agentic-qe 3.7.9 → 3.7.11

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (401) hide show
  1. package/.claude/skills/.validation/README.md +111 -111
  2. package/.claude/skills/.validation/examples/chaos-engineering-output.example.json +530 -530
  3. package/.claude/skills/.validation/examples/performance-testing-output.example.json +252 -252
  4. package/.claude/skills/.validation/examples/security-testing-output.example.json +413 -413
  5. package/.claude/skills/.validation/examples/testability-scoring-output.example.json +350 -350
  6. package/.claude/skills/.validation/schemas/skill-eval.schema.json +462 -462
  7. package/.claude/skills/.validation/schemas/skill-frontmatter.schema.json +341 -341
  8. package/.claude/skills/.validation/schemas/skill-output-meta.schema.json +199 -199
  9. package/.claude/skills/.validation/schemas/skill-output.template.json +610 -610
  10. package/.claude/skills/.validation/skill-validation-mcp-integration.md +250 -250
  11. package/.claude/skills/.validation/templates/eval.template.yaml +366 -366
  12. package/.claude/skills/.validation/templates/schemas/output.json +145 -145
  13. package/.claude/skills/.validation/templates/security-testing-eval.template.yaml +725 -725
  14. package/.claude/skills/.validation/templates/skill-frontmatter.example.yaml +225 -225
  15. package/.claude/skills/.validation/test-data/invalid-output.json +5 -5
  16. package/.claude/skills/.validation/test-data/minimal-output.json +9 -9
  17. package/.claude/skills/.validation/test-data/sample-output.json +73 -73
  18. package/.claude/skills/a11y-ally/evals/a11y-ally.yaml +376 -376
  19. package/.claude/skills/a11y-ally/schemas/output.json +549 -549
  20. package/.claude/skills/accessibility-testing/evals/accessibility-testing.yaml +719 -719
  21. package/.claude/skills/accessibility-testing/schemas/output.json +776 -776
  22. package/.claude/skills/accessibility-testing/test-data/sample-output.json +191 -191
  23. package/.claude/skills/agentic-quality-engineering/schemas/output.json +577 -577
  24. package/.claude/skills/api-testing-patterns/evals/api-testing-patterns.yaml +696 -696
  25. package/.claude/skills/api-testing-patterns/schemas/output.json +845 -845
  26. package/.claude/skills/aqe-v2-v3-migration/schemas/output.json +513 -513
  27. package/.claude/skills/brutal-honesty-review/schemas/output.json +291 -291
  28. package/.claude/skills/bug-reporting-excellence/schemas/output.json +288 -288
  29. package/.claude/skills/chaos-engineering-resilience/evals/chaos-engineering-resilience.yaml +761 -761
  30. package/.claude/skills/chaos-engineering-resilience/schemas/output.json +1205 -1205
  31. package/.claude/skills/cicd-pipeline-qe-orchestrator/evals/cicd-pipeline-qe-orchestrator.yaml +157 -157
  32. package/.claude/skills/cicd-pipeline-qe-orchestrator/schemas/output.json +542 -542
  33. package/.claude/skills/code-review-quality/schemas/output.json +264 -264
  34. package/.claude/skills/compatibility-testing/evals/compatibility-testing.yaml +410 -410
  35. package/.claude/skills/compatibility-testing/schemas/output.json +551 -551
  36. package/.claude/skills/compliance-testing/evals/compliance-testing.yaml +1107 -1107
  37. package/.claude/skills/compliance-testing/schemas/output.json +845 -845
  38. package/.claude/skills/consultancy-practices/schemas/output.json +282 -282
  39. package/.claude/skills/contract-testing/evals/contract-testing.yaml +748 -748
  40. package/.claude/skills/contract-testing/schemas/output.json +638 -638
  41. package/.claude/skills/database-testing/evals/database-testing.yaml +968 -968
  42. package/.claude/skills/database-testing/schemas/output.json +1446 -1446
  43. package/.claude/skills/debug-loop/SKILL.md +61 -61
  44. package/.claude/skills/enterprise-integration-testing/SKILL.md +735 -735
  45. package/.claude/skills/enterprise-integration-testing/evals/enterprise-integration-testing.yaml +158 -158
  46. package/.claude/skills/enterprise-integration-testing/schemas/output.json +74 -74
  47. package/.claude/skills/enterprise-integration-testing/scripts/validate-config.json +25 -25
  48. package/.claude/skills/iterative-loop/SKILL.md +371 -371
  49. package/.claude/skills/localization-testing/evals/localization-testing.yaml +544 -544
  50. package/.claude/skills/localization-testing/schemas/output.json +325 -325
  51. package/.claude/skills/middleware-testing-patterns/SKILL.md +798 -798
  52. package/.claude/skills/middleware-testing-patterns/evals/middleware-testing-patterns.yaml +153 -153
  53. package/.claude/skills/middleware-testing-patterns/schemas/output.json +58 -58
  54. package/.claude/skills/middleware-testing-patterns/scripts/validate-config.json +25 -25
  55. package/.claude/skills/mobile-testing/evals/mobile-testing.yaml +537 -537
  56. package/.claude/skills/mobile-testing/schemas/output.json +318 -318
  57. package/.claude/skills/mutation-testing/evals/mutation-testing.yaml +652 -652
  58. package/.claude/skills/mutation-testing/schemas/output.json +707 -707
  59. package/.claude/skills/mutation-testing/test-data/sample-output.json +295 -295
  60. package/.claude/skills/n8n-expression-testing/evals/n8n-expression-testing.yaml +450 -450
  61. package/.claude/skills/n8n-expression-testing/schemas/output.json +369 -369
  62. package/.claude/skills/n8n-integration-testing-patterns/evals/n8n-integration-testing-patterns.yaml +522 -522
  63. package/.claude/skills/n8n-integration-testing-patterns/schemas/output.json +291 -291
  64. package/.claude/skills/n8n-security-testing/evals/n8n-security-testing.yaml +493 -493
  65. package/.claude/skills/n8n-security-testing/schemas/output.json +293 -293
  66. package/.claude/skills/n8n-trigger-testing-strategies/evals/n8n-trigger-testing-strategies.yaml +500 -500
  67. package/.claude/skills/n8n-trigger-testing-strategies/schemas/output.json +295 -295
  68. package/.claude/skills/n8n-workflow-testing-fundamentals/evals/n8n-workflow-testing-fundamentals.yaml +497 -497
  69. package/.claude/skills/n8n-workflow-testing-fundamentals/schemas/output.json +254 -254
  70. package/.claude/skills/observability-testing-patterns/SKILL.md +930 -930
  71. package/.claude/skills/observability-testing-patterns/evals/observability-testing-patterns.yaml +157 -157
  72. package/.claude/skills/observability-testing-patterns/schemas/output.json +58 -58
  73. package/.claude/skills/observability-testing-patterns/scripts/validate-config.json +25 -25
  74. package/.claude/skills/pentest-validation/SKILL.md +268 -268
  75. package/.claude/skills/pentest-validation/evals/pentest-validation.yaml +708 -708
  76. package/.claude/skills/pentest-validation/schemas/output.json +281 -281
  77. package/.claude/skills/performance-analysis/evals/performance-analysis.yaml +144 -144
  78. package/.claude/skills/performance-analysis/schemas/output.json +588 -588
  79. package/.claude/skills/performance-testing/evals/performance-testing.yaml +772 -772
  80. package/.claude/skills/performance-testing/schemas/output.json +1184 -1184
  81. package/.claude/skills/pr-review/SKILL.md +61 -61
  82. package/.claude/skills/qcsd-cicd-swarm/SKILL.md +2206 -2206
  83. package/.claude/skills/qcsd-cicd-swarm/evals/qcsd-cicd-swarm.yaml +211 -211
  84. package/.claude/skills/qcsd-cicd-swarm/schemas/output.json +86 -86
  85. package/.claude/skills/qcsd-cicd-swarm/scripts/validate-config.json +30 -30
  86. package/.claude/skills/qcsd-development-swarm/SKILL.md +2154 -2154
  87. package/.claude/skills/qcsd-development-swarm/evals/qcsd-development-swarm.yaml +162 -162
  88. package/.claude/skills/qcsd-development-swarm/schemas/output.json +72 -72
  89. package/.claude/skills/qcsd-development-swarm/scripts/validate-config.json +25 -25
  90. package/.claude/skills/qcsd-ideation-swarm/evals/qcsd-ideation-swarm.yaml +138 -138
  91. package/.claude/skills/qcsd-ideation-swarm/schemas/output.json +568 -568
  92. package/.claude/skills/qcsd-production-swarm/SKILL.md +2781 -2781
  93. package/.claude/skills/qcsd-production-swarm/evals/qcsd-production-swarm.yaml +246 -246
  94. package/.claude/skills/qcsd-production-swarm/schemas/output.json +505 -505
  95. package/.claude/skills/qcsd-production-swarm/scripts/validate-config.json +25 -25
  96. package/.claude/skills/qe-chaos-resilience/evals/qe-chaos-resilience.yaml +443 -443
  97. package/.claude/skills/qe-chaos-resilience/schemas/output.json +314 -314
  98. package/.claude/skills/qe-code-intelligence/evals/qe-code-intelligence.yaml +459 -459
  99. package/.claude/skills/qe-code-intelligence/schemas/output.json +315 -315
  100. package/.claude/skills/qe-contract-testing/evals/qe-contract-testing.yaml +513 -513
  101. package/.claude/skills/qe-contract-testing/schemas/output.json +295 -295
  102. package/.claude/skills/qe-coverage-analysis/evals/qe-coverage-analysis.yaml +494 -494
  103. package/.claude/skills/qe-coverage-analysis/schemas/output.json +286 -286
  104. package/.claude/skills/qe-defect-intelligence/evals/qe-defect-intelligence.yaml +511 -511
  105. package/.claude/skills/qe-defect-intelligence/schemas/output.json +283 -283
  106. package/.claude/skills/qe-iterative-loop/schemas/output.json +264 -264
  107. package/.claude/skills/qe-learning-optimization/evals/qe-learning-optimization.yaml +144 -144
  108. package/.claude/skills/qe-learning-optimization/schemas/output.json +288 -288
  109. package/.claude/skills/qe-quality-assessment/evals/qe-quality-assessment.yaml +506 -506
  110. package/.claude/skills/qe-quality-assessment/schemas/output.json +550 -550
  111. package/.claude/skills/qe-requirements-validation/evals/qe-requirements-validation.yaml +598 -598
  112. package/.claude/skills/qe-requirements-validation/schemas/output.json +587 -587
  113. package/.claude/skills/qe-security-compliance/evals/qe-security-compliance.yaml +595 -595
  114. package/.claude/skills/qe-security-compliance/schemas/output.json +498 -498
  115. package/.claude/skills/qe-test-execution/evals/qe-test-execution.yaml +607 -607
  116. package/.claude/skills/qe-test-execution/schemas/output.json +529 -529
  117. package/.claude/skills/qe-test-generation/evals/qe-test-generation.yaml +148 -148
  118. package/.claude/skills/qe-test-generation/schemas/output.json +439 -439
  119. package/.claude/skills/qe-visual-accessibility/evals/qe-visual-accessibility.yaml +142 -142
  120. package/.claude/skills/qe-visual-accessibility/schemas/output.json +491 -491
  121. package/.claude/skills/quality-metrics/evals/quality-metrics.yaml +494 -494
  122. package/.claude/skills/quality-metrics/schemas/output.json +403 -403
  123. package/.claude/skills/refactoring-patterns/schemas/output.json +475 -475
  124. package/.claude/skills/regression-testing/evals/regression-testing.yaml +504 -504
  125. package/.claude/skills/regression-testing/schemas/output.json +311 -311
  126. package/.claude/skills/release/SKILL.md +347 -347
  127. package/.claude/skills/risk-based-testing/evals/risk-based-testing.yaml +141 -141
  128. package/.claude/skills/risk-based-testing/schemas/output.json +480 -480
  129. package/.claude/skills/security-testing/evals/security-testing.yaml +789 -789
  130. package/.claude/skills/security-testing/schemas/output.json +879 -879
  131. package/.claude/skills/security-visual-testing/evals/security-visual-testing.yaml +163 -163
  132. package/.claude/skills/security-visual-testing/schemas/output.json +486 -486
  133. package/.claude/skills/sfdipot-product-factors/SKILL.md +239 -239
  134. package/.claude/skills/sherlock-review/schemas/output.json +297 -297
  135. package/.claude/skills/shift-left-testing/evals/shift-left-testing.yaml +145 -145
  136. package/.claude/skills/shift-left-testing/schemas/output.json +459 -459
  137. package/.claude/skills/shift-right-testing/evals/shift-right-testing.yaml +147 -147
  138. package/.claude/skills/shift-right-testing/schemas/output.json +418 -418
  139. package/.claude/skills/skills-manifest.json +1 -1
  140. package/.claude/skills/tdd-london-chicago/schemas/output.json +444 -444
  141. package/.claude/skills/technical-writing/schemas/output.json +268 -268
  142. package/.claude/skills/test-automation-strategy/evals/test-automation-strategy.yaml +148 -148
  143. package/.claude/skills/test-automation-strategy/schemas/output.json +444 -444
  144. package/.claude/skills/test-data-management/evals/test-data-management.yaml +504 -504
  145. package/.claude/skills/test-data-management/schemas/output.json +284 -284
  146. package/.claude/skills/test-design-techniques/evals/test-design-techniques.yaml +142 -142
  147. package/.claude/skills/test-design-techniques/schemas/output.json +295 -295
  148. package/.claude/skills/test-environment-management/schemas/output.json +310 -310
  149. package/.claude/skills/test-idea-rewriting/SKILL.md +229 -229
  150. package/.claude/skills/test-reporting-analytics/evals/test-reporting-analytics.yaml +155 -155
  151. package/.claude/skills/test-reporting-analytics/schemas/output.json +329 -329
  152. package/.claude/skills/testability-scoring/evals/testability-scoring.yaml +814 -814
  153. package/.claude/skills/testability-scoring/resources/templates/config.template.js +84 -84
  154. package/.claude/skills/testability-scoring/schemas/output.json +606 -606
  155. package/.claude/skills/testability-scoring/scripts/generate-html-report.js +1007 -1007
  156. package/.claude/skills/verification-quality/evals/verification-quality.yaml +150 -150
  157. package/.claude/skills/verification-quality/schemas/output.json +432 -432
  158. package/.claude/skills/visual-testing-advanced/evals/visual-testing-advanced.yaml +154 -154
  159. package/.claude/skills/visual-testing-advanced/schemas/output.json +294 -294
  160. package/.claude/skills/wms-testing-patterns/evals/wms-testing-patterns.yaml +165 -165
  161. package/.claude/skills/wms-testing-patterns/schemas/output.json +150 -150
  162. package/.claude/skills/wms-testing-patterns/scripts/validate-config.json +51 -51
  163. package/CHANGELOG.md +36 -0
  164. package/README.md +171 -901
  165. package/assets/agents/v3/helpers/quality-criteria/evidence-classification.md +116 -116
  166. package/assets/agents/v3/helpers/quality-criteria/htsm-categories.md +139 -139
  167. package/assets/governance/constitution.md +202 -202
  168. package/assets/governance/shards/chaos-resilience.shard.md +221 -221
  169. package/assets/governance/shards/code-intelligence.shard.md +178 -178
  170. package/assets/governance/shards/contract-testing.shard.md +206 -206
  171. package/assets/governance/shards/coverage-analysis.shard.md +146 -146
  172. package/assets/governance/shards/defect-intelligence.shard.md +182 -182
  173. package/assets/governance/shards/learning-optimization.shard.md +248 -248
  174. package/assets/governance/shards/quality-assessment.shard.md +165 -165
  175. package/assets/governance/shards/requirements-validation.shard.md +177 -177
  176. package/assets/governance/shards/security-compliance.shard.md +196 -196
  177. package/assets/governance/shards/test-execution.shard.md +156 -156
  178. package/assets/governance/shards/test-generation.shard.md +128 -128
  179. package/assets/governance/shards/visual-accessibility.shard.md +209 -209
  180. package/assets/hooks/cross-phase-memory.yaml +253 -253
  181. package/assets/patterns/adr-051-booster-patterns.json +78 -78
  182. package/assets/patterns/adr-051-embedding-patterns.json +147 -147
  183. package/assets/patterns/adr-051-integration-summary.json +62 -62
  184. package/assets/patterns/adr-051-reasoning-patterns.json +166 -166
  185. package/assets/patterns/adr-051-router-patterns.json +113 -113
  186. package/assets/patterns/index.json +136 -136
  187. package/assets/skills/.validation/README.md +111 -111
  188. package/assets/skills/.validation/examples/chaos-engineering-output.example.json +530 -530
  189. package/assets/skills/.validation/examples/performance-testing-output.example.json +252 -252
  190. package/assets/skills/.validation/examples/security-testing-output.example.json +413 -413
  191. package/assets/skills/.validation/examples/testability-scoring-output.example.json +350 -350
  192. package/assets/skills/.validation/schemas/skill-eval.schema.json +462 -462
  193. package/assets/skills/.validation/schemas/skill-frontmatter.schema.json +341 -341
  194. package/assets/skills/.validation/schemas/skill-output-meta.schema.json +199 -199
  195. package/assets/skills/.validation/schemas/skill-output.template.json +610 -610
  196. package/assets/skills/.validation/skill-validation-mcp-integration.md +250 -250
  197. package/assets/skills/.validation/templates/eval.template.yaml +366 -366
  198. package/assets/skills/.validation/templates/schemas/output.json +145 -145
  199. package/assets/skills/.validation/templates/security-testing-eval.template.yaml +725 -725
  200. package/assets/skills/.validation/templates/skill-frontmatter.example.yaml +225 -225
  201. package/assets/skills/.validation/test-data/invalid-output.json +5 -5
  202. package/assets/skills/.validation/test-data/minimal-output.json +9 -9
  203. package/assets/skills/.validation/test-data/sample-output.json +73 -73
  204. package/assets/skills/a11y-ally/evals/a11y-ally.yaml +376 -376
  205. package/assets/skills/a11y-ally/schemas/output.json +549 -549
  206. package/assets/skills/accessibility-testing/evals/accessibility-testing.yaml +719 -719
  207. package/assets/skills/accessibility-testing/schemas/output.json +776 -776
  208. package/assets/skills/accessibility-testing/test-data/sample-output.json +191 -191
  209. package/assets/skills/agentic-quality-engineering/schemas/output.json +577 -577
  210. package/assets/skills/api-testing-patterns/evals/api-testing-patterns.yaml +696 -696
  211. package/assets/skills/api-testing-patterns/schemas/output.json +845 -845
  212. package/assets/skills/aqe-v2-v3-migration/schemas/output.json +513 -513
  213. package/assets/skills/brutal-honesty-review/schemas/output.json +291 -291
  214. package/assets/skills/bug-reporting-excellence/schemas/output.json +288 -288
  215. package/assets/skills/chaos-engineering-resilience/evals/chaos-engineering-resilience.yaml +761 -761
  216. package/assets/skills/chaos-engineering-resilience/schemas/output.json +1205 -1205
  217. package/assets/skills/cicd-pipeline-qe-orchestrator/evals/cicd-pipeline-qe-orchestrator.yaml +157 -157
  218. package/assets/skills/cicd-pipeline-qe-orchestrator/schemas/output.json +542 -542
  219. package/assets/skills/code-review-quality/schemas/output.json +264 -264
  220. package/assets/skills/compatibility-testing/evals/compatibility-testing.yaml +410 -410
  221. package/assets/skills/compatibility-testing/schemas/output.json +551 -551
  222. package/assets/skills/compliance-testing/evals/compliance-testing.yaml +1107 -1107
  223. package/assets/skills/compliance-testing/schemas/output.json +845 -845
  224. package/assets/skills/consultancy-practices/schemas/output.json +282 -282
  225. package/assets/skills/contract-testing/evals/contract-testing.yaml +748 -748
  226. package/assets/skills/contract-testing/schemas/output.json +638 -638
  227. package/assets/skills/database-testing/evals/database-testing.yaml +968 -968
  228. package/assets/skills/database-testing/schemas/output.json +1446 -1446
  229. package/assets/skills/debug-loop/SKILL.md +61 -61
  230. package/assets/skills/enterprise-integration-testing/SKILL.md +735 -735
  231. package/assets/skills/enterprise-integration-testing/evals/enterprise-integration-testing.yaml +158 -158
  232. package/assets/skills/enterprise-integration-testing/schemas/output.json +74 -74
  233. package/assets/skills/enterprise-integration-testing/scripts/validate-config.json +25 -25
  234. package/assets/skills/localization-testing/evals/localization-testing.yaml +544 -544
  235. package/assets/skills/localization-testing/schemas/output.json +325 -325
  236. package/assets/skills/middleware-testing-patterns/SKILL.md +798 -798
  237. package/assets/skills/middleware-testing-patterns/evals/middleware-testing-patterns.yaml +153 -153
  238. package/assets/skills/middleware-testing-patterns/schemas/output.json +58 -58
  239. package/assets/skills/middleware-testing-patterns/scripts/validate-config.json +25 -25
  240. package/assets/skills/mobile-testing/evals/mobile-testing.yaml +537 -537
  241. package/assets/skills/mobile-testing/schemas/output.json +318 -318
  242. package/assets/skills/mutation-testing/evals/mutation-testing.yaml +652 -652
  243. package/assets/skills/mutation-testing/schemas/output.json +707 -707
  244. package/assets/skills/mutation-testing/test-data/sample-output.json +295 -295
  245. package/assets/skills/n8n-expression-testing/evals/n8n-expression-testing.yaml +450 -450
  246. package/assets/skills/n8n-expression-testing/schemas/output.json +369 -369
  247. package/assets/skills/n8n-integration-testing-patterns/evals/n8n-integration-testing-patterns.yaml +522 -522
  248. package/assets/skills/n8n-integration-testing-patterns/schemas/output.json +291 -291
  249. package/assets/skills/n8n-security-testing/evals/n8n-security-testing.yaml +493 -493
  250. package/assets/skills/n8n-security-testing/schemas/output.json +293 -293
  251. package/assets/skills/n8n-trigger-testing-strategies/evals/n8n-trigger-testing-strategies.yaml +500 -500
  252. package/assets/skills/n8n-trigger-testing-strategies/schemas/output.json +295 -295
  253. package/assets/skills/n8n-workflow-testing-fundamentals/evals/n8n-workflow-testing-fundamentals.yaml +497 -497
  254. package/assets/skills/n8n-workflow-testing-fundamentals/schemas/output.json +254 -254
  255. package/assets/skills/observability-testing-patterns/SKILL.md +930 -930
  256. package/assets/skills/observability-testing-patterns/evals/observability-testing-patterns.yaml +157 -157
  257. package/assets/skills/observability-testing-patterns/schemas/output.json +58 -58
  258. package/assets/skills/observability-testing-patterns/scripts/validate-config.json +25 -25
  259. package/assets/skills/pentest-validation/SKILL.md +268 -268
  260. package/assets/skills/pentest-validation/evals/pentest-validation.yaml +708 -708
  261. package/assets/skills/pentest-validation/schemas/output.json +281 -281
  262. package/assets/skills/performance-testing/evals/performance-testing.yaml +772 -772
  263. package/assets/skills/performance-testing/schemas/output.json +1184 -1184
  264. package/assets/skills/pr-review/SKILL.md +61 -61
  265. package/assets/skills/qcsd-cicd-swarm/SKILL.md +2206 -2206
  266. package/assets/skills/qcsd-cicd-swarm/evals/qcsd-cicd-swarm.yaml +211 -211
  267. package/assets/skills/qcsd-cicd-swarm/schemas/output.json +86 -86
  268. package/assets/skills/qcsd-cicd-swarm/scripts/validate-config.json +30 -30
  269. package/assets/skills/qcsd-development-swarm/SKILL.md +2154 -2154
  270. package/assets/skills/qcsd-development-swarm/evals/qcsd-development-swarm.yaml +162 -162
  271. package/assets/skills/qcsd-development-swarm/schemas/output.json +72 -72
  272. package/assets/skills/qcsd-development-swarm/scripts/validate-config.json +25 -25
  273. package/assets/skills/qcsd-ideation-swarm/evals/qcsd-ideation-swarm.yaml +138 -138
  274. package/assets/skills/qcsd-ideation-swarm/schemas/output.json +568 -568
  275. package/assets/skills/qcsd-production-swarm/SKILL.md +2781 -2781
  276. package/assets/skills/qcsd-production-swarm/evals/qcsd-production-swarm.yaml +246 -246
  277. package/assets/skills/qcsd-production-swarm/schemas/output.json +505 -505
  278. package/assets/skills/qcsd-production-swarm/scripts/validate-config.json +25 -25
  279. package/assets/skills/qe-chaos-resilience/evals/qe-chaos-resilience.yaml +443 -443
  280. package/assets/skills/qe-chaos-resilience/schemas/output.json +314 -314
  281. package/assets/skills/qe-code-intelligence/evals/qe-code-intelligence.yaml +459 -459
  282. package/assets/skills/qe-code-intelligence/schemas/output.json +315 -315
  283. package/assets/skills/qe-contract-testing/evals/qe-contract-testing.yaml +513 -513
  284. package/assets/skills/qe-contract-testing/schemas/output.json +295 -295
  285. package/assets/skills/qe-coverage-analysis/evals/qe-coverage-analysis.yaml +494 -494
  286. package/assets/skills/qe-coverage-analysis/schemas/output.json +286 -286
  287. package/assets/skills/qe-defect-intelligence/evals/qe-defect-intelligence.yaml +511 -511
  288. package/assets/skills/qe-defect-intelligence/schemas/output.json +283 -283
  289. package/assets/skills/qe-iterative-loop/schemas/output.json +264 -264
  290. package/assets/skills/qe-learning-optimization/evals/qe-learning-optimization.yaml +144 -144
  291. package/assets/skills/qe-learning-optimization/schemas/output.json +288 -288
  292. package/assets/skills/qe-quality-assessment/evals/qe-quality-assessment.yaml +506 -506
  293. package/assets/skills/qe-quality-assessment/schemas/output.json +550 -550
  294. package/assets/skills/qe-requirements-validation/evals/qe-requirements-validation.yaml +598 -598
  295. package/assets/skills/qe-requirements-validation/schemas/output.json +587 -587
  296. package/assets/skills/qe-security-compliance/evals/qe-security-compliance.yaml +595 -595
  297. package/assets/skills/qe-security-compliance/schemas/output.json +498 -498
  298. package/assets/skills/qe-test-execution/evals/qe-test-execution.yaml +607 -607
  299. package/assets/skills/qe-test-execution/schemas/output.json +529 -529
  300. package/assets/skills/qe-test-generation/evals/qe-test-generation.yaml +148 -148
  301. package/assets/skills/qe-test-generation/schemas/output.json +439 -439
  302. package/assets/skills/qe-visual-accessibility/evals/qe-visual-accessibility.yaml +142 -142
  303. package/assets/skills/qe-visual-accessibility/schemas/output.json +491 -491
  304. package/assets/skills/quality-metrics/evals/quality-metrics.yaml +494 -494
  305. package/assets/skills/quality-metrics/schemas/output.json +403 -403
  306. package/assets/skills/refactoring-patterns/schemas/output.json +475 -475
  307. package/assets/skills/regression-testing/evals/regression-testing.yaml +504 -504
  308. package/assets/skills/regression-testing/schemas/output.json +311 -311
  309. package/assets/skills/risk-based-testing/evals/risk-based-testing.yaml +141 -141
  310. package/assets/skills/risk-based-testing/schemas/output.json +480 -480
  311. package/assets/skills/security-testing/evals/security-testing.yaml +789 -789
  312. package/assets/skills/security-testing/schemas/output.json +879 -879
  313. package/assets/skills/security-visual-testing/evals/security-visual-testing.yaml +163 -163
  314. package/assets/skills/security-visual-testing/schemas/output.json +486 -486
  315. package/assets/skills/sfdipot-product-factors/SKILL.md +239 -239
  316. package/assets/skills/sherlock-review/schemas/output.json +297 -297
  317. package/assets/skills/shift-left-testing/evals/shift-left-testing.yaml +145 -145
  318. package/assets/skills/shift-left-testing/schemas/output.json +459 -459
  319. package/assets/skills/shift-right-testing/evals/shift-right-testing.yaml +147 -147
  320. package/assets/skills/shift-right-testing/schemas/output.json +418 -418
  321. package/assets/skills/tdd-london-chicago/schemas/output.json +444 -444
  322. package/assets/skills/technical-writing/schemas/output.json +268 -268
  323. package/assets/skills/test-automation-strategy/evals/test-automation-strategy.yaml +148 -148
  324. package/assets/skills/test-automation-strategy/schemas/output.json +444 -444
  325. package/assets/skills/test-data-management/evals/test-data-management.yaml +504 -504
  326. package/assets/skills/test-data-management/schemas/output.json +284 -284
  327. package/assets/skills/test-design-techniques/evals/test-design-techniques.yaml +142 -142
  328. package/assets/skills/test-design-techniques/schemas/output.json +295 -295
  329. package/assets/skills/test-environment-management/schemas/output.json +310 -310
  330. package/assets/skills/test-idea-rewriting/SKILL.md +229 -229
  331. package/assets/skills/test-reporting-analytics/evals/test-reporting-analytics.yaml +155 -155
  332. package/assets/skills/test-reporting-analytics/schemas/output.json +329 -329
  333. package/assets/skills/testability-scoring/evals/testability-scoring.yaml +814 -814
  334. package/assets/skills/testability-scoring/resources/templates/config.template.js +84 -84
  335. package/assets/skills/testability-scoring/schemas/output.json +606 -606
  336. package/assets/skills/testability-scoring/scripts/generate-html-report.js +1007 -1007
  337. package/assets/skills/verification-quality/evals/verification-quality.yaml +150 -150
  338. package/assets/skills/verification-quality/schemas/output.json +432 -432
  339. package/assets/skills/visual-testing-advanced/evals/visual-testing-advanced.yaml +154 -154
  340. package/assets/skills/visual-testing-advanced/schemas/output.json +294 -294
  341. package/assets/skills/wms-testing-patterns/evals/wms-testing-patterns.yaml +165 -165
  342. package/assets/skills/wms-testing-patterns/schemas/output.json +150 -150
  343. package/assets/skills/wms-testing-patterns/scripts/validate-config.json +51 -51
  344. package/assets/templates/validation-summary.json +56 -56
  345. package/dist/agents/claim-verifier/verifiers/output-verifier.d.ts +1 -0
  346. package/dist/agents/claim-verifier/verifiers/output-verifier.d.ts.map +1 -1
  347. package/dist/agents/claim-verifier/verifiers/output-verifier.js +16 -3
  348. package/dist/agents/claim-verifier/verifiers/output-verifier.js.map +1 -1
  349. package/dist/cli/bundle.js +488 -75
  350. package/dist/cli/commands/mcp.d.ts.map +1 -1
  351. package/dist/cli/commands/mcp.js +11 -9
  352. package/dist/cli/commands/mcp.js.map +1 -1
  353. package/dist/governance/adversarial-defense-integration.d.ts +29 -0
  354. package/dist/governance/adversarial-defense-integration.d.ts.map +1 -1
  355. package/dist/governance/adversarial-defense-integration.js +85 -1
  356. package/dist/governance/adversarial-defense-integration.js.map +1 -1
  357. package/dist/governance/continue-gate-integration.d.ts +7 -5
  358. package/dist/governance/continue-gate-integration.d.ts.map +1 -1
  359. package/dist/governance/continue-gate-integration.js +72 -15
  360. package/dist/governance/continue-gate-integration.js.map +1 -1
  361. package/dist/governance/deterministic-gateway-integration.d.ts +5 -0
  362. package/dist/governance/deterministic-gateway-integration.d.ts.map +1 -1
  363. package/dist/governance/deterministic-gateway-integration.js +35 -1
  364. package/dist/governance/deterministic-gateway-integration.js.map +1 -1
  365. package/dist/governance/evolution-pipeline-integration.d.ts +5 -0
  366. package/dist/governance/evolution-pipeline-integration.d.ts.map +1 -1
  367. package/dist/governance/evolution-pipeline-integration.js +57 -1
  368. package/dist/governance/evolution-pipeline-integration.js.map +1 -1
  369. package/dist/governance/memory-write-gate-integration.d.ts +6 -3
  370. package/dist/governance/memory-write-gate-integration.d.ts.map +1 -1
  371. package/dist/governance/memory-write-gate-integration.js +48 -10
  372. package/dist/governance/memory-write-gate-integration.js.map +1 -1
  373. package/dist/governance/proof-envelope-integration.d.ts +1 -0
  374. package/dist/governance/proof-envelope-integration.d.ts.map +1 -1
  375. package/dist/governance/proof-envelope-integration.js +37 -0
  376. package/dist/governance/proof-envelope-integration.js.map +1 -1
  377. package/dist/governance/shard-retriever-integration.d.ts +10 -0
  378. package/dist/governance/shard-retriever-integration.d.ts.map +1 -1
  379. package/dist/governance/shard-retriever-integration.js +50 -1
  380. package/dist/governance/shard-retriever-integration.js.map +1 -1
  381. package/dist/governance/trust-accumulator-integration.d.ts +5 -0
  382. package/dist/governance/trust-accumulator-integration.d.ts.map +1 -1
  383. package/dist/governance/trust-accumulator-integration.js +35 -2
  384. package/dist/governance/trust-accumulator-integration.js.map +1 -1
  385. package/dist/init/phases/10-workers.js +2 -2
  386. package/dist/init/phases/10-workers.js.map +1 -1
  387. package/dist/mcp/bundle.js +478 -62
  388. package/dist/mcp/protocol-server.js +2 -2
  389. package/dist/mcp/tool-registry.d.ts.map +1 -1
  390. package/dist/mcp/tool-registry.js +1 -0
  391. package/dist/mcp/tool-registry.js.map +1 -1
  392. package/dist/shared/language-detector.js +1 -1
  393. package/dist/shared/language-detector.js.map +1 -1
  394. package/dist/shared/parsers/multi-language-parser.d.ts.map +1 -1
  395. package/dist/shared/parsers/multi-language-parser.js +55 -16
  396. package/dist/shared/parsers/multi-language-parser.js.map +1 -1
  397. package/dist/shared/sql-safety.d.ts.map +1 -1
  398. package/dist/shared/sql-safety.js +7 -1
  399. package/dist/shared/sql-safety.js.map +1 -1
  400. package/package.json +6 -2
  401. package/scripts/prepare-assets.sh +8 -0
@@ -1,595 +1,595 @@
1
- # =============================================================================
2
- # AQE Skill Evaluation Test Suite: QE Security Compliance v1.0.0
3
- # =============================================================================
4
- #
5
- # Comprehensive evaluation suite for the qe-security-compliance skill.
6
- # Tests SAST scanning, dependency vulnerability checking, compliance auditing,
7
- # secret detection, and OWASP Top 10 validation.
8
- #
9
- # Schema: .claude/skills/.validation/schemas/skill-eval.schema.json
10
- # Validator: .claude/skills/qe-security-compliance/scripts/validate-config.json
11
- #
12
- # Coverage:
13
- # - SAST scanning for code vulnerabilities
14
- # - Dependency vulnerability analysis
15
- # - OWASP Top 10 coverage
16
- # - Compliance auditing (SOC2, GDPR, HIPAA, PCI-DSS)
17
- # - Secret detection and prevention
18
- #
19
- # =============================================================================
20
-
21
- skill: qe-security-compliance
22
- version: 1.0.0
23
- description: >
24
- Comprehensive evaluation suite for the qe-security-compliance skill.
25
- Tests SAST and DAST scanning, dependency vulnerability checking, OWASP
26
- Top 10 validation, compliance auditing for multiple standards, and secret
27
- detection across codebase and configuration.
28
-
29
- # =============================================================================
30
- # Multi-Model Configuration
31
- # =============================================================================
32
-
33
- models_to_test:
34
- - claude-3.5-sonnet
35
- - claude-3-haiku
36
-
37
- # =============================================================================
38
- # MCP Integration Configuration
39
- # =============================================================================
40
-
41
- mcp_integration:
42
- enabled: true
43
- namespace: skill-validation
44
-
45
- query_patterns: true
46
- track_outcomes: true
47
- store_patterns: true
48
- share_learning: true
49
- update_quality_gate: true
50
-
51
- target_agents:
52
- - qe-learning-coordinator
53
- - qe-queen-coordinator
54
- - qe-security-auditor
55
- - qe-security-scanner
56
-
57
- # =============================================================================
58
- # ReasoningBank Learning Configuration
59
- # =============================================================================
60
-
61
- learning:
62
- store_success_patterns: true
63
- store_failure_patterns: true
64
- pattern_ttl_days: 90
65
- min_confidence_to_store: 0.7
66
- cross_model_comparison: true
67
-
68
- # =============================================================================
69
- # Result Format Configuration
70
- # =============================================================================
71
-
72
- result_format:
73
- json_output: true
74
- markdown_report: true
75
- include_raw_output: false
76
- include_timing: true
77
- include_token_usage: true
78
-
79
- # =============================================================================
80
- # Environment Setup
81
- # =============================================================================
82
-
83
- setup:
84
- required_tools:
85
- - jq
86
- environment_variables:
87
- SECURITY_SCAN_LEVEL: "comprehensive"
88
- OWASP_ENABLED: "true"
89
- SECRET_DETECTION: "enabled"
90
- fixtures: []
91
-
92
- # =============================================================================
93
- # TEST CASES
94
- # =============================================================================
95
-
96
- test_cases:
97
- # ---------------------------------------------------------------------------
98
- # CATEGORY: SAST Scanning
99
- # ---------------------------------------------------------------------------
100
-
101
- - id: tc001_sast_sql_injection_detection
102
- description: "Detect SQL injection vulnerabilities in code"
103
- category: sast
104
- priority: critical
105
-
106
- input:
107
- prompt: |
108
- Scan this code for SQL injection vulnerabilities:
109
-
110
- ```javascript
111
- app.get('/user/:id', (req, res) => {
112
- const userId = req.params.id;
113
- const query = `SELECT * FROM users WHERE id = ${userId}`;
114
- db.query(query, (err, results) => {
115
- res.json(results);
116
- });
117
- });
118
- ```
119
-
120
- VULNERABILITY:
121
- - Type: SQL Injection
122
- - Severity: CRITICAL
123
- - CWE: CWE-89
124
- - OWASP: A03:2021
125
- - Fix: Use parameterized query
126
-
127
- What are all the issues?
128
- context:
129
- scan_type: "sql_injection"
130
- include_remediation: true
131
-
132
- expected_output:
133
- must_contain:
134
- - "SQL injection"
135
- - "parameterized"
136
- - "CWE-89"
137
- - "critical"
138
- must_not_contain:
139
- - "secure"
140
- - "no vulnerability"
141
- severity_classification: critical
142
- finding_count:
143
- min: 1
144
-
145
- validation:
146
- schema_check: true
147
- keyword_match_threshold: 0.8
148
- reasoning_quality_min: 0.75
149
-
150
- - id: tc002_sast_xss_detection
151
- description: "Detect cross-site scripting (XSS) vulnerabilities"
152
- category: sast
153
- priority: critical
154
-
155
- input:
156
- prompt: |
157
- Scan for XSS vulnerabilities:
158
-
159
- ```javascript
160
- app.get('/profile', (req, res) => {
161
- const name = req.query.name;
162
- res.send(`<h1>Welcome, ${name}!</h1>`);
163
- });
164
- ```
165
-
166
- VULNERABILITY:
167
- - Type: Reflected XSS
168
- - Severity: HIGH
169
- - CWE: CWE-79
170
- - Attack: name=<script>alert('xss')</script>
171
- - Fix: Escape output or use textContent
172
-
173
- Identify all issues and fixes.
174
- context:
175
- scan_type: "xss"
176
- include_examples: true
177
-
178
- expected_output:
179
- must_contain:
180
- - "XSS"
181
- - "escape"
182
- - "sanitize"
183
- - "CWE-79"
184
- severity_classification: critical
185
-
186
- validation:
187
- schema_check: true
188
- keyword_match_threshold: 0.8
189
-
190
- - id: tc003_sast_hardcoded_secrets
191
- description: "Detect hardcoded credentials and secrets"
192
- category: sast
193
- priority: critical
194
-
195
- input:
196
- prompt: |
197
- Scan for hardcoded secrets:
198
-
199
- ```javascript
200
- const API_KEY = 'sk-12345678901234567890';
201
- const DB_PASSWORD = 'admin123';
202
- const JWT_SECRET = 'my-secret-key-do-not-share';
203
-
204
- const credentials = {
205
- username: 'admin',
206
- password: 'P@ssw0rd123'
207
- };
208
- ```
209
-
210
- FINDINGS:
211
- 1. API_KEY: Hardcoded - CRITICAL
212
- 2. DB_PASSWORD: Hardcoded - CRITICAL
213
- 3. JWT_SECRET: Hardcoded - CRITICAL
214
- 4. Credentials object: Hardcoded password - CRITICAL
215
-
216
- Fix: Move to environment variables, use vault
217
- context:
218
- scan_type: "secrets"
219
- secret_patterns: "all"
220
-
221
- expected_output:
222
- must_contain:
223
- - "secret"
224
- - "hardcoded"
225
- - "environment"
226
- - "credentials"
227
- must_not_contain:
228
- - "ok"
229
- - "no secrets"
230
- severity_classification: critical
231
-
232
- validation:
233
- schema_check: true
234
- keyword_match_threshold: 0.8
235
- reasoning_quality_min: 0.75
236
-
237
- # ---------------------------------------------------------------------------
238
- # CATEGORY: Dependency Scanning
239
- # ---------------------------------------------------------------------------
240
-
241
- - id: tc004_dependency_vulnerability_check
242
- description: "Detect known vulnerabilities in dependencies"
243
- category: dependencies
244
- priority: critical
245
-
246
- input:
247
- prompt: |
248
- Scan dependencies for vulnerabilities:
249
-
250
- package.json:
251
- - lodash@4.17.15 (outdated)
252
- - express@4.16.0 (vulnerable)
253
- - moment@2.24.0 (has CVEs)
254
- - axios@0.18.1 (vulnerable)
255
-
256
- VULNERABLE PACKAGES:
257
- 1. express@4.16.0: CVE-2018-16487 (HIGH)
258
- 2. axios@0.18.1: CVE-2020-28168 (HIGH)
259
- 3. lodash@4.17.15: CVE-2021-23337 (MEDIUM)
260
- 4. moment@2.24.0: Regular Expression DoS (MEDIUM)
261
-
262
- Action: Update to latest versions
263
- context:
264
- scan_scope: "package.json"
265
- include_cves: true
266
-
267
- expected_output:
268
- must_contain:
269
- - "vulnerable"
270
- - "CVE"
271
- - "dependency"
272
- - "update"
273
- must_not_contain:
274
- - "no vulnerabilities"
275
- - "all ok"
276
- severity_classification: critical
277
-
278
- validation:
279
- schema_check: true
280
- keyword_match_threshold: 0.8
281
-
282
- - id: tc005_outdated_package_detection
283
- description: "Identify outdated packages needing updates"
284
- category: dependencies
285
- priority: high
286
-
287
- input:
288
- prompt: |
289
- Analyze package freshness:
290
- - lodash@4.17.15 (current: 4.17.21) - 6 minor versions behind
291
- - express@4.16.0 (current: 4.18.2) - 2 major versions behind
292
- - jest@24.0.0 (current: 29.0.0) - 5 major versions behind
293
-
294
- RECOMMENDATIONS:
295
- 1. CRITICAL: Update express (major version)
296
- 2. HIGH: Update jest (major version, breaking changes)
297
- 3. MEDIUM: Update lodash (minor version, backward compatible)
298
-
299
- How would you prioritize updates?
300
- context:
301
- package_analysis: true
302
- prioritization: true
303
-
304
- expected_output:
305
- must_contain:
306
- - "outdated"
307
- - "update"
308
- - "version"
309
- - "prioritize"
310
- finding_count:
311
- min: 1
312
-
313
- validation:
314
- schema_check: true
315
- keyword_match_threshold: 0.75
316
-
317
- # ---------------------------------------------------------------------------
318
- # CATEGORY: OWASP Top 10
319
- # ---------------------------------------------------------------------------
320
-
321
- - id: tc006_owasp_comprehensive_check
322
- description: "Check code against full OWASP Top 10 2021"
323
- category: owasp
324
- priority: critical
325
-
326
- input:
327
- prompt: |
328
- Scan code for OWASP Top 10 2021 compliance:
329
-
330
- A01: Broken Access Control
331
- - Check: Authorization on endpoints
332
- - Status: FOUND - no authorization check on /admin
333
-
334
- A02: Cryptographic Failures
335
- - Check: Weak encryption, plaintext passwords
336
- - Status: FOUND - passwords stored plaintext
337
-
338
- A03: Injection (SQL, NoSQL, Command, XSS, LDAP)
339
- - Check: SQL injection, XSS
340
- - Status: FOUND - SQL injection vulnerability
341
-
342
- A07: Authentication Failures
343
- - Check: Weak passwords, session management
344
- - Status: OK - using bcrypt and secure sessions
345
-
346
- A06: Vulnerable Components
347
- - Check: Known CVEs in dependencies
348
- - Status: FOUND - 3 vulnerable packages
349
-
350
- Other categories: OK
351
-
352
- SUMMARY: 3 critical issues, 2 must fix immediately
353
- context:
354
- standard: "owasp-2021"
355
- categories: "all"
356
- include_status: true
357
-
358
- expected_output:
359
- must_contain:
360
- - "OWASP"
361
- - "A01"
362
- - "A03"
363
- - "critical"
364
- - "vulnerability"
365
- must_not_contain:
366
- - "no issues"
367
- - "compliant"
368
- severity_classification: critical
369
-
370
- validation:
371
- schema_check: true
372
- keyword_match_threshold: 0.8
373
- reasoning_quality_min: 0.75
374
-
375
- # ---------------------------------------------------------------------------
376
- # CATEGORY: Compliance Auditing
377
- # ---------------------------------------------------------------------------
378
-
379
- - id: tc007_soc2_compliance_audit
380
- description: "Audit code for SOC2 compliance"
381
- category: compliance
382
- priority: critical
383
-
384
- input:
385
- prompt: |
386
- Audit SOC2 compliance requirements:
387
-
388
- SECURITY:
389
- - Access control: PARTIAL (missing admin endpoint protection)
390
- - Encryption: OK (TLS in transit, AES at rest)
391
- - Secret management: FAIL (hardcoded secrets)
392
- - Monitoring: OK (logs captured)
393
-
394
- AVAILABILITY:
395
- - Error handling: OK
396
- - Backup: OK
397
- - Disaster recovery: PARTIAL (needs testing)
398
-
399
- PROCESSING INTEGRITY:
400
- - Input validation: FAIL (SQL injection found)
401
- - Error handling: OK
402
- - Audit logging: PARTIAL (some endpoints missing)
403
-
404
- CONFIDENTIALITY:
405
- - PII protection: FAIL (no encryption for user data)
406
- - Access controls: PARTIAL
407
-
408
- PRIVACY:
409
- - Data retention: PARTIAL (no policy)
410
- - User consent: OK
411
-
412
- COMPLIANCE: 45% - FAIL (multiple critical gaps)
413
- context:
414
- standard: "SOC2"
415
- categories: "all"
416
- remediation: true
417
-
418
- expected_output:
419
- must_contain:
420
- - "SOC2"
421
- - "compliance"
422
- - "fail"
423
- - "gap"
424
- - "remediation"
425
- must_not_contain:
426
- - "compliant"
427
- - "pass"
428
- severity_classification: critical
429
-
430
- validation:
431
- schema_check: true
432
- keyword_match_threshold: 0.8
433
-
434
- - id: tc008_gdpr_compliance_check
435
- description: "Verify GDPR compliance for user data handling"
436
- category: compliance
437
- priority: critical
438
-
439
- input:
440
- prompt: |
441
- Check GDPR compliance:
442
-
443
- REQUIREMENTS:
444
- 1. User consent documented: FAIL (no consent mechanism)
445
- 2. Privacy policy: OK (published)
446
- 3. Data retention policy: FAIL (no policy defined)
447
- 4. Right to deletion: PARTIAL (can delete but full audit trail)
448
- 5. Data portability: FAIL (no export functionality)
449
- 6. Breach notification: PARTIAL (process exists, 30-day compliance ok)
450
- 7. DPA in place: OK (processor agreements signed)
451
- 8. Privacy by design: FAIL (not implemented)
452
-
453
- COMPLIANCE: 38% - FAIL
454
-
455
- What are the top 3 fixes?
456
- context:
457
- standard: "GDPR"
458
- user_data_handling: true
459
-
460
- expected_output:
461
- must_contain:
462
- - "GDPR"
463
- - "compliance"
464
- - "consent"
465
- - "deletion"
466
- - "fail"
467
- severity_classification: critical
468
-
469
- validation:
470
- schema_check: true
471
- keyword_match_threshold: 0.8
472
-
473
- # ---------------------------------------------------------------------------
474
- # CATEGORY: Security Gate
475
- # ---------------------------------------------------------------------------
476
-
477
- - id: tc009_security_gate_enforcement
478
- description: "Enforce security gates in CI/CD pipeline"
479
- category: gates
480
- priority: critical
481
-
482
- input:
483
- prompt: |
484
- Define security gates for merge:
485
- 1. Critical vulnerabilities: 0 required
486
- 2. High vulnerabilities: <= 2
487
- 3. Known CVEs in dependencies: 0
488
- 4. Hardcoded secrets: 0
489
- 5. OWASP blocking issues: 0
490
-
491
- SCAN RESULTS:
492
- - Critical: 0 ✓
493
- - High: 1 (express vulnerability) ✗ BLOCK
494
- - CVEs: 3 ✗ BLOCK
495
- - Secrets: 1 hardcoded API key ✗ BLOCK
496
- - OWASP: 2 issues ✗ BLOCK
497
-
498
- VERDICT: BLOCK MERGE - fail security gates
499
-
500
- How would you help fix violations?
501
- context:
502
- blocking: true
503
- remediation_guidance: true
504
-
505
- expected_output:
506
- must_contain:
507
- - "security"
508
- - "gate"
509
- - "block"
510
- - "merge"
511
- must_not_contain:
512
- - "approve"
513
- - "pass"
514
- severity_classification: critical
515
-
516
- validation:
517
- schema_check: true
518
- keyword_match_threshold: 0.8
519
-
520
- # ---------------------------------------------------------------------------
521
- # CATEGORY: Negative Tests
522
- # ---------------------------------------------------------------------------
523
-
524
- - id: tc010_security_remediation_guidance
525
- description: "Provide actionable remediation for security findings"
526
- category: negative
527
- priority: high
528
-
529
- input:
530
- prompt: |
531
- For each security issue, provide remediation:
532
-
533
- ISSUE 1: SQL Injection in getUserById()
534
- REMEDIATION:
535
- ```javascript
536
- // BEFORE (vulnerable)
537
- const query = `SELECT * FROM users WHERE id = ${userId}`;
538
-
539
- // AFTER (safe)
540
- const query = 'SELECT * FROM users WHERE id = ?';
541
- db.query(query, [userId], callback);
542
- ```
543
-
544
- ISSUE 2: Hardcoded API Key
545
- REMEDIATION:
546
- // BEFORE
547
- const API_KEY = 'sk-123456789';
548
-
549
- // AFTER
550
- const API_KEY = process.env.STRIPE_API_KEY;
551
- // Set in .env or secrets manager
552
-
553
- Generate clear fix for each issue found.
554
- context:
555
- issue_remediation: true
556
- code_examples: true
557
-
558
- expected_output:
559
- must_contain:
560
- - "remediation"
561
- - "before"
562
- - "after"
563
- - "fix"
564
- finding_count:
565
- min: 1
566
-
567
- validation:
568
- schema_check: true
569
- allow_partial: true
570
-
571
- # =============================================================================
572
- # SUCCESS CRITERIA
573
- # =============================================================================
574
-
575
- success_criteria:
576
- pass_rate: 0.8
577
- critical_pass_rate: 1.0
578
- avg_reasoning_quality: 0.75
579
- max_execution_time_ms: 300000
580
- cross_model_variance: 0.15
581
-
582
- # =============================================================================
583
- # METADATA
584
- # =============================================================================
585
-
586
- metadata:
587
- author: "qe-security-auditor"
588
- created: "2026-02-02"
589
- last_updated: "2026-02-02"
590
- coverage_target: >
591
- SAST scanning for SQL injection, XSS, hardcoded secrets, path traversal,
592
- insecure crypto, dependency vulnerability analysis with CVE detection,
593
- OWASP Top 10 2021 comprehensive checking, compliance auditing for SOC2/GDPR,
594
- security gate enforcement with blocking criteria, and detailed remediation
595
- guidance with code examples for all identified vulnerabilities.
1
+ # =============================================================================
2
+ # AQE Skill Evaluation Test Suite: QE Security Compliance v1.0.0
3
+ # =============================================================================
4
+ #
5
+ # Comprehensive evaluation suite for the qe-security-compliance skill.
6
+ # Tests SAST scanning, dependency vulnerability checking, compliance auditing,
7
+ # secret detection, and OWASP Top 10 validation.
8
+ #
9
+ # Schema: .claude/skills/.validation/schemas/skill-eval.schema.json
10
+ # Validator: .claude/skills/qe-security-compliance/scripts/validate-config.json
11
+ #
12
+ # Coverage:
13
+ # - SAST scanning for code vulnerabilities
14
+ # - Dependency vulnerability analysis
15
+ # - OWASP Top 10 coverage
16
+ # - Compliance auditing (SOC2, GDPR, HIPAA, PCI-DSS)
17
+ # - Secret detection and prevention
18
+ #
19
+ # =============================================================================
20
+
21
+ skill: qe-security-compliance
22
+ version: 1.0.0
23
+ description: >
24
+ Comprehensive evaluation suite for the qe-security-compliance skill.
25
+ Tests SAST and DAST scanning, dependency vulnerability checking, OWASP
26
+ Top 10 validation, compliance auditing for multiple standards, and secret
27
+ detection across codebase and configuration.
28
+
29
+ # =============================================================================
30
+ # Multi-Model Configuration
31
+ # =============================================================================
32
+
33
+ models_to_test:
34
+ - claude-3.5-sonnet
35
+ - claude-3-haiku
36
+
37
+ # =============================================================================
38
+ # MCP Integration Configuration
39
+ # =============================================================================
40
+
41
+ mcp_integration:
42
+ enabled: true
43
+ namespace: skill-validation
44
+
45
+ query_patterns: true
46
+ track_outcomes: true
47
+ store_patterns: true
48
+ share_learning: true
49
+ update_quality_gate: true
50
+
51
+ target_agents:
52
+ - qe-learning-coordinator
53
+ - qe-queen-coordinator
54
+ - qe-security-auditor
55
+ - qe-security-scanner
56
+
57
+ # =============================================================================
58
+ # ReasoningBank Learning Configuration
59
+ # =============================================================================
60
+
61
+ learning:
62
+ store_success_patterns: true
63
+ store_failure_patterns: true
64
+ pattern_ttl_days: 90
65
+ min_confidence_to_store: 0.7
66
+ cross_model_comparison: true
67
+
68
+ # =============================================================================
69
+ # Result Format Configuration
70
+ # =============================================================================
71
+
72
+ result_format:
73
+ json_output: true
74
+ markdown_report: true
75
+ include_raw_output: false
76
+ include_timing: true
77
+ include_token_usage: true
78
+
79
+ # =============================================================================
80
+ # Environment Setup
81
+ # =============================================================================
82
+
83
+ setup:
84
+ required_tools:
85
+ - jq
86
+ environment_variables:
87
+ SECURITY_SCAN_LEVEL: "comprehensive"
88
+ OWASP_ENABLED: "true"
89
+ SECRET_DETECTION: "enabled"
90
+ fixtures: []
91
+
92
+ # =============================================================================
93
+ # TEST CASES
94
+ # =============================================================================
95
+
96
+ test_cases:
97
+ # ---------------------------------------------------------------------------
98
+ # CATEGORY: SAST Scanning
99
+ # ---------------------------------------------------------------------------
100
+
101
+ - id: tc001_sast_sql_injection_detection
102
+ description: "Detect SQL injection vulnerabilities in code"
103
+ category: sast
104
+ priority: critical
105
+
106
+ input:
107
+ prompt: |
108
+ Scan this code for SQL injection vulnerabilities:
109
+
110
+ ```javascript
111
+ app.get('/user/:id', (req, res) => {
112
+ const userId = req.params.id;
113
+ const query = `SELECT * FROM users WHERE id = ${userId}`;
114
+ db.query(query, (err, results) => {
115
+ res.json(results);
116
+ });
117
+ });
118
+ ```
119
+
120
+ VULNERABILITY:
121
+ - Type: SQL Injection
122
+ - Severity: CRITICAL
123
+ - CWE: CWE-89
124
+ - OWASP: A03:2021
125
+ - Fix: Use parameterized query
126
+
127
+ What are all the issues?
128
+ context:
129
+ scan_type: "sql_injection"
130
+ include_remediation: true
131
+
132
+ expected_output:
133
+ must_contain:
134
+ - "SQL injection"
135
+ - "parameterized"
136
+ - "CWE-89"
137
+ - "critical"
138
+ must_not_contain:
139
+ - "secure"
140
+ - "no vulnerability"
141
+ severity_classification: critical
142
+ finding_count:
143
+ min: 1
144
+
145
+ validation:
146
+ schema_check: true
147
+ keyword_match_threshold: 0.8
148
+ reasoning_quality_min: 0.75
149
+
150
+ - id: tc002_sast_xss_detection
151
+ description: "Detect cross-site scripting (XSS) vulnerabilities"
152
+ category: sast
153
+ priority: critical
154
+
155
+ input:
156
+ prompt: |
157
+ Scan for XSS vulnerabilities:
158
+
159
+ ```javascript
160
+ app.get('/profile', (req, res) => {
161
+ const name = req.query.name;
162
+ res.send(`<h1>Welcome, ${name}!</h1>`);
163
+ });
164
+ ```
165
+
166
+ VULNERABILITY:
167
+ - Type: Reflected XSS
168
+ - Severity: HIGH
169
+ - CWE: CWE-79
170
+ - Attack: name=<script>alert('xss')</script>
171
+ - Fix: Escape output or use textContent
172
+
173
+ Identify all issues and fixes.
174
+ context:
175
+ scan_type: "xss"
176
+ include_examples: true
177
+
178
+ expected_output:
179
+ must_contain:
180
+ - "XSS"
181
+ - "escape"
182
+ - "sanitize"
183
+ - "CWE-79"
184
+ severity_classification: critical
185
+
186
+ validation:
187
+ schema_check: true
188
+ keyword_match_threshold: 0.8
189
+
190
+ - id: tc003_sast_hardcoded_secrets
191
+ description: "Detect hardcoded credentials and secrets"
192
+ category: sast
193
+ priority: critical
194
+
195
+ input:
196
+ prompt: |
197
+ Scan for hardcoded secrets:
198
+
199
+ ```javascript
200
+ const API_KEY = 'sk-12345678901234567890';
201
+ const DB_PASSWORD = 'admin123';
202
+ const JWT_SECRET = 'my-secret-key-do-not-share';
203
+
204
+ const credentials = {
205
+ username: 'admin',
206
+ password: 'P@ssw0rd123'
207
+ };
208
+ ```
209
+
210
+ FINDINGS:
211
+ 1. API_KEY: Hardcoded - CRITICAL
212
+ 2. DB_PASSWORD: Hardcoded - CRITICAL
213
+ 3. JWT_SECRET: Hardcoded - CRITICAL
214
+ 4. Credentials object: Hardcoded password - CRITICAL
215
+
216
+ Fix: Move to environment variables, use vault
217
+ context:
218
+ scan_type: "secrets"
219
+ secret_patterns: "all"
220
+
221
+ expected_output:
222
+ must_contain:
223
+ - "secret"
224
+ - "hardcoded"
225
+ - "environment"
226
+ - "credentials"
227
+ must_not_contain:
228
+ - "ok"
229
+ - "no secrets"
230
+ severity_classification: critical
231
+
232
+ validation:
233
+ schema_check: true
234
+ keyword_match_threshold: 0.8
235
+ reasoning_quality_min: 0.75
236
+
237
+ # ---------------------------------------------------------------------------
238
+ # CATEGORY: Dependency Scanning
239
+ # ---------------------------------------------------------------------------
240
+
241
+ - id: tc004_dependency_vulnerability_check
242
+ description: "Detect known vulnerabilities in dependencies"
243
+ category: dependencies
244
+ priority: critical
245
+
246
+ input:
247
+ prompt: |
248
+ Scan dependencies for vulnerabilities:
249
+
250
+ package.json:
251
+ - lodash@4.17.15 (outdated)
252
+ - express@4.16.0 (vulnerable)
253
+ - moment@2.24.0 (has CVEs)
254
+ - axios@0.18.1 (vulnerable)
255
+
256
+ VULNERABLE PACKAGES:
257
+ 1. express@4.16.0: CVE-2018-16487 (HIGH)
258
+ 2. axios@0.18.1: CVE-2020-28168 (HIGH)
259
+ 3. lodash@4.17.15: CVE-2021-23337 (MEDIUM)
260
+ 4. moment@2.24.0: Regular Expression DoS (MEDIUM)
261
+
262
+ Action: Update to latest versions
263
+ context:
264
+ scan_scope: "package.json"
265
+ include_cves: true
266
+
267
+ expected_output:
268
+ must_contain:
269
+ - "vulnerable"
270
+ - "CVE"
271
+ - "dependency"
272
+ - "update"
273
+ must_not_contain:
274
+ - "no vulnerabilities"
275
+ - "all ok"
276
+ severity_classification: critical
277
+
278
+ validation:
279
+ schema_check: true
280
+ keyword_match_threshold: 0.8
281
+
282
+ - id: tc005_outdated_package_detection
283
+ description: "Identify outdated packages needing updates"
284
+ category: dependencies
285
+ priority: high
286
+
287
+ input:
288
+ prompt: |
289
+ Analyze package freshness:
290
+ - lodash@4.17.15 (current: 4.17.21) - 6 minor versions behind
291
+ - express@4.16.0 (current: 4.18.2) - 2 major versions behind
292
+ - jest@24.0.0 (current: 29.0.0) - 5 major versions behind
293
+
294
+ RECOMMENDATIONS:
295
+ 1. CRITICAL: Update express (major version)
296
+ 2. HIGH: Update jest (major version, breaking changes)
297
+ 3. MEDIUM: Update lodash (minor version, backward compatible)
298
+
299
+ How would you prioritize updates?
300
+ context:
301
+ package_analysis: true
302
+ prioritization: true
303
+
304
+ expected_output:
305
+ must_contain:
306
+ - "outdated"
307
+ - "update"
308
+ - "version"
309
+ - "prioritize"
310
+ finding_count:
311
+ min: 1
312
+
313
+ validation:
314
+ schema_check: true
315
+ keyword_match_threshold: 0.75
316
+
317
+ # ---------------------------------------------------------------------------
318
+ # CATEGORY: OWASP Top 10
319
+ # ---------------------------------------------------------------------------
320
+
321
+ - id: tc006_owasp_comprehensive_check
322
+ description: "Check code against full OWASP Top 10 2021"
323
+ category: owasp
324
+ priority: critical
325
+
326
+ input:
327
+ prompt: |
328
+ Scan code for OWASP Top 10 2021 compliance:
329
+
330
+ A01: Broken Access Control
331
+ - Check: Authorization on endpoints
332
+ - Status: FOUND - no authorization check on /admin
333
+
334
+ A02: Cryptographic Failures
335
+ - Check: Weak encryption, plaintext passwords
336
+ - Status: FOUND - passwords stored plaintext
337
+
338
+ A03: Injection (SQL, NoSQL, Command, XSS, LDAP)
339
+ - Check: SQL injection, XSS
340
+ - Status: FOUND - SQL injection vulnerability
341
+
342
+ A07: Authentication Failures
343
+ - Check: Weak passwords, session management
344
+ - Status: OK - using bcrypt and secure sessions
345
+
346
+ A06: Vulnerable Components
347
+ - Check: Known CVEs in dependencies
348
+ - Status: FOUND - 3 vulnerable packages
349
+
350
+ Other categories: OK
351
+
352
+ SUMMARY: 3 critical issues, 2 must fix immediately
353
+ context:
354
+ standard: "owasp-2021"
355
+ categories: "all"
356
+ include_status: true
357
+
358
+ expected_output:
359
+ must_contain:
360
+ - "OWASP"
361
+ - "A01"
362
+ - "A03"
363
+ - "critical"
364
+ - "vulnerability"
365
+ must_not_contain:
366
+ - "no issues"
367
+ - "compliant"
368
+ severity_classification: critical
369
+
370
+ validation:
371
+ schema_check: true
372
+ keyword_match_threshold: 0.8
373
+ reasoning_quality_min: 0.75
374
+
375
+ # ---------------------------------------------------------------------------
376
+ # CATEGORY: Compliance Auditing
377
+ # ---------------------------------------------------------------------------
378
+
379
+ - id: tc007_soc2_compliance_audit
380
+ description: "Audit code for SOC2 compliance"
381
+ category: compliance
382
+ priority: critical
383
+
384
+ input:
385
+ prompt: |
386
+ Audit SOC2 compliance requirements:
387
+
388
+ SECURITY:
389
+ - Access control: PARTIAL (missing admin endpoint protection)
390
+ - Encryption: OK (TLS in transit, AES at rest)
391
+ - Secret management: FAIL (hardcoded secrets)
392
+ - Monitoring: OK (logs captured)
393
+
394
+ AVAILABILITY:
395
+ - Error handling: OK
396
+ - Backup: OK
397
+ - Disaster recovery: PARTIAL (needs testing)
398
+
399
+ PROCESSING INTEGRITY:
400
+ - Input validation: FAIL (SQL injection found)
401
+ - Error handling: OK
402
+ - Audit logging: PARTIAL (some endpoints missing)
403
+
404
+ CONFIDENTIALITY:
405
+ - PII protection: FAIL (no encryption for user data)
406
+ - Access controls: PARTIAL
407
+
408
+ PRIVACY:
409
+ - Data retention: PARTIAL (no policy)
410
+ - User consent: OK
411
+
412
+ COMPLIANCE: 45% - FAIL (multiple critical gaps)
413
+ context:
414
+ standard: "SOC2"
415
+ categories: "all"
416
+ remediation: true
417
+
418
+ expected_output:
419
+ must_contain:
420
+ - "SOC2"
421
+ - "compliance"
422
+ - "fail"
423
+ - "gap"
424
+ - "remediation"
425
+ must_not_contain:
426
+ - "compliant"
427
+ - "pass"
428
+ severity_classification: critical
429
+
430
+ validation:
431
+ schema_check: true
432
+ keyword_match_threshold: 0.8
433
+
434
+ - id: tc008_gdpr_compliance_check
435
+ description: "Verify GDPR compliance for user data handling"
436
+ category: compliance
437
+ priority: critical
438
+
439
+ input:
440
+ prompt: |
441
+ Check GDPR compliance:
442
+
443
+ REQUIREMENTS:
444
+ 1. User consent documented: FAIL (no consent mechanism)
445
+ 2. Privacy policy: OK (published)
446
+ 3. Data retention policy: FAIL (no policy defined)
447
+ 4. Right to deletion: PARTIAL (can delete but full audit trail)
448
+ 5. Data portability: FAIL (no export functionality)
449
+ 6. Breach notification: PARTIAL (process exists, 30-day compliance ok)
450
+ 7. DPA in place: OK (processor agreements signed)
451
+ 8. Privacy by design: FAIL (not implemented)
452
+
453
+ COMPLIANCE: 38% - FAIL
454
+
455
+ What are the top 3 fixes?
456
+ context:
457
+ standard: "GDPR"
458
+ user_data_handling: true
459
+
460
+ expected_output:
461
+ must_contain:
462
+ - "GDPR"
463
+ - "compliance"
464
+ - "consent"
465
+ - "deletion"
466
+ - "fail"
467
+ severity_classification: critical
468
+
469
+ validation:
470
+ schema_check: true
471
+ keyword_match_threshold: 0.8
472
+
473
+ # ---------------------------------------------------------------------------
474
+ # CATEGORY: Security Gate
475
+ # ---------------------------------------------------------------------------
476
+
477
+ - id: tc009_security_gate_enforcement
478
+ description: "Enforce security gates in CI/CD pipeline"
479
+ category: gates
480
+ priority: critical
481
+
482
+ input:
483
+ prompt: |
484
+ Define security gates for merge:
485
+ 1. Critical vulnerabilities: 0 required
486
+ 2. High vulnerabilities: <= 2
487
+ 3. Known CVEs in dependencies: 0
488
+ 4. Hardcoded secrets: 0
489
+ 5. OWASP blocking issues: 0
490
+
491
+ SCAN RESULTS:
492
+ - Critical: 0 ✓
493
+ - High: 1 (express vulnerability) ✗ BLOCK
494
+ - CVEs: 3 ✗ BLOCK
495
+ - Secrets: 1 hardcoded API key ✗ BLOCK
496
+ - OWASP: 2 issues ✗ BLOCK
497
+
498
+ VERDICT: BLOCK MERGE - fail security gates
499
+
500
+ How would you help fix violations?
501
+ context:
502
+ blocking: true
503
+ remediation_guidance: true
504
+
505
+ expected_output:
506
+ must_contain:
507
+ - "security"
508
+ - "gate"
509
+ - "block"
510
+ - "merge"
511
+ must_not_contain:
512
+ - "approve"
513
+ - "pass"
514
+ severity_classification: critical
515
+
516
+ validation:
517
+ schema_check: true
518
+ keyword_match_threshold: 0.8
519
+
520
+ # ---------------------------------------------------------------------------
521
+ # CATEGORY: Negative Tests
522
+ # ---------------------------------------------------------------------------
523
+
524
+ - id: tc010_security_remediation_guidance
525
+ description: "Provide actionable remediation for security findings"
526
+ category: negative
527
+ priority: high
528
+
529
+ input:
530
+ prompt: |
531
+ For each security issue, provide remediation:
532
+
533
+ ISSUE 1: SQL Injection in getUserById()
534
+ REMEDIATION:
535
+ ```javascript
536
+ // BEFORE (vulnerable)
537
+ const query = `SELECT * FROM users WHERE id = ${userId}`;
538
+
539
+ // AFTER (safe)
540
+ const query = 'SELECT * FROM users WHERE id = ?';
541
+ db.query(query, [userId], callback);
542
+ ```
543
+
544
+ ISSUE 2: Hardcoded API Key
545
+ REMEDIATION:
546
+ // BEFORE
547
+ const API_KEY = 'sk-123456789';
548
+
549
+ // AFTER
550
+ const API_KEY = process.env.STRIPE_API_KEY;
551
+ // Set in .env or secrets manager
552
+
553
+ Generate clear fix for each issue found.
554
+ context:
555
+ issue_remediation: true
556
+ code_examples: true
557
+
558
+ expected_output:
559
+ must_contain:
560
+ - "remediation"
561
+ - "before"
562
+ - "after"
563
+ - "fix"
564
+ finding_count:
565
+ min: 1
566
+
567
+ validation:
568
+ schema_check: true
569
+ allow_partial: true
570
+
571
+ # =============================================================================
572
+ # SUCCESS CRITERIA
573
+ # =============================================================================
574
+
575
+ success_criteria:
576
+ pass_rate: 0.8
577
+ critical_pass_rate: 1.0
578
+ avg_reasoning_quality: 0.75
579
+ max_execution_time_ms: 300000
580
+ cross_model_variance: 0.15
581
+
582
+ # =============================================================================
583
+ # METADATA
584
+ # =============================================================================
585
+
586
+ metadata:
587
+ author: "qe-security-auditor"
588
+ created: "2026-02-02"
589
+ last_updated: "2026-02-02"
590
+ coverage_target: >
591
+ SAST scanning for SQL injection, XSS, hardcoded secrets, path traversal,
592
+ insecure crypto, dependency vulnerability analysis with CVE detection,
593
+ OWASP Top 10 2021 comprehensive checking, compliance auditing for SOC2/GDPR,
594
+ security gate enforcement with blocking criteria, and detailed remediation
595
+ guidance with code examples for all identified vulnerabilities.