agents-templated 2.2.10 → 2.2.12
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +100 -86
- package/agents/commands/README.md +64 -0
- package/agents/commands/SCHEMA.md +22 -0
- package/agents/commands/arch-check.md +58 -0
- package/agents/commands/audit.md +58 -0
- package/agents/commands/debug-track.md +58 -0
- package/agents/commands/docs.md +58 -0
- package/agents/commands/fix.md +58 -0
- package/agents/commands/learn-loop.md +58 -0
- package/agents/commands/perf.md +58 -0
- package/agents/commands/plan.md +58 -0
- package/agents/commands/pr.md +58 -0
- package/agents/commands/problem-map.md +58 -0
- package/agents/commands/release-ready.md +58 -0
- package/agents/commands/release.md +58 -0
- package/agents/commands/risk-review.md +58 -0
- package/agents/commands/scope-shape.md +58 -0
- package/agents/commands/task.md +58 -0
- package/agents/commands/test.md +58 -0
- package/agents/commands/ux-bar.md +58 -0
- package/agents/rules/planning.mdc +69 -0
- package/bin/cli.js +116 -4
- package/index.js +12 -1
- package/lib/workflow.js +177 -0
- package/package.json +2 -1
- package/templates/CLAUDE.md +5 -0
- package/templates/README.md +103 -61
- package/templates/agents/commands/README.md +43 -3
- package/templates/agents/commands/arch-check.md +58 -0
- package/templates/agents/commands/audit.md +58 -38
- package/templates/agents/commands/debug-track.md +58 -0
- package/templates/agents/commands/docs.md +58 -34
- package/templates/agents/commands/fix.md +58 -34
- package/templates/agents/commands/learn-loop.md +58 -0
- package/templates/agents/commands/perf.md +58 -34
- package/templates/agents/commands/plan.md +58 -34
- package/templates/agents/commands/pr.md +58 -35
- package/templates/agents/commands/problem-map.md +58 -0
- package/templates/agents/commands/release-ready.md +58 -0
- package/templates/agents/commands/release.md +58 -39
- package/templates/agents/commands/risk-review.md +58 -0
- package/templates/agents/commands/scope-shape.md +58 -0
- package/templates/agents/commands/task.md +58 -35
- package/templates/agents/commands/test.md +58 -34
- package/templates/agents/commands/ux-bar.md +58 -0
- package/templates/agents/skills/README.md +15 -0
- package/templates/agents/skills/debug-skill/SKILL.md +39 -0
- package/templates/agents/skills/emilkowalski-skill/SKILL.md +51 -0
- package/templates/agents/skills/feature-forge/SKILL.md +39 -0
- package/templates/agents/skills/raphaelsalaja-userinterface-wiki/SKILL.md +51 -0
- package/templates/agents/skills/secure-code-guardian/SKILL.md +39 -0
- package/templates/agents/commands/refactor.md +0 -34
- package/templates/agents/commands/scaffold.md +0 -34
|
@@ -1,34 +1,58 @@
|
|
|
1
|
-
# /docs
|
|
2
|
-
|
|
3
|
-
## A. Intent
|
|
4
|
-
|
|
5
|
-
|
|
6
|
-
## B. When to Use
|
|
7
|
-
Use when
|
|
8
|
-
|
|
9
|
-
|
|
10
|
-
|
|
11
|
-
- Source
|
|
12
|
-
- Target audience
|
|
13
|
-
|
|
14
|
-
|
|
15
|
-
|
|
16
|
-
|
|
17
|
-
|
|
18
|
-
|
|
19
|
-
|
|
20
|
-
|
|
21
|
-
|
|
22
|
-
## E.
|
|
23
|
-
-
|
|
24
|
-
-
|
|
25
|
-
-
|
|
26
|
-
|
|
27
|
-
|
|
28
|
-
|
|
29
|
-
|
|
30
|
-
|
|
31
|
-
|
|
32
|
-
|
|
33
|
-
|
|
34
|
-
|
|
1
|
+
# /docs
|
|
2
|
+
|
|
3
|
+
## A. Intent
|
|
4
|
+
Create deterministic documentation outputs aligned with current implementation behavior.
|
|
5
|
+
|
|
6
|
+
## B. When to Use
|
|
7
|
+
- Use when generating or updating docs as a direct deliverable.
|
|
8
|
+
- Do not use for release decision making.
|
|
9
|
+
|
|
10
|
+
## C. Context Assumptions
|
|
11
|
+
- Source behavior is known.
|
|
12
|
+
- Target audience is defined.
|
|
13
|
+
- Doc destination is available.
|
|
14
|
+
|
|
15
|
+
## D. Required Inputs
|
|
16
|
+
| Input | Type | Example |
|
|
17
|
+
|---------------------|------------|----------------------------------|
|
|
18
|
+
| `doc_scope` | string | "API auth endpoints" |
|
|
19
|
+
| `source_refs` | string[] | ["src/auth.ts", "openapi.yaml"] |
|
|
20
|
+
| `doc_artifact` | artifact | existing README path or docs URL |
|
|
21
|
+
|
|
22
|
+
## E. Pre-Execution Guards <- fail fast, check ALL before running
|
|
23
|
+
- [ ] scope is explicit
|
|
24
|
+
- [ ] source refs are accessible
|
|
25
|
+
- [ ] destination path is writable
|
|
26
|
+
|
|
27
|
+
## F. Execution Flow
|
|
28
|
+
1. Collect implementation references.
|
|
29
|
+
2. Draft structured documentation content.
|
|
30
|
+
3. Validate examples and references.
|
|
31
|
+
4. Decision point ->
|
|
32
|
+
- condition A -> mismatch with implementation -> revise doc content
|
|
33
|
+
- condition B -> aligned -> continue.
|
|
34
|
+
5. Assemble final documentation package.
|
|
35
|
+
6. Emit documentation output.
|
|
36
|
+
|
|
37
|
+
## G. Output Schema
|
|
38
|
+
|
|
39
|
+
```json
|
|
40
|
+
{
|
|
41
|
+
"doc_id": "string",
|
|
42
|
+
"updated_sections": ["array","of","strings"],
|
|
43
|
+
"confidence": "low | medium | high",
|
|
44
|
+
"gap": "string | null"
|
|
45
|
+
}
|
|
46
|
+
```
|
|
47
|
+
|
|
48
|
+
## H. Output Target
|
|
49
|
+
- Default delivery: file
|
|
50
|
+
- Override flag: --output=<target>
|
|
51
|
+
|
|
52
|
+
## I. Stop Conditions <- abort with error message, never emit partial output
|
|
53
|
+
- source references are unavailable
|
|
54
|
+
- critical behavior cannot be documented accurately
|
|
55
|
+
|
|
56
|
+
## J. Safety Constraints
|
|
57
|
+
- Hard block: hard block on knowingly incorrect implementation claims
|
|
58
|
+
- Warn only: warn when sections remain TODO with owner
|
|
@@ -1,34 +1,58 @@
|
|
|
1
|
-
# /fix
|
|
2
|
-
|
|
3
|
-
## A. Intent
|
|
4
|
-
Apply the smallest safe
|
|
5
|
-
|
|
6
|
-
## B. When to Use
|
|
7
|
-
Use
|
|
8
|
-
|
|
9
|
-
|
|
10
|
-
|
|
11
|
-
-
|
|
12
|
-
-
|
|
13
|
-
|
|
14
|
-
|
|
15
|
-
|
|
16
|
-
|
|
17
|
-
|
|
18
|
-
|
|
19
|
-
|
|
20
|
-
|
|
21
|
-
|
|
22
|
-
## E.
|
|
23
|
-
-
|
|
24
|
-
-
|
|
25
|
-
-
|
|
26
|
-
|
|
27
|
-
|
|
28
|
-
|
|
29
|
-
|
|
30
|
-
|
|
31
|
-
|
|
32
|
-
|
|
33
|
-
|
|
34
|
-
|
|
1
|
+
# /fix
|
|
2
|
+
|
|
3
|
+
## A. Intent
|
|
4
|
+
Apply the smallest safe code fix with regression evidence and bounded impact.
|
|
5
|
+
|
|
6
|
+
## B. When to Use
|
|
7
|
+
- Use after root cause is confirmed and a targeted fix is required.
|
|
8
|
+
- Do not use when defect cause is still speculative.
|
|
9
|
+
|
|
10
|
+
## C. Context Assumptions
|
|
11
|
+
- Issue is reproducible or sufficiently evidenced.
|
|
12
|
+
- Root cause has been identified.
|
|
13
|
+
- Regression checks are available.
|
|
14
|
+
|
|
15
|
+
## D. Required Inputs
|
|
16
|
+
| Input | Type | Example |
|
|
17
|
+
|---------------------|------------|----------------------------------|
|
|
18
|
+
| `defect_id` | string | "BUG-142" |
|
|
19
|
+
| `affected_paths` | string[] | ["src/auth.ts", "tests/auth.test.ts"] |
|
|
20
|
+
| `evidence` | artifact | stack trace, failing test output, screenshot |
|
|
21
|
+
|
|
22
|
+
## E. Pre-Execution Guards <- fail fast, check ALL before running
|
|
23
|
+
- [ ] root cause evidence is present
|
|
24
|
+
- [ ] fix scope is bounded
|
|
25
|
+
- [ ] regression checks are defined
|
|
26
|
+
|
|
27
|
+
## F. Execution Flow
|
|
28
|
+
1. Read defect evidence and failing paths.
|
|
29
|
+
2. Implement minimal change set.
|
|
30
|
+
3. Run targeted validations.
|
|
31
|
+
4. Decision point ->
|
|
32
|
+
- condition A -> validation fails -> iterate fix or abort
|
|
33
|
+
- condition B -> validation passes -> continue.
|
|
34
|
+
5. Prepare change rationale and impact summary.
|
|
35
|
+
6. Emit fix package with evidence.
|
|
36
|
+
|
|
37
|
+
## G. Output Schema
|
|
38
|
+
|
|
39
|
+
```json
|
|
40
|
+
{
|
|
41
|
+
"fix_id": "string",
|
|
42
|
+
"changed_files": ["array","of","strings"],
|
|
43
|
+
"risk": "low | medium | high",
|
|
44
|
+
"rollback_note": "string | null"
|
|
45
|
+
}
|
|
46
|
+
```
|
|
47
|
+
|
|
48
|
+
## H. Output Target
|
|
49
|
+
- Default delivery: stdout
|
|
50
|
+
- Override flag: --output=<target>
|
|
51
|
+
|
|
52
|
+
## I. Stop Conditions <- abort with error message, never emit partial output
|
|
53
|
+
- no verified root-cause evidence
|
|
54
|
+
- regression validation unavailable for critical path
|
|
55
|
+
|
|
56
|
+
## J. Safety Constraints
|
|
57
|
+
- Hard block: no broad refactor inside fix-only workflow
|
|
58
|
+
- Warn only: warn when temporary workaround is used
|
|
@@ -0,0 +1,58 @@
|
|
|
1
|
+
# /learn-loop
|
|
2
|
+
|
|
3
|
+
## A. Intent
|
|
4
|
+
Capture deterministic retrospective outcomes and convert lessons into next-cycle actions.
|
|
5
|
+
|
|
6
|
+
## B. When to Use
|
|
7
|
+
- Use after delivery milestones, incidents, or release cycles.
|
|
8
|
+
- Do not use for pre-implementation planning.
|
|
9
|
+
|
|
10
|
+
## C. Context Assumptions
|
|
11
|
+
- Cycle outcome data is available.
|
|
12
|
+
- Owners for follow-up actions can be assigned.
|
|
13
|
+
- Retrospective scope is defined.
|
|
14
|
+
|
|
15
|
+
## D. Required Inputs
|
|
16
|
+
| Input | Type | Example |
|
|
17
|
+
|---------------------|------------|----------------------------------|
|
|
18
|
+
| `cycle_name` | string | "Sprint 18" |
|
|
19
|
+
| `observations` | string[] | ["test flakiness", "scope churn"] |
|
|
20
|
+
| `evidence_artifact` | artifact | metrics dashboard, incident notes, PR links |
|
|
21
|
+
|
|
22
|
+
## E. Pre-Execution Guards <- fail fast, check ALL before running
|
|
23
|
+
- [ ] observations are evidence-backed
|
|
24
|
+
- [ ] action owners can be assigned
|
|
25
|
+
- [ ] follow-up window is defined
|
|
26
|
+
|
|
27
|
+
## F. Execution Flow
|
|
28
|
+
1. Collect outcomes, wins, and misses.
|
|
29
|
+
2. Identify root process issues and patterns.
|
|
30
|
+
3. Prioritize actionable improvements.
|
|
31
|
+
4. Decision point ->
|
|
32
|
+
- condition A -> no actionable item -> request clearer observations
|
|
33
|
+
- condition B -> actionable set ready -> continue.
|
|
34
|
+
5. Map actions to owners and timelines.
|
|
35
|
+
6. Emit learn-loop action report.
|
|
36
|
+
|
|
37
|
+
## G. Output Schema
|
|
38
|
+
|
|
39
|
+
```json
|
|
40
|
+
{
|
|
41
|
+
"loop_id": "string",
|
|
42
|
+
"actions": ["array","of","strings"],
|
|
43
|
+
"urgency": "low | medium | high",
|
|
44
|
+
"blocker": "string | null"
|
|
45
|
+
}
|
|
46
|
+
```
|
|
47
|
+
|
|
48
|
+
## H. Output Target
|
|
49
|
+
- Default delivery: stdout
|
|
50
|
+
- Override flag: --output=<target>
|
|
51
|
+
|
|
52
|
+
## I. Stop Conditions <- abort with error message, never emit partial output
|
|
53
|
+
- retrospective inputs are anecdotal without evidence
|
|
54
|
+
- no owner can be assigned to critical actions
|
|
55
|
+
|
|
56
|
+
## J. Safety Constraints
|
|
57
|
+
- Hard block: hard block on publishing blame-focused output without actionable remediation
|
|
58
|
+
- Warn only: warn when metrics are incomplete but direction is still usable
|
|
@@ -1,34 +1,58 @@
|
|
|
1
|
-
# /perf
|
|
2
|
-
|
|
3
|
-
## A. Intent
|
|
4
|
-
|
|
5
|
-
|
|
6
|
-
## B. When to Use
|
|
7
|
-
Use when latency, throughput,
|
|
8
|
-
|
|
9
|
-
|
|
10
|
-
|
|
11
|
-
- Baseline
|
|
12
|
-
-
|
|
13
|
-
|
|
14
|
-
|
|
15
|
-
|
|
16
|
-
|
|
17
|
-
|
|
18
|
-
|
|
19
|
-
|
|
20
|
-
|
|
21
|
-
|
|
22
|
-
## E.
|
|
23
|
-
-
|
|
24
|
-
-
|
|
25
|
-
-
|
|
26
|
-
|
|
27
|
-
|
|
28
|
-
|
|
29
|
-
|
|
30
|
-
|
|
31
|
-
|
|
32
|
-
|
|
33
|
-
|
|
34
|
-
|
|
1
|
+
# /perf
|
|
2
|
+
|
|
3
|
+
## A. Intent
|
|
4
|
+
Define and execute deterministic performance optimization workflow against known baselines.
|
|
5
|
+
|
|
6
|
+
## B. When to Use
|
|
7
|
+
- Use when improving latency, throughput, or resource efficiency.
|
|
8
|
+
- Do not use for one-off smoke checks; use /perf-scan for quick regression comparison.
|
|
9
|
+
|
|
10
|
+
## C. Context Assumptions
|
|
11
|
+
- Baseline metrics exist or can be captured.
|
|
12
|
+
- Performance target is defined.
|
|
13
|
+
- Measurement method is repeatable.
|
|
14
|
+
|
|
15
|
+
## D. Required Inputs
|
|
16
|
+
| Input | Type | Example |
|
|
17
|
+
|---------------------|------------|----------------------------------|
|
|
18
|
+
| `performance_goal` | string | "p95 latency under 200ms" |
|
|
19
|
+
| `baseline_metrics` | string[] | ["p95=260ms", "cpu=70%"] |
|
|
20
|
+
| `benchmark_artifact` | artifact | profiling report or benchmark output |
|
|
21
|
+
|
|
22
|
+
## E. Pre-Execution Guards <- fail fast, check ALL before running
|
|
23
|
+
- [ ] goal is measurable
|
|
24
|
+
- [ ] baseline metric set is present
|
|
25
|
+
- [ ] benchmark method is consistent
|
|
26
|
+
|
|
27
|
+
## F. Execution Flow
|
|
28
|
+
1. Capture or validate baseline metrics.
|
|
29
|
+
2. Apply targeted optimization changes.
|
|
30
|
+
3. Measure post-change metrics.
|
|
31
|
+
4. Decision point ->
|
|
32
|
+
- condition A -> target unmet -> iterate optimization
|
|
33
|
+
- condition B -> target met -> continue.
|
|
34
|
+
5. Summarize gains, tradeoffs, and risks.
|
|
35
|
+
6. Emit performance optimization report.
|
|
36
|
+
|
|
37
|
+
## G. Output Schema
|
|
38
|
+
|
|
39
|
+
```json
|
|
40
|
+
{
|
|
41
|
+
"perf_run_id": "string",
|
|
42
|
+
"metrics": ["array","of","strings"],
|
|
43
|
+
"impact": "low | medium | high",
|
|
44
|
+
"regression": "string | null"
|
|
45
|
+
}
|
|
46
|
+
```
|
|
47
|
+
|
|
48
|
+
## H. Output Target
|
|
49
|
+
- Default delivery: stdout
|
|
50
|
+
- Override flag: --output=<target>
|
|
51
|
+
|
|
52
|
+
## I. Stop Conditions <- abort with error message, never emit partial output
|
|
53
|
+
- baseline cannot be measured reliably
|
|
54
|
+
- measurement method is non-deterministic
|
|
55
|
+
|
|
56
|
+
## J. Safety Constraints
|
|
57
|
+
- Hard block: do not trade correctness/security for performance gains
|
|
58
|
+
- Warn only: warn when gains are within noise threshold
|
|
@@ -1,34 +1,58 @@
|
|
|
1
|
-
# /plan
|
|
2
|
-
|
|
3
|
-
## A. Intent
|
|
4
|
-
|
|
5
|
-
|
|
6
|
-
## B. When to Use
|
|
7
|
-
Use
|
|
8
|
-
|
|
9
|
-
|
|
10
|
-
|
|
11
|
-
-
|
|
12
|
-
-
|
|
13
|
-
|
|
14
|
-
|
|
15
|
-
|
|
16
|
-
|
|
17
|
-
|
|
18
|
-
|
|
19
|
-
|
|
20
|
-
|
|
21
|
-
|
|
22
|
-
## E.
|
|
23
|
-
-
|
|
24
|
-
-
|
|
25
|
-
-
|
|
26
|
-
|
|
27
|
-
|
|
28
|
-
|
|
29
|
-
|
|
30
|
-
|
|
31
|
-
|
|
32
|
-
|
|
33
|
-
|
|
34
|
-
|
|
1
|
+
# /plan
|
|
2
|
+
|
|
3
|
+
## A. Intent
|
|
4
|
+
Build a deterministic implementation plan with scoped phases and acceptance checks.
|
|
5
|
+
|
|
6
|
+
## B. When to Use
|
|
7
|
+
- Use when a feature or change request is approved for planning before coding starts.
|
|
8
|
+
- Do not use for post-incident debugging; use /debug-track instead.
|
|
9
|
+
|
|
10
|
+
## C. Context Assumptions
|
|
11
|
+
- Problem statement and objective are available.
|
|
12
|
+
- Primary stakeholders and delivery window are known.
|
|
13
|
+
- Scope boundaries can be explicitly defined.
|
|
14
|
+
|
|
15
|
+
## D. Required Inputs
|
|
16
|
+
| Input | Type | Example |
|
|
17
|
+
|---------------------|------------|----------------------------------|
|
|
18
|
+
| `objective` | string | "Ship onboarding v2" |
|
|
19
|
+
| `constraints` | string[] | ["2-week deadline", "no schema rewrite"] |
|
|
20
|
+
| `references` | artifact | PRD link, issue URL, screenshot |
|
|
21
|
+
|
|
22
|
+
## E. Pre-Execution Guards <- fail fast, check ALL before running
|
|
23
|
+
- [ ] objective is non-empty and testable
|
|
24
|
+
- [ ] constraints are explicit and non-contradictory
|
|
25
|
+
- [ ] required references are accessible
|
|
26
|
+
|
|
27
|
+
## F. Execution Flow
|
|
28
|
+
1. Collect requirements and constraints.
|
|
29
|
+
2. Split work into ordered phases and milestones.
|
|
30
|
+
3. Attach measurable acceptance criteria per phase.
|
|
31
|
+
4. Decision point ->
|
|
32
|
+
- condition A -> phase risk > threshold -> add mitigation gate
|
|
33
|
+
- condition B -> otherwise -> continue with baseline plan.
|
|
34
|
+
5. Assemble plan artifacts and dependency map.
|
|
35
|
+
6. Emit final plan package.
|
|
36
|
+
|
|
37
|
+
## G. Output Schema
|
|
38
|
+
|
|
39
|
+
```json
|
|
40
|
+
{
|
|
41
|
+
"plan_id": "string",
|
|
42
|
+
"phases": ["array","of","strings"],
|
|
43
|
+
"risk_level": "low | medium | high",
|
|
44
|
+
"notes": "string | null"
|
|
45
|
+
}
|
|
46
|
+
```
|
|
47
|
+
|
|
48
|
+
## H. Output Target
|
|
49
|
+
- Default delivery: stdout
|
|
50
|
+
- Override flag: --output=<target>
|
|
51
|
+
|
|
52
|
+
## I. Stop Conditions <- abort with error message, never emit partial output
|
|
53
|
+
- any guard in section E fails
|
|
54
|
+
- acceptance criteria cannot be made measurable
|
|
55
|
+
|
|
56
|
+
## J. Safety Constraints
|
|
57
|
+
- Hard block: no hidden scope expansion beyond declared boundaries
|
|
58
|
+
- Warn only: allow proceed with warning when estimate confidence is low
|
|
@@ -1,35 +1,58 @@
|
|
|
1
|
-
# /pr
|
|
2
|
-
|
|
3
|
-
## A. Intent
|
|
4
|
-
Prepare a deterministic pull request
|
|
5
|
-
|
|
6
|
-
## B. When to Use
|
|
7
|
-
Use after
|
|
8
|
-
|
|
9
|
-
|
|
10
|
-
|
|
11
|
-
-
|
|
12
|
-
- Validation evidence
|
|
13
|
-
|
|
14
|
-
|
|
15
|
-
|
|
16
|
-
|
|
17
|
-
|
|
18
|
-
|
|
19
|
-
|
|
20
|
-
|
|
21
|
-
|
|
22
|
-
## E.
|
|
23
|
-
-
|
|
24
|
-
-
|
|
25
|
-
-
|
|
26
|
-
|
|
27
|
-
|
|
28
|
-
|
|
29
|
-
|
|
30
|
-
|
|
31
|
-
|
|
32
|
-
-
|
|
33
|
-
|
|
34
|
-
|
|
35
|
-
|
|
1
|
+
# /pr
|
|
2
|
+
|
|
3
|
+
## A. Intent
|
|
4
|
+
Prepare a deterministic pull request package with implementation and validation evidence.
|
|
5
|
+
|
|
6
|
+
## B. When to Use
|
|
7
|
+
- Use after code changes and validation are complete and review package is needed.
|
|
8
|
+
- Do not use when critical findings are still unresolved.
|
|
9
|
+
|
|
10
|
+
## C. Context Assumptions
|
|
11
|
+
- Change set exists.
|
|
12
|
+
- Validation evidence is available.
|
|
13
|
+
- Linked issue/task context is known.
|
|
14
|
+
|
|
15
|
+
## D. Required Inputs
|
|
16
|
+
| Input | Type | Example |
|
|
17
|
+
|---------------------|------------|----------------------------------|
|
|
18
|
+
| `change_summary` | string | "add retry policy to webhook worker" |
|
|
19
|
+
| `linked_items` | string[] | ["ISSUE-18", "TASK-42"] |
|
|
20
|
+
| `validation_evidence` | artifact | test report, benchmark output, screenshot |
|
|
21
|
+
|
|
22
|
+
## E. Pre-Execution Guards <- fail fast, check ALL before running
|
|
23
|
+
- [ ] change summary is complete
|
|
24
|
+
- [ ] linked items are resolvable
|
|
25
|
+
- [ ] validation evidence is present
|
|
26
|
+
|
|
27
|
+
## F. Execution Flow
|
|
28
|
+
1. Collect changed files and linked references.
|
|
29
|
+
2. Summarize intent, impact, and scope.
|
|
30
|
+
3. Attach validation and risk evidence.
|
|
31
|
+
4. Decision point ->
|
|
32
|
+
- condition A -> critical blocker open -> abort PR package
|
|
33
|
+
- condition B -> no blocker -> continue.
|
|
34
|
+
5. Build reviewer checklist and rollout notes.
|
|
35
|
+
6. Emit PR payload.
|
|
36
|
+
|
|
37
|
+
## G. Output Schema
|
|
38
|
+
|
|
39
|
+
```json
|
|
40
|
+
{
|
|
41
|
+
"title": "string",
|
|
42
|
+
"files_changed": ["array","of","strings"],
|
|
43
|
+
"risk_assessment": "low | medium | high",
|
|
44
|
+
"blockers": "string | null"
|
|
45
|
+
}
|
|
46
|
+
```
|
|
47
|
+
|
|
48
|
+
## H. Output Target
|
|
49
|
+
- Default delivery: stdout
|
|
50
|
+
- Override flag: --output=<target>
|
|
51
|
+
|
|
52
|
+
## I. Stop Conditions <- abort with error message, never emit partial output
|
|
53
|
+
- validation evidence missing for critical changes
|
|
54
|
+
- open critical findings remain unresolved
|
|
55
|
+
|
|
56
|
+
## J. Safety Constraints
|
|
57
|
+
- Hard block: hard block if critical issues remain
|
|
58
|
+
- Warn only: warn when non-critical follow-up items are deferred
|
|
@@ -0,0 +1,58 @@
|
|
|
1
|
+
# /problem-map
|
|
2
|
+
|
|
3
|
+
## A. Intent
|
|
4
|
+
Frame the real user problem and guarantee a clear problem statement before planning.
|
|
5
|
+
|
|
6
|
+
## B. When to Use
|
|
7
|
+
- Use at the start of a feature cycle when pain points are unclear or broad.
|
|
8
|
+
- Do not use for implementation details or code-level debugging.
|
|
9
|
+
|
|
10
|
+
## C. Context Assumptions
|
|
11
|
+
- User objective is available.
|
|
12
|
+
- Stakeholder context can be collected.
|
|
13
|
+
- Outcome can be stated as a measurable problem.
|
|
14
|
+
|
|
15
|
+
## D. Required Inputs
|
|
16
|
+
| Input | Type | Example |
|
|
17
|
+
|---------------------|------------|----------------------------------|
|
|
18
|
+
| `user_problem` | string | "onboarding drop-off at step 2" |
|
|
19
|
+
| `signals` | string[] | ["support tickets", "analytics"] |
|
|
20
|
+
| `evidence_artifact` | artifact | funnel screenshot, issue links |
|
|
21
|
+
|
|
22
|
+
## E. Pre-Execution Guards <- fail fast, check ALL before running
|
|
23
|
+
- [ ] problem statement is concrete
|
|
24
|
+
- [ ] signals support the stated pain
|
|
25
|
+
- [ ] scope remains problem-focused
|
|
26
|
+
|
|
27
|
+
## F. Execution Flow
|
|
28
|
+
1. Collect user pain signals and context.
|
|
29
|
+
2. Synthesize candidate problem statements.
|
|
30
|
+
3. Validate statement against evidence.
|
|
31
|
+
4. Decision point ->
|
|
32
|
+
- condition A -> weak evidence -> request stronger signals
|
|
33
|
+
- condition B -> strong evidence -> continue.
|
|
34
|
+
5. Produce framed problem and success criteria.
|
|
35
|
+
6. Emit problem map package.
|
|
36
|
+
|
|
37
|
+
## G. Output Schema
|
|
38
|
+
|
|
39
|
+
```json
|
|
40
|
+
{
|
|
41
|
+
"problem_id": "string",
|
|
42
|
+
"core_pains": ["array","of","strings"],
|
|
43
|
+
"urgency": "low | medium | high",
|
|
44
|
+
"unknowns": "string | null"
|
|
45
|
+
}
|
|
46
|
+
```
|
|
47
|
+
|
|
48
|
+
## H. Output Target
|
|
49
|
+
- Default delivery: stdout
|
|
50
|
+
- Override flag: --output=<target>
|
|
51
|
+
|
|
52
|
+
## I. Stop Conditions <- abort with error message, never emit partial output
|
|
53
|
+
- problem statement remains vague
|
|
54
|
+
- evidence contradicts proposed framing
|
|
55
|
+
|
|
56
|
+
## J. Safety Constraints
|
|
57
|
+
- Hard block: hard block on fabricated assumptions presented as facts
|
|
58
|
+
- Warn only: warn when evidence quality is limited
|
|
@@ -0,0 +1,58 @@
|
|
|
1
|
+
# /release-ready
|
|
2
|
+
|
|
3
|
+
## A. Intent
|
|
4
|
+
Validate pre-release readiness gates and guarantee deploy prerequisites are satisfied.
|
|
5
|
+
|
|
6
|
+
## B. When to Use
|
|
7
|
+
- Use after implementation/tests/risk review and before final release decision.
|
|
8
|
+
- Do not use to execute deployment itself.
|
|
9
|
+
|
|
10
|
+
## C. Context Assumptions
|
|
11
|
+
- Release candidate exists.
|
|
12
|
+
- All required gate outputs are available.
|
|
13
|
+
- Rollout and rollback plans are drafted.
|
|
14
|
+
|
|
15
|
+
## D. Required Inputs
|
|
16
|
+
| Input | Type | Example |
|
|
17
|
+
|---------------------|------------|----------------------------------|
|
|
18
|
+
| `candidate_version` | string | "v2.4.0-rc1" |
|
|
19
|
+
| `gate_artifacts` | string[] | ["test", "risk-review", "perf-scan"] |
|
|
20
|
+
| `release_artifact` | artifact | release checklist, migration plan |
|
|
21
|
+
|
|
22
|
+
## E. Pre-Execution Guards <- fail fast, check ALL before running
|
|
23
|
+
- [ ] mandatory gates are present
|
|
24
|
+
- [ ] critical blockers are resolved
|
|
25
|
+
- [ ] rollback steps are executable
|
|
26
|
+
|
|
27
|
+
## F. Execution Flow
|
|
28
|
+
1. Collect gate evidence for candidate.
|
|
29
|
+
2. Validate checklist completion.
|
|
30
|
+
3. Verify rollout and rollback readiness.
|
|
31
|
+
4. Decision point ->
|
|
32
|
+
- condition A -> missing mandatory gate -> block readiness
|
|
33
|
+
- condition B -> all gates complete -> continue.
|
|
34
|
+
5. Assemble readiness summary and open items.
|
|
35
|
+
6. Emit release-ready report.
|
|
36
|
+
|
|
37
|
+
## G. Output Schema
|
|
38
|
+
|
|
39
|
+
```json
|
|
40
|
+
{
|
|
41
|
+
"readiness_id": "string",
|
|
42
|
+
"gate_status": ["array","of","strings"],
|
|
43
|
+
"readiness_risk": "low | medium | high",
|
|
44
|
+
"blocker": "string | null"
|
|
45
|
+
}
|
|
46
|
+
```
|
|
47
|
+
|
|
48
|
+
## H. Output Target
|
|
49
|
+
- Default delivery: stdout
|
|
50
|
+
- Override flag: --output=<target>
|
|
51
|
+
|
|
52
|
+
## I. Stop Conditions <- abort with error message, never emit partial output
|
|
53
|
+
- mandatory gate missing or failed
|
|
54
|
+
- rollback execution path is unverified
|
|
55
|
+
|
|
56
|
+
## J. Safety Constraints
|
|
57
|
+
- Hard block: hard block when release checklist is incomplete on critical items
|
|
58
|
+
- Warn only: warn when non-critical items are deferred
|