@sylphx/flow 2.9.0 → 2.11.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +25 -0
- package/assets/slash-commands/review-account-security.md +48 -0
- package/assets/slash-commands/review-admin.md +58 -0
- package/assets/slash-commands/review-auth.md +42 -0
- package/assets/slash-commands/review-billing.md +52 -0
- package/assets/slash-commands/review-code-quality.md +44 -0
- package/assets/slash-commands/review-data-architecture.md +43 -0
- package/assets/slash-commands/review-database.md +37 -0
- package/assets/slash-commands/review-delivery.md +57 -0
- package/assets/slash-commands/review-discovery.md +34 -0
- package/assets/slash-commands/review-growth.md +57 -0
- package/assets/slash-commands/review-i18n.md +54 -0
- package/assets/slash-commands/review-ledger.md +38 -0
- package/assets/slash-commands/review-observability.md +43 -0
- package/assets/slash-commands/review-operability.md +50 -0
- package/assets/slash-commands/review-performance.md +47 -0
- package/assets/slash-commands/review-pricing.md +45 -0
- package/assets/slash-commands/review-privacy.md +56 -0
- package/assets/slash-commands/review-pwa.md +43 -0
- package/assets/slash-commands/review-referral.md +50 -0
- package/assets/slash-commands/review-security.md +54 -0
- package/assets/slash-commands/review-seo.md +51 -0
- package/assets/slash-commands/review-storage.md +38 -0
- package/assets/slash-commands/review-support.md +43 -0
- package/assets/slash-commands/review-uiux.md +49 -0
- package/package.json +1 -1
- package/assets/slash-commands/saas-admin.md +0 -123
- package/assets/slash-commands/saas-auth.md +0 -78
- package/assets/slash-commands/saas-billing.md +0 -68
- package/assets/slash-commands/saas-discovery.md +0 -135
- package/assets/slash-commands/saas-growth.md +0 -94
- package/assets/slash-commands/saas-i18n.md +0 -66
- package/assets/slash-commands/saas-platform.md +0 -87
- package/assets/slash-commands/saas-review.md +0 -178
- package/assets/slash-commands/saas-security.md +0 -108
|
@@ -0,0 +1,50 @@
|
|
|
1
|
+
---
|
|
2
|
+
name: review-operability
|
|
3
|
+
description: Review operability - async workflows, DLQ, retries, drift detection
|
|
4
|
+
agent: coder
|
|
5
|
+
---
|
|
6
|
+
|
|
7
|
+
# Operability Review
|
|
8
|
+
|
|
9
|
+
## Mandate
|
|
10
|
+
|
|
11
|
+
* Perform a **deep, thorough review** of operability in this codebase.
|
|
12
|
+
* **Delegate to multiple workers** to research different aspects in parallel; you act as the **final gate** to synthesize and verify quality.
|
|
13
|
+
* Deliverables must be stated as **findings, gaps, and actionable recommendations**.
|
|
14
|
+
* **Single-pass delivery**: no deferrals; deliver a complete assessment.
|
|
15
|
+
* **Explore beyond the spec**: identify operational risks and reliability improvements.
|
|
16
|
+
|
|
17
|
+
## Tech Stack
|
|
18
|
+
|
|
19
|
+
* **Workflows**: Upstash Workflows + QStash
|
|
20
|
+
* **Cache**: Upstash Redis
|
|
21
|
+
* **Platform**: Vercel
|
|
22
|
+
|
|
23
|
+
## Review Scope
|
|
24
|
+
|
|
25
|
+
### Async/Workflows Governance (Hard Requirement)
|
|
26
|
+
|
|
27
|
+
* Define idempotency and deduplication posture
|
|
28
|
+
* Define controlled retries/backoff
|
|
29
|
+
* **Dead-letter handling must exist and be observable and operable**
|
|
30
|
+
* **Safe replay must be supported**
|
|
31
|
+
* Side-effects (email/billing/ledger/entitlements) must be governed such that they are either proven effectively-once or safely re-entrant
|
|
32
|
+
|
|
33
|
+
### Drift Detection (Hard Requirement)
|
|
34
|
+
|
|
35
|
+
* Drift alerts must have a defined remediation playbook (automated fix or operator workflow)
|
|
36
|
+
* Each remediation must be auditable and support post-incident traceability
|
|
37
|
+
|
|
38
|
+
### Release Safety
|
|
39
|
+
|
|
40
|
+
* Define safe rollout posture with backward compatibility
|
|
41
|
+
* Rollback expectations for billing/ledger/auth changes
|
|
42
|
+
|
|
43
|
+
## Key Areas to Explore
|
|
44
|
+
|
|
45
|
+
* How does the system handle job failures and retries?
|
|
46
|
+
* What happens to messages that fail permanently (DLQ)?
|
|
47
|
+
* How are operators notified of and able to resolve stuck workflows?
|
|
48
|
+
* What drift can occur between systems and how is it detected?
|
|
49
|
+
* How safe is the deployment process for critical paths?
|
|
50
|
+
* What runbooks exist for common operational issues?
|
|
@@ -0,0 +1,47 @@
|
|
|
1
|
+
---
|
|
2
|
+
name: review-performance
|
|
3
|
+
description: Review performance - budgets, Core Web Vitals, caching
|
|
4
|
+
agent: coder
|
|
5
|
+
---
|
|
6
|
+
|
|
7
|
+
# Performance Review
|
|
8
|
+
|
|
9
|
+
## Mandate
|
|
10
|
+
|
|
11
|
+
* Perform a **deep, thorough review** of performance in this codebase.
|
|
12
|
+
* **Delegate to multiple workers** to research different aspects in parallel; you act as the **final gate** to synthesize and verify quality.
|
|
13
|
+
* Deliverables must be stated as **findings, gaps, and actionable recommendations**.
|
|
14
|
+
* **Single-pass delivery**: no deferrals; deliver a complete assessment.
|
|
15
|
+
* **Explore beyond the spec**: identify bottlenecks and optimization opportunities.
|
|
16
|
+
|
|
17
|
+
## Tech Stack
|
|
18
|
+
|
|
19
|
+
* **Framework**: Next.js (SSR/ISR/Static)
|
|
20
|
+
* **Platform**: Vercel
|
|
21
|
+
* **Tooling**: Bun
|
|
22
|
+
|
|
23
|
+
## Review Scope
|
|
24
|
+
|
|
25
|
+
### Performance Requirements
|
|
26
|
+
|
|
27
|
+
* Performance must be **measurable and regression-resistant**:
|
|
28
|
+
* Define and enforce performance budgets for key journeys
|
|
29
|
+
* Define caching boundaries and correctness requirements across SSR/ISR/static and service worker behavior
|
|
30
|
+
* Monitor Core Web Vitals and server latency
|
|
31
|
+
* Alert on regressions
|
|
32
|
+
|
|
33
|
+
### Core Web Vitals Targets
|
|
34
|
+
|
|
35
|
+
* LCP (Largest Contentful Paint) < 2.5s
|
|
36
|
+
* FID (First Input Delay) < 100ms
|
|
37
|
+
* CLS (Cumulative Layout Shift) < 0.1
|
|
38
|
+
* INP (Interaction to Next Paint) < 200ms
|
|
39
|
+
|
|
40
|
+
## Key Areas to Explore
|
|
41
|
+
|
|
42
|
+
* What are the current Core Web Vitals scores and where do they fall short?
|
|
43
|
+
* Which pages or components are the biggest performance bottlenecks?
|
|
44
|
+
* How effective is the current caching strategy?
|
|
45
|
+
* What opportunities exist for code splitting and lazy loading?
|
|
46
|
+
* How does the bundle size compare to industry benchmarks?
|
|
47
|
+
* What database queries are slow and how can they be optimized?
|
|
@@ -0,0 +1,45 @@
|
|
|
1
|
+
---
|
|
2
|
+
name: review-pricing
|
|
3
|
+
description: Review pricing - pricing governance, grandfathering, migrations
|
|
4
|
+
agent: coder
|
|
5
|
+
---
|
|
6
|
+
|
|
7
|
+
# Pricing Review
|
|
8
|
+
|
|
9
|
+
## Mandate
|
|
10
|
+
|
|
11
|
+
* Perform a **deep, thorough review** of pricing governance in this codebase.
|
|
12
|
+
* **Delegate to multiple workers** to research different aspects in parallel; you act as the **final gate** to synthesize and verify quality.
|
|
13
|
+
* Deliverables must be stated as **findings, gaps, and actionable recommendations**.
|
|
14
|
+
* **Single-pass delivery**: no deferrals; deliver a complete assessment.
|
|
15
|
+
* **Explore beyond the spec**: identify monetization opportunities and pricing strategy improvements.
|
|
16
|
+
|
|
17
|
+
## Tech Stack
|
|
18
|
+
|
|
19
|
+
* **Payments**: Stripe
|
|
20
|
+
|
|
21
|
+
## Review Scope
|
|
22
|
+
|
|
23
|
+
### Stripe Pricing Governance (Stripe-first, not Dashboard-first)
|
|
24
|
+
|
|
25
|
+
* Stripe is the system-of-record for products, prices, subscriptions, invoices, and disputes; internal systems must not contradict Stripe truth.
|
|
26
|
+
* Pricing changes must be performed by creating new Stripe Prices and updating the "active sellable price" policy; historical prices must remain immutable for existing subscriptions unless an approved migration is executed.
|
|
27
|
+
* Default pricing change policy is **grandfathering**: existing subscribers keep their current price; new customers use the currently active sellable price.
|
|
28
|
+
|
|
29
|
+
### Pricing Admin Requirements
|
|
30
|
+
|
|
31
|
+
* An operational-grade Pricing Admin must exist to manage:
|
|
32
|
+
* Creation of new Stripe Prices
|
|
33
|
+
* Activation/deactivation of sellable prices
|
|
34
|
+
* Controlled bulk subscription migrations (optional)
|
|
35
|
+
* All actions must be governed by RBAC, step-up controls, and audit logs.
|
|
36
|
+
* Stripe Dashboard is treated as monitoring/emergency access; non-admin Stripe changes must be detectable (drift), alertable, and remediable.
|
|
37
|
+
|
|
38
|
+
## Key Areas to Explore
|
|
39
|
+
|
|
40
|
+
* How does the pricing model compare to competitors?
|
|
41
|
+
* What friction exists in the upgrade/downgrade paths?
|
|
42
|
+
* How is grandfathering implemented and communicated?
|
|
43
|
+
* What tools exist for pricing experimentation (A/B tests)?
|
|
44
|
+
* How are pricing changes rolled out safely?
|
|
45
|
+
* What analytics exist for pricing optimization decisions?
|
|
@@ -0,0 +1,56 @@
|
|
|
1
|
+
---
|
|
2
|
+
name: review-privacy
|
|
3
|
+
description: Review privacy - consent, PII handling, data lifecycle, GDPR
|
|
4
|
+
agent: coder
|
|
5
|
+
---
|
|
6
|
+
|
|
7
|
+
# Privacy Review
|
|
8
|
+
|
|
9
|
+
## Mandate
|
|
10
|
+
|
|
11
|
+
* Perform a **deep, thorough review** of privacy controls in this codebase.
|
|
12
|
+
* **Delegate to multiple workers** to research different aspects in parallel; you act as the **final gate** to synthesize and verify quality.
|
|
13
|
+
* Deliverables must be stated as **findings, gaps, and actionable recommendations**.
|
|
14
|
+
* **Single-pass delivery**: no deferrals; deliver a complete assessment.
|
|
15
|
+
* **Explore beyond the spec**: identify compliance gaps and privacy improvements.
|
|
16
|
+
|
|
17
|
+
## Tech Stack
|
|
18
|
+
|
|
19
|
+
* **Analytics**: PostHog
|
|
20
|
+
* **Email**: Resend
|
|
21
|
+
* **Tag Management**: GTM (marketing only)
|
|
22
|
+
* **Observability**: Sentry
|
|
23
|
+
|
|
24
|
+
## Review Scope
|
|
25
|
+
|
|
26
|
+
### Consent Governance (Release-Blocking)
|
|
27
|
+
|
|
28
|
+
* Analytics (PostHog) and marketing/newsletter communications (Resend) must be governed by consent and user preferences.
|
|
29
|
+
* Marketing tags (including GTM and Google Ads) must not load or fire without the appropriate consent.
|
|
30
|
+
* Without consent, tracking and marketing sends must not occur, except for strictly necessary service communications.
|
|
31
|
+
* Event schemas and attributes must follow data minimization, with explicit PII classification and handling rules.
|
|
32
|
+
|
|
33
|
+
### PII and Sensitive Data Controls (Hard Requirement)
|
|
34
|
+
|
|
35
|
+
* PII rules apply to logs, Sentry, PostHog, support tooling, email systems, and marketing tags/conversion payloads.
|
|
36
|
+
* A consistent scrubbing/redaction standard must exist, and must be covered by automated tests to prevent leakage to third parties.
|
|
37
|
+
|
|
38
|
+
### Data Lifecycle
|
|
39
|
+
|
|
40
|
+
* Define deletion/deactivation semantics
|
|
41
|
+
* Deletion propagation to third parties
|
|
42
|
+
* Export where applicable
|
|
43
|
+
* **Define data classification, retention periods, deletion propagation to third-party processors, and explicit exceptions** (legal/tax/anti-fraud)
|
|
44
|
+
|
|
45
|
+
### Behavioral Consistency
|
|
46
|
+
|
|
47
|
+
* **Behavioral consistency is required**: policy and disclosures must match actual behavior across UI, data handling, logging/observability, analytics, support operations, and marketing tags; mismatches are release-blocking.
|
|
48
|
+
|
|
49
|
+
## Key Areas to Explore
|
|
50
|
+
|
|
51
|
+
* Does the consent implementation actually block tracking before consent?
|
|
52
|
+
* Where does PII leak into logs, analytics, or error tracking?
|
|
53
|
+
* How does account deletion propagate to all third-party services?
|
|
54
|
+
* Does the privacy policy accurately reflect actual data practices?
|
|
55
|
+
* What data retention policies exist and are they enforced?
|
|
56
|
+
* How would the system handle a GDPR data subject access request?
|
|
@@ -0,0 +1,43 @@
|
|
|
1
|
+
---
|
|
2
|
+
name: review-pwa
|
|
3
|
+
description: Review PWA - manifest, service worker, caching, push notifications
|
|
4
|
+
agent: coder
|
|
5
|
+
---
|
|
6
|
+
|
|
7
|
+
# PWA Review
|
|
8
|
+
|
|
9
|
+
## Mandate
|
|
10
|
+
|
|
11
|
+
* Perform a **deep, thorough review** of PWA implementation in this codebase.
|
|
12
|
+
* **Delegate to multiple workers** to research different aspects in parallel; you act as the **final gate** to synthesize and verify quality.
|
|
13
|
+
* Deliverables must be stated as **findings, gaps, and actionable recommendations**.
|
|
14
|
+
* **Single-pass delivery**: no deferrals; deliver a complete assessment.
|
|
15
|
+
* **Explore beyond the spec**: identify engagement opportunities and offline capabilities.
|
|
16
|
+
|
|
17
|
+
## Tech Stack
|
|
18
|
+
|
|
19
|
+
* **Framework**: Next.js
|
|
20
|
+
* **Platform**: Vercel
|
|
21
|
+
|
|
22
|
+
## Review Scope
|
|
23
|
+
|
|
24
|
+
### PWA Requirements
|
|
25
|
+
|
|
26
|
+
* Manifest file complete and valid
|
|
27
|
+
* Service worker with explicit cache correctness
|
|
28
|
+
* Push notifications using VAPID where applicable
|
|
29
|
+
|
|
30
|
+
### Service Worker Caching Boundary (Mandatory)
|
|
31
|
+
|
|
32
|
+
* Service worker must not cache personalized/sensitive/authorized content
|
|
33
|
+
* Authenticated and entitlement-sensitive routes must have explicit cache-control and SW rules
|
|
34
|
+
* Must be validated by tests to prevent stale or unauthorized state exposure
|
|
35
|
+
|
|
36
|
+
## Key Areas to Explore
|
|
37
|
+
|
|
38
|
+
* Does the PWA meet installation criteria on all platforms?
|
|
39
|
+
* What is the offline experience and how can it be improved?
|
|
40
|
+
* How does the service worker handle cache invalidation on deploys?
|
|
41
|
+
* What push notification capabilities exist and how are they used?
|
|
42
|
+
* Are there any caching bugs that expose stale or unauthorized content?
|
|
43
|
+
* How does the PWA experience compare to native app expectations?
|
|
@@ -0,0 +1,50 @@
|
|
|
1
|
+
---
|
|
2
|
+
name: review-referral
|
|
3
|
+
description: Review referral - attribution, anti-fraud, rewards, clawback
|
|
4
|
+
agent: coder
|
|
5
|
+
---
|
|
6
|
+
|
|
7
|
+
# Referral Review
|
|
8
|
+
|
|
9
|
+
## Mandate
|
|
10
|
+
|
|
11
|
+
* Perform a **deep, thorough review** of the referral system in this codebase.
|
|
12
|
+
* **Delegate to multiple workers** to research different aspects in parallel; you act as the **final gate** to synthesize and verify quality.
|
|
13
|
+
* Deliverables must be stated as **findings, gaps, and actionable recommendations**.
|
|
14
|
+
* **Single-pass delivery**: no deferrals; deliver a complete assessment.
|
|
15
|
+
* **Explore beyond the spec**: identify growth opportunities and fraud prevention improvements.
|
|
16
|
+
|
|
17
|
+
## Tech Stack
|
|
18
|
+
|
|
19
|
+
* **Analytics**: PostHog
|
|
20
|
+
* **Database**: Neon (Postgres)
|
|
21
|
+
|
|
22
|
+
## Review Scope
|
|
23
|
+
|
|
24
|
+
### Referral (Anti-Abuse Baseline Required)
|
|
25
|
+
|
|
26
|
+
* Referral must be measurable, abuse-resistant, and governed:
|
|
27
|
+
* Attribution semantics
|
|
28
|
+
* Reward lifecycle governance (including revocation/clawbacks)
|
|
29
|
+
* Anti-fraud measures
|
|
30
|
+
* Admin reporting/audit
|
|
31
|
+
* Localized and instrumented
|
|
32
|
+
|
|
33
|
+
### Referral Anti-Fraud Minimum Baseline (Mandatory)
|
|
34
|
+
|
|
35
|
+
* Define a minimum set of risk signals and enforcement measures, including:
|
|
36
|
+
* Velocity controls
|
|
37
|
+
* Account/device linkage posture
|
|
38
|
+
* Risk-tiered enforcement
|
|
39
|
+
* Reward delay/hold/freeze
|
|
40
|
+
* Clawback conditions
|
|
41
|
+
* Auditable manual review/appeal posture where applicable
|
|
42
|
+
|
|
43
|
+
## Key Areas to Explore
|
|
44
|
+
|
|
45
|
+
* How effective is the current referral program at driving growth?
|
|
46
|
+
* What fraud patterns have been observed and how are they mitigated?
|
|
47
|
+
* How does the attribution model handle edge cases (multiple touches, expired links)?
|
|
48
|
+
* What is the reward fulfillment process and where can it fail?
|
|
49
|
+
* How do users discover and share referral links?
|
|
50
|
+
* What analytics exist to measure referral program ROI?
|
|
@@ -0,0 +1,54 @@
|
|
|
1
|
+
---
|
|
2
|
+
name: review-security
|
|
3
|
+
description: Review security - OWASP, CSP/HSTS, CSRF, anti-bot, rate limiting
|
|
4
|
+
agent: coder
|
|
5
|
+
---
|
|
6
|
+
|
|
7
|
+
# Security Review
|
|
8
|
+
|
|
9
|
+
## Mandate
|
|
10
|
+
|
|
11
|
+
* Perform a **deep, thorough review** of security controls in this codebase.
|
|
12
|
+
* **Delegate to multiple workers** to research different aspects in parallel; you act as the **final gate** to synthesize and verify quality.
|
|
13
|
+
* Deliverables must be stated as **findings, gaps, and actionable recommendations**.
|
|
14
|
+
* **Single-pass delivery**: no deferrals; deliver a complete assessment.
|
|
15
|
+
* **Explore beyond the spec**: identify vulnerabilities and hardening opportunities.
|
|
16
|
+
|
|
17
|
+
## Tech Stack
|
|
18
|
+
|
|
19
|
+
* **Rate Limiting**: Upstash Redis
|
|
20
|
+
* **Framework**: Next.js
|
|
21
|
+
* **Platform**: Vercel
|
|
22
|
+
|
|
23
|
+
## Review Scope
|
|
24
|
+
|
|
25
|
+
### Security Baseline
|
|
26
|
+
|
|
27
|
+
* OWASP Top 10:2025 taxonomy; OWASP ASVS (L2/L3) verification baseline.
|
|
28
|
+
* Password UX masked + temporary reveal; no plaintext passwords in logs/returns/storage/telemetry.
|
|
29
|
+
* MFA for Admin/SUPER_ADMIN; step-up for high-risk.
|
|
30
|
+
* Risk-based anti-bot for auth and high-cost endpoints; integrate rate limits + consent gating.
|
|
31
|
+
|
|
32
|
+
### Baseline Controls
|
|
33
|
+
|
|
34
|
+
* CSP/HSTS/headers
|
|
35
|
+
* CSRF where applicable
|
|
36
|
+
* Upstash-backed rate limiting
|
|
37
|
+
* PII scrubbing
|
|
38
|
+
* Supply-chain hygiene
|
|
39
|
+
* Measurable security
|
|
40
|
+
|
|
41
|
+
### Configuration and Secrets Governance
|
|
42
|
+
|
|
43
|
+
* Required configuration must fail-fast at build/startup
|
|
44
|
+
* Strict environment isolation (dev/stage/prod)
|
|
45
|
+
* Rotation and incident remediation posture must be auditable and exercisable
|
|
46
|
+
|
|
47
|
+
## Key Areas to Explore
|
|
48
|
+
|
|
49
|
+
* What OWASP Top 10 vulnerabilities exist in the current implementation?
|
|
50
|
+
* How comprehensive are the security headers (CSP, HSTS, etc.)?
|
|
51
|
+
* Where is rate limiting missing or insufficient?
|
|
52
|
+
* How are secrets managed and what is the rotation strategy?
|
|
53
|
+
* What attack vectors exist for the authentication flows?
|
|
54
|
+
* How does the system detect and respond to security incidents?
|
|
@@ -0,0 +1,51 @@
|
|
|
1
|
+
---
|
|
2
|
+
name: review-seo
|
|
3
|
+
description: Review SEO - metadata, Open Graph, canonical, hreflang, sitemap
|
|
4
|
+
agent: coder
|
|
5
|
+
---
|
|
6
|
+
|
|
7
|
+
# SEO Review
|
|
8
|
+
|
|
9
|
+
## Mandate
|
|
10
|
+
|
|
11
|
+
* Perform a **deep, thorough review** of SEO in this codebase.
|
|
12
|
+
* **Delegate to multiple workers** to research different aspects in parallel; you act as the **final gate** to synthesize and verify quality.
|
|
13
|
+
* Deliverables must be stated as **findings, gaps, and actionable recommendations**.
|
|
14
|
+
* **Single-pass delivery**: no deferrals; deliver a complete assessment.
|
|
15
|
+
* **Explore beyond the spec**: identify improvements for discoverability and search rankings.
|
|
16
|
+
|
|
17
|
+
## Tech Stack
|
|
18
|
+
|
|
19
|
+
* **Framework**: Next.js (SSR-first for indexable/discovery)
|
|
20
|
+
|
|
21
|
+
## Review Scope
|
|
22
|
+
|
|
23
|
+
### SEO Requirements
|
|
24
|
+
|
|
25
|
+
* SEO-first + SSR-first for indexable/discovery
|
|
26
|
+
* Required elements:
|
|
27
|
+
* Metadata (title, description)
|
|
28
|
+
* Open Graph tags
|
|
29
|
+
* Favicon (all sizes)
|
|
30
|
+
* Canonical URLs
|
|
31
|
+
* hreflang + x-default
|
|
32
|
+
* schema.org structured data
|
|
33
|
+
* sitemap.xml
|
|
34
|
+
* robots.txt
|
|
35
|
+
|
|
36
|
+
### SEO/i18n/Canonicalization Verification
|
|
37
|
+
|
|
38
|
+
* `/en/*` non-existence (must redirect)
|
|
39
|
+
* hreflang/x-default correct
|
|
40
|
+
* Sitemap containing only true variants
|
|
41
|
+
* UGC canonical redirects
|
|
42
|
+
* Locale routing invariants
|
|
43
|
+
|
|
44
|
+
## Key Areas to Explore
|
|
45
|
+
|
|
46
|
+
* How does the site perform in search engine results currently?
|
|
47
|
+
* What pages are missing proper metadata or structured data?
|
|
48
|
+
* How does the sitemap handle dynamic content and pagination?
|
|
49
|
+
* Are there duplicate content issues or canonicalization problems?
|
|
50
|
+
* What opportunities exist for featured snippets or rich results?
|
|
51
|
+
* How does page load performance affect SEO rankings?
|
|
@@ -0,0 +1,38 @@
|
|
|
1
|
+
---
|
|
2
|
+
name: review-storage
|
|
3
|
+
description: Review storage - Vercel Blob upload governance, intent-based uploads
|
|
4
|
+
agent: coder
|
|
5
|
+
---
|
|
6
|
+
|
|
7
|
+
# Storage Review
|
|
8
|
+
|
|
9
|
+
## Mandate
|
|
10
|
+
|
|
11
|
+
* Perform a **deep, thorough review** of file storage and uploads in this codebase.
|
|
12
|
+
* **Delegate to multiple workers** to research different aspects in parallel; you act as the **final gate** to synthesize and verify quality.
|
|
13
|
+
* Deliverables must be stated as **findings, gaps, and actionable recommendations**.
|
|
14
|
+
* **Single-pass delivery**: no deferrals; deliver a complete assessment.
|
|
15
|
+
* **Explore beyond the spec**: identify improvements for security, reliability, and cost efficiency.
|
|
16
|
+
|
|
17
|
+
## Tech Stack
|
|
18
|
+
|
|
19
|
+
* **Storage**: Vercel Blob
|
|
20
|
+
* **Platform**: Vercel
|
|
21
|
+
|
|
22
|
+
## Review Scope
|
|
23
|
+
|
|
24
|
+
### Vercel Blob Upload Governance (Hard Requirement)
|
|
25
|
+
|
|
26
|
+
* All uploads must be **intent-based and server-verified**.
|
|
27
|
+
* The client must upload to Vercel Blob first using short-lived, server-issued authorization (e.g., signed upload URL / token), then call a server finalize endpoint to persist the resulting Blob URL/key.
|
|
28
|
+
* The server must validate the Blob URL/key ownership and namespace, and must match it against the originating upload intent (who/what/where/expiry/constraints) before attaching it to any resource.
|
|
29
|
+
* The system must support safe retries and idempotent finalize; expired/abandoned intents must be cleanable and auditable.
|
|
30
|
+
|
|
31
|
+
## Key Areas to Explore
|
|
32
|
+
|
|
33
|
+
* How are uploads currently implemented and do they follow intent-based pattern?
|
|
34
|
+
* What security vulnerabilities exist in the upload flow?
|
|
35
|
+
* How are abandoned/orphaned uploads handled?
|
|
36
|
+
* What is the cost implication of current storage patterns?
|
|
37
|
+
* How does the system handle large files and upload failures?
|
|
38
|
+
* What content validation (type, size, malware) exists?
|
|
@@ -0,0 +1,43 @@
|
|
|
1
|
+
---
|
|
2
|
+
name: review-support
|
|
3
|
+
description: Review support - contact, communications, newsletter
|
|
4
|
+
agent: coder
|
|
5
|
+
---
|
|
6
|
+
|
|
7
|
+
# Support Review
|
|
8
|
+
|
|
9
|
+
## Mandate
|
|
10
|
+
|
|
11
|
+
* Perform a **deep, thorough review** of support and communications in this codebase.
|
|
12
|
+
* **Delegate to multiple workers** to research different aspects in parallel; you act as the **final gate** to synthesize and verify quality.
|
|
13
|
+
* Deliverables must be stated as **findings, gaps, and actionable recommendations**.
|
|
14
|
+
* **Single-pass delivery**: no deferrals; deliver a complete assessment.
|
|
15
|
+
* **Explore beyond the spec**: identify user satisfaction improvements and support efficiency gains.
|
|
16
|
+
|
|
17
|
+
## Tech Stack
|
|
18
|
+
|
|
19
|
+
* **Email**: Resend
|
|
20
|
+
* **Framework**: Next.js
|
|
21
|
+
|
|
22
|
+
## Review Scope
|
|
23
|
+
|
|
24
|
+
### Support and Communications
|
|
25
|
+
|
|
26
|
+
* Support/Contact surface must be:
|
|
27
|
+
* Discoverable
|
|
28
|
+
* Localized
|
|
29
|
+
* WCAG AA compliant
|
|
30
|
+
* SEO-complete
|
|
31
|
+
* Privacy-safe
|
|
32
|
+
* Auditable where relevant
|
|
33
|
+
* Newsletter subscription/preferences must be consent-aware
|
|
34
|
+
* Unsubscribe enforcement must be reliable
|
|
35
|
+
|
|
36
|
+
## Key Areas to Explore
|
|
37
|
+
|
|
38
|
+
* How do users find help when they need it?
|
|
39
|
+
* What self-service support options exist (FAQ, help center)?
|
|
40
|
+
* How are support requests tracked and resolved?
|
|
41
|
+
* What is the email deliverability and engagement rate?
|
|
42
|
+
* How does the newsletter system handle bounces and complaints?
|
|
43
|
+
* What support tools do agents have for helping users?
|
|
@@ -0,0 +1,49 @@
|
|
|
1
|
+
---
|
|
2
|
+
name: review-uiux
|
|
3
|
+
description: Review UI/UX - design system, tokens, accessibility, guidance
|
|
4
|
+
agent: coder
|
|
5
|
+
---
|
|
6
|
+
|
|
7
|
+
# UI/UX Review
|
|
8
|
+
|
|
9
|
+
## Mandate
|
|
10
|
+
|
|
11
|
+
* Perform a **deep, thorough review** of UI/UX in this codebase.
|
|
12
|
+
* **Delegate to multiple workers** to research different aspects in parallel; you act as the **final gate** to synthesize and verify quality.
|
|
13
|
+
* Deliverables must be stated as **findings, gaps, and actionable recommendations**.
|
|
14
|
+
* **Single-pass delivery**: no deferrals; deliver a complete assessment.
|
|
15
|
+
* **Explore beyond the spec**: identify usability improvements and design inconsistencies.
|
|
16
|
+
|
|
17
|
+
## Tech Stack
|
|
18
|
+
|
|
19
|
+
* **Framework**: Next.js
|
|
20
|
+
* **Icons**: Iconify
|
|
21
|
+
|
|
22
|
+
## Review Scope
|
|
23
|
+
|
|
24
|
+
### UX, Design System, and Guidance
|
|
25
|
+
|
|
26
|
+
* Design-system driven UI (tokens)
|
|
27
|
+
* Dark/light theme support
|
|
28
|
+
* WCAG AA compliance
|
|
29
|
+
* CLS-safe (no layout shifts)
|
|
30
|
+
* Responsive design (mobile-first, desktop-second)
|
|
31
|
+
* Iconify for icons; no emoji in UI content
|
|
32
|
+
|
|
33
|
+
### Guidance Requirements
|
|
34
|
+
|
|
35
|
+
* Guidance is mandatory for all user-facing features and monetization flows:
|
|
36
|
+
* Discoverable
|
|
37
|
+
* Clear
|
|
38
|
+
* Dismissible with re-entry
|
|
39
|
+
* Localized and measurable
|
|
40
|
+
* Governed by eligibility and frequency controls
|
|
41
|
+
|
|
42
|
+
## Key Areas to Explore
|
|
43
|
+
|
|
44
|
+
* How consistent is the design system across the application?
|
|
45
|
+
* What accessibility issues exist and affect real users?
|
|
46
|
+
* Where do users get confused or drop off in key flows?
|
|
47
|
+
* How does the mobile experience compare to desktop?
|
|
48
|
+
* What guidance/onboarding is missing for complex features?
|
|
49
|
+
* How does the dark/light theme implementation handle edge cases?
|
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@sylphx/flow",
|
|
3
|
-
"version": "2.
|
|
3
|
+
"version": "2.11.0",
|
|
4
4
|
"description": "One CLI to rule them all. Unified orchestration layer for Claude Code, OpenCode, Cursor and all AI development tools. Auto-detection, auto-installation, auto-upgrade.",
|
|
5
5
|
"type": "module",
|
|
6
6
|
"bin": {
|
|
@@ -1,123 +0,0 @@
|
|
|
1
|
-
---
|
|
2
|
-
name: saas-admin
|
|
3
|
-
description: SaaS admin platform review - RBAC, bootstrap, config, feature flags, ops
|
|
4
|
-
agent: coder
|
|
5
|
-
---
|
|
6
|
-
|
|
7
|
-
# Admin Platform Review
|
|
8
|
-
|
|
9
|
-
## Scope
|
|
10
|
-
|
|
11
|
-
Review admin systems: RBAC, bootstrap flow, configuration management, feature flags governance, operational tooling, and impersonation.
|
|
12
|
-
|
|
13
|
-
## Specification
|
|
14
|
-
|
|
15
|
-
### Access Control (RBAC)
|
|
16
|
-
|
|
17
|
-
* **Least privilege principle**: Users get minimum permissions needed.
|
|
18
|
-
* Role hierarchy with clear inheritance.
|
|
19
|
-
* Permission granularity (resource-level, action-level).
|
|
20
|
-
* All authorization is **server-enforced**; no client-trust.
|
|
21
|
-
* Role changes require appropriate privilege level and are audited.
|
|
22
|
-
|
|
23
|
-
### Admin Bootstrap (Hard Requirement)
|
|
24
|
-
|
|
25
|
-
* Admin bootstrap must **not rely on file seeding**.
|
|
26
|
-
* Use a secure, auditable **first-login allowlist** for the initial SUPER_ADMIN.
|
|
27
|
-
* **Permanently disable bootstrap** after completion — no re-entry.
|
|
28
|
-
* All privilege grants must be server-enforced and recorded in the audit log.
|
|
29
|
-
* The allowlist must be managed via **secure configuration (environment/secret store)**, not code or DB seeding.
|
|
30
|
-
|
|
31
|
-
### Configuration Management
|
|
32
|
-
|
|
33
|
-
* All **non-secret** product-level configuration must be manageable via admin (server-enforced).
|
|
34
|
-
* Configuration changes require **validation and change history**.
|
|
35
|
-
* Secrets/credentials are **environment-managed only**; admin may expose safe readiness/health visibility, not raw secrets.
|
|
36
|
-
* Support for environment-specific overrides (dev/staging/prod).
|
|
37
|
-
* Rollback capability for configuration changes.
|
|
38
|
-
|
|
39
|
-
### Feature Flags Governance
|
|
40
|
-
|
|
41
|
-
* Gradual rollout support (percentage-based, user segment-based).
|
|
42
|
-
* A/B testing integration where applicable.
|
|
43
|
-
* **Audit trail** for all flag changes (who/when/why).
|
|
44
|
-
* Emergency **kill switches** for rapid disable.
|
|
45
|
-
* Flag lifecycle management (created → active → deprecated → removed).
|
|
46
|
-
* Server-enforced evaluation; no client-side flag source-of-truth.
|
|
47
|
-
|
|
48
|
-
### Operational Management
|
|
49
|
-
|
|
50
|
-
* **User/account management tools**:
|
|
51
|
-
* Search, view, edit user profiles
|
|
52
|
-
* Account status management (active, suspended, banned)
|
|
53
|
-
* Manual verification/unverification
|
|
54
|
-
|
|
55
|
-
* **Entitlements/access management**:
|
|
56
|
-
* View and modify user entitlements
|
|
57
|
-
* Grant/revoke access with audit trail
|
|
58
|
-
* Bulk operations with safeguards
|
|
59
|
-
|
|
60
|
-
* **Lifecycle actions**:
|
|
61
|
-
* Account suspension/reactivation
|
|
62
|
-
* Data export (for user requests)
|
|
63
|
-
* Account deletion with proper cascade
|
|
64
|
-
|
|
65
|
-
* **Issue resolution workflows**:
|
|
66
|
-
* Support ticket integration
|
|
67
|
-
* Action history per user
|
|
68
|
-
* Notes and annotations
|
|
69
|
-
|
|
70
|
-
* **Step-up controls** for sensitive actions:
|
|
71
|
-
* Actions affecting money/credits require MFA
|
|
72
|
-
* Actions affecting security posture require MFA
|
|
73
|
-
* Destructive actions require confirmation + reason
|
|
74
|
-
|
|
75
|
-
### Impersonation
|
|
76
|
-
|
|
77
|
-
* Impersonation allowed **with explicit safeguards**:
|
|
78
|
-
* Requires elevated privilege level
|
|
79
|
-
* Time-limited sessions (auto-expire)
|
|
80
|
-
* Full audit logging (start, actions, end)
|
|
81
|
-
* Clear indicator in UI during impersonation
|
|
82
|
-
* Cannot impersonate higher-privilege users
|
|
83
|
-
* All actions during impersonation attributed to both impersonator and target.
|
|
84
|
-
* Optional: Visible indicator to impersonated user that session was accessed.
|
|
85
|
-
|
|
86
|
-
### Admin Audit Logging
|
|
87
|
-
|
|
88
|
-
* **All admin actions must be auditable**:
|
|
89
|
-
* Who performed the action
|
|
90
|
-
* When (timestamp with timezone)
|
|
91
|
-
* What action was taken
|
|
92
|
-
* Why (required reason for sensitive actions)
|
|
93
|
-
* Before/after state for mutations
|
|
94
|
-
* Correlation to session/request
|
|
95
|
-
* Audit logs must be:
|
|
96
|
-
* Immutable (append-only)
|
|
97
|
-
* Queryable and filterable
|
|
98
|
-
* Exportable for compliance
|
|
99
|
-
* Retained per data retention policy
|
|
100
|
-
|
|
101
|
-
## Domain Discovery
|
|
102
|
-
|
|
103
|
-
After reviewing compliance with spec, explore improvements:
|
|
104
|
-
|
|
105
|
-
* **Admin UX**: Is the admin panel efficient for common tasks? Keyboard shortcuts? Bulk actions?
|
|
106
|
-
* **Self-service vs admin**: What admin actions could be self-service for users?
|
|
107
|
-
* **Automation**: What repetitive admin tasks could be automated? Scheduled jobs?
|
|
108
|
-
* **Alerting**: Should certain admin actions trigger alerts? (e.g., mass deletions)
|
|
109
|
-
* **Delegation**: Can some admin tasks be delegated to lower roles safely?
|
|
110
|
-
* **Mobile admin**: Is there a need for mobile admin access? How to secure?
|
|
111
|
-
|
|
112
|
-
## Domain Gates
|
|
113
|
-
|
|
114
|
-
* [ ] RBAC implemented with least privilege
|
|
115
|
-
* [ ] Bootstrap flow is secure and one-time only
|
|
116
|
-
* [ ] Config changes are validated and audited
|
|
117
|
-
* [ ] Feature flags have full audit trail
|
|
118
|
-
* [ ] Sensitive actions require step-up (MFA)
|
|
119
|
-
* [ ] Impersonation is time-limited and fully logged
|
|
120
|
-
* [ ] All admin actions are auditable
|
|
121
|
-
* [ ] Audit logs are immutable and queryable
|
|
122
|
-
* [ ] No hardcoded admin credentials anywhere
|
|
123
|
-
* [ ] Admin endpoints are rate-limited
|