agcel 1.0.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (100) hide show
  1. package/.agent/workflows/api-gen.md +59 -0
  2. package/.agent/workflows/architect.md +44 -0
  3. package/.agent/workflows/brainstorm.md +223 -0
  4. package/.agent/workflows/build.md +38 -0
  5. package/.agent/workflows/changelog.md +51 -0
  6. package/.agent/workflows/checkpoint.md +138 -0
  7. package/.agent/workflows/commit.md +223 -0
  8. package/.agent/workflows/debug.md +57 -0
  9. package/.agent/workflows/deploy.md +76 -0
  10. package/.agent/workflows/doc.md +247 -0
  11. package/.agent/workflows/execute-plan.md +225 -0
  12. package/.agent/workflows/feature.md +255 -0
  13. package/.agent/workflows/fix.md +323 -0
  14. package/.agent/workflows/help.md +63 -0
  15. package/.agent/workflows/index.md +148 -0
  16. package/.agent/workflows/load.md +112 -0
  17. package/.agent/workflows/mode.md +170 -0
  18. package/.agent/workflows/optimize.md +53 -0
  19. package/.agent/workflows/plan.md +337 -0
  20. package/.agent/workflows/pr.md +74 -0
  21. package/.agent/workflows/product-plan.md +36 -0
  22. package/.agent/workflows/production-deploy.md +39 -0
  23. package/.agent/workflows/refactor.md +63 -0
  24. package/.agent/workflows/research.md +116 -0
  25. package/.agent/workflows/review.md +344 -0
  26. package/.agent/workflows/security-scan.md +56 -0
  27. package/.agent/workflows/ship.md +221 -0
  28. package/.agent/workflows/spawn.md +177 -0
  29. package/.agent/workflows/status.md +59 -0
  30. package/.agent/workflows/tdd.md +139 -0
  31. package/.agent/workflows/test.md +340 -0
  32. package/.agent/workflows/verify.md +35 -0
  33. package/LICENSE +21 -0
  34. package/README.md +67 -0
  35. package/dist/commands/init.js +142 -0
  36. package/dist/commands/install.js +98 -0
  37. package/dist/commands/list.js +49 -0
  38. package/dist/commands/restart.js +17 -0
  39. package/dist/commands/start.js +41 -0
  40. package/dist/commands/status.js +24 -0
  41. package/dist/commands/stop.js +29 -0
  42. package/dist/commands/uninstall.js +78 -0
  43. package/dist/index.js +58 -0
  44. package/dist/server/index.js +174 -0
  45. package/dist/utils/index.js +63 -0
  46. package/package.json +54 -0
  47. package/skills/api-security-best-practices/SKILL.md +291 -0
  48. package/skills/api-security-best-practices/references/examples.md +617 -0
  49. package/skills/architecture/SKILL.md +59 -0
  50. package/skills/architecture/context-discovery.md +43 -0
  51. package/skills/architecture/examples.md +94 -0
  52. package/skills/architecture/pattern-selection.md +68 -0
  53. package/skills/architecture/patterns-reference.md +50 -0
  54. package/skills/architecture/trade-off-analysis.md +77 -0
  55. package/skills/aws-serverless/SKILL.md +327 -0
  56. package/skills/brainstorming/SKILL.md +234 -0
  57. package/skills/c4-context/SKILL.md +154 -0
  58. package/skills/ci-cd-engineer/SKILL.md +50 -0
  59. package/skills/code-auditing/SKILL.md +55 -0
  60. package/skills/copywriting/SKILL.md +248 -0
  61. package/skills/database-engineer/SKILL.md +47 -0
  62. package/skills/doc-coauthoring/SKILL.md +379 -0
  63. package/skills/docker-expert/SKILL.md +412 -0
  64. package/skills/langgraph/SKILL.md +291 -0
  65. package/skills/postgresql/SKILL.md +73 -0
  66. package/skills/pricing-strategy/SKILL.md +360 -0
  67. package/skills/product-manager/SKILL.md +57 -0
  68. package/skills/prompt-engineer/README.md +659 -0
  69. package/skills/prompt-engineer/SKILL.md +256 -0
  70. package/skills/python-patterns/SKILL.md +445 -0
  71. package/skills/qa-engineer/SKILL.md +42 -0
  72. package/skills/rag-engineer/SKILL.md +94 -0
  73. package/skills/react-patterns/SKILL.md +202 -0
  74. package/skills/secure-refactoring/SKILL.md +54 -0
  75. package/skills/security-documentation/SKILL.md +53 -0
  76. package/skills/senior-architect/SKILL.md +213 -0
  77. package/skills/senior-architect/references/architecture_patterns.md +103 -0
  78. package/skills/senior-architect/references/system_design_workflows.md +103 -0
  79. package/skills/senior-architect/references/tech_decision_guide.md +103 -0
  80. package/skills/senior-architect/scripts/architecture_diagram_generator.py +114 -0
  81. package/skills/senior-architect/scripts/dependency_analyzer.py +114 -0
  82. package/skills/senior-architect/scripts/project_architect.py +114 -0
  83. package/skills/seo-audit/SKILL.md +491 -0
  84. package/skills/sql-injection-testing/SKILL.md +452 -0
  85. package/skills/test-driven-development/SKILL.md +375 -0
  86. package/skills/test-driven-development/testing-anti-patterns.md +299 -0
  87. package/skills/test-fixing/SKILL.md +123 -0
  88. package/skills/testing-patterns/SKILL.md +263 -0
  89. package/skills/typescript-expert/SKILL.md +202 -0
  90. package/skills/typescript-expert/references/advanced-topics.md +252 -0
  91. package/skills/typescript-expert/references/tsconfig-strict.json +92 -0
  92. package/skills/typescript-expert/references/typescript-cheatsheet.md +383 -0
  93. package/skills/typescript-expert/references/utility-types.ts +335 -0
  94. package/skills/typescript-expert/scripts/ts_diagnostic.py +203 -0
  95. package/skills/ui-ux-designer/SKILL.md +46 -0
  96. package/skills/vercel-deployment/SKILL.md +83 -0
  97. package/skills/vulnerability-scanner/SKILL.md +280 -0
  98. package/skills/vulnerability-scanner/checklists.md +121 -0
  99. package/skills/vulnerability-scanner/scripts/security_scan.py +458 -0
  100. package/skills/writing-plans/SKILL.md +120 -0
@@ -0,0 +1,63 @@
1
+ # /refactor - Refactoring Command
2
+
3
+ ## Purpose
4
+
5
+ Improve code structure, readability, or performance without changing behavior.
6
+
7
+ ## Usage
8
+
9
+ ```
10
+ /refactor [file or function] [goal: clean | extract | simplify | optimize]
11
+ ```
12
+
13
+ ---
14
+
15
+ Refactor: **$ARGUMENTS**
16
+
17
+ ## Workflow
18
+
19
+ ### Step 1: Understand Current Code
20
+
21
+ 1. Read the code thoroughly
22
+ 2. Identify what it does
23
+ 3. Note existing tests
24
+
25
+ ### Step 2: Plan Refactoring
26
+
27
+ 1. Identify improvement opportunities
28
+ 2. Ensure tests exist
29
+ 3. Plan incremental changes
30
+
31
+ ### Step 3: Execute
32
+
33
+ 1. Make small, focused changes
34
+ 2. Run tests after each change
35
+ 3. Commit incrementally
36
+
37
+ ## Refactoring Types
38
+
39
+ - **Extract**: Pull out reusable functions
40
+ - **Simplify**: Reduce complexity
41
+ - **Rename**: Improve clarity
42
+ - **Clean**: Remove dead code
43
+
44
+ ## Output
45
+
46
+ ```markdown
47
+ ## Refactoring Complete
48
+
49
+ ### Changes Made
50
+ - Extracted `validateInput()` function
51
+ - Simplified conditional logic
52
+ - Renamed `x` to `userCount`
53
+
54
+ ### Before/After
55
+ [Code comparison]
56
+
57
+ ### Tests
58
+ All passing
59
+ ```
60
+
61
+
62
+ ## Gap Analysis Rule
63
+ Always identify gaps and suggest next steps to users. In case there is no gaps anymore, then AI should clearly state that there is no gap left.
@@ -0,0 +1,116 @@
1
+ # /research - Research Command
2
+
3
+ ## Purpose
4
+
5
+ Research a technology, library, or approach with comprehensive analysis.
6
+
7
+ ## Usage
8
+
9
+ ```
10
+ /research [topic or technology]
11
+ ```
12
+
13
+ ---
14
+
15
+ Research: **$ARGUMENTS**
16
+
17
+ ## Workflow
18
+
19
+ 1. **Gather Information**
20
+ - Official documentation
21
+ - Community resources
22
+ - Comparisons
23
+
24
+ 2. **Analyze**
25
+ - Pros and cons
26
+ - Best practices
27
+ - Alternatives
28
+
29
+ 3. **Recommend**
30
+ - Summary
31
+ - Recommendation
32
+ - Next steps
33
+
34
+ ## Flags
35
+
36
+ | Flag | Description | Example |
37
+ |------|-------------|---------|
38
+ | `--mode=[mode]` | Use specific behavioral mode | `--mode=deep-research` |
39
+ | `--depth=[1-5]` | Research thoroughness level | `--depth=5` |
40
+ | `--format=[fmt]` | Output format (concise/detailed/json) | `--format=detailed` |
41
+ | `--save=[path]` | Save research to file | `--save=docs/research.md` |
42
+ | `--compare` | Focus on comparing alternatives | `--compare` |
43
+ | `--sequential` | Use sequential thinking methodology | `--sequential` |
44
+
45
+ ### Flag Usage Examples
46
+
47
+ ```bash
48
+ /research --depth=5 "authentication libraries for Node.js"
49
+ /research --compare "React vs Vue vs Svelte"
50
+ /research --sequential "root cause of memory leak"
51
+ /research --save=docs/orm-research.md "ORM comparison"
52
+ ```
53
+
54
+ ### Depth Levels
55
+
56
+ | Level | Behavior |
57
+ |-------|----------|
58
+ | 1 | Quick overview, key points only |
59
+ | 2 | Standard analysis |
60
+ | 3 | Thorough with examples |
61
+ | 4 | Comprehensive with trade-offs |
62
+ | 5 | Exhaustive with citations |
63
+
64
+ ## MCP Integration
65
+
66
+ This command leverages MCP servers for enhanced research:
67
+
68
+ ### Web Search - Library Documentation (Primary)
69
+ ```
70
+ ALWAYS use Web Search for library/framework research:
71
+ 1. Use resolve-library-id to find the library ID
72
+ 2. Use get-library-docs with topic parameter for focused docs
73
+ 3. Use mode='code' for API references, mode='info' for concepts
74
+ ```
75
+
76
+ ### Reasoning - Structured Analysis
77
+ ```
78
+ For complex research requiring step-by-step reasoning:
79
+ - Use sequentialthinking tool to break down analysis
80
+ - Track confidence scores for each finding
81
+ - Revise conclusions as new information emerges
82
+ ```
83
+
84
+ ### Memory - Persistent Research
85
+ ```
86
+ Store research findings for future reference:
87
+ - Create entities for researched technologies
88
+ - Add observations with pros/cons/recommendations
89
+ - Link related technologies with relations
90
+ ```
91
+
92
+ ## Output
93
+
94
+ ```markdown
95
+ ## Research: [Topic]
96
+
97
+ ### Summary
98
+ [Overview]
99
+
100
+ ### Pros
101
+ - [Pro 1]
102
+ - [Pro 2]
103
+
104
+ ### Cons
105
+ - [Con 1]
106
+
107
+ ### Alternatives
108
+ [Comparison table]
109
+
110
+ ### Recommendation
111
+ [Clear recommendation]
112
+ ```
113
+
114
+
115
+ ## Gap Analysis Rule
116
+ Always identify gaps and suggest next steps to users. In case there is no gaps anymore, then AI should clearly state that there is no gap left.
@@ -0,0 +1,344 @@
1
+ # /review - Code Review Command
2
+
3
+ ## Purpose
4
+
5
+ Comprehensive code review with focus on quality, security, performance, and maintainability.
6
+
7
+ ## Usage
8
+
9
+ ```
10
+ /review [file path | 'staged' | 'pr' | PR number]
11
+ ```
12
+
13
+ ## Arguments
14
+
15
+ - `$ARGUMENTS`:
16
+ - File path: Review specific file(s)
17
+ - `staged`: Review all staged changes
18
+ - `pr`: Review current branch changes vs main
19
+ - PR number: Review specific pull request
20
+
21
+ ---
22
+
23
+ Perform a comprehensive code review for: **$ARGUMENTS**
24
+
25
+ ## Workflow
26
+
27
+ ### Phase 1: Identify Review Scope
28
+
29
+ 1. **Determine What to Review**
30
+ - Single file: Read the specified file
31
+ - `staged`: Get staged changes with `git diff --staged`
32
+ - `pr`: Get branch diff with `git diff main...HEAD`
33
+ - PR number: Fetch PR details with `gh pr view`
34
+
35
+ 2. **Gather Context**
36
+ - Understand the purpose of changes
37
+ - Check related tests
38
+ - Review CLAUDE.md for project standards
39
+
40
+ ### Phase 2: Code Quality Review
41
+
42
+ Check each file for:
43
+
44
+ 1. **Correctness**
45
+ - Logic errors and bugs
46
+ - Edge case handling
47
+ - Null/undefined safety
48
+ - Type correctness
49
+
50
+ 2. **Clarity**
51
+ - Clear naming (variables, functions, classes)
52
+ - Readable structure
53
+ - Appropriate comments
54
+ - Self-documenting code
55
+
56
+ 3. **Consistency**
57
+ - Follows project conventions
58
+ - Matches existing patterns
59
+ - Style guide compliance
60
+
61
+ 4. **Complexity**
62
+ - Function length (prefer <30 lines)
63
+ - Cyclomatic complexity
64
+ - Nesting depth
65
+
66
+ ### Phase 3: Security Review
67
+
68
+ Check for security issues:
69
+
70
+ 1. **Input Validation**
71
+ - User input sanitization
72
+ - Type validation
73
+ - Size/length limits
74
+
75
+ 2. **Authentication/Authorization**
76
+ - Proper auth checks
77
+ - Role-based access control
78
+ - Session management
79
+
80
+ 3. **Data Protection**
81
+ - Sensitive data handling
82
+ - Encryption where needed
83
+ - PII protection
84
+
85
+ 4. **Injection Prevention**
86
+ - SQL injection
87
+ - XSS vulnerabilities
88
+ - Command injection
89
+
90
+ 5. **Secrets**
91
+ - No hardcoded credentials
92
+ - No API keys in code
93
+ - Proper env var usage
94
+
95
+ ### Phase 4: Performance Review
96
+
97
+ Check for performance issues:
98
+
99
+ 1. **Algorithmic Efficiency**
100
+ - Time complexity
101
+ - Unnecessary loops
102
+ - Redundant operations
103
+
104
+ 2. **Memory Usage**
105
+ - Large object creation
106
+ - Memory leaks
107
+ - Unbounded caches
108
+
109
+ 3. **Database**
110
+ - N+1 queries
111
+ - Missing indexes
112
+ - Large result sets
113
+
114
+ 4. **Async Operations**
115
+ - Proper async/await
116
+ - Parallel where possible
117
+ - Timeout handling
118
+
119
+ ### Phase 5: Maintainability Review
120
+
121
+ Check for maintainability:
122
+
123
+ 1. **SOLID Principles**
124
+ - Single responsibility
125
+ - Open/closed
126
+ - Dependency injection
127
+
128
+ 2. **DRY**
129
+ - Code duplication
130
+ - Opportunity for reuse
131
+
132
+ 3. **Testing**
133
+ - Test coverage
134
+ - Test quality
135
+ - Edge case tests
136
+
137
+ 4. **Documentation**
138
+ - API documentation
139
+ - Complex logic explanation
140
+ - Usage examples
141
+
142
+ ## Output Format
143
+
144
+ ```markdown
145
+ ## Code Review: [Target]
146
+
147
+ **Reviewed**: [files/changes]
148
+ **Verdict**: [Approve | Request Changes | Needs Discussion]
149
+
150
+ ---
151
+
152
+ ### Critical Issues (Must Fix)
153
+
154
+ #### 1. [Security] SQL Injection Risk
155
+ **File**: `src/api/users.ts:42`
156
+ **Severity**: Critical
157
+
158
+ ```typescript
159
+ // Current code
160
+ const query = `SELECT * FROM users WHERE id = ${userId}`;
161
+ ```
162
+
163
+ **Issue**: User input directly interpolated into SQL query.
164
+
165
+ **Fix**:
166
+ ```typescript
167
+ const query = 'SELECT * FROM users WHERE id = $1';
168
+ const result = await db.query(query, [userId]);
169
+ ```
170
+
171
+ ---
172
+
173
+ ### Recommendations (Should Fix)
174
+
175
+ #### 1. Missing Error Handling
176
+ **File**: `src/services/auth.ts:78`
177
+
178
+ ```typescript
179
+ // Current
180
+ const user = await db.findUser(email);
181
+ return user.password; // May throw if user is null
182
+ ```
183
+
184
+ **Suggestion**:
185
+ ```typescript
186
+ const user = await db.findUser(email);
187
+ if (!user) {
188
+ throw new NotFoundError('User not found');
189
+ }
190
+ return user.password;
191
+ ```
192
+
193
+ ---
194
+
195
+ ### Suggestions (Nice to Have)
196
+
197
+ 1. Consider extracting the validation logic in `src/utils/validate.ts:23` into a separate function for reusability.
198
+
199
+ 2. The constant `MAX_RETRIES` in `src/api/client.ts` could be moved to configuration.
200
+
201
+ ---
202
+
203
+ ### What's Good
204
+
205
+ - Clean separation of concerns between controller and service layers
206
+ - Comprehensive error handling in the authentication flow
207
+ - Good test coverage for edge cases in `auth.test.ts`
208
+
209
+ ---
210
+
211
+ ### Summary
212
+
213
+ Found **1 critical issue** (security), **2 recommendations**, and **2 suggestions**.
214
+
215
+ **Priority Actions**:
216
+ 1. Fix SQL injection vulnerability immediately
217
+ 2. Add null check for user lookup
218
+
219
+ **Ready for merge**: No - Critical issues must be addressed first
220
+ ```
221
+
222
+ ## Review Checklist
223
+
224
+ ### Security
225
+ - [ ] No hardcoded secrets
226
+ - [ ] Input validation present
227
+ - [ ] Output encoding for rendered content
228
+ - [ ] SQL parameterization
229
+ - [ ] Proper auth checks
230
+ - [ ] No eval() or dynamic code execution
231
+
232
+ ### Quality
233
+ - [ ] Clear naming conventions
234
+ - [ ] Functions are focused (single responsibility)
235
+ - [ ] Error handling is complete
236
+ - [ ] No commented-out code
237
+ - [ ] No debug statements left
238
+
239
+ ### Testing
240
+ - [ ] New code has tests
241
+ - [ ] Edge cases covered
242
+ - [ ] Tests are deterministic
243
+
244
+ ### Documentation
245
+ - [ ] Public APIs documented
246
+ - [ ] Complex logic explained
247
+ - [ ] Breaking changes noted
248
+
249
+ ## Example
250
+
251
+ **Input**: `/review staged`
252
+
253
+ **Output**: Complete review of all staged changes with security scan, code quality assessment, and actionable feedback organized by severity.
254
+
255
+ ## Flags
256
+
257
+ | Flag | Description | Example |
258
+ |------|-------------|---------|
259
+ | `--mode=[mode]` | Use specific behavioral mode | `--mode=review` |
260
+ | `--persona=[type]` | Apply persona expertise | `--persona=security` |
261
+ | `--depth=[1-5]` | Review thoroughness level | `--depth=5` |
262
+ | `--format=[fmt]` | Output format (concise/detailed/json) | `--format=detailed` |
263
+ | `--focus=[area]` | Focus on specific area | `--focus=performance` |
264
+ | `--save` | Save review to file | `--save` |
265
+
266
+ ### Flag Usage Examples
267
+
268
+ ```bash
269
+ /review --persona=security src/auth/
270
+ /review --depth=5 --format=detailed staged
271
+ /review --focus=performance src/services/heavy-computation.ts
272
+ /review --mode=deep-research --save pr
273
+ ```
274
+
275
+ ### Persona Options
276
+
277
+ | Persona | Focus Area |
278
+ |---------|------------|
279
+ | `security` | Vulnerabilities, auth, data protection |
280
+ | `performance` | Efficiency, queries, caching |
281
+ | `architecture` | Patterns, coupling, SOLID |
282
+ | `testing` | Coverage, test quality |
283
+ | `accessibility` | A11y compliance |
284
+
285
+ ### Focus Areas
286
+
287
+ | Focus | Checks |
288
+ |-------|--------|
289
+ | `security` | OWASP top 10, auth, input validation |
290
+ | `performance` | N+1, complexity, memory |
291
+ | `quality` | Readability, maintainability |
292
+ | `testing` | Coverage, test patterns |
293
+
294
+ ## MCP Integration
295
+
296
+ This command leverages MCP servers for enhanced code review:
297
+
298
+ ### Browser tools - Visual/UI Review
299
+ ```
300
+ For reviewing UI changes:
301
+ - Render and screenshot components
302
+ - Compare visual changes across browsers
303
+ - Verify responsive behavior
304
+ - Check accessibility in real browser
305
+ ```
306
+
307
+ ### Memory - Review Context
308
+ ```
309
+ Store and recall review context:
310
+ - Remember past review decisions
311
+ - Recall user's coding standards
312
+ - Store patterns approved/rejected previously
313
+ - Track recurring issues across reviews
314
+ ```
315
+
316
+ ### Reasoning - Systematic Analysis
317
+ ```
318
+ For thorough code analysis:
319
+ - Step through complex logic systematically
320
+ - Track multiple concerns in parallel
321
+ - Build comprehensive issue list
322
+ - Revise severity as context emerges
323
+ ```
324
+
325
+ ### Filesystem - Code Access
326
+ ```
327
+ For reviewing file changes:
328
+ - Use view_file to examine code
329
+ - Use grep_search to find related patterns
330
+ - Check for similar issues across codebase
331
+ ```
332
+
333
+ <!-- CUSTOMIZATION POINT -->
334
+ ## Variations
335
+
336
+ Modify behavior via CLAUDE.md:
337
+ - Set required review checklist items
338
+ - Define severity levels
339
+ - Configure approval criteria
340
+ - Set documentation requirements
341
+
342
+
343
+ ## Gap Analysis Rule
344
+ Always identify gaps and suggest next steps to users. In case there is no gaps anymore, then AI should clearly state that there is no gap left.
@@ -0,0 +1,56 @@
1
+ # /security-scan - Security Scanning Command
2
+
3
+ ## Purpose
4
+
5
+ Scan code and dependencies for security vulnerabilities.
6
+
7
+ ## Usage
8
+
9
+ ```
10
+ /security-scan [scope: deps | code | secrets | all]
11
+ ```
12
+
13
+ ---
14
+
15
+ Run security scan: **$ARGUMENTS**
16
+
17
+ ## Workflow
18
+
19
+ ### Dependency Scan
20
+
21
+ ```bash
22
+ npm audit
23
+ pip-audit
24
+ ```
25
+
26
+ ### Code Scan
27
+
28
+ - SQL injection patterns
29
+ - XSS vulnerabilities
30
+ - Command injection
31
+
32
+ ### Secret Detection
33
+
34
+ - API keys
35
+ - Passwords
36
+ - Tokens
37
+
38
+ ## Output
39
+
40
+ ```markdown
41
+ ## Security Scan Results
42
+
43
+ ### Summary
44
+ | Type | Critical | High | Medium |
45
+ |------|----------|------|--------|
46
+ | Dependencies | 0 | 2 | 5 |
47
+ | Code | 0 | 1 | 3 |
48
+ | Secrets | 0 | 0 | 0 |
49
+
50
+ ### Findings
51
+ [Detailed findings with remediation]
52
+ ```
53
+
54
+
55
+ ## Gap Analysis Rule
56
+ Always identify gaps and suggest next steps to users. In case there is no gaps anymore, then AI should clearly state that there is no gap left.