@sylphx/flow 2.7.0 → 2.9.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/CHANGELOG.md CHANGED
@@ -1,5 +1,24 @@
1
1
  # @sylphx/flow
2
2
 
3
+ ## 2.9.0 (2025-12-17)
4
+
5
+ Add comprehensive SaaS review command suite with parallel worker delegation.
6
+
7
+ - `/saas-admin`: Admin platform review (RBAC, bootstrap, config, feature flags, ops)
8
+ - Updated `/saas-review`: All 8 workers run in parallel (domains + discovery)
9
+ - Clarified Task tool delegation pattern for worker spawning
10
+
11
+ ### 📚 Documentation
12
+
13
+ - **commands:** run all 8 workers in parallel (merge discovery into Phase 1) ([cd0afd6](https://github.com/SylphxAI/flow/commit/cd0afd630d6c0d4f751cec81cce4572b19bcbe9d))
14
+ - **commands:** clarify Task tool delegation pattern in saas-review ([2940cb0](https://github.com/SylphxAI/flow/commit/2940cb094fb3ce65b0af59f3c1541769576c1050))
15
+
16
+ ## 2.8.0 (2025-12-17)
17
+
18
+ ### ✨ Features
19
+
20
+ - **commands:** add /saas-admin for admin platform review ([f67b74f](https://github.com/SylphxAI/flow/commit/f67b74f2cac978274ad546cc7c70912f3cd4700c))
21
+
3
22
  ## 2.7.0 (2025-12-17)
4
23
 
5
24
  ### ✨ Features
@@ -0,0 +1,123 @@
1
+ ---
2
+ name: saas-admin
3
+ description: SaaS admin platform review - RBAC, bootstrap, config, feature flags, ops
4
+ agent: coder
5
+ ---
6
+
7
+ # Admin Platform Review
8
+
9
+ ## Scope
10
+
11
+ Review admin systems: RBAC, bootstrap flow, configuration management, feature flags governance, operational tooling, and impersonation.
12
+
13
+ ## Specification
14
+
15
+ ### Access Control (RBAC)
16
+
17
+ * **Least privilege principle**: Users get minimum permissions needed.
18
+ * Role hierarchy with clear inheritance.
19
+ * Permission granularity (resource-level, action-level).
20
+ * All authorization is **server-enforced**; no client-trust.
21
+ * Role changes require appropriate privilege level and are audited.
22
+
23
+ ### Admin Bootstrap (Hard Requirement)
24
+
25
+ * Admin bootstrap must **not rely on file seeding**.
26
+ * Use a secure, auditable **first-login allowlist** for the initial SUPER_ADMIN.
27
+ * **Permanently disable bootstrap** after completion — no re-entry.
28
+ * All privilege grants must be server-enforced and recorded in the audit log.
29
+ * The allowlist must be managed via **secure configuration (environment/secret store)**, not code or DB seeding.
30
+
31
+ ### Configuration Management
32
+
33
+ * All **non-secret** product-level configuration must be manageable via admin (server-enforced).
34
+ * Configuration changes require **validation and change history**.
35
+ * Secrets/credentials are **environment-managed only**; admin may expose safe readiness/health visibility, not raw secrets.
36
+ * Support for environment-specific overrides (dev/staging/prod).
37
+ * Rollback capability for configuration changes.
38
+
39
+ ### Feature Flags Governance
40
+
41
+ * Gradual rollout support (percentage-based, user segment-based).
42
+ * A/B testing integration where applicable.
43
+ * **Audit trail** for all flag changes (who/when/why).
44
+ * Emergency **kill switches** for rapid disable.
45
+ * Flag lifecycle management (created → active → deprecated → removed).
46
+ * Server-enforced evaluation; no client-side flag source-of-truth.
47
+
48
+ ### Operational Management
49
+
50
+ * **User/account management tools**:
51
+ * Search, view, edit user profiles
52
+ * Account status management (active, suspended, banned)
53
+ * Manual verification/unverification
54
+
55
+ * **Entitlements/access management**:
56
+ * View and modify user entitlements
57
+ * Grant/revoke access with audit trail
58
+ * Bulk operations with safeguards
59
+
60
+ * **Lifecycle actions**:
61
+ * Account suspension/reactivation
62
+ * Data export (for user requests)
63
+ * Account deletion with proper cascade
64
+
65
+ * **Issue resolution workflows**:
66
+ * Support ticket integration
67
+ * Action history per user
68
+ * Notes and annotations
69
+
70
+ * **Step-up controls** for sensitive actions:
71
+ * Actions affecting money/credits require MFA
72
+ * Actions affecting security posture require MFA
73
+ * Destructive actions require confirmation + reason
74
+
75
+ ### Impersonation
76
+
77
+ * Impersonation allowed **with explicit safeguards**:
78
+ * Requires elevated privilege level
79
+ * Time-limited sessions (auto-expire)
80
+ * Full audit logging (start, actions, end)
81
+ * Clear indicator in UI during impersonation
82
+ * Cannot impersonate higher-privilege users
83
+ * All actions during impersonation attributed to both impersonator and target.
84
+ * Optional: Visible indicator to impersonated user that session was accessed.
85
+
86
+ ### Admin Audit Logging
87
+
88
+ * **All admin actions must be auditable**:
89
+ * Who performed the action
90
+ * When (timestamp with timezone)
91
+ * What action was taken
92
+ * Why (required reason for sensitive actions)
93
+ * Before/after state for mutations
94
+ * Correlation to session/request
95
+ * Audit logs must be:
96
+ * Immutable (append-only)
97
+ * Queryable and filterable
98
+ * Exportable for compliance
99
+ * Retained per data retention policy
100
+
101
+ ## Domain Discovery
102
+
103
+ After reviewing compliance with spec, explore improvements:
104
+
105
+ * **Admin UX**: Is the admin panel efficient for common tasks? Keyboard shortcuts? Bulk actions?
106
+ * **Self-service vs admin**: What admin actions could be self-service for users?
107
+ * **Automation**: What repetitive admin tasks could be automated? Scheduled jobs?
108
+ * **Alerting**: Should certain admin actions trigger alerts? (e.g., mass deletions)
109
+ * **Delegation**: Can some admin tasks be delegated to lower roles safely?
110
+ * **Mobile admin**: Is there a need for mobile admin access? How to secure?
111
+
112
+ ## Domain Gates
113
+
114
+ * [ ] RBAC implemented with least privilege
115
+ * [ ] Bootstrap flow is secure and one-time only
116
+ * [ ] Config changes are validated and audited
117
+ * [ ] Feature flags have full audit trail
118
+ * [ ] Sensitive actions require step-up (MFA)
119
+ * [ ] Impersonation is time-limited and fully logged
120
+ * [ ] All admin actions are auditable
121
+ * [ ] Audit logs are immutable and queryable
122
+ * [ ] No hardcoded admin credentials anywhere
123
+ * [ ] Admin endpoints are rate-limited
@@ -45,9 +45,16 @@ agent: coder
45
45
 
46
46
  ## Review Execution
47
47
 
48
- ### Phase 1: Domain Reviews (Parallel)
48
+ ### Phase 1: All Reviews (Parallel)
49
49
 
50
- Delegate each domain to a worker agent. Workers should review compliance with spec AND identify domain-specific improvement opportunities.
50
+ Spawn **all workers in parallel** using the Task tool. Each worker runs its slash command and returns findings.
51
+
52
+ **Delegation pattern:**
53
+ ```
54
+ Use Task tool with subagent_type: "Coder" for each worker.
55
+ Spawn ALL 8 workers in a single message (parallel execution).
56
+ Each worker prompt: "Run /{command} and return findings."
57
+ ```
51
58
 
52
59
  | Worker | Command | Focus |
53
60
  |--------|---------|-------|
@@ -57,16 +64,10 @@ Delegate each domain to a worker agent. Workers should review compliance with sp
57
64
  | Platform | `/saas-platform` | Design system, SEO, PWA, performance, a11y |
58
65
  | Security | `/saas-security` | OWASP, privacy, consent, observability, operability |
59
66
  | Growth | `/saas-growth` | Onboarding, referral, retention, guidance |
60
-
61
- ### Phase 2: Strategic Discovery
62
-
63
- After domain reviews complete, run cross-domain strategic analysis:
64
-
65
- | Worker | Command | Focus |
66
- |--------|---------|-------|
67
+ | Admin | `/saas-admin` | RBAC, bootstrap, config, feature flags, ops tooling |
67
68
  | Discovery | `/saas-discovery` | Feature opportunities, pricing optimization, competitive research |
68
69
 
69
- ### Phase 3: Final Gate (You)
70
+ ### Phase 2: Final Gate (You)
70
71
 
71
72
  Synthesize all domain findings and discovery insights:
72
73
 
@@ -170,8 +171,7 @@ Checklist with pass/fail for each gate
170
171
  ## Completion Criteria
171
172
 
172
173
  Complete only when:
173
- - [ ] All domain reviews finished
174
- - [ ] Discovery phase completed
174
+ - [ ] All 8 workers finished (domains + discovery)
175
175
  - [ ] All findings synthesized
176
176
  - [ ] Delivery gates verified
177
177
  - [ ] Integrated report produced
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@sylphx/flow",
3
- "version": "2.7.0",
3
+ "version": "2.9.0",
4
4
  "description": "One CLI to rule them all. Unified orchestration layer for Claude Code, OpenCode, Cursor and all AI development tools. Auto-detection, auto-installation, auto-upgrade.",
5
5
  "type": "module",
6
6
  "bin": {