@sylphx/flow 2.9.0 → 2.11.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (35) hide show
  1. package/CHANGELOG.md +25 -0
  2. package/assets/slash-commands/review-account-security.md +48 -0
  3. package/assets/slash-commands/review-admin.md +58 -0
  4. package/assets/slash-commands/review-auth.md +42 -0
  5. package/assets/slash-commands/review-billing.md +52 -0
  6. package/assets/slash-commands/review-code-quality.md +44 -0
  7. package/assets/slash-commands/review-data-architecture.md +43 -0
  8. package/assets/slash-commands/review-database.md +37 -0
  9. package/assets/slash-commands/review-delivery.md +57 -0
  10. package/assets/slash-commands/review-discovery.md +34 -0
  11. package/assets/slash-commands/review-growth.md +57 -0
  12. package/assets/slash-commands/review-i18n.md +54 -0
  13. package/assets/slash-commands/review-ledger.md +38 -0
  14. package/assets/slash-commands/review-observability.md +43 -0
  15. package/assets/slash-commands/review-operability.md +50 -0
  16. package/assets/slash-commands/review-performance.md +47 -0
  17. package/assets/slash-commands/review-pricing.md +45 -0
  18. package/assets/slash-commands/review-privacy.md +56 -0
  19. package/assets/slash-commands/review-pwa.md +43 -0
  20. package/assets/slash-commands/review-referral.md +50 -0
  21. package/assets/slash-commands/review-security.md +54 -0
  22. package/assets/slash-commands/review-seo.md +51 -0
  23. package/assets/slash-commands/review-storage.md +38 -0
  24. package/assets/slash-commands/review-support.md +43 -0
  25. package/assets/slash-commands/review-uiux.md +49 -0
  26. package/package.json +1 -1
  27. package/assets/slash-commands/saas-admin.md +0 -123
  28. package/assets/slash-commands/saas-auth.md +0 -78
  29. package/assets/slash-commands/saas-billing.md +0 -68
  30. package/assets/slash-commands/saas-discovery.md +0 -135
  31. package/assets/slash-commands/saas-growth.md +0 -94
  32. package/assets/slash-commands/saas-i18n.md +0 -66
  33. package/assets/slash-commands/saas-platform.md +0 -87
  34. package/assets/slash-commands/saas-review.md +0 -178
  35. package/assets/slash-commands/saas-security.md +0 -108
@@ -0,0 +1,50 @@
1
+ ---
2
+ name: review-operability
3
+ description: Review operability - async workflows, DLQ, retries, drift detection
4
+ agent: coder
5
+ ---
6
+
7
+ # Operability Review
8
+
9
+ ## Mandate
10
+
11
+ * Perform a **deep, thorough review** of operability in this codebase.
12
+ * **Delegate to multiple workers** to research different aspects in parallel; you act as the **final gate** to synthesize and verify quality.
13
+ * Deliverables must be stated as **findings, gaps, and actionable recommendations**.
14
+ * **Single-pass delivery**: no deferrals; deliver a complete assessment.
15
+ * **Explore beyond the spec**: identify operational risks and reliability improvements.
16
+
17
+ ## Tech Stack
18
+
19
+ * **Workflows**: Upstash Workflows + QStash
20
+ * **Cache**: Upstash Redis
21
+ * **Platform**: Vercel
22
+
23
+ ## Review Scope
24
+
25
+ ### Async/Workflows Governance (Hard Requirement)
26
+
27
+ * Define idempotency and deduplication posture
28
+ * Define controlled retries/backoff
29
+ * **Dead-letter handling must exist and be observable and operable**
30
+ * **Safe replay must be supported**
31
+ * Side-effects (email/billing/ledger/entitlements) must be governed such that they are either proven effectively-once or safely re-entrant
32
+
33
+ ### Drift Detection (Hard Requirement)
34
+
35
+ * Drift alerts must have a defined remediation playbook (automated fix or operator workflow)
36
+ * Each remediation must be auditable and support post-incident traceability
37
+
38
+ ### Release Safety
39
+
40
+ * Define safe rollout posture with backward compatibility
41
+ * Rollback expectations for billing/ledger/auth changes
42
+
43
+ ## Key Areas to Explore
44
+
45
+ * How does the system handle job failures and retries?
46
+ * What happens to messages that fail permanently (DLQ)?
47
+ * How are operators notified of and able to resolve stuck workflows?
48
+ * What drift can occur between systems and how is it detected?
49
+ * How safe is the deployment process for critical paths?
50
+ * What runbooks exist for common operational issues?
@@ -0,0 +1,47 @@
1
+ ---
2
+ name: review-performance
3
+ description: Review performance - budgets, Core Web Vitals, caching
4
+ agent: coder
5
+ ---
6
+
7
+ # Performance Review
8
+
9
+ ## Mandate
10
+
11
+ * Perform a **deep, thorough review** of performance in this codebase.
12
+ * **Delegate to multiple workers** to research different aspects in parallel; you act as the **final gate** to synthesize and verify quality.
13
+ * Deliverables must be stated as **findings, gaps, and actionable recommendations**.
14
+ * **Single-pass delivery**: no deferrals; deliver a complete assessment.
15
+ * **Explore beyond the spec**: identify bottlenecks and optimization opportunities.
16
+
17
+ ## Tech Stack
18
+
19
+ * **Framework**: Next.js (SSR/ISR/Static)
20
+ * **Platform**: Vercel
21
+ * **Tooling**: Bun
22
+
23
+ ## Review Scope
24
+
25
+ ### Performance Requirements
26
+
27
+ * Performance must be **measurable and regression-resistant**:
28
+ * Define and enforce performance budgets for key journeys
29
+ * Define caching boundaries and correctness requirements across SSR/ISR/static and service worker behavior
30
+ * Monitor Core Web Vitals and server latency
31
+ * Alert on regressions
32
+
33
+ ### Core Web Vitals Targets
34
+
35
+ * LCP (Largest Contentful Paint) < 2.5s
36
+ * FID (First Input Delay) < 100ms
37
+ * CLS (Cumulative Layout Shift) < 0.1
38
+ * INP (Interaction to Next Paint) < 200ms
39
+
40
+ ## Key Areas to Explore
41
+
42
+ * What are the current Core Web Vitals scores and where do they fall short?
43
+ * Which pages or components are the biggest performance bottlenecks?
44
+ * How effective is the current caching strategy?
45
+ * What opportunities exist for code splitting and lazy loading?
46
+ * How does the bundle size compare to industry benchmarks?
47
+ * What database queries are slow and how can they be optimized?
@@ -0,0 +1,45 @@
1
+ ---
2
+ name: review-pricing
3
+ description: Review pricing - pricing governance, grandfathering, migrations
4
+ agent: coder
5
+ ---
6
+
7
+ # Pricing Review
8
+
9
+ ## Mandate
10
+
11
+ * Perform a **deep, thorough review** of pricing governance in this codebase.
12
+ * **Delegate to multiple workers** to research different aspects in parallel; you act as the **final gate** to synthesize and verify quality.
13
+ * Deliverables must be stated as **findings, gaps, and actionable recommendations**.
14
+ * **Single-pass delivery**: no deferrals; deliver a complete assessment.
15
+ * **Explore beyond the spec**: identify monetization opportunities and pricing strategy improvements.
16
+
17
+ ## Tech Stack
18
+
19
+ * **Payments**: Stripe
20
+
21
+ ## Review Scope
22
+
23
+ ### Stripe Pricing Governance (Stripe-first, not Dashboard-first)
24
+
25
+ * Stripe is the system-of-record for products, prices, subscriptions, invoices, and disputes; internal systems must not contradict Stripe truth.
26
+ * Pricing changes must be performed by creating new Stripe Prices and updating the "active sellable price" policy; historical prices must remain immutable for existing subscriptions unless an approved migration is executed.
27
+ * Default pricing change policy is **grandfathering**: existing subscribers keep their current price; new customers use the currently active sellable price.
28
+
29
+ ### Pricing Admin Requirements
30
+
31
+ * An operational-grade Pricing Admin must exist to manage:
32
+ * Creation of new Stripe Prices
33
+ * Activation/deactivation of sellable prices
34
+ * Controlled bulk subscription migrations (optional)
35
+ * All actions must be governed by RBAC, step-up controls, and audit logs.
36
+ * Stripe Dashboard is treated as monitoring/emergency access; non-admin Stripe changes must be detectable (drift), alertable, and remediable.
37
+
38
+ ## Key Areas to Explore
39
+
40
+ * How does the pricing model compare to competitors?
41
+ * What friction exists in the upgrade/downgrade paths?
42
+ * How is grandfathering implemented and communicated?
43
+ * What tools exist for pricing experimentation (A/B tests)?
44
+ * How are pricing changes rolled out safely?
45
+ * What analytics exist for pricing optimization decisions?
@@ -0,0 +1,56 @@
1
+ ---
2
+ name: review-privacy
3
+ description: Review privacy - consent, PII handling, data lifecycle, GDPR
4
+ agent: coder
5
+ ---
6
+
7
+ # Privacy Review
8
+
9
+ ## Mandate
10
+
11
+ * Perform a **deep, thorough review** of privacy controls in this codebase.
12
+ * **Delegate to multiple workers** to research different aspects in parallel; you act as the **final gate** to synthesize and verify quality.
13
+ * Deliverables must be stated as **findings, gaps, and actionable recommendations**.
14
+ * **Single-pass delivery**: no deferrals; deliver a complete assessment.
15
+ * **Explore beyond the spec**: identify compliance gaps and privacy improvements.
16
+
17
+ ## Tech Stack
18
+
19
+ * **Analytics**: PostHog
20
+ * **Email**: Resend
21
+ * **Tag Management**: GTM (marketing only)
22
+ * **Observability**: Sentry
23
+
24
+ ## Review Scope
25
+
26
+ ### Consent Governance (Release-Blocking)
27
+
28
+ * Analytics (PostHog) and marketing/newsletter communications (Resend) must be governed by consent and user preferences.
29
+ * Marketing tags (including GTM and Google Ads) must not load or fire without the appropriate consent.
30
+ * Without consent, tracking and marketing sends must not occur, except for strictly necessary service communications.
31
+ * Event schemas and attributes must follow data minimization, with explicit PII classification and handling rules.
32
+
33
+ ### PII and Sensitive Data Controls (Hard Requirement)
34
+
35
+ * PII rules apply to logs, Sentry, PostHog, support tooling, email systems, and marketing tags/conversion payloads.
36
+ * A consistent scrubbing/redaction standard must exist, and must be covered by automated tests to prevent leakage to third parties.
37
+
38
+ ### Data Lifecycle
39
+
40
+ * Define deletion/deactivation semantics
41
+ * Deletion propagation to third parties
42
+ * Export where applicable
43
+ * **Define data classification, retention periods, deletion propagation to third-party processors, and explicit exceptions** (legal/tax/anti-fraud)
44
+
45
+ ### Behavioral Consistency
46
+
47
+ * **Behavioral consistency is required**: policy and disclosures must match actual behavior across UI, data handling, logging/observability, analytics, support operations, and marketing tags; mismatches are release-blocking.
48
+
49
+ ## Key Areas to Explore
50
+
51
+ * Does the consent implementation actually block tracking before consent?
52
+ * Where does PII leak into logs, analytics, or error tracking?
53
+ * How does account deletion propagate to all third-party services?
54
+ * Does the privacy policy accurately reflect actual data practices?
55
+ * What data retention policies exist and are they enforced?
56
+ * How would the system handle a GDPR data subject access request?
@@ -0,0 +1,43 @@
1
+ ---
2
+ name: review-pwa
3
+ description: Review PWA - manifest, service worker, caching, push notifications
4
+ agent: coder
5
+ ---
6
+
7
+ # PWA Review
8
+
9
+ ## Mandate
10
+
11
+ * Perform a **deep, thorough review** of PWA implementation in this codebase.
12
+ * **Delegate to multiple workers** to research different aspects in parallel; you act as the **final gate** to synthesize and verify quality.
13
+ * Deliverables must be stated as **findings, gaps, and actionable recommendations**.
14
+ * **Single-pass delivery**: no deferrals; deliver a complete assessment.
15
+ * **Explore beyond the spec**: identify engagement opportunities and offline capabilities.
16
+
17
+ ## Tech Stack
18
+
19
+ * **Framework**: Next.js
20
+ * **Platform**: Vercel
21
+
22
+ ## Review Scope
23
+
24
+ ### PWA Requirements
25
+
26
+ * Manifest file complete and valid
27
+ * Service worker with explicit cache correctness
28
+ * Push notifications using VAPID where applicable
29
+
30
+ ### Service Worker Caching Boundary (Mandatory)
31
+
32
+ * Service worker must not cache personalized/sensitive/authorized content
33
+ * Authenticated and entitlement-sensitive routes must have explicit cache-control and SW rules
34
+ * Must be validated by tests to prevent stale or unauthorized state exposure
35
+
36
+ ## Key Areas to Explore
37
+
38
+ * Does the PWA meet installation criteria on all platforms?
39
+ * What is the offline experience and how can it be improved?
40
+ * How does the service worker handle cache invalidation on deploys?
41
+ * What push notification capabilities exist and how are they used?
42
+ * Are there any caching bugs that expose stale or unauthorized content?
43
+ * How does the PWA experience compare to native app expectations?
@@ -0,0 +1,50 @@
1
+ ---
2
+ name: review-referral
3
+ description: Review referral - attribution, anti-fraud, rewards, clawback
4
+ agent: coder
5
+ ---
6
+
7
+ # Referral Review
8
+
9
+ ## Mandate
10
+
11
+ * Perform a **deep, thorough review** of the referral system in this codebase.
12
+ * **Delegate to multiple workers** to research different aspects in parallel; you act as the **final gate** to synthesize and verify quality.
13
+ * Deliverables must be stated as **findings, gaps, and actionable recommendations**.
14
+ * **Single-pass delivery**: no deferrals; deliver a complete assessment.
15
+ * **Explore beyond the spec**: identify growth opportunities and fraud prevention improvements.
16
+
17
+ ## Tech Stack
18
+
19
+ * **Analytics**: PostHog
20
+ * **Database**: Neon (Postgres)
21
+
22
+ ## Review Scope
23
+
24
+ ### Referral (Anti-Abuse Baseline Required)
25
+
26
+ * Referral must be measurable, abuse-resistant, and governed:
27
+ * Attribution semantics
28
+ * Reward lifecycle governance (including revocation/clawbacks)
29
+ * Anti-fraud measures
30
+ * Admin reporting/audit
31
+ * Localized and instrumented
32
+
33
+ ### Referral Anti-Fraud Minimum Baseline (Mandatory)
34
+
35
+ * Define a minimum set of risk signals and enforcement measures, including:
36
+ * Velocity controls
37
+ * Account/device linkage posture
38
+ * Risk-tiered enforcement
39
+ * Reward delay/hold/freeze
40
+ * Clawback conditions
41
+ * Auditable manual review/appeal posture where applicable
42
+
43
+ ## Key Areas to Explore
44
+
45
+ * How effective is the current referral program at driving growth?
46
+ * What fraud patterns have been observed and how are they mitigated?
47
+ * How does the attribution model handle edge cases (multiple touches, expired links)?
48
+ * What is the reward fulfillment process and where can it fail?
49
+ * How do users discover and share referral links?
50
+ * What analytics exist to measure referral program ROI?
@@ -0,0 +1,54 @@
1
+ ---
2
+ name: review-security
3
+ description: Review security - OWASP, CSP/HSTS, CSRF, anti-bot, rate limiting
4
+ agent: coder
5
+ ---
6
+
7
+ # Security Review
8
+
9
+ ## Mandate
10
+
11
+ * Perform a **deep, thorough review** of security controls in this codebase.
12
+ * **Delegate to multiple workers** to research different aspects in parallel; you act as the **final gate** to synthesize and verify quality.
13
+ * Deliverables must be stated as **findings, gaps, and actionable recommendations**.
14
+ * **Single-pass delivery**: no deferrals; deliver a complete assessment.
15
+ * **Explore beyond the spec**: identify vulnerabilities and hardening opportunities.
16
+
17
+ ## Tech Stack
18
+
19
+ * **Rate Limiting**: Upstash Redis
20
+ * **Framework**: Next.js
21
+ * **Platform**: Vercel
22
+
23
+ ## Review Scope
24
+
25
+ ### Security Baseline
26
+
27
+ * OWASP Top 10:2025 taxonomy; OWASP ASVS (L2/L3) verification baseline.
28
+ * Password UX masked + temporary reveal; no plaintext passwords in logs/returns/storage/telemetry.
29
+ * MFA for Admin/SUPER_ADMIN; step-up for high-risk.
30
+ * Risk-based anti-bot for auth and high-cost endpoints; integrate rate limits + consent gating.
31
+
32
+ ### Baseline Controls
33
+
34
+ * CSP/HSTS/headers
35
+ * CSRF where applicable
36
+ * Upstash-backed rate limiting
37
+ * PII scrubbing
38
+ * Supply-chain hygiene
39
+ * Measurable security
40
+
41
+ ### Configuration and Secrets Governance
42
+
43
+ * Required configuration must fail-fast at build/startup
44
+ * Strict environment isolation (dev/stage/prod)
45
+ * Rotation and incident remediation posture must be auditable and exercisable
46
+
47
+ ## Key Areas to Explore
48
+
49
+ * What OWASP Top 10 vulnerabilities exist in the current implementation?
50
+ * How comprehensive are the security headers (CSP, HSTS, etc.)?
51
+ * Where is rate limiting missing or insufficient?
52
+ * How are secrets managed and what is the rotation strategy?
53
+ * What attack vectors exist for the authentication flows?
54
+ * How does the system detect and respond to security incidents?
@@ -0,0 +1,51 @@
1
+ ---
2
+ name: review-seo
3
+ description: Review SEO - metadata, Open Graph, canonical, hreflang, sitemap
4
+ agent: coder
5
+ ---
6
+
7
+ # SEO Review
8
+
9
+ ## Mandate
10
+
11
+ * Perform a **deep, thorough review** of SEO in this codebase.
12
+ * **Delegate to multiple workers** to research different aspects in parallel; you act as the **final gate** to synthesize and verify quality.
13
+ * Deliverables must be stated as **findings, gaps, and actionable recommendations**.
14
+ * **Single-pass delivery**: no deferrals; deliver a complete assessment.
15
+ * **Explore beyond the spec**: identify improvements for discoverability and search rankings.
16
+
17
+ ## Tech Stack
18
+
19
+ * **Framework**: Next.js (SSR-first for indexable/discovery)
20
+
21
+ ## Review Scope
22
+
23
+ ### SEO Requirements
24
+
25
+ * SEO-first + SSR-first for indexable/discovery
26
+ * Required elements:
27
+ * Metadata (title, description)
28
+ * Open Graph tags
29
+ * Favicon (all sizes)
30
+ * Canonical URLs
31
+ * hreflang + x-default
32
+ * schema.org structured data
33
+ * sitemap.xml
34
+ * robots.txt
35
+
36
+ ### SEO/i18n/Canonicalization Verification
37
+
38
+ * `/en/*` non-existence (must redirect)
39
+ * hreflang/x-default correct
40
+ * Sitemap containing only true variants
41
+ * UGC canonical redirects
42
+ * Locale routing invariants
43
+
44
+ ## Key Areas to Explore
45
+
46
+ * How does the site perform in search engine results currently?
47
+ * What pages are missing proper metadata or structured data?
48
+ * How does the sitemap handle dynamic content and pagination?
49
+ * Are there duplicate content issues or canonicalization problems?
50
+ * What opportunities exist for featured snippets or rich results?
51
+ * How does page load performance affect SEO rankings?
@@ -0,0 +1,38 @@
1
+ ---
2
+ name: review-storage
3
+ description: Review storage - Vercel Blob upload governance, intent-based uploads
4
+ agent: coder
5
+ ---
6
+
7
+ # Storage Review
8
+
9
+ ## Mandate
10
+
11
+ * Perform a **deep, thorough review** of file storage and uploads in this codebase.
12
+ * **Delegate to multiple workers** to research different aspects in parallel; you act as the **final gate** to synthesize and verify quality.
13
+ * Deliverables must be stated as **findings, gaps, and actionable recommendations**.
14
+ * **Single-pass delivery**: no deferrals; deliver a complete assessment.
15
+ * **Explore beyond the spec**: identify improvements for security, reliability, and cost efficiency.
16
+
17
+ ## Tech Stack
18
+
19
+ * **Storage**: Vercel Blob
20
+ * **Platform**: Vercel
21
+
22
+ ## Review Scope
23
+
24
+ ### Vercel Blob Upload Governance (Hard Requirement)
25
+
26
+ * All uploads must be **intent-based and server-verified**.
27
+ * The client must upload to Vercel Blob first using short-lived, server-issued authorization (e.g., signed upload URL / token), then call a server finalize endpoint to persist the resulting Blob URL/key.
28
+ * The server must validate the Blob URL/key ownership and namespace, and must match it against the originating upload intent (who/what/where/expiry/constraints) before attaching it to any resource.
29
+ * The system must support safe retries and idempotent finalize; expired/abandoned intents must be cleanable and auditable.
30
+
31
+ ## Key Areas to Explore
32
+
33
+ * How are uploads currently implemented and do they follow intent-based pattern?
34
+ * What security vulnerabilities exist in the upload flow?
35
+ * How are abandoned/orphaned uploads handled?
36
+ * What is the cost implication of current storage patterns?
37
+ * How does the system handle large files and upload failures?
38
+ * What content validation (type, size, malware) exists?
@@ -0,0 +1,43 @@
1
+ ---
2
+ name: review-support
3
+ description: Review support - contact, communications, newsletter
4
+ agent: coder
5
+ ---
6
+
7
+ # Support Review
8
+
9
+ ## Mandate
10
+
11
+ * Perform a **deep, thorough review** of support and communications in this codebase.
12
+ * **Delegate to multiple workers** to research different aspects in parallel; you act as the **final gate** to synthesize and verify quality.
13
+ * Deliverables must be stated as **findings, gaps, and actionable recommendations**.
14
+ * **Single-pass delivery**: no deferrals; deliver a complete assessment.
15
+ * **Explore beyond the spec**: identify user satisfaction improvements and support efficiency gains.
16
+
17
+ ## Tech Stack
18
+
19
+ * **Email**: Resend
20
+ * **Framework**: Next.js
21
+
22
+ ## Review Scope
23
+
24
+ ### Support and Communications
25
+
26
+ * Support/Contact surface must be:
27
+ * Discoverable
28
+ * Localized
29
+ * WCAG AA compliant
30
+ * SEO-complete
31
+ * Privacy-safe
32
+ * Auditable where relevant
33
+ * Newsletter subscription/preferences must be consent-aware
34
+ * Unsubscribe enforcement must be reliable
35
+
36
+ ## Key Areas to Explore
37
+
38
+ * How do users find help when they need it?
39
+ * What self-service support options exist (FAQ, help center)?
40
+ * How are support requests tracked and resolved?
41
+ * What is the email deliverability and engagement rate?
42
+ * How does the newsletter system handle bounces and complaints?
43
+ * What support tools do agents have for helping users?
@@ -0,0 +1,49 @@
1
+ ---
2
+ name: review-uiux
3
+ description: Review UI/UX - design system, tokens, accessibility, guidance
4
+ agent: coder
5
+ ---
6
+
7
+ # UI/UX Review
8
+
9
+ ## Mandate
10
+
11
+ * Perform a **deep, thorough review** of UI/UX in this codebase.
12
+ * **Delegate to multiple workers** to research different aspects in parallel; you act as the **final gate** to synthesize and verify quality.
13
+ * Deliverables must be stated as **findings, gaps, and actionable recommendations**.
14
+ * **Single-pass delivery**: no deferrals; deliver a complete assessment.
15
+ * **Explore beyond the spec**: identify usability improvements and design inconsistencies.
16
+
17
+ ## Tech Stack
18
+
19
+ * **Framework**: Next.js
20
+ * **Icons**: Iconify
21
+
22
+ ## Review Scope
23
+
24
+ ### UX, Design System, and Guidance
25
+
26
+ * Design-system driven UI (tokens)
27
+ * Dark/light theme support
28
+ * WCAG AA compliance
29
+ * CLS-safe (no layout shifts)
30
+ * Responsive design (mobile-first, desktop-second)
31
+ * Iconify for icons; no emoji in UI content
32
+
33
+ ### Guidance Requirements
34
+
35
+ * Guidance is mandatory for all user-facing features and monetization flows:
36
+ * Discoverable
37
+ * Clear
38
+ * Dismissible with re-entry
39
+ * Localized and measurable
40
+ * Governed by eligibility and frequency controls
41
+
42
+ ## Key Areas to Explore
43
+
44
+ * How consistent is the design system across the application?
45
+ * What accessibility issues exist and affect real users?
46
+ * Where do users get confused or drop off in key flows?
47
+ * How does the mobile experience compare to desktop?
48
+ * What guidance/onboarding is missing for complex features?
49
+ * How does the dark/light theme implementation handle edge cases?
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@sylphx/flow",
3
- "version": "2.9.0",
3
+ "version": "2.11.0",
4
4
  "description": "One CLI to rule them all. Unified orchestration layer for Claude Code, OpenCode, Cursor and all AI development tools. Auto-detection, auto-installation, auto-upgrade.",
5
5
  "type": "module",
6
6
  "bin": {
@@ -1,123 +0,0 @@
1
- ---
2
- name: saas-admin
3
- description: SaaS admin platform review - RBAC, bootstrap, config, feature flags, ops
4
- agent: coder
5
- ---
6
-
7
- # Admin Platform Review
8
-
9
- ## Scope
10
-
11
- Review admin systems: RBAC, bootstrap flow, configuration management, feature flags governance, operational tooling, and impersonation.
12
-
13
- ## Specification
14
-
15
- ### Access Control (RBAC)
16
-
17
- * **Least privilege principle**: Users get minimum permissions needed.
18
- * Role hierarchy with clear inheritance.
19
- * Permission granularity (resource-level, action-level).
20
- * All authorization is **server-enforced**; no client-trust.
21
- * Role changes require appropriate privilege level and are audited.
22
-
23
- ### Admin Bootstrap (Hard Requirement)
24
-
25
- * Admin bootstrap must **not rely on file seeding**.
26
- * Use a secure, auditable **first-login allowlist** for the initial SUPER_ADMIN.
27
- * **Permanently disable bootstrap** after completion — no re-entry.
28
- * All privilege grants must be server-enforced and recorded in the audit log.
29
- * The allowlist must be managed via **secure configuration (environment/secret store)**, not code or DB seeding.
30
-
31
- ### Configuration Management
32
-
33
- * All **non-secret** product-level configuration must be manageable via admin (server-enforced).
34
- * Configuration changes require **validation and change history**.
35
- * Secrets/credentials are **environment-managed only**; admin may expose safe readiness/health visibility, not raw secrets.
36
- * Support for environment-specific overrides (dev/staging/prod).
37
- * Rollback capability for configuration changes.
38
-
39
- ### Feature Flags Governance
40
-
41
- * Gradual rollout support (percentage-based, user segment-based).
42
- * A/B testing integration where applicable.
43
- * **Audit trail** for all flag changes (who/when/why).
44
- * Emergency **kill switches** for rapid disable.
45
- * Flag lifecycle management (created → active → deprecated → removed).
46
- * Server-enforced evaluation; no client-side flag source-of-truth.
47
-
48
- ### Operational Management
49
-
50
- * **User/account management tools**:
51
- * Search, view, edit user profiles
52
- * Account status management (active, suspended, banned)
53
- * Manual verification/unverification
54
-
55
- * **Entitlements/access management**:
56
- * View and modify user entitlements
57
- * Grant/revoke access with audit trail
58
- * Bulk operations with safeguards
59
-
60
- * **Lifecycle actions**:
61
- * Account suspension/reactivation
62
- * Data export (for user requests)
63
- * Account deletion with proper cascade
64
-
65
- * **Issue resolution workflows**:
66
- * Support ticket integration
67
- * Action history per user
68
- * Notes and annotations
69
-
70
- * **Step-up controls** for sensitive actions:
71
- * Actions affecting money/credits require MFA
72
- * Actions affecting security posture require MFA
73
- * Destructive actions require confirmation + reason
74
-
75
- ### Impersonation
76
-
77
- * Impersonation allowed **with explicit safeguards**:
78
- * Requires elevated privilege level
79
- * Time-limited sessions (auto-expire)
80
- * Full audit logging (start, actions, end)
81
- * Clear indicator in UI during impersonation
82
- * Cannot impersonate higher-privilege users
83
- * All actions during impersonation attributed to both impersonator and target.
84
- * Optional: Visible indicator to impersonated user that session was accessed.
85
-
86
- ### Admin Audit Logging
87
-
88
- * **All admin actions must be auditable**:
89
- * Who performed the action
90
- * When (timestamp with timezone)
91
- * What action was taken
92
- * Why (required reason for sensitive actions)
93
- * Before/after state for mutations
94
- * Correlation to session/request
95
- * Audit logs must be:
96
- * Immutable (append-only)
97
- * Queryable and filterable
98
- * Exportable for compliance
99
- * Retained per data retention policy
100
-
101
- ## Domain Discovery
102
-
103
- After reviewing compliance with spec, explore improvements:
104
-
105
- * **Admin UX**: Is the admin panel efficient for common tasks? Keyboard shortcuts? Bulk actions?
106
- * **Self-service vs admin**: What admin actions could be self-service for users?
107
- * **Automation**: What repetitive admin tasks could be automated? Scheduled jobs?
108
- * **Alerting**: Should certain admin actions trigger alerts? (e.g., mass deletions)
109
- * **Delegation**: Can some admin tasks be delegated to lower roles safely?
110
- * **Mobile admin**: Is there a need for mobile admin access? How to secure?
111
-
112
- ## Domain Gates
113
-
114
- * [ ] RBAC implemented with least privilege
115
- * [ ] Bootstrap flow is secure and one-time only
116
- * [ ] Config changes are validated and audited
117
- * [ ] Feature flags have full audit trail
118
- * [ ] Sensitive actions require step-up (MFA)
119
- * [ ] Impersonation is time-limited and fully logged
120
- * [ ] All admin actions are auditable
121
- * [ ] Audit logs are immutable and queryable
122
- * [ ] No hardcoded admin credentials anywhere
123
- * [ ] Admin endpoints are rate-limited