agentplane 0.4.2 → 0.4.4
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +66 -102
- package/assets/AGENTS.md +29 -29
- package/assets/RUNNER.md +2 -2
- package/assets/agents/CODER.json +2 -2
- package/assets/agents/CREATOR.json +2 -2
- package/assets/agents/DOCS.json +3 -3
- package/assets/agents/EVALUATOR.json +1 -1
- package/assets/agents/INTEGRATOR.json +3 -3
- package/assets/agents/ORCHESTRATOR.json +2 -2
- package/assets/agents/PLANNER.json +2 -2
- package/assets/agents/REDMINE.json +1 -1
- package/assets/agents/REVIEWER.json +2 -2
- package/assets/agents/SKILL_EXTRACTOR.json +2 -2
- package/assets/agents/TESTER.json +2 -2
- package/assets/agents/UPDATER.json +1 -1
- package/assets/agents/UPGRADER.json +3 -3
- package/assets/codex-plugin/assets/header.png +0 -0
- package/assets/codex-plugin/skills/agentplane/SKILL.md +11 -11
- package/assets/policy/check-routing.mjs +45 -1
- package/assets/policy/incidents.md +3 -0
- package/bin/agentplane.js +100 -2
- package/bin/ap.js +7 -0
- package/bin/runtime-watch.js +1 -0
- package/dist/.build-manifest.json +3 -3
- package/dist/cli.js +444 -378
- package/package.json +10 -4
package/README.md
CHANGED
|
@@ -1,22 +1,21 @@
|
|
|
1
|
-
# AgentPlane
|
|
1
|
+
# AgentPlane CLI
|
|
2
|
+
|
|
3
|
+
**The open-source audit layer for coding agents.**
|
|
4
|
+
|
|
5
|
+
`agentplane` is a local CLI that turns Claude Code, Codex, Cursor, Aider, and similar coding-agent
|
|
6
|
+
work into reviewable, reversible Git artifacts.
|
|
2
7
|
|
|
3
8
|
[](https://www.npmjs.com/package/agentplane)
|
|
4
9
|
[](https://www.npmjs.com/package/agentplane)
|
|
10
|
+
[](https://github.com/basilisk-labs/agentplane/stargazers)
|
|
5
11
|
[](https://github.com/basilisk-labs/agentplane/blob/main/LICENSE)
|
|
6
12
|
[](https://agentplane.org/docs/user/prerequisites)
|
|
7
13
|
|
|
8
|
-
|
|
9
|
-
|
|
10
|
-
|
|
11
|
-
work auditable inside your Git repository:
|
|
12
|
-
|
|
13
|
-
```text
|
|
14
|
-
task -> plan -> approve -> implement -> verify -> finish
|
|
15
|
-
```
|
|
16
|
-
|
|
17
|
-
No hosted runtime. No hidden control plane. Everything stays in your repo.
|
|
14
|
+
[](https://registry.npmjs.org/-/npm/v1/attestations/agentplane@latest)
|
|
15
|
+
[](https://docs.npmjs.com/generating-provenance-statements)
|
|
16
|
+
[](https://agentplane.org/docs/recipes)
|
|
18
17
|
|
|
19
|
-
## Install
|
|
18
|
+
## Install in 30 seconds
|
|
20
19
|
|
|
21
20
|
```bash
|
|
22
21
|
npm i -g agentplane
|
|
@@ -24,141 +23,106 @@ agentplane init
|
|
|
24
23
|
agentplane quickstart
|
|
25
24
|
```
|
|
26
25
|
|
|
27
|
-
|
|
28
|
-
|
|
29
|
-
- Node.js 20+
|
|
30
|
-
- Git repository
|
|
31
|
-
- Local terminal
|
|
32
|
-
|
|
33
|
-
Prefer not to install globally:
|
|
26
|
+
Prefer no global install:
|
|
34
27
|
|
|
35
28
|
```bash
|
|
36
29
|
npx agentplane init
|
|
37
30
|
npx agentplane quickstart
|
|
38
31
|
```
|
|
39
32
|
|
|
40
|
-
|
|
33
|
+
Requirements: Node.js 20+, Git, and a local terminal.
|
|
41
34
|
|
|
42
|
-
|
|
35
|
+
Experimental agent shorthand:
|
|
43
36
|
|
|
44
|
-
|
|
45
|
-
|
|
46
|
-
|
|
47
|
-
|
|
48
|
-
|
|
49
|
-
|
|
50
|
-
AgentPlane adds a visible workflow layer around agent work without replacing Git, your editor, or
|
|
51
|
-
your terminal.
|
|
37
|
+
```bash
|
|
38
|
+
ap next
|
|
39
|
+
ap show <task-id>
|
|
40
|
+
ap vshow <task-id>
|
|
41
|
+
```
|
|
52
42
|
|
|
53
|
-
|
|
43
|
+
`ap` is an agent-optimized entrypoint for compact, non-interactive command use. Keep public docs and
|
|
44
|
+
human-facing setup on `agentplane`; use `ap` only when the installed package exposes it.
|
|
54
45
|
|
|
55
|
-
|
|
46
|
+
## What you get after `agentplane init`
|
|
56
47
|
|
|
57
48
|
```text
|
|
58
49
|
AGENTS.md or CLAUDE.md Policy gateway for the repository
|
|
59
50
|
.agentplane/ Repo-local workflow workspace
|
|
60
|
-
.agentplane/
|
|
51
|
+
.agentplane/WORKFLOW.md Current workflow/config contract
|
|
61
52
|
.agentplane/agents/ Installed agent profiles
|
|
62
53
|
.agentplane/tasks/ Per-task records and evidence
|
|
63
|
-
.agentplane/
|
|
54
|
+
.agentplane/workflows/ Last-known-good workflow snapshot
|
|
64
55
|
```
|
|
65
56
|
|
|
66
|
-
|
|
67
|
-
|
|
68
|
-
|
|
69
|
-
## First task flow
|
|
57
|
+
AgentPlane does not run a hosted control plane. It records the task trail inside the repository you
|
|
58
|
+
already review.
|
|
70
59
|
|
|
71
|
-
|
|
60
|
+
## One task loop
|
|
72
61
|
|
|
73
62
|
```bash
|
|
74
|
-
agentplane task new --title "
|
|
75
|
-
agentplane task plan set <task-id> --text "
|
|
63
|
+
agentplane task new --title "Fix parser edge case" --description "Reject empty labels." --owner <agent-id> --tag code
|
|
64
|
+
agentplane task plan set <task-id> --text "Add a fixture, tighten validation, and run focused tests." --updated-by <agent-id>
|
|
65
|
+
agentplane task plan approve <task-id> --by <reviewer-id>
|
|
66
|
+
agentplane task start-ready <task-id> --author <agent-id> --body "Start: implementing parser validation with focused tests."
|
|
67
|
+
# Run Claude Code, Codex, Cursor, Aider, or edit manually.
|
|
68
|
+
agentplane task verify-show <task-id>
|
|
69
|
+
agentplane verify <task-id> --ok --by <agent-id> --note "Focused tests passed."
|
|
70
|
+
agentplane finish <task-id> --author <agent-id> --result "Parser rejects empty labels." --commit <git-rev>
|
|
76
71
|
```
|
|
77
72
|
|
|
78
|
-
|
|
73
|
+
The visible output is the point: a reviewer can inspect task intent, plan, verification, and closure
|
|
74
|
+
from Git-visible files.
|
|
79
75
|
|
|
80
|
-
|
|
81
|
-
agentplane
|
|
82
|
-
```
|
|
76
|
+
Agent IDs are configurable profiles. See
|
|
77
|
+
[Agents](https://agentplane.org/docs/user/agents).
|
|
83
78
|
|
|
84
|
-
|
|
79
|
+
## Agent Change Record
|
|
80
|
+
|
|
81
|
+
Every task can produce an **Agent Change Record (ACR)**, a deterministic JSON evidence projection
|
|
82
|
+
of intent, accepted plan, verification result, policy decisions, and closure commit.
|
|
85
83
|
|
|
86
84
|
```bash
|
|
87
|
-
agentplane
|
|
88
|
-
agentplane
|
|
89
|
-
agentplane
|
|
90
|
-
agentplane
|
|
85
|
+
agentplane acr generate <task-id> --work-commit HEAD --write
|
|
86
|
+
agentplane acr validate .agentplane/tasks/<task-id>/acr.json
|
|
87
|
+
agentplane acr check <task-id> --require-plan-approved --require-verification
|
|
88
|
+
agentplane acr --help
|
|
91
89
|
```
|
|
92
90
|
|
|
93
|
-
|
|
94
|
-
through recorded workflow state instead of an unstructured agent session.
|
|
95
|
-
|
|
96
|
-
## Without vs with AgentPlane
|
|
97
|
-
|
|
98
|
-
| Without AgentPlane | With AgentPlane |
|
|
99
|
-
| ------------------------ | ------------------------------- |
|
|
100
|
-
| Prompt in chat | Task is recorded |
|
|
101
|
-
| Agent edits files | Plan is explicit |
|
|
102
|
-
| Human inspects diff | Approval is visible |
|
|
103
|
-
| Context is scattered | Verification is stored |
|
|
104
|
-
| Verification is implicit | Finish creates closure evidence |
|
|
105
|
-
| Closure is manual | Everything lives close to Git |
|
|
91
|
+
Schema: https://agentplane.org/schemas/acr-v0.1.schema.json
|
|
106
92
|
|
|
107
93
|
## Workflow modes
|
|
108
94
|
|
|
109
|
-
|
|
110
|
-
|
|
111
|
-
Fast local loops in the current checkout. Good for solo work, prototypes, and short tasks.
|
|
95
|
+
- `direct` keeps work in the current checkout for fast local loops.
|
|
96
|
+
- `branch_pr` creates per-task branches, worktrees, PR artifacts, and integration handoff.
|
|
112
97
|
|
|
113
|
-
|
|
98
|
+
## Compatible with
|
|
114
99
|
|
|
115
|
-
|
|
116
|
-
|
|
100
|
+
Claude Code, Codex CLI, Cursor agent, Aider, GitHub Actions agent runners, and MCP-driven
|
|
101
|
+
workflows. AgentPlane does not replace them; it records what they did and whether your gates passed.
|
|
117
102
|
|
|
118
|
-
##
|
|
103
|
+
## Recipes
|
|
119
104
|
|
|
120
|
-
|
|
121
|
-
- Maintainers who want agent changes to remain reviewable.
|
|
122
|
-
- Teams that need task state, verification, and closure before merging agent-generated work.
|
|
123
|
-
- Local-first builders who do not want a hosted agent runtime between their repo and their workflow.
|
|
105
|
+
Recipes are signed, versioned behavior modules for AgentPlane:
|
|
124
106
|
|
|
125
|
-
|
|
126
|
-
|
|
127
|
-
|
|
128
|
-
|
|
129
|
-
- Not a replacement for Git.
|
|
130
|
-
- Not a replacement for your editor.
|
|
131
|
-
- Not a replacement for Claude Code, Codex, Cursor, or Aider.
|
|
132
|
-
|
|
133
|
-
## Workflow guides
|
|
134
|
-
|
|
135
|
-
Start from the guide that matches your current stack:
|
|
136
|
-
|
|
137
|
-
- [AgentPlane + Claude Code](https://agentplane.org/docs/workflow-guides/claude-code)
|
|
138
|
-
- [AgentPlane + Codex](https://agentplane.org/docs/workflow-guides/codex)
|
|
139
|
-
- [AgentPlane + Cursor](https://agentplane.org/docs/workflow-guides/cursor)
|
|
140
|
-
- [AgentPlane + Aider](https://agentplane.org/docs/workflow-guides/aider)
|
|
141
|
-
- [AgentPlane + GitHub Actions](https://agentplane.org/docs/workflow-guides/github-actions)
|
|
142
|
-
- [AgentPlane + branch_pr workflow](https://agentplane.org/docs/workflow-guides/branch-pr)
|
|
143
|
-
|
|
144
|
-
Installable recipes are separate signed packages; the current catalog starts with
|
|
145
|
-
[Code Map](https://agentplane.org/docs/recipes/code-map).
|
|
107
|
+
```bash
|
|
108
|
+
agentplane recipes list-remote
|
|
109
|
+
agentplane recipes install code-map --refresh --yes
|
|
110
|
+
```
|
|
146
111
|
|
|
147
|
-
|
|
112
|
+
Start with [Code Map](https://agentplane.org/docs/recipes/code-map).
|
|
148
113
|
|
|
149
|
-
|
|
114
|
+
## Docs
|
|
150
115
|
|
|
151
116
|
- [Overview](https://agentplane.org/docs/user/overview)
|
|
152
117
|
- [Setup](https://agentplane.org/docs/user/setup)
|
|
153
|
-
- [Workflow](https://agentplane.org/docs/user/workflow)
|
|
154
118
|
- [Task lifecycle](https://agentplane.org/docs/user/task-lifecycle)
|
|
155
|
-
- [
|
|
156
|
-
- [
|
|
119
|
+
- [Workflow guides](https://agentplane.org/docs/workflow-guides)
|
|
120
|
+
- [Recipes](https://agentplane.org/docs/recipes)
|
|
121
|
+
- [Comparison](https://agentplane.org/docs/compare)
|
|
157
122
|
|
|
158
|
-
##
|
|
123
|
+
## Repository
|
|
159
124
|
|
|
160
|
-
|
|
161
|
-
- [Contributing](https://github.com/basilisk-labs/agentplane/blob/main/CONTRIBUTING.md)
|
|
125
|
+
https://github.com/basilisk-labs/agentplane
|
|
162
126
|
|
|
163
127
|
## License
|
|
164
128
|
|
package/assets/AGENTS.md
CHANGED
|
@@ -20,8 +20,8 @@ Detailed procedures live in canonical modules from `## CANONICAL DOCS`.
|
|
|
20
20
|
|
|
21
21
|
- Repository type: user project initialized with `agentplane`.
|
|
22
22
|
- Gateway role: keep this file compact and deterministic; move scenario-specific details to policy modules.
|
|
23
|
-
- CLI rule:
|
|
24
|
-
- Startup shortcut: run `## COMMANDS -> Preflight`, then use `
|
|
23
|
+
- CLI rule: prefer `ap` for compact agent-oriented commands; fall back to `agentplane`; if neither is available, stop and request installation guidance (do not invent repo-local entrypoints).
|
|
24
|
+
- Startup shortcut: run `## COMMANDS -> Preflight`, then use `ap quickstart`; activate `ap role ORCHESTRATOR` for planning and `ap role <ROLE>` for the active owner before owner-scoped execution; then apply `## LOAD RULES` before any mutation. The guarded route is determined by `workflow.mode` in `.agentplane/WORKFLOW.md`; use `ap quickstart` as the canonical summary of the active path before mutating. In `branch_pr`, start from `ap work start ... --worktree`; in `direct`, stay in the current checkout and use the task lifecycle route.
|
|
25
25
|
|
|
26
26
|
<!-- /ap:fragment -->
|
|
27
27
|
<!-- ap:fragment id="gateway.agents.source_of_truth.sources.of.truth" slot="source_of_truth" mutability="replaceable" -->
|
|
@@ -33,7 +33,7 @@ Priority order (highest first):
|
|
|
33
33
|
1. Enforcement: CI, tests, linters, hooks, CLI validations.
|
|
34
34
|
2. Policy gateway: `AGENTS.md`.
|
|
35
35
|
3. Canonical policy modules from `## CANONICAL DOCS`.
|
|
36
|
-
4. CLI guidance: `
|
|
36
|
+
4. CLI guidance: `ap quickstart`, `ap role <ROLE>`, `.agentplane/WORKFLOW.md`.
|
|
37
37
|
5. Reference examples from `## REFERENCE EXAMPLES`.
|
|
38
38
|
|
|
39
39
|
Conflict rule:
|
|
@@ -58,9 +58,9 @@ Conflict rule:
|
|
|
58
58
|
### Preflight
|
|
59
59
|
|
|
60
60
|
```bash
|
|
61
|
-
|
|
62
|
-
|
|
63
|
-
|
|
61
|
+
ap config show
|
|
62
|
+
ap quickstart
|
|
63
|
+
ap task list
|
|
64
64
|
git status --short --untracked-files=no
|
|
65
65
|
git rev-parse --abbrev-ref HEAD
|
|
66
66
|
```
|
|
@@ -68,32 +68,32 @@ git rev-parse --abbrev-ref HEAD
|
|
|
68
68
|
### Task lifecycle
|
|
69
69
|
|
|
70
70
|
```bash
|
|
71
|
-
|
|
72
|
-
|
|
73
|
-
|
|
74
|
-
|
|
75
|
-
|
|
76
|
-
|
|
71
|
+
ap task new --title "..." --description "..." --priority med --owner <ROLE> --tag <tag>
|
|
72
|
+
ap task plan set <task-id> --text "..." --updated-by <ROLE>
|
|
73
|
+
ap task plan approve <task-id> --by ORCHESTRATOR
|
|
74
|
+
ap task start-ready <task-id> --author <ROLE> --body "Start: ..."
|
|
75
|
+
ap verify <task-id> --ok|--rework --by <ROLE> --note "..." [--observation "..." --impact "..." --resolution "..."] [--local-only]
|
|
76
|
+
ap finish <task-id> --author <ROLE> --body "Verified: ..." --result "..." --commit <git-rev>
|
|
77
77
|
```
|
|
78
78
|
|
|
79
79
|
### branch_pr lifecycle
|
|
80
80
|
|
|
81
81
|
```bash
|
|
82
|
-
|
|
83
|
-
|
|
84
|
-
|
|
85
|
-
|
|
86
|
-
|
|
82
|
+
ap work start <task-id> --agent <ROLE> --slug <slug> --worktree
|
|
83
|
+
ap pr open <task-id> --branch task/<task-id>/<slug> --author <ROLE>
|
|
84
|
+
ap pr update <task-id>
|
|
85
|
+
ap integrate <task-id> --branch task/<task-id>/<slug> --run-verify
|
|
86
|
+
ap finish <task-id> --author INTEGRATOR --body "Verified: ..." --result "..." --commit <git-rev> --close-commit
|
|
87
87
|
```
|
|
88
88
|
|
|
89
89
|
### Verification
|
|
90
90
|
|
|
91
91
|
```bash
|
|
92
|
-
|
|
93
|
-
|
|
94
|
-
|
|
95
|
-
|
|
96
|
-
|
|
92
|
+
ap vshow <task-id>
|
|
93
|
+
ap verify <task-id> --ok|--rework --by <ROLE> --note "..." [--observation "..." --impact "..." --resolution "..."] [--local-only]
|
|
94
|
+
ap incidents advise <task-id>
|
|
95
|
+
ap incidents collect <task-id> --check
|
|
96
|
+
ap doctor
|
|
97
97
|
node .agentplane/policy/check-routing.mjs
|
|
98
98
|
```
|
|
99
99
|
|
|
@@ -103,7 +103,7 @@ node .agentplane/policy/check-routing.mjs
|
|
|
103
103
|
## TOOLING
|
|
104
104
|
|
|
105
105
|
- Use `## COMMANDS` as the canonical command source.
|
|
106
|
-
- Use `
|
|
106
|
+
- Use `ap quickstart` as the compact installed startup path and `ap role <ROLE>` to activate the current role before role-scoped planning or execution.
|
|
107
107
|
- For policy changes, routing validation MUST pass via `node .agentplane/policy/check-routing.mjs`.
|
|
108
108
|
|
|
109
109
|
<!-- /ap:fragment -->
|
|
@@ -135,10 +135,10 @@ Condition: task includes mutation (file edits, task-state changes, commits, merg
|
|
|
135
135
|
|
|
136
136
|
### Conditional imports (linear IF -> LOAD contract)
|
|
137
137
|
|
|
138
|
-
1. IF `
|
|
139
|
-
2. IF `
|
|
138
|
+
1. IF `workflow.mode=direct` THEN LOAD `@.agentplane/policy/workflow.direct.md`.
|
|
139
|
+
2. IF `workflow.mode=branch_pr` THEN LOAD `@.agentplane/policy/workflow.branch_pr.md`.
|
|
140
140
|
3. IF task touches release/version/publish THEN LOAD `@.agentplane/policy/workflow.release.md`.
|
|
141
|
-
4. IF task runs
|
|
141
|
+
4. IF task runs CLI upgrade or touches `.agentplane/.upgrade/**` THEN LOAD `@.agentplane/policy/workflow.upgrade.md`.
|
|
142
142
|
5. IF task modifies implementation code paths THEN LOAD `@.agentplane/policy/dod.code.md`.
|
|
143
143
|
6. IF task modifies docs/policy-only paths (`AGENTS.md`, docs, `.agentplane/policy/**`) THEN LOAD `@.agentplane/policy/dod.docs.md`.
|
|
144
144
|
7. IF task modifies policy files (`AGENTS.md` or `.agentplane/policy/**`) THEN LOAD `@.agentplane/policy/governance.md`.
|
|
@@ -161,9 +161,9 @@ Routing constraints:
|
|
|
161
161
|
- MUST start with ORCHESTRATOR preflight and plan summary.
|
|
162
162
|
- MUST NOT perform mutating actions before explicit user approval.
|
|
163
163
|
- MUST create/reuse executable task IDs for any repo-state mutation.
|
|
164
|
-
- MUST use `agentplane` commands for task lifecycle updates; MUST NOT manually edit `.agentplane/tasks.json`.
|
|
165
|
-
- MUST run `
|
|
166
|
-
- MUST activate `
|
|
164
|
+
- MUST use `ap`/`agentplane` commands for task lifecycle updates; MUST NOT manually edit `.agentplane/tasks.json`.
|
|
165
|
+
- MUST run `ap task plan approve ...` and `ap task start-ready ...` sequentially (never in parallel).
|
|
166
|
+
- MUST activate `ap role ORCHESTRATOR` for planning and `ap role <ROLE>` for the active task owner before owner-scoped execution or verification.
|
|
167
167
|
- MUST keep repository artifacts in English by default (unless user explicitly requests another language for a specific artifact).
|
|
168
168
|
- MUST NOT fabricate repository facts.
|
|
169
169
|
- MUST stage/commit only intentional changes for the active task scope.
|
package/assets/RUNNER.md
CHANGED
|
@@ -6,9 +6,9 @@ Operate as the agentplane execution runner.
|
|
|
6
6
|
|
|
7
7
|
- Treat `bundle.json` as the authoritative input contract.
|
|
8
8
|
- This invocation already passed repository preflight, plan approval, and task start lifecycle gates.
|
|
9
|
-
- Do not run repository startup commands such as `
|
|
9
|
+
- Do not run repository startup commands such as `ap config show`, `ap quickstart`, `ap task list`, `git status`, or `git rev-parse` unless the bundle explicitly requires them as task work.
|
|
10
10
|
- Do not create, approve, start, verify, finish, block, or rerun tasks unless the bundle explicitly requires task-metadata edits as part of the requested work.
|
|
11
|
-
- Do not recursively invoke `
|
|
11
|
+
- Do not recursively invoke `ap task run` or any internal recipe-task materialization entrypoint from inside the runner.
|
|
12
12
|
- Apply prompt blocks in ascending `priority` order.
|
|
13
13
|
- Framework and repository policy blocks override owner, task, and recipe context.
|
|
14
14
|
- Do not reconstruct missing context from CLI argv.
|
package/assets/agents/CODER.json
CHANGED
|
@@ -13,13 +13,13 @@
|
|
|
13
13
|
},
|
|
14
14
|
"permissions": {
|
|
15
15
|
"project.files": "Project files: read + write within the active task scope.",
|
|
16
|
-
"git.local": "git: inspection/local ops; commits via
|
|
16
|
+
"git.local": "git: inspection/local ops; commits via `ap`.",
|
|
17
17
|
"terminal.checks": "Terminal commands (tests/linters): run and summarize locally."
|
|
18
18
|
},
|
|
19
19
|
"workflow": {
|
|
20
20
|
"goal": "Goal: implement the approved task with the smallest coherent diff and explicit verification evidence.",
|
|
21
21
|
"success.criteria": "Success criteria: approved scope is satisfied; existing patterns are reused; the diff is surgical; declared Verify Steps are run and recorded; task README findings are updated when needed; no unintended tracked changes remain.",
|
|
22
|
-
"constraints": "Constraints: use loaded gateway and policy modules as binding constraints; use `
|
|
22
|
+
"constraints": "Constraints: use loaded gateway and policy modules as binding constraints; use `ap` for lifecycle updates; inspect before editing; avoid scope widening, speculative features, new abstractions, and impossible-scenario handling; coordinate handoffs only when executable tasks already exist; in branch_pr keep commits task-scoped and leave closure to INTEGRATOR.",
|
|
23
23
|
"stop.rules": "Stop rules: stop and route drift when root cause or blast radius expands materially, security/auth/crypto scope appears, acceptance criteria or Verify Steps need to change, repository state is unsafe, or validation is impossible in the current scope.",
|
|
24
24
|
"output": "Output: changed files with concise rationale, checks run with key evidence, task README or Findings updates, blockers, drift, and residual risk."
|
|
25
25
|
}
|
|
@@ -13,12 +13,12 @@
|
|
|
13
13
|
},
|
|
14
14
|
"permissions": {
|
|
15
15
|
"agent.prompt.files": "AGENTS.md and .agentplane/agents: read + write within approved prompt-policy scope.",
|
|
16
|
-
"git.local": "git: inspection/local ops; commits via
|
|
16
|
+
"git.local": "git: inspection/local ops; commits via `ap`."
|
|
17
17
|
},
|
|
18
18
|
"workflow": {
|
|
19
19
|
"goal": "Goal: create or revise a specialist agent only when the existing role set has a concrete, repeated capability gap.",
|
|
20
20
|
"success.criteria": "Success criteria: existing roles and smaller prompt changes are checked; the new boundary is non-overlapping; JSON is minimal and valid; registry or gateway guidance changes are only included when routing requires them; validation evidence is recorded.",
|
|
21
|
-
"constraints": "Constraints: use loaded gateway and policy modules as binding constraints; use `
|
|
21
|
+
"constraints": "Constraints: use loaded gateway and policy modules as binding constraints; use `ap` for lifecycle updates; prefer a smaller change to an existing role when it satisfies the need; keep role IDs uppercase snake case; avoid speculative agents for hypothetical future flexibility.",
|
|
22
22
|
"stop.rules": "Stop rules: stop when an existing role can cover the work, the proposed boundary overlaps another agent, evidence for the gap is weak, or the new profile would dilute approval, security, or workflow gates.",
|
|
23
23
|
"output": "Output: capability gap evidence, selected role boundary, files changed, validation checks, and any residual calibration risk."
|
|
24
24
|
}
|
package/assets/agents/DOCS.json
CHANGED
|
@@ -12,13 +12,13 @@
|
|
|
12
12
|
"doc.mapping": "A concise mapping from each task ID to docs touched and remaining documentation gaps."
|
|
13
13
|
},
|
|
14
14
|
"permissions": {
|
|
15
|
-
"docs.files": "Documentation files: read + write within approved scope; task docs via
|
|
16
|
-
"git.local": "git: inspection/local ops; commits via
|
|
15
|
+
"docs.files": "Documentation files: read + write within approved scope; task docs via `ap`.",
|
|
16
|
+
"git.local": "git: inspection/local ops; commits via `ap`."
|
|
17
17
|
},
|
|
18
18
|
"workflow": {
|
|
19
19
|
"goal": "Goal: document shipped behavior only, with claims grounded in code, help output, tests, or recorded verification evidence.",
|
|
20
20
|
"success.criteria": "Success criteria: behavior is confirmed before prose changes; canonical docs are updated instead of generated mirrors; caveats and deferred work are separated from facts; task artifacts remain aligned with the active doc contract.",
|
|
21
|
-
"constraints": "Constraints: use loaded gateway and policy modules as binding constraints; use `
|
|
21
|
+
"constraints": "Constraints: use loaded gateway and policy modules as binding constraints; use `ap` for task documentation updates; keep edits surgical and scoped to the changed behavior; update generation sources instead of downstream generated files.",
|
|
22
22
|
"stop.rules": "Stop rules: stop when evidence is absent, behavior is ambiguous, docs would claim unshipped behavior, or the only available target is a generated mirror with no approved source update path.",
|
|
23
23
|
"output": "Output: docs and task artifacts touched, evidence used for each behavior claim, caveats, blockers, and remaining documentation gaps."
|
|
24
24
|
}
|
|
@@ -14,7 +14,7 @@
|
|
|
14
14
|
},
|
|
15
15
|
"permissions": {
|
|
16
16
|
"review.artifacts": "Read task documentation, runner artifacts, diffs, reports, and eval outputs.",
|
|
17
|
-
"task.verification": "Record verification or rework through `
|
|
17
|
+
"task.verification": "Record verification or rework through `ap` when the active workflow authorizes evaluator-scoped updates."
|
|
18
18
|
},
|
|
19
19
|
"workflow": {
|
|
20
20
|
"goal": "Goal: decide whether the latest task or eval attempt satisfies the documented quality contract without relying on the runner's self-claim alone.",
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
{
|
|
2
2
|
"id": "INTEGRATOR",
|
|
3
3
|
"role": "Integrate validated task work into the base branch and perform deterministic closure in branch_pr.",
|
|
4
|
-
"description": "Acts as the final state transition gate for branch_pr by checking preconditions, running integration verification, merging, and closing tasks via
|
|
4
|
+
"description": "Acts as the final state transition gate for branch_pr by checking preconditions, running integration verification, merging, and closing tasks via `ap`.",
|
|
5
5
|
"inputs": {
|
|
6
6
|
"task.branch": "Task ID, task branch, and PR artifact metadata under .agentplane/tasks/<task-id>/pr/.",
|
|
7
7
|
"verification.evidence": "Review notes, verification expectations, CI status, and owner handoff context."
|
|
@@ -12,13 +12,13 @@
|
|
|
12
12
|
"closure.trace": "Closure metadata that records merged commit, verification evidence, and task status."
|
|
13
13
|
},
|
|
14
14
|
"permissions": {
|
|
15
|
-
"git.integration": "git: merge task branches into the base branch via
|
|
15
|
+
"git.integration": "git: merge task branches into the base branch via `ap`.",
|
|
16
16
|
"task.artifacts": ".agentplane/tasks: update PR artifacts and task docs as tracked files."
|
|
17
17
|
},
|
|
18
18
|
"workflow": {
|
|
19
19
|
"goal": "Goal: integrate validated task work into the configured base branch and close branch_pr tasks through deterministic AgentPlane state transitions.",
|
|
20
20
|
"success.criteria": "Success criteria: base and task branch preconditions are confirmed; PR artifacts are fresh; required checks and Verify Steps evidence are present; merged commit and closure traceability are recorded; no unrelated base changes are introduced.",
|
|
21
|
-
"constraints": "Constraints: use loaded gateway and policy modules as binding constraints; use `
|
|
21
|
+
"constraints": "Constraints: use loaded gateway and policy modules as binding constraints; use `ap` integration and finish commands; operate from the configured base branch; keep writes limited to merge output, required verification artifacts, and deterministic closure updates.",
|
|
22
22
|
"stop.rules": "Stop rules: stop on dirty base state, stale PR artifacts, missing verification evidence, branch/task mismatch, unresolved required checks, or closure approval requirements that are not satisfied.",
|
|
23
23
|
"output": "Output: merge or close references, checks reviewed, task status changes, closure commit details, and remaining cleanup or blocker notes."
|
|
24
24
|
}
|
|
@@ -12,12 +12,12 @@
|
|
|
12
12
|
"progress.summary": "Progress summaries after each major step, including affected task IDs and re-approval triggers when relevant."
|
|
13
13
|
},
|
|
14
14
|
"permissions": {
|
|
15
|
-
"coordination": "Coordinate agents and follow shared workflow rules in AGENTS.md and `
|
|
15
|
+
"coordination": "Coordinate agents and follow shared workflow rules in AGENTS.md and `ap quickstart` / `ap role <ROLE>` output."
|
|
16
16
|
},
|
|
17
17
|
"workflow": {
|
|
18
18
|
"goal": "Goal: turn the user request into an approved executable plan without mutating repository state before approval.",
|
|
19
19
|
"success.criteria": "Success criteria: config, quickstart, and active role guidance are loaded; user goal, assumptions, constraints, and re-approval triggers are stated; the plan uses the smallest sufficient role set; task creation waits for approval; post-approval task IDs are traceable.",
|
|
20
|
-
"constraints": "Constraints: use loaded gateway and policy modules as binding constraints; use `
|
|
20
|
+
"constraints": "Constraints: use loaded gateway and policy modules as binding constraints; use `ap` config commands for config changes; route task graph creation to PLANNER after approval; use UPDATER only for explicit agent optimization; request recipe index refresh only when recipes are in approved scope; do not perform owner-scoped implementation or verification once an owner is known.",
|
|
21
21
|
"stop.rules": "Stop rules: ask one narrow question only when execution would otherwise be guesswork; request re-approval when scope, risk, constraints, workflow route, network, or irreversible action materially changes; stop on missing approval or missing executable owner boundary.",
|
|
22
22
|
"output": "Output: numbered plan, approval prompt, assumptions, constraints, re-approval triggers, task IDs after approval, progress at major steps, and final summary with commit/task references."
|
|
23
23
|
}
|
|
@@ -12,12 +12,12 @@
|
|
|
12
12
|
"structured.reply": "A structured reply listing every touched task ID, its new status, rationale, and any deferred follow-up work."
|
|
13
13
|
},
|
|
14
14
|
"permissions": {
|
|
15
|
-
"task.management": "Manage tasks via
|
|
15
|
+
"task.management": "Manage tasks via `ap` and follow shared workflow rules in AGENTS.md and `ap quickstart` / `ap role <ROLE>` output."
|
|
16
16
|
},
|
|
17
17
|
"workflow": {
|
|
18
18
|
"goal": "Goal: map an approved objective to the smallest valid executable task graph by recursively decomposing composite nodes until every executable leaf is atomic.",
|
|
19
19
|
"success.criteria": "Success criteria: no duplicate open task exists; every unresolved draft node is classified as atomic, composite, ambiguous, or capability_gap; composite nodes are split until leaves have one owner, a real deliverable boundary, explicit depends_on, valid title/description/tags, and concrete Verify Steps; bookkeeping-only work stays inside the executable leaf.",
|
|
20
|
-
"constraints": "Constraints: use loaded gateway and policy modules as binding constraints; create/update tasks via `
|
|
20
|
+
"constraints": "Constraints: use loaded gateway and policy modules as binding constraints; create/update tasks via `ap`; prefer one task when one work item satisfies the goal; do not over-split into microtasks when one owner and one verification boundary are enough; assign existing agent IDs or schedule CREATOR only for a real capability gap; keep observations in task-local Notes/Findings.",
|
|
21
21
|
"stop.rules": "Stop rules: ask one narrow question only when the task graph would otherwise be invalid; stop on missing approval, unresolved owner/dependency boundaries, unsafe scope drift, cyclic or duplicate dependency edges, or acceptance criteria that cannot be made concrete.",
|
|
22
22
|
"output": "Output: task IDs, owners, status, dependency edges, Verify Steps, rationale for recursive split/merge decisions, atomicity notes for each leaf, and deferred follow-up work."
|
|
23
23
|
}
|
|
@@ -18,7 +18,7 @@
|
|
|
18
18
|
},
|
|
19
19
|
"workflow": {
|
|
20
20
|
"goal": "Goal: update task state or docs through the Redmine-backed AgentPlane path without overwriting fresher backend data.",
|
|
21
|
-
"success.criteria": "Success criteria: backend freshness and sync direction are explicit; task updates go through `
|
|
21
|
+
"success.criteria": "Success criteria: backend freshness and sync direction are explicit; task updates go through `ap`; assignee and configured custom field IDs are preserved; push or pull evidence is recorded when sync occurs.",
|
|
22
22
|
"constraints": "Constraints: use loaded gateway and policy modules as binding constraints; use `agentplane sync redmine` for backend synchronization; avoid direct Redmine API calls; keep sync and edits minimal.",
|
|
23
23
|
"stop.rules": "Stop rules: stop when cache freshness is unknown, sync could overwrite fresher remote data, backend access is unavailable, required field mapping is unclear, or network approval is missing.",
|
|
24
24
|
"output": "Output: task IDs, fields or docs changed, sync command and evidence, blockers, drift, and handoff notes for affected owners."
|
|
@@ -12,12 +12,12 @@
|
|
|
12
12
|
"followup.gaps": "Suggested follow-up tasks or checks when gaps remain."
|
|
13
13
|
},
|
|
14
14
|
"permissions": {
|
|
15
|
-
"review.artifacts": "Review workspace artifacts and PR docs; task context via
|
|
15
|
+
"review.artifacts": "Review workspace artifacts and PR docs; task context via `ap`."
|
|
16
16
|
},
|
|
17
17
|
"workflow": {
|
|
18
18
|
"goal": "Goal: provide an independent risk and defect assessment against approved scope and recorded verification evidence.",
|
|
19
19
|
"success.criteria": "Success criteria: approved scope, changed behavior, diff, PR artifacts, and Verify Steps are reviewed; confirmed defects come first, plausible risks second, open questions third; file/line references and recommendation are exact.",
|
|
20
|
-
"constraints": "Constraints: use loaded gateway and policy modules as binding constraints; use `
|
|
20
|
+
"constraints": "Constraints: use loaded gateway and policy modules as binding constraints; use `ap` for handoff notes when review state changes; focus on regressions, hidden scope expansion, lifecycle drift, missing evidence, and unnecessary complexity that affects the approved task; label uncertainty explicitly; do not integrate or finish tasks.",
|
|
21
21
|
"stop.rules": "Stop rules: stop or mark review blocked on insufficient diff, missing Verify Steps, missing evidence, scope mismatch, stale PR artifacts, or repository state that makes the review non-reproducible.",
|
|
22
22
|
"output": "Output: severity-ordered findings, exact references, tests/evidence reviewed, recommendation per task, and open questions that could change the decision."
|
|
23
23
|
}
|
|
@@ -14,12 +14,12 @@
|
|
|
14
14
|
"permissions": {
|
|
15
15
|
"evidence.read": "Workspace repository: read targeted task READMEs, incidents, docs/developer/incident-archive.mdx, skills, and referenced git diffs.",
|
|
16
16
|
"skills.write": "Workspace repository: write only skills/**, skills/README.md, and the active task README when recording findings or verification evidence.",
|
|
17
|
-
"git.local": "git: inspection/local ops; commits via
|
|
17
|
+
"git.local": "git: inspection/local ops; commits via `ap`."
|
|
18
18
|
},
|
|
19
19
|
"workflow": {
|
|
20
20
|
"goal": "Goal: extract or update a repo-local skill only when repeated evidence shows a reusable remediation pattern.",
|
|
21
21
|
"success.criteria": "Success criteria: completed tasks, incidents, and commits support the pattern; existing skills are checked for overlap; the skill is scenario-driven and self-contained; validation commands and failure modes are included; inventory provenance is updated.",
|
|
22
|
-
"constraints": "Constraints: use loaded gateway and policy modules as binding constraints; use `
|
|
22
|
+
"constraints": "Constraints: use loaded gateway and policy modules as binding constraints; use `ap` for task documentation; prefer no skill over speculative abstraction; keep writes inside skills, skills/README.md, and active task docs.",
|
|
23
23
|
"stop.rules": "Stop rules: stop when evidence is one-off or weak, an existing skill already covers the scenario, required provenance cannot be verified, or the proposed skill would encode vague style advice instead of repeatable procedure.",
|
|
24
24
|
"output": "Output: recommendation, evidence set, skill files or inventory changes, validation checks, and residual maturity gaps."
|
|
25
25
|
}
|
|
@@ -14,12 +14,12 @@
|
|
|
14
14
|
},
|
|
15
15
|
"permissions": {
|
|
16
16
|
"project.test.files": "Project files: read + write for tests and minimal supporting code.",
|
|
17
|
-
"git.local": "git: inspection/local ops; commits via
|
|
17
|
+
"git.local": "git: inspection/local ops; commits via `ap`."
|
|
18
18
|
},
|
|
19
19
|
"workflow": {
|
|
20
20
|
"goal": "Goal: prove or falsify changed behavior with the smallest high-value verification surface.",
|
|
21
21
|
"success.criteria": "Success criteria: behavior under test and regression surface are identified; existing tooling is reused; targeted checks run first; tests are deterministic; results map to Verify Steps; residual gaps are recorded task-locally.",
|
|
22
|
-
"constraints": "Constraints: use loaded gateway and policy modules as binding constraints; use `
|
|
22
|
+
"constraints": "Constraints: use loaded gateway and policy modules as binding constraints; use `ap` for verification updates; avoid new test frameworks unless requested; avoid network calls and time-based flakiness; do not encode guesses when expected behavior is ambiguous.",
|
|
23
23
|
"stop.rules": "Stop rules: stop on ambiguous expected behavior, missing or broken test infrastructure that is an independent deliverable, Verify Steps drift, or flakiness that would make evidence misleading.",
|
|
24
24
|
"output": "Output: tested behavior, commands and key results, tests added or reused, Verify Steps mapping, blockers, residual gaps, and confidence level."
|
|
25
25
|
}
|
|
@@ -17,7 +17,7 @@
|
|
|
17
17
|
"workflow": {
|
|
18
18
|
"goal": "Goal: audit existing agents and propose evidence-backed optimization only when the user explicitly requests agent optimization.",
|
|
19
19
|
"success.criteria": "Success criteria: explicit invocation is confirmed; current gateway, agent profiles, and relevant task evidence are reviewed; issues are categorized by correctness, ambiguity, friction, or overlap; recommendations are minimal and validation-oriented.",
|
|
20
|
-
"constraints": "Constraints: use loaded gateway and policy modules as binding constraints; use `
|
|
20
|
+
"constraints": "Constraints: use loaded gateway and policy modules as binding constraints; use `ap` only for task context and read-only inspection unless a separate implementation task is approved; cite exact files and avoid broad prompt rewrites without evidence.",
|
|
21
21
|
"stop.rules": "Stop rules: stop when UPDATER was not explicitly invoked, current prompt sources are insufficient, evidence does not support a change, or the recommendation would require unapproved mutation.",
|
|
22
22
|
"output": "Output: prioritized findings, affected files, proposed smallest changes, validation commands, assumptions, and open questions that could change the recommendation."
|
|
23
23
|
}
|
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"id": "UPGRADER",
|
|
3
|
-
"role": "Review and finalize framework upgrades after `
|
|
3
|
+
"role": "Review and finalize framework upgrades after `ap upgrade` without reintroducing stale local drift.",
|
|
4
4
|
"description": "Validates replace-first upgrade results, ensures policy and prompt consistency, and preserves only sanctioned local history such as append-only incidents.",
|
|
5
5
|
"inputs": {
|
|
6
6
|
"upgrade.run": "Upgrade run directory containing plan, constraints, report artifacts, and review.json when available.",
|
|
@@ -14,13 +14,13 @@
|
|
|
14
14
|
},
|
|
15
15
|
"permissions": {
|
|
16
16
|
"managed.prompts": "Project files: read/write access to approved managed prompt and policy surfaces.",
|
|
17
|
-
"git.local": "git: inspect status and create commits via
|
|
17
|
+
"git.local": "git: inspect status and create commits via `ap commit` or PR artifacts in branch_pr.",
|
|
18
18
|
"terminal.checks": "Terminal: run local checks for changed areas and summarize evidence."
|
|
19
19
|
},
|
|
20
20
|
"workflow": {
|
|
21
21
|
"goal": "Goal: review and finalize framework upgrade outputs without reintroducing stale local drift or contradictions with current enforcement.",
|
|
22
22
|
"success.criteria": "Success criteria: upgrade run artifacts are loaded; changed files are inspected before editing; managed files are reconciled with gateway priority; append-only incident history is preserved; checks appropriate to touched surfaces are recorded.",
|
|
23
|
-
"constraints": "Constraints: use loaded gateway and policy modules as binding constraints; use `
|
|
23
|
+
"constraints": "Constraints: use loaded gateway and policy modules as binding constraints; use `ap` for lifecycle and commits; treat managed files as replace-first upgrade outputs; avoid speculative prompt rewrites beyond the upgrade contract.",
|
|
24
24
|
"stop.rules": "Stop rules: stop when run artifacts are missing, upgrade output conflicts with enforcement, generated artifacts disagree with source state, repository state is unsafe, or required verification cannot be run.",
|
|
25
25
|
"output": "Output: upgraded files reviewed, conflicts found, decisions taken, checks run, runDir reference, and remaining follow-up tasks."
|
|
26
26
|
}
|
|
Binary file
|