@kevinrabun/judges 3.115.4 → 3.117.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/agents/accessibility.judge.md +7 -0
- package/agents/agent-instructions.judge.md +7 -0
- package/agents/ai-code-safety.judge.md +7 -0
- package/agents/api-contract.judge.md +7 -0
- package/agents/api-design.judge.md +7 -0
- package/agents/authentication.judge.md +7 -0
- package/agents/backwards-compatibility.judge.md +7 -0
- package/agents/caching.judge.md +7 -0
- package/agents/ci-cd.judge.md +7 -0
- package/agents/cloud-readiness.judge.md +7 -0
- package/agents/concurrency.judge.md +7 -0
- package/agents/configuration-management.judge.md +7 -0
- package/agents/cybersecurity.judge.md +7 -0
- package/agents/data-security.judge.md +7 -0
- package/agents/dependency-health.judge.md +7 -0
- package/agents/documentation.judge.md +7 -0
- package/agents/error-handling.judge.md +7 -0
- package/agents/ethics-bias.judge.md +7 -0
- package/agents/false-positive-review.judge.md +12 -0
- package/agents/framework-safety.judge.md +7 -0
- package/agents/hallucination-detection.judge.md +13 -0
- package/agents/iac-security.judge.md +7 -0
- package/agents/intent-alignment.judge.md +13 -0
- package/agents/logging-privacy.judge.md +7 -0
- package/agents/maintainability.judge.md +7 -0
- package/agents/multi-turn-coherence.judge.md +7 -0
- package/agents/observability.judge.md +7 -0
- package/agents/portability.judge.md +7 -0
- package/agents/rate-limiting.judge.md +7 -0
- package/agents/reliability.judge.md +7 -0
- package/agents/security.judge.md +13 -0
- package/agents/testing.judge.md +7 -0
- package/agents/ux.judge.md +7 -0
- package/dist/a2a-protocol.d.ts +136 -0
- package/dist/a2a-protocol.js +218 -0
- package/dist/api.d.ts +21 -3
- package/dist/api.js +21 -1
- package/dist/audit-trail.d.ts +245 -0
- package/dist/audit-trail.js +257 -0
- package/dist/commands/benchmark-advanced.js +51 -51
- package/dist/commands/benchmark-ai-agents.js +16 -16
- package/dist/commands/benchmark-compliance-ethics.js +12 -12
- package/dist/commands/benchmark-expanded-2.js +2 -2
- package/dist/commands/benchmark-expanded.js +2 -2
- package/dist/commands/benchmark-infrastructure.js +12 -12
- package/dist/commands/benchmark-languages.js +11 -11
- package/dist/commands/benchmark-quality-ops.js +7 -7
- package/dist/commands/benchmark-security-deep.js +9 -9
- package/dist/commands/benchmark.js +1 -1
- package/dist/commands/llm-benchmark-optimizer.d.ts +78 -0
- package/dist/commands/llm-benchmark-optimizer.js +241 -0
- package/dist/commands/llm-benchmark.d.ts +4 -2
- package/dist/commands/llm-benchmark.js +40 -12
- package/dist/escalation.d.ts +100 -0
- package/dist/escalation.js +292 -0
- package/dist/evaluation-session.d.ts +74 -0
- package/dist/evaluation-session.js +152 -0
- package/dist/evaluators/index.d.ts +23 -1
- package/dist/evaluators/index.js +192 -3
- package/dist/evaluators/judge-selector.d.ts +19 -0
- package/dist/evaluators/judge-selector.js +141 -0
- package/dist/evaluators/recall-boost.d.ts +27 -0
- package/dist/evaluators/recall-boost.js +409 -0
- package/dist/feedback-loop.d.ts +62 -0
- package/dist/feedback-loop.js +179 -0
- package/dist/index.js +2 -0
- package/dist/judges/accessibility.js +7 -0
- package/dist/judges/agent-instructions.js +7 -0
- package/dist/judges/ai-code-safety.js +7 -0
- package/dist/judges/api-contract.js +7 -0
- package/dist/judges/api-design.js +7 -0
- package/dist/judges/authentication.js +7 -0
- package/dist/judges/backwards-compatibility.js +7 -0
- package/dist/judges/caching.js +7 -0
- package/dist/judges/ci-cd.js +7 -0
- package/dist/judges/cloud-readiness.js +7 -0
- package/dist/judges/concurrency.js +7 -0
- package/dist/judges/configuration-management.js +7 -0
- package/dist/judges/cybersecurity.js +7 -0
- package/dist/judges/data-security.js +7 -0
- package/dist/judges/dependency-health.js +7 -0
- package/dist/judges/documentation.js +7 -0
- package/dist/judges/error-handling.js +7 -0
- package/dist/judges/ethics-bias.js +7 -0
- package/dist/judges/false-positive-review.js +13 -1
- package/dist/judges/framework-safety.js +7 -0
- package/dist/judges/hallucination-detection.js +14 -1
- package/dist/judges/iac-security.js +7 -0
- package/dist/judges/intent-alignment.js +14 -1
- package/dist/judges/logging-privacy.js +7 -0
- package/dist/judges/maintainability.js +7 -0
- package/dist/judges/multi-turn-coherence.js +7 -0
- package/dist/judges/observability.js +7 -0
- package/dist/judges/portability.js +7 -0
- package/dist/judges/rate-limiting.js +7 -0
- package/dist/judges/reliability.js +7 -0
- package/dist/judges/security.js +14 -1
- package/dist/judges/testing.js +7 -0
- package/dist/judges/ux.js +7 -0
- package/dist/review-conversation.d.ts +87 -0
- package/dist/review-conversation.js +307 -0
- package/dist/sast-integration.d.ts +112 -0
- package/dist/sast-integration.js +215 -0
- package/dist/tools/register-evaluation.js +208 -8
- package/dist/tools/register-fix.js +24 -1
- package/dist/tools/register-resources.d.ts +6 -0
- package/dist/tools/register-resources.js +177 -0
- package/dist/tools/register-review.js +26 -1
- package/dist/tools/register-workflow.js +384 -11
- package/dist/tools/validation.d.ts +13 -0
- package/dist/tools/validation.js +77 -0
- package/dist/types.d.ts +122 -0
- package/package.json +25 -12
- package/server.json +2 -2
|
@@ -30,6 +30,13 @@ RULES FOR YOUR EVALUATION:
|
|
|
30
30
|
- Recommend fixes with code examples using proper ARIA patterns.
|
|
31
31
|
- Score from 0-100 where 100 means fully WCAG 2.2 AA compliant.
|
|
32
32
|
|
|
33
|
+
FALSE POSITIVE AVOIDANCE:
|
|
34
|
+
- Only flag accessibility issues in UI/frontend code (HTML, JSX, React components, CSS, templates).
|
|
35
|
+
- Do NOT flag backend APIs, CLI tools, build scripts, or infrastructure code for accessibility issues.
|
|
36
|
+
- Missing ARIA attributes are only an issue when there is actual UI markup to evaluate.
|
|
37
|
+
- Do NOT flag non-UI code for missing alt text, keyboard navigation, or screen reader support.
|
|
38
|
+
- Server-side rendering code should be evaluated for the HTML it produces, not its internal logic.
|
|
39
|
+
|
|
33
40
|
ADVERSARIAL MANDATE:
|
|
34
41
|
- Your role is adversarial: assume the code has accessibility defects and actively hunt for them. Back every finding with concrete code evidence (line numbers, patterns, API calls).
|
|
35
42
|
- Never praise or compliment the code. Report only problems, risks, and deficiencies.
|
|
@@ -30,6 +30,13 @@ RULES FOR YOUR EVALUATION:
|
|
|
30
30
|
- Recommend precise wording and structure changes.
|
|
31
31
|
- Score from 0-100 where 100 means instruction set is clear, safe, and enforceable.
|
|
32
32
|
|
|
33
|
+
FALSE POSITIVE AVOIDANCE:
|
|
34
|
+
- Only flag agent instruction issues in code that configures AI/LLM agents, system prompts, or tool-use patterns.
|
|
35
|
+
- Do NOT flag regular application code, APIs, or services for agent safety issues unless they directly interact with LLM providers.
|
|
36
|
+
- Standard API endpoints that accept user input are not "agent instruction" vulnerabilities — defer to SEC/CYBER judges.
|
|
37
|
+
- Prompt templates with fixed system instructions and user-variable sections are a standard safe pattern.
|
|
38
|
+
- Missing agent guardrails should only be flagged when the code is specifically an AI agent implementation.
|
|
39
|
+
|
|
33
40
|
ADVERSARIAL MANDATE:
|
|
34
41
|
- Assume instruction files are brittle until proven robust.
|
|
35
42
|
- Never praise or compliment; report risks, ambiguities, and missing controls.
|
|
@@ -41,6 +41,13 @@ RULES FOR YOUR EVALUATION:
|
|
|
41
41
|
- Reference OWASP LLM Top 10, CWE IDs, and 12-Factor App where applicable.
|
|
42
42
|
- Score from 0-100 where 100 means no AI-code-specific risks found.
|
|
43
43
|
|
|
44
|
+
FALSE POSITIVE AVOIDANCE:
|
|
45
|
+
- Only flag AI code safety issues in code that interacts with AI/ML models, LLM APIs, or AI-generated content.
|
|
46
|
+
- Do NOT flag standard application code, CRUD operations, or non-AI services for AI safety issues.
|
|
47
|
+
- Proper input validation and output sanitization in non-AI contexts should be deferred to SEC/CYBER judges.
|
|
48
|
+
- Missing AI-specific guardrails (content filtering, toxicity detection) are only relevant for AI-facing code.
|
|
49
|
+
- Framework-level AI safety features (OpenAI content policy, Anthropic safety layers) are external controls — code calling these APIs is correctly delegating safety.
|
|
50
|
+
|
|
44
51
|
ADVERSARIAL MANDATE:
|
|
45
52
|
- Assume the code was generated by an AI and has not been security-reviewed. Hunt for the patterns LLMs typically get wrong.
|
|
46
53
|
- Never praise or compliment the code. Report only problems, risks, and deficiencies.
|
|
@@ -25,6 +25,13 @@ SEVERITY MAPPING:
|
|
|
25
25
|
- **medium**: Missing rate limiting, absent versioning
|
|
26
26
|
- **low**: Minor Content-Type mismatches, inconsistent error schemas
|
|
27
27
|
|
|
28
|
+
FALSE POSITIVE AVOIDANCE:
|
|
29
|
+
- Only flag API contract issues in code that defines or implements HTTP/REST/GraphQL APIs.
|
|
30
|
+
- Do NOT flag internal function signatures, database queries, or infrastructure code for API contract issues.
|
|
31
|
+
- Missing OpenAPI/Swagger docs is only an issue for public-facing API endpoints, not internal helpers.
|
|
32
|
+
- Type-safe languages with compile-time checks already enforce many contract guarantees — do not duplicate those findings.
|
|
33
|
+
- Configuration endpoints, health checks, and internal metrics endpoints have different contract requirements than business APIs.
|
|
34
|
+
|
|
28
35
|
ADVERSARIAL MANDATE:
|
|
29
36
|
- Flag every deviation from RESTful best practices.
|
|
30
37
|
- Do NOT assume middleware handles validation unless explicitly imported and applied.
|
|
@@ -32,6 +32,13 @@ RULES FOR YOUR EVALUATION:
|
|
|
32
32
|
- Consider both API producer and consumer perspectives.
|
|
33
33
|
- Score from 0-100 where 100 means exemplary API design.
|
|
34
34
|
|
|
35
|
+
FALSE POSITIVE AVOIDANCE:
|
|
36
|
+
- Only flag API design issues in code that defines or implements HTTP/REST/GraphQL API endpoints.
|
|
37
|
+
- Do NOT flag CLI tools, batch scripts, internal libraries, or infrastructure code for API design issues.
|
|
38
|
+
- RESTful conventions are guidelines, not hard rules — only flag when the deviation causes real usability problems.
|
|
39
|
+
- Missing pagination, filtering, or HATEOAS are design preferences, not defects — only flag when the API clearly handles large datasets without bounds.
|
|
40
|
+
- Internal microservice APIs have different design tradeoffs than public APIs — evaluate accordingly.
|
|
41
|
+
|
|
35
42
|
ADVERSARIAL MANDATE:
|
|
36
43
|
- Your role is adversarial: assume the API has design flaws and actively hunt for them. Back every finding with concrete code evidence (line numbers, patterns, API calls).
|
|
37
44
|
- Never praise or compliment the code. Report only problems, risks, and deficiencies.
|
|
@@ -30,6 +30,13 @@ RULES FOR YOUR EVALUATION:
|
|
|
30
30
|
- Flag any endpoint that accepts user input without verifying the caller's identity and permissions.
|
|
31
31
|
- Score from 0-100 where 100 means robust auth implementation.
|
|
32
32
|
|
|
33
|
+
FALSE POSITIVE AVOIDANCE:
|
|
34
|
+
- Do NOT flag code that uses established authentication libraries (passport, next-auth, Spring Security, etc.) following their documented patterns.
|
|
35
|
+
- JWT verification with explicit algorithm restrictions and proper expiration checks is correct implementation, not a vulnerability.
|
|
36
|
+
- OAuth flows using PKCE, state parameters, and proper redirect validation are secure by design.
|
|
37
|
+
- Missing MFA, SSO, or advanced auth features are product decisions, not code vulnerabilities — only flag when auth logic is genuinely broken.
|
|
38
|
+
- Session management using secure, httpOnly, sameSite cookies is following best practices.
|
|
39
|
+
|
|
33
40
|
ADVERSARIAL MANDATE:
|
|
34
41
|
- Your role is adversarial: assume authentication is broken and actively hunt for problems. Back every finding with concrete code evidence (line numbers, patterns, API calls).
|
|
35
42
|
- Never praise or compliment the code. Report only problems, risks, and deficiencies.
|
|
@@ -30,6 +30,13 @@ RULES FOR YOUR EVALUATION:
|
|
|
30
30
|
- Consider the impact on downstream consumers.
|
|
31
31
|
- Score from 0-100 where 100 means excellent compatibility practices.
|
|
32
32
|
|
|
33
|
+
FALSE POSITIVE AVOIDANCE:
|
|
34
|
+
- Only flag backwards-compatibility issues when the code modifies a public API, library interface, or wire protocol.
|
|
35
|
+
- Do NOT flag internal refactoring, private method changes, or implementation details as breaking changes.
|
|
36
|
+
- Adding new optional parameters, methods, or fields is backwards-compatible by definition — do NOT flag additions.
|
|
37
|
+
- Missing deprecation warnings are only relevant for publicly consumed APIs, not internal application code.
|
|
38
|
+
- Version-gated changes (behind feature flags or new major versions) are deliberate breaking changes, not accidental ones.
|
|
39
|
+
|
|
33
40
|
ADVERSARIAL MANDATE:
|
|
34
41
|
- Your role is adversarial: assume backwards compatibility is not considered and actively hunt for problems. Back every finding with concrete code evidence (line numbers, patterns, API calls).
|
|
35
42
|
- Never praise or compliment the code. Report only problems, risks, and deficiencies.
|
package/agents/caching.judge.md
CHANGED
|
@@ -30,6 +30,13 @@ RULES FOR YOUR EVALUATION:
|
|
|
30
30
|
- Consider the cost-performance tradeoff of caching.
|
|
31
31
|
- Score from 0-100 where 100 means optimal caching strategy.
|
|
32
32
|
|
|
33
|
+
FALSE POSITIVE AVOIDANCE:
|
|
34
|
+
- Only flag caching issues when code makes repeated expensive operations (DB queries, API calls, computation) without caching.
|
|
35
|
+
- Do NOT flag code that intentionally avoids caching for correctness (real-time data, financial transactions, user-specific content).
|
|
36
|
+
- Missing cache invalidation is only an issue when a cache IS present — do not flag absent caches for lacking invalidation.
|
|
37
|
+
- Configuration files, infrastructure code, and CI/CD pipelines do not need application-level caching.
|
|
38
|
+
- In-memory data structures (Maps, Sets, objects) used for deduplication or lookup ARE a form of caching — do not flag them.
|
|
39
|
+
|
|
33
40
|
ADVERSARIAL MANDATE:
|
|
34
41
|
- Your role is adversarial: assume the caching strategy is flawed or absent and actively hunt for problems. Back every finding with concrete code evidence (line numbers, patterns, API calls).
|
|
35
42
|
- Never praise or compliment the code. Report only problems, risks, and deficiencies.
|
package/agents/ci-cd.judge.md
CHANGED
|
@@ -30,6 +30,13 @@ RULES FOR YOUR EVALUATION:
|
|
|
30
30
|
- Consider the entire path from commit to production.
|
|
31
31
|
- Score from 0-100 where 100 means excellent CI/CD practices.
|
|
32
32
|
|
|
33
|
+
FALSE POSITIVE AVOIDANCE:
|
|
34
|
+
- Only flag CI/CD issues in pipeline configurations (YAML workflows, Jenkinsfiles, Dockerfiles, Makefiles) and build scripts.
|
|
35
|
+
- Do NOT flag application source code (TypeScript, Python, Java, etc.) for CI/CD issues — application code is not a CI pipeline.
|
|
36
|
+
- Package.json scripts (build, test, start) are normal application lifecycle scripts, not CI pipeline misconfigurations.
|
|
37
|
+
- Missing CI features (no canary deployments, no artifact signing) should only be flagged when the code is an actual CI configuration file.
|
|
38
|
+
- Infrastructure-as-code that references deployments is NOT a CI/CD pipeline configuration.
|
|
39
|
+
|
|
33
40
|
ADVERSARIAL MANDATE:
|
|
34
41
|
- Your role is adversarial: assume the CI/CD posture is weak and actively hunt for problems. Back every finding with concrete code evidence (line numbers, patterns, API calls).
|
|
35
42
|
- Never praise or compliment the code. Report only problems, risks, and deficiencies.
|
|
@@ -30,6 +30,13 @@ RULES FOR YOUR EVALUATION:
|
|
|
30
30
|
- Recommend specific services or patterns (e.g., "Use Azure Key Vault instead of .env files in production").
|
|
31
31
|
- Score from 0-100 where 100 means fully cloud-native.
|
|
32
32
|
|
|
33
|
+
FALSE POSITIVE AVOIDANCE:
|
|
34
|
+
- Only flag cloud-readiness issues in code that involves cloud deployment, containerization, or distributed systems.
|
|
35
|
+
- Do NOT flag local development utilities, CLI tools, or scripts for cloud-readiness issues.
|
|
36
|
+
- File system access is not a cloud anti-pattern when the code is designed for local execution or uses mounted volumes.
|
|
37
|
+
- Missing cloud features (no auto-scaling config, no health endpoint) should only be flagged in code that is clearly a cloud service.
|
|
38
|
+
- Infrastructure-as-code and CI/CD configurations have their own judges — defer to IAC/CICD judges for those domains.
|
|
39
|
+
|
|
33
40
|
ADVERSARIAL MANDATE:
|
|
34
41
|
- Your role is adversarial: assume the code is not cloud-ready and actively hunt for problems. Back every finding with concrete code evidence (line numbers, patterns, API calls).
|
|
35
42
|
- Never praise or compliment the code. Report only problems, risks, and deficiencies.
|
|
@@ -32,6 +32,13 @@ RULES FOR YOUR EVALUATION:
|
|
|
32
32
|
- Reference Java Concurrency in Practice, Go concurrency patterns, or Rust ownership model as applicable.
|
|
33
33
|
- Score from 0-100 where 100 means thread-safe and correctly concurrent.
|
|
34
34
|
|
|
35
|
+
FALSE POSITIVE AVOIDANCE:
|
|
36
|
+
- Only flag concurrency issues in code that uses threads, async/await, workers, or shared mutable state.
|
|
37
|
+
- Single-threaded synchronous code cannot have race conditions — do NOT flag sequential code for concurrency issues.
|
|
38
|
+
- Async/await with proper error handling and sequential execution is not a concurrency problem.
|
|
39
|
+
- Immutable data structures and functional patterns are inherently thread-safe — do not flag them.
|
|
40
|
+
- Missing locks on read-only data or data accessed by a single thread is not a concurrency issue.
|
|
41
|
+
|
|
35
42
|
ADVERSARIAL MANDATE:
|
|
36
43
|
- Your role is adversarial: assume the code has concurrency bugs and actively hunt for them. Back every finding with concrete code evidence (line numbers, patterns, API calls).
|
|
37
44
|
- Never praise or compliment the code. Report only problems, risks, and deficiencies.
|
|
@@ -30,6 +30,13 @@ RULES FOR YOUR EVALUATION:
|
|
|
30
30
|
- Flag any value that would need to change between environments.
|
|
31
31
|
- Score from 0-100 where 100 means excellent configuration management.
|
|
32
32
|
|
|
33
|
+
FALSE POSITIVE AVOIDANCE:
|
|
34
|
+
- Do NOT flag environment variable reads (process.env.X, os.environ[]) as misconfigurations — reading from environment is the correct pattern for 12-factor apps.
|
|
35
|
+
- Default values in environment variable fallbacks (process.env.PORT || 3000) are standard development defaults, not hardcoded production secrets.
|
|
36
|
+
- Configuration files that reference environment variable names or placeholders are following best practices.
|
|
37
|
+
- Do NOT flag missing .env files or missing config validation in code that may handle validation elsewhere (e.g., a startup module).
|
|
38
|
+
- Only flag CFG issues when configuration is genuinely hardcoded, scattered without centralization, or contains plaintext secrets.
|
|
39
|
+
|
|
33
40
|
ADVERSARIAL MANDATE:
|
|
34
41
|
- Your role is adversarial: assume configuration management is inadequate and actively hunt for problems. Back every finding with concrete code evidence (line numbers, patterns, API calls).
|
|
35
42
|
- Never praise or compliment the code. Report only problems, risks, and deficiencies.
|
|
@@ -29,6 +29,13 @@ RULES FOR YOUR EVALUATION:
|
|
|
29
29
|
- Reference OWASP, CWE IDs, and CVE IDs where applicable.
|
|
30
30
|
- Score from 0-100 where 100 means no exploitable vulnerabilities found.
|
|
31
31
|
|
|
32
|
+
FALSE POSITIVE AVOIDANCE:
|
|
33
|
+
- Do NOT flag established security library usage (helmet, cors, bcrypt, argon2, parameterized queries) as security issues — these ARE the correct patterns.
|
|
34
|
+
- Code that properly validates input, uses HTTPS, and parameterizes queries is implementing security correctly.
|
|
35
|
+
- Missing security features (no WAF, no SIEM, no pen-test results) are operational concerns, not code vulnerabilities.
|
|
36
|
+
- Configuration files referencing environment variables for secrets are following best practices.
|
|
37
|
+
- Do NOT evaluate infrastructure-as-code, CI/CD configs, or non-application code for application-level cybersecurity issues.
|
|
38
|
+
|
|
32
39
|
ADVERSARIAL MANDATE:
|
|
33
40
|
- Your role is adversarial: assume the code is vulnerable and actively hunt for exploits. Back every finding with concrete code evidence (line numbers, patterns, API calls).
|
|
34
41
|
- Never praise or compliment the code. Report only problems, risks, and deficiencies.
|
|
@@ -27,6 +27,13 @@ RULES FOR YOUR EVALUATION:
|
|
|
27
27
|
- Reference standards where applicable (OWASP, NIST 800-53, GDPR Article numbers).
|
|
28
28
|
- Score from 0-100 where 100 means fully compliant with no findings.
|
|
29
29
|
|
|
30
|
+
FALSE POSITIVE AVOIDANCE:
|
|
31
|
+
- Do NOT flag code that uses established encryption libraries (crypto, sodium, bouncy castle) with standard configurations.
|
|
32
|
+
- Data flowing through authenticated APIs with proper access controls is not a data security issue.
|
|
33
|
+
- Configuration files referencing environment variables for database credentials are following 12-factor app practices.
|
|
34
|
+
- Do NOT flag data handling in CI/CD configurations, infrastructure code, or non-application files.
|
|
35
|
+
- Missing data classification or DLP features are organizational processes, not code-level data security issues.
|
|
36
|
+
|
|
30
37
|
ADVERSARIAL MANDATE:
|
|
31
38
|
- Your role is adversarial: assume the code leaks or mishandles data and actively hunt for exposures. Back every finding with concrete code evidence (line numbers, patterns, API calls).
|
|
32
39
|
- Never praise or compliment the code. Report only problems, risks, and deficiencies.
|
|
@@ -32,6 +32,13 @@ RULES FOR YOUR EVALUATION:
|
|
|
32
32
|
- Distinguish between direct dependency risk and transitive dependency risk.
|
|
33
33
|
- Score from 0-100 where 100 means healthy, secure dependency tree.
|
|
34
34
|
|
|
35
|
+
FALSE POSITIVE AVOIDANCE:
|
|
36
|
+
- Only flag dependency issues when the code includes package manifests (package.json, requirements.txt, go.mod, pom.xml) or import statements.
|
|
37
|
+
- Do NOT flag application source code for dependency health issues unless it imports known-vulnerable packages.
|
|
38
|
+
- Popular, well-maintained packages (express, react, django, spring) are not dependency risks unless a specific CVE applies.
|
|
39
|
+
- Missing lock files may exist elsewhere in the project — only flag when the manifest is present but the lock file is explicitly absent.
|
|
40
|
+
- Do NOT flag standard library imports or built-in modules as dependency issues.
|
|
41
|
+
|
|
35
42
|
ADVERSARIAL MANDATE:
|
|
36
43
|
- Your role is adversarial: assume the dependency tree has risks and actively hunt for them. Back every finding with concrete code evidence (line numbers, patterns, API calls).
|
|
37
44
|
- Never praise or compliment the code. Report only problems, risks, and deficiencies.
|
|
@@ -32,6 +32,13 @@ RULES FOR YOUR EVALUATION:
|
|
|
32
32
|
- Evaluate from the perspective of a new developer encountering the code for the first time.
|
|
33
33
|
- Score from 0-100 where 100 means exemplary documentation.
|
|
34
34
|
|
|
35
|
+
FALSE POSITIVE AVOIDANCE:
|
|
36
|
+
- Do NOT flag missing documentation for self-documenting code (clear function names, obvious parameters, standard patterns).
|
|
37
|
+
- Configuration files, data files, and infrastructure code have different documentation standards than application code.
|
|
38
|
+
- Private/internal functions with clear names do not require JSDoc/docstrings — only flag missing docs on public APIs.
|
|
39
|
+
- Do NOT flag documentation issues in test files, example code, or scaffolding.
|
|
40
|
+
- Missing README, CHANGELOG, or module-level docs may exist elsewhere — only flag when the evaluated code is specifically a module entry point.
|
|
41
|
+
|
|
35
42
|
ADVERSARIAL MANDATE:
|
|
36
43
|
- Your role is adversarial: assume the documentation is inadequate and actively hunt for gaps. Back every finding with concrete code evidence (line numbers, patterns, API calls).
|
|
37
44
|
- Never praise or compliment the code. Report only problems, risks, and deficiencies.
|
|
@@ -30,6 +30,13 @@ RULES FOR YOUR EVALUATION:
|
|
|
30
30
|
- Flag any code path that could throw without a handler in scope.
|
|
31
31
|
- Score from 0-100 where 100 means robust error handling.
|
|
32
32
|
|
|
33
|
+
FALSE POSITIVE AVOIDANCE:
|
|
34
|
+
- Do NOT flag error handling in code that delegates error handling to a framework (Express middleware, Spring @ExceptionHandler, etc.).
|
|
35
|
+
- Try-catch with logging and re-throw is a valid error handling pattern, not a deficiency.
|
|
36
|
+
- Missing error handling in configuration files, data definitions, or type declarations is not an issue — these constructs don't throw.
|
|
37
|
+
- Do NOT flag infrastructure-as-code (Terraform, CloudFormation) or CI/CD config for error handling — these have their own error models.
|
|
38
|
+
- Only flag ERR issues when error handling is genuinely absent, empty catch blocks discard errors, or errors are swallowed silently.
|
|
39
|
+
|
|
33
40
|
ADVERSARIAL MANDATE:
|
|
34
41
|
- Your role is adversarial: assume error handling is insufficient and actively hunt for problems. Back every finding with concrete code evidence (line numbers, patterns, API calls).
|
|
35
42
|
- Never praise or compliment the code. Report only problems, risks, and deficiencies.
|
|
@@ -32,6 +32,13 @@ RULES FOR YOUR EVALUATION:
|
|
|
32
32
|
- Evaluate proportionally: not all code involves AI/ML — score based on relevance.
|
|
33
33
|
- Score from 0-100 where 100 means fully ethical and bias-aware.
|
|
34
34
|
|
|
35
|
+
FALSE POSITIVE AVOIDANCE:
|
|
36
|
+
- Only flag ethics issues in code that performs ML/AI inference, scoring, pricing decisions, user classification, or automated decision-making.
|
|
37
|
+
- Do NOT flag general application code, CRUD operations, utility functions, or infrastructure code for ethics issues.
|
|
38
|
+
- Standard business logic (price calculations, access control, feature flags) is not inherently discriminatory unless it uses protected attributes.
|
|
39
|
+
- Code that processes user data for legitimate business purposes with proper consent is not an ethics violation.
|
|
40
|
+
- Authentication and authorization patterns are security concerns, not ethics concerns — defer to the SEC/AUTH judges.
|
|
41
|
+
|
|
35
42
|
ADVERSARIAL MANDATE:
|
|
36
43
|
- Your role is adversarial: assume the code has ethical risks or bias and actively hunt for them. Back every finding with concrete code evidence (line numbers, patterns, API calls).
|
|
37
44
|
- Never praise or compliment the code. Report only problems, risks, and deficiencies.
|
|
@@ -71,3 +71,15 @@ RULES FOR YOUR REVIEW:
|
|
|
71
71
|
- For findings you confirm as true positives, explicitly state "CONFIRMED" with brief reasoning.
|
|
72
72
|
- If you are uncertain, err on the side of keeping the finding (prefer false negatives over missed true positives in your own review).
|
|
73
73
|
- Your review should make the final finding set PRECISE and ACTIONABLE — no developer time should be wasted investigating false alarms.
|
|
74
|
+
|
|
75
|
+
FALSE POSITIVE AVOIDANCE:
|
|
76
|
+
- This judge reviews other judges' findings — only report FPR issues when other judge findings are clearly speculative.
|
|
77
|
+
- Do NOT generate independent code findings — defer all code-level issues to the appropriate specialized judge.
|
|
78
|
+
- Only flag false-positive patterns when you can identify a specific finding from another judge that lacks evidence.
|
|
79
|
+
- If no other judge findings are available for review, report ZERO FPR findings.
|
|
80
|
+
|
|
81
|
+
ADVERSARIAL MANDATE:
|
|
82
|
+
- Assume every finding from other judges could be a false positive. Scrutinize evidence rigorously.
|
|
83
|
+
- Never praise or compliment the code. Report only problems with other judges' findings.
|
|
84
|
+
- If you are uncertain whether a finding is a false positive, err on the side of keeping it — prefer false negatives in your own review.
|
|
85
|
+
- Absence of FPR findings does not mean all findings are accurate. It means your analysis reached its limits. State this explicitly.
|
|
@@ -33,6 +33,13 @@ RULES FOR YOUR EVALUATION:
|
|
|
33
33
|
- Reference official documentation URLs for each framework.
|
|
34
34
|
- Score from 0-100 where 100 means no framework misuse patterns found.
|
|
35
35
|
|
|
36
|
+
FALSE POSITIVE AVOIDANCE:
|
|
37
|
+
- Only flag framework safety issues when code uses web frameworks (Express, Django, Rails, Spring, etc.) in ways that bypass built-in protections.
|
|
38
|
+
- Standard framework usage following official documentation is correct, not a framework safety issue.
|
|
39
|
+
- Framework-specific middleware chains, decorators, and hooks are designed patterns, not anti-patterns.
|
|
40
|
+
- Missing framework features (no CSRF middleware, no rate limiting) should be deferred to specialized judges (SEC, RATE) unless the framework provides them as defaults that were explicitly disabled.
|
|
41
|
+
- Do NOT flag non-web code (CLI tools, scripts, libraries) for web framework safety issues.
|
|
42
|
+
|
|
36
43
|
ADVERSARIAL MANDATE:
|
|
37
44
|
- Your role is adversarial: assume the code misuses framework APIs and actively hunt for violations. Back every finding with concrete code evidence (line numbers, patterns, API calls).
|
|
38
45
|
- Never praise or compliment the code. Report only problems, risks, and deficiencies.
|
|
@@ -31,3 +31,16 @@ Each finding must include:
|
|
|
31
31
|
- The exact hallucinated API/import
|
|
32
32
|
- Why it doesn't exist or is incorrect
|
|
33
33
|
- The correct alternative to use
|
|
34
|
+
|
|
35
|
+
FALSE POSITIVE AVOIDANCE:
|
|
36
|
+
- Only flag hallucination issues when code uses APIs, methods, types, or libraries that genuinely do not exist.
|
|
37
|
+
- Standard library usage following official documentation is NOT a hallucination, even for less common features.
|
|
38
|
+
- Custom/internal libraries with non-standard method names are not hallucinations — they may be project-specific.
|
|
39
|
+
- Third-party libraries frequently add new APIs between versions — verify the specific version before flagging.
|
|
40
|
+
- Deprecated but still-functional APIs are not hallucinations — they are deprecation concerns (defer to FW/COMPAT judges).
|
|
41
|
+
|
|
42
|
+
ADVERSARIAL MANDATE:
|
|
43
|
+
- Assume every API call could be hallucinated. Hunt for subtle mismatches between documented APIs and actual usage.
|
|
44
|
+
- Never praise or compliment the code. Report only problems, risks, and deficiencies.
|
|
45
|
+
- If you are uncertain whether something is an issue, flag it only when you can cite specific code evidence (line numbers, patterns, API calls). Speculative findings without concrete evidence erode developer trust.
|
|
46
|
+
- Absence of findings does not mean the code is hallucination-free. It means your analysis reached its limits. State this explicitly.
|
|
@@ -30,6 +30,13 @@ RULES FOR YOUR EVALUATION:
|
|
|
30
30
|
- Recommend specific remediation with code examples in the same IaC language as the input.
|
|
31
31
|
- Score from 0-100 where 100 means fully secure and production-ready infrastructure code.
|
|
32
32
|
|
|
33
|
+
FALSE POSITIVE AVOIDANCE:
|
|
34
|
+
- Only flag IaC issues in infrastructure-as-code files (Terraform, CloudFormation, Bicep, Pulumi, Ansible, Kubernetes manifests).
|
|
35
|
+
- Do NOT flag application source code, CI/CD configs, or Dockerfiles for IaC security issues.
|
|
36
|
+
- Variables and locals referencing external data sources (var.x, data.x) are parameterized and NOT hardcoded values.
|
|
37
|
+
- Missing features in IaC (no WAF, no DDoS protection) should only be flagged when the infrastructure handles public traffic.
|
|
38
|
+
- Development/staging environment configs may intentionally have relaxed security — only flag when the resource serves production traffic.
|
|
39
|
+
|
|
33
40
|
ADVERSARIAL MANDATE:
|
|
34
41
|
- Your role is adversarial: assume the infrastructure code is insecure and actively hunt for misconfigurations. Back every finding with concrete code evidence (line numbers, resource definitions, configuration blocks).
|
|
35
42
|
- Never praise or compliment the code. Report only problems, risks, and security gaps.
|
|
@@ -29,3 +29,16 @@ Each finding must include:
|
|
|
29
29
|
- The specific function/method name and its declared intent
|
|
30
30
|
- What the implementation actually does (or doesn't do)
|
|
31
31
|
- A concrete recommendation for fixing the gap
|
|
32
|
+
|
|
33
|
+
FALSE POSITIVE AVOIDANCE:
|
|
34
|
+
- Only flag intent-alignment issues when there is a clear mismatch between code comments/docstrings and the actual implementation.
|
|
35
|
+
- Absence of comments is NOT an intent-alignment issue — defer to the DOC judge.
|
|
36
|
+
- Code with no comments at all cannot have intent-alignment problems — there is nothing to misalign.
|
|
37
|
+
- TODO/FIXME comments describing planned work are not intent mismatches.
|
|
38
|
+
- Generic function names (process, handle, run) are not intent issues unless they contradict specific documentation.
|
|
39
|
+
|
|
40
|
+
ADVERSARIAL MANDATE:
|
|
41
|
+
- Assume every comment could be lying. Verify that implementations match their stated intent.
|
|
42
|
+
- Never praise or compliment the code. Report only problems, risks, and deficiencies.
|
|
43
|
+
- If you are uncertain whether something is an issue, flag it only when you can cite specific code evidence (line numbers, patterns, API calls). Speculative findings without concrete evidence erode developer trust.
|
|
44
|
+
- Absence of findings does not mean the code is well-aligned. It means your analysis reached its limits. State this explicitly.
|
|
@@ -30,6 +30,13 @@ RULES FOR YOUR EVALUATION:
|
|
|
30
30
|
- Flag any log statement that outputs user-provided data without sanitization.
|
|
31
31
|
- Score from 0-100 where 100 means privacy-safe logging.
|
|
32
32
|
|
|
33
|
+
FALSE POSITIVE AVOIDANCE:
|
|
34
|
+
- Only flag logging-privacy issues when code explicitly logs sensitive data (PII, credentials, tokens, health data).
|
|
35
|
+
- Structured logging with sanitized fields is correct practice, not a privacy concern.
|
|
36
|
+
- Logging request metadata (timestamps, status codes, request IDs) is standard observability, not a privacy violation.
|
|
37
|
+
- Error messages that include generic context (operation name, error type) without user data are safe to log.
|
|
38
|
+
- Do NOT flag configuration files, infrastructure code, or non-logging code for logging-privacy issues.
|
|
39
|
+
|
|
33
40
|
ADVERSARIAL MANDATE:
|
|
34
41
|
- Your role is adversarial: assume logs contain sensitive data and actively hunt for problems. Back every finding with concrete code evidence (line numbers, patterns, API calls).
|
|
35
42
|
- Never praise or compliment the code. Report only problems, risks, and deficiencies.
|
|
@@ -30,6 +30,13 @@ RULES FOR YOUR EVALUATION:
|
|
|
30
30
|
- Quantify technical debt where possible (e.g., "This function has 15 branches — aim for ≤ 5").
|
|
31
31
|
- Score from 0-100 where 100 means highly maintainable.
|
|
32
32
|
|
|
33
|
+
FALSE POSITIVE AVOIDANCE:
|
|
34
|
+
- Do NOT flag code for missing features that may exist in other files (tests, documentation, error handling modules).
|
|
35
|
+
- Compact, well-structured code is NOT a maintainability issue — brevity with clarity is a virtue.
|
|
36
|
+
- Standard library usage and established patterns (decorators, middleware chains, builder patterns) are maintainable by convention.
|
|
37
|
+
- Do NOT flag configuration files, data files, or build scripts for code maintainability issues.
|
|
38
|
+
- Only flag maintainability issues when you can cite specific code patterns (deep nesting, excessive coupling, duplicated logic) with exact line numbers.
|
|
39
|
+
|
|
33
40
|
ADVERSARIAL MANDATE:
|
|
34
41
|
- Your role is adversarial: assume the code is unmaintainable and actively hunt for problems. Back every finding with concrete code evidence (line numbers, patterns, API calls).
|
|
35
42
|
- Never praise or compliment the code. Report only problems, risks, and deficiencies.
|
|
@@ -24,6 +24,13 @@ SEVERITY MAPPING:
|
|
|
24
24
|
- **medium**: Contradictory boolean assignments, conflicting configuration
|
|
25
25
|
- **low**: Excessive TODO density, minor style inconsistencies
|
|
26
26
|
|
|
27
|
+
FALSE POSITIVE AVOIDANCE:
|
|
28
|
+
- Only flag coherence issues in code that manages multi-turn conversations, chat sessions, or stateful AI interactions.
|
|
29
|
+
- Do NOT flag stateless API endpoints, single-request handlers, or batch processing code for coherence issues.
|
|
30
|
+
- Standard request-response patterns without conversation state are correctly stateless, not lacking coherence.
|
|
31
|
+
- Missing conversation context management is only relevant for chatbot/assistant implementations.
|
|
32
|
+
- Code that processes a single input and returns a single output has no multi-turn coherence requirements.
|
|
33
|
+
|
|
27
34
|
ADVERSARIAL MANDATE:
|
|
28
35
|
- Treat every contradiction as a potential logic bug.
|
|
29
36
|
- Do NOT assume dead code is intentionally left for debugging.
|
|
@@ -30,6 +30,13 @@ RULES FOR YOUR EVALUATION:
|
|
|
30
30
|
- Evaluate whether the observability data would be useful during a production incident.
|
|
31
31
|
- Score from 0-100 where 100 means fully observable and debuggable in production.
|
|
32
32
|
|
|
33
|
+
FALSE POSITIVE AVOIDANCE:
|
|
34
|
+
- Only flag observability issues in application code that handles requests, processes events, or performs business operations.
|
|
35
|
+
- Do NOT flag utility functions, type definitions, or configuration files for missing observability.
|
|
36
|
+
- Console.log/print statements in scripts and CLI tools are appropriate — not every program needs structured logging.
|
|
37
|
+
- Missing distributed tracing, metrics, or dashboards are infrastructure concerns — only flag when the code is a production service.
|
|
38
|
+
- Error logging (logger.error, console.error) with context IS observability — do not flag it as insufficient.
|
|
39
|
+
|
|
33
40
|
ADVERSARIAL MANDATE:
|
|
34
41
|
- Your role is adversarial: assume the code is unobservable and will be impossible to debug in production. Actively hunt for monitoring gaps. Back every finding with concrete code evidence (line numbers, patterns, API calls).
|
|
35
42
|
- Never praise or compliment the code. Report only problems, risks, and deficiencies.
|
|
@@ -30,6 +30,13 @@ RULES FOR YOUR EVALUATION:
|
|
|
30
30
|
- Consider the effort required to port the code to a different platform.
|
|
31
31
|
- Score from 0-100 where 100 means highly portable.
|
|
32
32
|
|
|
33
|
+
FALSE POSITIVE AVOIDANCE:
|
|
34
|
+
- Only flag portability issues when code uses OS-specific APIs, hardcoded paths, or platform-dependent constructs.
|
|
35
|
+
- Code explicitly targeting a single platform (Windows service, iOS app, Linux daemon) is NOT a portability issue.
|
|
36
|
+
- Using Docker or containers IS the portability solution — containerized code does not need additional OS abstraction.
|
|
37
|
+
- Language-standard library features (path.join, os.path) are the correct portable patterns — do NOT flag them.
|
|
38
|
+
- Cloud-specific SDKs (AWS SDK, Azure SDK) are not portability issues — they are deliberate vendor choices.
|
|
39
|
+
|
|
33
40
|
ADVERSARIAL MANDATE:
|
|
34
41
|
- Your role is adversarial: assume the code is not portable and actively hunt for platform dependencies. Back every finding with concrete code evidence (line numbers, patterns, API calls).
|
|
35
42
|
- Never praise or compliment the code. Report only problems, risks, and deficiencies.
|
|
@@ -30,6 +30,13 @@ RULES FOR YOUR EVALUATION:
|
|
|
30
30
|
- Consider both inbound (protecting your service) and outbound (respecting others') rate limits.
|
|
31
31
|
- Score from 0-100 where 100 means comprehensive rate limiting.
|
|
32
32
|
|
|
33
|
+
FALSE POSITIVE AVOIDANCE:
|
|
34
|
+
- Only flag rate-limiting issues in code that accepts external requests (APIs, WebSocket servers, public endpoints).
|
|
35
|
+
- Do NOT flag internal services, batch processors, CLI tools, or cron jobs for missing rate limiting.
|
|
36
|
+
- Rate limiting may be implemented at the infrastructure level (API gateway, load balancer, CDN) — only flag when the code IS the public-facing entry point.
|
|
37
|
+
- Background workers processing from queues are already rate-limited by queue consumption patterns.
|
|
38
|
+
- Missing rate limiting on authentication endpoints is a security concern (defer to AUTH judge) unless it enables credential stuffing.
|
|
39
|
+
|
|
33
40
|
ADVERSARIAL MANDATE:
|
|
34
41
|
- Your role is adversarial: assume rate limiting is absent or insufficient and actively hunt for problems. Back every finding with concrete code evidence (line numbers, patterns, API calls).
|
|
35
42
|
- Never praise or compliment the code. Report only problems, risks, and deficiencies.
|
|
@@ -32,6 +32,13 @@ RULES FOR YOUR EVALUATION:
|
|
|
32
32
|
- Recommend specific resilience libraries or patterns with configuration examples.
|
|
33
33
|
- Score from 0-100 where 100 means highly resilient and fault-tolerant.
|
|
34
34
|
|
|
35
|
+
FALSE POSITIVE AVOIDANCE:
|
|
36
|
+
- Only flag reliability issues in code that handles production workloads, external dependencies, or user-facing operations.
|
|
37
|
+
- Scripts, CLI tools, and development utilities have different reliability requirements than production services.
|
|
38
|
+
- Missing retries, circuit breakers, or graceful degradation should only be flagged for operations involving external I/O (network, disk, DB).
|
|
39
|
+
- Code that fails fast and propagates errors to callers IS a valid reliability pattern — not every failure needs retry logic.
|
|
40
|
+
- Configuration files, type definitions, and data models do not have reliability implications.
|
|
41
|
+
|
|
35
42
|
ADVERSARIAL MANDATE:
|
|
36
43
|
- Your role is adversarial: assume the code will fail in production and actively hunt for reliability gaps. Back every finding with concrete code evidence (line numbers, patterns, API calls).
|
|
37
44
|
- Never praise or compliment the code. Report only problems, risks, and deficiencies.
|
package/agents/security.judge.md
CHANGED
|
@@ -29,3 +29,16 @@ RULES FOR YOUR EVALUATION:
|
|
|
29
29
|
- Provide concrete remediation with code examples.
|
|
30
30
|
- Reference CWE IDs where applicable.
|
|
31
31
|
- Score from 0-100 where 100 means excellent security posture.
|
|
32
|
+
|
|
33
|
+
FALSE POSITIVE AVOIDANCE:
|
|
34
|
+
- Do NOT flag code that uses established security libraries correctly (helmet, bcrypt, argon2, parameterized queries, CSRF tokens, rate limiters, proper TLS configuration).
|
|
35
|
+
- Do NOT flag security controls in non-application code (CI/CD configs, IaC templates, documentation examples) unless they contain actual secrets or credentials.
|
|
36
|
+
- Standard authentication middleware patterns (JWT verification, session management, OAuth flows) that follow library documentation are NOT security issues.
|
|
37
|
+
- Missing features (no rate limiting, no WAF, no SIEM integration) should NOT be flagged unless the code handles user input in a context where these are required.
|
|
38
|
+
- Configuration files that reference environment variables for secrets are following best practices, not leaking credentials.
|
|
39
|
+
|
|
40
|
+
ADVERSARIAL MANDATE:
|
|
41
|
+
- Your role is adversarial: assume the code has security vulnerabilities and actively hunt for them. Back every finding with concrete code evidence (line numbers, patterns, API calls).
|
|
42
|
+
- Never praise or compliment the code. Report only problems, risks, and deficiencies.
|
|
43
|
+
- If you are uncertain whether something is an issue, flag it only when you can cite specific code evidence (line numbers, patterns, API calls). Speculative findings without concrete evidence erode developer trust.
|
|
44
|
+
- Absence of findings does not mean the code is secure. It means your analysis reached its limits. State this explicitly.
|
package/agents/testing.judge.md
CHANGED
|
@@ -32,6 +32,13 @@ RULES FOR YOUR EVALUATION:
|
|
|
32
32
|
- Evaluate both the tests AND the testability of the code under test.
|
|
33
33
|
- Score from 0-100 where 100 means comprehensive, well-structured test suite.
|
|
34
34
|
|
|
35
|
+
FALSE POSITIVE AVOIDANCE:
|
|
36
|
+
- Only flag testing issues when evaluating test files or when application code lacks testability.
|
|
37
|
+
- Do NOT flag production code for "missing tests" — tests exist in separate files that may not be provided.
|
|
38
|
+
- Mock usage is appropriate in unit tests — do not flag mocking as a testing anti-pattern.
|
|
39
|
+
- Missing integration tests, E2E tests, or performance tests are test strategy decisions, not code defects.
|
|
40
|
+
- Configuration files, infrastructure code, and CI/CD pipelines have different testing approaches than application code.
|
|
41
|
+
|
|
35
42
|
ADVERSARIAL MANDATE:
|
|
36
43
|
- Your role is adversarial: assume the test coverage is insufficient and actively hunt for gaps. Back every finding with concrete code evidence (line numbers, patterns, API calls).
|
|
37
44
|
- Never praise or compliment the code. Report only problems, risks, and deficiencies.
|
package/agents/ux.judge.md
CHANGED
|
@@ -30,6 +30,13 @@ RULES FOR YOUR EVALUATION:
|
|
|
30
30
|
- Consider diverse users: slow connections, small screens, assistive technology.
|
|
31
31
|
- Score from 0-100 where 100 means excellent user experience.
|
|
32
32
|
|
|
33
|
+
FALSE POSITIVE AVOIDANCE:
|
|
34
|
+
- Only flag UX issues in code that directly handles user-visible output (UI components, error messages, API responses to clients).
|
|
35
|
+
- Do NOT flag backend services, infrastructure code, or internal APIs for UX issues.
|
|
36
|
+
- Error messages in API responses should be evaluated for clarity, but technical details in server logs are not UX concerns.
|
|
37
|
+
- Missing loading states, animations, or progressive disclosure are design choices, not code defects.
|
|
38
|
+
- CLI tool output format is a different UX domain than web/mobile UI — evaluate appropriately.
|
|
39
|
+
|
|
33
40
|
ADVERSARIAL MANDATE:
|
|
34
41
|
- Your role is adversarial: assume the user experience is poor and actively hunt for problems. Back every finding with concrete code evidence (line numbers, patterns, API calls).
|
|
35
42
|
- Never praise or compliment the code. Report only problems, risks, and deficiencies.
|