@su-record/vibe 2.4.34 → 2.4.35

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (102) hide show
  1. package/CLAUDE.md +345 -351
  2. package/LICENSE +21 -21
  3. package/README.md +210 -210
  4. package/agents/compounder.md +261 -261
  5. package/agents/diagrammer.md +178 -178
  6. package/agents/e2e-tester.md +266 -266
  7. package/agents/explorer.md +48 -48
  8. package/agents/implementer.md +53 -53
  9. package/agents/research/best-practices-agent.md +139 -139
  10. package/agents/research/codebase-patterns-agent.md +147 -147
  11. package/agents/research/framework-docs-agent.md +178 -178
  12. package/agents/research/security-advisory-agent.md +164 -164
  13. package/agents/review/architecture-reviewer.md +107 -107
  14. package/agents/review/complexity-reviewer.md +116 -116
  15. package/agents/review/data-integrity-reviewer.md +88 -88
  16. package/agents/review/git-history-reviewer.md +103 -103
  17. package/agents/review/performance-reviewer.md +86 -86
  18. package/agents/review/python-reviewer.md +150 -150
  19. package/agents/review/rails-reviewer.md +139 -139
  20. package/agents/review/react-reviewer.md +144 -144
  21. package/agents/review/security-reviewer.md +80 -80
  22. package/agents/review/simplicity-reviewer.md +140 -140
  23. package/agents/review/test-coverage-reviewer.md +116 -116
  24. package/agents/review/typescript-reviewer.md +127 -127
  25. package/agents/searcher.md +54 -54
  26. package/agents/simplifier.md +119 -119
  27. package/agents/tester.md +49 -49
  28. package/agents/ui-previewer.md +129 -129
  29. package/commands/vibe.analyze.md +260 -260
  30. package/commands/vibe.reason.md +223 -223
  31. package/commands/vibe.review.md +213 -213
  32. package/commands/vibe.run.md +931 -931
  33. package/commands/vibe.spec.md +442 -442
  34. package/commands/vibe.utils.md +101 -101
  35. package/commands/vibe.verify.md +282 -282
  36. package/dist/cli/collaborator.js +52 -52
  37. package/dist/cli/detect.js +32 -32
  38. package/dist/cli/index.js +137 -137
  39. package/dist/cli/index.js.map +1 -1
  40. package/dist/cli/llm.js +147 -147
  41. package/dist/cli/llm.js.map +1 -1
  42. package/dist/cli/setup.d.ts +1 -1
  43. package/dist/cli/setup.d.ts.map +1 -1
  44. package/dist/cli/setup.js +48 -54
  45. package/dist/cli/setup.js.map +1 -1
  46. package/dist/lib/MemoryManager.d.ts +4 -0
  47. package/dist/lib/MemoryManager.d.ts.map +1 -1
  48. package/dist/lib/MemoryManager.js +21 -2
  49. package/dist/lib/MemoryManager.js.map +1 -1
  50. package/dist/lib/PythonParser.js +108 -108
  51. package/dist/lib/gemini-api.d.ts +13 -3
  52. package/dist/lib/gemini-api.d.ts.map +1 -1
  53. package/dist/lib/gemini-api.js +198 -7
  54. package/dist/lib/gemini-api.js.map +1 -1
  55. package/dist/lib/gpt-api.d.ts +5 -4
  56. package/dist/lib/gpt-api.d.ts.map +1 -1
  57. package/dist/lib/gpt-api.js +168 -12
  58. package/dist/lib/gpt-api.js.map +1 -1
  59. package/dist/tools/memory/saveMemory.js +1 -1
  60. package/dist/tools/memory/saveMemory.js.map +1 -1
  61. package/dist/tools/reasoning/applyReasoningFramework.js +56 -56
  62. package/hooks/hooks.json +195 -195
  63. package/languages/dart-flutter.md +509 -0
  64. package/languages/go.md +396 -0
  65. package/languages/java-spring.md +586 -0
  66. package/languages/kotlin-android.md +491 -0
  67. package/languages/python-django.md +371 -0
  68. package/languages/python-fastapi.md +386 -0
  69. package/languages/rust.md +425 -0
  70. package/languages/swift-ios.md +516 -0
  71. package/languages/typescript-nextjs.md +441 -0
  72. package/languages/typescript-node.md +375 -0
  73. package/languages/typescript-nuxt.md +521 -0
  74. package/languages/typescript-react-native.md +446 -0
  75. package/languages/typescript-react.md +525 -0
  76. package/languages/typescript-vue.md +353 -0
  77. package/package.json +88 -87
  78. package/skills/context7-usage.md +82 -82
  79. package/skills/git-worktree.md +181 -181
  80. package/skills/multi-llm-orchestration.md +92 -92
  81. package/skills/parallel-research.md +77 -77
  82. package/skills/priority-todos.md +239 -239
  83. package/skills/tool-fallback.md +126 -126
  84. package/skills/vibe-capabilities.md +129 -129
  85. package/{.claude/vibe → vibe}/config.json +3 -3
  86. package/{.claude/vibe → vibe}/constitution.md +184 -184
  87. package/{.claude/vibe → vibe}/rules/core/communication-guide.md +104 -104
  88. package/{.claude/vibe → vibe}/rules/core/development-philosophy.md +52 -52
  89. package/{.claude/vibe → vibe}/rules/core/quick-start.md +120 -120
  90. package/{.claude/vibe → vibe}/rules/quality/bdd-contract-testing.md +388 -388
  91. package/{.claude/vibe → vibe}/rules/quality/checklist.md +276 -276
  92. package/{.claude/vibe → vibe}/rules/quality/testing-strategy.md +437 -437
  93. package/{.claude/vibe → vibe}/rules/standards/anti-patterns.md +369 -369
  94. package/{.claude/vibe → vibe}/rules/standards/code-structure.md +291 -291
  95. package/{.claude/vibe → vibe}/rules/standards/complexity-metrics.md +312 -312
  96. package/{.claude/vibe → vibe}/rules/standards/naming-conventions.md +198 -198
  97. package/{.claude/vibe → vibe}/setup.sh +31 -31
  98. package/{.claude/vibe → vibe}/templates/constitution-template.md +184 -184
  99. package/{.claude/vibe → vibe}/templates/contract-backend-template.md +517 -517
  100. package/{.claude/vibe → vibe}/templates/contract-frontend-template.md +594 -594
  101. package/{.claude/vibe → vibe}/templates/feature-template.md +96 -96
  102. package/{.claude/vibe → vibe}/templates/spec-template.md +199 -199
@@ -1,213 +1,213 @@
1
- ---
2
- description: Multi-agent parallel code review with priority-based findings
3
- argument-hint: "PR number, branch name, or file path"
4
- ---
5
-
6
- # /vibe.review
7
-
8
- **Parallel Agent Code Review** - 13+ specialists review simultaneously
9
-
10
- ## Usage
11
-
12
- ```
13
- /vibe.review # Review current branch
14
- /vibe.review PR#123 # Review specific PR
15
- /vibe.review feature/login # Review specific branch
16
- /vibe.review src/api/ # Review specific path
17
- ```
18
-
19
- ## Priority System
20
-
21
- | Priority | Criteria | Action |
22
- |----------|----------|--------|
23
- | P1 | Security vulnerabilities, data loss, crashes | Block merge, fix immediately |
24
- | P2 | Performance issues, architecture violations, missing tests | Fix before merge |
25
- | P3 | Style, refactoring suggestions, documentation | Add to backlog |
26
-
27
- ## Process
28
-
29
- ### Phase 1: Tech Stack Detection
30
-
31
- Detect project tech stack FIRST before launching reviewers:
32
-
33
- ```
34
- Read package.json -> TypeScript, React, Node.js
35
- Read pyproject.toml -> Python, FastAPI, Django
36
- Read Gemfile -> Ruby, Rails
37
- Read pubspec.yaml -> Flutter, Dart
38
- Read go.mod -> Go
39
- Read CLAUDE.md -> Explicit tech stack declaration
40
- ```
41
-
42
- ### Phase 2: Parallel Agent Review (STACK-AWARE) via Orchestrator
43
-
44
- **Execution via Orchestrator (12+ agents in parallel):**
45
- ```bash
46
- node -e "import('@su-record/vibe/orchestrator').then(o => o.review(['FILE_PATHS'], ['DETECTED_STACKS']).then(r => console.log(r.content[0].text)))"
47
- ```
48
-
49
- **Example:**
50
- ```bash
51
- # Review changed files with TypeScript + React stack
52
- node -e "import('@su-record/vibe/orchestrator').then(o => o.review(['src/api/users.ts', 'src/components/Login.tsx'], ['TypeScript', 'React']).then(r => console.log(r.content[0].text)))"
53
- ```
54
-
55
- **Core Reviewers (Always Run):**
56
- | Agent | Focus |
57
- |-------|-------|
58
- | security-reviewer | OWASP Top 10, vulnerabilities |
59
- | data-integrity-reviewer | Data validation, constraints |
60
- | performance-reviewer | N+1 queries, memory leaks |
61
- | architecture-reviewer | Layer violations, cycles |
62
- | complexity-reviewer | Cyclomatic complexity, length |
63
- | simplicity-reviewer | Over-abstraction, dead code |
64
- | git-history-reviewer | Churn files, risk patterns |
65
- | test-coverage-reviewer | Missing tests, edge cases |
66
-
67
- **Stack-Specific Reviewers (Conditional):**
68
- | Agent | Condition |
69
- |-------|-----------|
70
- | python-reviewer | .py files in diff |
71
- | typescript-reviewer | .ts/.tsx files OR tsconfig |
72
- | rails-reviewer | Gemfile has rails |
73
- | react-reviewer | package.json has react |
74
-
75
- ### Phase 3: Deep Analysis
76
-
77
- After agent results:
78
-
79
- 1. **System Context**: Component interactions, data flow, external dependencies
80
- 2. **Stakeholder Perspectives**: Developers, Ops, Security, Business
81
- 3. **Edge Cases**: Race conditions, resource exhaustion, network failures
82
- 4. **Multiple Angles**: Technical excellence, business value, risk management
83
-
84
- ### Phase 4: Findings Synthesis
85
-
86
- ```
87
- REVIEW FINDINGS
88
-
89
- P1 CRITICAL (Blocks Merge) - N issues
90
- 1. [SECURITY] SQL Injection in user query
91
- Location: src/api/users.py:42
92
- Fix: Use parameterized queries
93
-
94
- P2 IMPORTANT (Should Fix) - N issues
95
- 2. [PERF] N+1 query in user list
96
- 3. [ARCH] Circular dependency detected
97
-
98
- P3 NICE-TO-HAVE (Enhancement) - N issues
99
- 4. [STYLE] Consider extracting helper function
100
- ```
101
-
102
- ### Phase 5: Todo File Creation
103
-
104
- Save findings to `.claude/vibe/todos/`:
105
-
106
- ```
107
- {priority}-{category}-{short-desc}.md
108
-
109
- Examples:
110
- - P1-security-sql-injection.md
111
- - P2-perf-n1-query.md
112
- - P3-style-extract-helper.md
113
- ```
114
-
115
- ## Output
116
-
117
- ```
118
- CODE REVIEW SUMMARY
119
- PR #123: Add user authentication
120
-
121
- Reviewers: 13 agents | Duration: 45s
122
-
123
- Score: 72/100 (Needs Work)
124
-
125
- Issues Found:
126
- - P1 Critical: 2 (BLOCKS MERGE)
127
- - P2 Important: 5
128
- - P3 Nice-to-have: 3
129
-
130
- By Category:
131
- - Security: 2
132
- - Performance: 3
133
- - Architecture: 1
134
- - Testing: 2
135
- - Style: 2
136
-
137
- Todos created: .claude/vibe/todos/ (10 files)
138
-
139
- MERGE BLOCKED - Fix P1 issues first
140
-
141
- Next Steps:
142
- 1. Fix P1-security-sql-injection.md
143
- 2. Fix P1-data-transaction-rollback.md
144
- 3. Re-run: /vibe.review
145
- ```
146
-
147
- ### Phase 6: Guide to Fix Workflow
148
-
149
- **Ask user to choose workflow** when fix is requested:
150
-
151
- ```
152
- ## Fix Workflow
153
-
154
- 발견된 이슈를 수정하려면 워크플로우를 선택하세요:
155
-
156
- | 작업 규모 | 권장 방식 |
157
- |----------|----------|
158
- | 간단한 수정 (1-2 파일) | Plan Mode |
159
- | 복잡한 수정 (3+ 파일, 검증 필요) | /vibe.spec |
160
-
161
- 1. `/vibe.spec "fix: issue-name"` - VIBE 워크플로우 (SPEC 검증 + 재리뷰)
162
- 2. Plan Mode - 빠른 수정 (간단한 작업용)
163
-
164
- 어떤 방식으로 진행할까요?
165
- ```
166
-
167
- - Wait for user's choice before proceeding
168
- - If user chooses VIBE → wait for `/vibe.spec` command
169
- - If user chooses Plan Mode → proceed with EnterPlanMode
170
-
171
- ## Vibe Tools (Code Analysis)
172
-
173
- ### Tool Invocation
174
-
175
- All tools are called via:
176
-
177
- ```bash
178
- node -e "import('@su-record/vibe/tools').then(t => t.TOOL_NAME({...args}).then(r => console.log(r.content[0].text)))"
179
- ```
180
-
181
- ### Recommended Tools for Review
182
-
183
- | Tool | Purpose | When to Use |
184
- |------|---------|-------------|
185
- | `validateCodeQuality` | Code quality check | Overall code quality scan |
186
- | `analyzeComplexity` | Complexity metrics | Check function complexity |
187
- | `findSymbol` | Find definitions | Locate implementations |
188
- | `findReferences` | Find all usages | Track symbol usage |
189
- | `saveMemory` | Save findings | Store important review findings |
190
-
191
- ### Example Tool Usage in Review
192
-
193
- **1. Validate code quality before review:**
194
-
195
- ```bash
196
- node -e "import('@su-record/vibe/tools').then(t => t.validateCodeQuality({targetPath: 'src/', projectPath: process.cwd()}).then(r => console.log(r.content[0].text)))"
197
- ```
198
-
199
- **2. Analyze complexity of changed files:**
200
-
201
- ```bash
202
- node -e "import('@su-record/vibe/tools').then(t => t.analyzeComplexity({targetPath: 'src/api/users.ts', projectPath: process.cwd()}).then(r => console.log(r.content[0].text)))"
203
- ```
204
-
205
- **3. Save critical finding for reference:**
206
-
207
- ```bash
208
- node -e "import('@su-record/vibe/tools').then(t => t.saveMemory({key: 'review-pr123-critical', value: 'SQL injection in users.py:42', category: 'review', projectPath: process.cwd()}).then(r => console.log(r.content[0].text)))"
209
- ```
210
-
211
- ---
212
-
213
- ARGUMENTS: $ARGUMENTS
1
+ ---
2
+ description: Multi-agent parallel code review with priority-based findings
3
+ argument-hint: "PR number, branch name, or file path"
4
+ ---
5
+
6
+ # /vibe.review
7
+
8
+ **Parallel Agent Code Review** - 13+ specialists review simultaneously
9
+
10
+ ## Usage
11
+
12
+ ```
13
+ /vibe.review # Review current branch
14
+ /vibe.review PR#123 # Review specific PR
15
+ /vibe.review feature/login # Review specific branch
16
+ /vibe.review src/api/ # Review specific path
17
+ ```
18
+
19
+ ## Priority System
20
+
21
+ | Priority | Criteria | Action |
22
+ |----------|----------|--------|
23
+ | P1 | Security vulnerabilities, data loss, crashes | Block merge, fix immediately |
24
+ | P2 | Performance issues, architecture violations, missing tests | Fix before merge |
25
+ | P3 | Style, refactoring suggestions, documentation | Add to backlog |
26
+
27
+ ## Process
28
+
29
+ ### Phase 1: Tech Stack Detection
30
+
31
+ Detect project tech stack FIRST before launching reviewers:
32
+
33
+ ```
34
+ Read package.json -> TypeScript, React, Node.js
35
+ Read pyproject.toml -> Python, FastAPI, Django
36
+ Read Gemfile -> Ruby, Rails
37
+ Read pubspec.yaml -> Flutter, Dart
38
+ Read go.mod -> Go
39
+ Read CLAUDE.md -> Explicit tech stack declaration
40
+ ```
41
+
42
+ ### Phase 2: Parallel Agent Review (STACK-AWARE) via Orchestrator
43
+
44
+ **Execution via Orchestrator (12+ agents in parallel):**
45
+ ```bash
46
+ node -e "import('@su-record/vibe/orchestrator').then(o => o.review(['FILE_PATHS'], ['DETECTED_STACKS']).then(r => console.log(r.content[0].text)))"
47
+ ```
48
+
49
+ **Example:**
50
+ ```bash
51
+ # Review changed files with TypeScript + React stack
52
+ node -e "import('@su-record/vibe/orchestrator').then(o => o.review(['src/api/users.ts', 'src/components/Login.tsx'], ['TypeScript', 'React']).then(r => console.log(r.content[0].text)))"
53
+ ```
54
+
55
+ **Core Reviewers (Always Run):**
56
+ | Agent | Focus |
57
+ |-------|-------|
58
+ | security-reviewer | OWASP Top 10, vulnerabilities |
59
+ | data-integrity-reviewer | Data validation, constraints |
60
+ | performance-reviewer | N+1 queries, memory leaks |
61
+ | architecture-reviewer | Layer violations, cycles |
62
+ | complexity-reviewer | Cyclomatic complexity, length |
63
+ | simplicity-reviewer | Over-abstraction, dead code |
64
+ | git-history-reviewer | Churn files, risk patterns |
65
+ | test-coverage-reviewer | Missing tests, edge cases |
66
+
67
+ **Stack-Specific Reviewers (Conditional):**
68
+ | Agent | Condition |
69
+ |-------|-----------|
70
+ | python-reviewer | .py files in diff |
71
+ | typescript-reviewer | .ts/.tsx files OR tsconfig |
72
+ | rails-reviewer | Gemfile has rails |
73
+ | react-reviewer | package.json has react |
74
+
75
+ ### Phase 3: Deep Analysis
76
+
77
+ After agent results:
78
+
79
+ 1. **System Context**: Component interactions, data flow, external dependencies
80
+ 2. **Stakeholder Perspectives**: Developers, Ops, Security, Business
81
+ 3. **Edge Cases**: Race conditions, resource exhaustion, network failures
82
+ 4. **Multiple Angles**: Technical excellence, business value, risk management
83
+
84
+ ### Phase 4: Findings Synthesis
85
+
86
+ ```
87
+ REVIEW FINDINGS
88
+
89
+ P1 CRITICAL (Blocks Merge) - N issues
90
+ 1. [SECURITY] SQL Injection in user query
91
+ Location: src/api/users.py:42
92
+ Fix: Use parameterized queries
93
+
94
+ P2 IMPORTANT (Should Fix) - N issues
95
+ 2. [PERF] N+1 query in user list
96
+ 3. [ARCH] Circular dependency detected
97
+
98
+ P3 NICE-TO-HAVE (Enhancement) - N issues
99
+ 4. [STYLE] Consider extracting helper function
100
+ ```
101
+
102
+ ### Phase 5: Todo File Creation
103
+
104
+ Save findings to `.claude/vibe/todos/`:
105
+
106
+ ```
107
+ {priority}-{category}-{short-desc}.md
108
+
109
+ Examples:
110
+ - P1-security-sql-injection.md
111
+ - P2-perf-n1-query.md
112
+ - P3-style-extract-helper.md
113
+ ```
114
+
115
+ ## Output
116
+
117
+ ```
118
+ CODE REVIEW SUMMARY
119
+ PR #123: Add user authentication
120
+
121
+ Reviewers: 13 agents | Duration: 45s
122
+
123
+ Score: 72/100 (Needs Work)
124
+
125
+ Issues Found:
126
+ - P1 Critical: 2 (BLOCKS MERGE)
127
+ - P2 Important: 5
128
+ - P3 Nice-to-have: 3
129
+
130
+ By Category:
131
+ - Security: 2
132
+ - Performance: 3
133
+ - Architecture: 1
134
+ - Testing: 2
135
+ - Style: 2
136
+
137
+ Todos created: .claude/vibe/todos/ (10 files)
138
+
139
+ MERGE BLOCKED - Fix P1 issues first
140
+
141
+ Next Steps:
142
+ 1. Fix P1-security-sql-injection.md
143
+ 2. Fix P1-data-transaction-rollback.md
144
+ 3. Re-run: /vibe.review
145
+ ```
146
+
147
+ ### Phase 6: Guide to Fix Workflow
148
+
149
+ **Ask user to choose workflow** when fix is requested:
150
+
151
+ ```
152
+ ## Fix Workflow
153
+
154
+ 발견된 이슈를 수정하려면 워크플로우를 선택하세요:
155
+
156
+ | 작업 규모 | 권장 방식 |
157
+ |----------|----------|
158
+ | 간단한 수정 (1-2 파일) | Plan Mode |
159
+ | 복잡한 수정 (3+ 파일, 검증 필요) | /vibe.spec |
160
+
161
+ 1. `/vibe.spec "fix: issue-name"` - VIBE 워크플로우 (SPEC 검증 + 재리뷰)
162
+ 2. Plan Mode - 빠른 수정 (간단한 작업용)
163
+
164
+ 어떤 방식으로 진행할까요?
165
+ ```
166
+
167
+ - Wait for user's choice before proceeding
168
+ - If user chooses VIBE → wait for `/vibe.spec` command
169
+ - If user chooses Plan Mode → proceed with EnterPlanMode
170
+
171
+ ## Vibe Tools (Code Analysis)
172
+
173
+ ### Tool Invocation
174
+
175
+ All tools are called via:
176
+
177
+ ```bash
178
+ node -e "import('@su-record/vibe/tools').then(t => t.TOOL_NAME({...args}).then(r => console.log(r.content[0].text)))"
179
+ ```
180
+
181
+ ### Recommended Tools for Review
182
+
183
+ | Tool | Purpose | When to Use |
184
+ |------|---------|-------------|
185
+ | `validateCodeQuality` | Code quality check | Overall code quality scan |
186
+ | `analyzeComplexity` | Complexity metrics | Check function complexity |
187
+ | `findSymbol` | Find definitions | Locate implementations |
188
+ | `findReferences` | Find all usages | Track symbol usage |
189
+ | `saveMemory` | Save findings | Store important review findings |
190
+
191
+ ### Example Tool Usage in Review
192
+
193
+ **1. Validate code quality before review:**
194
+
195
+ ```bash
196
+ node -e "import('@su-record/vibe/tools').then(t => t.validateCodeQuality({targetPath: 'src/', projectPath: process.cwd()}).then(r => console.log(r.content[0].text)))"
197
+ ```
198
+
199
+ **2. Analyze complexity of changed files:**
200
+
201
+ ```bash
202
+ node -e "import('@su-record/vibe/tools').then(t => t.analyzeComplexity({targetPath: 'src/api/users.ts', projectPath: process.cwd()}).then(r => console.log(r.content[0].text)))"
203
+ ```
204
+
205
+ **3. Save critical finding for reference:**
206
+
207
+ ```bash
208
+ node -e "import('@su-record/vibe/tools').then(t => t.saveMemory({key: 'review-pr123-critical', value: 'SQL injection in users.py:42', category: 'review', projectPath: process.cwd()}).then(r => console.log(r.content[0].text)))"
209
+ ```
210
+
211
+ ---
212
+
213
+ ARGUMENTS: $ARGUMENTS