@sylphx/flow 2.7.0 → 2.9.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +19 -0
- package/assets/slash-commands/saas-admin.md +123 -0
- package/assets/slash-commands/saas-review.md +12 -12
- package/package.json +1 -1
package/CHANGELOG.md
CHANGED
|
@@ -1,5 +1,24 @@
|
|
|
1
1
|
# @sylphx/flow
|
|
2
2
|
|
|
3
|
+
## 2.9.0 (2025-12-17)
|
|
4
|
+
|
|
5
|
+
Add comprehensive SaaS review command suite with parallel worker delegation.
|
|
6
|
+
|
|
7
|
+
- `/saas-admin`: Admin platform review (RBAC, bootstrap, config, feature flags, ops)
|
|
8
|
+
- Updated `/saas-review`: All 8 workers run in parallel (domains + discovery)
|
|
9
|
+
- Clarified Task tool delegation pattern for worker spawning
|
|
10
|
+
|
|
11
|
+
### 📚 Documentation
|
|
12
|
+
|
|
13
|
+
- **commands:** run all 8 workers in parallel (merge discovery into Phase 1) ([cd0afd6](https://github.com/SylphxAI/flow/commit/cd0afd630d6c0d4f751cec81cce4572b19bcbe9d))
|
|
14
|
+
- **commands:** clarify Task tool delegation pattern in saas-review ([2940cb0](https://github.com/SylphxAI/flow/commit/2940cb094fb3ce65b0af59f3c1541769576c1050))
|
|
15
|
+
|
|
16
|
+
## 2.8.0 (2025-12-17)
|
|
17
|
+
|
|
18
|
+
### ✨ Features
|
|
19
|
+
|
|
20
|
+
- **commands:** add /saas-admin for admin platform review ([f67b74f](https://github.com/SylphxAI/flow/commit/f67b74f2cac978274ad546cc7c70912f3cd4700c))
|
|
21
|
+
|
|
3
22
|
## 2.7.0 (2025-12-17)
|
|
4
23
|
|
|
5
24
|
### ✨ Features
|
|
@@ -0,0 +1,123 @@
|
|
|
1
|
+
---
|
|
2
|
+
name: saas-admin
|
|
3
|
+
description: SaaS admin platform review - RBAC, bootstrap, config, feature flags, ops
|
|
4
|
+
agent: coder
|
|
5
|
+
---
|
|
6
|
+
|
|
7
|
+
# Admin Platform Review
|
|
8
|
+
|
|
9
|
+
## Scope
|
|
10
|
+
|
|
11
|
+
Review admin systems: RBAC, bootstrap flow, configuration management, feature flags governance, operational tooling, and impersonation.
|
|
12
|
+
|
|
13
|
+
## Specification
|
|
14
|
+
|
|
15
|
+
### Access Control (RBAC)
|
|
16
|
+
|
|
17
|
+
* **Least privilege principle**: Users get minimum permissions needed.
|
|
18
|
+
* Role hierarchy with clear inheritance.
|
|
19
|
+
* Permission granularity (resource-level, action-level).
|
|
20
|
+
* All authorization is **server-enforced**; no client-trust.
|
|
21
|
+
* Role changes require appropriate privilege level and are audited.
|
|
22
|
+
|
|
23
|
+
### Admin Bootstrap (Hard Requirement)
|
|
24
|
+
|
|
25
|
+
* Admin bootstrap must **not rely on file seeding**.
|
|
26
|
+
* Use a secure, auditable **first-login allowlist** for the initial SUPER_ADMIN.
|
|
27
|
+
* **Permanently disable bootstrap** after completion — no re-entry.
|
|
28
|
+
* All privilege grants must be server-enforced and recorded in the audit log.
|
|
29
|
+
* The allowlist must be managed via **secure configuration (environment/secret store)**, not code or DB seeding.
|
|
30
|
+
|
|
31
|
+
### Configuration Management
|
|
32
|
+
|
|
33
|
+
* All **non-secret** product-level configuration must be manageable via admin (server-enforced).
|
|
34
|
+
* Configuration changes require **validation and change history**.
|
|
35
|
+
* Secrets/credentials are **environment-managed only**; admin may expose safe readiness/health visibility, not raw secrets.
|
|
36
|
+
* Support for environment-specific overrides (dev/staging/prod).
|
|
37
|
+
* Rollback capability for configuration changes.
|
|
38
|
+
|
|
39
|
+
### Feature Flags Governance
|
|
40
|
+
|
|
41
|
+
* Gradual rollout support (percentage-based, user segment-based).
|
|
42
|
+
* A/B testing integration where applicable.
|
|
43
|
+
* **Audit trail** for all flag changes (who/when/why).
|
|
44
|
+
* Emergency **kill switches** for rapid disable.
|
|
45
|
+
* Flag lifecycle management (created → active → deprecated → removed).
|
|
46
|
+
* Server-enforced evaluation; no client-side flag source-of-truth.
|
|
47
|
+
|
|
48
|
+
### Operational Management
|
|
49
|
+
|
|
50
|
+
* **User/account management tools**:
|
|
51
|
+
* Search, view, edit user profiles
|
|
52
|
+
* Account status management (active, suspended, banned)
|
|
53
|
+
* Manual verification/unverification
|
|
54
|
+
|
|
55
|
+
* **Entitlements/access management**:
|
|
56
|
+
* View and modify user entitlements
|
|
57
|
+
* Grant/revoke access with audit trail
|
|
58
|
+
* Bulk operations with safeguards
|
|
59
|
+
|
|
60
|
+
* **Lifecycle actions**:
|
|
61
|
+
* Account suspension/reactivation
|
|
62
|
+
* Data export (for user requests)
|
|
63
|
+
* Account deletion with proper cascade
|
|
64
|
+
|
|
65
|
+
* **Issue resolution workflows**:
|
|
66
|
+
* Support ticket integration
|
|
67
|
+
* Action history per user
|
|
68
|
+
* Notes and annotations
|
|
69
|
+
|
|
70
|
+
* **Step-up controls** for sensitive actions:
|
|
71
|
+
* Actions affecting money/credits require MFA
|
|
72
|
+
* Actions affecting security posture require MFA
|
|
73
|
+
* Destructive actions require confirmation + reason
|
|
74
|
+
|
|
75
|
+
### Impersonation
|
|
76
|
+
|
|
77
|
+
* Impersonation allowed **with explicit safeguards**:
|
|
78
|
+
* Requires elevated privilege level
|
|
79
|
+
* Time-limited sessions (auto-expire)
|
|
80
|
+
* Full audit logging (start, actions, end)
|
|
81
|
+
* Clear indicator in UI during impersonation
|
|
82
|
+
* Cannot impersonate higher-privilege users
|
|
83
|
+
* All actions during impersonation attributed to both impersonator and target.
|
|
84
|
+
* Optional: Visible indicator to impersonated user that session was accessed.
|
|
85
|
+
|
|
86
|
+
### Admin Audit Logging
|
|
87
|
+
|
|
88
|
+
* **All admin actions must be auditable**:
|
|
89
|
+
* Who performed the action
|
|
90
|
+
* When (timestamp with timezone)
|
|
91
|
+
* What action was taken
|
|
92
|
+
* Why (required reason for sensitive actions)
|
|
93
|
+
* Before/after state for mutations
|
|
94
|
+
* Correlation to session/request
|
|
95
|
+
* Audit logs must be:
|
|
96
|
+
* Immutable (append-only)
|
|
97
|
+
* Queryable and filterable
|
|
98
|
+
* Exportable for compliance
|
|
99
|
+
* Retained per data retention policy
|
|
100
|
+
|
|
101
|
+
## Domain Discovery
|
|
102
|
+
|
|
103
|
+
After reviewing compliance with spec, explore improvements:
|
|
104
|
+
|
|
105
|
+
* **Admin UX**: Is the admin panel efficient for common tasks? Keyboard shortcuts? Bulk actions?
|
|
106
|
+
* **Self-service vs admin**: What admin actions could be self-service for users?
|
|
107
|
+
* **Automation**: What repetitive admin tasks could be automated? Scheduled jobs?
|
|
108
|
+
* **Alerting**: Should certain admin actions trigger alerts? (e.g., mass deletions)
|
|
109
|
+
* **Delegation**: Can some admin tasks be delegated to lower roles safely?
|
|
110
|
+
* **Mobile admin**: Is there a need for mobile admin access? How to secure?
|
|
111
|
+
|
|
112
|
+
## Domain Gates
|
|
113
|
+
|
|
114
|
+
* [ ] RBAC implemented with least privilege
|
|
115
|
+
* [ ] Bootstrap flow is secure and one-time only
|
|
116
|
+
* [ ] Config changes are validated and audited
|
|
117
|
+
* [ ] Feature flags have full audit trail
|
|
118
|
+
* [ ] Sensitive actions require step-up (MFA)
|
|
119
|
+
* [ ] Impersonation is time-limited and fully logged
|
|
120
|
+
* [ ] All admin actions are auditable
|
|
121
|
+
* [ ] Audit logs are immutable and queryable
|
|
122
|
+
* [ ] No hardcoded admin credentials anywhere
|
|
123
|
+
* [ ] Admin endpoints are rate-limited
|
|
@@ -45,9 +45,16 @@ agent: coder
|
|
|
45
45
|
|
|
46
46
|
## Review Execution
|
|
47
47
|
|
|
48
|
-
### Phase 1:
|
|
48
|
+
### Phase 1: All Reviews (Parallel)
|
|
49
49
|
|
|
50
|
-
|
|
50
|
+
Spawn **all workers in parallel** using the Task tool. Each worker runs its slash command and returns findings.
|
|
51
|
+
|
|
52
|
+
**Delegation pattern:**
|
|
53
|
+
```
|
|
54
|
+
Use Task tool with subagent_type: "Coder" for each worker.
|
|
55
|
+
Spawn ALL 8 workers in a single message (parallel execution).
|
|
56
|
+
Each worker prompt: "Run /{command} and return findings."
|
|
57
|
+
```
|
|
51
58
|
|
|
52
59
|
| Worker | Command | Focus |
|
|
53
60
|
|--------|---------|-------|
|
|
@@ -57,16 +64,10 @@ Delegate each domain to a worker agent. Workers should review compliance with sp
|
|
|
57
64
|
| Platform | `/saas-platform` | Design system, SEO, PWA, performance, a11y |
|
|
58
65
|
| Security | `/saas-security` | OWASP, privacy, consent, observability, operability |
|
|
59
66
|
| Growth | `/saas-growth` | Onboarding, referral, retention, guidance |
|
|
60
|
-
|
|
61
|
-
### Phase 2: Strategic Discovery
|
|
62
|
-
|
|
63
|
-
After domain reviews complete, run cross-domain strategic analysis:
|
|
64
|
-
|
|
65
|
-
| Worker | Command | Focus |
|
|
66
|
-
|--------|---------|-------|
|
|
67
|
+
| Admin | `/saas-admin` | RBAC, bootstrap, config, feature flags, ops tooling |
|
|
67
68
|
| Discovery | `/saas-discovery` | Feature opportunities, pricing optimization, competitive research |
|
|
68
69
|
|
|
69
|
-
### Phase
|
|
70
|
+
### Phase 2: Final Gate (You)
|
|
70
71
|
|
|
71
72
|
Synthesize all domain findings and discovery insights:
|
|
72
73
|
|
|
@@ -170,8 +171,7 @@ Checklist with pass/fail for each gate
|
|
|
170
171
|
## Completion Criteria
|
|
171
172
|
|
|
172
173
|
Complete only when:
|
|
173
|
-
- [ ] All
|
|
174
|
-
- [ ] Discovery phase completed
|
|
174
|
+
- [ ] All 8 workers finished (domains + discovery)
|
|
175
175
|
- [ ] All findings synthesized
|
|
176
176
|
- [ ] Delivery gates verified
|
|
177
177
|
- [ ] Integrated report produced
|
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@sylphx/flow",
|
|
3
|
-
"version": "2.
|
|
3
|
+
"version": "2.9.0",
|
|
4
4
|
"description": "One CLI to rule them all. Unified orchestration layer for Claude Code, OpenCode, Cursor and all AI development tools. Auto-detection, auto-installation, auto-upgrade.",
|
|
5
5
|
"type": "module",
|
|
6
6
|
"bin": {
|