agentic-qe 3.7.9 → 3.7.11
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.claude/skills/.validation/README.md +111 -111
- package/.claude/skills/.validation/examples/chaos-engineering-output.example.json +530 -530
- package/.claude/skills/.validation/examples/performance-testing-output.example.json +252 -252
- package/.claude/skills/.validation/examples/security-testing-output.example.json +413 -413
- package/.claude/skills/.validation/examples/testability-scoring-output.example.json +350 -350
- package/.claude/skills/.validation/schemas/skill-eval.schema.json +462 -462
- package/.claude/skills/.validation/schemas/skill-frontmatter.schema.json +341 -341
- package/.claude/skills/.validation/schemas/skill-output-meta.schema.json +199 -199
- package/.claude/skills/.validation/schemas/skill-output.template.json +610 -610
- package/.claude/skills/.validation/skill-validation-mcp-integration.md +250 -250
- package/.claude/skills/.validation/templates/eval.template.yaml +366 -366
- package/.claude/skills/.validation/templates/schemas/output.json +145 -145
- package/.claude/skills/.validation/templates/security-testing-eval.template.yaml +725 -725
- package/.claude/skills/.validation/templates/skill-frontmatter.example.yaml +225 -225
- package/.claude/skills/.validation/test-data/invalid-output.json +5 -5
- package/.claude/skills/.validation/test-data/minimal-output.json +9 -9
- package/.claude/skills/.validation/test-data/sample-output.json +73 -73
- package/.claude/skills/a11y-ally/evals/a11y-ally.yaml +376 -376
- package/.claude/skills/a11y-ally/schemas/output.json +549 -549
- package/.claude/skills/accessibility-testing/evals/accessibility-testing.yaml +719 -719
- package/.claude/skills/accessibility-testing/schemas/output.json +776 -776
- package/.claude/skills/accessibility-testing/test-data/sample-output.json +191 -191
- package/.claude/skills/agentic-quality-engineering/schemas/output.json +577 -577
- package/.claude/skills/api-testing-patterns/evals/api-testing-patterns.yaml +696 -696
- package/.claude/skills/api-testing-patterns/schemas/output.json +845 -845
- package/.claude/skills/aqe-v2-v3-migration/schemas/output.json +513 -513
- package/.claude/skills/brutal-honesty-review/schemas/output.json +291 -291
- package/.claude/skills/bug-reporting-excellence/schemas/output.json +288 -288
- package/.claude/skills/chaos-engineering-resilience/evals/chaos-engineering-resilience.yaml +761 -761
- package/.claude/skills/chaos-engineering-resilience/schemas/output.json +1205 -1205
- package/.claude/skills/cicd-pipeline-qe-orchestrator/evals/cicd-pipeline-qe-orchestrator.yaml +157 -157
- package/.claude/skills/cicd-pipeline-qe-orchestrator/schemas/output.json +542 -542
- package/.claude/skills/code-review-quality/schemas/output.json +264 -264
- package/.claude/skills/compatibility-testing/evals/compatibility-testing.yaml +410 -410
- package/.claude/skills/compatibility-testing/schemas/output.json +551 -551
- package/.claude/skills/compliance-testing/evals/compliance-testing.yaml +1107 -1107
- package/.claude/skills/compliance-testing/schemas/output.json +845 -845
- package/.claude/skills/consultancy-practices/schemas/output.json +282 -282
- package/.claude/skills/contract-testing/evals/contract-testing.yaml +748 -748
- package/.claude/skills/contract-testing/schemas/output.json +638 -638
- package/.claude/skills/database-testing/evals/database-testing.yaml +968 -968
- package/.claude/skills/database-testing/schemas/output.json +1446 -1446
- package/.claude/skills/debug-loop/SKILL.md +61 -61
- package/.claude/skills/enterprise-integration-testing/SKILL.md +735 -735
- package/.claude/skills/enterprise-integration-testing/evals/enterprise-integration-testing.yaml +158 -158
- package/.claude/skills/enterprise-integration-testing/schemas/output.json +74 -74
- package/.claude/skills/enterprise-integration-testing/scripts/validate-config.json +25 -25
- package/.claude/skills/iterative-loop/SKILL.md +371 -371
- package/.claude/skills/localization-testing/evals/localization-testing.yaml +544 -544
- package/.claude/skills/localization-testing/schemas/output.json +325 -325
- package/.claude/skills/middleware-testing-patterns/SKILL.md +798 -798
- package/.claude/skills/middleware-testing-patterns/evals/middleware-testing-patterns.yaml +153 -153
- package/.claude/skills/middleware-testing-patterns/schemas/output.json +58 -58
- package/.claude/skills/middleware-testing-patterns/scripts/validate-config.json +25 -25
- package/.claude/skills/mobile-testing/evals/mobile-testing.yaml +537 -537
- package/.claude/skills/mobile-testing/schemas/output.json +318 -318
- package/.claude/skills/mutation-testing/evals/mutation-testing.yaml +652 -652
- package/.claude/skills/mutation-testing/schemas/output.json +707 -707
- package/.claude/skills/mutation-testing/test-data/sample-output.json +295 -295
- package/.claude/skills/n8n-expression-testing/evals/n8n-expression-testing.yaml +450 -450
- package/.claude/skills/n8n-expression-testing/schemas/output.json +369 -369
- package/.claude/skills/n8n-integration-testing-patterns/evals/n8n-integration-testing-patterns.yaml +522 -522
- package/.claude/skills/n8n-integration-testing-patterns/schemas/output.json +291 -291
- package/.claude/skills/n8n-security-testing/evals/n8n-security-testing.yaml +493 -493
- package/.claude/skills/n8n-security-testing/schemas/output.json +293 -293
- package/.claude/skills/n8n-trigger-testing-strategies/evals/n8n-trigger-testing-strategies.yaml +500 -500
- package/.claude/skills/n8n-trigger-testing-strategies/schemas/output.json +295 -295
- package/.claude/skills/n8n-workflow-testing-fundamentals/evals/n8n-workflow-testing-fundamentals.yaml +497 -497
- package/.claude/skills/n8n-workflow-testing-fundamentals/schemas/output.json +254 -254
- package/.claude/skills/observability-testing-patterns/SKILL.md +930 -930
- package/.claude/skills/observability-testing-patterns/evals/observability-testing-patterns.yaml +157 -157
- package/.claude/skills/observability-testing-patterns/schemas/output.json +58 -58
- package/.claude/skills/observability-testing-patterns/scripts/validate-config.json +25 -25
- package/.claude/skills/pentest-validation/SKILL.md +268 -268
- package/.claude/skills/pentest-validation/evals/pentest-validation.yaml +708 -708
- package/.claude/skills/pentest-validation/schemas/output.json +281 -281
- package/.claude/skills/performance-analysis/evals/performance-analysis.yaml +144 -144
- package/.claude/skills/performance-analysis/schemas/output.json +588 -588
- package/.claude/skills/performance-testing/evals/performance-testing.yaml +772 -772
- package/.claude/skills/performance-testing/schemas/output.json +1184 -1184
- package/.claude/skills/pr-review/SKILL.md +61 -61
- package/.claude/skills/qcsd-cicd-swarm/SKILL.md +2206 -2206
- package/.claude/skills/qcsd-cicd-swarm/evals/qcsd-cicd-swarm.yaml +211 -211
- package/.claude/skills/qcsd-cicd-swarm/schemas/output.json +86 -86
- package/.claude/skills/qcsd-cicd-swarm/scripts/validate-config.json +30 -30
- package/.claude/skills/qcsd-development-swarm/SKILL.md +2154 -2154
- package/.claude/skills/qcsd-development-swarm/evals/qcsd-development-swarm.yaml +162 -162
- package/.claude/skills/qcsd-development-swarm/schemas/output.json +72 -72
- package/.claude/skills/qcsd-development-swarm/scripts/validate-config.json +25 -25
- package/.claude/skills/qcsd-ideation-swarm/evals/qcsd-ideation-swarm.yaml +138 -138
- package/.claude/skills/qcsd-ideation-swarm/schemas/output.json +568 -568
- package/.claude/skills/qcsd-production-swarm/SKILL.md +2781 -2781
- package/.claude/skills/qcsd-production-swarm/evals/qcsd-production-swarm.yaml +246 -246
- package/.claude/skills/qcsd-production-swarm/schemas/output.json +505 -505
- package/.claude/skills/qcsd-production-swarm/scripts/validate-config.json +25 -25
- package/.claude/skills/qe-chaos-resilience/evals/qe-chaos-resilience.yaml +443 -443
- package/.claude/skills/qe-chaos-resilience/schemas/output.json +314 -314
- package/.claude/skills/qe-code-intelligence/evals/qe-code-intelligence.yaml +459 -459
- package/.claude/skills/qe-code-intelligence/schemas/output.json +315 -315
- package/.claude/skills/qe-contract-testing/evals/qe-contract-testing.yaml +513 -513
- package/.claude/skills/qe-contract-testing/schemas/output.json +295 -295
- package/.claude/skills/qe-coverage-analysis/evals/qe-coverage-analysis.yaml +494 -494
- package/.claude/skills/qe-coverage-analysis/schemas/output.json +286 -286
- package/.claude/skills/qe-defect-intelligence/evals/qe-defect-intelligence.yaml +511 -511
- package/.claude/skills/qe-defect-intelligence/schemas/output.json +283 -283
- package/.claude/skills/qe-iterative-loop/schemas/output.json +264 -264
- package/.claude/skills/qe-learning-optimization/evals/qe-learning-optimization.yaml +144 -144
- package/.claude/skills/qe-learning-optimization/schemas/output.json +288 -288
- package/.claude/skills/qe-quality-assessment/evals/qe-quality-assessment.yaml +506 -506
- package/.claude/skills/qe-quality-assessment/schemas/output.json +550 -550
- package/.claude/skills/qe-requirements-validation/evals/qe-requirements-validation.yaml +598 -598
- package/.claude/skills/qe-requirements-validation/schemas/output.json +587 -587
- package/.claude/skills/qe-security-compliance/evals/qe-security-compliance.yaml +595 -595
- package/.claude/skills/qe-security-compliance/schemas/output.json +498 -498
- package/.claude/skills/qe-test-execution/evals/qe-test-execution.yaml +607 -607
- package/.claude/skills/qe-test-execution/schemas/output.json +529 -529
- package/.claude/skills/qe-test-generation/evals/qe-test-generation.yaml +148 -148
- package/.claude/skills/qe-test-generation/schemas/output.json +439 -439
- package/.claude/skills/qe-visual-accessibility/evals/qe-visual-accessibility.yaml +142 -142
- package/.claude/skills/qe-visual-accessibility/schemas/output.json +491 -491
- package/.claude/skills/quality-metrics/evals/quality-metrics.yaml +494 -494
- package/.claude/skills/quality-metrics/schemas/output.json +403 -403
- package/.claude/skills/refactoring-patterns/schemas/output.json +475 -475
- package/.claude/skills/regression-testing/evals/regression-testing.yaml +504 -504
- package/.claude/skills/regression-testing/schemas/output.json +311 -311
- package/.claude/skills/release/SKILL.md +347 -347
- package/.claude/skills/risk-based-testing/evals/risk-based-testing.yaml +141 -141
- package/.claude/skills/risk-based-testing/schemas/output.json +480 -480
- package/.claude/skills/security-testing/evals/security-testing.yaml +789 -789
- package/.claude/skills/security-testing/schemas/output.json +879 -879
- package/.claude/skills/security-visual-testing/evals/security-visual-testing.yaml +163 -163
- package/.claude/skills/security-visual-testing/schemas/output.json +486 -486
- package/.claude/skills/sfdipot-product-factors/SKILL.md +239 -239
- package/.claude/skills/sherlock-review/schemas/output.json +297 -297
- package/.claude/skills/shift-left-testing/evals/shift-left-testing.yaml +145 -145
- package/.claude/skills/shift-left-testing/schemas/output.json +459 -459
- package/.claude/skills/shift-right-testing/evals/shift-right-testing.yaml +147 -147
- package/.claude/skills/shift-right-testing/schemas/output.json +418 -418
- package/.claude/skills/skills-manifest.json +1 -1
- package/.claude/skills/tdd-london-chicago/schemas/output.json +444 -444
- package/.claude/skills/technical-writing/schemas/output.json +268 -268
- package/.claude/skills/test-automation-strategy/evals/test-automation-strategy.yaml +148 -148
- package/.claude/skills/test-automation-strategy/schemas/output.json +444 -444
- package/.claude/skills/test-data-management/evals/test-data-management.yaml +504 -504
- package/.claude/skills/test-data-management/schemas/output.json +284 -284
- package/.claude/skills/test-design-techniques/evals/test-design-techniques.yaml +142 -142
- package/.claude/skills/test-design-techniques/schemas/output.json +295 -295
- package/.claude/skills/test-environment-management/schemas/output.json +310 -310
- package/.claude/skills/test-idea-rewriting/SKILL.md +229 -229
- package/.claude/skills/test-reporting-analytics/evals/test-reporting-analytics.yaml +155 -155
- package/.claude/skills/test-reporting-analytics/schemas/output.json +329 -329
- package/.claude/skills/testability-scoring/evals/testability-scoring.yaml +814 -814
- package/.claude/skills/testability-scoring/resources/templates/config.template.js +84 -84
- package/.claude/skills/testability-scoring/schemas/output.json +606 -606
- package/.claude/skills/testability-scoring/scripts/generate-html-report.js +1007 -1007
- package/.claude/skills/verification-quality/evals/verification-quality.yaml +150 -150
- package/.claude/skills/verification-quality/schemas/output.json +432 -432
- package/.claude/skills/visual-testing-advanced/evals/visual-testing-advanced.yaml +154 -154
- package/.claude/skills/visual-testing-advanced/schemas/output.json +294 -294
- package/.claude/skills/wms-testing-patterns/evals/wms-testing-patterns.yaml +165 -165
- package/.claude/skills/wms-testing-patterns/schemas/output.json +150 -150
- package/.claude/skills/wms-testing-patterns/scripts/validate-config.json +51 -51
- package/CHANGELOG.md +36 -0
- package/README.md +171 -901
- package/assets/agents/v3/helpers/quality-criteria/evidence-classification.md +116 -116
- package/assets/agents/v3/helpers/quality-criteria/htsm-categories.md +139 -139
- package/assets/governance/constitution.md +202 -202
- package/assets/governance/shards/chaos-resilience.shard.md +221 -221
- package/assets/governance/shards/code-intelligence.shard.md +178 -178
- package/assets/governance/shards/contract-testing.shard.md +206 -206
- package/assets/governance/shards/coverage-analysis.shard.md +146 -146
- package/assets/governance/shards/defect-intelligence.shard.md +182 -182
- package/assets/governance/shards/learning-optimization.shard.md +248 -248
- package/assets/governance/shards/quality-assessment.shard.md +165 -165
- package/assets/governance/shards/requirements-validation.shard.md +177 -177
- package/assets/governance/shards/security-compliance.shard.md +196 -196
- package/assets/governance/shards/test-execution.shard.md +156 -156
- package/assets/governance/shards/test-generation.shard.md +128 -128
- package/assets/governance/shards/visual-accessibility.shard.md +209 -209
- package/assets/hooks/cross-phase-memory.yaml +253 -253
- package/assets/patterns/adr-051-booster-patterns.json +78 -78
- package/assets/patterns/adr-051-embedding-patterns.json +147 -147
- package/assets/patterns/adr-051-integration-summary.json +62 -62
- package/assets/patterns/adr-051-reasoning-patterns.json +166 -166
- package/assets/patterns/adr-051-router-patterns.json +113 -113
- package/assets/patterns/index.json +136 -136
- package/assets/skills/.validation/README.md +111 -111
- package/assets/skills/.validation/examples/chaos-engineering-output.example.json +530 -530
- package/assets/skills/.validation/examples/performance-testing-output.example.json +252 -252
- package/assets/skills/.validation/examples/security-testing-output.example.json +413 -413
- package/assets/skills/.validation/examples/testability-scoring-output.example.json +350 -350
- package/assets/skills/.validation/schemas/skill-eval.schema.json +462 -462
- package/assets/skills/.validation/schemas/skill-frontmatter.schema.json +341 -341
- package/assets/skills/.validation/schemas/skill-output-meta.schema.json +199 -199
- package/assets/skills/.validation/schemas/skill-output.template.json +610 -610
- package/assets/skills/.validation/skill-validation-mcp-integration.md +250 -250
- package/assets/skills/.validation/templates/eval.template.yaml +366 -366
- package/assets/skills/.validation/templates/schemas/output.json +145 -145
- package/assets/skills/.validation/templates/security-testing-eval.template.yaml +725 -725
- package/assets/skills/.validation/templates/skill-frontmatter.example.yaml +225 -225
- package/assets/skills/.validation/test-data/invalid-output.json +5 -5
- package/assets/skills/.validation/test-data/minimal-output.json +9 -9
- package/assets/skills/.validation/test-data/sample-output.json +73 -73
- package/assets/skills/a11y-ally/evals/a11y-ally.yaml +376 -376
- package/assets/skills/a11y-ally/schemas/output.json +549 -549
- package/assets/skills/accessibility-testing/evals/accessibility-testing.yaml +719 -719
- package/assets/skills/accessibility-testing/schemas/output.json +776 -776
- package/assets/skills/accessibility-testing/test-data/sample-output.json +191 -191
- package/assets/skills/agentic-quality-engineering/schemas/output.json +577 -577
- package/assets/skills/api-testing-patterns/evals/api-testing-patterns.yaml +696 -696
- package/assets/skills/api-testing-patterns/schemas/output.json +845 -845
- package/assets/skills/aqe-v2-v3-migration/schemas/output.json +513 -513
- package/assets/skills/brutal-honesty-review/schemas/output.json +291 -291
- package/assets/skills/bug-reporting-excellence/schemas/output.json +288 -288
- package/assets/skills/chaos-engineering-resilience/evals/chaos-engineering-resilience.yaml +761 -761
- package/assets/skills/chaos-engineering-resilience/schemas/output.json +1205 -1205
- package/assets/skills/cicd-pipeline-qe-orchestrator/evals/cicd-pipeline-qe-orchestrator.yaml +157 -157
- package/assets/skills/cicd-pipeline-qe-orchestrator/schemas/output.json +542 -542
- package/assets/skills/code-review-quality/schemas/output.json +264 -264
- package/assets/skills/compatibility-testing/evals/compatibility-testing.yaml +410 -410
- package/assets/skills/compatibility-testing/schemas/output.json +551 -551
- package/assets/skills/compliance-testing/evals/compliance-testing.yaml +1107 -1107
- package/assets/skills/compliance-testing/schemas/output.json +845 -845
- package/assets/skills/consultancy-practices/schemas/output.json +282 -282
- package/assets/skills/contract-testing/evals/contract-testing.yaml +748 -748
- package/assets/skills/contract-testing/schemas/output.json +638 -638
- package/assets/skills/database-testing/evals/database-testing.yaml +968 -968
- package/assets/skills/database-testing/schemas/output.json +1446 -1446
- package/assets/skills/debug-loop/SKILL.md +61 -61
- package/assets/skills/enterprise-integration-testing/SKILL.md +735 -735
- package/assets/skills/enterprise-integration-testing/evals/enterprise-integration-testing.yaml +158 -158
- package/assets/skills/enterprise-integration-testing/schemas/output.json +74 -74
- package/assets/skills/enterprise-integration-testing/scripts/validate-config.json +25 -25
- package/assets/skills/localization-testing/evals/localization-testing.yaml +544 -544
- package/assets/skills/localization-testing/schemas/output.json +325 -325
- package/assets/skills/middleware-testing-patterns/SKILL.md +798 -798
- package/assets/skills/middleware-testing-patterns/evals/middleware-testing-patterns.yaml +153 -153
- package/assets/skills/middleware-testing-patterns/schemas/output.json +58 -58
- package/assets/skills/middleware-testing-patterns/scripts/validate-config.json +25 -25
- package/assets/skills/mobile-testing/evals/mobile-testing.yaml +537 -537
- package/assets/skills/mobile-testing/schemas/output.json +318 -318
- package/assets/skills/mutation-testing/evals/mutation-testing.yaml +652 -652
- package/assets/skills/mutation-testing/schemas/output.json +707 -707
- package/assets/skills/mutation-testing/test-data/sample-output.json +295 -295
- package/assets/skills/n8n-expression-testing/evals/n8n-expression-testing.yaml +450 -450
- package/assets/skills/n8n-expression-testing/schemas/output.json +369 -369
- package/assets/skills/n8n-integration-testing-patterns/evals/n8n-integration-testing-patterns.yaml +522 -522
- package/assets/skills/n8n-integration-testing-patterns/schemas/output.json +291 -291
- package/assets/skills/n8n-security-testing/evals/n8n-security-testing.yaml +493 -493
- package/assets/skills/n8n-security-testing/schemas/output.json +293 -293
- package/assets/skills/n8n-trigger-testing-strategies/evals/n8n-trigger-testing-strategies.yaml +500 -500
- package/assets/skills/n8n-trigger-testing-strategies/schemas/output.json +295 -295
- package/assets/skills/n8n-workflow-testing-fundamentals/evals/n8n-workflow-testing-fundamentals.yaml +497 -497
- package/assets/skills/n8n-workflow-testing-fundamentals/schemas/output.json +254 -254
- package/assets/skills/observability-testing-patterns/SKILL.md +930 -930
- package/assets/skills/observability-testing-patterns/evals/observability-testing-patterns.yaml +157 -157
- package/assets/skills/observability-testing-patterns/schemas/output.json +58 -58
- package/assets/skills/observability-testing-patterns/scripts/validate-config.json +25 -25
- package/assets/skills/pentest-validation/SKILL.md +268 -268
- package/assets/skills/pentest-validation/evals/pentest-validation.yaml +708 -708
- package/assets/skills/pentest-validation/schemas/output.json +281 -281
- package/assets/skills/performance-testing/evals/performance-testing.yaml +772 -772
- package/assets/skills/performance-testing/schemas/output.json +1184 -1184
- package/assets/skills/pr-review/SKILL.md +61 -61
- package/assets/skills/qcsd-cicd-swarm/SKILL.md +2206 -2206
- package/assets/skills/qcsd-cicd-swarm/evals/qcsd-cicd-swarm.yaml +211 -211
- package/assets/skills/qcsd-cicd-swarm/schemas/output.json +86 -86
- package/assets/skills/qcsd-cicd-swarm/scripts/validate-config.json +30 -30
- package/assets/skills/qcsd-development-swarm/SKILL.md +2154 -2154
- package/assets/skills/qcsd-development-swarm/evals/qcsd-development-swarm.yaml +162 -162
- package/assets/skills/qcsd-development-swarm/schemas/output.json +72 -72
- package/assets/skills/qcsd-development-swarm/scripts/validate-config.json +25 -25
- package/assets/skills/qcsd-ideation-swarm/evals/qcsd-ideation-swarm.yaml +138 -138
- package/assets/skills/qcsd-ideation-swarm/schemas/output.json +568 -568
- package/assets/skills/qcsd-production-swarm/SKILL.md +2781 -2781
- package/assets/skills/qcsd-production-swarm/evals/qcsd-production-swarm.yaml +246 -246
- package/assets/skills/qcsd-production-swarm/schemas/output.json +505 -505
- package/assets/skills/qcsd-production-swarm/scripts/validate-config.json +25 -25
- package/assets/skills/qe-chaos-resilience/evals/qe-chaos-resilience.yaml +443 -443
- package/assets/skills/qe-chaos-resilience/schemas/output.json +314 -314
- package/assets/skills/qe-code-intelligence/evals/qe-code-intelligence.yaml +459 -459
- package/assets/skills/qe-code-intelligence/schemas/output.json +315 -315
- package/assets/skills/qe-contract-testing/evals/qe-contract-testing.yaml +513 -513
- package/assets/skills/qe-contract-testing/schemas/output.json +295 -295
- package/assets/skills/qe-coverage-analysis/evals/qe-coverage-analysis.yaml +494 -494
- package/assets/skills/qe-coverage-analysis/schemas/output.json +286 -286
- package/assets/skills/qe-defect-intelligence/evals/qe-defect-intelligence.yaml +511 -511
- package/assets/skills/qe-defect-intelligence/schemas/output.json +283 -283
- package/assets/skills/qe-iterative-loop/schemas/output.json +264 -264
- package/assets/skills/qe-learning-optimization/evals/qe-learning-optimization.yaml +144 -144
- package/assets/skills/qe-learning-optimization/schemas/output.json +288 -288
- package/assets/skills/qe-quality-assessment/evals/qe-quality-assessment.yaml +506 -506
- package/assets/skills/qe-quality-assessment/schemas/output.json +550 -550
- package/assets/skills/qe-requirements-validation/evals/qe-requirements-validation.yaml +598 -598
- package/assets/skills/qe-requirements-validation/schemas/output.json +587 -587
- package/assets/skills/qe-security-compliance/evals/qe-security-compliance.yaml +595 -595
- package/assets/skills/qe-security-compliance/schemas/output.json +498 -498
- package/assets/skills/qe-test-execution/evals/qe-test-execution.yaml +607 -607
- package/assets/skills/qe-test-execution/schemas/output.json +529 -529
- package/assets/skills/qe-test-generation/evals/qe-test-generation.yaml +148 -148
- package/assets/skills/qe-test-generation/schemas/output.json +439 -439
- package/assets/skills/qe-visual-accessibility/evals/qe-visual-accessibility.yaml +142 -142
- package/assets/skills/qe-visual-accessibility/schemas/output.json +491 -491
- package/assets/skills/quality-metrics/evals/quality-metrics.yaml +494 -494
- package/assets/skills/quality-metrics/schemas/output.json +403 -403
- package/assets/skills/refactoring-patterns/schemas/output.json +475 -475
- package/assets/skills/regression-testing/evals/regression-testing.yaml +504 -504
- package/assets/skills/regression-testing/schemas/output.json +311 -311
- package/assets/skills/risk-based-testing/evals/risk-based-testing.yaml +141 -141
- package/assets/skills/risk-based-testing/schemas/output.json +480 -480
- package/assets/skills/security-testing/evals/security-testing.yaml +789 -789
- package/assets/skills/security-testing/schemas/output.json +879 -879
- package/assets/skills/security-visual-testing/evals/security-visual-testing.yaml +163 -163
- package/assets/skills/security-visual-testing/schemas/output.json +486 -486
- package/assets/skills/sfdipot-product-factors/SKILL.md +239 -239
- package/assets/skills/sherlock-review/schemas/output.json +297 -297
- package/assets/skills/shift-left-testing/evals/shift-left-testing.yaml +145 -145
- package/assets/skills/shift-left-testing/schemas/output.json +459 -459
- package/assets/skills/shift-right-testing/evals/shift-right-testing.yaml +147 -147
- package/assets/skills/shift-right-testing/schemas/output.json +418 -418
- package/assets/skills/tdd-london-chicago/schemas/output.json +444 -444
- package/assets/skills/technical-writing/schemas/output.json +268 -268
- package/assets/skills/test-automation-strategy/evals/test-automation-strategy.yaml +148 -148
- package/assets/skills/test-automation-strategy/schemas/output.json +444 -444
- package/assets/skills/test-data-management/evals/test-data-management.yaml +504 -504
- package/assets/skills/test-data-management/schemas/output.json +284 -284
- package/assets/skills/test-design-techniques/evals/test-design-techniques.yaml +142 -142
- package/assets/skills/test-design-techniques/schemas/output.json +295 -295
- package/assets/skills/test-environment-management/schemas/output.json +310 -310
- package/assets/skills/test-idea-rewriting/SKILL.md +229 -229
- package/assets/skills/test-reporting-analytics/evals/test-reporting-analytics.yaml +155 -155
- package/assets/skills/test-reporting-analytics/schemas/output.json +329 -329
- package/assets/skills/testability-scoring/evals/testability-scoring.yaml +814 -814
- package/assets/skills/testability-scoring/resources/templates/config.template.js +84 -84
- package/assets/skills/testability-scoring/schemas/output.json +606 -606
- package/assets/skills/testability-scoring/scripts/generate-html-report.js +1007 -1007
- package/assets/skills/verification-quality/evals/verification-quality.yaml +150 -150
- package/assets/skills/verification-quality/schemas/output.json +432 -432
- package/assets/skills/visual-testing-advanced/evals/visual-testing-advanced.yaml +154 -154
- package/assets/skills/visual-testing-advanced/schemas/output.json +294 -294
- package/assets/skills/wms-testing-patterns/evals/wms-testing-patterns.yaml +165 -165
- package/assets/skills/wms-testing-patterns/schemas/output.json +150 -150
- package/assets/skills/wms-testing-patterns/scripts/validate-config.json +51 -51
- package/assets/templates/validation-summary.json +56 -56
- package/dist/agents/claim-verifier/verifiers/output-verifier.d.ts +1 -0
- package/dist/agents/claim-verifier/verifiers/output-verifier.d.ts.map +1 -1
- package/dist/agents/claim-verifier/verifiers/output-verifier.js +16 -3
- package/dist/agents/claim-verifier/verifiers/output-verifier.js.map +1 -1
- package/dist/cli/bundle.js +488 -75
- package/dist/cli/commands/mcp.d.ts.map +1 -1
- package/dist/cli/commands/mcp.js +11 -9
- package/dist/cli/commands/mcp.js.map +1 -1
- package/dist/governance/adversarial-defense-integration.d.ts +29 -0
- package/dist/governance/adversarial-defense-integration.d.ts.map +1 -1
- package/dist/governance/adversarial-defense-integration.js +85 -1
- package/dist/governance/adversarial-defense-integration.js.map +1 -1
- package/dist/governance/continue-gate-integration.d.ts +7 -5
- package/dist/governance/continue-gate-integration.d.ts.map +1 -1
- package/dist/governance/continue-gate-integration.js +72 -15
- package/dist/governance/continue-gate-integration.js.map +1 -1
- package/dist/governance/deterministic-gateway-integration.d.ts +5 -0
- package/dist/governance/deterministic-gateway-integration.d.ts.map +1 -1
- package/dist/governance/deterministic-gateway-integration.js +35 -1
- package/dist/governance/deterministic-gateway-integration.js.map +1 -1
- package/dist/governance/evolution-pipeline-integration.d.ts +5 -0
- package/dist/governance/evolution-pipeline-integration.d.ts.map +1 -1
- package/dist/governance/evolution-pipeline-integration.js +57 -1
- package/dist/governance/evolution-pipeline-integration.js.map +1 -1
- package/dist/governance/memory-write-gate-integration.d.ts +6 -3
- package/dist/governance/memory-write-gate-integration.d.ts.map +1 -1
- package/dist/governance/memory-write-gate-integration.js +48 -10
- package/dist/governance/memory-write-gate-integration.js.map +1 -1
- package/dist/governance/proof-envelope-integration.d.ts +1 -0
- package/dist/governance/proof-envelope-integration.d.ts.map +1 -1
- package/dist/governance/proof-envelope-integration.js +37 -0
- package/dist/governance/proof-envelope-integration.js.map +1 -1
- package/dist/governance/shard-retriever-integration.d.ts +10 -0
- package/dist/governance/shard-retriever-integration.d.ts.map +1 -1
- package/dist/governance/shard-retriever-integration.js +50 -1
- package/dist/governance/shard-retriever-integration.js.map +1 -1
- package/dist/governance/trust-accumulator-integration.d.ts +5 -0
- package/dist/governance/trust-accumulator-integration.d.ts.map +1 -1
- package/dist/governance/trust-accumulator-integration.js +35 -2
- package/dist/governance/trust-accumulator-integration.js.map +1 -1
- package/dist/init/phases/10-workers.js +2 -2
- package/dist/init/phases/10-workers.js.map +1 -1
- package/dist/mcp/bundle.js +478 -62
- package/dist/mcp/protocol-server.js +2 -2
- package/dist/mcp/tool-registry.d.ts.map +1 -1
- package/dist/mcp/tool-registry.js +1 -0
- package/dist/mcp/tool-registry.js.map +1 -1
- package/dist/shared/language-detector.js +1 -1
- package/dist/shared/language-detector.js.map +1 -1
- package/dist/shared/parsers/multi-language-parser.d.ts.map +1 -1
- package/dist/shared/parsers/multi-language-parser.js +55 -16
- package/dist/shared/parsers/multi-language-parser.js.map +1 -1
- package/dist/shared/sql-safety.d.ts.map +1 -1
- package/dist/shared/sql-safety.js +7 -1
- package/dist/shared/sql-safety.js.map +1 -1
- package/package.json +6 -2
- package/scripts/prepare-assets.sh +8 -0
|
@@ -1,595 +1,595 @@
|
|
|
1
|
-
# =============================================================================
|
|
2
|
-
# AQE Skill Evaluation Test Suite: QE Security Compliance v1.0.0
|
|
3
|
-
# =============================================================================
|
|
4
|
-
#
|
|
5
|
-
# Comprehensive evaluation suite for the qe-security-compliance skill.
|
|
6
|
-
# Tests SAST scanning, dependency vulnerability checking, compliance auditing,
|
|
7
|
-
# secret detection, and OWASP Top 10 validation.
|
|
8
|
-
#
|
|
9
|
-
# Schema: .claude/skills/.validation/schemas/skill-eval.schema.json
|
|
10
|
-
# Validator: .claude/skills/qe-security-compliance/scripts/validate-config.json
|
|
11
|
-
#
|
|
12
|
-
# Coverage:
|
|
13
|
-
# - SAST scanning for code vulnerabilities
|
|
14
|
-
# - Dependency vulnerability analysis
|
|
15
|
-
# - OWASP Top 10 coverage
|
|
16
|
-
# - Compliance auditing (SOC2, GDPR, HIPAA, PCI-DSS)
|
|
17
|
-
# - Secret detection and prevention
|
|
18
|
-
#
|
|
19
|
-
# =============================================================================
|
|
20
|
-
|
|
21
|
-
skill: qe-security-compliance
|
|
22
|
-
version: 1.0.0
|
|
23
|
-
description: >
|
|
24
|
-
Comprehensive evaluation suite for the qe-security-compliance skill.
|
|
25
|
-
Tests SAST and DAST scanning, dependency vulnerability checking, OWASP
|
|
26
|
-
Top 10 validation, compliance auditing for multiple standards, and secret
|
|
27
|
-
detection across codebase and configuration.
|
|
28
|
-
|
|
29
|
-
# =============================================================================
|
|
30
|
-
# Multi-Model Configuration
|
|
31
|
-
# =============================================================================
|
|
32
|
-
|
|
33
|
-
models_to_test:
|
|
34
|
-
- claude-3.5-sonnet
|
|
35
|
-
- claude-3-haiku
|
|
36
|
-
|
|
37
|
-
# =============================================================================
|
|
38
|
-
# MCP Integration Configuration
|
|
39
|
-
# =============================================================================
|
|
40
|
-
|
|
41
|
-
mcp_integration:
|
|
42
|
-
enabled: true
|
|
43
|
-
namespace: skill-validation
|
|
44
|
-
|
|
45
|
-
query_patterns: true
|
|
46
|
-
track_outcomes: true
|
|
47
|
-
store_patterns: true
|
|
48
|
-
share_learning: true
|
|
49
|
-
update_quality_gate: true
|
|
50
|
-
|
|
51
|
-
target_agents:
|
|
52
|
-
- qe-learning-coordinator
|
|
53
|
-
- qe-queen-coordinator
|
|
54
|
-
- qe-security-auditor
|
|
55
|
-
- qe-security-scanner
|
|
56
|
-
|
|
57
|
-
# =============================================================================
|
|
58
|
-
# ReasoningBank Learning Configuration
|
|
59
|
-
# =============================================================================
|
|
60
|
-
|
|
61
|
-
learning:
|
|
62
|
-
store_success_patterns: true
|
|
63
|
-
store_failure_patterns: true
|
|
64
|
-
pattern_ttl_days: 90
|
|
65
|
-
min_confidence_to_store: 0.7
|
|
66
|
-
cross_model_comparison: true
|
|
67
|
-
|
|
68
|
-
# =============================================================================
|
|
69
|
-
# Result Format Configuration
|
|
70
|
-
# =============================================================================
|
|
71
|
-
|
|
72
|
-
result_format:
|
|
73
|
-
json_output: true
|
|
74
|
-
markdown_report: true
|
|
75
|
-
include_raw_output: false
|
|
76
|
-
include_timing: true
|
|
77
|
-
include_token_usage: true
|
|
78
|
-
|
|
79
|
-
# =============================================================================
|
|
80
|
-
# Environment Setup
|
|
81
|
-
# =============================================================================
|
|
82
|
-
|
|
83
|
-
setup:
|
|
84
|
-
required_tools:
|
|
85
|
-
- jq
|
|
86
|
-
environment_variables:
|
|
87
|
-
SECURITY_SCAN_LEVEL: "comprehensive"
|
|
88
|
-
OWASP_ENABLED: "true"
|
|
89
|
-
SECRET_DETECTION: "enabled"
|
|
90
|
-
fixtures: []
|
|
91
|
-
|
|
92
|
-
# =============================================================================
|
|
93
|
-
# TEST CASES
|
|
94
|
-
# =============================================================================
|
|
95
|
-
|
|
96
|
-
test_cases:
|
|
97
|
-
# ---------------------------------------------------------------------------
|
|
98
|
-
# CATEGORY: SAST Scanning
|
|
99
|
-
# ---------------------------------------------------------------------------
|
|
100
|
-
|
|
101
|
-
- id: tc001_sast_sql_injection_detection
|
|
102
|
-
description: "Detect SQL injection vulnerabilities in code"
|
|
103
|
-
category: sast
|
|
104
|
-
priority: critical
|
|
105
|
-
|
|
106
|
-
input:
|
|
107
|
-
prompt: |
|
|
108
|
-
Scan this code for SQL injection vulnerabilities:
|
|
109
|
-
|
|
110
|
-
```javascript
|
|
111
|
-
app.get('/user/:id', (req, res) => {
|
|
112
|
-
const userId = req.params.id;
|
|
113
|
-
const query = `SELECT * FROM users WHERE id = ${userId}`;
|
|
114
|
-
db.query(query, (err, results) => {
|
|
115
|
-
res.json(results);
|
|
116
|
-
});
|
|
117
|
-
});
|
|
118
|
-
```
|
|
119
|
-
|
|
120
|
-
VULNERABILITY:
|
|
121
|
-
- Type: SQL Injection
|
|
122
|
-
- Severity: CRITICAL
|
|
123
|
-
- CWE: CWE-89
|
|
124
|
-
- OWASP: A03:2021
|
|
125
|
-
- Fix: Use parameterized query
|
|
126
|
-
|
|
127
|
-
What are all the issues?
|
|
128
|
-
context:
|
|
129
|
-
scan_type: "sql_injection"
|
|
130
|
-
include_remediation: true
|
|
131
|
-
|
|
132
|
-
expected_output:
|
|
133
|
-
must_contain:
|
|
134
|
-
- "SQL injection"
|
|
135
|
-
- "parameterized"
|
|
136
|
-
- "CWE-89"
|
|
137
|
-
- "critical"
|
|
138
|
-
must_not_contain:
|
|
139
|
-
- "secure"
|
|
140
|
-
- "no vulnerability"
|
|
141
|
-
severity_classification: critical
|
|
142
|
-
finding_count:
|
|
143
|
-
min: 1
|
|
144
|
-
|
|
145
|
-
validation:
|
|
146
|
-
schema_check: true
|
|
147
|
-
keyword_match_threshold: 0.8
|
|
148
|
-
reasoning_quality_min: 0.75
|
|
149
|
-
|
|
150
|
-
- id: tc002_sast_xss_detection
|
|
151
|
-
description: "Detect cross-site scripting (XSS) vulnerabilities"
|
|
152
|
-
category: sast
|
|
153
|
-
priority: critical
|
|
154
|
-
|
|
155
|
-
input:
|
|
156
|
-
prompt: |
|
|
157
|
-
Scan for XSS vulnerabilities:
|
|
158
|
-
|
|
159
|
-
```javascript
|
|
160
|
-
app.get('/profile', (req, res) => {
|
|
161
|
-
const name = req.query.name;
|
|
162
|
-
res.send(`<h1>Welcome, ${name}!</h1>`);
|
|
163
|
-
});
|
|
164
|
-
```
|
|
165
|
-
|
|
166
|
-
VULNERABILITY:
|
|
167
|
-
- Type: Reflected XSS
|
|
168
|
-
- Severity: HIGH
|
|
169
|
-
- CWE: CWE-79
|
|
170
|
-
- Attack: name=<script>alert('xss')</script>
|
|
171
|
-
- Fix: Escape output or use textContent
|
|
172
|
-
|
|
173
|
-
Identify all issues and fixes.
|
|
174
|
-
context:
|
|
175
|
-
scan_type: "xss"
|
|
176
|
-
include_examples: true
|
|
177
|
-
|
|
178
|
-
expected_output:
|
|
179
|
-
must_contain:
|
|
180
|
-
- "XSS"
|
|
181
|
-
- "escape"
|
|
182
|
-
- "sanitize"
|
|
183
|
-
- "CWE-79"
|
|
184
|
-
severity_classification: critical
|
|
185
|
-
|
|
186
|
-
validation:
|
|
187
|
-
schema_check: true
|
|
188
|
-
keyword_match_threshold: 0.8
|
|
189
|
-
|
|
190
|
-
- id: tc003_sast_hardcoded_secrets
|
|
191
|
-
description: "Detect hardcoded credentials and secrets"
|
|
192
|
-
category: sast
|
|
193
|
-
priority: critical
|
|
194
|
-
|
|
195
|
-
input:
|
|
196
|
-
prompt: |
|
|
197
|
-
Scan for hardcoded secrets:
|
|
198
|
-
|
|
199
|
-
```javascript
|
|
200
|
-
const API_KEY = 'sk-12345678901234567890';
|
|
201
|
-
const DB_PASSWORD = 'admin123';
|
|
202
|
-
const JWT_SECRET = 'my-secret-key-do-not-share';
|
|
203
|
-
|
|
204
|
-
const credentials = {
|
|
205
|
-
username: 'admin',
|
|
206
|
-
password: 'P@ssw0rd123'
|
|
207
|
-
};
|
|
208
|
-
```
|
|
209
|
-
|
|
210
|
-
FINDINGS:
|
|
211
|
-
1. API_KEY: Hardcoded - CRITICAL
|
|
212
|
-
2. DB_PASSWORD: Hardcoded - CRITICAL
|
|
213
|
-
3. JWT_SECRET: Hardcoded - CRITICAL
|
|
214
|
-
4. Credentials object: Hardcoded password - CRITICAL
|
|
215
|
-
|
|
216
|
-
Fix: Move to environment variables, use vault
|
|
217
|
-
context:
|
|
218
|
-
scan_type: "secrets"
|
|
219
|
-
secret_patterns: "all"
|
|
220
|
-
|
|
221
|
-
expected_output:
|
|
222
|
-
must_contain:
|
|
223
|
-
- "secret"
|
|
224
|
-
- "hardcoded"
|
|
225
|
-
- "environment"
|
|
226
|
-
- "credentials"
|
|
227
|
-
must_not_contain:
|
|
228
|
-
- "ok"
|
|
229
|
-
- "no secrets"
|
|
230
|
-
severity_classification: critical
|
|
231
|
-
|
|
232
|
-
validation:
|
|
233
|
-
schema_check: true
|
|
234
|
-
keyword_match_threshold: 0.8
|
|
235
|
-
reasoning_quality_min: 0.75
|
|
236
|
-
|
|
237
|
-
# ---------------------------------------------------------------------------
|
|
238
|
-
# CATEGORY: Dependency Scanning
|
|
239
|
-
# ---------------------------------------------------------------------------
|
|
240
|
-
|
|
241
|
-
- id: tc004_dependency_vulnerability_check
|
|
242
|
-
description: "Detect known vulnerabilities in dependencies"
|
|
243
|
-
category: dependencies
|
|
244
|
-
priority: critical
|
|
245
|
-
|
|
246
|
-
input:
|
|
247
|
-
prompt: |
|
|
248
|
-
Scan dependencies for vulnerabilities:
|
|
249
|
-
|
|
250
|
-
package.json:
|
|
251
|
-
- lodash@4.17.15 (outdated)
|
|
252
|
-
- express@4.16.0 (vulnerable)
|
|
253
|
-
- moment@2.24.0 (has CVEs)
|
|
254
|
-
- axios@0.18.1 (vulnerable)
|
|
255
|
-
|
|
256
|
-
VULNERABLE PACKAGES:
|
|
257
|
-
1. express@4.16.0: CVE-2018-16487 (HIGH)
|
|
258
|
-
2. axios@0.18.1: CVE-2020-28168 (HIGH)
|
|
259
|
-
3. lodash@4.17.15: CVE-2021-23337 (MEDIUM)
|
|
260
|
-
4. moment@2.24.0: Regular Expression DoS (MEDIUM)
|
|
261
|
-
|
|
262
|
-
Action: Update to latest versions
|
|
263
|
-
context:
|
|
264
|
-
scan_scope: "package.json"
|
|
265
|
-
include_cves: true
|
|
266
|
-
|
|
267
|
-
expected_output:
|
|
268
|
-
must_contain:
|
|
269
|
-
- "vulnerable"
|
|
270
|
-
- "CVE"
|
|
271
|
-
- "dependency"
|
|
272
|
-
- "update"
|
|
273
|
-
must_not_contain:
|
|
274
|
-
- "no vulnerabilities"
|
|
275
|
-
- "all ok"
|
|
276
|
-
severity_classification: critical
|
|
277
|
-
|
|
278
|
-
validation:
|
|
279
|
-
schema_check: true
|
|
280
|
-
keyword_match_threshold: 0.8
|
|
281
|
-
|
|
282
|
-
- id: tc005_outdated_package_detection
|
|
283
|
-
description: "Identify outdated packages needing updates"
|
|
284
|
-
category: dependencies
|
|
285
|
-
priority: high
|
|
286
|
-
|
|
287
|
-
input:
|
|
288
|
-
prompt: |
|
|
289
|
-
Analyze package freshness:
|
|
290
|
-
- lodash@4.17.15 (current: 4.17.21) - 6 minor versions behind
|
|
291
|
-
- express@4.16.0 (current: 4.18.2) - 2 major versions behind
|
|
292
|
-
- jest@24.0.0 (current: 29.0.0) - 5 major versions behind
|
|
293
|
-
|
|
294
|
-
RECOMMENDATIONS:
|
|
295
|
-
1. CRITICAL: Update express (major version)
|
|
296
|
-
2. HIGH: Update jest (major version, breaking changes)
|
|
297
|
-
3. MEDIUM: Update lodash (minor version, backward compatible)
|
|
298
|
-
|
|
299
|
-
How would you prioritize updates?
|
|
300
|
-
context:
|
|
301
|
-
package_analysis: true
|
|
302
|
-
prioritization: true
|
|
303
|
-
|
|
304
|
-
expected_output:
|
|
305
|
-
must_contain:
|
|
306
|
-
- "outdated"
|
|
307
|
-
- "update"
|
|
308
|
-
- "version"
|
|
309
|
-
- "prioritize"
|
|
310
|
-
finding_count:
|
|
311
|
-
min: 1
|
|
312
|
-
|
|
313
|
-
validation:
|
|
314
|
-
schema_check: true
|
|
315
|
-
keyword_match_threshold: 0.75
|
|
316
|
-
|
|
317
|
-
# ---------------------------------------------------------------------------
|
|
318
|
-
# CATEGORY: OWASP Top 10
|
|
319
|
-
# ---------------------------------------------------------------------------
|
|
320
|
-
|
|
321
|
-
- id: tc006_owasp_comprehensive_check
|
|
322
|
-
description: "Check code against full OWASP Top 10 2021"
|
|
323
|
-
category: owasp
|
|
324
|
-
priority: critical
|
|
325
|
-
|
|
326
|
-
input:
|
|
327
|
-
prompt: |
|
|
328
|
-
Scan code for OWASP Top 10 2021 compliance:
|
|
329
|
-
|
|
330
|
-
A01: Broken Access Control
|
|
331
|
-
- Check: Authorization on endpoints
|
|
332
|
-
- Status: FOUND - no authorization check on /admin
|
|
333
|
-
|
|
334
|
-
A02: Cryptographic Failures
|
|
335
|
-
- Check: Weak encryption, plaintext passwords
|
|
336
|
-
- Status: FOUND - passwords stored plaintext
|
|
337
|
-
|
|
338
|
-
A03: Injection (SQL, NoSQL, Command, XSS, LDAP)
|
|
339
|
-
- Check: SQL injection, XSS
|
|
340
|
-
- Status: FOUND - SQL injection vulnerability
|
|
341
|
-
|
|
342
|
-
A07: Authentication Failures
|
|
343
|
-
- Check: Weak passwords, session management
|
|
344
|
-
- Status: OK - using bcrypt and secure sessions
|
|
345
|
-
|
|
346
|
-
A06: Vulnerable Components
|
|
347
|
-
- Check: Known CVEs in dependencies
|
|
348
|
-
- Status: FOUND - 3 vulnerable packages
|
|
349
|
-
|
|
350
|
-
Other categories: OK
|
|
351
|
-
|
|
352
|
-
SUMMARY: 3 critical issues, 2 must fix immediately
|
|
353
|
-
context:
|
|
354
|
-
standard: "owasp-2021"
|
|
355
|
-
categories: "all"
|
|
356
|
-
include_status: true
|
|
357
|
-
|
|
358
|
-
expected_output:
|
|
359
|
-
must_contain:
|
|
360
|
-
- "OWASP"
|
|
361
|
-
- "A01"
|
|
362
|
-
- "A03"
|
|
363
|
-
- "critical"
|
|
364
|
-
- "vulnerability"
|
|
365
|
-
must_not_contain:
|
|
366
|
-
- "no issues"
|
|
367
|
-
- "compliant"
|
|
368
|
-
severity_classification: critical
|
|
369
|
-
|
|
370
|
-
validation:
|
|
371
|
-
schema_check: true
|
|
372
|
-
keyword_match_threshold: 0.8
|
|
373
|
-
reasoning_quality_min: 0.75
|
|
374
|
-
|
|
375
|
-
# ---------------------------------------------------------------------------
|
|
376
|
-
# CATEGORY: Compliance Auditing
|
|
377
|
-
# ---------------------------------------------------------------------------
|
|
378
|
-
|
|
379
|
-
- id: tc007_soc2_compliance_audit
|
|
380
|
-
description: "Audit code for SOC2 compliance"
|
|
381
|
-
category: compliance
|
|
382
|
-
priority: critical
|
|
383
|
-
|
|
384
|
-
input:
|
|
385
|
-
prompt: |
|
|
386
|
-
Audit SOC2 compliance requirements:
|
|
387
|
-
|
|
388
|
-
SECURITY:
|
|
389
|
-
- Access control: PARTIAL (missing admin endpoint protection)
|
|
390
|
-
- Encryption: OK (TLS in transit, AES at rest)
|
|
391
|
-
- Secret management: FAIL (hardcoded secrets)
|
|
392
|
-
- Monitoring: OK (logs captured)
|
|
393
|
-
|
|
394
|
-
AVAILABILITY:
|
|
395
|
-
- Error handling: OK
|
|
396
|
-
- Backup: OK
|
|
397
|
-
- Disaster recovery: PARTIAL (needs testing)
|
|
398
|
-
|
|
399
|
-
PROCESSING INTEGRITY:
|
|
400
|
-
- Input validation: FAIL (SQL injection found)
|
|
401
|
-
- Error handling: OK
|
|
402
|
-
- Audit logging: PARTIAL (some endpoints missing)
|
|
403
|
-
|
|
404
|
-
CONFIDENTIALITY:
|
|
405
|
-
- PII protection: FAIL (no encryption for user data)
|
|
406
|
-
- Access controls: PARTIAL
|
|
407
|
-
|
|
408
|
-
PRIVACY:
|
|
409
|
-
- Data retention: PARTIAL (no policy)
|
|
410
|
-
- User consent: OK
|
|
411
|
-
|
|
412
|
-
COMPLIANCE: 45% - FAIL (multiple critical gaps)
|
|
413
|
-
context:
|
|
414
|
-
standard: "SOC2"
|
|
415
|
-
categories: "all"
|
|
416
|
-
remediation: true
|
|
417
|
-
|
|
418
|
-
expected_output:
|
|
419
|
-
must_contain:
|
|
420
|
-
- "SOC2"
|
|
421
|
-
- "compliance"
|
|
422
|
-
- "fail"
|
|
423
|
-
- "gap"
|
|
424
|
-
- "remediation"
|
|
425
|
-
must_not_contain:
|
|
426
|
-
- "compliant"
|
|
427
|
-
- "pass"
|
|
428
|
-
severity_classification: critical
|
|
429
|
-
|
|
430
|
-
validation:
|
|
431
|
-
schema_check: true
|
|
432
|
-
keyword_match_threshold: 0.8
|
|
433
|
-
|
|
434
|
-
- id: tc008_gdpr_compliance_check
|
|
435
|
-
description: "Verify GDPR compliance for user data handling"
|
|
436
|
-
category: compliance
|
|
437
|
-
priority: critical
|
|
438
|
-
|
|
439
|
-
input:
|
|
440
|
-
prompt: |
|
|
441
|
-
Check GDPR compliance:
|
|
442
|
-
|
|
443
|
-
REQUIREMENTS:
|
|
444
|
-
1. User consent documented: FAIL (no consent mechanism)
|
|
445
|
-
2. Privacy policy: OK (published)
|
|
446
|
-
3. Data retention policy: FAIL (no policy defined)
|
|
447
|
-
4. Right to deletion: PARTIAL (can delete but full audit trail)
|
|
448
|
-
5. Data portability: FAIL (no export functionality)
|
|
449
|
-
6. Breach notification: PARTIAL (process exists, 30-day compliance ok)
|
|
450
|
-
7. DPA in place: OK (processor agreements signed)
|
|
451
|
-
8. Privacy by design: FAIL (not implemented)
|
|
452
|
-
|
|
453
|
-
COMPLIANCE: 38% - FAIL
|
|
454
|
-
|
|
455
|
-
What are the top 3 fixes?
|
|
456
|
-
context:
|
|
457
|
-
standard: "GDPR"
|
|
458
|
-
user_data_handling: true
|
|
459
|
-
|
|
460
|
-
expected_output:
|
|
461
|
-
must_contain:
|
|
462
|
-
- "GDPR"
|
|
463
|
-
- "compliance"
|
|
464
|
-
- "consent"
|
|
465
|
-
- "deletion"
|
|
466
|
-
- "fail"
|
|
467
|
-
severity_classification: critical
|
|
468
|
-
|
|
469
|
-
validation:
|
|
470
|
-
schema_check: true
|
|
471
|
-
keyword_match_threshold: 0.8
|
|
472
|
-
|
|
473
|
-
# ---------------------------------------------------------------------------
|
|
474
|
-
# CATEGORY: Security Gate
|
|
475
|
-
# ---------------------------------------------------------------------------
|
|
476
|
-
|
|
477
|
-
- id: tc009_security_gate_enforcement
|
|
478
|
-
description: "Enforce security gates in CI/CD pipeline"
|
|
479
|
-
category: gates
|
|
480
|
-
priority: critical
|
|
481
|
-
|
|
482
|
-
input:
|
|
483
|
-
prompt: |
|
|
484
|
-
Define security gates for merge:
|
|
485
|
-
1. Critical vulnerabilities: 0 required
|
|
486
|
-
2. High vulnerabilities: <= 2
|
|
487
|
-
3. Known CVEs in dependencies: 0
|
|
488
|
-
4. Hardcoded secrets: 0
|
|
489
|
-
5. OWASP blocking issues: 0
|
|
490
|
-
|
|
491
|
-
SCAN RESULTS:
|
|
492
|
-
- Critical: 0 ✓
|
|
493
|
-
- High: 1 (express vulnerability) ✗ BLOCK
|
|
494
|
-
- CVEs: 3 ✗ BLOCK
|
|
495
|
-
- Secrets: 1 hardcoded API key ✗ BLOCK
|
|
496
|
-
- OWASP: 2 issues ✗ BLOCK
|
|
497
|
-
|
|
498
|
-
VERDICT: BLOCK MERGE - fail security gates
|
|
499
|
-
|
|
500
|
-
How would you help fix violations?
|
|
501
|
-
context:
|
|
502
|
-
blocking: true
|
|
503
|
-
remediation_guidance: true
|
|
504
|
-
|
|
505
|
-
expected_output:
|
|
506
|
-
must_contain:
|
|
507
|
-
- "security"
|
|
508
|
-
- "gate"
|
|
509
|
-
- "block"
|
|
510
|
-
- "merge"
|
|
511
|
-
must_not_contain:
|
|
512
|
-
- "approve"
|
|
513
|
-
- "pass"
|
|
514
|
-
severity_classification: critical
|
|
515
|
-
|
|
516
|
-
validation:
|
|
517
|
-
schema_check: true
|
|
518
|
-
keyword_match_threshold: 0.8
|
|
519
|
-
|
|
520
|
-
# ---------------------------------------------------------------------------
|
|
521
|
-
# CATEGORY: Negative Tests
|
|
522
|
-
# ---------------------------------------------------------------------------
|
|
523
|
-
|
|
524
|
-
- id: tc010_security_remediation_guidance
|
|
525
|
-
description: "Provide actionable remediation for security findings"
|
|
526
|
-
category: negative
|
|
527
|
-
priority: high
|
|
528
|
-
|
|
529
|
-
input:
|
|
530
|
-
prompt: |
|
|
531
|
-
For each security issue, provide remediation:
|
|
532
|
-
|
|
533
|
-
ISSUE 1: SQL Injection in getUserById()
|
|
534
|
-
REMEDIATION:
|
|
535
|
-
```javascript
|
|
536
|
-
// BEFORE (vulnerable)
|
|
537
|
-
const query = `SELECT * FROM users WHERE id = ${userId}`;
|
|
538
|
-
|
|
539
|
-
// AFTER (safe)
|
|
540
|
-
const query = 'SELECT * FROM users WHERE id = ?';
|
|
541
|
-
db.query(query, [userId], callback);
|
|
542
|
-
```
|
|
543
|
-
|
|
544
|
-
ISSUE 2: Hardcoded API Key
|
|
545
|
-
REMEDIATION:
|
|
546
|
-
// BEFORE
|
|
547
|
-
const API_KEY = 'sk-123456789';
|
|
548
|
-
|
|
549
|
-
// AFTER
|
|
550
|
-
const API_KEY = process.env.STRIPE_API_KEY;
|
|
551
|
-
// Set in .env or secrets manager
|
|
552
|
-
|
|
553
|
-
Generate clear fix for each issue found.
|
|
554
|
-
context:
|
|
555
|
-
issue_remediation: true
|
|
556
|
-
code_examples: true
|
|
557
|
-
|
|
558
|
-
expected_output:
|
|
559
|
-
must_contain:
|
|
560
|
-
- "remediation"
|
|
561
|
-
- "before"
|
|
562
|
-
- "after"
|
|
563
|
-
- "fix"
|
|
564
|
-
finding_count:
|
|
565
|
-
min: 1
|
|
566
|
-
|
|
567
|
-
validation:
|
|
568
|
-
schema_check: true
|
|
569
|
-
allow_partial: true
|
|
570
|
-
|
|
571
|
-
# =============================================================================
|
|
572
|
-
# SUCCESS CRITERIA
|
|
573
|
-
# =============================================================================
|
|
574
|
-
|
|
575
|
-
success_criteria:
|
|
576
|
-
pass_rate: 0.8
|
|
577
|
-
critical_pass_rate: 1.0
|
|
578
|
-
avg_reasoning_quality: 0.75
|
|
579
|
-
max_execution_time_ms: 300000
|
|
580
|
-
cross_model_variance: 0.15
|
|
581
|
-
|
|
582
|
-
# =============================================================================
|
|
583
|
-
# METADATA
|
|
584
|
-
# =============================================================================
|
|
585
|
-
|
|
586
|
-
metadata:
|
|
587
|
-
author: "qe-security-auditor"
|
|
588
|
-
created: "2026-02-02"
|
|
589
|
-
last_updated: "2026-02-02"
|
|
590
|
-
coverage_target: >
|
|
591
|
-
SAST scanning for SQL injection, XSS, hardcoded secrets, path traversal,
|
|
592
|
-
insecure crypto, dependency vulnerability analysis with CVE detection,
|
|
593
|
-
OWASP Top 10 2021 comprehensive checking, compliance auditing for SOC2/GDPR,
|
|
594
|
-
security gate enforcement with blocking criteria, and detailed remediation
|
|
595
|
-
guidance with code examples for all identified vulnerabilities.
|
|
1
|
+
# =============================================================================
|
|
2
|
+
# AQE Skill Evaluation Test Suite: QE Security Compliance v1.0.0
|
|
3
|
+
# =============================================================================
|
|
4
|
+
#
|
|
5
|
+
# Comprehensive evaluation suite for the qe-security-compliance skill.
|
|
6
|
+
# Tests SAST scanning, dependency vulnerability checking, compliance auditing,
|
|
7
|
+
# secret detection, and OWASP Top 10 validation.
|
|
8
|
+
#
|
|
9
|
+
# Schema: .claude/skills/.validation/schemas/skill-eval.schema.json
|
|
10
|
+
# Validator: .claude/skills/qe-security-compliance/scripts/validate-config.json
|
|
11
|
+
#
|
|
12
|
+
# Coverage:
|
|
13
|
+
# - SAST scanning for code vulnerabilities
|
|
14
|
+
# - Dependency vulnerability analysis
|
|
15
|
+
# - OWASP Top 10 coverage
|
|
16
|
+
# - Compliance auditing (SOC2, GDPR, HIPAA, PCI-DSS)
|
|
17
|
+
# - Secret detection and prevention
|
|
18
|
+
#
|
|
19
|
+
# =============================================================================
|
|
20
|
+
|
|
21
|
+
skill: qe-security-compliance
|
|
22
|
+
version: 1.0.0
|
|
23
|
+
description: >
|
|
24
|
+
Comprehensive evaluation suite for the qe-security-compliance skill.
|
|
25
|
+
Tests SAST and DAST scanning, dependency vulnerability checking, OWASP
|
|
26
|
+
Top 10 validation, compliance auditing for multiple standards, and secret
|
|
27
|
+
detection across codebase and configuration.
|
|
28
|
+
|
|
29
|
+
# =============================================================================
|
|
30
|
+
# Multi-Model Configuration
|
|
31
|
+
# =============================================================================
|
|
32
|
+
|
|
33
|
+
models_to_test:
|
|
34
|
+
- claude-3.5-sonnet
|
|
35
|
+
- claude-3-haiku
|
|
36
|
+
|
|
37
|
+
# =============================================================================
|
|
38
|
+
# MCP Integration Configuration
|
|
39
|
+
# =============================================================================
|
|
40
|
+
|
|
41
|
+
mcp_integration:
|
|
42
|
+
enabled: true
|
|
43
|
+
namespace: skill-validation
|
|
44
|
+
|
|
45
|
+
query_patterns: true
|
|
46
|
+
track_outcomes: true
|
|
47
|
+
store_patterns: true
|
|
48
|
+
share_learning: true
|
|
49
|
+
update_quality_gate: true
|
|
50
|
+
|
|
51
|
+
target_agents:
|
|
52
|
+
- qe-learning-coordinator
|
|
53
|
+
- qe-queen-coordinator
|
|
54
|
+
- qe-security-auditor
|
|
55
|
+
- qe-security-scanner
|
|
56
|
+
|
|
57
|
+
# =============================================================================
|
|
58
|
+
# ReasoningBank Learning Configuration
|
|
59
|
+
# =============================================================================
|
|
60
|
+
|
|
61
|
+
learning:
|
|
62
|
+
store_success_patterns: true
|
|
63
|
+
store_failure_patterns: true
|
|
64
|
+
pattern_ttl_days: 90
|
|
65
|
+
min_confidence_to_store: 0.7
|
|
66
|
+
cross_model_comparison: true
|
|
67
|
+
|
|
68
|
+
# =============================================================================
|
|
69
|
+
# Result Format Configuration
|
|
70
|
+
# =============================================================================
|
|
71
|
+
|
|
72
|
+
result_format:
|
|
73
|
+
json_output: true
|
|
74
|
+
markdown_report: true
|
|
75
|
+
include_raw_output: false
|
|
76
|
+
include_timing: true
|
|
77
|
+
include_token_usage: true
|
|
78
|
+
|
|
79
|
+
# =============================================================================
|
|
80
|
+
# Environment Setup
|
|
81
|
+
# =============================================================================
|
|
82
|
+
|
|
83
|
+
setup:
|
|
84
|
+
required_tools:
|
|
85
|
+
- jq
|
|
86
|
+
environment_variables:
|
|
87
|
+
SECURITY_SCAN_LEVEL: "comprehensive"
|
|
88
|
+
OWASP_ENABLED: "true"
|
|
89
|
+
SECRET_DETECTION: "enabled"
|
|
90
|
+
fixtures: []
|
|
91
|
+
|
|
92
|
+
# =============================================================================
|
|
93
|
+
# TEST CASES
|
|
94
|
+
# =============================================================================
|
|
95
|
+
|
|
96
|
+
test_cases:
|
|
97
|
+
# ---------------------------------------------------------------------------
|
|
98
|
+
# CATEGORY: SAST Scanning
|
|
99
|
+
# ---------------------------------------------------------------------------
|
|
100
|
+
|
|
101
|
+
- id: tc001_sast_sql_injection_detection
|
|
102
|
+
description: "Detect SQL injection vulnerabilities in code"
|
|
103
|
+
category: sast
|
|
104
|
+
priority: critical
|
|
105
|
+
|
|
106
|
+
input:
|
|
107
|
+
prompt: |
|
|
108
|
+
Scan this code for SQL injection vulnerabilities:
|
|
109
|
+
|
|
110
|
+
```javascript
|
|
111
|
+
app.get('/user/:id', (req, res) => {
|
|
112
|
+
const userId = req.params.id;
|
|
113
|
+
const query = `SELECT * FROM users WHERE id = ${userId}`;
|
|
114
|
+
db.query(query, (err, results) => {
|
|
115
|
+
res.json(results);
|
|
116
|
+
});
|
|
117
|
+
});
|
|
118
|
+
```
|
|
119
|
+
|
|
120
|
+
VULNERABILITY:
|
|
121
|
+
- Type: SQL Injection
|
|
122
|
+
- Severity: CRITICAL
|
|
123
|
+
- CWE: CWE-89
|
|
124
|
+
- OWASP: A03:2021
|
|
125
|
+
- Fix: Use parameterized query
|
|
126
|
+
|
|
127
|
+
What are all the issues?
|
|
128
|
+
context:
|
|
129
|
+
scan_type: "sql_injection"
|
|
130
|
+
include_remediation: true
|
|
131
|
+
|
|
132
|
+
expected_output:
|
|
133
|
+
must_contain:
|
|
134
|
+
- "SQL injection"
|
|
135
|
+
- "parameterized"
|
|
136
|
+
- "CWE-89"
|
|
137
|
+
- "critical"
|
|
138
|
+
must_not_contain:
|
|
139
|
+
- "secure"
|
|
140
|
+
- "no vulnerability"
|
|
141
|
+
severity_classification: critical
|
|
142
|
+
finding_count:
|
|
143
|
+
min: 1
|
|
144
|
+
|
|
145
|
+
validation:
|
|
146
|
+
schema_check: true
|
|
147
|
+
keyword_match_threshold: 0.8
|
|
148
|
+
reasoning_quality_min: 0.75
|
|
149
|
+
|
|
150
|
+
- id: tc002_sast_xss_detection
|
|
151
|
+
description: "Detect cross-site scripting (XSS) vulnerabilities"
|
|
152
|
+
category: sast
|
|
153
|
+
priority: critical
|
|
154
|
+
|
|
155
|
+
input:
|
|
156
|
+
prompt: |
|
|
157
|
+
Scan for XSS vulnerabilities:
|
|
158
|
+
|
|
159
|
+
```javascript
|
|
160
|
+
app.get('/profile', (req, res) => {
|
|
161
|
+
const name = req.query.name;
|
|
162
|
+
res.send(`<h1>Welcome, ${name}!</h1>`);
|
|
163
|
+
});
|
|
164
|
+
```
|
|
165
|
+
|
|
166
|
+
VULNERABILITY:
|
|
167
|
+
- Type: Reflected XSS
|
|
168
|
+
- Severity: HIGH
|
|
169
|
+
- CWE: CWE-79
|
|
170
|
+
- Attack: name=<script>alert('xss')</script>
|
|
171
|
+
- Fix: Escape output or use textContent
|
|
172
|
+
|
|
173
|
+
Identify all issues and fixes.
|
|
174
|
+
context:
|
|
175
|
+
scan_type: "xss"
|
|
176
|
+
include_examples: true
|
|
177
|
+
|
|
178
|
+
expected_output:
|
|
179
|
+
must_contain:
|
|
180
|
+
- "XSS"
|
|
181
|
+
- "escape"
|
|
182
|
+
- "sanitize"
|
|
183
|
+
- "CWE-79"
|
|
184
|
+
severity_classification: critical
|
|
185
|
+
|
|
186
|
+
validation:
|
|
187
|
+
schema_check: true
|
|
188
|
+
keyword_match_threshold: 0.8
|
|
189
|
+
|
|
190
|
+
- id: tc003_sast_hardcoded_secrets
|
|
191
|
+
description: "Detect hardcoded credentials and secrets"
|
|
192
|
+
category: sast
|
|
193
|
+
priority: critical
|
|
194
|
+
|
|
195
|
+
input:
|
|
196
|
+
prompt: |
|
|
197
|
+
Scan for hardcoded secrets:
|
|
198
|
+
|
|
199
|
+
```javascript
|
|
200
|
+
const API_KEY = 'sk-12345678901234567890';
|
|
201
|
+
const DB_PASSWORD = 'admin123';
|
|
202
|
+
const JWT_SECRET = 'my-secret-key-do-not-share';
|
|
203
|
+
|
|
204
|
+
const credentials = {
|
|
205
|
+
username: 'admin',
|
|
206
|
+
password: 'P@ssw0rd123'
|
|
207
|
+
};
|
|
208
|
+
```
|
|
209
|
+
|
|
210
|
+
FINDINGS:
|
|
211
|
+
1. API_KEY: Hardcoded - CRITICAL
|
|
212
|
+
2. DB_PASSWORD: Hardcoded - CRITICAL
|
|
213
|
+
3. JWT_SECRET: Hardcoded - CRITICAL
|
|
214
|
+
4. Credentials object: Hardcoded password - CRITICAL
|
|
215
|
+
|
|
216
|
+
Fix: Move to environment variables, use vault
|
|
217
|
+
context:
|
|
218
|
+
scan_type: "secrets"
|
|
219
|
+
secret_patterns: "all"
|
|
220
|
+
|
|
221
|
+
expected_output:
|
|
222
|
+
must_contain:
|
|
223
|
+
- "secret"
|
|
224
|
+
- "hardcoded"
|
|
225
|
+
- "environment"
|
|
226
|
+
- "credentials"
|
|
227
|
+
must_not_contain:
|
|
228
|
+
- "ok"
|
|
229
|
+
- "no secrets"
|
|
230
|
+
severity_classification: critical
|
|
231
|
+
|
|
232
|
+
validation:
|
|
233
|
+
schema_check: true
|
|
234
|
+
keyword_match_threshold: 0.8
|
|
235
|
+
reasoning_quality_min: 0.75
|
|
236
|
+
|
|
237
|
+
# ---------------------------------------------------------------------------
|
|
238
|
+
# CATEGORY: Dependency Scanning
|
|
239
|
+
# ---------------------------------------------------------------------------
|
|
240
|
+
|
|
241
|
+
- id: tc004_dependency_vulnerability_check
|
|
242
|
+
description: "Detect known vulnerabilities in dependencies"
|
|
243
|
+
category: dependencies
|
|
244
|
+
priority: critical
|
|
245
|
+
|
|
246
|
+
input:
|
|
247
|
+
prompt: |
|
|
248
|
+
Scan dependencies for vulnerabilities:
|
|
249
|
+
|
|
250
|
+
package.json:
|
|
251
|
+
- lodash@4.17.15 (outdated)
|
|
252
|
+
- express@4.16.0 (vulnerable)
|
|
253
|
+
- moment@2.24.0 (has CVEs)
|
|
254
|
+
- axios@0.18.1 (vulnerable)
|
|
255
|
+
|
|
256
|
+
VULNERABLE PACKAGES:
|
|
257
|
+
1. express@4.16.0: CVE-2018-16487 (HIGH)
|
|
258
|
+
2. axios@0.18.1: CVE-2020-28168 (HIGH)
|
|
259
|
+
3. lodash@4.17.15: CVE-2021-23337 (MEDIUM)
|
|
260
|
+
4. moment@2.24.0: Regular Expression DoS (MEDIUM)
|
|
261
|
+
|
|
262
|
+
Action: Update to latest versions
|
|
263
|
+
context:
|
|
264
|
+
scan_scope: "package.json"
|
|
265
|
+
include_cves: true
|
|
266
|
+
|
|
267
|
+
expected_output:
|
|
268
|
+
must_contain:
|
|
269
|
+
- "vulnerable"
|
|
270
|
+
- "CVE"
|
|
271
|
+
- "dependency"
|
|
272
|
+
- "update"
|
|
273
|
+
must_not_contain:
|
|
274
|
+
- "no vulnerabilities"
|
|
275
|
+
- "all ok"
|
|
276
|
+
severity_classification: critical
|
|
277
|
+
|
|
278
|
+
validation:
|
|
279
|
+
schema_check: true
|
|
280
|
+
keyword_match_threshold: 0.8
|
|
281
|
+
|
|
282
|
+
- id: tc005_outdated_package_detection
|
|
283
|
+
description: "Identify outdated packages needing updates"
|
|
284
|
+
category: dependencies
|
|
285
|
+
priority: high
|
|
286
|
+
|
|
287
|
+
input:
|
|
288
|
+
prompt: |
|
|
289
|
+
Analyze package freshness:
|
|
290
|
+
- lodash@4.17.15 (current: 4.17.21) - 6 minor versions behind
|
|
291
|
+
- express@4.16.0 (current: 4.18.2) - 2 major versions behind
|
|
292
|
+
- jest@24.0.0 (current: 29.0.0) - 5 major versions behind
|
|
293
|
+
|
|
294
|
+
RECOMMENDATIONS:
|
|
295
|
+
1. CRITICAL: Update express (major version)
|
|
296
|
+
2. HIGH: Update jest (major version, breaking changes)
|
|
297
|
+
3. MEDIUM: Update lodash (minor version, backward compatible)
|
|
298
|
+
|
|
299
|
+
How would you prioritize updates?
|
|
300
|
+
context:
|
|
301
|
+
package_analysis: true
|
|
302
|
+
prioritization: true
|
|
303
|
+
|
|
304
|
+
expected_output:
|
|
305
|
+
must_contain:
|
|
306
|
+
- "outdated"
|
|
307
|
+
- "update"
|
|
308
|
+
- "version"
|
|
309
|
+
- "prioritize"
|
|
310
|
+
finding_count:
|
|
311
|
+
min: 1
|
|
312
|
+
|
|
313
|
+
validation:
|
|
314
|
+
schema_check: true
|
|
315
|
+
keyword_match_threshold: 0.75
|
|
316
|
+
|
|
317
|
+
# ---------------------------------------------------------------------------
|
|
318
|
+
# CATEGORY: OWASP Top 10
|
|
319
|
+
# ---------------------------------------------------------------------------
|
|
320
|
+
|
|
321
|
+
- id: tc006_owasp_comprehensive_check
|
|
322
|
+
description: "Check code against full OWASP Top 10 2021"
|
|
323
|
+
category: owasp
|
|
324
|
+
priority: critical
|
|
325
|
+
|
|
326
|
+
input:
|
|
327
|
+
prompt: |
|
|
328
|
+
Scan code for OWASP Top 10 2021 compliance:
|
|
329
|
+
|
|
330
|
+
A01: Broken Access Control
|
|
331
|
+
- Check: Authorization on endpoints
|
|
332
|
+
- Status: FOUND - no authorization check on /admin
|
|
333
|
+
|
|
334
|
+
A02: Cryptographic Failures
|
|
335
|
+
- Check: Weak encryption, plaintext passwords
|
|
336
|
+
- Status: FOUND - passwords stored plaintext
|
|
337
|
+
|
|
338
|
+
A03: Injection (SQL, NoSQL, Command, XSS, LDAP)
|
|
339
|
+
- Check: SQL injection, XSS
|
|
340
|
+
- Status: FOUND - SQL injection vulnerability
|
|
341
|
+
|
|
342
|
+
A07: Authentication Failures
|
|
343
|
+
- Check: Weak passwords, session management
|
|
344
|
+
- Status: OK - using bcrypt and secure sessions
|
|
345
|
+
|
|
346
|
+
A06: Vulnerable Components
|
|
347
|
+
- Check: Known CVEs in dependencies
|
|
348
|
+
- Status: FOUND - 3 vulnerable packages
|
|
349
|
+
|
|
350
|
+
Other categories: OK
|
|
351
|
+
|
|
352
|
+
SUMMARY: 3 critical issues, 2 must fix immediately
|
|
353
|
+
context:
|
|
354
|
+
standard: "owasp-2021"
|
|
355
|
+
categories: "all"
|
|
356
|
+
include_status: true
|
|
357
|
+
|
|
358
|
+
expected_output:
|
|
359
|
+
must_contain:
|
|
360
|
+
- "OWASP"
|
|
361
|
+
- "A01"
|
|
362
|
+
- "A03"
|
|
363
|
+
- "critical"
|
|
364
|
+
- "vulnerability"
|
|
365
|
+
must_not_contain:
|
|
366
|
+
- "no issues"
|
|
367
|
+
- "compliant"
|
|
368
|
+
severity_classification: critical
|
|
369
|
+
|
|
370
|
+
validation:
|
|
371
|
+
schema_check: true
|
|
372
|
+
keyword_match_threshold: 0.8
|
|
373
|
+
reasoning_quality_min: 0.75
|
|
374
|
+
|
|
375
|
+
# ---------------------------------------------------------------------------
|
|
376
|
+
# CATEGORY: Compliance Auditing
|
|
377
|
+
# ---------------------------------------------------------------------------
|
|
378
|
+
|
|
379
|
+
- id: tc007_soc2_compliance_audit
|
|
380
|
+
description: "Audit code for SOC2 compliance"
|
|
381
|
+
category: compliance
|
|
382
|
+
priority: critical
|
|
383
|
+
|
|
384
|
+
input:
|
|
385
|
+
prompt: |
|
|
386
|
+
Audit SOC2 compliance requirements:
|
|
387
|
+
|
|
388
|
+
SECURITY:
|
|
389
|
+
- Access control: PARTIAL (missing admin endpoint protection)
|
|
390
|
+
- Encryption: OK (TLS in transit, AES at rest)
|
|
391
|
+
- Secret management: FAIL (hardcoded secrets)
|
|
392
|
+
- Monitoring: OK (logs captured)
|
|
393
|
+
|
|
394
|
+
AVAILABILITY:
|
|
395
|
+
- Error handling: OK
|
|
396
|
+
- Backup: OK
|
|
397
|
+
- Disaster recovery: PARTIAL (needs testing)
|
|
398
|
+
|
|
399
|
+
PROCESSING INTEGRITY:
|
|
400
|
+
- Input validation: FAIL (SQL injection found)
|
|
401
|
+
- Error handling: OK
|
|
402
|
+
- Audit logging: PARTIAL (some endpoints missing)
|
|
403
|
+
|
|
404
|
+
CONFIDENTIALITY:
|
|
405
|
+
- PII protection: FAIL (no encryption for user data)
|
|
406
|
+
- Access controls: PARTIAL
|
|
407
|
+
|
|
408
|
+
PRIVACY:
|
|
409
|
+
- Data retention: PARTIAL (no policy)
|
|
410
|
+
- User consent: OK
|
|
411
|
+
|
|
412
|
+
COMPLIANCE: 45% - FAIL (multiple critical gaps)
|
|
413
|
+
context:
|
|
414
|
+
standard: "SOC2"
|
|
415
|
+
categories: "all"
|
|
416
|
+
remediation: true
|
|
417
|
+
|
|
418
|
+
expected_output:
|
|
419
|
+
must_contain:
|
|
420
|
+
- "SOC2"
|
|
421
|
+
- "compliance"
|
|
422
|
+
- "fail"
|
|
423
|
+
- "gap"
|
|
424
|
+
- "remediation"
|
|
425
|
+
must_not_contain:
|
|
426
|
+
- "compliant"
|
|
427
|
+
- "pass"
|
|
428
|
+
severity_classification: critical
|
|
429
|
+
|
|
430
|
+
validation:
|
|
431
|
+
schema_check: true
|
|
432
|
+
keyword_match_threshold: 0.8
|
|
433
|
+
|
|
434
|
+
- id: tc008_gdpr_compliance_check
|
|
435
|
+
description: "Verify GDPR compliance for user data handling"
|
|
436
|
+
category: compliance
|
|
437
|
+
priority: critical
|
|
438
|
+
|
|
439
|
+
input:
|
|
440
|
+
prompt: |
|
|
441
|
+
Check GDPR compliance:
|
|
442
|
+
|
|
443
|
+
REQUIREMENTS:
|
|
444
|
+
1. User consent documented: FAIL (no consent mechanism)
|
|
445
|
+
2. Privacy policy: OK (published)
|
|
446
|
+
3. Data retention policy: FAIL (no policy defined)
|
|
447
|
+
4. Right to deletion: PARTIAL (can delete but full audit trail)
|
|
448
|
+
5. Data portability: FAIL (no export functionality)
|
|
449
|
+
6. Breach notification: PARTIAL (process exists, 30-day compliance ok)
|
|
450
|
+
7. DPA in place: OK (processor agreements signed)
|
|
451
|
+
8. Privacy by design: FAIL (not implemented)
|
|
452
|
+
|
|
453
|
+
COMPLIANCE: 38% - FAIL
|
|
454
|
+
|
|
455
|
+
What are the top 3 fixes?
|
|
456
|
+
context:
|
|
457
|
+
standard: "GDPR"
|
|
458
|
+
user_data_handling: true
|
|
459
|
+
|
|
460
|
+
expected_output:
|
|
461
|
+
must_contain:
|
|
462
|
+
- "GDPR"
|
|
463
|
+
- "compliance"
|
|
464
|
+
- "consent"
|
|
465
|
+
- "deletion"
|
|
466
|
+
- "fail"
|
|
467
|
+
severity_classification: critical
|
|
468
|
+
|
|
469
|
+
validation:
|
|
470
|
+
schema_check: true
|
|
471
|
+
keyword_match_threshold: 0.8
|
|
472
|
+
|
|
473
|
+
# ---------------------------------------------------------------------------
|
|
474
|
+
# CATEGORY: Security Gate
|
|
475
|
+
# ---------------------------------------------------------------------------
|
|
476
|
+
|
|
477
|
+
- id: tc009_security_gate_enforcement
|
|
478
|
+
description: "Enforce security gates in CI/CD pipeline"
|
|
479
|
+
category: gates
|
|
480
|
+
priority: critical
|
|
481
|
+
|
|
482
|
+
input:
|
|
483
|
+
prompt: |
|
|
484
|
+
Define security gates for merge:
|
|
485
|
+
1. Critical vulnerabilities: 0 required
|
|
486
|
+
2. High vulnerabilities: <= 2
|
|
487
|
+
3. Known CVEs in dependencies: 0
|
|
488
|
+
4. Hardcoded secrets: 0
|
|
489
|
+
5. OWASP blocking issues: 0
|
|
490
|
+
|
|
491
|
+
SCAN RESULTS:
|
|
492
|
+
- Critical: 0 ✓
|
|
493
|
+
- High: 1 (express vulnerability) ✗ BLOCK
|
|
494
|
+
- CVEs: 3 ✗ BLOCK
|
|
495
|
+
- Secrets: 1 hardcoded API key ✗ BLOCK
|
|
496
|
+
- OWASP: 2 issues ✗ BLOCK
|
|
497
|
+
|
|
498
|
+
VERDICT: BLOCK MERGE - fail security gates
|
|
499
|
+
|
|
500
|
+
How would you help fix violations?
|
|
501
|
+
context:
|
|
502
|
+
blocking: true
|
|
503
|
+
remediation_guidance: true
|
|
504
|
+
|
|
505
|
+
expected_output:
|
|
506
|
+
must_contain:
|
|
507
|
+
- "security"
|
|
508
|
+
- "gate"
|
|
509
|
+
- "block"
|
|
510
|
+
- "merge"
|
|
511
|
+
must_not_contain:
|
|
512
|
+
- "approve"
|
|
513
|
+
- "pass"
|
|
514
|
+
severity_classification: critical
|
|
515
|
+
|
|
516
|
+
validation:
|
|
517
|
+
schema_check: true
|
|
518
|
+
keyword_match_threshold: 0.8
|
|
519
|
+
|
|
520
|
+
# ---------------------------------------------------------------------------
|
|
521
|
+
# CATEGORY: Negative Tests
|
|
522
|
+
# ---------------------------------------------------------------------------
|
|
523
|
+
|
|
524
|
+
- id: tc010_security_remediation_guidance
|
|
525
|
+
description: "Provide actionable remediation for security findings"
|
|
526
|
+
category: negative
|
|
527
|
+
priority: high
|
|
528
|
+
|
|
529
|
+
input:
|
|
530
|
+
prompt: |
|
|
531
|
+
For each security issue, provide remediation:
|
|
532
|
+
|
|
533
|
+
ISSUE 1: SQL Injection in getUserById()
|
|
534
|
+
REMEDIATION:
|
|
535
|
+
```javascript
|
|
536
|
+
// BEFORE (vulnerable)
|
|
537
|
+
const query = `SELECT * FROM users WHERE id = ${userId}`;
|
|
538
|
+
|
|
539
|
+
// AFTER (safe)
|
|
540
|
+
const query = 'SELECT * FROM users WHERE id = ?';
|
|
541
|
+
db.query(query, [userId], callback);
|
|
542
|
+
```
|
|
543
|
+
|
|
544
|
+
ISSUE 2: Hardcoded API Key
|
|
545
|
+
REMEDIATION:
|
|
546
|
+
// BEFORE
|
|
547
|
+
const API_KEY = 'sk-123456789';
|
|
548
|
+
|
|
549
|
+
// AFTER
|
|
550
|
+
const API_KEY = process.env.STRIPE_API_KEY;
|
|
551
|
+
// Set in .env or secrets manager
|
|
552
|
+
|
|
553
|
+
Generate clear fix for each issue found.
|
|
554
|
+
context:
|
|
555
|
+
issue_remediation: true
|
|
556
|
+
code_examples: true
|
|
557
|
+
|
|
558
|
+
expected_output:
|
|
559
|
+
must_contain:
|
|
560
|
+
- "remediation"
|
|
561
|
+
- "before"
|
|
562
|
+
- "after"
|
|
563
|
+
- "fix"
|
|
564
|
+
finding_count:
|
|
565
|
+
min: 1
|
|
566
|
+
|
|
567
|
+
validation:
|
|
568
|
+
schema_check: true
|
|
569
|
+
allow_partial: true
|
|
570
|
+
|
|
571
|
+
# =============================================================================
|
|
572
|
+
# SUCCESS CRITERIA
|
|
573
|
+
# =============================================================================
|
|
574
|
+
|
|
575
|
+
success_criteria:
|
|
576
|
+
pass_rate: 0.8
|
|
577
|
+
critical_pass_rate: 1.0
|
|
578
|
+
avg_reasoning_quality: 0.75
|
|
579
|
+
max_execution_time_ms: 300000
|
|
580
|
+
cross_model_variance: 0.15
|
|
581
|
+
|
|
582
|
+
# =============================================================================
|
|
583
|
+
# METADATA
|
|
584
|
+
# =============================================================================
|
|
585
|
+
|
|
586
|
+
metadata:
|
|
587
|
+
author: "qe-security-auditor"
|
|
588
|
+
created: "2026-02-02"
|
|
589
|
+
last_updated: "2026-02-02"
|
|
590
|
+
coverage_target: >
|
|
591
|
+
SAST scanning for SQL injection, XSS, hardcoded secrets, path traversal,
|
|
592
|
+
insecure crypto, dependency vulnerability analysis with CVE detection,
|
|
593
|
+
OWASP Top 10 2021 comprehensive checking, compliance auditing for SOC2/GDPR,
|
|
594
|
+
security gate enforcement with blocking criteria, and detailed remediation
|
|
595
|
+
guidance with code examples for all identified vulnerabilities.
|