@laitszkin/apollo-toolkit 3.9.0 → 3.9.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (54) hide show
  1. package/CHANGELOG.md +12 -0
  2. package/README.md +2 -2
  3. package/analyse-app-logs/scripts/__pycache__/filter_logs_by_time.cpython-312.pyc +0 -0
  4. package/analyse-app-logs/scripts/__pycache__/log_cli_utils.cpython-312.pyc +0 -0
  5. package/analyse-app-logs/scripts/__pycache__/search_logs.cpython-312.pyc +0 -0
  6. package/commit-and-push/README.md +1 -1
  7. package/commit-and-push/SKILL.md +9 -8
  8. package/commit-and-push/agents/openai.yaml +1 -1
  9. package/develop-new-features/SKILL.md +2 -2
  10. package/discover-edge-cases/README.md +2 -2
  11. package/discover-edge-cases/SKILL.md +61 -90
  12. package/discover-edge-cases/agents/openai.yaml +2 -2
  13. package/{harden-app-security → discover-security-issues}/CHANGELOG.md +5 -0
  14. package/discover-security-issues/README.md +35 -0
  15. package/discover-security-issues/SKILL.md +88 -0
  16. package/discover-security-issues/agents/openai.yaml +4 -0
  17. package/docs-to-voice/scripts/__pycache__/docs_to_voice.cpython-312.pyc +0 -0
  18. package/enhance-existing-features/SKILL.md +2 -2
  19. package/generate-spec/scripts/__pycache__/create-specscpython-312.pyc +0 -0
  20. package/implement-specs/SKILL.md +9 -8
  21. package/implement-specs-with-subagents/SKILL.md +9 -6
  22. package/implement-specs-with-worktree/SKILL.md +4 -4
  23. package/katex/scripts/__pycache__/render_katex.cpython-312.pyc +0 -0
  24. package/merge-conflict-resolver/SKILL.md +3 -3
  25. package/open-github-issue/scripts/__pycache__/open_github_issue.cpython-312.pyc +0 -0
  26. package/open-source-pr-workflow/SKILL.md +12 -7
  27. package/package.json +1 -1
  28. package/read-github-issue/scripts/__pycache__/find_issues.cpython-312.pyc +0 -0
  29. package/read-github-issue/scripts/__pycache__/read_issue.cpython-312.pyc +0 -0
  30. package/resolve-review-comments/SKILL.md +14 -8
  31. package/resolve-review-comments/scripts/__pycache__/review_threads.cpython-312.pyc +0 -0
  32. package/review-change-set/README.md +3 -3
  33. package/review-change-set/SKILL.md +50 -65
  34. package/review-change-set/agents/openai.yaml +2 -2
  35. package/review-spec-related-changes/README.md +1 -1
  36. package/review-spec-related-changes/SKILL.md +4 -4
  37. package/review-spec-related-changes/agents/openai.yaml +1 -1
  38. package/solve-issues-found-during-review/README.md +1 -1
  39. package/solve-issues-found-during-review/SKILL.md +3 -3
  40. package/text-to-short-video/scripts/__pycache__/enforce_video_aspect_ratio.cpython-312.pyc +0 -0
  41. package/version-release/README.md +1 -1
  42. package/version-release/SKILL.md +2 -2
  43. package/version-release/agents/openai.yaml +1 -1
  44. package/harden-app-security/README.md +0 -46
  45. package/harden-app-security/SKILL.md +0 -127
  46. package/harden-app-security/agents/openai.yaml +0 -4
  47. /package/{harden-app-security → discover-security-issues}/LICENSE +0 -0
  48. /package/{harden-app-security → discover-security-issues}/references/agent-attack-catalog.md +0 -0
  49. /package/{harden-app-security → discover-security-issues}/references/common-software-attack-catalog.md +0 -0
  50. /package/{harden-app-security → discover-security-issues}/references/red-team-extreme-scenarios.md +0 -0
  51. /package/{harden-app-security → discover-security-issues}/references/risk-checklist.md +0 -0
  52. /package/{harden-app-security → discover-security-issues}/references/security-test-patterns-agent.md +0 -0
  53. /package/{harden-app-security → discover-security-issues}/references/security-test-patterns-finance.md +0 -0
  54. /package/{harden-app-security → discover-security-issues}/references/test-snippets.md +0 -0
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  name: implement-specs-with-subagents
3
3
  description: >-
4
- Coordinator-only workflow for multispec batches: ingest `coordination.md`/`preparation.md`, run prerequisite work yourself, derive topological phases, launch ≤4 staggered **`implement-specs-with-worktree`** workers (one `{change}` each), **`merge-changes-from-local-branches`** after every phase succeeds, ledger every branch/test/merge—not for solo specs unless user explicitly insists on delegation overload.
4
+ Coordinator-only workflow for multispec batches: ingest `coordination.md`/`preparation.md`, run prerequisite work yourself, derive topological phases, launch ≤4 staggered **`implement-specs-with-worktree`** workers (one `{change}` each), **`merge-changes-from-local-branches`** after every phase succeeds, ledger every branch/test/merge—not for solo specs unless user explicitly insists on delegation overload. **Multi-phase: do not declare done until every non-blocked spec is merged across all phases** (or pipeline stopped on explicit blocker).
5
5
  Wrong tool for one directory without parallel mandate—pick **`implement-specs-with-worktree`** / **`implement-specs`** depending on isolation. Publication/versioning stays outside this orchestration layer unless another skill attaches.
6
6
  Ledger sample: `oauth-scope | phase=1 | merged | npm test ✅`. Burst-launching four agents simultaneously—disallowed pacing required…
7
7
  ---
@@ -10,7 +10,7 @@ description: >-
10
10
 
11
11
  ## Dependencies
12
12
 
13
- - Required: `implement-specs-with-worktree` (every implementation subagent **MUST** follow this skill for its assigned directory); `merge-changes-from-local-branches` (phase integration **MUST NOT** skip this between phases).
13
+ - Required: `implement-specs-with-worktree` (every implementation subagent **MUST** follow this skill for its assigned directory); `merge-changes-from-local-branches` (phase integration **MUST NOT** skip this between phases); **`commit-and-push`** (integration-branch **preparation** commits and **any** post-merge submission the user expects on that branch—**MUST NOT** bypass for bare `git commit` / ungated push when this skill owns the branch).
14
14
  - Conditional: `generate-spec` if the batch is not implementation-ready; `review-change-set` only when the user asks for post-merge review.
15
15
  - Fallback: If independent subagents cannot run, **MUST** report that limitation. Serial `implement-specs-with-worktree` across specs is allowed **only** after the user explicitly approves that fallback.
16
16
 
@@ -19,18 +19,19 @@ description: >-
19
19
  - **MUST NOT** delegate until `coordination.md`, when present, explicitly allows parallel implementation—or when absent, until you have verified no contradiction to parallel work.
20
20
  - **MUST** enumerate exact in-scope spec directories **before** any subagent starts; **MUST NOT** delegate archived, sibling, or “nearest guess” directories unless the user explicitly includes them.
21
21
  - **MUST** verify each delegated directory contains `spec.md`, `tasks.md`, `checklist.md`, `contract.md`, and `design.md` before launch.
22
- - **MUST** complete, verify, and **commit** documented shared preparation on the integration branch **before** any implementation subagent starts when `preparation.md` exists or specs mandate pre-work; the coordinating agent **MUST NOT** delegate that preparation. Subagents **MUST NOT** start until this branch is clean at the preparation commit (or there is no required preparation).
22
+ - **MUST** complete, verify, and **finalize** documented shared preparation on the integration branch **through `commit-and-push`** before any implementation subagent starts when `preparation.md` exists or specs mandate pre-work; the coordinating agent **MUST NOT** delegate that preparation. Subagents **MUST NOT** start until this branch is clean at the preparation commit (or there is no required preparation).
23
23
  - **MUST** build a directed dependency graph from `coordination.md` plus each spec’s `spec.md` / `design.md` (edges: *provider spec must merge before consumer spec*). **MUST** partition specs into phases by topological **layers**: Phase 1 = specs with **no** in-batch prerequisites; for *k* ≥ 2, Phase *k* = specs whose in-batch prerequisites all appear in phases before *k*. **MUST NOT** start phase *k* until phase *k − 1* is fully merged into the integration branch (or you have an explicit user override). If the graph has a cycle, **MUST** stop and report it.
24
24
  - **MUST** assign **exactly one** spec directory per implementation subagent; **MUST NOT** assign multiple directories to one implementation subagent.
25
25
  - **MUST** cap **active** implementation subagents at **four**; **MUST** start them **one at a time** with confirmation each is running before the next start; **MUST** back off on rate limits (no burst launches). Four is a ceiling, not a quota.
26
26
  - **MUST** give each subagent only task-local context (repo root, exact spec path, `coordination.md` path if relevant, instruction to run `implement-specs-with-worktree`, baseline commit when preparation exists, requirement to read the full bundle before edits, worktree isolation, tests, backfill, local commit, and reporting branch/worktree/commit/tests/blockers). **MUST NOT** leak unrelated reasoning or other subagents’ private diffs unless resolving a concrete conflict.
27
27
  - After each phase: **MUST** merge every **completed** spec branch from that phase into the integration branch via `merge-changes-from-local-branches` before starting the next phase; **MUST** resolve conflicts using spec contracts as the correctness tie-breaker; **MUST** record merge result in the ledger; if merge is blocked, **MUST** stop the pipeline and report.
28
+ - **Multi-phase completion**: When the planned ledger has **more than one** phase, **MUST** loop steps **5→6→7** until **every** in-scope spec is either **`merged`** on the integration branch or explicitly **`blocked`** with a documented stop (user abort, irresolvable conflict, failed dependency, etc.). **MUST NOT** yield, summarize as “phase complete”, or imply the batch is finished while **any** phase still has a successful, unmerged branch or **`pending`** / **`in_progress`** rows for specs that should run—unless the coordinating agent is halted by a preceding Non-negotiable blocker **and** that halt is stated plainly.
28
29
  - Model: If the user names a model, **MUST** use it for implementation subagents when the platform allows; if not supported, **MUST** state that fact and continue only if the default is acceptable to the user’s intent.
29
30
 
30
31
  ## Standards (summary)
31
32
 
32
33
  - **Evidence**: Batch read (`coordination.md`, `preparation.md`, every in-scope `spec.md` / `design.md`) before scheduling; ledger stays live.
33
- - **Execution**: Preparation → dependency graph → phased delegation with merge gates; never skip merges between dependent phases.
34
+ - **Execution**: Preparation → dependency graph → **repeat** (run phase *k* → merge phase *k*) until all phases reconciled on the integration branch; never skip merges between dependent phases; **multi-phase ⇒ no early “done” narrative** until ledger proves full merge-set (or documented blockers).
34
35
  - **Quality**: No duplicate delegation; subagents base on the branch that already contains preparation (and prior phases); pause on shared file collisions, batch-wide defects, or rate-limit pressure.
35
36
  - **Output**: Concise ledger: per spec → phase, depends-on, subagent id/label, branch/worktree, commit or blocker, tests, merge status.
36
37
 
@@ -42,7 +43,7 @@ description: >-
42
43
  - **Pause →** Can I quote **verbatim** why each enumerated directory is in scope—not “probably related”?
43
44
  - **Pause →** What **exact sentence** from `coordination.md` gates parallel readiness, if any—or what absence did I infer from—and is that justified?
44
45
 
45
- 2. **Preparation (blocking when required)** — Coordinating agent executes shared prep only: read tasks/outputs/verification hooks, satisfy scope, run listed checks, **commit** on the integration branch, record prep commit hash in ledger, leave working tree clean. If prep fails, **stop** (no subagents).
46
+ 2. **Preparation (blocking when required)** — Coordinating agent executes shared prep only: read tasks/outputs/verification hooks, satisfy scope, run listed checks, **finalize on the integration branch through `commit-and-push`** (push only if the user requested remote update), record prep commit hash in ledger, leave working tree clean. If prep fails, **stop** (no subagents).
46
47
  - **Pause →** Am I silently delegating preparation to a **subagent** when the coordinating agent owns it—is that happening?
47
48
  - **Pause →** What **commit hash** and **clean-tree** confirmation will subagents inherit as baseline?
48
49
 
@@ -62,8 +63,10 @@ description: >-
62
63
  - **Pause →** Has **every** successful branch in this phase been merged into the **same** integration branch I will use to **start** phase *k+1*?
63
64
  - **Pause →** If a merge conflict touches a **contract** field, which spec’s `contract.md` / `design.md` is the tie-breaker I will apply?
64
65
 
65
- 7. **Repeat** — Next phase starts only on the merged integration branch that includes all required predecessors.
66
+ 7. **Repeat until batch reconciled** — After step 6, if **any** later phase still has specs not yet run or not yet merged: **MUST** increment *k* and **return to step 5** on the **same** integration branch (now including phase *k* merges). Next phase starts only on that branch. **MUST NOT** end the coordinator run with a “wrapped up” message if the ledger still shows remaining phases or unmerged successful work. **Only** when every in-scope spec is **`merged`** or explicitly **`blocked`** may you treat implementation coordination as **complete** (then optional handoff to submit/review skills per user).
67
+ - **Pause →** How many phases remain after this merge—is the count **zero**? If not, **immediately** plan step 5 for *k+1*.
66
68
  - **Pause →** Before launching phase *k+1*, can I **name** the merge commit or branch state that contains **all** prerequisites for every spec in that phase?
69
+ - **Pause →** Can I cite **ledger lines** proving **merged** for every non-blocked spec in **every** phase?
67
70
 
68
71
  ## Out of scope
69
72
 
@@ -10,7 +10,7 @@ description: >-
10
10
 
11
11
  ## Dependencies
12
12
 
13
- - Required: `implement-specs` for the shared discovery / implementation / backfill / commit / reporting lifecycle; `enhance-existing-features` and `develop-new-features` for implementation standards.
13
+ - Required: `implement-specs` for the shared discovery / implementation / backfill / **submit** / reporting lifecycle; **`commit-and-push`** for the **final** implementation commit (and push when the user explicitly requests remote update); `enhance-existing-features` and `develop-new-features` for implementation standards.
14
14
  - Conditional: `generate-spec` if spec files need clarification or updates.
15
15
  - Fallback: If any required dependency skill is unavailable, **MUST** stop and report it.
16
16
 
@@ -24,7 +24,7 @@ description: >-
24
24
  - **MUST** use `git show-ref` and `git worktree list --porcelain` (not shell guesses) when checking whether a branch or worktree already exists; if creation fails ambiguously, **MUST** re-query those commands before retrying.
25
25
  - When `preparation.md` exists: **MUST** treat it as an already-committed shared baseline for parallel work; **MUST NOT** redo its tasks inside the member spec unless the preparation commit is missing or the document states the prerequisite is still blocked. If baseline assumptions break, **MUST** update `preparation.md` or stop for coordination—**MUST NOT** silently move prerequisite work into the member spec.
26
26
  - **MUST** complete the same quality bar as `implement-specs`: all in-scope tasks, relevant tests, honest backfill, no sibling-spec scope creep, revert formatter-only noise outside owned files before commit.
27
- - **MUST NOT** `git push` unless the user explicitly asks.
27
+ - **MUST NOT** `git push` **outside** **`commit-and-push`** unless the user explicitly requests remote update through that workflow (or a release/PR skill the user named).
28
28
  - For targeted Rust tests: **MUST** pass at most one positional `cargo test` filter per invocation; use separate commands or a broader confirmed filter when multiple selectors are needed.
29
29
 
30
30
  ## Standards (summary)
@@ -59,7 +59,7 @@ description: >-
59
59
 
60
60
  ### C) Implement, backfill, commit, report
61
61
 
62
- - Execute **`implement-specs` Workflow steps 3–6** (implement, backfill, commit, report) **entirely from the worktree root**, applying `enhance-existing-features` / `develop-new-features` standards.
62
+ - Execute **`implement-specs` Workflow steps 3–6** (implement, backfill, **submit via `commit-and-push`**, report) **entirely from the worktree root**, applying `enhance-existing-features` / `develop-new-features` standards.
63
63
  - In the report, **MUST** include branch name, worktree path, commit hash, tests run, backfilled docs, and an explicit statement that the parent checkout was not modified for implementation files.
64
64
  - **Pause →** Am I honoring **implement-specs** step 3–6 **constraints** literally while respecting that all writes happen **only** under this worktree root?
65
65
  - **Pause →** If I used Rust `cargo test` filters, did I violate the **single positional filter** rule; how would I split the commands?
@@ -80,6 +80,6 @@ description: >-
80
80
 
81
81
  ## References
82
82
 
83
- - `implement-specs`: shared lifecycle (read → implement → backfill → commit → report)
83
+ - `implement-specs`: shared lifecycle (read → implement → backfill → **`commit-and-push`** → report)
84
84
  - `references/branch-naming.md`: branch naming
85
85
  - `enhance-existing-features`, `develop-new-features`: implementation standards
@@ -8,14 +8,14 @@ description: Resolve git merge conflicts using deterministic rules that preserve
8
8
  ## Dependencies
9
9
 
10
10
  - Required: none.
11
- - Conditional: none.
11
+ - Conditional: **`commit-and-push`** when the user expects the resolved tree to be **committed** or **pushed**—**MUST** run that skill for the submission leg instead of bare `git commit` / ad-hoc push when readiness gates apply.
12
12
  - Optional: none.
13
- - Fallback: not applicable.
13
+ - Fallback: If a **gated** submission was requested but **`commit-and-push`** is unavailable, **MUST** stop and report.
14
14
 
15
15
  ## Standards
16
16
 
17
17
  - Evidence: Read both parent versions from conflict markers before resolving.
18
- - Execution: Read conflicts → apply scenario rules → verify with tests → recommit.
18
+ - Execution: Read conflicts → apply scenario rules → verify with tests → recommit via **`commit-and-push`** when persisting to git.
19
19
  - Quality: Prefer preserving functionality over keeping either branch's exact changes.
20
20
  - Output: Return resolved files with passing verification.
21
21
 
@@ -7,15 +7,15 @@ description: PR-focused workflow for open-source repositories. Use when the user
7
7
 
8
8
  ## Dependencies
9
9
 
10
- - Required: none.
10
+ - Required: **`commit-and-push`** before publishing the contribution branch (any remaining changes **MUST** be committed/readiness-checked through that skill; **push** only when the user requested remote update—then continue to PR steps).
11
11
  - Conditional: `discover-edge-cases` and `code-simplifier` for code-affecting PRs before opening the PR.
12
12
  - Optional: none.
13
- - Fallback: If a required code-affecting dependency is unavailable, stop and report the missing dependency instead of bypassing the quality gate.
13
+ - Fallback: If **`commit-and-push`** or a **required** code-affecting dependency is unavailable, stop and report the missing dependency instead of bypassing the quality gate.
14
14
 
15
15
  ## Standards
16
16
 
17
17
  - Evidence: Assume implementation is already prepared, then verify PR scope, repository constraints, and validation commands from the actual change set.
18
- - Execution: Create a compliant `codex/{change_type}/{changes}` branch, run the required quality gates for code changes, then draft and open the PR.
18
+ - Execution: Create a compliant branch, run **`commit-and-push`** when the working tree still needs a gated commit, run dependent skills for code changes, then draft and open the PR.
19
19
  - Quality: Target the upstream parent repository by default for forks, keep PR content in English unless requested otherwise, and exclude internal workflow details.
20
20
  - Output: Produce a review-ready PR body with motivation, engineering rationale, test commands, and any required issue linkage.
21
21
 
@@ -47,7 +47,12 @@ Example:
47
47
  git checkout -b codex/fix/add-rate-limit-retry
48
48
  ```
49
49
 
50
- ### 3) Run dependent skills for code-affecting changes
50
+ ### 3) Record changes with `commit-and-push`
51
+
52
+ - If `git status` shows uncommitted work on the PR branch, run **`commit-and-push`** through commit (and **push** when the user explicitly asked to publish the branch remotely) before PR creation—**MUST NOT** bypass readiness/review gates that skill applies.
53
+ - If the tree is already clean with commits present, skip only after confirming there is nothing left to stage.
54
+
55
+ ### 4) Run dependent skills for code-affecting changes
51
56
 
52
57
  - If the PR includes code changes, run `discover-edge-cases` first to discover unresolved edge-case risks.
53
58
  - Resolve any confirmed findings before continuing.
@@ -56,14 +61,14 @@ git checkout -b codex/fix/add-rate-limit-retry
56
61
  - Use these skills as internal quality gates only; do not include skill/tool names in PR content.
57
62
  - If the PR has no code changes, explicitly note that these two skills were not required in internal notes only.
58
63
 
59
- ### 4) Verify existing changes (no feature implementation in this skill)
64
+ ### 5) Verify existing changes (no feature implementation in this skill)
60
65
 
61
66
  - Assume code/documentation changes are already prepared before entering this workflow.
62
67
  - Do not add new feature implementation in this skill.
63
68
  - After the dependent skills step (when required), run relevant checks (lint/test/build) based on repository conventions.
64
69
  - Record exact test commands and outcomes for PR content.
65
70
 
66
- ### 5) Prepare PR content (show draft only on request)
71
+ ### 6) Prepare PR content (show draft only on request)
67
72
 
68
73
  - Draft the PR title and full PR body before creating the PR.
69
74
  - Keep PR content strictly about the PR itself (motivation, changes, rationale, tests).
@@ -72,7 +77,7 @@ git checkout -b codex/fix/add-rate-limit-retry
72
77
  - Show the draft only when the user explicitly asks to review it before creating the PR.
73
78
  - If the user asks for draft edits, revise accordingly and get final confirmation before creating the PR.
74
79
 
75
- ### 6) Open the PR
80
+ ### 7) Open the PR
76
81
 
77
82
  - Prefer `gh pr create` to open the PR.
78
83
  - If the repository is a fork, target the upstream parent repository by default (for example `gh pr create --repo <upstream-owner>/<upstream-repo> --head <fork-owner>:<branch>`).
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@laitszkin/apollo-toolkit",
3
- "version": "3.9.0",
3
+ "version": "3.9.2",
4
4
  "description": "Apollo Toolkit npm installer for managed skill copying across Codex, OpenClaw, and Trae.",
5
5
  "license": "MIT",
6
6
  "author": "LaiTszKin",
@@ -5,12 +5,19 @@ description: Read GitHub pull request review comments, analyze each thread, deci
5
5
 
6
6
  # Resolve Review Comments
7
7
 
8
+ ## Dependencies
9
+
10
+ - Required: **`commit-and-push`** for staging adopted fixes, creating the commit, and **pushing** when the user requested a PR branch update—**MUST NOT** substitute bare `git commit` / unverified push for that leg.
11
+ - Conditional: none.
12
+ - Optional: none.
13
+ - Fallback: If **`commit-and-push`** is unavailable when submission is required, **MUST** stop and report.
14
+
8
15
  ## Standards
9
16
 
10
17
  - Evidence: Read unresolved review threads first and decide adopt versus reject from the actual review content and code context.
11
- - Execution: Implement only adopted feedback, validate it, push to the same PR branch, and resolve only the threads that were truly addressed.
18
+ - Execution: Implement only adopted feedback, validate it, **`commit-and-push`** on the same PR branch (commit + push when remote update is in scope), and resolve only the threads that were truly addressed.
12
19
  - Quality: Keep changes minimal, leave rejected or unclear threads unresolved, and reply with concise technical reasons when feedback is not adopted.
13
- - Output: Complete the PR feedback loop with updated code, pushed commits, and correctly resolved review threads.
20
+ - Output: Complete the PR feedback loop with updated code, **`commit-and-push`**-verified submission when applicable, and correctly resolved review threads.
14
21
 
15
22
  ## Prerequisites
16
23
 
@@ -25,7 +32,7 @@ description: Read GitHub pull request review comments, analyze each thread, deci
25
32
  3. Decide adopt or reject thread-by-thread.
26
33
  4. Implement only adopted feedback.
27
34
  5. Run relevant tests and checks.
28
- 6. Commit and push to the same PR branch.
35
+ 6. **Submit** — Run **`commit-and-push`** on the same PR branch (commit always when there are staged fixes; **push** when updating the remote PR branch is in scope).
29
36
  7. Resolve only threads that were truly addressed.
30
37
  8. Reply on unresolved/rejected threads with reason.
31
38
 
@@ -72,15 +79,14 @@ Track adopted thread IDs in a JSON file:
72
79
  - Keep changes minimal and scoped to adopted comments.
73
80
  - Reuse existing patterns; avoid unrelated refactors.
74
81
 
75
- ## 5) Validate before push
82
+ ## 5) Validate before submit
76
83
 
77
84
  - Run focused tests/lint/build that cover touched behavior.
78
- - If checks fail, fix before pushing.
85
+ - If checks fail, fix before **`commit-and-push`**.
79
86
 
80
- ## 6) Commit and push to same PR
87
+ ## 6) Submit on the PR branch
81
88
 
82
- - Create a clear commit describing why feedback was adopted.
83
- - Push to the PR branch (same branch backing the open PR).
89
+ - Run **`commit-and-push`**: stage adopted fixes, commit with a clear message, **push** to the PR branch when remote update is in scope (same branch backing the open PR).
84
90
 
85
91
  ## 7) Resolve addressed threads
86
92
 
@@ -10,7 +10,7 @@ This skill:
10
10
  2. Rejects authorship bias, including confidence in code written earlier in the same conversation.
11
11
  3. Looks for architecture-level abstraction opportunities.
12
12
  4. Looks for code that can be simplified without changing behavior.
13
- 5. Runs `harden-app-security` as a required adversarial cross-check for code-affecting changes.
13
+ 5. Runs `discover-security-issues` as a required adversarial cross-check for code-affecting changes.
14
14
 
15
15
  ## When to use
16
16
 
@@ -27,7 +27,7 @@ Use this skill when the task asks you to:
27
27
  - Treat recent edits as untrusted until evidence proves otherwise.
28
28
  - Prefer fewer, stronger findings over broad speculative advice.
29
29
  - Focus on architecture and simplification, not cosmetic style feedback.
30
- - Reuse confirmed security findings from `harden-app-security` instead of hand-waving about risk.
30
+ - Reuse confirmed security findings from `discover-security-issues` instead of hand-waving about risk.
31
31
 
32
32
  ## Example
33
33
 
@@ -44,7 +44,7 @@ Expected behavior:
44
44
  - changed files are read before conclusions,
45
45
  - findings cite exact evidence,
46
46
  - architecture issues are prioritized over style comments,
47
- - security-sensitive changes are cross-checked through `harden-app-security`.
47
+ - security-sensitive changes are cross-checked through `discover-security-issues`.
48
48
 
49
49
  ## References
50
50
 
@@ -1,6 +1,8 @@
1
1
  ---
2
2
  name: review-change-set
3
- description: Review the current git change set from an unbiased reviewer perspective, identify architecture-level abstraction opportunities and code simplification candidates, and challenge security assumptions through harden-app-security. Use when users ask for a diff review, refactor review, abstraction review, simplification review, or a pre-commit/pre-PR second opinion on current changes.
3
+ description: >-
4
+ Unbiased **git diff** review: architecture (boundaries, duplication, ownership) then simplification (real deletes/flattening, not churn)—discard conversation bias. Code-affecting changes **MUST** cross-check with **`discover-security-issues`**; integrate only **confirmed** findings—no invented CWE drama.
5
+ Use for pre-commit/pre-PR review, refactor/abstraction second opinion, “review my branch” **STOP** greenfield feature design from scratch—use planning skills… BAD style-only nits… GOOD evidence + named abstraction target…
4
6
  ---
5
7
 
6
8
  # Review Change Set
@@ -8,92 +10,75 @@ description: Review the current git change set from an unbiased reviewer perspec
8
10
  ## Dependencies
9
11
 
10
12
  - Required: none.
11
- - Conditional: `harden-app-security` for code-affecting changes before finalizing review conclusions.
13
+ - Conditional: **`discover-security-issues`** for **code-affecting** changes before final conclusions.
12
14
  - Optional: none.
13
- - Fallback: If the required security cross-check is unavailable for a code-affecting scope, stop and report the missing dependency.
15
+ - Fallback: If the security cross-check is **required** but unavailable, **MUST** stop and report.
14
16
 
15
- ## Standards
17
+ ## Non-negotiables
16
18
 
17
- - Evidence: Read the full active diff plus the minimum dependency chain needed to understand the changed behavior.
18
- - Execution: Review architecture first, then simplification opportunities, then integrate confirmed security findings.
19
- - Quality: Judge the change set as an outsider, keep only actionable findings, and avoid inventing concerns the security pass did not confirm.
20
- - Output: Return review scope, architecture findings, simplification findings, security cross-check results, and residual uncertainty.
19
+ - Read the **full** active change set (staged **and** unstaged when both exist—label which finding hits which).
20
+ - **MUST** discard authorship bias; burden of proof on the code.
21
+ - Prefer **architecture** and **maintainability** over style-only.
22
+ - Abstraction only when it cuts duplication, clarifies ownership, or stabilizes boundaries.
23
+ - Simplification only when behavior-preserving and genuinely simpler—**MUST NOT** shuffle complexity.
24
+ - **MUST** invoke **`discover-security-issues`** on code-affecting scope; **MUST NOT** fabricate security issues not confirmed by that pass.
21
25
 
22
- ## Non-negotiable Review Rules
26
+ ## Standards (summary)
23
27
 
24
- - Read the full active change set before judging any design choice.
25
- - Discard authorship bias completely, including changes written earlier in the same conversation by this agent.
26
- - Judge the diff from a reviewer perspective: the burden of proof is on the code, not on the author's intent.
27
- - Prefer architecture and maintainability findings over style-only feedback.
28
- - Recommend abstraction only when it reduces duplication, clarifies ownership, or stabilizes boundaries.
29
- - Recommend simplification only when it preserves behavior while reducing complexity or ambiguity.
28
+ - **Evidence**: Full diff + minimum context reads to understand behavior.
29
+ - **Execution**: Git state baseline architecture simplification security integration report.
30
+ - **Quality**: Actionable, outsider perspective; clear merge of confirmed security results.
31
+ - **Output**: Scope, architecture findings, simplification findings, security cross-check summary, residual uncertainty.
30
32
 
31
33
  ## Workflow
32
34
 
33
- ### 1) Inspect the active git state
35
+ **Chain-of-thought:** **`Pause →`** after each block—no verdicts from partial file reads.
34
36
 
35
- - Run `git status -sb`, `git diff --stat`, and `git diff --cached --stat`.
36
- - If both staged and unstaged changes exist, review both and label which findings apply to each surface.
37
- - If there is no active diff, report `No active git change set to review` and stop.
37
+ ### 1) Inspect git state
38
38
 
39
- ### 2) Build a factual baseline
39
+ - `git status -sb`, `git diff --stat`, `git diff --cached --stat`; cover staged vs unstaged explicitly.
40
+ - No diff → `No active git change set to review` and stop.
41
+ - **Pause →** Am I about to review **only** unstaged while staged also ships?
40
42
 
41
- - Read every changed file end-to-end.
42
- - Read the minimum dependency chain needed to understand new helpers, moved logic, interfaces, and callers.
43
- - Reconstruct actual behavior from code, tests, configuration, and executable evidence only.
44
- - Ignore earlier planning context unless it is explicitly encoded in the repository.
43
+ ### 2) Baseline
45
44
 
46
- ### 3) Review architecture first
45
+ - Read every changed file E2E; pull in minimal callers/callees/config to interpret moves and interfaces.
46
+ - Behavior from **code, tests, config, execution**—not from chat memory.
47
+ - **Pause →** Can I quote **one concrete behavior** change this diff introduces—not intent?
47
48
 
48
- Check whether the diff introduces or preserves problems such as:
49
+ ### 3) Architecture first
49
50
 
50
- - duplicated workflows that should live behind one module or helper,
51
- - cross-layer leakage or ownership confusion,
52
- - helper placement that hides domain boundaries,
53
- - repeated condition trees or mapping logic that should be centralized,
54
- - unstable interfaces or parameter shapes that should be normalized.
51
+ Flag only if evidence-backed: duplicated workflows, cross-layer leakage, wrong helper ownership, repeated condition trees, unstable interfaces.
52
+ Each finding **MUST** name abstraction target **and** why current shape is weaker.
53
+ - **Pause →** Is this “different style” or a real **boundary** problem?
55
54
 
56
- Keep only findings that name the proposed abstraction target and explain why the current structure is weaker.
55
+ ### 4) Simplification second
57
56
 
58
- ### 4) Review simplification opportunities second
57
+ Redundant branches/wrappers, deep nesting, duplicated validation, oversize functions, dead compat—**only** if it truly reduces complexity.
58
+ - **Pause →** Would this refactor just **move** lines between files?
59
59
 
60
- Check whether the diff can be simplified through:
60
+ ### 5) Security cross-check
61
61
 
62
- - removing redundant branches, wrappers, or state,
63
- - flattening deeply nested control flow,
64
- - collapsing duplicated validation or conversion logic,
65
- - shrinking overly broad functions into clearer units,
66
- - deleting dead or no-longer-needed compatibility paths.
62
+ - Run **`discover-security-issues`** on the **same** code-affecting scope.
63
+ - Merge **confirmed** findings that affect safety of this structure; omit unconfirmed noise.
64
+ - **Pause →** Did I cite **their** severity + repro—or paraphrase fear?
67
65
 
68
- Do not recommend refactors that merely move complexity around.
66
+ ### 6) Report
69
67
 
70
- ### 5) Run the security cross-check
68
+ 1. **Scope** staged/unstaged; extra context paths read.
69
+ 2. **Architecture** — title, evidence (`path:line`), candidate, why weaker.
70
+ 3. **Simplification** — title, evidence, candidate, benefit.
71
+ 4. **Security cross-check** — confirmed items reused from **`discover-security-issues`**, relevance to this diff.
72
+ 5. **Residual uncertainty** — hypotheses / follow-up checks.
71
73
 
72
- - Invoke `harden-app-security` on the same code-affecting scope.
73
- - Integrate confirmed security findings into the final review when they materially affect the safety of the proposed structure.
74
- - Do not invent security concerns that the dependency did not confirm.
74
+ If nothing actionable: `No actionable abstraction or simplification finding identified` (security section still reflects cross-check outcome).
75
75
 
76
- ### 6) Report only actionable review output
76
+ ## Sample hints
77
77
 
78
- Deliver:
78
+ - **Staged only**: User ran `git add -p` → findings tagged **staged** vs **unstaged** separately.
79
+ - **Rename-heavy**: Read old→new path mapping before calling “duplication.”
80
+ - **Tiny diff**: One-file guard clause → architecture section may be empty; security pass still runs if code-affecting.
79
81
 
80
- 1. Review scope
81
- - staged / unstaged coverage
82
- - additional files read for context
83
- 2. Architecture findings
84
- - title
85
- - evidence (`path:line`)
86
- - abstraction candidate
87
- - why the current design is weaker
88
- 3. Simplification findings
89
- - title
90
- - evidence (`path:line`)
91
- - simplification candidate
92
- - expected benefit
93
- 4. Security cross-check
94
- - confirmed findings reused from `harden-app-security`
95
- - reason they matter to this diff review
96
- 5. Residual uncertainty
97
- - hypotheses or follow-up checks that were not confirmed
82
+ ## References
98
83
 
99
- If no actionable issue is found, report `No actionable abstraction or simplification finding identified`.
84
+ - **`discover-security-issues`**: confirmed adversarial findings for code-affecting scope.
@@ -1,4 +1,4 @@
1
1
  interface:
2
2
  display_name: "Review Change Set"
3
- short_description: "Review the active git diff for abstraction and simplification opportunities"
4
- default_prompt: "Use $review-change-set to read the active git change set end-to-end, discard any bias toward code written earlier in the conversation, review it like an independent reviewer for architecture-level abstraction and simplification opportunities, and run $harden-app-security as an adversarial cross-check for code-affecting changes."
3
+ short_description: "Independent diff review for architecture, simplification, and confirmed security cross-checks"
4
+ default_prompt: "Use $review-change-set to read the active git change set end-to-end, discard any bias toward code written earlier in the conversation, review it like an independent reviewer for architecture-level abstraction and simplification opportunities, and run $discover-security-issues as an adversarial cross-check for code-affecting changes."
@@ -9,7 +9,7 @@ This skill:
9
9
  1. Resolves the governing `docs/plans/...` spec scope from user input or recent repository changes.
10
10
  2. Checks whether each business goal and acceptance criterion is actually implemented.
11
11
  3. Treats unmet business goals as the most severe review findings.
12
- 4. Runs secondary code-practice review through `review-change-set`, `discover-edge-cases`, and `harden-app-security` for code-affecting scopes.
12
+ 4. Runs secondary code-practice review through `review-change-set`, `discover-edge-cases`, and `discover-security-issues` for code-affecting scopes.
13
13
  5. Reports business-goal gaps separately from edge-case, security, and maintainability findings.
14
14
 
15
15
  ## When to use
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  name: review-spec-related-changes
3
3
  description: >-
4
- Read-only spec compliance versus governing docs/plans: score each business-oriented requirement Met/Partial/Not-met using code/tests/commands—checked `tasks.md` boxes are never sufficient proof; ambiguity between two plausible plan roots halts execution; when runtime code exists, sequentially run **`review-change-set`**, **`discover-edge-cases`**, and **`harden-app-security`** on the same scoped diff afterward.
4
+ Read-only spec compliance versus governing docs/plans: score each business-oriented requirement Met/Partial/Not-met using code/tests/commands—checked `tasks.md` boxes are never sufficient proof; ambiguity between two plausible plan roots halts execution; when runtime code exists, sequentially run **`review-change-set`**, **`discover-edge-cases`**, and **`discover-security-issues`** on the same scoped diff afterward.
5
5
  Use for questions like “does this PR satisfy coordination.md + spec.md R2?” or user pins a `{change}` folder.
6
6
  Do not mutate repositories, reorder reports to bury missing goals, skip the tertiary review bundle on code-bearing diffs, or rely on intent without file evidence **BAD**, lead with refactor comments while R1 failing **FORBIDDEN**… GOOD pair every Not-met cite with `spec.md` ref + concrete path:test gap…
7
7
  ---
@@ -10,7 +10,7 @@ description: >-
10
10
 
11
11
  ## Dependencies
12
12
 
13
- - Required: `review-change-set`, `discover-edge-cases`, and `harden-app-security` whenever the scope includes **code-affecting** implementation to assess.
13
+ - Required: `review-change-set`, `discover-edge-cases`, and `discover-security-issues` whenever the scope includes **code-affecting** implementation to assess.
14
14
  - Conditional: none.
15
15
  - Optional: none.
16
16
  - Fallback: If any required dependency is unavailable for a **code-affecting** review, **MUST** stop and report the gap. **MUST NOT** emit a “full pass” verdict without those three passes when code is in scope.
@@ -22,7 +22,7 @@ description: >-
22
22
  - **MUST** resolve which spec set governs the change **before** concluding; if multiple candidates fit equally and cannot be disambiguated from repo evidence, **MUST** stop and report ambiguity—**MUST NOT** guess.
23
23
  - **MUST** classify each business goal / acceptance item as `Met`, `Partially met`, `Not met`, or `Deferred/N/A` **only** using verifiable evidence (code, tests, commands, traces)—checked boxes in `tasks.md` are **not** proof by themselves.
24
24
  - **MUST** treat **unmet or partially met required business goals** as **highest severity**. **MUST NOT** let edge-case, security, or style findings **outrank** those gaps in the reported order or implied priority.
25
- - **MUST** finish the business-goal verdict **before** invoking secondary skills; **MUST** still run `review-change-set`, `discover-edge-cases`, and `harden-app-security` on the **same** implementation scope when code is involved (after step 1 verdict is written).
25
+ - **MUST** finish the business-goal verdict **before** invoking secondary skills; **MUST** still run `review-change-set`, `discover-edge-cases`, and `discover-security-issues` on the **same** implementation scope when code is involved (after step 1 verdict is written).
26
26
  - **MUST NOT** rest conclusions on author intent, branch names, or chat memory unless **repository evidence** agrees.
27
27
  - Prefer **fewer confirmed findings** over broad speculation; unproven items belong under **Residual uncertainty**, not as faux defects.
28
28
 
@@ -61,7 +61,7 @@ description: >-
61
61
  - **Pause →** If I sorted findings by “interesting” instead of business impact, which line would unfairly rise above a missing goal?
62
62
  - **Pause →** For each `Partially met`, what single **missing proof** (test, wire-up, error path) am I naming explicitly?
63
63
 
64
- 4. **Secondary reviews (code-affecting)** — On the same scope: `review-change-set` (architecture/simplification), `discover-edge-cases` (reproducible edge/observability risks), `harden-app-security` (reproducible security). Keep outputs labeled so they do not read as business-goal substitutions.
64
+ 4. **Secondary reviews (code-affecting)** — On the same scope: `review-change-set` (architecture/simplification), `discover-edge-cases` (reproducible edge/observability risks), `discover-security-issues` (reproducible security). Keep outputs labeled so they do not read as business-goal substitutions.
65
65
  - **Pause →** Does this secondary finding **force** a business re-score—if yes, did I revise step 3 before publishing?
66
66
  - **Pause →** Is the diff scope identical to what I used for business mapping (no silent file creep)?
67
67
 
@@ -1,4 +1,4 @@
1
1
  interface:
2
2
  display_name: "Review Spec Related Changes"
3
3
  short_description: "Review spec-backed changes for business-goal completion and secondary code-practice risks"
4
- default_prompt: "Use $review-spec-related-changes to resolve the recent or user-specified spec documents, verify each business goal and acceptance criterion against the related implementation evidence, treat unmet business goals as the most severe findings, and then run $review-change-set, $discover-edge-cases, and $harden-app-security on the same code-affecting scope for secondary code-practice review."
4
+ default_prompt: "Use $review-spec-related-changes to resolve the recent or user-specified spec documents, verify each business goal and acceptance criterion against the related implementation evidence, treat unmet business goals as the most severe findings, and then run $review-change-set, $discover-edge-cases, and $discover-security-issues on the same code-affecting scope for secondary code-practice review."
@@ -8,7 +8,7 @@ Fix issues discovered during a review pass, proceeding from the highest-severity
8
8
  $solve-issues-found-during-review
9
9
  ```
10
10
 
11
- Provide a review report (from `review-change-set`, `review-spec-related-changes`, `review-codebases`, `discover-edge-cases`, `harden-app-security`, or any structured review) and this skill will:
11
+ Provide a review report (from `review-change-set`, `review-spec-related-changes`, `review-codebases`, `discover-edge-cases`, `discover-security-issues`, or any structured review) and this skill will:
12
12
 
13
13
  1. Read and prioritize all findings by severity
14
14
  2. Fix each finding from Critical down to Low
@@ -11,9 +11,9 @@ description: >-
11
11
  ## Dependencies
12
12
 
13
13
  - Required: none (caller **MUST** supply an existing review report or reconstructable finding list).
14
- - Conditional: `review-change-set` for optional re-validation after **code-affecting** fixes; `systematic-debug` when a fix causes unexpected test or runtime failures.
15
- - Optional: `discover-edge-cases` / `harden-app-security` when the user or report demands post-fix confirmation on those dimensions.
16
- - Fallback: If `review-change-set` is unavailable after code fixes, **MUST** still verify via targeted tests and `git diff` (or equivalent) and **MUST** document exactly what was run.
14
+ - Conditional: `review-change-set` for optional re-validation after **code-affecting** fixes; `systematic-debug` when a fix causes unexpected test or runtime failures; **`commit-and-push`** when the user requests **git commit** and/or **push** to persist fixes—**MUST** hand off that leg to **`commit-and-push`** (not bare `git commit` / ungated push).
15
+ - Optional: `discover-edge-cases` / `discover-security-issues` when the user or report demands post-fix confirmation on those dimensions.
16
+ - Fallback: If `review-change-set` is unavailable after code fixes, **MUST** still verify via targeted tests and `git diff` (or equivalent) and **MUST** document exactly what was run. If the user requested **commit/push** and **`commit-and-push`** is unavailable, **MUST** stop and report.
17
17
 
18
18
  ## Non-negotiables
19
19
 
@@ -34,7 +34,7 @@ When the release includes code changes, `review-change-set` is still a condition
34
34
 
35
35
  Apply the same rule to every other conditional gate: if its scenario is met during release classification, it becomes blocking before version bumping, tagging, or release publication.
36
36
 
37
- That includes risk-driven review gates such as `discover-edge-cases` and `harden-app-security` whenever the release surface makes them applicable.
37
+ That includes risk-driven review gates such as `discover-edge-cases` and `discover-security-issues` whenever the release surface makes them applicable.
38
38
 
39
39
  Do not report release completion after only bumping versions or pushing a commit: the matching tag and GitHub release are part of done criteria unless the user explicitly says to skip publication.
40
40
 
@@ -10,7 +10,7 @@ description: >-
10
10
  ## Dependencies
11
11
 
12
12
  - Required: **`commit-and-push`** (shared inspect/classify/readiness/commit/push mechanics); **`submission-readiness-check`** **before** version files, tags, or publication mutate.
13
- - Conditional: **`archive-specs`** when specs/docs need alignment; **`review-change-set`** (+ **`discover-edge-cases`** / **`harden-app-security`** when risk triggers) on **code-affecting** release scope **before** version churn—blocking while findings open.
13
+ - Conditional: **`archive-specs`** when specs/docs need alignment; **`review-change-set`** (+ **`discover-edge-cases`** / **`discover-security-issues`** when risk triggers) on **code-affecting** release scope **before** version churn—blocking while findings open.
14
14
  - Optional: none.
15
15
  - Fallback: Missing required skill ⇒ stop and report.
16
16
 
@@ -26,7 +26,7 @@ description: >-
26
26
  - **MUST** verify **remote** has commit + tag before calling release **done**; **MUST NOT** trust UI git shortcuts.
27
27
  - **Done** = version files + changelog section + **pushed** commit + **remote** tag + **published** GitHub release (unless user explicitly skips publication—then say so).
28
28
 
29
- **Repository regression checks:** Before creating release metadata, inspect existing local and remote tags plus any existing GitHub Release for the target version so duplicates are caught early. Do not continue until you can state the current version, the intended next version, and the exact tag name that will be created. **`review-change-set` is required for code-affecting releases**—run `review-change-set` for the same release scope before continuing; treat unresolved review findings as blocking. Any conditional gate whose trigger is confirmed by this classification becomes mandatory before version bumping, tagging, or release publication. Treat every scenario-matched gate as blocking before versioning or release publication. **`discover-edge-cases` and `harden-app-security` are important review gates**—when their scenario is met, treat them as blocking review gates, not optional polish. Never stop after the release commit or tag alone; creating the matching GitHub release is part of done criteria unless the user explicitly says to skip release publication.
29
+ **Repository regression checks:** Before creating release metadata, inspect existing local and remote tags plus any existing GitHub Release for the target version so duplicates are caught early. Do not continue until you can state the current version, the intended next version, and the exact tag name that will be created. **`review-change-set` is required for code-affecting releases**—run `review-change-set` for the same release scope before continuing; treat unresolved review findings as blocking. Any conditional gate whose trigger is confirmed by this classification becomes mandatory before version bumping, tagging, or release publication. Treat every scenario-matched gate as blocking before versioning or release publication. **`discover-edge-cases` and `discover-security-issues` are important review gates**—when their scenario is met, treat them as blocking review gates, not optional polish. Never stop after the release commit or tag alone; creating the matching GitHub release is part of done criteria unless the user explicitly says to skip release publication.
30
30
 
31
31
  ## Standards (summary)
32
32
 
@@ -1,4 +1,4 @@
1
1
  interface:
2
2
  display_name: "Version Release"
3
3
  short_description: "Prepare a versioned release with bump, changelog, tag, GitHub release, and push"
4
- default_prompt: "Use $version-release only for explicit release/version/tag requests, including direct semver wording like patch/minor/major update or requests to trigger release-published automation: inspect the current repository state, read the current version plus existing tag/release state, and inspect root CHANGELOG.md Unreleased content. Treat every conditional gate whose scenario is met as blocking before any version bump, tag, or release step: if the release includes code changes, run $review-change-set; if the reviewed risk profile says edge-case or security review is needed, run $discover-edge-cases and $harden-app-security as blocking gates too; if completed specs should be converted or docs need normalization, ensure $archive-specs runs through $submission-readiness-check; if changelog synchronization is needed, complete it before continuing. Then run any additional required code-quality skills, hand the repository to $submission-readiness-check so completed plan archives, project docs, AGENTS.md/CLAUDE.md, and changelog readiness are settled before any version bump or tag, confirm CHANGELOG.md Unreleased is release-ready, update version files, cut the release directly from CHANGELOG.md Unreleased, create the release commit and matching tag, push commits and tags, and publish the matching GitHub release before reporting success."
4
+ default_prompt: "Use $version-release only for explicit release/version/tag requests, including direct semver wording like patch/minor/major update or requests to trigger release-published automation: inspect the current repository state, read the current version plus existing tag/release state, and inspect root CHANGELOG.md Unreleased content. Treat every conditional gate whose scenario is met as blocking before any version bump, tag, or release step: if the release includes code changes, run $review-change-set; if the reviewed risk profile says edge-case or security review is needed, run $discover-edge-cases and $discover-security-issues as blocking gates too; if completed specs should be converted or docs need normalization, ensure $archive-specs runs through $submission-readiness-check; if changelog synchronization is needed, complete it before continuing. Then run any additional required code-quality skills, hand the repository to $submission-readiness-check so completed plan archives, project docs, AGENTS.md/CLAUDE.md, and changelog readiness are settled before any version bump or tag, confirm CHANGELOG.md Unreleased is release-ready, update version files, cut the release directly from CHANGELOG.md Unreleased, create the release commit and matching tag, push commits and tags, and publish the matching GitHub release before reporting success."