@paths.design/caws-cli 8.0.1 → 8.1.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/commands/archive.d.ts +2 -1
- package/dist/commands/archive.d.ts.map +1 -1
- package/dist/commands/archive.js +114 -6
- package/dist/commands/burnup.d.ts.map +1 -1
- package/dist/commands/burnup.js +109 -10
- package/dist/commands/diagnose.js +1 -1
- package/dist/commands/mode.js +24 -14
- package/dist/commands/provenance.js +216 -93
- package/dist/commands/quality-gates.d.ts.map +1 -1
- package/dist/commands/quality-gates.js +3 -1
- package/dist/commands/specs.js +184 -6
- package/dist/commands/status.d.ts.map +1 -1
- package/dist/commands/status.js +134 -10
- package/dist/commands/templates.js +2 -2
- package/dist/error-handler.js +6 -98
- package/dist/generators/jest-config-generator.js +242 -0
- package/dist/index.js +4 -7
- package/dist/minimal-cli.js +3 -1
- package/dist/scaffold/claude-hooks.js +316 -0
- package/dist/scaffold/index.js +18 -0
- package/dist/templates/.claude/README.md +190 -0
- package/dist/templates/.claude/hooks/audit.sh +96 -0
- package/dist/templates/.claude/hooks/block-dangerous.sh +90 -0
- package/dist/templates/.claude/hooks/naming-check.sh +97 -0
- package/dist/templates/.claude/hooks/quality-check.sh +68 -0
- package/dist/templates/.claude/hooks/scan-secrets.sh +85 -0
- package/dist/templates/.claude/hooks/scope-guard.sh +105 -0
- package/dist/templates/.claude/hooks/validate-spec.sh +76 -0
- package/dist/templates/.claude/settings.json +95 -0
- package/dist/test-analysis.js +203 -10
- package/dist/utils/error-categories.js +210 -0
- package/dist/utils/quality-gates-utils.js +402 -0
- package/dist/utils/typescript-detector.js +36 -90
- package/dist/validation/spec-validation.js +59 -6
- package/package.json +5 -3
- package/templates/.claude/README.md +190 -0
- package/templates/.claude/hooks/audit.sh +96 -0
- package/templates/.claude/hooks/block-dangerous.sh +90 -0
- package/templates/.claude/hooks/naming-check.sh +97 -0
- package/templates/.claude/hooks/quality-check.sh +68 -0
- package/templates/.claude/hooks/scan-secrets.sh +85 -0
- package/templates/.claude/hooks/scope-guard.sh +105 -0
- package/templates/.claude/hooks/validate-spec.sh +76 -0
- package/templates/.claude/settings.json +95 -0
|
@@ -0,0 +1,90 @@
|
|
|
1
|
+
#!/bin/bash
|
|
2
|
+
# CAWS Dangerous Command Blocker for Claude Code
|
|
3
|
+
# Blocks potentially destructive shell commands
|
|
4
|
+
# @author @darianrosebrook
|
|
5
|
+
|
|
6
|
+
set -euo pipefail
|
|
7
|
+
|
|
8
|
+
# Read JSON input from Claude Code
|
|
9
|
+
INPUT=$(cat)
|
|
10
|
+
|
|
11
|
+
# Extract tool info
|
|
12
|
+
TOOL_NAME=$(echo "$INPUT" | jq -r '.tool_name // ""')
|
|
13
|
+
COMMAND=$(echo "$INPUT" | jq -r '.tool_input.command // ""')
|
|
14
|
+
|
|
15
|
+
# Only check Bash tool
|
|
16
|
+
if [[ "$TOOL_NAME" != "Bash" ]] || [[ -z "$COMMAND" ]]; then
|
|
17
|
+
exit 0
|
|
18
|
+
fi
|
|
19
|
+
|
|
20
|
+
# Dangerous command patterns
|
|
21
|
+
DANGEROUS_PATTERNS=(
|
|
22
|
+
# Destructive file operations
|
|
23
|
+
'rm -rf /'
|
|
24
|
+
'rm -rf ~'
|
|
25
|
+
'rm -rf \*'
|
|
26
|
+
'rm -rf \.'
|
|
27
|
+
'rm -rf /\*'
|
|
28
|
+
'dd if=/dev/zero'
|
|
29
|
+
'dd if=/dev/random'
|
|
30
|
+
'mkfs\.'
|
|
31
|
+
'fdisk'
|
|
32
|
+
'> /dev/sd'
|
|
33
|
+
|
|
34
|
+
# Fork bombs and resource exhaustion
|
|
35
|
+
':\(\)\{:\|:\&\};:'
|
|
36
|
+
'while true.*fork'
|
|
37
|
+
|
|
38
|
+
# Credential/secret exposure
|
|
39
|
+
'cat.*\.env'
|
|
40
|
+
'cat.*/etc/passwd'
|
|
41
|
+
'cat.*/etc/shadow'
|
|
42
|
+
'cat.*id_rsa'
|
|
43
|
+
'cat.*\.ssh/'
|
|
44
|
+
'cat.*credentials'
|
|
45
|
+
'cat.*\.aws/'
|
|
46
|
+
|
|
47
|
+
# Network exfiltration
|
|
48
|
+
'curl.*\|.*sh'
|
|
49
|
+
'wget.*\|.*sh'
|
|
50
|
+
'curl.*\|.*bash'
|
|
51
|
+
'wget.*\|.*bash'
|
|
52
|
+
|
|
53
|
+
# Permission escalation
|
|
54
|
+
'chmod 777'
|
|
55
|
+
'chmod -R 777'
|
|
56
|
+
'chmod.*\+s'
|
|
57
|
+
|
|
58
|
+
# History manipulation
|
|
59
|
+
'history -c'
|
|
60
|
+
'rm.*\.bash_history'
|
|
61
|
+
'rm.*\.zsh_history'
|
|
62
|
+
|
|
63
|
+
# System modification
|
|
64
|
+
'shutdown'
|
|
65
|
+
'reboot'
|
|
66
|
+
'init 0'
|
|
67
|
+
'init 6'
|
|
68
|
+
)
|
|
69
|
+
|
|
70
|
+
# Check command against dangerous patterns
|
|
71
|
+
for pattern in "${DANGEROUS_PATTERNS[@]}"; do
|
|
72
|
+
if echo "$COMMAND" | grep -qiE "$pattern"; then
|
|
73
|
+
# Output to stderr for Claude to see
|
|
74
|
+
echo "BLOCKED: Command matches dangerous pattern: $pattern" >&2
|
|
75
|
+
echo "Command was: $COMMAND" >&2
|
|
76
|
+
|
|
77
|
+
# Exit code 2 blocks the tool and shows stderr to Claude
|
|
78
|
+
exit 2
|
|
79
|
+
fi
|
|
80
|
+
done
|
|
81
|
+
|
|
82
|
+
# Check for sudo without specific allowed commands
|
|
83
|
+
if echo "$COMMAND" | grep -qE '^sudo\s' && ! echo "$COMMAND" | grep -qE 'sudo (npm|yarn|pnpm|brew|apt-get|apt|dnf|yum)'; then
|
|
84
|
+
echo "BLOCKED: sudo commands require explicit approval" >&2
|
|
85
|
+
echo "If this command is safe, please run it manually in your terminal" >&2
|
|
86
|
+
exit 2
|
|
87
|
+
fi
|
|
88
|
+
|
|
89
|
+
# Allow the command
|
|
90
|
+
exit 0
|
|
@@ -0,0 +1,97 @@
|
|
|
1
|
+
#!/bin/bash
|
|
2
|
+
# CAWS Naming Convention Check Hook for Claude Code
|
|
3
|
+
# Validates file naming against CAWS conventions
|
|
4
|
+
# @author @darianrosebrook
|
|
5
|
+
|
|
6
|
+
set -euo pipefail
|
|
7
|
+
|
|
8
|
+
# Read JSON input from Claude Code
|
|
9
|
+
INPUT=$(cat)
|
|
10
|
+
|
|
11
|
+
# Extract file path from PostToolUse input
|
|
12
|
+
FILE_PATH=$(echo "$INPUT" | jq -r '.tool_input.file_path // ""')
|
|
13
|
+
TOOL_NAME=$(echo "$INPUT" | jq -r '.tool_name // ""')
|
|
14
|
+
|
|
15
|
+
# Only check Write tool (new files)
|
|
16
|
+
if [[ "$TOOL_NAME" != "Write" ]]; then
|
|
17
|
+
exit 0
|
|
18
|
+
fi
|
|
19
|
+
|
|
20
|
+
if [[ -z "$FILE_PATH" ]]; then
|
|
21
|
+
exit 0
|
|
22
|
+
fi
|
|
23
|
+
|
|
24
|
+
# Get filename
|
|
25
|
+
FILENAME=$(basename "$FILE_PATH")
|
|
26
|
+
|
|
27
|
+
# Banned modifiers that indicate incomplete/temporary naming
|
|
28
|
+
BANNED_MODIFIERS=(
|
|
29
|
+
"enhanced"
|
|
30
|
+
"unified"
|
|
31
|
+
"simplified"
|
|
32
|
+
"better"
|
|
33
|
+
"new"
|
|
34
|
+
"next"
|
|
35
|
+
"final"
|
|
36
|
+
"copy"
|
|
37
|
+
"revamp"
|
|
38
|
+
"improved"
|
|
39
|
+
"alt"
|
|
40
|
+
"tmp"
|
|
41
|
+
"scratch"
|
|
42
|
+
"wip"
|
|
43
|
+
"test-"
|
|
44
|
+
"-test"
|
|
45
|
+
"_test"
|
|
46
|
+
"temp"
|
|
47
|
+
"old"
|
|
48
|
+
"backup"
|
|
49
|
+
)
|
|
50
|
+
|
|
51
|
+
# Convert filename to lowercase for checking
|
|
52
|
+
FILENAME_LOWER=$(echo "$FILENAME" | tr '[:upper:]' '[:lower:]')
|
|
53
|
+
|
|
54
|
+
# Check for banned modifiers
|
|
55
|
+
for modifier in "${BANNED_MODIFIERS[@]}"; do
|
|
56
|
+
if [[ "$FILENAME_LOWER" == *"$modifier"* ]]; then
|
|
57
|
+
# Special case: allow test files that follow conventions
|
|
58
|
+
if [[ "$modifier" == "test-" ]] || [[ "$modifier" == "-test" ]] || [[ "$modifier" == "_test" ]]; then
|
|
59
|
+
if [[ "$FILENAME_LOWER" =~ \.(test|spec)\.(js|ts|jsx|tsx|py|go|rs)$ ]]; then
|
|
60
|
+
continue
|
|
61
|
+
fi
|
|
62
|
+
fi
|
|
63
|
+
|
|
64
|
+
echo '{
|
|
65
|
+
"hookSpecificOutput": {
|
|
66
|
+
"hookEventName": "PostToolUse",
|
|
67
|
+
"additionalContext": "Warning: The filename '\'''"$FILENAME"''\'' contains the modifier '\'''"$modifier"''\'' which may indicate temporary or non-canonical naming. Consider using a more descriptive, permanent name. See CAWS naming conventions in .caws/canonical-map.yaml or run '\''caws naming check'\''."
|
|
68
|
+
}
|
|
69
|
+
}'
|
|
70
|
+
exit 0
|
|
71
|
+
fi
|
|
72
|
+
done
|
|
73
|
+
|
|
74
|
+
# Check for version suffixes (e.g., file-v2.js, file_v3.ts)
|
|
75
|
+
if [[ "$FILENAME_LOWER" =~ [-_]v[0-9]+\. ]]; then
|
|
76
|
+
echo '{
|
|
77
|
+
"hookSpecificOutput": {
|
|
78
|
+
"hookEventName": "PostToolUse",
|
|
79
|
+
"additionalContext": "Warning: The filename '\'''"$FILENAME"''\'' contains a version suffix. Version control should be handled by git, not file names. Consider removing the version suffix."
|
|
80
|
+
}
|
|
81
|
+
}'
|
|
82
|
+
exit 0
|
|
83
|
+
fi
|
|
84
|
+
|
|
85
|
+
# Check for date stamps (e.g., file-2024-01-15.js)
|
|
86
|
+
if [[ "$FILENAME_LOWER" =~ [0-9]{4}[-_][0-9]{2}[-_][0-9]{2} ]]; then
|
|
87
|
+
echo '{
|
|
88
|
+
"hookSpecificOutput": {
|
|
89
|
+
"hookEventName": "PostToolUse",
|
|
90
|
+
"additionalContext": "Warning: The filename '\'''"$FILENAME"''\'' contains a date stamp. Version control should be handled by git, not file names. Consider removing the date."
|
|
91
|
+
}
|
|
92
|
+
}'
|
|
93
|
+
exit 0
|
|
94
|
+
fi
|
|
95
|
+
|
|
96
|
+
# File naming is OK
|
|
97
|
+
exit 0
|
|
@@ -0,0 +1,68 @@
|
|
|
1
|
+
#!/bin/bash
|
|
2
|
+
# CAWS Quality Check Hook for Claude Code
|
|
3
|
+
# Runs CAWS quality validation after file edits
|
|
4
|
+
# @author @darianrosebrook
|
|
5
|
+
|
|
6
|
+
set -euo pipefail
|
|
7
|
+
|
|
8
|
+
# Read JSON input from Claude Code
|
|
9
|
+
INPUT=$(cat)
|
|
10
|
+
|
|
11
|
+
# Extract file info from PostToolUse input
|
|
12
|
+
FILE_PATH=$(echo "$INPUT" | jq -r '.tool_input.file_path // ""')
|
|
13
|
+
TOOL_NAME=$(echo "$INPUT" | jq -r '.tool_name // ""')
|
|
14
|
+
|
|
15
|
+
# Only run on Write/Edit of source files
|
|
16
|
+
if [[ "$TOOL_NAME" != "Write" ]] && [[ "$TOOL_NAME" != "Edit" ]]; then
|
|
17
|
+
exit 0
|
|
18
|
+
fi
|
|
19
|
+
|
|
20
|
+
# Skip non-source files and node_modules/dist
|
|
21
|
+
if [[ ! "$FILE_PATH" =~ \.(js|ts|jsx|tsx|py|go|rs|java|mjs|cjs)$ ]] || \
|
|
22
|
+
[[ "$FILE_PATH" =~ node_modules ]] || \
|
|
23
|
+
[[ "$FILE_PATH" =~ dist/ ]] || \
|
|
24
|
+
[[ "$FILE_PATH" =~ build/ ]]; then
|
|
25
|
+
exit 0
|
|
26
|
+
fi
|
|
27
|
+
|
|
28
|
+
# Determine project directory
|
|
29
|
+
PROJECT_DIR="${CLAUDE_PROJECT_DIR:-.}"
|
|
30
|
+
|
|
31
|
+
# Check if we're in a CAWS project
|
|
32
|
+
if [[ ! -f "$PROJECT_DIR/.caws/working-spec.yaml" ]]; then
|
|
33
|
+
exit 0
|
|
34
|
+
fi
|
|
35
|
+
|
|
36
|
+
# Check if CAWS CLI is available
|
|
37
|
+
if ! command -v caws &> /dev/null; then
|
|
38
|
+
# Suggest installing CAWS
|
|
39
|
+
echo '{
|
|
40
|
+
"hookSpecificOutput": {
|
|
41
|
+
"hookEventName": "PostToolUse",
|
|
42
|
+
"additionalContext": "CAWS CLI not available. Consider installing with: npm install -g @caws/cli"
|
|
43
|
+
}
|
|
44
|
+
}'
|
|
45
|
+
exit 0
|
|
46
|
+
fi
|
|
47
|
+
|
|
48
|
+
# Run CAWS quality gates in quiet mode for quick feedback
|
|
49
|
+
if caws quality-gates --context=commit --quiet 2>/dev/null; then
|
|
50
|
+
# Quality check passed - provide positive feedback
|
|
51
|
+
echo '{
|
|
52
|
+
"hookSpecificOutput": {
|
|
53
|
+
"hookEventName": "PostToolUse",
|
|
54
|
+
"additionalContext": "Quality gates passed for this change."
|
|
55
|
+
}
|
|
56
|
+
}'
|
|
57
|
+
else
|
|
58
|
+
# Quality check failed - provide feedback to Claude
|
|
59
|
+
# Run again to get violations summary
|
|
60
|
+
VIOLATIONS=$(caws quality-gates --context=commit --json 2>/dev/null | jq -r '.violations[:3] | .[] | "- \(.gate): \(.message)"' 2>/dev/null || echo "Run 'caws quality-gates' for details")
|
|
61
|
+
|
|
62
|
+
echo '{
|
|
63
|
+
"decision": "block",
|
|
64
|
+
"reason": "Quality gate violations detected. Please address the following issues before continuing:\n'"$VIOLATIONS"'\n\nRun '\''caws quality-gates'\'' for full details."
|
|
65
|
+
}'
|
|
66
|
+
fi
|
|
67
|
+
|
|
68
|
+
exit 0
|
|
@@ -0,0 +1,85 @@
|
|
|
1
|
+
#!/bin/bash
|
|
2
|
+
# CAWS Secret Scanner for Claude Code
|
|
3
|
+
# Warns when reading files that may contain secrets
|
|
4
|
+
# @author @darianrosebrook
|
|
5
|
+
|
|
6
|
+
set -euo pipefail
|
|
7
|
+
|
|
8
|
+
# Read JSON input from Claude Code
|
|
9
|
+
INPUT=$(cat)
|
|
10
|
+
|
|
11
|
+
# Extract file path
|
|
12
|
+
FILE_PATH=$(echo "$INPUT" | jq -r '.tool_input.file_path // ""')
|
|
13
|
+
|
|
14
|
+
if [[ -z "$FILE_PATH" ]]; then
|
|
15
|
+
exit 0
|
|
16
|
+
fi
|
|
17
|
+
|
|
18
|
+
# Get just the filename for pattern matching
|
|
19
|
+
FILENAME=$(basename "$FILE_PATH")
|
|
20
|
+
|
|
21
|
+
# Files that commonly contain secrets
|
|
22
|
+
SECRET_FILE_PATTERNS=(
|
|
23
|
+
'.env'
|
|
24
|
+
'.env.local'
|
|
25
|
+
'.env.production'
|
|
26
|
+
'.env.development'
|
|
27
|
+
'.env.*'
|
|
28
|
+
'credentials.json'
|
|
29
|
+
'service-account.json'
|
|
30
|
+
'secrets.yaml'
|
|
31
|
+
'secrets.yml'
|
|
32
|
+
'secrets.json'
|
|
33
|
+
'.netrc'
|
|
34
|
+
'.npmrc'
|
|
35
|
+
'.pypirc'
|
|
36
|
+
'id_rsa'
|
|
37
|
+
'id_ed25519'
|
|
38
|
+
'id_ecdsa'
|
|
39
|
+
'*.pem'
|
|
40
|
+
'*.key'
|
|
41
|
+
'*.p12'
|
|
42
|
+
'*.pfx'
|
|
43
|
+
'htpasswd'
|
|
44
|
+
'shadow'
|
|
45
|
+
)
|
|
46
|
+
|
|
47
|
+
# Directories that commonly contain secrets
|
|
48
|
+
SECRET_DIRS=(
|
|
49
|
+
'.ssh'
|
|
50
|
+
'.aws'
|
|
51
|
+
'.azure'
|
|
52
|
+
'.gcloud'
|
|
53
|
+
'.kube'
|
|
54
|
+
'.gnupg'
|
|
55
|
+
)
|
|
56
|
+
|
|
57
|
+
# Check if file matches secret patterns
|
|
58
|
+
for pattern in "${SECRET_FILE_PATTERNS[@]}"; do
|
|
59
|
+
if [[ "$FILENAME" == $pattern ]]; then
|
|
60
|
+
# Output JSON with warning for Claude
|
|
61
|
+
echo '{
|
|
62
|
+
"hookSpecificOutput": {
|
|
63
|
+
"hookEventName": "PreToolUse",
|
|
64
|
+
"additionalContext": "WARNING: This file may contain secrets. Do not include sensitive values in your response. If you need to reference credentials, use placeholders like <API_KEY> instead of actual values."
|
|
65
|
+
}
|
|
66
|
+
}'
|
|
67
|
+
exit 0
|
|
68
|
+
fi
|
|
69
|
+
done
|
|
70
|
+
|
|
71
|
+
# Check if file is in a sensitive directory
|
|
72
|
+
for dir in "${SECRET_DIRS[@]}"; do
|
|
73
|
+
if [[ "$FILE_PATH" == *"/$dir/"* ]] || [[ "$FILE_PATH" == *"/$dir" ]]; then
|
|
74
|
+
echo '{
|
|
75
|
+
"hookSpecificOutput": {
|
|
76
|
+
"hookEventName": "PreToolUse",
|
|
77
|
+
"additionalContext": "WARNING: This file is in a sensitive directory that may contain secrets. Do not include any sensitive values in your response."
|
|
78
|
+
}
|
|
79
|
+
}'
|
|
80
|
+
exit 0
|
|
81
|
+
fi
|
|
82
|
+
done
|
|
83
|
+
|
|
84
|
+
# Allow the read
|
|
85
|
+
exit 0
|
|
@@ -0,0 +1,105 @@
|
|
|
1
|
+
#!/bin/bash
|
|
2
|
+
# CAWS Scope Guard Hook for Claude Code
|
|
3
|
+
# Validates file edits against the working spec's scope boundaries
|
|
4
|
+
# @author @darianrosebrook
|
|
5
|
+
|
|
6
|
+
set -euo pipefail
|
|
7
|
+
|
|
8
|
+
# Read JSON input from Claude Code
|
|
9
|
+
INPUT=$(cat)
|
|
10
|
+
|
|
11
|
+
# Extract file path from PreToolUse input
|
|
12
|
+
FILE_PATH=$(echo "$INPUT" | jq -r '.tool_input.file_path // ""')
|
|
13
|
+
TOOL_NAME=$(echo "$INPUT" | jq -r '.tool_name // ""')
|
|
14
|
+
|
|
15
|
+
# Only check Write/Edit operations
|
|
16
|
+
if [[ "$TOOL_NAME" != "Write" ]] && [[ "$TOOL_NAME" != "Edit" ]]; then
|
|
17
|
+
exit 0
|
|
18
|
+
fi
|
|
19
|
+
|
|
20
|
+
if [[ -z "$FILE_PATH" ]]; then
|
|
21
|
+
exit 0
|
|
22
|
+
fi
|
|
23
|
+
|
|
24
|
+
PROJECT_DIR="${CLAUDE_PROJECT_DIR:-.}"
|
|
25
|
+
SPEC_FILE="$PROJECT_DIR/.caws/working-spec.yaml"
|
|
26
|
+
|
|
27
|
+
# Check if spec file exists
|
|
28
|
+
if [[ ! -f "$SPEC_FILE" ]]; then
|
|
29
|
+
exit 0
|
|
30
|
+
fi
|
|
31
|
+
|
|
32
|
+
# Get relative path from project root
|
|
33
|
+
REL_PATH=$(realpath --relative-to="$PROJECT_DIR" "$FILE_PATH" 2>/dev/null || echo "$FILE_PATH")
|
|
34
|
+
|
|
35
|
+
# Use Node.js to parse YAML and check scope
|
|
36
|
+
if command -v node >/dev/null 2>&1; then
|
|
37
|
+
SCOPE_CHECK=$(node -e "
|
|
38
|
+
const yaml = require('js-yaml');
|
|
39
|
+
const fs = require('fs');
|
|
40
|
+
const path = require('path');
|
|
41
|
+
|
|
42
|
+
try {
|
|
43
|
+
const spec = yaml.load(fs.readFileSync('$SPEC_FILE', 'utf8'));
|
|
44
|
+
const filePath = '$REL_PATH';
|
|
45
|
+
|
|
46
|
+
// Check if file is explicitly out of scope
|
|
47
|
+
const outOfScope = spec.scope?.out_of_scope || [];
|
|
48
|
+
for (const pattern of outOfScope) {
|
|
49
|
+
// Simple glob-like matching
|
|
50
|
+
const regex = new RegExp(pattern.replace(/\*/g, '.*').replace(/\?/g, '.'));
|
|
51
|
+
if (regex.test(filePath)) {
|
|
52
|
+
console.log('out_of_scope:' + pattern);
|
|
53
|
+
process.exit(0);
|
|
54
|
+
}
|
|
55
|
+
}
|
|
56
|
+
|
|
57
|
+
// Check if file is in scope (if scope is explicitly defined)
|
|
58
|
+
const inScope = spec.scope?.files || spec.scope?.directories || [];
|
|
59
|
+
if (inScope.length > 0) {
|
|
60
|
+
let found = false;
|
|
61
|
+
for (const pattern of inScope) {
|
|
62
|
+
const regex = new RegExp(pattern.replace(/\*/g, '.*').replace(/\?/g, '.'));
|
|
63
|
+
if (regex.test(filePath)) {
|
|
64
|
+
found = true;
|
|
65
|
+
break;
|
|
66
|
+
}
|
|
67
|
+
}
|
|
68
|
+
if (!found) {
|
|
69
|
+
console.log('not_in_scope');
|
|
70
|
+
process.exit(0);
|
|
71
|
+
}
|
|
72
|
+
}
|
|
73
|
+
|
|
74
|
+
console.log('in_scope');
|
|
75
|
+
} catch (error) {
|
|
76
|
+
console.log('error:' + error.message);
|
|
77
|
+
}
|
|
78
|
+
" 2>&1)
|
|
79
|
+
|
|
80
|
+
if [[ "$SCOPE_CHECK" == out_of_scope:* ]]; then
|
|
81
|
+
PATTERN="${SCOPE_CHECK#out_of_scope:}"
|
|
82
|
+
echo '{
|
|
83
|
+
"hookSpecificOutput": {
|
|
84
|
+
"hookEventName": "PreToolUse",
|
|
85
|
+
"permissionDecision": "ask",
|
|
86
|
+
"permissionDecisionReason": "This file ('"$REL_PATH"') is marked as out-of-scope in the working spec (pattern: '"$PATTERN"'). Editing it may cause scope creep. Please confirm this edit is intentional."
|
|
87
|
+
}
|
|
88
|
+
}'
|
|
89
|
+
exit 0
|
|
90
|
+
fi
|
|
91
|
+
|
|
92
|
+
if [[ "$SCOPE_CHECK" == "not_in_scope" ]]; then
|
|
93
|
+
echo '{
|
|
94
|
+
"hookSpecificOutput": {
|
|
95
|
+
"hookEventName": "PreToolUse",
|
|
96
|
+
"permissionDecision": "ask",
|
|
97
|
+
"permissionDecisionReason": "This file ('"$REL_PATH"') is not in the defined scope of the working spec. Editing it may cause scope creep. Please confirm this edit is intentional."
|
|
98
|
+
}
|
|
99
|
+
}'
|
|
100
|
+
exit 0
|
|
101
|
+
fi
|
|
102
|
+
fi
|
|
103
|
+
|
|
104
|
+
# File is in scope or scope couldn't be checked - allow
|
|
105
|
+
exit 0
|
|
@@ -0,0 +1,76 @@
|
|
|
1
|
+
#!/bin/bash
|
|
2
|
+
# CAWS Spec Validation Hook for Claude Code
|
|
3
|
+
# Validates working-spec.yaml when it's edited
|
|
4
|
+
# @author @darianrosebrook
|
|
5
|
+
|
|
6
|
+
set -euo pipefail
|
|
7
|
+
|
|
8
|
+
# Read JSON input from Claude Code
|
|
9
|
+
INPUT=$(cat)
|
|
10
|
+
|
|
11
|
+
# Extract file path from PostToolUse input
|
|
12
|
+
FILE_PATH=$(echo "$INPUT" | jq -r '.tool_input.file_path // ""')
|
|
13
|
+
|
|
14
|
+
# Only validate CAWS YAML files
|
|
15
|
+
if [[ "$FILE_PATH" != *".caws/"* ]] || ([[ "$FILE_PATH" != *.yaml ]] && [[ "$FILE_PATH" != *.yml ]]); then
|
|
16
|
+
exit 0
|
|
17
|
+
fi
|
|
18
|
+
|
|
19
|
+
PROJECT_DIR="${CLAUDE_PROJECT_DIR:-.}"
|
|
20
|
+
|
|
21
|
+
# First, validate YAML syntax using Node.js if available
|
|
22
|
+
if command -v node >/dev/null 2>&1; then
|
|
23
|
+
YAML_CHECK=$(node -e "
|
|
24
|
+
try {
|
|
25
|
+
const yaml = require('js-yaml');
|
|
26
|
+
const fs = require('fs');
|
|
27
|
+
const content = fs.readFileSync('$FILE_PATH', 'utf8');
|
|
28
|
+
yaml.load(content);
|
|
29
|
+
console.log('valid');
|
|
30
|
+
} catch (error) {
|
|
31
|
+
console.error(error.message);
|
|
32
|
+
if (error.mark) {
|
|
33
|
+
console.error('Line: ' + (error.mark.line + 1) + ', Column: ' + (error.mark.column + 1));
|
|
34
|
+
}
|
|
35
|
+
process.exit(1);
|
|
36
|
+
}
|
|
37
|
+
" 2>&1)
|
|
38
|
+
|
|
39
|
+
if [ $? -ne 0 ]; then
|
|
40
|
+
echo '{
|
|
41
|
+
"decision": "block",
|
|
42
|
+
"reason": "YAML syntax error in spec file:\n'"$YAML_CHECK"'\n\nPlease fix the syntax before continuing. Common issues:\n- Check indentation (YAML uses 2 spaces)\n- Ensure arrays use consistent format\n- Remove duplicate keys"
|
|
43
|
+
}'
|
|
44
|
+
exit 0
|
|
45
|
+
fi
|
|
46
|
+
fi
|
|
47
|
+
|
|
48
|
+
# Run CAWS CLI validation if available
|
|
49
|
+
if command -v caws &> /dev/null; then
|
|
50
|
+
if VALIDATION=$(caws validate "$FILE_PATH" --quiet 2>&1); then
|
|
51
|
+
echo '{
|
|
52
|
+
"hookSpecificOutput": {
|
|
53
|
+
"hookEventName": "PostToolUse",
|
|
54
|
+
"additionalContext": "Spec validation passed. The specification is valid and complete."
|
|
55
|
+
}
|
|
56
|
+
}'
|
|
57
|
+
else
|
|
58
|
+
# Get suggestions
|
|
59
|
+
SUGGESTIONS=$(caws validate "$FILE_PATH" --suggestions 2>/dev/null | head -5 | tr '\n' ' ' || echo "Run 'caws validate --suggestions' for details")
|
|
60
|
+
|
|
61
|
+
echo '{
|
|
62
|
+
"decision": "block",
|
|
63
|
+
"reason": "Spec validation failed:\n'"$VALIDATION"'\n\nSuggestions:\n'"$SUGGESTIONS"'"
|
|
64
|
+
}'
|
|
65
|
+
fi
|
|
66
|
+
else
|
|
67
|
+
# Basic validation without CAWS CLI
|
|
68
|
+
echo '{
|
|
69
|
+
"hookSpecificOutput": {
|
|
70
|
+
"hookEventName": "PostToolUse",
|
|
71
|
+
"additionalContext": "CAWS CLI not available for full spec validation. Install with: npm install -g @caws/cli"
|
|
72
|
+
}
|
|
73
|
+
}'
|
|
74
|
+
fi
|
|
75
|
+
|
|
76
|
+
exit 0
|
|
@@ -0,0 +1,95 @@
|
|
|
1
|
+
{
|
|
2
|
+
"hooks": {
|
|
3
|
+
"PreToolUse": [
|
|
4
|
+
{
|
|
5
|
+
"matcher": "Bash",
|
|
6
|
+
"hooks": [
|
|
7
|
+
{
|
|
8
|
+
"type": "command",
|
|
9
|
+
"command": "\"$CLAUDE_PROJECT_DIR\"/.claude/hooks/block-dangerous.sh",
|
|
10
|
+
"timeout": 10
|
|
11
|
+
}
|
|
12
|
+
]
|
|
13
|
+
},
|
|
14
|
+
{
|
|
15
|
+
"matcher": "Read",
|
|
16
|
+
"hooks": [
|
|
17
|
+
{
|
|
18
|
+
"type": "command",
|
|
19
|
+
"command": "\"$CLAUDE_PROJECT_DIR\"/.claude/hooks/scan-secrets.sh",
|
|
20
|
+
"timeout": 10
|
|
21
|
+
}
|
|
22
|
+
]
|
|
23
|
+
},
|
|
24
|
+
{
|
|
25
|
+
"matcher": "Write|Edit",
|
|
26
|
+
"hooks": [
|
|
27
|
+
{
|
|
28
|
+
"type": "command",
|
|
29
|
+
"command": "\"$CLAUDE_PROJECT_DIR\"/.claude/hooks/scope-guard.sh",
|
|
30
|
+
"timeout": 10
|
|
31
|
+
}
|
|
32
|
+
]
|
|
33
|
+
}
|
|
34
|
+
],
|
|
35
|
+
"PostToolUse": [
|
|
36
|
+
{
|
|
37
|
+
"matcher": "Write|Edit",
|
|
38
|
+
"hooks": [
|
|
39
|
+
{
|
|
40
|
+
"type": "command",
|
|
41
|
+
"command": "\"$CLAUDE_PROJECT_DIR\"/.claude/hooks/quality-check.sh",
|
|
42
|
+
"timeout": 30
|
|
43
|
+
},
|
|
44
|
+
{
|
|
45
|
+
"type": "command",
|
|
46
|
+
"command": "\"$CLAUDE_PROJECT_DIR\"/.claude/hooks/validate-spec.sh",
|
|
47
|
+
"timeout": 15
|
|
48
|
+
},
|
|
49
|
+
{
|
|
50
|
+
"type": "command",
|
|
51
|
+
"command": "\"$CLAUDE_PROJECT_DIR\"/.claude/hooks/naming-check.sh",
|
|
52
|
+
"timeout": 10
|
|
53
|
+
},
|
|
54
|
+
{
|
|
55
|
+
"type": "command",
|
|
56
|
+
"command": "\"$CLAUDE_PROJECT_DIR\"/.claude/hooks/audit.sh tool-use",
|
|
57
|
+
"timeout": 5
|
|
58
|
+
}
|
|
59
|
+
]
|
|
60
|
+
},
|
|
61
|
+
{
|
|
62
|
+
"matcher": "Bash",
|
|
63
|
+
"hooks": [
|
|
64
|
+
{
|
|
65
|
+
"type": "command",
|
|
66
|
+
"command": "\"$CLAUDE_PROJECT_DIR\"/.claude/hooks/audit.sh tool-use",
|
|
67
|
+
"timeout": 5
|
|
68
|
+
}
|
|
69
|
+
]
|
|
70
|
+
}
|
|
71
|
+
],
|
|
72
|
+
"SessionStart": [
|
|
73
|
+
{
|
|
74
|
+
"hooks": [
|
|
75
|
+
{
|
|
76
|
+
"type": "command",
|
|
77
|
+
"command": "\"$CLAUDE_PROJECT_DIR\"/.claude/hooks/audit.sh session-start",
|
|
78
|
+
"timeout": 5
|
|
79
|
+
}
|
|
80
|
+
]
|
|
81
|
+
}
|
|
82
|
+
],
|
|
83
|
+
"Stop": [
|
|
84
|
+
{
|
|
85
|
+
"hooks": [
|
|
86
|
+
{
|
|
87
|
+
"type": "command",
|
|
88
|
+
"command": "\"$CLAUDE_PROJECT_DIR\"/.claude/hooks/audit.sh stop",
|
|
89
|
+
"timeout": 5
|
|
90
|
+
}
|
|
91
|
+
]
|
|
92
|
+
}
|
|
93
|
+
]
|
|
94
|
+
}
|
|
95
|
+
}
|