agents-templated 1.2.7 → 1.2.9
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +40 -9
- package/bin/cli.js +5 -3
- package/package.json +1 -1
- package/templates/.github/copilot-instructions.md +11 -3
- package/templates/AGENTS.MD +579 -2
- package/templates/CLAUDE.md +13 -4
- package/templates/GEMINI.md +15 -6
- package/templates/README.md +13 -4
- package/templates/agent-docs/ARCHITECTURE.md +1 -1
- package/templates/agent-docs/README.md +2 -2
- package/templates/agents/commands/README.md +24 -0
- package/templates/agents/commands/SCHEMA.md +22 -0
- package/templates/agents/commands/audit.md +38 -0
- package/templates/agents/commands/docs.md +34 -0
- package/templates/agents/commands/fix.md +34 -0
- package/templates/agents/commands/perf.md +34 -0
- package/templates/agents/commands/plan.md +34 -0
- package/templates/agents/commands/pr.md +35 -0
- package/templates/agents/commands/refactor.md +34 -0
- package/templates/agents/commands/release.md +39 -0
- package/templates/agents/commands/scaffold.md +34 -0
- package/templates/agents/commands/task.md +35 -0
- package/templates/agents/commands/test.md +34 -0
- package/templates/agents/rules/hardening.mdc +52 -0
- package/templates/agents/rules/intent-routing.mdc +45 -0
- package/templates/agents/rules/security.mdc +9 -1
- package/templates/agents/rules/system-workflow.mdc +63 -0
- package/templates/agents/rules/testing.mdc +14 -1
- package/templates/agents/rules/workflows.mdc +7 -0
- package/templates/agents/skills/README.md +15 -1
- package/templates/agents/skills/app-hardening/SKILL.md +45 -0
- package/templates/agents/skills/bug-triage/SKILL.md +36 -0
- package/templates/agents/skills/feature-delivery/SKILL.md +38 -0
|
@@ -0,0 +1,63 @@
|
|
|
1
|
+
---
|
|
2
|
+
title: "System Workflow Orchestration"
|
|
3
|
+
description: "Lifecycle gates and required artifacts for systematic delivery"
|
|
4
|
+
version: "1.0.0"
|
|
5
|
+
tags: ["workflow", "gates", "delivery", "governance"]
|
|
6
|
+
---
|
|
7
|
+
|
|
8
|
+
## Purpose
|
|
9
|
+
|
|
10
|
+
Define a repeatable lifecycle so all work is traceable, verifiable, and releasable.
|
|
11
|
+
|
|
12
|
+
## Workflow Phases
|
|
13
|
+
|
|
14
|
+
1. Discover
|
|
15
|
+
2. Plan
|
|
16
|
+
3. Implement
|
|
17
|
+
4. Verify
|
|
18
|
+
5. Release
|
|
19
|
+
|
|
20
|
+
## Phase Requirements
|
|
21
|
+
|
|
22
|
+
### 1) Discover
|
|
23
|
+
- Capture objective, scope boundaries, constraints, and risk profile.
|
|
24
|
+
- Produce: context summary + assumptions.
|
|
25
|
+
|
|
26
|
+
### 2) Plan
|
|
27
|
+
- Break work into atomic units and dependency order.
|
|
28
|
+
- Define acceptance criteria and rollback considerations.
|
|
29
|
+
- Produce: execution plan with checkpoints.
|
|
30
|
+
|
|
31
|
+
### 3) Implement
|
|
32
|
+
- Apply smallest safe changes within declared scope.
|
|
33
|
+
- Keep changes deterministic and reversible when possible.
|
|
34
|
+
- Produce: change summary and affected files.
|
|
35
|
+
|
|
36
|
+
### 4) Verify
|
|
37
|
+
- Run relevant tests/checks (targeted first, broad second).
|
|
38
|
+
- Confirm security and regression impact.
|
|
39
|
+
- Produce: validation evidence.
|
|
40
|
+
|
|
41
|
+
### 5) Release
|
|
42
|
+
- Check gates: tests, security posture, migration safety, rollback readiness.
|
|
43
|
+
- Produce: release decision + rollout/rollback steps.
|
|
44
|
+
|
|
45
|
+
## Required Delivery Artifacts
|
|
46
|
+
|
|
47
|
+
- Objective and scope
|
|
48
|
+
- Acceptance criteria
|
|
49
|
+
- Risk register
|
|
50
|
+
- Validation evidence
|
|
51
|
+
- Rollback strategy (for non-trivial changes)
|
|
52
|
+
|
|
53
|
+
## Gate Rules
|
|
54
|
+
|
|
55
|
+
- Fail any critical gate -> `status: blocked`.
|
|
56
|
+
- Missing rollback for risky changes -> blocked.
|
|
57
|
+
- Missing validation evidence -> blocked.
|
|
58
|
+
|
|
59
|
+
## Rollback Requirements
|
|
60
|
+
|
|
61
|
+
- Identify rollback trigger conditions.
|
|
62
|
+
- Provide explicit rollback steps.
|
|
63
|
+
- Keep backups/version references for destructive changes.
|
|
@@ -253,6 +253,19 @@ Test: Database query optimization
|
|
|
253
253
|
- Measure execution time
|
|
254
254
|
- Assert completes efficiently
|
|
255
255
|
|
|
256
|
+
## Hardening Verification Testing
|
|
257
|
+
|
|
258
|
+
When hardening/obfuscation is enabled (see `agents/rules/hardening.mdc`), require additional validation on hardened artifacts.
|
|
259
|
+
|
|
260
|
+
### Required Checks for Hardened Builds
|
|
261
|
+
|
|
262
|
+
- Run core functional regression tests against hardened output, not only non-hardened builds.
|
|
263
|
+
- Run performance checks and compare against accepted budgets (startup, latency, memory as applicable).
|
|
264
|
+
- Validate crash/debug workflow with restricted symbol/mapping artifact access controls.
|
|
265
|
+
- Confirm release evidence includes hardening profile rationale and rollback trigger/steps.
|
|
266
|
+
|
|
267
|
+
If these checks are missing for a hardening-required profile, release readiness should be treated as blocked.
|
|
268
|
+
|
|
256
269
|
## Security Testing
|
|
257
270
|
|
|
258
271
|
Test security requirements and threat scenarios.
|
|
@@ -355,4 +368,4 @@ tests/
|
|
|
355
368
|
|
|
356
369
|
Remember: **Tests are documentation** of how your code should behave.
|
|
357
370
|
Write clear, concise tests that describe expected behavior.
|
|
358
|
-
Good tests make refactoring and maintenance easier and reduce bugs in production.
|
|
371
|
+
Good tests make refactoring and maintenance easier and reduce bugs in production.
|
|
@@ -34,6 +34,12 @@ Before committing, consider running (in order):
|
|
|
34
34
|
3. **Tests** – At least the fast test suite (e.g. unit tests) so regressions are caught early.
|
|
35
35
|
4. **Project validation** – For agents-templated projects, `agents-templated validate` can confirm setup is intact.
|
|
36
36
|
|
|
37
|
+
For high-risk or distributed-client releases, add hardening-specific checks before merge/release:
|
|
38
|
+
|
|
39
|
+
5. **Hardening profile selection** – Document threat model and selected profile from `agents/rules/hardening.mdc`.
|
|
40
|
+
6. **Post-hardening verification** – Run functional regression and performance checks on hardened artifacts.
|
|
41
|
+
7. **Artifact controls** – Verify restricted handling for symbol/mapping/debug artifacts and confirm rollback path.
|
|
42
|
+
|
|
37
43
|
Do not commit with failing lint or tests unless the user explicitly requests a WIP commit (e.g. with `--no-verify` or a clear “work in progress” message).
|
|
38
44
|
|
|
39
45
|
## Commit Messages
|
|
@@ -46,4 +52,5 @@ Do not commit with failing lint or tests unless the user explicitly requests a W
|
|
|
46
52
|
|
|
47
53
|
- Use **agents-templated validate** and **doctor** to maintain project setup and get recommendations.
|
|
48
54
|
- Run **lint**, **type check**, and **tests** before committing when possible.
|
|
55
|
+
- For hardening-required releases, include profile rationale, post-hardening verification evidence, and rollback readiness.
|
|
49
56
|
- Write clear commit messages and reference issues where applicable.
|
|
@@ -57,6 +57,14 @@ To create a new skill for your specific domain:
|
|
|
57
57
|
agents/skills/
|
|
58
58
|
├── find-skills/
|
|
59
59
|
│ └── SKILL.md # Meta-skill for discovering skills
|
|
60
|
+
├── feature-delivery/
|
|
61
|
+
│ └── SKILL.md # Systematic feature scoping and execution contracts
|
|
62
|
+
├── bug-triage/
|
|
63
|
+
│ └── SKILL.md # Reproduction-first debugging and regression workflows
|
|
64
|
+
├── app-hardening/
|
|
65
|
+
│ └── SKILL.md # Risk-based hardening and obfuscation guidance
|
|
66
|
+
├── ui-ux-pro-max/
|
|
67
|
+
│ └── SKILL.md # Premium UI/UX implementation patterns
|
|
60
68
|
├── my-custom-skill/
|
|
61
69
|
│ └── SKILL.md # Your custom skill
|
|
62
70
|
└── README.md # This file
|
|
@@ -84,6 +92,12 @@ Consider creating skills for:
|
|
|
84
92
|
| Design | UI/UX, accessibility, design systems |
|
|
85
93
|
| Productivity | Workflows, automation, git patterns |
|
|
86
94
|
|
|
95
|
+
## Recommended Baseline Skills
|
|
96
|
+
|
|
97
|
+
- `feature-delivery`: Use when user asks are broad and you need objective, scope, acceptance criteria, and validation plan.
|
|
98
|
+
- `bug-triage`: Use for defects and regressions requiring reproducible evidence, root-cause isolation, and minimal safe patches.
|
|
99
|
+
- `app-hardening`: Use for high-risk/distributed runtimes to enforce hardening profile, obfuscation decisions, and release evidence.
|
|
100
|
+
|
|
87
101
|
## Using Skills in Your Project
|
|
88
102
|
|
|
89
103
|
Skills can be referenced in all your AI assistant configuration files:
|
|
@@ -112,7 +126,7 @@ Reference the [skill-name] skill in `agents/skills/[skill-name]/SKILL.md` for pa
|
|
|
112
126
|
When helping with [domain-specific task], reference the [skill-name] skill from `agents/skills/[skill-name]/SKILL.md`
|
|
113
127
|
```
|
|
114
128
|
|
|
115
|
-
### Documentation (`AGENTS.
|
|
129
|
+
### Documentation (`AGENTS.MD`)
|
|
116
130
|
```markdown
|
|
117
131
|
- When working with [domain], see the [skill-name] skill in `agents/skills/[skill-name]/SKILL.md`
|
|
118
132
|
```
|
|
@@ -0,0 +1,45 @@
|
|
|
1
|
+
---
|
|
2
|
+
name: app-hardening
|
|
3
|
+
description: Applies risk-based application hardening guidance including obfuscation decisions, integrity controls, and release evidence.
|
|
4
|
+
---
|
|
5
|
+
|
|
6
|
+
# App Hardening
|
|
7
|
+
|
|
8
|
+
Use this skill for security hardening of distributed applications and sensitive client-side logic.
|
|
9
|
+
|
|
10
|
+
## Trigger Conditions
|
|
11
|
+
|
|
12
|
+
- User asks for hardening, anti-tamper, reverse-engineering resistance, or secure release posture.
|
|
13
|
+
- Project includes mobile/desktop/browser-delivered code with high-value logic.
|
|
14
|
+
|
|
15
|
+
## Decision Matrix
|
|
16
|
+
|
|
17
|
+
Apply hardening when:
|
|
18
|
+
- Threat model includes tampering/repackaging/hooking, or
|
|
19
|
+
- Client runtime is untrusted, or
|
|
20
|
+
- Business/IP impact is high.
|
|
21
|
+
|
|
22
|
+
Keep baseline controls regardless:
|
|
23
|
+
- AuthN/AuthZ, validation, secrets hygiene, monitoring.
|
|
24
|
+
|
|
25
|
+
## Workflow
|
|
26
|
+
|
|
27
|
+
1. Define threat model and assets at risk.
|
|
28
|
+
2. Select hardening profile by risk tier.
|
|
29
|
+
3. Choose controls (obfuscation, integrity checks, runtime protections).
|
|
30
|
+
4. Integrate into build/release pipeline.
|
|
31
|
+
5. Run post-hardening functional + performance validation.
|
|
32
|
+
6. Produce release evidence and rollback path.
|
|
33
|
+
|
|
34
|
+
## Required Evidence
|
|
35
|
+
|
|
36
|
+
- Hardening profile selection rationale
|
|
37
|
+
- Verification results (functional + performance)
|
|
38
|
+
- Symbol/mapping artifact access policy
|
|
39
|
+
- Rollback steps and trigger conditions
|
|
40
|
+
|
|
41
|
+
## Guardrails
|
|
42
|
+
|
|
43
|
+
- Never treat obfuscation as a standalone security solution.
|
|
44
|
+
- Never store secrets in client code.
|
|
45
|
+
- Block release when hardening-required profile lacks evidence.
|
|
@@ -0,0 +1,36 @@
|
|
|
1
|
+
---
|
|
2
|
+
name: bug-triage
|
|
3
|
+
description: Reproduction-first bug workflow for reliable root-cause isolation, minimal patching, and regression protection.
|
|
4
|
+
---
|
|
5
|
+
|
|
6
|
+
# Bug Triage
|
|
7
|
+
|
|
8
|
+
Use this skill for defects, crashes, unexpected behavior, and regressions.
|
|
9
|
+
|
|
10
|
+
## Trigger Conditions
|
|
11
|
+
|
|
12
|
+
- User reports bug symptoms ("broken", "fails", "crash", "not working").
|
|
13
|
+
- There is a failing test or reproducible scenario.
|
|
14
|
+
|
|
15
|
+
## Workflow
|
|
16
|
+
|
|
17
|
+
1. Capture reproducible steps and expected vs actual behavior.
|
|
18
|
+
2. Confirm failure reproduction locally or from evidence.
|
|
19
|
+
3. Isolate probable subsystem and narrow root cause.
|
|
20
|
+
4. Apply smallest safe patch in bounded scope.
|
|
21
|
+
5. Add or run regression tests.
|
|
22
|
+
6. Validate fix and report residual risks.
|
|
23
|
+
|
|
24
|
+
## Output Contract
|
|
25
|
+
|
|
26
|
+
- Defect summary and reproduction
|
|
27
|
+
- Root cause hypothesis/finding
|
|
28
|
+
- Patch summary
|
|
29
|
+
- Validation evidence
|
|
30
|
+
- Regression coverage update
|
|
31
|
+
|
|
32
|
+
## Guardrails
|
|
33
|
+
|
|
34
|
+
- Do not patch without reproduction evidence unless explicitly approved.
|
|
35
|
+
- Avoid broad refactors in bug-fix flow.
|
|
36
|
+
- Block when scope or acceptance criteria are unsafe/unclear.
|
|
@@ -0,0 +1,38 @@
|
|
|
1
|
+
---
|
|
2
|
+
name: feature-delivery
|
|
3
|
+
description: Converts vague feature requests into scoped execution contracts with acceptance criteria, risk controls, and validation steps.
|
|
4
|
+
---
|
|
5
|
+
|
|
6
|
+
# Feature Delivery
|
|
7
|
+
|
|
8
|
+
Use this skill when users describe features informally and need a systematic execution path.
|
|
9
|
+
|
|
10
|
+
## Trigger Conditions
|
|
11
|
+
|
|
12
|
+
- User asks to "build", "add", "create", or "implement" a feature.
|
|
13
|
+
- Requirements are partial, broad, or non-technical.
|
|
14
|
+
- Scope and acceptance criteria are not explicit.
|
|
15
|
+
|
|
16
|
+
## Workflow
|
|
17
|
+
|
|
18
|
+
1. Parse objective from user language.
|
|
19
|
+
2. Define scope boundaries (in/out).
|
|
20
|
+
3. Generate acceptance criteria (2-5 concrete checks).
|
|
21
|
+
4. Derive implementation units in dependency order.
|
|
22
|
+
5. Define validation plan (unit/integration/e2e where relevant).
|
|
23
|
+
6. Identify risks and rollback notes.
|
|
24
|
+
|
|
25
|
+
## Output Contract
|
|
26
|
+
|
|
27
|
+
- Objective summary
|
|
28
|
+
- Scope boundaries
|
|
29
|
+
- Acceptance criteria
|
|
30
|
+
- Execution steps
|
|
31
|
+
- Verification steps
|
|
32
|
+
- Risks and assumptions
|
|
33
|
+
|
|
34
|
+
## Guardrails
|
|
35
|
+
|
|
36
|
+
- Ask minimal clarifications only when blocked.
|
|
37
|
+
- Do not execute destructive or broad changes without explicit scope.
|
|
38
|
+
- Keep plans deterministic and auditable.
|