wrong behavior. Not "might" - WILL.
28
- 3. **Dangerous** - Security holes, data exposure, resource exhaustion.
26
+ ## Phase 2: Main-agent validation
29
27
 
30
- That's it. Three categories. If it doesn't fit, don't report it.
28
+ For every candidate, validate it yourself before reporting it:
31
29
 
32
- **NOT valid findings:**
33
- - "This works but could be cleaner" - NO
34
- - "Modern best practice suggests..." - NO
35
- - "This is verbose/repetitive but functional" - NO
36
- - "You could use X instead of Y" - NO
37
- - "This isn't how I'd write it" - NO
30
+ 1. Search for references with grep/find and language-aware patterns where possible.
31
+ 2. Check exports and package/public entrypoints before marking anything removable.
32
+ 3. Check framework conventions and dynamic lookup risks before marking anything removable.
33
+ 4. Check whether removing it would change public API, CLI behavior, routes, config support, migration behavior, generated artifacts, docs examples, tests, or side effects.
34
+ 5. If evidence is incomplete, mark safety as Low or drop the finding.
38
35
 
39
- If the code works, isn't dangerous, and does something - leave it alone.
36
+ ## What counts as dead code
40
37
 
41
- ## Output Format
38
+ Report only code that is validated as one of:
42
39
 
43
- For each finding:
44
- \`\`\`
45
- [DEAD/BROKEN/DANGEROUS] file:line - What it is
46
- Impact: What happens if left unfixed
47
- \`\`\`
40
+ - **Unused file**: no imports, no entrypoint references, no dynamic/framework usage, no public/exported contract.
41
+ - **Unused export**: exported but not referenced internally or by package entrypoints, and not part of documented/public API.
42
+ - **Unreachable branch**: condition/path cannot execute based on current code and config.
43
+ - **Obsolete artifact**: stale script/config/example/generated artifact no longer referenced by build, docs, package manifests, or CI.
44
+ - **No-op code**: code executes but has no observable effect and no intentional placeholder/documentation purpose.
45
+
46
+ Do not report:
47
+ - Public APIs, package exports, CLI commands, routes, config keys, migrations, docs examples, tests, generated-code integration points, or plugin hooks unless you can prove they are obsolete.
48
+ - Code only unused in the current test suite.
49
+ - Code that might be used through strings, framework conventions, side effects, or external consumers.
50
+ - Anything you are not confident is safe to remove.
51
+
52
+ ## Safety labels
53
+
54
+ - **High**: Strong evidence from static references, entrypoints, configs, docs, tests, and dynamic-use checks; removal is likely safe.
55
+ - **Medium**: Probably dead, but one boundary or dynamic-use risk remains; remove only with targeted verification.
56
+ - **Low**: Suspicious but not proven; do not remove without more investigation.
57
+
58
+ ## Final output
59
+
60
+ Output one concise table, prioritized by safety and impact. No prose before the table.
61
+
62
+ | Priority | Location | Lines | Dead-code type | Evidence | Safety to remove | Recommended action |
63
+ |---|---|---:|---|---|---|---|
64
+ | P0/P1/P2/P3 | file:line-line | N | unused file/export/branch/artifact/no-op | one sentence | High/Medium/Low | Remove / Investigate / Keep |
65
+
66
+ Priority guide:
67
+ - **P0**: High-safety removal with meaningful line or complexity reduction.
68
+ - **P1**: High-safety small removal, or Medium-safety meaningful cleanup.
69
+ - **P2**: Medium-safety small cleanup; needs targeted verification.
70
+ - **P3**: Low-safety candidate; keep unless user wants deeper investigation.
71
+
72
+ Rules:
73
+ - Put High safety rows first, then Medium, then Low.
74
+ - Keep each table cell short.
75
+ - If no confirmed dead code is found, output one row saying none found and set action to \`Keep\`.
76
+ - Do not recommend deletion for Low-safety rows.
48
77
 
49
- Finding nothing is a valid outcome. Most codebases don't have easy wins - that's fine.`,
78
+ After the table, ask exactly:
79
+
80
+ What should I do?
81
+ A) Remove all High-safety dead code
82
+ B) Remove only top priorities
83
+ C) Skip
84
+
85
+ Do not start deleting or editing until the user chooses.`,
50
86
  },
51
87
  {
52
88
  name: "verify",
53
89
  aliases: [],
54
- description: "Verify code against docs and best practices",
55
- prompt: `Verify this codebase against current best practices and official documentation. Spawn 8 sub-agents in parallel using the subagent tool (call the subagent tool 8 times in a single response, each with a different task), each focusing on one category. Each agent must VERIFY findings using real code samples or official docs - no assumptions allowed.
90
+ description: "Review this codebase against real-world implementations",
91
+ prompt: `# Verify: Codebase Real-World Check
56
92
 
57
- **Agent 1 - Core Framework**: Detect the main framework, verify usage patterns against official documentation
93
+ Review this codebase's implementation against real-world code, not opinions. Start with changes from this conversation or \`git diff\` / \`git status\`; if there are no relevant changes, choose the most important implemented feature or module in the current project and review that.
58
94
 
59
- **Agent 2 - Dependencies/Libraries**: Check if library APIs being used are current or deprecated. Verify against library documentation
95
+ ## Phase 1: Parallel codebase review
60
96
 
61
- **Agent 3 - Language Patterns**: Identify the primary language, verify idioms and patterns are current
97
+ Spawn exactly 3 sub-agents in parallel using the subagent tool (call the subagent tool 3 times in a single response), each with a different focus:
62
98
 
63
- **Agent 4 - Configuration**: Examine build tools, bundlers, linters, and config files. Verify settings against current tool documentation
99
+ **Agent 1 - Implementation Shape**: Identify the main APIs, components, functions, file structure, state flow, and integration points. Return only concrete search anchors and candidate concerns.
64
100
 
65
- **Agent 5 - Security Patterns**: Review auth, data handling, secrets management. Verify against current security guidance and OWASP recommendations
101
+ **Agent 2 - Completeness**: Check whether the implementation appears to miss expected pieces: edge cases, cleanup, error states, validation, tests, configuration, accessibility, migrations, docs, or lifecycle handling. Return only concrete candidate gaps.
66
102
 
67
- **Agent 6 - Testing**: Identify test framework in use, verify testing patterns match current library recommendations
103
+ **Agent 3 - Divergence**: Look for unusual patterns, over-custom code, reinvented utilities, brittle abstractions, or choices that may differ from how mature projects solve the same problem. Return only concrete candidate divergences.
68
104
 
69
- **Agent 7 - API/Data Handling**: Review data fetching, state management, storage patterns. Verify against current patterns and framework docs
105
+ Each sub-agent must include file:line references and suggested literal search anchors for kencode search, such as imports, function names, hooks, props, config keys, or API calls. Do not report subjective style preferences.
70
106
 
71
- **Agent 8 - Error Handling**: Examine error handling patterns, verify they match library documentation
107
+ ## Phase 2: Real-world comparison with kencode search
72
108
 
73
- ## Agent Workflow
109
+ After the 3 agents return, use \`mcp__kencode-search__searchCode\` yourself to verify or reject their candidates.
74
110
 
75
- Each agent MUST follow this process:
76
- 1. **Identify** - What's relevant in THIS project for your category
77
- 2. **Find** - Locate specific implementations in the codebase
78
- 3. **Verify** - Check against real code or official docs
79
- 4. **Report** - Only report when verified current practice differs from codebase
111
+ Search rules:
112
+ - Use literal code tokens, not conceptual phrases.
113
+ - Prefer imports, framework identifiers, config keys, hook names, component names, and API calls from this codebase.
114
+ - Use \`peek: true\` first when exploring, then fetch narrowed examples with repo/path filters when useful.
115
+ - Compare against multiple real repositories when possible; one repo is weak evidence unless it is an official or canonical implementation.
116
+ - If kencode search is unavailable or returns insufficient evidence, say that in the Evidence column and lower confidence.
80
117
 
81
- ## The Only Valid Findings
118
+ ## What to classify
82
119
 
83
- A finding is ONLY valid if:
84
- 1. **OUTDATED** - Works but uses old patterns with verified better alternatives
85
- 2. **DEPRECATED** - Uses APIs marked deprecated in current official docs
86
- 3. **INCORRECT** - Implementation contradicts official documentation
120
+ Report only findings that fit one of these:
87
121
 
88
- **NOT valid findings:**
89
- - "I think there's a better way" without verification - NO
90
- - "This looks old" without proof - NO
91
- - Style preferences or subjective improvements - NO
92
- - Anything not verified via real code or official docs - NO
122
+ 1. **Aligned** - The implementation matches consistent real-world practice. No action needed.
123
+ 2. **Missing** - Real-world implementations consistently include something this code lacks.
124
+ 3. **Divergent** - This code differs from common implementations in a way that likely matters.
125
+ 4. **Better Elsewhere** - Real-world implementations solve the same problem more robustly or simply, with evidence.
93
126
 
94
- ## Output Format
127
+ Drop anything that is only taste, personal preference, or unsupported by code evidence.
95
128
 
96
- For each finding:
97
- \`\`\`
98
- [OUTDATED/DEPRECATED/INCORRECT] file:line - What it is
99
- Current: How it's implemented now
100
- Verified: What the correct/current approach is
101
- Source: URL to official docs or evidence
102
- \`\`\`
129
+ ## Final output
130
+
131
+ Output one concise table, prioritized by impact. No prose before the table.
132
+
133
+ | Priority | Type | Location | Finding | Evidence | Recommended action |
134
+ |---|---|---|---|---|---|
135
+ | P0/P1/P2/P3 | Missing/Divergent/Better Elsewhere/Aligned | file:line | one sentence | kencode evidence in one sentence | concrete action or \`None\` |
136
+
137
+ Priority guide:
138
+ - **P0**: likely bug, data loss, security risk, or broken integration.
139
+ - **P1**: important missing behavior or maintainability risk.
140
+ - **P2**: useful improvement backed by real-world evidence.
141
+ - **P3**: aligned/no-action observations.
142
+
143
+ Rules:
144
+ - Keep each table cell short.
145
+ - Put action-taking findings before aligned findings.
146
+ - If everything is aligned, output only aligned rows and set every action to \`None\`.
147
+ - If there is not enough evidence for any finding, output one row explaining that verification was inconclusive.
148
+
149
+ After the table, ask exactly:
150
+
151
+ Which should I do?
152
+ A) Refine and adjust all
153
+ B) Just top priorities
154
+ C) Skip
103
155
 
104
- No findings is a valid outcome. If implementations match current practices, that's good news.`,
156
+ Do not start fixing until the user chooses.`,
105
157
  },
106
158
  {
107
159
  name: "bullet-proof",
@@ -1 +1 @@
1
- {"version":3,"file":"prompt-commands.js","sourceRoot":"","sources":["../../src/core/prompt-commands.ts"],"names":[],"mappings":"AAAA;;;GAGG;AASH,MAAM,CAAC,MAAM,eAAe,GAAoB;IAC9C;QACE,IAAI,EAAE,MAAM;QACZ,OAAO,EAAE,EAAE;QACX,WAAW,EAAE,2CAA2C;QACxD,MAAM,EAAE;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;uFAuC2E;KACpF;IACD;QACE,IAAI,EAAE,QAAQ;QACd,OAAO,EAAE,EAAE;QACX,WAAW,EAAE,6CAA6C;QAC1D,MAAM,EAAE;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;8FAiDkF;KAC3F;IACD;QACE,IAAI,EAAE,cAAc;QACpB,OAAO,EAAE,CAAC,IAAI,CAAC;QACf,WAAW,EAAE,0EAA0E;QACvF,MAAM,EAAE;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;qEAoLyD;KAClE;IACD;QACE,IAAI,EAAE,UAAU;QAChB,OAAO,EAAE,EAAE;QACX,WAAW,EAAE,yCAAyC;QACtD,MAAM,EAAE;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;oDA6DwC;KACjD;IACD;QACE,IAAI,EAAE,MAAM;QACZ,OAAO,EAAE,EAAE;QACX,WAAW,EAAE,+CAA+C;QAC5D,MAAM,EAAE;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;2MA8C+L;KACxM;IACD;QACE,IAAI,EAAE,YAAY;QAClB,OAAO,EAAE,EAAE;QACX,WAAW,EAAE,sDAAsD;QACnE,MAAM,EAAE;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;8EA8DkE;KAC3E;IACD;QACE,IAAI,EAAE,cAAc;QACpB,OAAO,EAAE,EAAE;QACX,WAAW,EAAE,gDAAgD;QAC7D,MAAM,EAAE;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;2FA2C+E;KACxF;IACD;QACE,IAAI,EAAE,aAAa;QACnB,OAAO,EAAE,EAAE;QACX,WAAW,EAAE,6CAA6C;QAC1D,MAAM,EAAE;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;yFA4D6E;KACtF;IACD;QACE,IAAI,EAAE,cAAc;QACpB,OAAO,EAAE,EAAE;QACX,WAAW,EAAE,oDAAoD;QACjE,MAAM,EAAE;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;sGA8D0F;KACnG;IACD;QACE,IAAI,EAAE,YAAY;QAClB,OAAO,EAAE,EAAE;QACX,WAAW,EAAE,oDAAoD;QACjE,MAAM,EAAE;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;2OA4E+N;KACxO;IACD;QACE,IAAI,EAAE,cAAc;QACpB,OAAO,EAAE,EAAE;QACX,WAAW,EAAE,oDAAoD;QACjE,MAAM,EAAE;;;;;;;;;;;;;;;;;;;;;;;;;;;;6HA4BiH;KAC1H;IACD;QACE,IAAI,EAAE,UAAU;QAChB,OAAO,EAAE,EAAE;QACX,WAAW,EAAE,0CAA0C;QACvD,MAAM,EAAE;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;qFAgDyE;KAClF;IACD;QACE,IAAI,EAAE,OAAO;QACb,OAAO,EAAE,EAAE;QACX,WAAW,EAAE,8CAA8C;QAC3D,MAAM,EAAE;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;mHA0EuG;KAChH;IACD;QACE,IAAI,EAAE,SAAS;QACf,OAAO,EAAE,EAAE;QACX,WAAW,EAAE,oEAAoE;QACjF,MAAM,EAAE;;;;;;;;;;;;;;;iFAeqE;KAC9E;IACD;QACE,IAAI,EAAE,cAAc;QACpB,OAAO,EAAE,EAAE;QACX,WAAW,EAAE,kDAAkD;QAC/D,MAAM,EAAE;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;gLA6FoK;KAC7K;IACD;QACE,IAAI,EAAE,OAAO;QACb,OAAO,EAAE,CAAC,eAAe,CAAC;QAC1B,WAAW,EAAE,2EAA2E;QACxF,MAAM,EAAE;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;6JAuFiJ;KAC1J;CACF,CAAC;AAEF,gDAAgD;AAChD,MAAM,UAAU,gBAAgB,CAAC,IAAY;IAC3C,OAAO,eAAe,CAAC,IAAI,CAAC,CAAC,GAAG,EAAE,EAAE,CAAC,GAAG,CAAC,IAAI,KAAK,IAAI,IAAI,GAAG,CAAC,OAAO,CAAC,QAAQ,CAAC,IAAI,CAAC,CAAC,CAAC;AACxF,CAAC"}
1
+ {"version":3,"file":"prompt-commands.js","sourceRoot":"","sources":["../../src/core/prompt-commands.ts"],"names":[],"mappings":"AAAA;;;GAGG;AASH,MAAM,CAAC,MAAM,eAAe,GAAoB;IAC9C;QACE,IAAI,EAAE,MAAM;QACZ,OAAO,EAAE,EAAE;QACX,WAAW,EAAE,+BAA+B;QAC5C,MAAM,EAAE;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;yDA2E6C;KACtD;IACD;QACE,IAAI,EAAE,QAAQ;QACd,OAAO,EAAE,EAAE;QACX,WAAW,EAAE,yDAAyD;QACtE,MAAM,EAAE;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;4CAiEgC;KACzC;IACD;QACE,IAAI,EAAE,cAAc;QACpB,OAAO,EAAE,CAAC,IAAI,CAAC;QACf,WAAW,EAAE,0EAA0E;QACvF,MAAM,EAAE;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;qEAoLyD;KAClE;IACD;QACE,IAAI,EAAE,UAAU;QAChB,OAAO,EAAE,EAAE;QACX,WAAW,EAAE,yCAAyC;QACtD,MAAM,EAAE;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;oDA6DwC;KACjD;IACD;QACE,IAAI,EAAE,MAAM;QACZ,OAAO,EAAE,EAAE;QACX,WAAW,EAAE,+CAA+C;QAC5D,MAAM,EAAE;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;2MA8C+L;KACxM;IACD;QACE,IAAI,EAAE,YAAY;QAClB,OAAO,EAAE,EAAE;QACX,WAAW,EAAE,sDAAsD;QACnE,MAAM,EAAE;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;8EA8DkE;KAC3E;IACD;QACE,IAAI,EAAE,cAAc;QACpB,OAAO,EAAE,EAAE;QACX,WAAW,EAAE,gDAAgD;QAC7D,MAAM,EAAE;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;2FA2C+E;KACxF;IACD;QACE,IAAI,EAAE,aAAa;QACnB,OAAO,EAAE,EAAE;QACX,WAAW,EAAE,6CAA6C;QAC1D,MAAM,EAAE;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;yFA4D6E;KACtF;IACD;QACE,IAAI,EAAE,cAAc;QACpB,OAAO,EAAE,EAAE;QACX,WAAW,EAAE,oDAAoD;QACjE,MAAM,EAAE;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;sGA8D0F;KACnG;IACD;QACE,IAAI,EAAE,YAAY;QAClB,OAAO,EAAE,EAAE;QACX,WAAW,EAAE,oDAAoD;QACjE,MAAM,EAAE;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;2OA4E+N;KACxO;IACD;QACE,IAAI,EAAE,cAAc;QACpB,OAAO,EAAE,EAAE;QACX,WAAW,EAAE,oDAAoD;QACjE,MAAM,EAAE;;;;;;;;;;;;;;;;;;;;;;;;;;;;6HA4BiH;KAC1H;IACD;QACE,IAAI,EAAE,UAAU;QAChB,OAAO,EAAE,EAAE;QACX,WAAW,EAAE,0CAA0C;QACvD,MAAM,EAAE;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;qFAgDyE;KAClF;IACD;QACE,IAAI,EAAE,OAAO;QACb,OAAO,EAAE,EAAE;QACX,WAAW,EAAE,8CAA8C;QAC3D,MAAM,EAAE;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;mHA0EuG;KAChH;IACD;QACE,IAAI,EAAE,SAAS;QACf,OAAO,EAAE,EAAE;QACX,WAAW,EAAE,oEAAoE;QACjF,MAAM,EAAE;;;;;;;;;;;;;;;iFAeqE;KAC9E;IACD;QACE,IAAI,EAAE,cAAc;QACpB,OAAO,EAAE,EAAE;QACX,WAAW,EAAE,kDAAkD;QAC/D,MAAM,EAAE;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;gLA6FoK;KAC7K;IACD;QACE,IAAI,EAAE,OAAO;QACb,OAAO,EAAE,CAAC,eAAe,CAAC;QAC1B,WAAW,EAAE,2EAA2E;QACxF,MAAM,EAAE;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;6JAuFiJ;KAC1J;CACF,CAAC;AAEF,gDAAgD;AAChD,MAAM,UAAU,gBAAgB,CAAC,IAAY;IAC3C,OAAO,eAAe,CAAC,IAAI,CAAC,CAAC,GAAG,EAAE,EAAE,CAAC,GAAG,CAAC,IAAI,KAAK,IAAI,IAAI,GAAG,CAAC,OAAO,CAAC,QAAQ,CAAC,IAAI,CAAC,CAAC,CAAC;AACxF,CAAC"}
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@kenkaiiii/ggcoder",
3
- "version": "4.3.173",
3
+ "version": "4.3.174",
4
4
  "type": "module",
5
5
  "description": "CLI coding agent with OAuth authentication for Anthropic and OpenAI",
6
6
  "license": "MIT",
@@ -78,10 +78,10 @@
78
78
  "string-width": "^8.2.0",
79
79
  "wrap-ansi": "^10.0.0",
80
80
  "zod": "^4.4.3",
81
- "@kenkaiiii/gg-agent": "4.3.173",
82
- "@kenkaiiii/gg-ai": "4.3.173",
83
- "@kenkaiiii/ggcoder-eyes": "0.1.2",
84
- "@kenkaiiii/gg-pixel": "4.3.95"
81
+ "@kenkaiiii/gg-agent": "4.3.174",
82
+ "@kenkaiiii/gg-ai": "4.3.174",
83
+ "@kenkaiiii/gg-pixel": "4.3.95",
84
+ "@kenkaiiii/ggcoder-eyes": "0.1.2"
85
85
  },
86
86
  "optionalDependencies": {
87
87
  "@huggingface/transformers": "^3.6.0",