@ryuenn3123/agentic-senior-core 3.0.50 → 4.0.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.agent-context/prompts/bootstrap-design.md +3 -1
- package/.agent-context/prompts/research-design.md +165 -0
- package/.agent-context/review-checklists/pr-checklist.md +1 -0
- package/.agent-context/rules/api-docs.md +63 -47
- package/.agent-context/rules/architecture.md +133 -120
- package/.agent-context/rules/database-design.md +36 -18
- package/.agent-context/rules/docker-runtime.md +66 -43
- package/.agent-context/rules/efficiency-vs-hype.md +38 -17
- package/.agent-context/rules/error-handling.md +35 -16
- package/.agent-context/rules/event-driven.md +35 -18
- package/.agent-context/rules/frontend-architecture.md +103 -76
- package/.agent-context/rules/git-workflow.md +81 -197
- package/.agent-context/rules/microservices.md +42 -41
- package/.agent-context/rules/naming-conv.md +27 -8
- package/.agent-context/rules/performance.md +32 -12
- package/.agent-context/rules/realtime.md +26 -9
- package/.agent-context/rules/security.md +39 -20
- package/.agent-context/rules/testing.md +36 -16
- package/AGENTS.md +21 -20
- package/README.md +10 -1
- package/lib/cli/commands/init.mjs +12 -0
- package/lib/cli/commands/upgrade.mjs +11 -0
- package/lib/cli/compiler.mjs +1 -0
- package/lib/cli/detector/constants.mjs +135 -0
- package/lib/cli/detector/design-evidence/collector.mjs +256 -0
- package/lib/cli/detector/design-evidence/constants.mjs +39 -0
- package/lib/cli/detector/design-evidence/file-traversal.mjs +83 -0
- package/lib/cli/detector/design-evidence/structured-attribute-evidence.mjs +117 -0
- package/lib/cli/detector/design-evidence/summary.mjs +109 -0
- package/lib/cli/detector/design-evidence/utility-helpers.mjs +122 -0
- package/lib/cli/detector/design-evidence.mjs +25 -610
- package/lib/cli/detector/stack-detection.mjs +243 -0
- package/lib/cli/detector/ui-signals.mjs +150 -0
- package/lib/cli/detector/workspace-scan.mjs +177 -0
- package/lib/cli/detector.mjs +20 -688
- package/lib/cli/memory-continuity.mjs +1 -0
- package/lib/cli/project-scaffolder/design-contract/research-dossier-migration.mjs +165 -0
- package/lib/cli/project-scaffolder/design-contract/sections/audits.mjs +96 -0
- package/lib/cli/project-scaffolder/design-contract/sections/conceptual-anchor.mjs +233 -0
- package/lib/cli/project-scaffolder/design-contract/sections/execution-handoff.mjs +211 -0
- package/lib/cli/project-scaffolder/design-contract/seed-signals.mjs +79 -0
- package/lib/cli/project-scaffolder/design-contract/signal-vocab.mjs +64 -0
- package/lib/cli/project-scaffolder/design-contract/validation/anchor-validators.mjs +456 -0
- package/lib/cli/project-scaffolder/design-contract/validation/audit-validators.mjs +117 -0
- package/lib/cli/project-scaffolder/design-contract/validation/completeness.mjs +83 -0
- package/lib/cli/project-scaffolder/design-contract/validation/execution-validators.mjs +328 -0
- package/lib/cli/project-scaffolder/design-contract/validation/helpers.mjs +8 -0
- package/lib/cli/project-scaffolder/design-contract/validation/research-dossier-validators.mjs +104 -0
- package/lib/cli/project-scaffolder/design-contract/validation/structural-validators.mjs +79 -0
- package/lib/cli/project-scaffolder/design-contract/validation/system-validators.mjs +256 -0
- package/lib/cli/project-scaffolder/design-contract/validation.mjs +61 -896
- package/lib/cli/project-scaffolder/design-contract.mjs +151 -556
- package/lib/cli/project-scaffolder/prompt-builders.mjs +9 -0
- package/mcp.json +30 -9
- package/package.json +17 -2
- package/scripts/audit-cache-layer-contract.mjs +258 -0
- package/scripts/audit-caching-scope-hygiene.mjs +263 -0
- package/scripts/audit-file-size.mjs +219 -0
- package/scripts/audit-reflection-citations.mjs +163 -0
- package/scripts/audit-release-bundle.mjs +170 -0
- package/scripts/audit-rule-id-uniqueness.mjs +313 -0
- package/scripts/benchmark-evidence-bundle.mjs +1 -0
- package/scripts/build-release-benchmark-bundle.mjs +204 -0
- package/scripts/context-triggered-audit.mjs +1 -0
- package/scripts/documentation-boundary-audit.mjs +1 -0
- package/scripts/explain-on-demand-audit.mjs +2 -1
- package/scripts/frontend-usability-audit.mjs +10 -10
- package/scripts/llm-judge/checklist-loader.mjs +45 -0
- package/scripts/llm-judge/constants.mjs +66 -0
- package/scripts/llm-judge/diff-collection.mjs +74 -0
- package/scripts/llm-judge/prompting.mjs +78 -0
- package/scripts/llm-judge/providers.mjs +111 -0
- package/scripts/llm-judge/verdict.mjs +134 -0
- package/scripts/llm-judge.mjs +21 -482
- package/scripts/mcp-server/tool-registry.mjs +55 -0
- package/scripts/mcp-server/tools.mjs +137 -1
- package/scripts/migrate-rule-format/id-prefix-table.mjs +37 -0
- package/scripts/migrate-rule-format/parse-legacy.mjs +180 -0
- package/scripts/migrate-rule-format/render-new.mjs +169 -0
- package/scripts/migrate-rule-format/roundtrip-validate.mjs +89 -0
- package/scripts/migrate-rule-format.mjs +192 -0
- package/scripts/release-gate/constants.mjs +1 -1
- package/scripts/release-gate/static-checks.mjs +1 -1
- package/scripts/rules-guardian-audit.mjs +5 -2
- package/scripts/single-source-lazy-loading-audit.mjs +2 -1
- package/scripts/ui-design-judge/git-input.mjs +3 -0
- package/scripts/validate/config.mjs +27 -2
- package/scripts/validate/coverage-checks.mjs +1 -1
- package/scripts/validate.mjs +94 -1
|
@@ -0,0 +1,170 @@
|
|
|
1
|
+
#!/usr/bin/env node
|
|
2
|
+
// @ts-check
|
|
3
|
+
|
|
4
|
+
/**
|
|
5
|
+
* audit-release-bundle.mjs
|
|
6
|
+
*
|
|
7
|
+
* Phase 5 Task 5.4 integrity gate. Validates that
|
|
8
|
+
* benchmarks/results/release-bundle-4.0.0.json exists, references real source
|
|
9
|
+
* artifacts, and that each recorded SHA-256 hash still matches the current
|
|
10
|
+
* file content. Wired into npm run validate.
|
|
11
|
+
*/
|
|
12
|
+
|
|
13
|
+
import { createHash } from 'node:crypto';
|
|
14
|
+
import { existsSync, readFileSync } from 'node:fs';
|
|
15
|
+
import { dirname, join, resolve } from 'node:path';
|
|
16
|
+
import { fileURLToPath } from 'node:url';
|
|
17
|
+
|
|
18
|
+
const SCRIPT_FILE_PATH = fileURLToPath(import.meta.url);
|
|
19
|
+
const REPOSITORY_ROOT = resolve(dirname(SCRIPT_FILE_PATH), '..');
|
|
20
|
+
const ARGS = new Set(process.argv.slice(2));
|
|
21
|
+
const JSON_ONLY = ARGS.has('--json');
|
|
22
|
+
|
|
23
|
+
const DEFAULT_BUNDLE_PATH = join(REPOSITORY_ROOT, 'benchmarks', 'results', 'release-bundle-4.0.0.json');
|
|
24
|
+
|
|
25
|
+
function sha256Hex(buffer) {
|
|
26
|
+
// Normalize CRLF -> LF before hashing so bundle integrity is reproducible
|
|
27
|
+
// across platforms (Windows working tree may be CRLF; CI checkouts are LF).
|
|
28
|
+
const normalized = buffer.toString('utf8').replace(/\r\n/g, '\n');
|
|
29
|
+
const hash = createHash('sha256');
|
|
30
|
+
hash.update(normalized, 'utf8');
|
|
31
|
+
return hash.digest('hex');
|
|
32
|
+
}
|
|
33
|
+
|
|
34
|
+
export function runReleaseBundleAudit(options = {}) {
|
|
35
|
+
const rootDir = options.rootDir ? resolve(String(options.rootDir)) : REPOSITORY_ROOT;
|
|
36
|
+
const bundlePath = options.bundlePath ? resolve(String(options.bundlePath)) : DEFAULT_BUNDLE_PATH;
|
|
37
|
+
const violations = [];
|
|
38
|
+
|
|
39
|
+
if (!existsSync(bundlePath)) {
|
|
40
|
+
violations.push({
|
|
41
|
+
kind: 'bundle.missing',
|
|
42
|
+
detail: `Release bundle is missing at ${bundlePath}. Run scripts/build-release-benchmark-bundle.mjs to regenerate.`,
|
|
43
|
+
});
|
|
44
|
+
return finalizeReport(violations, { bundlePath, artifactCount: 0 });
|
|
45
|
+
}
|
|
46
|
+
|
|
47
|
+
let parsed;
|
|
48
|
+
try {
|
|
49
|
+
parsed = JSON.parse(readFileSync(bundlePath, 'utf8'));
|
|
50
|
+
} catch (error) {
|
|
51
|
+
violations.push({
|
|
52
|
+
kind: 'bundle.invalid-json',
|
|
53
|
+
detail: `Release bundle is not valid JSON: ${error?.message || error}`,
|
|
54
|
+
});
|
|
55
|
+
return finalizeReport(violations, { bundlePath, artifactCount: 0 });
|
|
56
|
+
}
|
|
57
|
+
|
|
58
|
+
if (!Array.isArray(parsed.artifacts) || parsed.artifacts.length === 0) {
|
|
59
|
+
violations.push({
|
|
60
|
+
kind: 'bundle.empty',
|
|
61
|
+
detail: 'Release bundle artifacts array must be non-empty.',
|
|
62
|
+
});
|
|
63
|
+
return finalizeReport(violations, { bundlePath, artifactCount: 0 });
|
|
64
|
+
}
|
|
65
|
+
|
|
66
|
+
if (parsed.integrity?.hash_algorithm !== 'SHA-256') {
|
|
67
|
+
violations.push({
|
|
68
|
+
kind: 'bundle.unexpected-hash-algorithm',
|
|
69
|
+
detail: `Expected hash_algorithm "SHA-256", got "${parsed.integrity?.hash_algorithm}".`,
|
|
70
|
+
});
|
|
71
|
+
}
|
|
72
|
+
|
|
73
|
+
if (parsed.release_status !== 'release-candidate-unpublished' && parsed.release_status !== 'released') {
|
|
74
|
+
violations.push({
|
|
75
|
+
kind: 'bundle.invalid-release-status',
|
|
76
|
+
detail: `release_status must be either "release-candidate-unpublished" or "released"; got "${parsed.release_status}".`,
|
|
77
|
+
});
|
|
78
|
+
}
|
|
79
|
+
|
|
80
|
+
for (const artifact of parsed.artifacts) {
|
|
81
|
+
if (!artifact.relative_path || typeof artifact.relative_path !== 'string') {
|
|
82
|
+
violations.push({
|
|
83
|
+
kind: 'artifact.missing-relative-path',
|
|
84
|
+
detail: `Artifact "${artifact.artifact_id}" missing relative_path.`,
|
|
85
|
+
});
|
|
86
|
+
continue;
|
|
87
|
+
}
|
|
88
|
+
|
|
89
|
+
const absolutePath = join(rootDir, artifact.relative_path);
|
|
90
|
+
if (!existsSync(absolutePath)) {
|
|
91
|
+
violations.push({
|
|
92
|
+
kind: 'artifact.missing-file',
|
|
93
|
+
detail: `Artifact "${artifact.artifact_id}" references missing file at ${artifact.relative_path}.`,
|
|
94
|
+
});
|
|
95
|
+
continue;
|
|
96
|
+
}
|
|
97
|
+
|
|
98
|
+
if (!artifact.sha256 || typeof artifact.sha256 !== 'string') {
|
|
99
|
+
violations.push({
|
|
100
|
+
kind: 'artifact.missing-sha256',
|
|
101
|
+
detail: `Artifact "${artifact.artifact_id}" missing sha256 hash.`,
|
|
102
|
+
});
|
|
103
|
+
continue;
|
|
104
|
+
}
|
|
105
|
+
|
|
106
|
+
const currentHash = sha256Hex(readFileSync(absolutePath));
|
|
107
|
+
if (currentHash !== artifact.sha256) {
|
|
108
|
+
violations.push({
|
|
109
|
+
kind: 'artifact.hash-mismatch',
|
|
110
|
+
detail: `Artifact "${artifact.artifact_id}" sha256 drift: bundle records ${artifact.sha256}, current file is ${currentHash}. Regenerate the bundle via scripts/build-release-benchmark-bundle.mjs.`,
|
|
111
|
+
});
|
|
112
|
+
}
|
|
113
|
+
}
|
|
114
|
+
|
|
115
|
+
return finalizeReport(violations, {
|
|
116
|
+
bundlePath,
|
|
117
|
+
artifactCount: parsed.artifacts.length,
|
|
118
|
+
releaseTarget: parsed.release_target || null,
|
|
119
|
+
releaseStatus: parsed.release_status || null,
|
|
120
|
+
});
|
|
121
|
+
}
|
|
122
|
+
|
|
123
|
+
function finalizeReport(violations, extras) {
|
|
124
|
+
return {
|
|
125
|
+
auditName: 'audit-release-bundle',
|
|
126
|
+
reportVersion: '1.0.0',
|
|
127
|
+
generatedAt: new Date().toISOString(),
|
|
128
|
+
violationCount: violations.length,
|
|
129
|
+
passed: violations.length === 0,
|
|
130
|
+
violations,
|
|
131
|
+
...extras,
|
|
132
|
+
};
|
|
133
|
+
}
|
|
134
|
+
|
|
135
|
+
function main() {
|
|
136
|
+
const report = runReleaseBundleAudit();
|
|
137
|
+
|
|
138
|
+
if (JSON_ONLY) {
|
|
139
|
+
process.stdout.write(`${JSON.stringify(report, null, 2)}\n`);
|
|
140
|
+
process.exit(report.passed ? 0 : 1);
|
|
141
|
+
}
|
|
142
|
+
|
|
143
|
+
console.log('===============================================');
|
|
144
|
+
console.log(' audit:release-bundle');
|
|
145
|
+
console.log('===============================================');
|
|
146
|
+
console.log(` Bundle path: ${report.bundlePath}`);
|
|
147
|
+
console.log(` Artifact count: ${report.artifactCount}`);
|
|
148
|
+
console.log(` Release target: ${report.releaseTarget || '(missing)'}`);
|
|
149
|
+
console.log(` Release status: ${report.releaseStatus || '(missing)'}`);
|
|
150
|
+
console.log('');
|
|
151
|
+
|
|
152
|
+
if (report.passed) {
|
|
153
|
+
console.log(' Release bundle is intact. All artifact hashes match.');
|
|
154
|
+
process.stderr.write(`AUDIT_RELEASE_BUNDLE_REPORT: ${JSON.stringify({ passed: true, artifactCount: report.artifactCount })}\n`);
|
|
155
|
+
process.exit(0);
|
|
156
|
+
}
|
|
157
|
+
|
|
158
|
+
console.log(' Violations:');
|
|
159
|
+
for (const violation of report.violations) {
|
|
160
|
+
console.log(` [${violation.kind}] ${violation.detail}`);
|
|
161
|
+
}
|
|
162
|
+
console.log('');
|
|
163
|
+
console.log(` ${report.violationCount} violation(s) found.`);
|
|
164
|
+
process.stderr.write(`AUDIT_RELEASE_BUNDLE_REPORT: ${JSON.stringify({ passed: false, violationCount: report.violationCount })}\n`);
|
|
165
|
+
process.exit(1);
|
|
166
|
+
}
|
|
167
|
+
|
|
168
|
+
if (process.argv[1] && (import.meta.url === `file://${process.argv[1].replace(/\\/g, '/')}` || process.argv[1].endsWith('audit-release-bundle.mjs'))) {
|
|
169
|
+
main();
|
|
170
|
+
}
|
|
@@ -0,0 +1,313 @@
|
|
|
1
|
+
#!/usr/bin/env node
|
|
2
|
+
// @ts-check
|
|
3
|
+
|
|
4
|
+
/**
|
|
5
|
+
* audit-rule-id-uniqueness.mjs
|
|
6
|
+
*
|
|
7
|
+
* Phase 1 GATE B citability gate. Checks every migrated rule file under
|
|
8
|
+
* `.agent-context/rules/` for:
|
|
9
|
+
*
|
|
10
|
+
* 1. YAML frontmatter parses and contains required keys (id_prefix, domain,
|
|
11
|
+
* priority, scope, applies_to, keywords).
|
|
12
|
+
* 2. Section IDs match the file's locked id_prefix and are unique within
|
|
13
|
+
* the file.
|
|
14
|
+
* 3. Every `[REF:<PREFIX>-NNN]` mention across the rules pack, prompts/,
|
|
15
|
+
* and review-checklists/ resolves to a real section ID.
|
|
16
|
+
* 4. Every `related:` entry in any rule's frontmatter resolves to a real
|
|
17
|
+
* section ID.
|
|
18
|
+
* 5. No ambiguous prose references (`see above`, `as noted earlier`,
|
|
19
|
+
* `the next section`, etc.) survive in any rule body.
|
|
20
|
+
*
|
|
21
|
+
* Files that have not been migrated yet (no YAML frontmatter) are skipped
|
|
22
|
+
* with a notice. The audit only enforces shape on migrated files.
|
|
23
|
+
*
|
|
24
|
+
* Usage:
|
|
25
|
+
* node scripts/audit-rule-id-uniqueness.mjs (human + report line)
|
|
26
|
+
* node scripts/audit-rule-id-uniqueness.mjs --json (JSON only)
|
|
27
|
+
*
|
|
28
|
+
* Exit codes:
|
|
29
|
+
* 0 — clean
|
|
30
|
+
* 1 — at least one violation
|
|
31
|
+
*/
|
|
32
|
+
|
|
33
|
+
import { readdirSync, readFileSync, existsSync } from 'node:fs';
|
|
34
|
+
import { dirname, join, resolve } from 'node:path';
|
|
35
|
+
import { fileURLToPath } from 'node:url';
|
|
36
|
+
import { parse as parseYaml } from 'yaml';
|
|
37
|
+
|
|
38
|
+
const SCRIPT_FILE_PATH = fileURLToPath(import.meta.url);
|
|
39
|
+
const REPOSITORY_ROOT = resolve(dirname(SCRIPT_FILE_PATH), '..');
|
|
40
|
+
const RULES_DIRECTORY = join(REPOSITORY_ROOT, '.agent-context', 'rules');
|
|
41
|
+
const PROMPTS_DIRECTORY = join(REPOSITORY_ROOT, '.agent-context', 'prompts');
|
|
42
|
+
const REVIEW_CHECKLISTS_DIRECTORY = join(REPOSITORY_ROOT, '.agent-context', 'review-checklists');
|
|
43
|
+
|
|
44
|
+
const ARGS = new Set(process.argv.slice(2));
|
|
45
|
+
const JSON_ONLY = ARGS.has('--json');
|
|
46
|
+
|
|
47
|
+
const RULE_ID_PATTERN = /\b([A-Z]+)-(\d{3,4})(?:-([A-Z]))?\b/;
|
|
48
|
+
const REF_PATTERN = /\[REF:([A-Z]+-\d{3,4}(?:-[A-Z])?)\]/g;
|
|
49
|
+
const SECTION_HEADING_PATTERN = /^##\s+([A-Z]+-\d{3,4}(?:-[A-Z])?):\s+(.+)$/;
|
|
50
|
+
const REQUIRED_FRONTMATTER_KEYS = ['id_prefix', 'domain', 'priority', 'scope', 'applies_to', 'keywords'];
|
|
51
|
+
const FRONTMATTER_PATTERN = /^---\n([\s\S]*?)\n---\n/;
|
|
52
|
+
|
|
53
|
+
const AMBIGUOUS_PROSE_REFERENCE_PATTERNS = [
|
|
54
|
+
/\bsee above\b/i,
|
|
55
|
+
/\bsee below\b/i,
|
|
56
|
+
/\bas noted earlier\b/i,
|
|
57
|
+
/\bas noted above\b/i,
|
|
58
|
+
/\bas mentioned earlier\b/i,
|
|
59
|
+
/\bas mentioned above\b/i,
|
|
60
|
+
/\bin the previous section\b/i,
|
|
61
|
+
/\bin the next section\b/i,
|
|
62
|
+
/\bthe next section\b/i,
|
|
63
|
+
/\bthe previous section\b/i,
|
|
64
|
+
/\bsee earlier\b/i,
|
|
65
|
+
/\bsee later\b/i,
|
|
66
|
+
];
|
|
67
|
+
|
|
68
|
+
function listRuleFiles() {
|
|
69
|
+
return readdirSync(RULES_DIRECTORY)
|
|
70
|
+
.filter((filename) => filename.endsWith('.md') && !filename.endsWith('.candidate.md'))
|
|
71
|
+
.sort()
|
|
72
|
+
.map((filename) => ({ filename, absolutePath: join(RULES_DIRECTORY, filename) }));
|
|
73
|
+
}
|
|
74
|
+
|
|
75
|
+
function parseFrontmatter(sourceText) {
|
|
76
|
+
const match = sourceText.match(FRONTMATTER_PATTERN);
|
|
77
|
+
if (!match) return null;
|
|
78
|
+
try {
|
|
79
|
+
return parseYaml(match[1]);
|
|
80
|
+
} catch {
|
|
81
|
+
return null;
|
|
82
|
+
}
|
|
83
|
+
}
|
|
84
|
+
|
|
85
|
+
function extractSectionIds(sourceText) {
|
|
86
|
+
const sectionIds = [];
|
|
87
|
+
for (const line of sourceText.split(/\r?\n/)) {
|
|
88
|
+
const match = line.match(SECTION_HEADING_PATTERN);
|
|
89
|
+
if (match) {
|
|
90
|
+
sectionIds.push({ id: match[1], title: match[2].trim() });
|
|
91
|
+
}
|
|
92
|
+
}
|
|
93
|
+
return sectionIds;
|
|
94
|
+
}
|
|
95
|
+
|
|
96
|
+
function findAmbiguousProseReferences(sourceText) {
|
|
97
|
+
const findings = [];
|
|
98
|
+
const lines = sourceText.split(/\r?\n/);
|
|
99
|
+
for (let lineIndex = 0; lineIndex < lines.length; lineIndex += 1) {
|
|
100
|
+
for (const pattern of AMBIGUOUS_PROSE_REFERENCE_PATTERNS) {
|
|
101
|
+
if (pattern.test(lines[lineIndex])) {
|
|
102
|
+
findings.push({ lineNumber: lineIndex + 1, snippet: lines[lineIndex].trim() });
|
|
103
|
+
break;
|
|
104
|
+
}
|
|
105
|
+
}
|
|
106
|
+
}
|
|
107
|
+
return findings;
|
|
108
|
+
}
|
|
109
|
+
|
|
110
|
+
function listMarkdownFilesIn(absoluteDirectoryPath) {
|
|
111
|
+
if (!existsSync(absoluteDirectoryPath)) return [];
|
|
112
|
+
return readdirSync(absoluteDirectoryPath)
|
|
113
|
+
.filter((filename) => filename.endsWith('.md'))
|
|
114
|
+
.map((filename) => join(absoluteDirectoryPath, filename));
|
|
115
|
+
}
|
|
116
|
+
|
|
117
|
+
function collectAllRefMentions() {
|
|
118
|
+
const mentions = [];
|
|
119
|
+
const candidatePaths = [
|
|
120
|
+
...listRuleFiles().map((entry) => entry.absolutePath),
|
|
121
|
+
...listMarkdownFilesIn(PROMPTS_DIRECTORY),
|
|
122
|
+
...listMarkdownFilesIn(REVIEW_CHECKLISTS_DIRECTORY),
|
|
123
|
+
];
|
|
124
|
+
for (const filePath of candidatePaths) {
|
|
125
|
+
const sourceText = readFileSync(filePath, 'utf8');
|
|
126
|
+
for (const match of sourceText.matchAll(REF_PATTERN)) {
|
|
127
|
+
mentions.push({ filePath, refId: match[1] });
|
|
128
|
+
}
|
|
129
|
+
}
|
|
130
|
+
return mentions;
|
|
131
|
+
}
|
|
132
|
+
|
|
133
|
+
export function runRuleIdUniquenessAudit() {
|
|
134
|
+
const violations = [];
|
|
135
|
+
const ruleFiles = listRuleFiles();
|
|
136
|
+
const allKnownSectionIds = new Set();
|
|
137
|
+
const migratedFileCount = { migrated: 0, skipped: 0 };
|
|
138
|
+
const perFile = [];
|
|
139
|
+
|
|
140
|
+
for (const { filename, absolutePath } of ruleFiles) {
|
|
141
|
+
const sourceText = readFileSync(absolutePath, 'utf8');
|
|
142
|
+
const frontmatter = parseFrontmatter(sourceText);
|
|
143
|
+
if (!frontmatter) {
|
|
144
|
+
migratedFileCount.skipped += 1;
|
|
145
|
+
perFile.push({ filename, status: 'skipped', reason: 'no-yaml-frontmatter' });
|
|
146
|
+
continue;
|
|
147
|
+
}
|
|
148
|
+
|
|
149
|
+
migratedFileCount.migrated += 1;
|
|
150
|
+
|
|
151
|
+
for (const requiredKey of REQUIRED_FRONTMATTER_KEYS) {
|
|
152
|
+
if (!(requiredKey in frontmatter)) {
|
|
153
|
+
violations.push({
|
|
154
|
+
file: filename,
|
|
155
|
+
kind: 'frontmatter.missing-key',
|
|
156
|
+
detail: `frontmatter is missing required key: ${requiredKey}`,
|
|
157
|
+
});
|
|
158
|
+
}
|
|
159
|
+
}
|
|
160
|
+
|
|
161
|
+
const idPrefix = frontmatter.id_prefix;
|
|
162
|
+
if (typeof idPrefix !== 'string' || idPrefix.length === 0) {
|
|
163
|
+
violations.push({ file: filename, kind: 'frontmatter.invalid-id-prefix', detail: 'id_prefix must be a non-empty string' });
|
|
164
|
+
perFile.push({ filename, status: 'failed', reason: 'invalid-id-prefix' });
|
|
165
|
+
continue;
|
|
166
|
+
}
|
|
167
|
+
|
|
168
|
+
const sections = extractSectionIds(sourceText);
|
|
169
|
+
const seenIdsInFile = new Set();
|
|
170
|
+
for (const section of sections) {
|
|
171
|
+
const idMatch = section.id.match(RULE_ID_PATTERN);
|
|
172
|
+
if (!idMatch || idMatch[1] !== idPrefix) {
|
|
173
|
+
violations.push({
|
|
174
|
+
file: filename,
|
|
175
|
+
kind: 'id.prefix-mismatch',
|
|
176
|
+
detail: `section id '${section.id}' does not match the file's id_prefix '${idPrefix}'`,
|
|
177
|
+
});
|
|
178
|
+
continue;
|
|
179
|
+
}
|
|
180
|
+
if (seenIdsInFile.has(section.id)) {
|
|
181
|
+
violations.push({
|
|
182
|
+
file: filename,
|
|
183
|
+
kind: 'id.duplicate',
|
|
184
|
+
detail: `section id '${section.id}' is reused within the same file`,
|
|
185
|
+
});
|
|
186
|
+
}
|
|
187
|
+
seenIdsInFile.add(section.id);
|
|
188
|
+
allKnownSectionIds.add(section.id);
|
|
189
|
+
}
|
|
190
|
+
|
|
191
|
+
const ambiguousProse = findAmbiguousProseReferences(sourceText);
|
|
192
|
+
for (const finding of ambiguousProse) {
|
|
193
|
+
violations.push({
|
|
194
|
+
file: filename,
|
|
195
|
+
kind: 'prose.ambiguous-reference',
|
|
196
|
+
detail: `line ${finding.lineNumber}: ${finding.snippet}`,
|
|
197
|
+
});
|
|
198
|
+
}
|
|
199
|
+
|
|
200
|
+
perFile.push({
|
|
201
|
+
filename,
|
|
202
|
+
status: 'audited',
|
|
203
|
+
idPrefix,
|
|
204
|
+
sectionCount: sections.length,
|
|
205
|
+
ambiguousProseCount: ambiguousProse.length,
|
|
206
|
+
knownSectionIdsInFile: sections.map((section) => section.id),
|
|
207
|
+
relatedRefs: (frontmatter.related && typeof frontmatter.related === 'object' && !Array.isArray(frontmatter.related))
|
|
208
|
+
? frontmatter.related
|
|
209
|
+
: null,
|
|
210
|
+
});
|
|
211
|
+
}
|
|
212
|
+
|
|
213
|
+
for (const fileEntry of perFile) {
|
|
214
|
+
if (fileEntry.status !== 'audited') continue;
|
|
215
|
+
if (!fileEntry.relatedRefs) continue;
|
|
216
|
+
for (const [parentId, relatedList] of Object.entries(fileEntry.relatedRefs)) {
|
|
217
|
+
if (!fileEntry.knownSectionIdsInFile.includes(parentId)) {
|
|
218
|
+
violations.push({
|
|
219
|
+
file: fileEntry.filename,
|
|
220
|
+
kind: 'related.parent-missing',
|
|
221
|
+
detail: `related map key '${parentId}' is not a section in this file`,
|
|
222
|
+
});
|
|
223
|
+
}
|
|
224
|
+
if (!Array.isArray(relatedList)) {
|
|
225
|
+
violations.push({
|
|
226
|
+
file: fileEntry.filename,
|
|
227
|
+
kind: 'related.malformed',
|
|
228
|
+
detail: `related[${parentId}] must be an array of <PREFIX>-NNN ids`,
|
|
229
|
+
});
|
|
230
|
+
continue;
|
|
231
|
+
}
|
|
232
|
+
for (const relatedId of relatedList) {
|
|
233
|
+
if (typeof relatedId !== 'string' || !RULE_ID_PATTERN.test(relatedId)) {
|
|
234
|
+
violations.push({
|
|
235
|
+
file: fileEntry.filename,
|
|
236
|
+
kind: 'related.malformed',
|
|
237
|
+
detail: `related[${parentId}] entry '${relatedId}' is not a valid <PREFIX>-NNN id`,
|
|
238
|
+
});
|
|
239
|
+
continue;
|
|
240
|
+
}
|
|
241
|
+
if (!allKnownSectionIds.has(relatedId)) {
|
|
242
|
+
violations.push({
|
|
243
|
+
file: fileEntry.filename,
|
|
244
|
+
kind: 'related.unresolved',
|
|
245
|
+
detail: `related[${parentId}] entry '${relatedId}' does not resolve to any section in the rules pack`,
|
|
246
|
+
});
|
|
247
|
+
}
|
|
248
|
+
}
|
|
249
|
+
}
|
|
250
|
+
}
|
|
251
|
+
|
|
252
|
+
const refMentions = collectAllRefMentions();
|
|
253
|
+
for (const mention of refMentions) {
|
|
254
|
+
if (!allKnownSectionIds.has(mention.refId)) {
|
|
255
|
+
violations.push({
|
|
256
|
+
file: mention.filePath.replace(REPOSITORY_ROOT, '').replace(/^[\\/]+/, ''),
|
|
257
|
+
kind: 'ref.unresolved',
|
|
258
|
+
detail: `[REF:${mention.refId}] does not resolve to any section in the rules pack`,
|
|
259
|
+
});
|
|
260
|
+
}
|
|
261
|
+
}
|
|
262
|
+
|
|
263
|
+
return {
|
|
264
|
+
auditName: 'audit-rule-id-uniqueness',
|
|
265
|
+
reportVersion: '1.0.0',
|
|
266
|
+
generatedAt: new Date().toISOString(),
|
|
267
|
+
migratedFileCount: migratedFileCount.migrated,
|
|
268
|
+
skippedFileCount: migratedFileCount.skipped,
|
|
269
|
+
knownSectionIdCount: allKnownSectionIds.size,
|
|
270
|
+
refMentionCount: refMentions.length,
|
|
271
|
+
perFile,
|
|
272
|
+
violationCount: violations.length,
|
|
273
|
+
violations,
|
|
274
|
+
passed: violations.length === 0,
|
|
275
|
+
};
|
|
276
|
+
}
|
|
277
|
+
|
|
278
|
+
function main() {
|
|
279
|
+
const report = runRuleIdUniquenessAudit();
|
|
280
|
+
|
|
281
|
+
if (JSON_ONLY) {
|
|
282
|
+
process.stdout.write(`${JSON.stringify(report, null, 2)}\n`);
|
|
283
|
+
process.exit(report.passed ? 0 : 1);
|
|
284
|
+
}
|
|
285
|
+
|
|
286
|
+
console.log('===============================================');
|
|
287
|
+
console.log(' audit:rule-id-uniqueness');
|
|
288
|
+
console.log('===============================================');
|
|
289
|
+
console.log(` Migrated rule files: ${report.migratedFileCount} of ${report.migratedFileCount + report.skippedFileCount} scanned`);
|
|
290
|
+
console.log(` Pre-migration files: ${report.skippedFileCount} (no YAML frontmatter, skipped)`);
|
|
291
|
+
console.log(` Known section IDs: ${report.knownSectionIdCount}`);
|
|
292
|
+
console.log(` [REF:...] mentions: ${report.refMentionCount}`);
|
|
293
|
+
console.log('');
|
|
294
|
+
|
|
295
|
+
if (report.violationCount === 0) {
|
|
296
|
+
console.log(' All migrated files clean. No prefix mismatches, duplicates, ambiguous prose references, or unresolved [REF:] / related: links.');
|
|
297
|
+
process.stderr.write(`AUDIT_RULE_ID_REPORT: ${JSON.stringify({ passed: true, ...{ migratedFileCount: report.migratedFileCount, knownSectionIdCount: report.knownSectionIdCount, refMentionCount: report.refMentionCount } })}\n`);
|
|
298
|
+
process.exit(0);
|
|
299
|
+
}
|
|
300
|
+
|
|
301
|
+
console.log(' Violations:');
|
|
302
|
+
for (const violation of report.violations) {
|
|
303
|
+
console.log(` [${violation.kind}] ${violation.file}: ${violation.detail}`);
|
|
304
|
+
}
|
|
305
|
+
console.log('');
|
|
306
|
+
console.log(` ${report.violationCount} violation(s) found. Phase 1 GATE B requires zero.`);
|
|
307
|
+
process.stderr.write(`AUDIT_RULE_ID_REPORT: ${JSON.stringify({ passed: false, violationCount: report.violationCount, kinds: [...new Set(report.violations.map((v) => v.kind))] })}\n`);
|
|
308
|
+
process.exit(1);
|
|
309
|
+
}
|
|
310
|
+
|
|
311
|
+
if (import.meta.url === `file://${process.argv[1].replace(/\\/g, '/')}` || process.argv[1].endsWith('audit-rule-id-uniqueness.mjs')) {
|
|
312
|
+
main();
|
|
313
|
+
}
|
|
@@ -0,0 +1,204 @@
|
|
|
1
|
+
#!/usr/bin/env node
|
|
2
|
+
// @ts-check
|
|
3
|
+
|
|
4
|
+
/**
|
|
5
|
+
* build-release-benchmark-bundle.mjs
|
|
6
|
+
*
|
|
7
|
+
* Phase 5 Task 5.4. Reads the locked benchmark artifacts produced in Phases
|
|
8
|
+
* 0-3 and emits a single release bundle that references each artifact by
|
|
9
|
+
* SHA-256 hash plus a non-marketing summary section. The script never
|
|
10
|
+
* regenerates Phase 0-3 numbers; it only references and hashes them.
|
|
11
|
+
*/
|
|
12
|
+
|
|
13
|
+
import { createHash } from 'node:crypto';
|
|
14
|
+
import { existsSync, readFileSync, writeFileSync } from 'node:fs';
|
|
15
|
+
import { dirname, join, resolve } from 'node:path';
|
|
16
|
+
import { fileURLToPath } from 'node:url';
|
|
17
|
+
|
|
18
|
+
const SCRIPT_FILE_PATH = fileURLToPath(import.meta.url);
|
|
19
|
+
const REPOSITORY_ROOT = resolve(dirname(SCRIPT_FILE_PATH), '..');
|
|
20
|
+
const ARGS = new Set(process.argv.slice(2));
|
|
21
|
+
const JSON_ONLY = ARGS.has('--json');
|
|
22
|
+
|
|
23
|
+
const SOURCE_ARTIFACTS = [
|
|
24
|
+
{
|
|
25
|
+
artifactId: 'phase-0-baseline',
|
|
26
|
+
relativePath: 'benchmarks/results/baseline-2026-05-16.json',
|
|
27
|
+
role: 'token-baseline',
|
|
28
|
+
description: 'Phase 0 token-usage baseline measured across providers using free count-tokens APIs and tiktoken estimates.',
|
|
29
|
+
},
|
|
30
|
+
{
|
|
31
|
+
artifactId: 'phase-2-cache',
|
|
32
|
+
relativePath: 'benchmarks/results/cache-phase-2-2026-05-16.json',
|
|
33
|
+
role: 'cache-simulation',
|
|
34
|
+
description: 'Phase 2 offline warm-cache simulation. Direct provider API integration mode; see docs/architecture/decisions-foundation.md D4 for the per-tool scope matrix.',
|
|
35
|
+
},
|
|
36
|
+
{
|
|
37
|
+
artifactId: 'phase-3-anti-halu',
|
|
38
|
+
relativePath: 'benchmarks/results/anti-halu-phase-3-2026-05-16.json',
|
|
39
|
+
role: 'anti-halu-benchmark',
|
|
40
|
+
description: 'Phase 3 offline provider-free anti-halu benchmark.',
|
|
41
|
+
},
|
|
42
|
+
{
|
|
43
|
+
artifactId: 'scorecard-2026-05-16',
|
|
44
|
+
relativePath: 'benchmarks/results/scorecard-2026-05-16.json',
|
|
45
|
+
role: 'supply-chain-snapshot',
|
|
46
|
+
description: 'Phase 5 Task 5.3 supply-chain snapshot. Scorecard CLI was not installed locally; fallback signals are documented honestly.',
|
|
47
|
+
},
|
|
48
|
+
];
|
|
49
|
+
|
|
50
|
+
function sha256Hex(buffer) {
|
|
51
|
+
// Normalize CRLF -> LF before hashing so bundle integrity is reproducible
|
|
52
|
+
// across platforms (Windows working tree may be CRLF; CI checkouts are LF).
|
|
53
|
+
const normalized = buffer.toString('utf8').replace(/\r\n/g, '\n');
|
|
54
|
+
const hash = createHash('sha256');
|
|
55
|
+
hash.update(normalized, 'utf8');
|
|
56
|
+
return hash.digest('hex');
|
|
57
|
+
}
|
|
58
|
+
|
|
59
|
+
function loadArtifact(rootDir, descriptor) {
|
|
60
|
+
const absolutePath = join(rootDir, descriptor.relativePath);
|
|
61
|
+
if (!existsSync(absolutePath)) {
|
|
62
|
+
return {
|
|
63
|
+
...descriptor,
|
|
64
|
+
status: 'missing',
|
|
65
|
+
sha256: null,
|
|
66
|
+
sizeBytes: 0,
|
|
67
|
+
summary: null,
|
|
68
|
+
};
|
|
69
|
+
}
|
|
70
|
+
const content = readFileSync(absolutePath);
|
|
71
|
+
const sha = sha256Hex(content);
|
|
72
|
+
let summary = null;
|
|
73
|
+
try {
|
|
74
|
+
const parsed = JSON.parse(content.toString('utf8'));
|
|
75
|
+
summary = summarizeArtifact(descriptor.role, parsed);
|
|
76
|
+
} catch {
|
|
77
|
+
summary = { error: 'artifact is not valid JSON' };
|
|
78
|
+
}
|
|
79
|
+
return {
|
|
80
|
+
...descriptor,
|
|
81
|
+
status: 'present',
|
|
82
|
+
sha256: sha,
|
|
83
|
+
sizeBytes: content.length,
|
|
84
|
+
summary,
|
|
85
|
+
};
|
|
86
|
+
}
|
|
87
|
+
|
|
88
|
+
function summarizeArtifact(role, parsed) {
|
|
89
|
+
if (!parsed || typeof parsed !== 'object') {
|
|
90
|
+
return null;
|
|
91
|
+
}
|
|
92
|
+
if (role === 'token-baseline') {
|
|
93
|
+
return {
|
|
94
|
+
report_version: parsed.report_version || null,
|
|
95
|
+
generated_at: parsed.generated_at || null,
|
|
96
|
+
provider_count: Array.isArray(parsed.providers) ? parsed.providers.length : null,
|
|
97
|
+
};
|
|
98
|
+
}
|
|
99
|
+
if (role === 'cache-simulation') {
|
|
100
|
+
const anthropicWithLoaded = Array.isArray(parsed.summary)
|
|
101
|
+
? parsed.summary.find((row) => row.provider === 'anthropic' && row.scenario === 'with_loaded_rules')
|
|
102
|
+
: null;
|
|
103
|
+
return {
|
|
104
|
+
report_version: parsed.report_version || null,
|
|
105
|
+
integration_mode: parsed.integration_mode || null,
|
|
106
|
+
fixture_count: parsed.fixture_count || null,
|
|
107
|
+
provider_count: parsed.provider_count || null,
|
|
108
|
+
anthropic_with_loaded_avg_total_input: anthropicWithLoaded?.average_total_input_tokens ?? null,
|
|
109
|
+
anthropic_with_loaded_avg_warm_read: anthropicWithLoaded?.average_warm_read_effective_tokens ?? null,
|
|
110
|
+
scope_caveat_present: typeof parsed.scope_caveat === 'string' && parsed.scope_caveat.length > 0,
|
|
111
|
+
};
|
|
112
|
+
}
|
|
113
|
+
if (role === 'anti-halu-benchmark') {
|
|
114
|
+
return {
|
|
115
|
+
reportVersion: parsed.reportVersion || null,
|
|
116
|
+
generatedAt: parsed.generatedAt || null,
|
|
117
|
+
passRatePercent: parsed.passRatePercent ?? null,
|
|
118
|
+
citationValidityRatePercent: parsed.citationValidityRatePercent ?? null,
|
|
119
|
+
fixtureCount: parsed.fixtureCount ?? null,
|
|
120
|
+
passedCount: parsed.passedCount ?? null,
|
|
121
|
+
failedCount: parsed.failedCount ?? null,
|
|
122
|
+
};
|
|
123
|
+
}
|
|
124
|
+
if (role === 'supply-chain-snapshot') {
|
|
125
|
+
return {
|
|
126
|
+
report_version: parsed.report_version || null,
|
|
127
|
+
status: parsed.status || null,
|
|
128
|
+
npm_audit_full: parsed.fallback_signals?.npm_audit_full || null,
|
|
129
|
+
lockfile_consistent: parsed.fallback_signals?.lockfile_consistent ?? null,
|
|
130
|
+
runtime_dependencies_count: parsed.fallback_signals?.runtime_dependencies_count ?? null,
|
|
131
|
+
};
|
|
132
|
+
}
|
|
133
|
+
return null;
|
|
134
|
+
}
|
|
135
|
+
|
|
136
|
+
export function buildReleaseBenchmarkBundle(options = {}) {
|
|
137
|
+
const rootDir = options.rootDir ? resolve(String(options.rootDir)) : REPOSITORY_ROOT;
|
|
138
|
+
const artifacts = SOURCE_ARTIFACTS.map((descriptor) => loadArtifact(rootDir, descriptor));
|
|
139
|
+
const missingArtifacts = artifacts.filter((artifact) => artifact.status === 'missing');
|
|
140
|
+
|
|
141
|
+
return {
|
|
142
|
+
bundle_version: '1.0.0',
|
|
143
|
+
release_target: '4.0.0',
|
|
144
|
+
release_status: 'released',
|
|
145
|
+
generated_at: new Date().toISOString(),
|
|
146
|
+
description: 'Phase 5 release benchmark bundle. References Phase 0-3 locked artifacts plus the Phase 5 supply-chain snapshot. No artifact is regenerated by this bundle. Artifact integrity is verified by SHA-256 hash via scripts/audit-release-bundle.mjs.',
|
|
147
|
+
sources: {
|
|
148
|
+
research_foundation: 'docs/architecture/decisions-foundation.md',
|
|
149
|
+
d4_caching_scope_matrix: 'docs/architecture/decisions-foundation.md#d4',
|
|
150
|
+
caching_reporting_format: 'docs/benchmark-reference.md',
|
|
151
|
+
phase_2_outcome: 'docs/archive/phase-2-outcome.md',
|
|
152
|
+
phase_3_outcome: 'docs/archive/phase-3-outcome.md',
|
|
153
|
+
phase_5_plan: 'docs/archive/phase-5-hardening.md',
|
|
154
|
+
},
|
|
155
|
+
integrity: {
|
|
156
|
+
hash_algorithm: 'SHA-256',
|
|
157
|
+
missing_artifact_count: missingArtifacts.length,
|
|
158
|
+
missing_artifacts: missingArtifacts.map((artifact) => artifact.relativePath),
|
|
159
|
+
},
|
|
160
|
+
artifacts: artifacts.map((artifact) => ({
|
|
161
|
+
artifact_id: artifact.artifactId,
|
|
162
|
+
role: artifact.role,
|
|
163
|
+
relative_path: artifact.relativePath,
|
|
164
|
+
description: artifact.description,
|
|
165
|
+
status: artifact.status,
|
|
166
|
+
sha256: artifact.sha256,
|
|
167
|
+
size_bytes: artifact.sizeBytes,
|
|
168
|
+
summary: artifact.summary,
|
|
169
|
+
})),
|
|
170
|
+
};
|
|
171
|
+
}
|
|
172
|
+
|
|
173
|
+
function main() {
|
|
174
|
+
const bundle = buildReleaseBenchmarkBundle();
|
|
175
|
+
|
|
176
|
+
if (bundle.integrity.missing_artifact_count > 0) {
|
|
177
|
+
process.stderr.write(`build-release-benchmark-bundle: ${bundle.integrity.missing_artifact_count} artifact(s) missing: ${bundle.integrity.missing_artifacts.join(', ')}\n`);
|
|
178
|
+
process.exit(1);
|
|
179
|
+
}
|
|
180
|
+
|
|
181
|
+
const outputPath = join(REPOSITORY_ROOT, 'benchmarks', 'results', 'release-bundle-4.0.0.json');
|
|
182
|
+
writeFileSync(outputPath, `${JSON.stringify(bundle, null, 2)}\n`, 'utf8');
|
|
183
|
+
|
|
184
|
+
if (JSON_ONLY) {
|
|
185
|
+
process.stdout.write(`${JSON.stringify(bundle, null, 2)}\n`);
|
|
186
|
+
process.exit(0);
|
|
187
|
+
}
|
|
188
|
+
|
|
189
|
+
console.log('===============================================');
|
|
190
|
+
console.log(' build-release-benchmark-bundle');
|
|
191
|
+
console.log('===============================================');
|
|
192
|
+
console.log(` Release target: ${bundle.release_target}`);
|
|
193
|
+
console.log(` Release status: ${bundle.release_status}`);
|
|
194
|
+
console.log(` Artifact count: ${bundle.artifacts.length}`);
|
|
195
|
+
console.log(` Missing artifacts: ${bundle.integrity.missing_artifact_count}`);
|
|
196
|
+
console.log(` Output: benchmarks/results/release-bundle-4.0.0.json`);
|
|
197
|
+
console.log('');
|
|
198
|
+
console.log(' Bundle written. Run scripts/audit-release-bundle.mjs to verify integrity before release.');
|
|
199
|
+
process.exit(0);
|
|
200
|
+
}
|
|
201
|
+
|
|
202
|
+
if (process.argv[1] && (import.meta.url === `file://${process.argv[1].replace(/\\/g, '/')}` || process.argv[1].endsWith('build-release-benchmark-bundle.mjs'))) {
|
|
203
|
+
main();
|
|
204
|
+
}
|