agents-templated 1.2.7 → 1.2.9

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (33) hide show
  1. package/README.md +40 -9
  2. package/bin/cli.js +5 -3
  3. package/package.json +1 -1
  4. package/templates/.github/copilot-instructions.md +11 -3
  5. package/templates/AGENTS.MD +579 -2
  6. package/templates/CLAUDE.md +13 -4
  7. package/templates/GEMINI.md +15 -6
  8. package/templates/README.md +13 -4
  9. package/templates/agent-docs/ARCHITECTURE.md +1 -1
  10. package/templates/agent-docs/README.md +2 -2
  11. package/templates/agents/commands/README.md +24 -0
  12. package/templates/agents/commands/SCHEMA.md +22 -0
  13. package/templates/agents/commands/audit.md +38 -0
  14. package/templates/agents/commands/docs.md +34 -0
  15. package/templates/agents/commands/fix.md +34 -0
  16. package/templates/agents/commands/perf.md +34 -0
  17. package/templates/agents/commands/plan.md +34 -0
  18. package/templates/agents/commands/pr.md +35 -0
  19. package/templates/agents/commands/refactor.md +34 -0
  20. package/templates/agents/commands/release.md +39 -0
  21. package/templates/agents/commands/scaffold.md +34 -0
  22. package/templates/agents/commands/task.md +35 -0
  23. package/templates/agents/commands/test.md +34 -0
  24. package/templates/agents/rules/hardening.mdc +52 -0
  25. package/templates/agents/rules/intent-routing.mdc +45 -0
  26. package/templates/agents/rules/security.mdc +9 -1
  27. package/templates/agents/rules/system-workflow.mdc +63 -0
  28. package/templates/agents/rules/testing.mdc +14 -1
  29. package/templates/agents/rules/workflows.mdc +7 -0
  30. package/templates/agents/skills/README.md +15 -1
  31. package/templates/agents/skills/app-hardening/SKILL.md +45 -0
  32. package/templates/agents/skills/bug-triage/SKILL.md +36 -0
  33. package/templates/agents/skills/feature-delivery/SKILL.md +38 -0
@@ -0,0 +1,63 @@
1
+ ---
2
+ title: "System Workflow Orchestration"
3
+ description: "Lifecycle gates and required artifacts for systematic delivery"
4
+ version: "1.0.0"
5
+ tags: ["workflow", "gates", "delivery", "governance"]
6
+ ---
7
+
8
+ ## Purpose
9
+
10
+ Define a repeatable lifecycle so all work is traceable, verifiable, and releasable.
11
+
12
+ ## Workflow Phases
13
+
14
+ 1. Discover
15
+ 2. Plan
16
+ 3. Implement
17
+ 4. Verify
18
+ 5. Release
19
+
20
+ ## Phase Requirements
21
+
22
+ ### 1) Discover
23
+ - Capture objective, scope boundaries, constraints, and risk profile.
24
+ - Produce: context summary + assumptions.
25
+
26
+ ### 2) Plan
27
+ - Break work into atomic units and dependency order.
28
+ - Define acceptance criteria and rollback considerations.
29
+ - Produce: execution plan with checkpoints.
30
+
31
+ ### 3) Implement
32
+ - Apply smallest safe changes within declared scope.
33
+ - Keep changes deterministic and reversible when possible.
34
+ - Produce: change summary and affected files.
35
+
36
+ ### 4) Verify
37
+ - Run relevant tests/checks (targeted first, broad second).
38
+ - Confirm security and regression impact.
39
+ - Produce: validation evidence.
40
+
41
+ ### 5) Release
42
+ - Check gates: tests, security posture, migration safety, rollback readiness.
43
+ - Produce: release decision + rollout/rollback steps.
44
+
45
+ ## Required Delivery Artifacts
46
+
47
+ - Objective and scope
48
+ - Acceptance criteria
49
+ - Risk register
50
+ - Validation evidence
51
+ - Rollback strategy (for non-trivial changes)
52
+
53
+ ## Gate Rules
54
+
55
+ - Fail any critical gate -> `status: blocked`.
56
+ - Missing rollback for risky changes -> blocked.
57
+ - Missing validation evidence -> blocked.
58
+
59
+ ## Rollback Requirements
60
+
61
+ - Identify rollback trigger conditions.
62
+ - Provide explicit rollback steps.
63
+ - Keep backups/version references for destructive changes.
@@ -253,6 +253,19 @@ Test: Database query optimization
253
253
  - Measure execution time
254
254
  - Assert completes efficiently
255
255
 
256
+ ## Hardening Verification Testing
257
+
258
+ When hardening/obfuscation is enabled (see `agents/rules/hardening.mdc`), require additional validation on hardened artifacts.
259
+
260
+ ### Required Checks for Hardened Builds
261
+
262
+ - Run core functional regression tests against hardened output, not only non-hardened builds.
263
+ - Run performance checks and compare against accepted budgets (startup, latency, memory as applicable).
264
+ - Validate crash/debug workflow with restricted symbol/mapping artifact access controls.
265
+ - Confirm release evidence includes hardening profile rationale and rollback trigger/steps.
266
+
267
+ If these checks are missing for a hardening-required profile, release readiness should be treated as blocked.
268
+
256
269
  ## Security Testing
257
270
 
258
271
  Test security requirements and threat scenarios.
@@ -355,4 +368,4 @@ tests/
355
368
 
356
369
  Remember: **Tests are documentation** of how your code should behave.
357
370
  Write clear, concise tests that describe expected behavior.
358
- Good tests make refactoring and maintenance easier and reduce bugs in production.
371
+ Good tests make refactoring and maintenance easier and reduce bugs in production.
@@ -34,6 +34,12 @@ Before committing, consider running (in order):
34
34
  3. **Tests** – At least the fast test suite (e.g. unit tests) so regressions are caught early.
35
35
  4. **Project validation** – For agents-templated projects, `agents-templated validate` can confirm setup is intact.
36
36
 
37
+ For high-risk or distributed-client releases, add hardening-specific checks before merge/release:
38
+
39
+ 5. **Hardening profile selection** – Document threat model and selected profile from `agents/rules/hardening.mdc`.
40
+ 6. **Post-hardening verification** – Run functional regression and performance checks on hardened artifacts.
41
+ 7. **Artifact controls** – Verify restricted handling for symbol/mapping/debug artifacts and confirm rollback path.
42
+
37
43
  Do not commit with failing lint or tests unless the user explicitly requests a WIP commit (e.g. with `--no-verify` or a clear “work in progress” message).
38
44
 
39
45
  ## Commit Messages
@@ -46,4 +52,5 @@ Do not commit with failing lint or tests unless the user explicitly requests a W
46
52
 
47
53
  - Use **agents-templated validate** and **doctor** to maintain project setup and get recommendations.
48
54
  - Run **lint**, **type check**, and **tests** before committing when possible.
55
+ - For hardening-required releases, include profile rationale, post-hardening verification evidence, and rollback readiness.
49
56
  - Write clear commit messages and reference issues where applicable.
@@ -57,6 +57,14 @@ To create a new skill for your specific domain:
57
57
  agents/skills/
58
58
  ├── find-skills/
59
59
  │ └── SKILL.md # Meta-skill for discovering skills
60
+ ├── feature-delivery/
61
+ │ └── SKILL.md # Systematic feature scoping and execution contracts
62
+ ├── bug-triage/
63
+ │ └── SKILL.md # Reproduction-first debugging and regression workflows
64
+ ├── app-hardening/
65
+ │ └── SKILL.md # Risk-based hardening and obfuscation guidance
66
+ ├── ui-ux-pro-max/
67
+ │ └── SKILL.md # Premium UI/UX implementation patterns
60
68
  ├── my-custom-skill/
61
69
  │ └── SKILL.md # Your custom skill
62
70
  └── README.md # This file
@@ -84,6 +92,12 @@ Consider creating skills for:
84
92
  | Design | UI/UX, accessibility, design systems |
85
93
  | Productivity | Workflows, automation, git patterns |
86
94
 
95
+ ## Recommended Baseline Skills
96
+
97
+ - `feature-delivery`: Use when user asks are broad and you need objective, scope, acceptance criteria, and validation plan.
98
+ - `bug-triage`: Use for defects and regressions requiring reproducible evidence, root-cause isolation, and minimal safe patches.
99
+ - `app-hardening`: Use for high-risk/distributed runtimes to enforce hardening profile, obfuscation decisions, and release evidence.
100
+
87
101
  ## Using Skills in Your Project
88
102
 
89
103
  Skills can be referenced in all your AI assistant configuration files:
@@ -112,7 +126,7 @@ Reference the [skill-name] skill in `agents/skills/[skill-name]/SKILL.md` for pa
112
126
  When helping with [domain-specific task], reference the [skill-name] skill from `agents/skills/[skill-name]/SKILL.md`
113
127
  ```
114
128
 
115
- ### Documentation (`AGENTS.md`)
129
+ ### Documentation (`AGENTS.MD`)
116
130
  ```markdown
117
131
  - When working with [domain], see the [skill-name] skill in `agents/skills/[skill-name]/SKILL.md`
118
132
  ```
@@ -0,0 +1,45 @@
1
+ ---
2
+ name: app-hardening
3
+ description: Applies risk-based application hardening guidance including obfuscation decisions, integrity controls, and release evidence.
4
+ ---
5
+
6
+ # App Hardening
7
+
8
+ Use this skill for security hardening of distributed applications and sensitive client-side logic.
9
+
10
+ ## Trigger Conditions
11
+
12
+ - User asks for hardening, anti-tamper, reverse-engineering resistance, or secure release posture.
13
+ - Project includes mobile/desktop/browser-delivered code with high-value logic.
14
+
15
+ ## Decision Matrix
16
+
17
+ Apply hardening when:
18
+ - Threat model includes tampering/repackaging/hooking, or
19
+ - Client runtime is untrusted, or
20
+ - Business/IP impact is high.
21
+
22
+ Keep baseline controls regardless:
23
+ - AuthN/AuthZ, validation, secrets hygiene, monitoring.
24
+
25
+ ## Workflow
26
+
27
+ 1. Define threat model and assets at risk.
28
+ 2. Select hardening profile by risk tier.
29
+ 3. Choose controls (obfuscation, integrity checks, runtime protections).
30
+ 4. Integrate into build/release pipeline.
31
+ 5. Run post-hardening functional + performance validation.
32
+ 6. Produce release evidence and rollback path.
33
+
34
+ ## Required Evidence
35
+
36
+ - Hardening profile selection rationale
37
+ - Verification results (functional + performance)
38
+ - Symbol/mapping artifact access policy
39
+ - Rollback steps and trigger conditions
40
+
41
+ ## Guardrails
42
+
43
+ - Never treat obfuscation as a standalone security solution.
44
+ - Never store secrets in client code.
45
+ - Block release when hardening-required profile lacks evidence.
@@ -0,0 +1,36 @@
1
+ ---
2
+ name: bug-triage
3
+ description: Reproduction-first bug workflow for reliable root-cause isolation, minimal patching, and regression protection.
4
+ ---
5
+
6
+ # Bug Triage
7
+
8
+ Use this skill for defects, crashes, unexpected behavior, and regressions.
9
+
10
+ ## Trigger Conditions
11
+
12
+ - User reports bug symptoms ("broken", "fails", "crash", "not working").
13
+ - There is a failing test or reproducible scenario.
14
+
15
+ ## Workflow
16
+
17
+ 1. Capture reproducible steps and expected vs actual behavior.
18
+ 2. Confirm failure reproduction locally or from evidence.
19
+ 3. Isolate probable subsystem and narrow root cause.
20
+ 4. Apply smallest safe patch in bounded scope.
21
+ 5. Add or run regression tests.
22
+ 6. Validate fix and report residual risks.
23
+
24
+ ## Output Contract
25
+
26
+ - Defect summary and reproduction
27
+ - Root cause hypothesis/finding
28
+ - Patch summary
29
+ - Validation evidence
30
+ - Regression coverage update
31
+
32
+ ## Guardrails
33
+
34
+ - Do not patch without reproduction evidence unless explicitly approved.
35
+ - Avoid broad refactors in bug-fix flow.
36
+ - Block when scope or acceptance criteria are unsafe/unclear.
@@ -0,0 +1,38 @@
1
+ ---
2
+ name: feature-delivery
3
+ description: Converts vague feature requests into scoped execution contracts with acceptance criteria, risk controls, and validation steps.
4
+ ---
5
+
6
+ # Feature Delivery
7
+
8
+ Use this skill when users describe features informally and need a systematic execution path.
9
+
10
+ ## Trigger Conditions
11
+
12
+ - User asks to "build", "add", "create", or "implement" a feature.
13
+ - Requirements are partial, broad, or non-technical.
14
+ - Scope and acceptance criteria are not explicit.
15
+
16
+ ## Workflow
17
+
18
+ 1. Parse objective from user language.
19
+ 2. Define scope boundaries (in/out).
20
+ 3. Generate acceptance criteria (2-5 concrete checks).
21
+ 4. Derive implementation units in dependency order.
22
+ 5. Define validation plan (unit/integration/e2e where relevant).
23
+ 6. Identify risks and rollback notes.
24
+
25
+ ## Output Contract
26
+
27
+ - Objective summary
28
+ - Scope boundaries
29
+ - Acceptance criteria
30
+ - Execution steps
31
+ - Verification steps
32
+ - Risks and assumptions
33
+
34
+ ## Guardrails
35
+
36
+ - Ask minimal clarifications only when blocked.
37
+ - Do not execute destructive or broad changes without explicit scope.
38
+ - Keep plans deterministic and auditable.