@sylphx/flow 2.7.0 → 2.8.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/CHANGELOG.md CHANGED
@@ -1,5 +1,11 @@
1
1
  # @sylphx/flow
2
2
 
3
+ ## 2.8.0 (2025-12-17)
4
+
5
+ ### ✨ Features
6
+
7
+ - **commands:** add /saas-admin for admin platform review ([f67b74f](https://github.com/SylphxAI/flow/commit/f67b74f2cac978274ad546cc7c70912f3cd4700c))
8
+
3
9
  ## 2.7.0 (2025-12-17)
4
10
 
5
11
  ### ✨ Features
@@ -0,0 +1,123 @@
1
+ ---
2
+ name: saas-admin
3
+ description: SaaS admin platform review - RBAC, bootstrap, config, feature flags, ops
4
+ agent: coder
5
+ ---
6
+
7
+ # Admin Platform Review
8
+
9
+ ## Scope
10
+
11
+ Review admin systems: RBAC, bootstrap flow, configuration management, feature flags governance, operational tooling, and impersonation.
12
+
13
+ ## Specification
14
+
15
+ ### Access Control (RBAC)
16
+
17
+ * **Least privilege principle**: Users get minimum permissions needed.
18
+ * Role hierarchy with clear inheritance.
19
+ * Permission granularity (resource-level, action-level).
20
+ * All authorization is **server-enforced**; no client-trust.
21
+ * Role changes require appropriate privilege level and are audited.
22
+
23
+ ### Admin Bootstrap (Hard Requirement)
24
+
25
+ * Admin bootstrap must **not rely on file seeding**.
26
+ * Use a secure, auditable **first-login allowlist** for the initial SUPER_ADMIN.
27
+ * **Permanently disable bootstrap** after completion — no re-entry.
28
+ * All privilege grants must be server-enforced and recorded in the audit log.
29
+ * The allowlist must be managed via **secure configuration (environment/secret store)**, not code or DB seeding.
30
+
31
+ ### Configuration Management
32
+
33
+ * All **non-secret** product-level configuration must be manageable via admin (server-enforced).
34
+ * Configuration changes require **validation and change history**.
35
+ * Secrets/credentials are **environment-managed only**; admin may expose safe readiness/health visibility, not raw secrets.
36
+ * Support for environment-specific overrides (dev/staging/prod).
37
+ * Rollback capability for configuration changes.
38
+
39
+ ### Feature Flags Governance
40
+
41
+ * Gradual rollout support (percentage-based, user segment-based).
42
+ * A/B testing integration where applicable.
43
+ * **Audit trail** for all flag changes (who/when/why).
44
+ * Emergency **kill switches** for rapid disable.
45
+ * Flag lifecycle management (created → active → deprecated → removed).
46
+ * Server-enforced evaluation; no client-side flag source-of-truth.
47
+
48
+ ### Operational Management
49
+
50
+ * **User/account management tools**:
51
+ * Search, view, edit user profiles
52
+ * Account status management (active, suspended, banned)
53
+ * Manual verification/unverification
54
+
55
+ * **Entitlements/access management**:
56
+ * View and modify user entitlements
57
+ * Grant/revoke access with audit trail
58
+ * Bulk operations with safeguards
59
+
60
+ * **Lifecycle actions**:
61
+ * Account suspension/reactivation
62
+ * Data export (for user requests)
63
+ * Account deletion with proper cascade
64
+
65
+ * **Issue resolution workflows**:
66
+ * Support ticket integration
67
+ * Action history per user
68
+ * Notes and annotations
69
+
70
+ * **Step-up controls** for sensitive actions:
71
+ * Actions affecting money/credits require MFA
72
+ * Actions affecting security posture require MFA
73
+ * Destructive actions require confirmation + reason
74
+
75
+ ### Impersonation
76
+
77
+ * Impersonation allowed **with explicit safeguards**:
78
+ * Requires elevated privilege level
79
+ * Time-limited sessions (auto-expire)
80
+ * Full audit logging (start, actions, end)
81
+ * Clear indicator in UI during impersonation
82
+ * Cannot impersonate higher-privilege users
83
+ * All actions during impersonation attributed to both impersonator and target.
84
+ * Optional: Visible indicator to impersonated user that session was accessed.
85
+
86
+ ### Admin Audit Logging
87
+
88
+ * **All admin actions must be auditable**:
89
+ * Who performed the action
90
+ * When (timestamp with timezone)
91
+ * What action was taken
92
+ * Why (required reason for sensitive actions)
93
+ * Before/after state for mutations
94
+ * Correlation to session/request
95
+ * Audit logs must be:
96
+ * Immutable (append-only)
97
+ * Queryable and filterable
98
+ * Exportable for compliance
99
+ * Retained per data retention policy
100
+
101
+ ## Domain Discovery
102
+
103
+ After reviewing compliance with spec, explore improvements:
104
+
105
+ * **Admin UX**: Is the admin panel efficient for common tasks? Keyboard shortcuts? Bulk actions?
106
+ * **Self-service vs admin**: What admin actions could be self-service for users?
107
+ * **Automation**: What repetitive admin tasks could be automated? Scheduled jobs?
108
+ * **Alerting**: Should certain admin actions trigger alerts? (e.g., mass deletions)
109
+ * **Delegation**: Can some admin tasks be delegated to lower roles safely?
110
+ * **Mobile admin**: Is there a need for mobile admin access? How to secure?
111
+
112
+ ## Domain Gates
113
+
114
+ * [ ] RBAC implemented with least privilege
115
+ * [ ] Bootstrap flow is secure and one-time only
116
+ * [ ] Config changes are validated and audited
117
+ * [ ] Feature flags have full audit trail
118
+ * [ ] Sensitive actions require step-up (MFA)
119
+ * [ ] Impersonation is time-limited and fully logged
120
+ * [ ] All admin actions are auditable
121
+ * [ ] Audit logs are immutable and queryable
122
+ * [ ] No hardcoded admin credentials anywhere
123
+ * [ ] Admin endpoints are rate-limited
@@ -57,6 +57,7 @@ Delegate each domain to a worker agent. Workers should review compliance with sp
57
57
  | Platform | `/saas-platform` | Design system, SEO, PWA, performance, a11y |
58
58
  | Security | `/saas-security` | OWASP, privacy, consent, observability, operability |
59
59
  | Growth | `/saas-growth` | Onboarding, referral, retention, guidance |
60
+ | Admin | `/saas-admin` | RBAC, bootstrap, config, feature flags, ops tooling |
60
61
 
61
62
  ### Phase 2: Strategic Discovery
62
63
 
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@sylphx/flow",
3
- "version": "2.7.0",
3
+ "version": "2.8.0",
4
4
  "description": "One CLI to rule them all. Unified orchestration layer for Claude Code, OpenCode, Cursor and all AI development tools. Auto-detection, auto-installation, auto-upgrade.",
5
5
  "type": "module",
6
6
  "bin": {