@laitszkin/apollo-toolkit 3.9.1 → 3.9.3

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (54) hide show
  1. package/CHANGELOG.md +12 -0
  2. package/README.md +2 -2
  3. package/analyse-app-logs/scripts/__pycache__/filter_logs_by_time.cpython-312.pyc +0 -0
  4. package/analyse-app-logs/scripts/__pycache__/log_cli_utils.cpython-312.pyc +0 -0
  5. package/analyse-app-logs/scripts/__pycache__/search_logs.cpython-312.pyc +0 -0
  6. package/commit-and-push/README.md +1 -1
  7. package/commit-and-push/SKILL.md +9 -8
  8. package/commit-and-push/agents/openai.yaml +1 -1
  9. package/develop-new-features/SKILL.md +2 -2
  10. package/discover-edge-cases/README.md +2 -2
  11. package/discover-edge-cases/SKILL.md +61 -90
  12. package/discover-edge-cases/agents/openai.yaml +2 -2
  13. package/{harden-app-security → discover-security-issues}/CHANGELOG.md +5 -0
  14. package/discover-security-issues/README.md +35 -0
  15. package/discover-security-issues/SKILL.md +88 -0
  16. package/discover-security-issues/agents/openai.yaml +4 -0
  17. package/docs-to-voice/scripts/__pycache__/docs_to_voice.cpython-312.pyc +0 -0
  18. package/enhance-existing-features/SKILL.md +2 -2
  19. package/generate-spec/scripts/__pycache__/create-specscpython-312.pyc +0 -0
  20. package/implement-specs/SKILL.md +9 -8
  21. package/implement-specs-with-subagents/SKILL.md +3 -3
  22. package/implement-specs-with-worktree/SKILL.md +4 -4
  23. package/katex/scripts/__pycache__/render_katex.cpython-312.pyc +0 -0
  24. package/merge-conflict-resolver/SKILL.md +3 -3
  25. package/open-github-issue/scripts/__pycache__/open_github_issue.cpython-312.pyc +0 -0
  26. package/open-source-pr-workflow/SKILL.md +12 -7
  27. package/package.json +1 -1
  28. package/read-github-issue/scripts/__pycache__/find_issues.cpython-312.pyc +0 -0
  29. package/read-github-issue/scripts/__pycache__/read_issue.cpython-312.pyc +0 -0
  30. package/resolve-review-comments/SKILL.md +14 -8
  31. package/resolve-review-comments/scripts/__pycache__/review_threads.cpython-312.pyc +0 -0
  32. package/review-change-set/README.md +3 -3
  33. package/review-change-set/SKILL.md +50 -65
  34. package/review-change-set/agents/openai.yaml +2 -2
  35. package/review-spec-related-changes/README.md +1 -1
  36. package/review-spec-related-changes/SKILL.md +4 -4
  37. package/review-spec-related-changes/agents/openai.yaml +1 -1
  38. package/solve-issues-found-during-review/README.md +1 -1
  39. package/solve-issues-found-during-review/SKILL.md +22 -10
  40. package/text-to-short-video/scripts/__pycache__/enforce_video_aspect_ratio.cpython-312.pyc +0 -0
  41. package/version-release/README.md +1 -1
  42. package/version-release/SKILL.md +2 -2
  43. package/version-release/agents/openai.yaml +1 -1
  44. package/harden-app-security/README.md +0 -46
  45. package/harden-app-security/SKILL.md +0 -127
  46. package/harden-app-security/agents/openai.yaml +0 -4
  47. /package/{harden-app-security → discover-security-issues}/LICENSE +0 -0
  48. /package/{harden-app-security → discover-security-issues}/references/agent-attack-catalog.md +0 -0
  49. /package/{harden-app-security → discover-security-issues}/references/common-software-attack-catalog.md +0 -0
  50. /package/{harden-app-security → discover-security-issues}/references/red-team-extreme-scenarios.md +0 -0
  51. /package/{harden-app-security → discover-security-issues}/references/risk-checklist.md +0 -0
  52. /package/{harden-app-security → discover-security-issues}/references/security-test-patterns-agent.md +0 -0
  53. /package/{harden-app-security → discover-security-issues}/references/security-test-patterns-finance.md +0 -0
  54. /package/{harden-app-security → discover-security-issues}/references/test-snippets.md +0 -0
@@ -10,7 +10,7 @@ description: >-
10
10
 
11
11
  ## Dependencies
12
12
 
13
- - Required: `implement-specs` for the shared discovery / implementation / backfill / commit / reporting lifecycle; `enhance-existing-features` and `develop-new-features` for implementation standards.
13
+ - Required: `implement-specs` for the shared discovery / implementation / backfill / **submit** / reporting lifecycle; **`commit-and-push`** for the **final** implementation commit (and push when the user explicitly requests remote update); `enhance-existing-features` and `develop-new-features` for implementation standards.
14
14
  - Conditional: `generate-spec` if spec files need clarification or updates.
15
15
  - Fallback: If any required dependency skill is unavailable, **MUST** stop and report it.
16
16
 
@@ -24,7 +24,7 @@ description: >-
24
24
  - **MUST** use `git show-ref` and `git worktree list --porcelain` (not shell guesses) when checking whether a branch or worktree already exists; if creation fails ambiguously, **MUST** re-query those commands before retrying.
25
25
  - When `preparation.md` exists: **MUST** treat it as an already-committed shared baseline for parallel work; **MUST NOT** redo its tasks inside the member spec unless the preparation commit is missing or the document states the prerequisite is still blocked. If baseline assumptions break, **MUST** update `preparation.md` or stop for coordination—**MUST NOT** silently move prerequisite work into the member spec.
26
26
  - **MUST** complete the same quality bar as `implement-specs`: all in-scope tasks, relevant tests, honest backfill, no sibling-spec scope creep, revert formatter-only noise outside owned files before commit.
27
- - **MUST NOT** `git push` unless the user explicitly asks.
27
+ - **MUST NOT** `git push` **outside** **`commit-and-push`** unless the user explicitly requests remote update through that workflow (or a release/PR skill the user named).
28
28
  - For targeted Rust tests: **MUST** pass at most one positional `cargo test` filter per invocation; use separate commands or a broader confirmed filter when multiple selectors are needed.
29
29
 
30
30
  ## Standards (summary)
@@ -59,7 +59,7 @@ description: >-
59
59
 
60
60
  ### C) Implement, backfill, commit, report
61
61
 
62
- - Execute **`implement-specs` Workflow steps 3–6** (implement, backfill, commit, report) **entirely from the worktree root**, applying `enhance-existing-features` / `develop-new-features` standards.
62
+ - Execute **`implement-specs` Workflow steps 3–6** (implement, backfill, **submit via `commit-and-push`**, report) **entirely from the worktree root**, applying `enhance-existing-features` / `develop-new-features` standards.
63
63
  - In the report, **MUST** include branch name, worktree path, commit hash, tests run, backfilled docs, and an explicit statement that the parent checkout was not modified for implementation files.
64
64
  - **Pause →** Am I honoring **implement-specs** step 3–6 **constraints** literally while respecting that all writes happen **only** under this worktree root?
65
65
  - **Pause →** If I used Rust `cargo test` filters, did I violate the **single positional filter** rule; how would I split the commands?
@@ -80,6 +80,6 @@ description: >-
80
80
 
81
81
  ## References
82
82
 
83
- - `implement-specs`: shared lifecycle (read → implement → backfill → commit → report)
83
+ - `implement-specs`: shared lifecycle (read → implement → backfill → **`commit-and-push`** → report)
84
84
  - `references/branch-naming.md`: branch naming
85
85
  - `enhance-existing-features`, `develop-new-features`: implementation standards
@@ -8,14 +8,14 @@ description: Resolve git merge conflicts using deterministic rules that preserve
8
8
  ## Dependencies
9
9
 
10
10
  - Required: none.
11
- - Conditional: none.
11
+ - Conditional: **`commit-and-push`** when the user expects the resolved tree to be **committed** or **pushed**—**MUST** run that skill for the submission leg instead of bare `git commit` / ad-hoc push when readiness gates apply.
12
12
  - Optional: none.
13
- - Fallback: not applicable.
13
+ - Fallback: If a **gated** submission was requested but **`commit-and-push`** is unavailable, **MUST** stop and report.
14
14
 
15
15
  ## Standards
16
16
 
17
17
  - Evidence: Read both parent versions from conflict markers before resolving.
18
- - Execution: Read conflicts → apply scenario rules → verify with tests → recommit.
18
+ - Execution: Read conflicts → apply scenario rules → verify with tests → recommit via **`commit-and-push`** when persisting to git.
19
19
  - Quality: Prefer preserving functionality over keeping either branch's exact changes.
20
20
  - Output: Return resolved files with passing verification.
21
21
 
@@ -7,15 +7,15 @@ description: PR-focused workflow for open-source repositories. Use when the user
7
7
 
8
8
  ## Dependencies
9
9
 
10
- - Required: none.
10
+ - Required: **`commit-and-push`** before publishing the contribution branch (any remaining changes **MUST** be committed/readiness-checked through that skill; **push** only when the user requested remote update—then continue to PR steps).
11
11
  - Conditional: `discover-edge-cases` and `code-simplifier` for code-affecting PRs before opening the PR.
12
12
  - Optional: none.
13
- - Fallback: If a required code-affecting dependency is unavailable, stop and report the missing dependency instead of bypassing the quality gate.
13
+ - Fallback: If **`commit-and-push`** or a **required** code-affecting dependency is unavailable, stop and report the missing dependency instead of bypassing the quality gate.
14
14
 
15
15
  ## Standards
16
16
 
17
17
  - Evidence: Assume implementation is already prepared, then verify PR scope, repository constraints, and validation commands from the actual change set.
18
- - Execution: Create a compliant `codex/{change_type}/{changes}` branch, run the required quality gates for code changes, then draft and open the PR.
18
+ - Execution: Create a compliant branch, run **`commit-and-push`** when the working tree still needs a gated commit, run dependent skills for code changes, then draft and open the PR.
19
19
  - Quality: Target the upstream parent repository by default for forks, keep PR content in English unless requested otherwise, and exclude internal workflow details.
20
20
  - Output: Produce a review-ready PR body with motivation, engineering rationale, test commands, and any required issue linkage.
21
21
 
@@ -47,7 +47,12 @@ Example:
47
47
  git checkout -b codex/fix/add-rate-limit-retry
48
48
  ```
49
49
 
50
- ### 3) Run dependent skills for code-affecting changes
50
+ ### 3) Record changes with `commit-and-push`
51
+
52
+ - If `git status` shows uncommitted work on the PR branch, run **`commit-and-push`** through commit (and **push** when the user explicitly asked to publish the branch remotely) before PR creation—**MUST NOT** bypass readiness/review gates that skill applies.
53
+ - If the tree is already clean with commits present, skip only after confirming there is nothing left to stage.
54
+
55
+ ### 4) Run dependent skills for code-affecting changes
51
56
 
52
57
  - If the PR includes code changes, run `discover-edge-cases` first to discover unresolved edge-case risks.
53
58
  - Resolve any confirmed findings before continuing.
@@ -56,14 +61,14 @@ git checkout -b codex/fix/add-rate-limit-retry
56
61
  - Use these skills as internal quality gates only; do not include skill/tool names in PR content.
57
62
  - If the PR has no code changes, explicitly note that these two skills were not required in internal notes only.
58
63
 
59
- ### 4) Verify existing changes (no feature implementation in this skill)
64
+ ### 5) Verify existing changes (no feature implementation in this skill)
60
65
 
61
66
  - Assume code/documentation changes are already prepared before entering this workflow.
62
67
  - Do not add new feature implementation in this skill.
63
68
  - After the dependent skills step (when required), run relevant checks (lint/test/build) based on repository conventions.
64
69
  - Record exact test commands and outcomes for PR content.
65
70
 
66
- ### 5) Prepare PR content (show draft only on request)
71
+ ### 6) Prepare PR content (show draft only on request)
67
72
 
68
73
  - Draft the PR title and full PR body before creating the PR.
69
74
  - Keep PR content strictly about the PR itself (motivation, changes, rationale, tests).
@@ -72,7 +77,7 @@ git checkout -b codex/fix/add-rate-limit-retry
72
77
  - Show the draft only when the user explicitly asks to review it before creating the PR.
73
78
  - If the user asks for draft edits, revise accordingly and get final confirmation before creating the PR.
74
79
 
75
- ### 6) Open the PR
80
+ ### 7) Open the PR
76
81
 
77
82
  - Prefer `gh pr create` to open the PR.
78
83
  - If the repository is a fork, target the upstream parent repository by default (for example `gh pr create --repo <upstream-owner>/<upstream-repo> --head <fork-owner>:<branch>`).
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@laitszkin/apollo-toolkit",
3
- "version": "3.9.1",
3
+ "version": "3.9.3",
4
4
  "description": "Apollo Toolkit npm installer for managed skill copying across Codex, OpenClaw, and Trae.",
5
5
  "license": "MIT",
6
6
  "author": "LaiTszKin",
@@ -5,12 +5,19 @@ description: Read GitHub pull request review comments, analyze each thread, deci
5
5
 
6
6
  # Resolve Review Comments
7
7
 
8
+ ## Dependencies
9
+
10
+ - Required: **`commit-and-push`** for staging adopted fixes, creating the commit, and **pushing** when the user requested a PR branch update—**MUST NOT** substitute bare `git commit` / unverified push for that leg.
11
+ - Conditional: none.
12
+ - Optional: none.
13
+ - Fallback: If **`commit-and-push`** is unavailable when submission is required, **MUST** stop and report.
14
+
8
15
  ## Standards
9
16
 
10
17
  - Evidence: Read unresolved review threads first and decide adopt versus reject from the actual review content and code context.
11
- - Execution: Implement only adopted feedback, validate it, push to the same PR branch, and resolve only the threads that were truly addressed.
18
+ - Execution: Implement only adopted feedback, validate it, **`commit-and-push`** on the same PR branch (commit + push when remote update is in scope), and resolve only the threads that were truly addressed.
12
19
  - Quality: Keep changes minimal, leave rejected or unclear threads unresolved, and reply with concise technical reasons when feedback is not adopted.
13
- - Output: Complete the PR feedback loop with updated code, pushed commits, and correctly resolved review threads.
20
+ - Output: Complete the PR feedback loop with updated code, **`commit-and-push`**-verified submission when applicable, and correctly resolved review threads.
14
21
 
15
22
  ## Prerequisites
16
23
 
@@ -25,7 +32,7 @@ description: Read GitHub pull request review comments, analyze each thread, deci
25
32
  3. Decide adopt or reject thread-by-thread.
26
33
  4. Implement only adopted feedback.
27
34
  5. Run relevant tests and checks.
28
- 6. Commit and push to the same PR branch.
35
+ 6. **Submit** — Run **`commit-and-push`** on the same PR branch (commit always when there are staged fixes; **push** when updating the remote PR branch is in scope).
29
36
  7. Resolve only threads that were truly addressed.
30
37
  8. Reply on unresolved/rejected threads with reason.
31
38
 
@@ -72,15 +79,14 @@ Track adopted thread IDs in a JSON file:
72
79
  - Keep changes minimal and scoped to adopted comments.
73
80
  - Reuse existing patterns; avoid unrelated refactors.
74
81
 
75
- ## 5) Validate before push
82
+ ## 5) Validate before submit
76
83
 
77
84
  - Run focused tests/lint/build that cover touched behavior.
78
- - If checks fail, fix before pushing.
85
+ - If checks fail, fix before **`commit-and-push`**.
79
86
 
80
- ## 6) Commit and push to same PR
87
+ ## 6) Submit on the PR branch
81
88
 
82
- - Create a clear commit describing why feedback was adopted.
83
- - Push to the PR branch (same branch backing the open PR).
89
+ - Run **`commit-and-push`**: stage adopted fixes, commit with a clear message, **push** to the PR branch when remote update is in scope (same branch backing the open PR).
84
90
 
85
91
  ## 7) Resolve addressed threads
86
92
 
@@ -10,7 +10,7 @@ This skill:
10
10
  2. Rejects authorship bias, including confidence in code written earlier in the same conversation.
11
11
  3. Looks for architecture-level abstraction opportunities.
12
12
  4. Looks for code that can be simplified without changing behavior.
13
- 5. Runs `harden-app-security` as a required adversarial cross-check for code-affecting changes.
13
+ 5. Runs `discover-security-issues` as a required adversarial cross-check for code-affecting changes.
14
14
 
15
15
  ## When to use
16
16
 
@@ -27,7 +27,7 @@ Use this skill when the task asks you to:
27
27
  - Treat recent edits as untrusted until evidence proves otherwise.
28
28
  - Prefer fewer, stronger findings over broad speculative advice.
29
29
  - Focus on architecture and simplification, not cosmetic style feedback.
30
- - Reuse confirmed security findings from `harden-app-security` instead of hand-waving about risk.
30
+ - Reuse confirmed security findings from `discover-security-issues` instead of hand-waving about risk.
31
31
 
32
32
  ## Example
33
33
 
@@ -44,7 +44,7 @@ Expected behavior:
44
44
  - changed files are read before conclusions,
45
45
  - findings cite exact evidence,
46
46
  - architecture issues are prioritized over style comments,
47
- - security-sensitive changes are cross-checked through `harden-app-security`.
47
+ - security-sensitive changes are cross-checked through `discover-security-issues`.
48
48
 
49
49
  ## References
50
50
 
@@ -1,6 +1,8 @@
1
1
  ---
2
2
  name: review-change-set
3
- description: Review the current git change set from an unbiased reviewer perspective, identify architecture-level abstraction opportunities and code simplification candidates, and challenge security assumptions through harden-app-security. Use when users ask for a diff review, refactor review, abstraction review, simplification review, or a pre-commit/pre-PR second opinion on current changes.
3
+ description: >-
4
+ Unbiased **git diff** review: architecture (boundaries, duplication, ownership) then simplification (real deletes/flattening, not churn)—discard conversation bias. Code-affecting changes **MUST** cross-check with **`discover-security-issues`**; integrate only **confirmed** findings—no invented CWE drama.
5
+ Use for pre-commit/pre-PR review, refactor/abstraction second opinion, “review my branch” **STOP** greenfield feature design from scratch—use planning skills… BAD style-only nits… GOOD evidence + named abstraction target…
4
6
  ---
5
7
 
6
8
  # Review Change Set
@@ -8,92 +10,75 @@ description: Review the current git change set from an unbiased reviewer perspec
8
10
  ## Dependencies
9
11
 
10
12
  - Required: none.
11
- - Conditional: `harden-app-security` for code-affecting changes before finalizing review conclusions.
13
+ - Conditional: **`discover-security-issues`** for **code-affecting** changes before final conclusions.
12
14
  - Optional: none.
13
- - Fallback: If the required security cross-check is unavailable for a code-affecting scope, stop and report the missing dependency.
15
+ - Fallback: If the security cross-check is **required** but unavailable, **MUST** stop and report.
14
16
 
15
- ## Standards
17
+ ## Non-negotiables
16
18
 
17
- - Evidence: Read the full active diff plus the minimum dependency chain needed to understand the changed behavior.
18
- - Execution: Review architecture first, then simplification opportunities, then integrate confirmed security findings.
19
- - Quality: Judge the change set as an outsider, keep only actionable findings, and avoid inventing concerns the security pass did not confirm.
20
- - Output: Return review scope, architecture findings, simplification findings, security cross-check results, and residual uncertainty.
19
+ - Read the **full** active change set (staged **and** unstaged when both exist—label which finding hits which).
20
+ - **MUST** discard authorship bias; burden of proof on the code.
21
+ - Prefer **architecture** and **maintainability** over style-only.
22
+ - Abstraction only when it cuts duplication, clarifies ownership, or stabilizes boundaries.
23
+ - Simplification only when behavior-preserving and genuinely simpler—**MUST NOT** shuffle complexity.
24
+ - **MUST** invoke **`discover-security-issues`** on code-affecting scope; **MUST NOT** fabricate security issues not confirmed by that pass.
21
25
 
22
- ## Non-negotiable Review Rules
26
+ ## Standards (summary)
23
27
 
24
- - Read the full active change set before judging any design choice.
25
- - Discard authorship bias completely, including changes written earlier in the same conversation by this agent.
26
- - Judge the diff from a reviewer perspective: the burden of proof is on the code, not on the author's intent.
27
- - Prefer architecture and maintainability findings over style-only feedback.
28
- - Recommend abstraction only when it reduces duplication, clarifies ownership, or stabilizes boundaries.
29
- - Recommend simplification only when it preserves behavior while reducing complexity or ambiguity.
28
+ - **Evidence**: Full diff + minimum context reads to understand behavior.
29
+ - **Execution**: Git state baseline architecture simplification security integration report.
30
+ - **Quality**: Actionable, outsider perspective; clear merge of confirmed security results.
31
+ - **Output**: Scope, architecture findings, simplification findings, security cross-check summary, residual uncertainty.
30
32
 
31
33
  ## Workflow
32
34
 
33
- ### 1) Inspect the active git state
35
+ **Chain-of-thought:** **`Pause →`** after each block—no verdicts from partial file reads.
34
36
 
35
- - Run `git status -sb`, `git diff --stat`, and `git diff --cached --stat`.
36
- - If both staged and unstaged changes exist, review both and label which findings apply to each surface.
37
- - If there is no active diff, report `No active git change set to review` and stop.
37
+ ### 1) Inspect git state
38
38
 
39
- ### 2) Build a factual baseline
39
+ - `git status -sb`, `git diff --stat`, `git diff --cached --stat`; cover staged vs unstaged explicitly.
40
+ - No diff → `No active git change set to review` and stop.
41
+ - **Pause →** Am I about to review **only** unstaged while staged also ships?
40
42
 
41
- - Read every changed file end-to-end.
42
- - Read the minimum dependency chain needed to understand new helpers, moved logic, interfaces, and callers.
43
- - Reconstruct actual behavior from code, tests, configuration, and executable evidence only.
44
- - Ignore earlier planning context unless it is explicitly encoded in the repository.
43
+ ### 2) Baseline
45
44
 
46
- ### 3) Review architecture first
45
+ - Read every changed file E2E; pull in minimal callers/callees/config to interpret moves and interfaces.
46
+ - Behavior from **code, tests, config, execution**—not from chat memory.
47
+ - **Pause →** Can I quote **one concrete behavior** change this diff introduces—not intent?
47
48
 
48
- Check whether the diff introduces or preserves problems such as:
49
+ ### 3) Architecture first
49
50
 
50
- - duplicated workflows that should live behind one module or helper,
51
- - cross-layer leakage or ownership confusion,
52
- - helper placement that hides domain boundaries,
53
- - repeated condition trees or mapping logic that should be centralized,
54
- - unstable interfaces or parameter shapes that should be normalized.
51
+ Flag only if evidence-backed: duplicated workflows, cross-layer leakage, wrong helper ownership, repeated condition trees, unstable interfaces.
52
+ Each finding **MUST** name abstraction target **and** why current shape is weaker.
53
+ - **Pause →** Is this “different style” or a real **boundary** problem?
55
54
 
56
- Keep only findings that name the proposed abstraction target and explain why the current structure is weaker.
55
+ ### 4) Simplification second
57
56
 
58
- ### 4) Review simplification opportunities second
57
+ Redundant branches/wrappers, deep nesting, duplicated validation, oversize functions, dead compat—**only** if it truly reduces complexity.
58
+ - **Pause →** Would this refactor just **move** lines between files?
59
59
 
60
- Check whether the diff can be simplified through:
60
+ ### 5) Security cross-check
61
61
 
62
- - removing redundant branches, wrappers, or state,
63
- - flattening deeply nested control flow,
64
- - collapsing duplicated validation or conversion logic,
65
- - shrinking overly broad functions into clearer units,
66
- - deleting dead or no-longer-needed compatibility paths.
62
+ - Run **`discover-security-issues`** on the **same** code-affecting scope.
63
+ - Merge **confirmed** findings that affect safety of this structure; omit unconfirmed noise.
64
+ - **Pause →** Did I cite **their** severity + repro—or paraphrase fear?
67
65
 
68
- Do not recommend refactors that merely move complexity around.
66
+ ### 6) Report
69
67
 
70
- ### 5) Run the security cross-check
68
+ 1. **Scope** staged/unstaged; extra context paths read.
69
+ 2. **Architecture** — title, evidence (`path:line`), candidate, why weaker.
70
+ 3. **Simplification** — title, evidence, candidate, benefit.
71
+ 4. **Security cross-check** — confirmed items reused from **`discover-security-issues`**, relevance to this diff.
72
+ 5. **Residual uncertainty** — hypotheses / follow-up checks.
71
73
 
72
- - Invoke `harden-app-security` on the same code-affecting scope.
73
- - Integrate confirmed security findings into the final review when they materially affect the safety of the proposed structure.
74
- - Do not invent security concerns that the dependency did not confirm.
74
+ If nothing actionable: `No actionable abstraction or simplification finding identified` (security section still reflects cross-check outcome).
75
75
 
76
- ### 6) Report only actionable review output
76
+ ## Sample hints
77
77
 
78
- Deliver:
78
+ - **Staged only**: User ran `git add -p` → findings tagged **staged** vs **unstaged** separately.
79
+ - **Rename-heavy**: Read old→new path mapping before calling “duplication.”
80
+ - **Tiny diff**: One-file guard clause → architecture section may be empty; security pass still runs if code-affecting.
79
81
 
80
- 1. Review scope
81
- - staged / unstaged coverage
82
- - additional files read for context
83
- 2. Architecture findings
84
- - title
85
- - evidence (`path:line`)
86
- - abstraction candidate
87
- - why the current design is weaker
88
- 3. Simplification findings
89
- - title
90
- - evidence (`path:line`)
91
- - simplification candidate
92
- - expected benefit
93
- 4. Security cross-check
94
- - confirmed findings reused from `harden-app-security`
95
- - reason they matter to this diff review
96
- 5. Residual uncertainty
97
- - hypotheses or follow-up checks that were not confirmed
82
+ ## References
98
83
 
99
- If no actionable issue is found, report `No actionable abstraction or simplification finding identified`.
84
+ - **`discover-security-issues`**: confirmed adversarial findings for code-affecting scope.
@@ -1,4 +1,4 @@
1
1
  interface:
2
2
  display_name: "Review Change Set"
3
- short_description: "Review the active git diff for abstraction and simplification opportunities"
4
- default_prompt: "Use $review-change-set to read the active git change set end-to-end, discard any bias toward code written earlier in the conversation, review it like an independent reviewer for architecture-level abstraction and simplification opportunities, and run $harden-app-security as an adversarial cross-check for code-affecting changes."
3
+ short_description: "Independent diff review for architecture, simplification, and confirmed security cross-checks"
4
+ default_prompt: "Use $review-change-set to read the active git change set end-to-end, discard any bias toward code written earlier in the conversation, review it like an independent reviewer for architecture-level abstraction and simplification opportunities, and run $discover-security-issues as an adversarial cross-check for code-affecting changes."
@@ -9,7 +9,7 @@ This skill:
9
9
  1. Resolves the governing `docs/plans/...` spec scope from user input or recent repository changes.
10
10
  2. Checks whether each business goal and acceptance criterion is actually implemented.
11
11
  3. Treats unmet business goals as the most severe review findings.
12
- 4. Runs secondary code-practice review through `review-change-set`, `discover-edge-cases`, and `harden-app-security` for code-affecting scopes.
12
+ 4. Runs secondary code-practice review through `review-change-set`, `discover-edge-cases`, and `discover-security-issues` for code-affecting scopes.
13
13
  5. Reports business-goal gaps separately from edge-case, security, and maintainability findings.
14
14
 
15
15
  ## When to use
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  name: review-spec-related-changes
3
3
  description: >-
4
- Read-only spec compliance versus governing docs/plans: score each business-oriented requirement Met/Partial/Not-met using code/tests/commands—checked `tasks.md` boxes are never sufficient proof; ambiguity between two plausible plan roots halts execution; when runtime code exists, sequentially run **`review-change-set`**, **`discover-edge-cases`**, and **`harden-app-security`** on the same scoped diff afterward.
4
+ Read-only spec compliance versus governing docs/plans: score each business-oriented requirement Met/Partial/Not-met using code/tests/commands—checked `tasks.md` boxes are never sufficient proof; ambiguity between two plausible plan roots halts execution; when runtime code exists, sequentially run **`review-change-set`**, **`discover-edge-cases`**, and **`discover-security-issues`** on the same scoped diff afterward.
5
5
  Use for questions like “does this PR satisfy coordination.md + spec.md R2?” or user pins a `{change}` folder.
6
6
  Do not mutate repositories, reorder reports to bury missing goals, skip the tertiary review bundle on code-bearing diffs, or rely on intent without file evidence **BAD**, lead with refactor comments while R1 failing **FORBIDDEN**… GOOD pair every Not-met cite with `spec.md` ref + concrete path:test gap…
7
7
  ---
@@ -10,7 +10,7 @@ description: >-
10
10
 
11
11
  ## Dependencies
12
12
 
13
- - Required: `review-change-set`, `discover-edge-cases`, and `harden-app-security` whenever the scope includes **code-affecting** implementation to assess.
13
+ - Required: `review-change-set`, `discover-edge-cases`, and `discover-security-issues` whenever the scope includes **code-affecting** implementation to assess.
14
14
  - Conditional: none.
15
15
  - Optional: none.
16
16
  - Fallback: If any required dependency is unavailable for a **code-affecting** review, **MUST** stop and report the gap. **MUST NOT** emit a “full pass” verdict without those three passes when code is in scope.
@@ -22,7 +22,7 @@ description: >-
22
22
  - **MUST** resolve which spec set governs the change **before** concluding; if multiple candidates fit equally and cannot be disambiguated from repo evidence, **MUST** stop and report ambiguity—**MUST NOT** guess.
23
23
  - **MUST** classify each business goal / acceptance item as `Met`, `Partially met`, `Not met`, or `Deferred/N/A` **only** using verifiable evidence (code, tests, commands, traces)—checked boxes in `tasks.md` are **not** proof by themselves.
24
24
  - **MUST** treat **unmet or partially met required business goals** as **highest severity**. **MUST NOT** let edge-case, security, or style findings **outrank** those gaps in the reported order or implied priority.
25
- - **MUST** finish the business-goal verdict **before** invoking secondary skills; **MUST** still run `review-change-set`, `discover-edge-cases`, and `harden-app-security` on the **same** implementation scope when code is involved (after step 1 verdict is written).
25
+ - **MUST** finish the business-goal verdict **before** invoking secondary skills; **MUST** still run `review-change-set`, `discover-edge-cases`, and `discover-security-issues` on the **same** implementation scope when code is involved (after step 1 verdict is written).
26
26
  - **MUST NOT** rest conclusions on author intent, branch names, or chat memory unless **repository evidence** agrees.
27
27
  - Prefer **fewer confirmed findings** over broad speculation; unproven items belong under **Residual uncertainty**, not as faux defects.
28
28
 
@@ -61,7 +61,7 @@ description: >-
61
61
  - **Pause →** If I sorted findings by “interesting” instead of business impact, which line would unfairly rise above a missing goal?
62
62
  - **Pause →** For each `Partially met`, what single **missing proof** (test, wire-up, error path) am I naming explicitly?
63
63
 
64
- 4. **Secondary reviews (code-affecting)** — On the same scope: `review-change-set` (architecture/simplification), `discover-edge-cases` (reproducible edge/observability risks), `harden-app-security` (reproducible security). Keep outputs labeled so they do not read as business-goal substitutions.
64
+ 4. **Secondary reviews (code-affecting)** — On the same scope: `review-change-set` (architecture/simplification), `discover-edge-cases` (reproducible edge/observability risks), `discover-security-issues` (reproducible security). Keep outputs labeled so they do not read as business-goal substitutions.
65
65
  - **Pause →** Does this secondary finding **force** a business re-score—if yes, did I revise step 3 before publishing?
66
66
  - **Pause →** Is the diff scope identical to what I used for business mapping (no silent file creep)?
67
67
 
@@ -1,4 +1,4 @@
1
1
  interface:
2
2
  display_name: "Review Spec Related Changes"
3
3
  short_description: "Review spec-backed changes for business-goal completion and secondary code-practice risks"
4
- default_prompt: "Use $review-spec-related-changes to resolve the recent or user-specified spec documents, verify each business goal and acceptance criterion against the related implementation evidence, treat unmet business goals as the most severe findings, and then run $review-change-set, $discover-edge-cases, and $harden-app-security on the same code-affecting scope for secondary code-practice review."
4
+ default_prompt: "Use $review-spec-related-changes to resolve the recent or user-specified spec documents, verify each business goal and acceptance criterion against the related implementation evidence, treat unmet business goals as the most severe findings, and then run $review-change-set, $discover-edge-cases, and $discover-security-issues on the same code-affecting scope for secondary code-practice review."
@@ -8,7 +8,7 @@ Fix issues discovered during a review pass, proceeding from the highest-severity
8
8
  $solve-issues-found-during-review
9
9
  ```
10
10
 
11
- Provide a review report (from `review-change-set`, `review-spec-related-changes`, `review-codebases`, `discover-edge-cases`, `harden-app-security`, or any structured review) and this skill will:
11
+ Provide a review report (from `review-change-set`, `review-spec-related-changes`, `review-codebases`, `discover-edge-cases`, `discover-security-issues`, or any structured review) and this skill will:
12
12
 
13
13
  1. Read and prioritize all findings by severity
14
14
  2. Fix each finding from Critical down to Low
@@ -1,9 +1,9 @@
1
1
  ---
2
2
  name: solve-issues-found-during-review
3
3
  description: >-
4
- Operate strictly from a structured review/issue list containing confirmed findings: close items in descending severity order (Critical before High/Medium/Low), land the smallest corrective diff per finding, run targeted validation after each fix before continuing, forbid speculative polish or unsolicited doc edits unless a finding explicitly requires them, and document Deferred or Could-not-reproduce outcomes with reproducible rationale.
5
- Use when prompts reference concrete review outputs (“fix Bugbot findings”, “resolve security audit bullets”) accompanied by reproducible excerpts—STOP if only vague “there were issues yesterday” survives.
6
- Bad pattern: refactoring modules while unresolved Critical SSRF persists… Good pattern: `HIGH SSRF src/net/client.rs…` patched, `cargo test net::fetch` green, hashes recorded…
4
+ From a confirmed finding list: fix in severity order (CriticalLow) with minimal patches, validate after each item, forbid speculative polish; document Deferred/CNR with evidence.
5
+ Done only when code matches governing specs/plans where they apply and security, edge-case, and other inbound review findings are fixed/verified with nothing material open.
6
+ Use for concrete review excerpts; STOP if vague. Bad: refactor while Critical SSRF open. Good: minimal patch, tests green, evidence cited.
7
7
  ---
8
8
 
9
9
  # Solve Issues Found During Review
@@ -11,9 +11,9 @@ description: >-
11
11
  ## Dependencies
12
12
 
13
13
  - Required: none (caller **MUST** supply an existing review report or reconstructable finding list).
14
- - Conditional: `review-change-set` for optional re-validation after **code-affecting** fixes; `systematic-debug` when a fix causes unexpected test or runtime failures.
15
- - Optional: `discover-edge-cases` / `harden-app-security` when the user or report demands post-fix confirmation on those dimensions.
16
- - Fallback: If `review-change-set` is unavailable after code fixes, **MUST** still verify via targeted tests and `git diff` (or equivalent) and **MUST** document exactly what was run.
14
+ - Conditional: `review-spec-related-changes` when governing `docs/plans/...`, `spec.md`, `tasks.md`, contracts, or checklists bind the changed behavior—**MUST** satisfy **Completion criteria** §1 before declaring done; `review-change-set` for optional re-validation after **code-affecting** fixes; `systematic-debug` when a fix causes unexpected test or runtime failures; **`commit-and-push`** when the user requests **git commit** and/or **push** to persist fixes—**MUST** hand off that leg to **`commit-and-push`** (not bare `git commit` / ungated push).
15
+ - Conditional (completion gate): **`discover-security-issues`** / **`discover-edge-cases`** when the inbound material includes security or edge-case findings, or when completion requires proving those dimensions clean—rerun or equivalent scoped proof **MUST** show no remaining confirmed in-scope issue (see **Completion criteria** §2).
16
+ - Fallback: If `review-change-set` is unavailable after code fixes, **MUST** still verify via targeted tests and `git diff` (or equivalent) and **MUST** document exactly what was run. If the user requested **commit/push** and **`commit-and-push`** is unavailable, **MUST** stop and report.
17
17
 
18
18
  ## Non-negotiables
19
19
 
@@ -24,12 +24,21 @@ description: >-
24
24
  - This skill **defaults to product code**; **MUST NOT** edit specs, docs, or `AGENTS.md`/`CLAUDE.md` unless the **finding text** explicitly requires it.
25
25
  - If a finding cannot be reproduced after investigation, **MUST** record `Could not reproduce` with evidence and **MUST** continue the queue without silently dropping the item.
26
26
 
27
+ ## Completion criteria
28
+
29
+ Declare this workflow **finished** only when **both** clauses below hold. Partial closure of the finding queue is insufficient.
30
+
31
+ 1. **Specification conformance**: Every behavior touched by fixes **MUST** match the authoritative specification documents (`spec.md`, `tasks.md`, `checklist.md`, `contract.md`, governing `docs/plans/{change}` prose, plus any checklist items the caller names). **MUST** run **`review-spec-related-changes`** (or an equivalent checklist walk tied to cited requirement IDs plus tests/commands) whenever such docs exist or the user points at a plan path; cite **Met** (or repaired **Partial**) outcomes with file/test evidence in the closing report. If the caller asserts **no** binding spec for the scope, **MUST** state that assumption explicitly and anchor compliance to the issue/report text plus passing validation—**MUST NOT** silently invent spec obligations.
32
+ 2. **Ancillary reviews fully cleared**: Confirmed findings from **security audits**, **edge-case / hardening reviews**, and any other labeled review streams in the inbound package **MUST** reach **`Fixed`** (or documented **`Could not reproduce`** with reproducible rationale) **with** reruns or scoped proofs that show no remaining reproducible exploit or edge-case failure **in scope**. **MUST NOT** declare completion while Critical / High-class security issues or correctness-class edge regressions remain open. **`Deferred`** is incompatible with declaring completion unless the caller explicitly rescopes (“out of this pass”) **in writing** in the conversation; otherwise **MUST** keep working or stop with a blocker report listing what still fails completion §2.
33
+
34
+ `Could not reproduce` on a formerly cited line **counts** toward §2 cleared **only if** investigation evidence excludes stale reports; if reproducibility disagrees between spec §1 and a security/edge claim, **priority is correctness and safety**: resolve the conflict before completion.
35
+
27
36
  ## Standards (summary)
28
37
 
29
- - **Evidence**: Confirmed finding → code path → minimal patch → validation artifact.
30
- - **Execution**: Order by severity; optional parallel module groups only when isolation is real; merge without losing fix intent.
38
+ - **Evidence**: Confirmed finding → code path → minimal patch → validation artifact; closure adds spec traceability and ancillary-review clean signal.
39
+ - **Execution**: Order by severity; optional parallel module groups only when isolation is real; merge without losing fix intent; completion gates §1–§2 after the queue settles.
31
40
  - **Quality**: No speculative hardening; conflicts resolved conservatively unless the finding demands an aggressive change.
32
- - **Output**: Per-finding status, validation proof, final re-validation summary, residual/deferred items with reasons.
41
+ - **Output**: Per-finding status, validation proof, **completion-criteria checklist** (spec + ancillary reviews), final re-validation summary, residual/blockers only when completion is explicitly waived by caller rescope.
33
42
 
34
43
  ## Workflow
35
44
 
@@ -54,13 +63,16 @@ Sort into Critical → High → Medium → Low. Optionally group by **module** o
54
63
  ### 3) Full-scope re-validation
55
64
 
56
65
  After all findings are processed: run relevant tests over touched areas; if code changed and `review-change-set` is available, run it on the post-fix diff; capture `git diff --stat` (or equivalent). **MUST** confirm no confirmed finding remains open without a recorded reason (`Deferred`, `Could not reproduce`, etc.).
66
+ **Before** declaring the engagement complete: apply **Completion criteria**—**(§1)** spec/plan conformance evidence (`review-spec-related-changes` or equivalent cited requirement IDs + commands); **(§2)** reruns or scoped proofs so security / edge-case (and sibling) confirmed issues are **`Fixed`** or evidenced `Could not reproduce`, with nothing Critical/High-class left open unless the caller explicitly rescopes.
57
67
  - **Pause →** Would the **same** reviewer still see **actionable proof** closed for each `Fixed`, or did I rationalize failures away?
58
68
  - **Pause →** Did my consolidated diff sneak in **bonus** unrelated changes—if yes, peel them back?
69
+ - **Pause →** Would **§1 + §2** pass an external spot-check—is spec coverage documented and ancillary dimensions clean?
59
70
 
60
71
  ### 4) Report
61
72
 
62
- Deliver: (1) Summary by severity. (2) Per finding: `Fixed` / `Could not reproduce` / `Deferred` + location + validation evidence. (3) Final re-validation (review tool result if any, tests, diff stat). (4) Residual/deferred with reasons. (5) User-facing next checks before merge (manual QA, integration, etc.).
73
+ Deliver: (1) Summary by severity. (2) Per finding: `Fixed` / `Could not reproduce` / `Deferred` + location + validation evidence. (3) **Completion criteria block**: §1 spec conformance (tool or checklist + requirement IDs + commands); §2 security/edge-case (and other ancillary) closure with rerun evidence or explicit caller rescope for any intentional exception. (4) Final re-validation (review tool result if any, tests, diff stat). (5) Residual/deferred with reasons—if present, state whether completion was declared or blocked. (6) User-facing next checks before merge (manual QA, integration, etc.).
63
74
  - **Pause →** Could the user rerun **exactly one** cited command per `Fixed` to trust me—is that cited?
75
+ - **Pause →** Does the report prove **§1 + §2** without hand-waving?
64
76
 
65
77
  ## Notes
66
78
 
@@ -34,7 +34,7 @@ When the release includes code changes, `review-change-set` is still a condition
34
34
 
35
35
  Apply the same rule to every other conditional gate: if its scenario is met during release classification, it becomes blocking before version bumping, tagging, or release publication.
36
36
 
37
- That includes risk-driven review gates such as `discover-edge-cases` and `harden-app-security` whenever the release surface makes them applicable.
37
+ That includes risk-driven review gates such as `discover-edge-cases` and `discover-security-issues` whenever the release surface makes them applicable.
38
38
 
39
39
  Do not report release completion after only bumping versions or pushing a commit: the matching tag and GitHub release are part of done criteria unless the user explicitly says to skip publication.
40
40
 
@@ -10,7 +10,7 @@ description: >-
10
10
  ## Dependencies
11
11
 
12
12
  - Required: **`commit-and-push`** (shared inspect/classify/readiness/commit/push mechanics); **`submission-readiness-check`** **before** version files, tags, or publication mutate.
13
- - Conditional: **`archive-specs`** when specs/docs need alignment; **`review-change-set`** (+ **`discover-edge-cases`** / **`harden-app-security`** when risk triggers) on **code-affecting** release scope **before** version churn—blocking while findings open.
13
+ - Conditional: **`archive-specs`** when specs/docs need alignment; **`review-change-set`** (+ **`discover-edge-cases`** / **`discover-security-issues`** when risk triggers) on **code-affecting** release scope **before** version churn—blocking while findings open.
14
14
  - Optional: none.
15
15
  - Fallback: Missing required skill ⇒ stop and report.
16
16
 
@@ -26,7 +26,7 @@ description: >-
26
26
  - **MUST** verify **remote** has commit + tag before calling release **done**; **MUST NOT** trust UI git shortcuts.
27
27
  - **Done** = version files + changelog section + **pushed** commit + **remote** tag + **published** GitHub release (unless user explicitly skips publication—then say so).
28
28
 
29
- **Repository regression checks:** Before creating release metadata, inspect existing local and remote tags plus any existing GitHub Release for the target version so duplicates are caught early. Do not continue until you can state the current version, the intended next version, and the exact tag name that will be created. **`review-change-set` is required for code-affecting releases**—run `review-change-set` for the same release scope before continuing; treat unresolved review findings as blocking. Any conditional gate whose trigger is confirmed by this classification becomes mandatory before version bumping, tagging, or release publication. Treat every scenario-matched gate as blocking before versioning or release publication. **`discover-edge-cases` and `harden-app-security` are important review gates**—when their scenario is met, treat them as blocking review gates, not optional polish. Never stop after the release commit or tag alone; creating the matching GitHub release is part of done criteria unless the user explicitly says to skip release publication.
29
+ **Repository regression checks:** Before creating release metadata, inspect existing local and remote tags plus any existing GitHub Release for the target version so duplicates are caught early. Do not continue until you can state the current version, the intended next version, and the exact tag name that will be created. **`review-change-set` is required for code-affecting releases**—run `review-change-set` for the same release scope before continuing; treat unresolved review findings as blocking. Any conditional gate whose trigger is confirmed by this classification becomes mandatory before version bumping, tagging, or release publication. Treat every scenario-matched gate as blocking before versioning or release publication. **`discover-edge-cases` and `discover-security-issues` are important review gates**—when their scenario is met, treat them as blocking review gates, not optional polish. Never stop after the release commit or tag alone; creating the matching GitHub release is part of done criteria unless the user explicitly says to skip release publication.
30
30
 
31
31
  ## Standards (summary)
32
32
 
@@ -1,4 +1,4 @@
1
1
  interface:
2
2
  display_name: "Version Release"
3
3
  short_description: "Prepare a versioned release with bump, changelog, tag, GitHub release, and push"
4
- default_prompt: "Use $version-release only for explicit release/version/tag requests, including direct semver wording like patch/minor/major update or requests to trigger release-published automation: inspect the current repository state, read the current version plus existing tag/release state, and inspect root CHANGELOG.md Unreleased content. Treat every conditional gate whose scenario is met as blocking before any version bump, tag, or release step: if the release includes code changes, run $review-change-set; if the reviewed risk profile says edge-case or security review is needed, run $discover-edge-cases and $harden-app-security as blocking gates too; if completed specs should be converted or docs need normalization, ensure $archive-specs runs through $submission-readiness-check; if changelog synchronization is needed, complete it before continuing. Then run any additional required code-quality skills, hand the repository to $submission-readiness-check so completed plan archives, project docs, AGENTS.md/CLAUDE.md, and changelog readiness are settled before any version bump or tag, confirm CHANGELOG.md Unreleased is release-ready, update version files, cut the release directly from CHANGELOG.md Unreleased, create the release commit and matching tag, push commits and tags, and publish the matching GitHub release before reporting success."
4
+ default_prompt: "Use $version-release only for explicit release/version/tag requests, including direct semver wording like patch/minor/major update or requests to trigger release-published automation: inspect the current repository state, read the current version plus existing tag/release state, and inspect root CHANGELOG.md Unreleased content. Treat every conditional gate whose scenario is met as blocking before any version bump, tag, or release step: if the release includes code changes, run $review-change-set; if the reviewed risk profile says edge-case or security review is needed, run $discover-edge-cases and $discover-security-issues as blocking gates too; if completed specs should be converted or docs need normalization, ensure $archive-specs runs through $submission-readiness-check; if changelog synchronization is needed, complete it before continuing. Then run any additional required code-quality skills, hand the repository to $submission-readiness-check so completed plan archives, project docs, AGENTS.md/CLAUDE.md, and changelog readiness are settled before any version bump or tag, confirm CHANGELOG.md Unreleased is release-ready, update version files, cut the release directly from CHANGELOG.md Unreleased, create the release commit and matching tag, push commits and tags, and publish the matching GitHub release before reporting success."