@laitszkin/apollo-toolkit 3.5.0 → 3.6.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/AGENTS.md CHANGED
@@ -52,6 +52,7 @@ This repository enables users to install and run a curated set of reusable agent
52
52
  - Users can record multi-account spending and balance changes in monthly Excel ledgers with summary analytics and charts.
53
53
  - Users can recover missing or archived `docs/plans/...` spec sets from issue context, git history, and repository evidence before continuing feature work.
54
54
  - Users can review the current git change set from an unbiased reviewer perspective to find abstraction opportunities and simplification candidates.
55
+ - Users can review recent or user-specified spec-backed changes against the governing planning documents, treating unmet business goals as the most severe findings before secondary edge-case, security, and code-review checks.
55
56
  - Users can process GitHub pull request review comments and resolve addressed threads.
56
57
  - Users can perform repository-wide code reviews and publish confirmed findings as GitHub issues.
57
58
  - Users can schedule a bounded project runtime window, stop it automatically, and analyze module health from captured logs.
package/CHANGELOG.md CHANGED
@@ -7,6 +7,14 @@ All notable changes to this repository are documented in this file.
7
7
  ### Added
8
8
  - (None yet)
9
9
 
10
+ ## [v3.6.0] - 2026-04-28
11
+
12
+ ### Added
13
+ - Add `review-spec-related-changes`, a spec-compliance review skill that checks recent or named planning documents against implementation evidence and treats unmet business goals as the most severe findings before secondary edge-case, security, and code-review checks.
14
+
15
+ ### Changed
16
+ - Remove the post-merge code-review gate from `merge-changes-from-local-branches` so spec-related review now lives in the dedicated `review-spec-related-changes` skill.
17
+
10
18
  ## [v3.5.0] - 2026-04-28
11
19
 
12
20
  ### Added
package/README.md CHANGED
@@ -45,6 +45,7 @@ A curated skill catalog for Codex, OpenClaw, Trae, Agents, and Claude Code with
45
45
  - resolve-review-comments
46
46
  - review-change-set
47
47
  - review-codebases
48
+ - review-spec-related-changes
48
49
  - scheduled-runtime-health-check
49
50
  - shadow-api-model-research
50
51
  - solana-development
@@ -202,6 +203,7 @@ Compatibility note:
202
203
  - `recover-missing-plan` is a local skill used by `enhance-existing-features` and `ship-github-issue-fix` when a referenced `docs/plans/...` spec set is missing or archived.
203
204
  - `maintain-skill-catalog` can conditionally use `find-skills`, but its install source is not verified in this repository, so it is intentionally omitted from the table.
204
205
  - `read-github-issue` uses GitHub CLI (`gh`) directly for remote issue discovery and inspection, so it does not add any extra skill dependency.
206
+ - `review-spec-related-changes` is a local skill that depends on `review-change-set`, `discover-edge-cases`, and `harden-app-security` for secondary code-practice checks after business-goal completion is reviewed against the governing specs.
205
207
 
206
208
  ## Release publishing
207
209
 
@@ -5,21 +5,18 @@ description: >-
5
5
  into the current local branch. When conflicts arise, auto-resolve them by
6
6
  keeping correct functionality (preferring the more recent change on the same
7
7
  line, or the change that preserves working behavior). After merge verification,
8
- require `review-change-set` to review the merged code and confirm it still
9
- matches the active spec documents before any submission workflow continues.
10
- Run `archive-specs` only after that review gate passes so completed plan sets
11
- are archived and durable project docs are synchronized, then hand the current
12
- branch state to `commit-and-push` so the final submit workflow commits and
13
- pushes on that same local branch. Use when the user asks to consolidate local
14
- branch work, merge named branches into the current branch, or prepare the
15
- current branch for integration.
8
+ run `archive-specs` so completed plan sets are archived and durable project
9
+ docs are synchronized, then hand the current branch state to `commit-and-push`
10
+ so the final submit workflow commits and pushes on that same local branch.
11
+ Use when the user asks to consolidate local branch work, merge named branches
12
+ into the current branch, or prepare the current branch for integration.
16
13
  ---
17
14
 
18
15
  # Merge Changes from Local Branches
19
16
 
20
17
  ## Dependencies
21
18
 
22
- - Required: `review-change-set` to review the merged code and confirm spec alignment before submission, `archive-specs` to archive completed plan sets and synchronize durable project docs after the review gate passes, and `commit-and-push` for the final current-branch submission flow.
19
+ - Required: `archive-specs` to archive completed plan sets and synchronize durable project docs after merge verification, and `commit-and-push` for the final current-branch submission flow.
23
20
  - Conditional: none.
24
21
  - Optional: none.
25
22
  - Fallback: If git operations fail, stop and report the error.
@@ -27,7 +24,7 @@ description: >-
27
24
  ## Standards
28
25
 
29
26
  - Evidence: Inspect the original current branch, local branches, branch-name matches provided by the user or active spec names, actual conflicting files, and any active batch-spec `coordination.md` merge-order guidance before deciding what to merge.
30
- - Execution: Merge only the relevant named branches back into the original current branch, read any active batch-spec `coordination.md` and honor its documented merge order when present, resolve conflicts by reading both sides and editing the merged result to preserve shipped behavior, verify the merged state, run `review-change-set` to confirm the merged code still matches the active spec documents, delete each successfully merged source branch and its detached worktree only after the merged result is confirmed, run `archive-specs` only after the review gate passes so completed plan sets are archived and durable docs are synchronized, then hand the final current-branch state to `commit-and-push` so changelog/readiness/commit/push work happens through the shared submission workflow on the same branch.
27
+ - Execution: Merge only the relevant named branches back into the original current branch, read any active batch-spec `coordination.md` and honor its documented merge order when present, resolve conflicts by reading both sides and editing the merged result to preserve shipped behavior, verify the merged state, delete each successfully merged source branch and its detached worktree only after the merged result is confirmed, run `archive-specs` after merge verification so completed plan sets are archived and durable docs are synchronized, then hand the final current-branch state to `commit-and-push` so changelog/readiness/commit/push work happens through the shared submission workflow on the same branch.
31
28
  - Quality: Never use blanket timestamp rules or default `-X ours/theirs` conflict resolution as the primary merge strategy, never infer in-scope branches from ancestry heuristics when branch names already define the target set, and do not declare success until the final current-branch state has been checked, verified, and cleared for post-merge archival/doc-sync work.
32
29
  - Output: Produce a clean current branch with all relevant named-branch changes integrated and ready for the shared submit workflow.
33
30
 
@@ -118,16 +115,9 @@ For each in-scope named branch:
118
115
  ```
119
116
  - If verification fails, fix the merged state on the current branch before proceeding.
120
117
 
121
- ### 4.5) Review the merged change set before submission
122
-
123
- - After merge verification passes, invoke `review-change-set` on the merged current branch.
124
- - Compare the merged code against the active spec documents and any relevant `docs/plans/` artifacts that governed the merge.
125
- - Do not proceed to archival or submission until the review returns no actionable findings and the merged state is confirmed to match the spec documents.
126
- - If review finds a problem or spec mismatch, fix the current branch, rerun verification, and review again before continuing.
127
-
128
118
  ### 5) Archive completed specs and sync durable project docs
129
119
 
130
- - After all in-scope merges succeed, the current-branch state has been verified, and `review-change-set` has confirmed the merged code matches the spec documents, invoke `archive-specs`.
120
+ - After all in-scope merges succeed and the current-branch state has been verified, invoke `archive-specs`.
131
121
  - Let `archive-specs` convert and archive any completed `docs/plans/...` spec sets that now reflect the delivered outcome.
132
122
  - Let `archive-specs` synchronize durable project docs and `AGENTS.md` when the merged result changed operator workflows, repository guidance, or user-visible behavior.
133
123
  - Do not proceed to the final submission commit while required archival or documentation updates remain unfinished.
@@ -150,7 +140,7 @@ For each in-scope named branch:
150
140
  - the currently checked-out branch
151
141
  - branches that were skipped, failed to merge, or still need manual follow-up
152
142
  - If `git branch -d` refuses deletion because the branch is not actually merged, stop and report the branch instead of forcing deletion with `-D`.
153
- - Once merge verification, `review-change-set`, and archival/doc synchronization pass, invoke `commit-and-push` for the original current branch so the final submission flow owns:
143
+ - Once merge verification and archival/doc synchronization pass, invoke `commit-and-push` for the original current branch so the final submission flow owns:
154
144
  - `CHANGELOG.md` readiness
155
145
  - the final commit creation on the original current branch
156
146
  - the user-requested push on that same branch
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@laitszkin/apollo-toolkit",
3
- "version": "3.5.0",
3
+ "version": "3.6.0",
4
4
  "description": "Apollo Toolkit npm installer for managed skill copying across Codex, OpenClaw, and Trae.",
5
5
  "license": "MIT",
6
6
  "author": "LaiTszKin",
@@ -0,0 +1,21 @@
1
+ MIT License
2
+
3
+ Copyright (c) 2026 LaiTszKin
4
+
5
+ Permission is hereby granted, free of charge, to any person obtaining a copy
6
+ of this software and associated documentation files (the "Software"), to deal
7
+ in the Software without restriction, including without limitation the rights
8
+ to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
9
+ copies of the Software, and to permit persons to whom the Software is
10
+ furnished to do so, subject to the following conditions:
11
+
12
+ The above copyright notice and this permission notice shall be included in all
13
+ copies or substantial portions of the Software.
14
+
15
+ THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
16
+ IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
17
+ FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
18
+ AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
19
+ LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
20
+ OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
21
+ SOFTWARE.
@@ -0,0 +1,53 @@
1
+ # review-spec-related-changes
2
+
3
+ `review-spec-related-changes` reviews implementation changes against recent or user-specified planning documents.
4
+
5
+ ## What this skill does
6
+
7
+ This skill:
8
+
9
+ 1. Resolves the governing `docs/plans/...` spec scope from user input or recent repository changes.
10
+ 2. Checks whether each business goal and acceptance criterion is actually implemented.
11
+ 3. Treats unmet business goals as the most severe review findings.
12
+ 4. Runs secondary code-practice review through `review-change-set`, `discover-edge-cases`, and `harden-app-security` for code-affecting scopes.
13
+ 5. Reports business-goal gaps separately from edge-case, security, and maintainability findings.
14
+
15
+ ## When to use
16
+
17
+ Use this skill when the task asks you to:
18
+
19
+ - review whether recent spec-backed implementation work is complete,
20
+ - compare current changes against a named spec directory,
21
+ - check whether delivered code satisfies `spec.md`, `tasks.md`, `checklist.md`, `contract.md`, or `design.md`,
22
+ - perform a final spec-compliance review before archive, submission, PR, or release work.
23
+
24
+ ## Core principles
25
+
26
+ - Business-goal completion is reviewed first.
27
+ - Missing required behavior is more severe than ordinary code-practice issues.
28
+ - Secondary edge-case, security, and code-review findings remain clearly separated.
29
+ - Findings must cite concrete spec and code evidence.
30
+
31
+ ## Example
32
+
33
+ Prompt example:
34
+
35
+ ```text
36
+ Use $review-spec-related-changes to review the changes related to docs/plans/2026-04-28/order-routing.
37
+ List any business goals that were not fully achieved, then run edge-case, security, and code-review checks on the related code.
38
+ ```
39
+
40
+ Expected behavior:
41
+
42
+ - the named spec set is read before judging the code,
43
+ - business-goal gaps are listed first and treated as highest severity,
44
+ - secondary review skills are invoked for the same implementation scope,
45
+ - the final report separates spec-compliance findings from edge-case, security, and code-review findings.
46
+
47
+ ## References
48
+
49
+ - [`SKILL.md`](./SKILL.md) - full workflow and execution rules.
50
+
51
+ ## License
52
+
53
+ MIT
@@ -0,0 +1,110 @@
1
+ ---
2
+ name: review-spec-related-changes
3
+ description: Review recent or user-specified spec-related changes against the governing `docs/plans/...` spec documents, treat unmet business goals as the most severe findings, and then run code-practice cross-checks through `review-change-set`, `discover-edge-cases`, and `harden-app-security`. Use when users ask whether implemented work actually satisfies a spec, wants a spec compliance review, or asks to review changes related to recent or named planning documents.
4
+ ---
5
+
6
+ # Review Spec Related Changes
7
+
8
+ ## Dependencies
9
+
10
+ - Required: `review-change-set`, `discover-edge-cases`, and `harden-app-security` for code-affecting spec-related changes.
11
+ - Conditional: none.
12
+ - Optional: none.
13
+ - Fallback: If any required review dependency is unavailable for a code-affecting scope, stop and report the missing dependency instead of returning a partial pass.
14
+
15
+ ## Standards
16
+
17
+ - Evidence: Read the governing spec documents, the related git changes, and the minimum implementation context before deciding whether the business goal was met.
18
+ - Execution: Resolve the spec scope first, review business-goal completion before any secondary code-practice review, then run the required review skills on the same implementation scope.
19
+ - Quality: Treat unmet or partially met business goals as the highest-severity findings, keep secondary edge-case/security/code-review findings outside the business-goal verdict, and avoid speculative issues that are not backed by code or spec evidence.
20
+ - Output: Return a prioritized issue list with business-goal gaps first, followed by edge-case, security, and code-review findings, each tied to specific spec and code evidence.
21
+
22
+ ## Goal
23
+
24
+ Determine whether the implementation actually satisfies the relevant planning documents, then separately assess whether the related code is safe, robust, and maintainable.
25
+
26
+ ## Scope Resolution
27
+
28
+ ### User-specified spec documents
29
+
30
+ - If the user names a spec directory or file, read every governing document in that spec set, including `spec.md`, `tasks.md`, `checklist.md`, `contract.md`, `design.md`, and batch-level `coordination.md` when present.
31
+ - Treat the named spec documents as the authoritative business goal unless the repository contains a newer superseding plan that the user explicitly referenced.
32
+ - Map the spec to implementation changes using task entries, owned files, git diff paths, branch names, commit messages, and code references from the spec.
33
+
34
+ ### Recent spec-related changes
35
+
36
+ - If the user asks for recent spec-related review without naming a spec, inspect the current git state first:
37
+ ```bash
38
+ git status -sb
39
+ git diff --name-only
40
+ git diff --cached --name-only
41
+ ```
42
+ - Look for changed or recently touched planning documents under `docs/plans/`, `docs/archive/plans/`, or the repository's documented planning location.
43
+ - If no planning document changed, inspect recent commits and active plan directories to identify the most recent spec set that plausibly governs the current implementation.
44
+ - If multiple candidate spec sets remain plausible and cannot be separated by changed files or branch names, stop and report the ambiguity instead of guessing.
45
+
46
+ ## Workflow
47
+
48
+ ### 1) Build the spec baseline
49
+
50
+ - Read the governing spec documents end-to-end.
51
+ - Extract the concrete business goals, acceptance criteria, non-goals, deferred work, and explicit verification requirements.
52
+ - Build a compact checklist of claims that can be proven or disproven from code, tests, docs, or command output.
53
+ - Keep business goals separate from implementation-quality expectations. A clean implementation does not compensate for an unmet business requirement.
54
+
55
+ ### 2) Map implementation evidence
56
+
57
+ - Read the related diff, staged changes, commits, or changed files that correspond to the spec scope.
58
+ - Follow the minimum dependency chain needed to understand whether the behavior is actually implemented.
59
+ - Run or inspect the verification commands named by the spec when they are available and safe to run.
60
+ - Mark each business goal as:
61
+ - `Met`: direct implementation and verification evidence exists.
62
+ - `Partially met`: some required behavior exists, but an acceptance criterion, integration path, or verification proof is missing.
63
+ - `Not met`: implementation evidence is absent or contradicts the spec.
64
+ - `Deferred/N/A`: the spec explicitly excludes or defers the item.
65
+
66
+ ### 3) Review business-goal completion first
67
+
68
+ - Report every `Not met` and `Partially met` business goal before secondary review findings.
69
+ - Assign the highest severity to business-goal failures because they mean the delivered change does not satisfy the requested work.
70
+ - Include exact spec evidence and code evidence for each gap.
71
+ - Do not continue into archival, submission, or release recommendations while business-goal failures remain unresolved.
72
+
73
+ ### 4) Run secondary code-practice reviews
74
+
75
+ After the business-goal pass is complete, invoke the required review skills on the same code-affecting scope:
76
+
77
+ - Use `review-change-set` to identify architecture, abstraction, and simplification findings in the related diff.
78
+ - Use `discover-edge-cases` to identify reproducible boundary, failure-path, state, and observability risks.
79
+ - Use `harden-app-security` to identify reproducible vulnerabilities and adversarial trust-boundary failures.
80
+
81
+ Keep these findings separate from the business-goal verdict unless the issue also prevents a required acceptance criterion from being satisfied.
82
+
83
+ ### 5) Produce the final review
84
+
85
+ Return findings in this order:
86
+
87
+ 1. Business-goal failures
88
+ - Severity: always highest for unmet or partially met required goals.
89
+ - Include spec evidence, implementation evidence, and the missing acceptance criterion.
90
+ 2. Edge-case findings
91
+ - Include reproduction or concrete trigger evidence.
92
+ 3. Security findings
93
+ - Include exploit path, protected asset, and reproducibility evidence.
94
+ 4. Code-review findings
95
+ - Include architecture, abstraction, simplification, or maintainability evidence.
96
+ 5. Passing evidence
97
+ - Summarize the business goals that were confirmed met.
98
+ 6. Residual uncertainty
99
+ - List unverified checks, commands not run, ambiguous spec mappings, or external dependencies that could not be proven.
100
+
101
+ If no actionable issue is found, state that no business-goal, edge-case, security, or code-review findings were identified, and still list the spec documents and verification evidence reviewed.
102
+
103
+ ## Working Rules
104
+
105
+ - Do not edit code, tests, or specs during this review.
106
+ - Do not archive specs, commit, push, tag, or release from this skill.
107
+ - Do not let secondary code quality findings bury business-goal failures.
108
+ - Do not treat checked tasks as proof by themselves; verify the implementation.
109
+ - Do not infer success from author intent, branch names, or prior conversation context unless the repository evidence supports it.
110
+ - Prefer fewer confirmed findings over broad speculative feedback.
@@ -0,0 +1,4 @@
1
+ interface:
2
+ display_name: "Review Spec Related Changes"
3
+ short_description: "Review spec-backed changes for business-goal completion and secondary code-practice risks"
4
+ default_prompt: "Use $review-spec-related-changes to resolve the recent or user-specified spec documents, verify each business goal and acceptance criterion against the related implementation evidence, treat unmet business goals as the most severe findings, and then run $review-change-set, $discover-edge-cases, and $harden-app-security on the same code-affecting scope for secondary code-practice review."