@windagency/valora 2.2.0 → 2.3.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +45 -19
- package/data/agents/secops-engineer.md +74 -7
- package/data/commands/_meta/schema.json +8 -1
- package/data/commands/assert.md +1 -1
- package/data/commands/generate-all-documentation.md +1 -1
- package/data/commands/generate-docs.md +1 -1
- package/data/commands/implement.md +2 -0
- package/data/commands/plan-architecture.md +1 -1
- package/data/commands/plan-implementation.md +1 -1
- package/data/commands/plan.md +1 -1
- package/data/commands/refine-task.md +1 -1
- package/data/commands/registry.json +11 -11
- package/data/commands/review-code.md +1 -1
- package/data/commands/review-functional.md +1 -1
- package/data/prompts/01_onboard/analyze-patterns.md +1 -0
- package/data/prompts/01_onboard/collect-clarifications.md +1 -0
- package/data/prompts/01_onboard/map-dependencies.md +1 -0
- package/data/prompts/02_context/analyze-change-scope.md +1 -0
- package/data/prompts/02_context/analyze-changes-for-review.md +1 -0
- package/data/prompts/02_context/analyze-codebase-changes.md +1 -0
- package/data/prompts/02_context/analyze-command-execution.md +1 -0
- package/data/prompts/02_context/analyze-commits-for-pr.md +1 -0
- package/data/prompts/02_context/analyze-functional-scope.md +1 -0
- package/data/prompts/02_context/analyze-git-branch.md +1 -0
- package/data/prompts/02_context/analyze-git-status.md +1 -0
- package/data/prompts/02_context/analyze-task-context.md +1 -0
- package/data/prompts/02_context/extract-ticket-info.md +1 -0
- package/data/prompts/02_context/extract-ticket-references.md +1 -0
- package/data/prompts/02_context/gather-git-metrics.md +1 -0
- package/data/prompts/02_context/identify-completed-workflow.md +1 -0
- package/data/prompts/02_context/load-and-analyze-parallel.md +1 -0
- package/data/prompts/02_context/load-commit-template.md +1 -0
- package/data/prompts/02_context/load-implementation-context.md +1 -0
- package/data/prompts/02_context/load-plan-context.md +1 -0
- package/data/prompts/02_context/load-pr-template.md +1 -0
- package/data/prompts/02_context/scan-codebase.md +1 -0
- package/data/prompts/02_context/use-modern-cli-tools.md +1 -0
- package/data/prompts/03_plan/assess-complexity.md +1 -0
- package/data/prompts/03_plan/assess-risks.md +1 -0
- package/data/prompts/03_plan/breakdown-implementation.md +1 -0
- package/data/prompts/03_plan/define-architecture.md +1 -0
- package/data/prompts/03_plan/identify-dependencies.md +1 -0
- package/data/prompts/04_code/calculate-version-bump.md +1 -0
- package/data/prompts/04_code/create-version-tag.md +1 -0
- package/data/prompts/04_code/determine-commit-strategy.md +1 -0
- package/data/prompts/04_code/determine-labels.md +1 -0
- package/data/prompts/04_code/determine-reviewers.md +1 -0
- package/data/prompts/04_code/generate-commit-messages.md +1 -0
- package/data/prompts/04_code/generate-pr-description.md +1 -0
- package/data/prompts/04_code/generate-pr-title.md +1 -0
- package/data/prompts/04_code/implement-changes.md +1 -0
- package/data/prompts/04_code/implement-tests.md +1 -0
- package/data/prompts/04_code/interactive-review.md +1 -0
- package/data/prompts/04_code/push-and-create-pr.md +1 -0
- package/data/prompts/04_code/stage-and-commit.md +1 -0
- package/data/prompts/04_code/validate-prerequisites.md +1 -0
- package/data/prompts/04_code/verify-implementation.md +1 -0
- package/data/prompts/05_review/assess-code-quality.md +1 -0
- package/data/prompts/05_review/assess-constraints.md +1 -0
- package/data/prompts/05_review/evaluate-quality-outcomes.md +1 -0
- package/data/prompts/05_review/generate-commit-insights.md +1 -0
- package/data/prompts/05_review/identify-improvement-areas.md +1 -0
- package/data/prompts/05_review/synthesize-plan-assessment.md +1 -0
- package/data/prompts/05_review/synthesize-validation-report.md +1 -0
- package/data/prompts/05_review/validate-functional-requirements.md +1 -0
- package/data/prompts/05_review/validate-maintainability.md +1 -0
- package/data/prompts/05_review/validate-performance.md +1 -0
- package/data/prompts/05_review/validate-pr-creation.md +1 -0
- package/data/prompts/05_review/validate-pr-readiness.md +1 -0
- package/data/prompts/05_review/validate-risk-coverage.md +1 -0
- package/data/prompts/05_review/validate-step-quality.md +1 -0
- package/data/prompts/05_review/validate-technical-feasibility.md +1 -0
- package/data/prompts/05_review/validate-test-strategy.md +1 -0
- package/data/prompts/05_review/verify-commits.md +1 -0
- package/data/prompts/06_test/analyze-results.md +1 -0
- package/data/prompts/06_test/analyze-test-infrastructure.md +1 -0
- package/data/prompts/06_test/execute-tests.md +1 -0
- package/data/prompts/07_documentation/generate-all-domains-parallel.md +1 -0
- package/data/prompts/07_documentation/generate-code-review-report.md +1 -0
- package/data/prompts/07_documentation/generate-feedback-report.md +1 -0
- package/data/prompts/07_documentation/generate-feedback-summary.md +1 -0
- package/data/prompts/07_documentation/generate-functional-review-report.md +1 -0
- package/data/prompts/07_documentation/generate-prd.md +1 -0
- package/data/prompts/07_documentation/review-and-persist-parallel.md +1 -0
- package/data/prompts/07_documentation/update-changelog.md +1 -0
- package/data/prompts/07_documentation/update-inline-docs.md +1 -0
- package/data/prompts/07_documentation/update-knowledge-base.md +1 -0
- package/data/prompts/_meta/schema.json +4 -0
- package/data/prompts/registry.json +72 -72
- package/dist/ast/ast-context.service.d.ts +32 -0
- package/dist/ast/ast-context.service.d.ts.map +1 -0
- package/dist/ast/ast-context.service.js +220 -0
- package/dist/ast/ast-context.service.js.map +1 -0
- package/dist/ast/ast-index-watcher.service.d.ts +40 -0
- package/dist/ast/ast-index-watcher.service.d.ts.map +1 -0
- package/dist/ast/ast-index-watcher.service.js +124 -0
- package/dist/ast/ast-index-watcher.service.js.map +1 -0
- package/dist/ast/ast-index.service.d.ts +111 -0
- package/dist/ast/ast-index.service.d.ts.map +1 -0
- package/dist/ast/ast-index.service.js +437 -0
- package/dist/ast/ast-index.service.js.map +1 -0
- package/dist/ast/ast-parser.service.d.ts +31 -0
- package/dist/ast/ast-parser.service.d.ts.map +1 -0
- package/dist/ast/ast-parser.service.js +524 -0
- package/dist/ast/ast-parser.service.js.map +1 -0
- package/dist/ast/ast-query.service.d.ts +34 -0
- package/dist/ast/ast-query.service.d.ts.map +1 -0
- package/dist/ast/ast-query.service.js +203 -0
- package/dist/ast/ast-query.service.js.map +1 -0
- package/dist/ast/ast-tools.service.d.ts +39 -0
- package/dist/ast/ast-tools.service.d.ts.map +1 -0
- package/dist/ast/ast-tools.service.js +187 -0
- package/dist/ast/ast-tools.service.js.map +1 -0
- package/dist/ast/ast.types.d.ts +195 -0
- package/dist/ast/ast.types.d.ts.map +1 -0
- package/dist/ast/ast.types.js +8 -0
- package/dist/ast/ast.types.js.map +1 -0
- package/dist/ast/grammars/grammar-loader.d.ts +23 -0
- package/dist/ast/grammars/grammar-loader.d.ts.map +1 -0
- package/dist/ast/grammars/grammar-loader.js +28 -0
- package/dist/ast/grammars/grammar-loader.js.map +1 -0
- package/dist/ast/grammars/language-map.d.ts +28 -0
- package/dist/ast/grammars/language-map.d.ts.map +1 -0
- package/dist/ast/grammars/language-map.js +65 -0
- package/dist/ast/grammars/language-map.js.map +1 -0
- package/dist/ast/grammars/tree-sitter-adapter.d.ts +39 -0
- package/dist/ast/grammars/tree-sitter-adapter.d.ts.map +1 -0
- package/dist/ast/grammars/tree-sitter-adapter.interface.d.ts +84 -0
- package/dist/ast/grammars/tree-sitter-adapter.interface.d.ts.map +1 -0
- package/dist/ast/grammars/tree-sitter-adapter.interface.js +48 -0
- package/dist/ast/grammars/tree-sitter-adapter.interface.js.map +1 -0
- package/dist/ast/grammars/tree-sitter-adapter.js +91 -0
- package/dist/ast/grammars/tree-sitter-adapter.js.map +1 -0
- package/dist/cli/autocomplete.d.ts.map +1 -1
- package/dist/cli/autocomplete.js +6 -6
- package/dist/cli/autocomplete.js.map +1 -1
- package/dist/cli/command-executor.d.ts +10 -0
- package/dist/cli/command-executor.d.ts.map +1 -1
- package/dist/cli/command-executor.js +85 -11
- package/dist/cli/command-executor.js.map +1 -1
- package/dist/cli/command-wizard.d.ts.map +1 -1
- package/dist/cli/command-wizard.js +8 -2
- package/dist/cli/command-wizard.js.map +1 -1
- package/dist/cli/commands/config.d.ts.map +1 -1
- package/dist/cli/commands/config.js +5 -2
- package/dist/cli/commands/config.js.map +1 -1
- package/dist/cli/first-run-setup.d.ts.map +1 -1
- package/dist/cli/first-run-setup.js +3 -1
- package/dist/cli/first-run-setup.js.map +1 -1
- package/dist/cli/provider-resolver.d.ts.map +1 -1
- package/dist/cli/provider-resolver.js +11 -0
- package/dist/cli/provider-resolver.js.map +1 -1
- package/dist/config/constants.d.ts +18 -0
- package/dist/config/constants.d.ts.map +1 -1
- package/dist/config/constants.js +18 -0
- package/dist/config/constants.js.map +1 -1
- package/dist/config/interactive-wizard.d.ts +7 -0
- package/dist/config/interactive-wizard.d.ts.map +1 -1
- package/dist/config/interactive-wizard.js +24 -19
- package/dist/config/interactive-wizard.js.map +1 -1
- package/dist/config/loader.d.ts +5 -0
- package/dist/config/loader.d.ts.map +1 -1
- package/dist/config/loader.js +24 -0
- package/dist/config/loader.js.map +1 -1
- package/dist/config/providers.config.d.ts.map +1 -1
- package/dist/config/providers.config.js +17 -1
- package/dist/config/providers.config.js.map +1 -1
- package/dist/config/schema.d.ts +194 -6
- package/dist/config/schema.d.ts.map +1 -1
- package/dist/config/schema.js +1 -0
- package/dist/config/schema.js.map +1 -1
- package/dist/config/validation-helpers.d.ts.map +1 -1
- package/dist/config/validation-helpers.js +84 -41
- package/dist/config/validation-helpers.js.map +1 -1
- package/dist/di/container.d.ts +5 -0
- package/dist/di/container.d.ts.map +1 -1
- package/dist/di/container.js +17 -0
- package/dist/di/container.js.map +1 -1
- package/dist/executor/message-builder.service.d.ts +2 -0
- package/dist/executor/message-builder.service.d.ts.map +1 -1
- package/dist/executor/message-builder.service.js +6 -1
- package/dist/executor/message-builder.service.js.map +1 -1
- package/dist/executor/stage-executor.d.ts +15 -5
- package/dist/executor/stage-executor.d.ts.map +1 -1
- package/dist/executor/stage-executor.js +126 -22
- package/dist/executor/stage-executor.js.map +1 -1
- package/dist/executor/stage-output-cache.d.ts +3 -3
- package/dist/executor/stage-output-cache.d.ts.map +1 -1
- package/dist/executor/stage-output-cache.js +6 -6
- package/dist/executor/stage-output-cache.js.map +1 -1
- package/dist/executor/tool-execution.service.d.ts +12 -0
- package/dist/executor/tool-execution.service.d.ts.map +1 -1
- package/dist/executor/tool-execution.service.js +270 -8
- package/dist/executor/tool-execution.service.js.map +1 -1
- package/dist/executor/tools/search-tools.service.d.ts +1 -1
- package/dist/executor/tools/search-tools.service.d.ts.map +1 -1
- package/dist/executor/tools/search-tools.service.js +25 -3
- package/dist/executor/tools/search-tools.service.js.map +1 -1
- package/dist/executor/variables.d.ts.map +1 -1
- package/dist/executor/variables.js +5 -0
- package/dist/executor/variables.js.map +1 -1
- package/dist/llm/model-mapping-registry.d.ts.map +1 -1
- package/dist/llm/model-mapping-registry.js +11 -3
- package/dist/llm/model-mapping-registry.js.map +1 -1
- package/dist/llm/providers/anthropic.provider.d.ts.map +1 -1
- package/dist/llm/providers/anthropic.provider.js +5 -1
- package/dist/llm/providers/anthropic.provider.js.map +1 -1
- package/dist/llm/providers/index.d.ts +2 -0
- package/dist/llm/providers/index.d.ts.map +1 -1
- package/dist/llm/providers/index.js +2 -0
- package/dist/llm/providers/index.js.map +1 -1
- package/dist/llm/providers/local.provider.d.ts +27 -0
- package/dist/llm/providers/local.provider.d.ts.map +1 -0
- package/dist/llm/providers/local.provider.js +179 -0
- package/dist/llm/providers/local.provider.js.map +1 -0
- package/dist/llm/providers/openai.provider.d.ts.map +1 -1
- package/dist/llm/providers/openai.provider.js +1 -0
- package/dist/llm/providers/openai.provider.js.map +1 -1
- package/dist/lsp/lsp-client-manager.service.d.ts +47 -0
- package/dist/lsp/lsp-client-manager.service.d.ts.map +1 -0
- package/dist/lsp/lsp-client-manager.service.js +117 -0
- package/dist/lsp/lsp-client-manager.service.js.map +1 -0
- package/dist/lsp/lsp-client.d.ts +45 -0
- package/dist/lsp/lsp-client.d.ts.map +1 -0
- package/dist/lsp/lsp-client.js +147 -0
- package/dist/lsp/lsp-client.js.map +1 -0
- package/dist/lsp/lsp-context-enricher.d.ts +15 -0
- package/dist/lsp/lsp-context-enricher.d.ts.map +1 -0
- package/dist/lsp/lsp-context-enricher.js +72 -0
- package/dist/lsp/lsp-context-enricher.js.map +1 -0
- package/dist/lsp/lsp-language-registry.d.ts +24 -0
- package/dist/lsp/lsp-language-registry.d.ts.map +1 -0
- package/dist/lsp/lsp-language-registry.js +108 -0
- package/dist/lsp/lsp-language-registry.js.map +1 -0
- package/dist/lsp/lsp-lifecycle.service.d.ts +34 -0
- package/dist/lsp/lsp-lifecycle.service.d.ts.map +1 -0
- package/dist/lsp/lsp-lifecycle.service.js +57 -0
- package/dist/lsp/lsp-lifecycle.service.js.map +1 -0
- package/dist/lsp/lsp-protocol-adapter.d.ts +32 -0
- package/dist/lsp/lsp-protocol-adapter.d.ts.map +1 -0
- package/dist/lsp/lsp-protocol-adapter.interface.d.ts +93 -0
- package/dist/lsp/lsp-protocol-adapter.interface.d.ts.map +1 -0
- package/dist/lsp/lsp-protocol-adapter.interface.js +50 -0
- package/dist/lsp/lsp-protocol-adapter.interface.js.map +1 -0
- package/dist/lsp/lsp-protocol-adapter.js +69 -0
- package/dist/lsp/lsp-protocol-adapter.js.map +1 -0
- package/dist/lsp/lsp-result-cache.d.ts +43 -0
- package/dist/lsp/lsp-result-cache.d.ts.map +1 -0
- package/dist/lsp/lsp-result-cache.js +87 -0
- package/dist/lsp/lsp-result-cache.js.map +1 -0
- package/dist/lsp/lsp-tools.service.d.ts +68 -0
- package/dist/lsp/lsp-tools.service.d.ts.map +1 -0
- package/dist/lsp/lsp-tools.service.js +310 -0
- package/dist/lsp/lsp-tools.service.js.map +1 -0
- package/dist/lsp/lsp.types.d.ts +122 -0
- package/dist/lsp/lsp.types.d.ts.map +1 -0
- package/dist/lsp/lsp.types.js +7 -0
- package/dist/lsp/lsp.types.js.map +1 -0
- package/dist/mcp/mcp-client-manager.service.d.ts.map +1 -1
- package/dist/mcp/mcp-client-manager.service.js +32 -6
- package/dist/mcp/mcp-client-manager.service.js.map +1 -1
- package/dist/mcp/mcp-tool-handler.d.ts.map +1 -1
- package/dist/mcp/mcp-tool-handler.js +17 -1
- package/dist/mcp/mcp-tool-handler.js.map +1 -1
- package/dist/package.json +4 -1
- package/dist/security/command-guard.d.ts +58 -0
- package/dist/security/command-guard.d.ts.map +1 -0
- package/dist/security/command-guard.js +249 -0
- package/dist/security/command-guard.js.map +1 -0
- package/dist/security/credential-guard.d.ts +42 -0
- package/dist/security/credential-guard.d.ts.map +1 -0
- package/dist/security/credential-guard.js +181 -0
- package/dist/security/credential-guard.js.map +1 -0
- package/dist/security/index.d.ts +22 -0
- package/dist/security/index.d.ts.map +1 -0
- package/dist/security/index.js +17 -0
- package/dist/security/index.js.map +1 -0
- package/dist/security/prompt-injection-detector.d.ts +55 -0
- package/dist/security/prompt-injection-detector.d.ts.map +1 -0
- package/dist/security/prompt-injection-detector.js +233 -0
- package/dist/security/prompt-injection-detector.js.map +1 -0
- package/dist/security/security-event.types.d.ts +19 -0
- package/dist/security/security-event.types.d.ts.map +1 -0
- package/dist/security/security-event.types.js +13 -0
- package/dist/security/security-event.types.js.map +1 -0
- package/dist/security/tool-definition-validator.d.ts +55 -0
- package/dist/security/tool-definition-validator.d.ts.map +1 -0
- package/dist/security/tool-definition-validator.js +221 -0
- package/dist/security/tool-definition-validator.js.map +1 -0
- package/dist/security/tool-integrity-monitor.d.ts +67 -0
- package/dist/security/tool-integrity-monitor.d.ts.map +1 -0
- package/dist/security/tool-integrity-monitor.js +155 -0
- package/dist/security/tool-integrity-monitor.js.map +1 -0
- package/dist/tsconfig.json +3 -0
- package/dist/types/command.types.d.ts +15 -1
- package/dist/types/command.types.d.ts.map +1 -1
- package/dist/types/command.types.js.map +1 -1
- package/dist/types/llm.types.d.ts +2 -0
- package/dist/types/llm.types.d.ts.map +1 -1
- package/dist/types/provider-names.types.d.ts +3 -0
- package/dist/types/provider-names.types.d.ts.map +1 -1
- package/dist/types/provider-names.types.js +3 -0
- package/dist/types/provider-names.types.js.map +1 -1
- package/dist/ui/dashboard/detail-panels/spending-panel.d.ts.map +1 -1
- package/dist/ui/dashboard/detail-panels/spending-panel.js +8 -3
- package/dist/ui/dashboard/detail-panels/spending-panel.js.map +1 -1
- package/dist/ui/dashboard/detail-panels/token-usage-panel.d.ts.map +1 -1
- package/dist/ui/dashboard/detail-panels/token-usage-panel.js +37 -13
- package/dist/ui/dashboard/detail-panels/token-usage-panel.js.map +1 -1
- package/dist/ui/dashboard/views/agent-analytics-view.js +1 -1
- package/dist/ui/dashboard/views/agent-analytics-view.js.map +1 -1
- package/dist/ui/dashboard/views/cache-stats-view.js +1 -1
- package/dist/ui/dashboard/views/cache-stats-view.js.map +1 -1
- package/dist/ui/dashboard/views/performance-view.js +1 -1
- package/dist/ui/dashboard/views/performance-view.js.map +1 -1
- package/dist/utils/spending-tracker.d.ts +22 -0
- package/dist/utils/spending-tracker.d.ts.map +1 -1
- package/dist/utils/spending-tracker.js +33 -1
- package/dist/utils/spending-tracker.js.map +1 -1
- package/dist/utils/token-estimator.d.ts +21 -5
- package/dist/utils/token-estimator.d.ts.map +1 -1
- package/dist/utils/token-estimator.js +74 -28
- package/dist/utils/token-estimator.js.map +1 -1
- package/package.json +4 -1
package/README.md
CHANGED
|
@@ -17,7 +17,7 @@
|
|
|
17
17
|
</p>
|
|
18
18
|
|
|
19
19
|
<p align="center">
|
|
20
|
-
<img src="https://img.shields.io/badge/version-2.
|
|
20
|
+
<img src="https://img.shields.io/badge/version-2.3.0-blue?style=flat-square" alt="Version" />
|
|
21
21
|
<img src="https://img.shields.io/badge/node-%3E%3D18.0.0-brightgreen?style=flat-square&logo=node.js" alt="Node" />
|
|
22
22
|
<img src="https://img.shields.io/badge/typescript-5.x-3178c6?style=flat-square&logo=typescript" alt="TypeScript" />
|
|
23
23
|
<img src="https://img.shields.io/badge/license-MIT-green?style=flat-square" alt="License" />
|
|
@@ -28,6 +28,7 @@
|
|
|
28
28
|
<img src="https://img.shields.io/badge/OpenAI-GPT--5-412991?style=flat-square" alt="OpenAI" />
|
|
29
29
|
<img src="https://img.shields.io/badge/Google-Gemini-4285f4?style=flat-square" alt="Google" />
|
|
30
30
|
<img src="https://img.shields.io/badge/Cursor-MCP-000000?style=flat-square" alt="Cursor" />
|
|
31
|
+
<img src="https://img.shields.io/badge/Local-LLM-34d399?style=flat-square" alt="Local" />
|
|
31
32
|
</p>
|
|
32
33
|
|
|
33
34
|
---
|
|
@@ -78,8 +79,10 @@ Flexible execution modes for every use case:
|
|
|
78
79
|
| 1 | MCP Sampling | Free\* |
|
|
79
80
|
| 2 | Guided Completion | Free |
|
|
80
81
|
| 3 | API Fallback | Pay-per-use |
|
|
82
|
+
| 3 | Local Models | Free\*\* |
|
|
81
83
|
|
|
82
84
|
_\*When available in Cursor_
|
|
85
|
+
_\*\*Requires a running local model server (e.g. Ollama)_
|
|
83
86
|
|
|
84
87
|
**Zero configuration required** — works immediately with your Cursor subscription.
|
|
85
88
|
|
|
@@ -107,12 +110,12 @@ Strategic AI model assignment for cost efficiency:
|
|
|
107
110
|
|
|
108
111
|
Enterprise-grade security controls:
|
|
109
112
|
|
|
110
|
-
- **
|
|
111
|
-
- **
|
|
112
|
-
- **
|
|
113
|
-
- **
|
|
114
|
-
- **
|
|
115
|
-
- **
|
|
113
|
+
- **Credential Guard** — Env var redaction, output scanning, sensitive file blocking
|
|
114
|
+
- **Command Guard** — Blocks exfiltration, network, eval, and remote access patterns
|
|
115
|
+
- **Prompt Injection Detection** — Risk-scored scanning of tool results with quarantine/redaction
|
|
116
|
+
- **MCP Hardening** — Tool definition validation, tool-set drift detection, approval workflows
|
|
117
|
+
- **Supply Chain Hardening** — Frozen lockfile, blocked install scripts, vulnerability overrides
|
|
118
|
+
- **Audit Logging** — Complete operation trail with security event tracking
|
|
116
119
|
|
|
117
120
|
</td>
|
|
118
121
|
</tr>
|
|
@@ -176,7 +179,7 @@ npm install -g @windagency/valora # npm
|
|
|
176
179
|
|
|
177
180
|
# Verify installation
|
|
178
181
|
valora --version
|
|
179
|
-
# Should output: 2.
|
|
182
|
+
# Should output: 2.3.0
|
|
180
183
|
```
|
|
181
184
|
|
|
182
185
|
### Project Setup
|
|
@@ -215,7 +218,7 @@ valora plan "Add dark mode toggle"
|
|
|
215
218
|
|
|
216
219
|
### Optional: API Configuration
|
|
217
220
|
|
|
218
|
-
For fully autonomous execution:
|
|
221
|
+
For fully autonomous execution with cloud providers:
|
|
219
222
|
|
|
220
223
|
```bash
|
|
221
224
|
valora config setup --quick
|
|
@@ -225,6 +228,23 @@ export ANTHROPIC_API_KEY=sk-ant-...
|
|
|
225
228
|
export OPENAI_API_KEY=sk-...
|
|
226
229
|
```
|
|
227
230
|
|
|
231
|
+
### Optional: Local Models (No API Key)
|
|
232
|
+
|
|
233
|
+
Run fully offline with Ollama or any OpenAI-compatible server:
|
|
234
|
+
|
|
235
|
+
```bash
|
|
236
|
+
# Install and start Ollama
|
|
237
|
+
ollama pull llama3.1
|
|
238
|
+
ollama serve
|
|
239
|
+
|
|
240
|
+
# Use it directly
|
|
241
|
+
valora plan "Add auth" --provider local --model llama3.1
|
|
242
|
+
|
|
243
|
+
# Or configure as default
|
|
244
|
+
export LOCAL_BASE_URL=http://localhost:11434/v1
|
|
245
|
+
export LOCAL_DEFAULT_MODEL=llama3.1
|
|
246
|
+
```
|
|
247
|
+
|
|
228
248
|
---
|
|
229
249
|
|
|
230
250
|
## 🏗️ Architecture
|
|
@@ -240,6 +260,7 @@ export OPENAI_API_KEY=sk-...
|
|
|
240
260
|
│ │ • Commands │ │ • Pipeline │ │ • Registry │ │ • Anthropic │ │
|
|
241
261
|
│ │ • Wizard │ │ • Executor │ │ • Selection │ │ • OpenAI │ │
|
|
242
262
|
│ │ • Output │ │ • Context │ │ • Loading │ │ • Google │ │
|
|
263
|
+
│ │ │ │ │ │ │ │ • Local │ │
|
|
243
264
|
│ └─────────────┘ └──────────────┘ └─────────────┘ └─────────────┘ │
|
|
244
265
|
│ │
|
|
245
266
|
│ ┌─────────────┐ ┌──────────────┐ ┌─────────────┐ ┌─────────────┐ │
|
|
@@ -398,11 +419,14 @@ valora/ # npm package root
|
|
|
398
419
|
│ ├── valora.js # Main CLI
|
|
399
420
|
│ └── mcp.js # MCP server
|
|
400
421
|
├── src/ # TypeScript source
|
|
422
|
+
│ ├── ast/ # AST-based code intelligence (tree-sitter parsing, symbol index)
|
|
401
423
|
│ ├── cli/ # Command-line interface
|
|
402
424
|
│ ├── config/ # Configuration management
|
|
403
425
|
│ ├── executor/ # Pipeline execution
|
|
404
426
|
│ ├── llm/ # LLM provider integrations
|
|
427
|
+
│ ├── lsp/ # LSP integration (language server protocol client)
|
|
405
428
|
│ ├── mcp/ # MCP server implementation
|
|
429
|
+
│ ├── security/ # Agentic AI security (credential, command, injection guards)
|
|
406
430
|
│ ├── session/ # Session management
|
|
407
431
|
│ │ └── worktree-stats-tracker.ts # Worktree usage statistics
|
|
408
432
|
│ ├── ui/ # Terminal UI (dashboard, panels)
|
|
@@ -436,6 +460,7 @@ When installed in a project, VALORA supports a `.valora/` directory for local ov
|
|
|
436
460
|
├── templates/ # Custom/override templates
|
|
437
461
|
├── sessions/ # Session state (gitignored)
|
|
438
462
|
├── logs/ # Execution logs (gitignored)
|
|
463
|
+
├── index/ # Codebase symbol index (gitignored)
|
|
439
464
|
└── cache/ # Cache data (gitignored)
|
|
440
465
|
```
|
|
441
466
|
|
|
@@ -486,16 +511,17 @@ Resources in `.valora/` take precedence over built-in `data/` resources.
|
|
|
486
511
|
|
|
487
512
|
## 🛠️ Technology Stack
|
|
488
513
|
|
|
489
|
-
| Category
|
|
490
|
-
|
|
|
491
|
-
| **Runtime**
|
|
492
|
-
| **Package Manager**
|
|
493
|
-
| **Build**
|
|
494
|
-
| **Testing**
|
|
495
|
-
| **LLM SDKs**
|
|
496
|
-
| **CLI UI**
|
|
497
|
-
| **Validation**
|
|
498
|
-
| **
|
|
514
|
+
| Category | Technologies |
|
|
515
|
+
| --------------------- | ------------------------------------------------ |
|
|
516
|
+
| **Runtime** | Node.js 18+, TypeScript 5.x |
|
|
517
|
+
| **Package Manager** | pnpm 10.x |
|
|
518
|
+
| **Build** | tsc, tsc-alias |
|
|
519
|
+
| **Testing** | Vitest, Playwright |
|
|
520
|
+
| **LLM SDKs** | @anthropic-ai/sdk, openai, @google/generative-ai |
|
|
521
|
+
| **CLI UI** | Ink (React), Chalk, Commander |
|
|
522
|
+
| **Validation** | Zod |
|
|
523
|
+
| **Code Intelligence** | web-tree-sitter |
|
|
524
|
+
| **MCP** | @modelcontextprotocol/sdk |
|
|
499
525
|
|
|
500
526
|
---
|
|
501
527
|
|
|
@@ -26,6 +26,7 @@ expertise:
|
|
|
26
26
|
- Container security principles
|
|
27
27
|
- Compliance frameworks and regulations (PCI-DSS, HIPAA, ISO 27001, SOC 2, GDPR)
|
|
28
28
|
- Supply chain security (SBOM, SLSA, dependency integrity, build provenance)
|
|
29
|
+
- Agentic AI security (prompt injection, tool poisoning, credential theft, rug pull attacks)
|
|
29
30
|
responsibilities:
|
|
30
31
|
- Integrating security features in the software development life cycle
|
|
31
32
|
- Identification and probable security risks, with their mitigating strategies
|
|
@@ -118,6 +119,18 @@ In addition to the **Platform Engineer** profile, the following specialized secu
|
|
|
118
119
|
- **Threat intelligence** - MISP integration, STIX/TAXII, threat feed consumption
|
|
119
120
|
- **Programming for security** - Python for automation, Shell scripting, Go for tooling
|
|
120
121
|
|
|
122
|
+
### Agentic AI Security
|
|
123
|
+
|
|
124
|
+
- **Prompt injection** - Direct and indirect injection attacks that manipulate LLM-driven agents into bypassing instructions, exfiltrating data, or performing unintended actions; detection via input/output classifiers, instruction hierarchy enforcement, and canary token monitoring
|
|
125
|
+
- **Command injection** - Exploitation of LLM tool-use interfaces where adversarial input causes the agent to execute arbitrary shell commands, API calls, or code; mitigated by strict input sanitisation, parameterised tool schemas, allowlists, and sandboxed execution environments
|
|
126
|
+
- **Tool poisoning** - Malicious or compromised tool definitions (MCP servers, plugins, function schemas) that inject hidden instructions, exfiltrate context, or escalate privileges when loaded by an agent; countered by tool provenance verification, schema integrity checks, and runtime tool-call auditing
|
|
127
|
+
- **Rug pull attacks** - Trusted tool providers or plugin authors who ship benign behaviour during review then push malicious updates post-approval; mitigated by pinning tool versions with cryptographic hashes, continuous behavioural monitoring, and staged rollout with canary analysis
|
|
128
|
+
- **Token passthrough** - Attacks that trick an agent into forwarding its bearer tokens, API keys, or session credentials to attacker-controlled endpoints via crafted tool calls, redirects, or prompt-injected URLs; prevented by credential scoping, outbound request allowlists, and token-use audit logging
|
|
129
|
+
- **Token and credential theft** - Extraction of secrets from agent memory, context windows, environment variables, or tool responses through prompt injection, side-channel leakage, or insecure logging; mitigated by secret redaction in context, ephemeral credential issuance, just-in-time secret injection, and memory isolation between agent sessions
|
|
130
|
+
- **Excessive agency** - Agents granted overly broad tool permissions, unrestricted API scopes, or autonomous action capabilities beyond what the task requires; mitigated by least-privilege tool grants, human-in-the-loop approval gates, action budgets, and capability-based access control
|
|
131
|
+
- **Context window poisoning** - Injection of malicious content into shared context (conversation history, retrieval-augmented generation sources, or multi-agent communication channels) to influence downstream agent decisions; countered by context provenance tracking, input sanitisation at retrieval boundaries, and context integrity validation
|
|
132
|
+
- **Multi-agent trust exploitation** - Attacks targeting inter-agent communication in multi-agent systems, where a compromised or manipulated agent propagates malicious instructions to peer agents; mitigated by agent identity verification, message signing, trust boundaries between agent scopes, and output validation at agent handoff points
|
|
133
|
+
|
|
121
134
|
### Data Security & Privacy
|
|
122
135
|
|
|
123
136
|
- **Data governance** - Data classification schemes, data lifecycle management
|
|
@@ -197,13 +210,26 @@ In addition to the **Platform Engineer** profile, the following security-specifi
|
|
|
197
210
|
- Enforce code review and branch protection policies to prevent insider supply chain threats
|
|
198
211
|
- Conduct periodic supply chain threat modeling exercises mapping attack vectors (build, source, dependency, deployment)
|
|
199
212
|
|
|
200
|
-
9. **
|
|
201
|
-
-
|
|
202
|
-
-
|
|
203
|
-
-
|
|
204
|
-
-
|
|
205
|
-
-
|
|
206
|
-
-
|
|
213
|
+
9. **Agentic AI Security**
|
|
214
|
+
- Assess LLM-driven agents and pipelines for prompt injection vulnerabilities (direct, indirect, and multi-turn)
|
|
215
|
+
- Validate tool definitions, MCP server configurations, and plugin schemas for poisoning, hidden instructions, and privilege escalation vectors
|
|
216
|
+
- Enforce least-privilege tool grants, action budgets, and human-in-the-loop gates for autonomous agent actions
|
|
217
|
+
- Implement credential isolation for agents: scoped tokens, ephemeral secrets, outbound request allowlists, and secret redaction in context windows
|
|
218
|
+
- Monitor for rug pull attacks by pinning tool/plugin versions with cryptographic hashes and conducting behavioural drift analysis on tool updates
|
|
219
|
+
- Detect and prevent token passthrough attacks where agents are tricked into forwarding credentials to attacker-controlled endpoints
|
|
220
|
+
- Audit inter-agent communication in multi-agent systems for trust exploitation, message tampering, and malicious instruction propagation
|
|
221
|
+
- Implement context window integrity controls: provenance tracking for RAG sources, input sanitisation at retrieval boundaries, and canary token injection for leak detection
|
|
222
|
+
- Conduct threat modelling exercises specific to agentic AI workflows, mapping attack surfaces across prompt handling, tool execution, memory persistence, and agent orchestration layers
|
|
223
|
+
- Establish detection engineering rules for anomalous agent behaviour: unexpected tool calls, credential access patterns, data exfiltration indicators, and instruction deviation
|
|
224
|
+
|
|
225
|
+
10. **Security Architecture & Hardening**
|
|
226
|
+
|
|
227
|
+
- Design and implement zero-trust network architectures
|
|
228
|
+
- Harden container images, Kubernetes clusters, and cloud resources
|
|
229
|
+
- Implement defense-in-depth security controls across all infrastructure layers
|
|
230
|
+
- Evaluate and integrate new security technologies and tools
|
|
231
|
+
- Maintain security reference architectures and secure baseline configurations
|
|
232
|
+
- Design secure artifact repositories with access controls, vulnerability scanning, and provenance verification
|
|
207
233
|
|
|
208
234
|
## 4. Capabilities
|
|
209
235
|
|
|
@@ -237,6 +263,10 @@ In addition to the **Platform Engineer** profile, the following security-specifi
|
|
|
237
263
|
- Detect and respond to supply chain attacks (dependency confusion, typosquatting, compromised upstream packages)
|
|
238
264
|
- Validate build provenance and artifact integrity using SLSA framework
|
|
239
265
|
- Audit CI/CD pipeline security against injection and tampering threats
|
|
266
|
+
- Assess agentic AI systems for prompt injection, tool poisoning, and credential theft vulnerabilities
|
|
267
|
+
- Implement and validate agent sandboxing, credential isolation, and least-privilege tool configurations
|
|
268
|
+
- Detect rug pull attacks, token passthrough, and context window poisoning in LLM agent workflows
|
|
269
|
+
- Conduct threat modelling for multi-agent systems and agent orchestration pipelines
|
|
240
270
|
|
|
241
271
|
## 5. Constraints
|
|
242
272
|
|
|
@@ -303,6 +333,7 @@ Operate with **medium autonomy**, balancing proactive security operations with a
|
|
|
303
333
|
- **Compliance impact** - Changes that may affect regulatory compliance status
|
|
304
334
|
- **Forensic evidence handling** - Legal or regulatory implications requiring legal counsel
|
|
305
335
|
- **Supply chain compromise** - Confirmed or suspected compromise of upstream dependencies, build tools, or artifact registries
|
|
336
|
+
- **Agentic AI compromise** - Confirmed prompt injection, tool poisoning, credential theft, or unauthorised autonomous actions by LLM agents
|
|
306
337
|
|
|
307
338
|
**Decision Framework**:
|
|
308
339
|
|
|
@@ -435,6 +466,15 @@ In addition to the **Platform Engineer** principles (Reliability, Automation, Ob
|
|
|
435
466
|
- Monitor for upstream compromises and respond with rapid containment and remediation
|
|
436
467
|
- Enforce hermetic builds and reproducible pipelines to detect tampering
|
|
437
468
|
|
|
469
|
+
### 🤖 Agentic AI Least Privilege
|
|
470
|
+
|
|
471
|
+
- Grant agents only the minimum tools, scopes, and credentials required for each task
|
|
472
|
+
- Enforce human-in-the-loop approval for high-impact autonomous actions
|
|
473
|
+
- Treat every tool definition, plugin, and MCP server as an untrusted input
|
|
474
|
+
- Isolate agent sessions, memory, and credentials to prevent cross-contamination
|
|
475
|
+
- Monitor agent behaviour continuously for instruction deviation, anomalous tool usage, and credential access
|
|
476
|
+
- Pin and hash-verify all agent tooling; treat version updates as supply chain events requiring review
|
|
477
|
+
|
|
438
478
|
### ⚖️ Risk-Based Approach
|
|
439
479
|
|
|
440
480
|
- Not all risks need immediate remediation
|
|
@@ -533,6 +573,16 @@ In addition to the **Platform Engineer** toolset, the following security-specifi
|
|
|
533
573
|
- **Lynis** - For security auditing and hardening
|
|
534
574
|
- **CloudSploit** - For cloud security configuration scanning
|
|
535
575
|
|
|
576
|
+
**Agentic AI Security**:
|
|
577
|
+
|
|
578
|
+
- **Prompt injection classifiers** - Rebuff, Lakera Guard, Prompt Armor for detecting direct and indirect prompt injection attempts
|
|
579
|
+
- **LLM firewalls** - Guardrails AI, NeMo Guardrails, LLM Guard for input/output filtering and policy enforcement
|
|
580
|
+
- **Agent sandboxing** - gVisor, Firecracker, Deno permissions for isolating agent tool execution environments
|
|
581
|
+
- **Tool schema validation** - JSON Schema validators, MCP server auditing, plugin integrity verification
|
|
582
|
+
- **Credential vaulting for agents** - Short-lived token issuance, scoped OAuth grants, secret redaction middleware
|
|
583
|
+
- **Agent observability** - LangSmith, Langfuse, Arize Phoenix for tracing agent decisions, tool calls, and anomalous behaviour
|
|
584
|
+
- **Red-teaming frameworks** - Garak, PyRIT (Microsoft), OWASP LLM Top 10 testing methodologies
|
|
585
|
+
|
|
536
586
|
**Forensics & Analysis**:
|
|
537
587
|
|
|
538
588
|
- **Autopsy/Sleuth Kit** - For digital forensics analysis
|
|
@@ -608,6 +658,23 @@ Immediate Actions: [Pin to safe version, revoke credentials, rebuild artifacts]
|
|
|
608
658
|
Long-Term Remediation: [Alternative packages, vendor assessment, pipeline hardening]
|
|
609
659
|
```
|
|
610
660
|
|
|
661
|
+
**When Reporting Agentic AI Security Incidents**:
|
|
662
|
+
|
|
663
|
+
```plaintext
|
|
664
|
+
Threat Type: [Prompt Injection|Command Injection|Tool Poisoning|Rug Pull|Token Passthrough|Credential Theft|Excessive Agency|Context Poisoning|Multi-Agent Trust Exploitation]
|
|
665
|
+
Agent/System: [Affected agent, pipeline, or orchestration layer]
|
|
666
|
+
Attack Vector: [Direct prompt|Indirect prompt (RAG/tool output)|Malicious tool definition|Compromised plugin update|Inter-agent message|etc.]
|
|
667
|
+
Injection Source: [User input|Retrieved document|Tool response|Shared context|External API|Plugin schema]
|
|
668
|
+
Credentials Exposed: [List any tokens, API keys, or secrets potentially compromised]
|
|
669
|
+
Autonomous Actions Taken: [Unauthorised tool calls, API requests, data exfiltration, or code execution performed by agent]
|
|
670
|
+
Blast Radius: [Systems, data, or downstream agents affected]
|
|
671
|
+
Indicators of Compromise: [Anomalous tool calls, unexpected outbound requests, credential access patterns, instruction deviation]
|
|
672
|
+
Containment Actions: [Agent isolation, credential rotation, tool revocation, context purge]
|
|
673
|
+
Root Cause: [How the attack bypassed existing controls]
|
|
674
|
+
Remediation: [Specific hardening steps — input classifiers, tool schema fixes, credential scoping, approval gates]
|
|
675
|
+
Detection Gap: [What monitoring was missing to catch this earlier]
|
|
676
|
+
```
|
|
677
|
+
|
|
611
678
|
**When Conducting Risk Assessment**:
|
|
612
679
|
|
|
613
680
|
```plaintext
|
|
@@ -59,6 +59,8 @@
|
|
|
59
59
|
"type": "string",
|
|
60
60
|
"description": "AI model to use for this command",
|
|
61
61
|
"enum": [
|
|
62
|
+
"claude-opus-4.6",
|
|
63
|
+
"claude-sonnet-4.6",
|
|
62
64
|
"claude-sonnet-4.5",
|
|
63
65
|
"claude-opus-4.1",
|
|
64
66
|
"claude-haiku-4.5",
|
|
@@ -70,7 +72,7 @@
|
|
|
70
72
|
"grok-code",
|
|
71
73
|
"kimi-k2"
|
|
72
74
|
],
|
|
73
|
-
"default": "claude-sonnet-4.
|
|
75
|
+
"default": "claude-sonnet-4.6"
|
|
74
76
|
},
|
|
75
77
|
"agent": {
|
|
76
78
|
"type": "string",
|
|
@@ -213,6 +215,11 @@
|
|
|
213
215
|
"minimum": 1000,
|
|
214
216
|
"maximum": 300000,
|
|
215
217
|
"default": 30000
|
|
218
|
+
},
|
|
219
|
+
"failure_policy": {
|
|
220
|
+
"type": "string",
|
|
221
|
+
"description": "Controls how tool failures affect stage success. 'strict' = all failures count, 'tolerant' = only fatal (mutating) failures count, 'lenient' = never hard-stop.",
|
|
222
|
+
"enum": ["strict", "tolerant", "lenient"]
|
|
216
223
|
}
|
|
217
224
|
},
|
|
218
225
|
"additionalProperties": false
|
package/data/commands/assert.md
CHANGED
|
@@ -33,6 +33,7 @@ prompts:
|
|
|
33
33
|
- stage: context
|
|
34
34
|
prompt: context.load-implementation-context
|
|
35
35
|
required: true
|
|
36
|
+
failure_policy: tolerant
|
|
36
37
|
inputs:
|
|
37
38
|
implementation_plan: $ARG_1
|
|
38
39
|
agent_type: $ARG_agent
|
|
@@ -48,6 +49,7 @@ prompts:
|
|
|
48
49
|
- stage: review
|
|
49
50
|
prompt: code.validate-prerequisites
|
|
50
51
|
required: true
|
|
52
|
+
failure_policy: tolerant
|
|
51
53
|
inputs:
|
|
52
54
|
plan_summary: $STAGE_context.plan_summary
|
|
53
55
|
dependencies: $STAGE_context.dependencies
|
package/data/commands/plan.md
CHANGED
|
@@ -31,7 +31,7 @@
|
|
|
31
31
|
"run_terminal_cmd",
|
|
32
32
|
"web_search"
|
|
33
33
|
],
|
|
34
|
-
"model": "claude-sonnet-4.
|
|
34
|
+
"model": "claude-sonnet-4.6",
|
|
35
35
|
"agent": "lead"
|
|
36
36
|
},
|
|
37
37
|
"create-backlog": {
|
|
@@ -57,7 +57,7 @@
|
|
|
57
57
|
"run_terminal_cmd",
|
|
58
58
|
"mcp_github"
|
|
59
59
|
],
|
|
60
|
-
"model": "claude-sonnet-4.
|
|
60
|
+
"model": "claude-sonnet-4.6",
|
|
61
61
|
"agent": "lead"
|
|
62
62
|
},
|
|
63
63
|
"create-prd": {
|
|
@@ -84,7 +84,7 @@
|
|
|
84
84
|
"query_session",
|
|
85
85
|
"mcp_github"
|
|
86
86
|
],
|
|
87
|
-
"model": "claude-sonnet-4.
|
|
87
|
+
"model": "claude-sonnet-4.6",
|
|
88
88
|
"agent": "product-manager"
|
|
89
89
|
},
|
|
90
90
|
"fetch-task": {
|
|
@@ -128,7 +128,7 @@
|
|
|
128
128
|
"grep",
|
|
129
129
|
"run_terminal_cmd"
|
|
130
130
|
],
|
|
131
|
-
"model": "claude-sonnet-4.
|
|
131
|
+
"model": "claude-sonnet-4.6",
|
|
132
132
|
"agent": "lead"
|
|
133
133
|
},
|
|
134
134
|
"generate-docs": {
|
|
@@ -159,7 +159,7 @@
|
|
|
159
159
|
"dynamic_agent_selection": true,
|
|
160
160
|
"fallback_agent": "software-engineer-typescript",
|
|
161
161
|
"agent_selection_criteria": ["analyze_task_description", "analyze_affected_files", "consider_dependencies"],
|
|
162
|
-
"model": "claude-sonnet-4.
|
|
162
|
+
"model": "claude-sonnet-4.6",
|
|
163
163
|
"agent": ""
|
|
164
164
|
},
|
|
165
165
|
"plan-architecture": {
|
|
@@ -168,7 +168,7 @@
|
|
|
168
168
|
"experimental": true,
|
|
169
169
|
"argument-hint": "'[--task-id=<id>] [--backlog-file=<path>]'",
|
|
170
170
|
"allowed-tools": ["codebase_search", "read_file", "grep", "list_dir", "glob_file_search"],
|
|
171
|
-
"model": "claude-sonnet-4.
|
|
171
|
+
"model": "claude-sonnet-4.6",
|
|
172
172
|
"agent": "lead"
|
|
173
173
|
},
|
|
174
174
|
"plan-implementation": {
|
|
@@ -177,7 +177,7 @@
|
|
|
177
177
|
"experimental": true,
|
|
178
178
|
"argument-hint": "'[--arch-plan=<path>] [--task-id=<id>]'",
|
|
179
179
|
"allowed-tools": ["codebase_search", "read_file", "grep", "list_dir", "glob_file_search"],
|
|
180
|
-
"model": "claude-sonnet-4.
|
|
180
|
+
"model": "claude-sonnet-4.6",
|
|
181
181
|
"agent": "lead"
|
|
182
182
|
},
|
|
183
183
|
"plan": {
|
|
@@ -186,7 +186,7 @@
|
|
|
186
186
|
"experimental": true,
|
|
187
187
|
"argument-hint": "'[--task-id=<id>] [--complexity-threshold=5] [--mode=<standard|incremental|tiered>]'",
|
|
188
188
|
"allowed-tools": ["codebase_search", "read_file", "grep", "list_dir", "glob_file_search"],
|
|
189
|
-
"model": "claude-sonnet-4.
|
|
189
|
+
"model": "claude-sonnet-4.6",
|
|
190
190
|
"agent": "lead"
|
|
191
191
|
},
|
|
192
192
|
"pre-check": {
|
|
@@ -222,7 +222,7 @@
|
|
|
222
222
|
"experimental": true,
|
|
223
223
|
"argument-hint": "'<scope> [--severity=critical|high|medium|low] [--focus=security|performance|maintainability|all] [--checklist] [--auto-only]'",
|
|
224
224
|
"allowed-tools": ["codebase_search", "read_file", "grep", "list_dir", "glob_file_search", "read_lints"],
|
|
225
|
-
"model": "claude-sonnet-4.
|
|
225
|
+
"model": "claude-sonnet-4.6",
|
|
226
226
|
"agent": "lead"
|
|
227
227
|
},
|
|
228
228
|
"review-functional": {
|
|
@@ -231,7 +231,7 @@
|
|
|
231
231
|
"experimental": true,
|
|
232
232
|
"argument-hint": "'<scope> [--severity=critical|high|medium|low] [--check-a11y=true|false]'",
|
|
233
233
|
"allowed-tools": ["codebase_search", "read_file", "grep", "list_dir", "glob_file_search", "run_terminal_cmd"],
|
|
234
|
-
"model": "claude-sonnet-4.
|
|
234
|
+
"model": "claude-sonnet-4.6",
|
|
235
235
|
"agent": "lead"
|
|
236
236
|
},
|
|
237
237
|
"review-plan": {
|
|
@@ -267,7 +267,7 @@
|
|
|
267
267
|
"experimental": true,
|
|
268
268
|
"argument-hint": "'[--quick] [--severity=<level>] [--focus=<area>]'",
|
|
269
269
|
"allowed-tools": ["codebase_search", "read_file", "grep", "list_dir", "glob_file_search", "run_terminal_cmd"],
|
|
270
|
-
"model": "claude-sonnet-4.
|
|
270
|
+
"model": "claude-sonnet-4.6",
|
|
271
271
|
"agent": "lead"
|
|
272
272
|
},
|
|
273
273
|
"validate-plan": {
|