agents-templated 2.2.11 → 2.2.12

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (55) hide show
  1. package/README.md +2 -3
  2. package/agents/commands/README.md +2 -8
  3. package/agents/commands/arch-check.md +58 -33
  4. package/agents/commands/audit.md +58 -38
  5. package/agents/commands/debug-track.md +58 -33
  6. package/agents/commands/docs.md +58 -34
  7. package/agents/commands/fix.md +58 -34
  8. package/agents/commands/learn-loop.md +58 -33
  9. package/agents/commands/perf.md +58 -34
  10. package/agents/commands/plan.md +58 -34
  11. package/agents/commands/pr.md +58 -35
  12. package/agents/commands/problem-map.md +58 -33
  13. package/agents/commands/release-ready.md +58 -33
  14. package/agents/commands/release.md +58 -39
  15. package/agents/commands/risk-review.md +58 -33
  16. package/agents/commands/scope-shape.md +58 -33
  17. package/agents/commands/task.md +58 -35
  18. package/agents/commands/test.md +58 -34
  19. package/agents/commands/ux-bar.md +58 -33
  20. package/lib/workflow.js +8 -21
  21. package/package.json +1 -1
  22. package/templates/CLAUDE.md +3 -0
  23. package/templates/README.md +2 -3
  24. package/templates/agents/commands/README.md +2 -8
  25. package/templates/agents/commands/arch-check.md +58 -33
  26. package/templates/agents/commands/audit.md +58 -38
  27. package/templates/agents/commands/debug-track.md +58 -33
  28. package/templates/agents/commands/docs.md +58 -34
  29. package/templates/agents/commands/fix.md +58 -34
  30. package/templates/agents/commands/learn-loop.md +58 -33
  31. package/templates/agents/commands/perf.md +58 -34
  32. package/templates/agents/commands/plan.md +58 -34
  33. package/templates/agents/commands/pr.md +58 -35
  34. package/templates/agents/commands/problem-map.md +58 -33
  35. package/templates/agents/commands/release-ready.md +58 -33
  36. package/templates/agents/commands/release.md +58 -39
  37. package/templates/agents/commands/risk-review.md +58 -33
  38. package/templates/agents/commands/scope-shape.md +58 -33
  39. package/templates/agents/commands/task.md +58 -35
  40. package/templates/agents/commands/test.md +58 -34
  41. package/templates/agents/commands/ux-bar.md +58 -33
  42. package/templates/agents/skills/README.md +9 -0
  43. package/templates/agents/skills/debug-skill/SKILL.md +39 -0
  44. package/templates/agents/skills/feature-forge/SKILL.md +39 -0
  45. package/templates/agents/skills/secure-code-guardian/SKILL.md +39 -0
  46. package/agents/commands/docs-sync.md +0 -33
  47. package/agents/commands/perf-scan.md +0 -33
  48. package/agents/commands/quality-gate.md +0 -33
  49. package/agents/commands/refactor.md +0 -34
  50. package/agents/commands/scaffold.md +0 -34
  51. package/templates/agents/commands/docs-sync.md +0 -33
  52. package/templates/agents/commands/perf-scan.md +0 -33
  53. package/templates/agents/commands/quality-gate.md +0 -33
  54. package/templates/agents/commands/refactor.md +0 -34
  55. package/templates/agents/commands/scaffold.md +0 -34
@@ -1,34 +1,58 @@
1
- # /perf
2
-
3
- ## A. Intent
4
- Evaluate and optimize performance using measurable baselines.
5
-
6
- ## B. When to Use
7
- Use when latency, throughput, memory, or build-time regressions are reported.
8
-
9
- ## C. Required Inputs
10
- - Target metrics
11
- - Baseline environment
12
- - Optimization scope
13
-
14
- ## D. Deterministic Execution Flow
15
- 1. Capture baseline metrics.
16
- 2. Identify bottlenecks.
17
- 3. Apply one optimization unit.
18
- 4. Re-measure metrics.
19
- 5. Compare against baseline.
20
- 6. Emit performance report.
21
-
22
- ## E. Structured Output Template
23
- - `baseline_metrics`
24
- - `optimization_units[]`
25
- - `post_metrics`
26
- - `regression_check`
27
- - `recommendation`
28
-
29
- ## F. Stop Conditions
30
- - Missing baseline metrics.
31
- - Non-reproducible benchmark.
32
-
33
- ## G. Safety Constraints
34
- - Do not trade security controls for performance.
1
+ # /perf
2
+
3
+ ## A. Intent
4
+ Define and execute deterministic performance optimization workflow against known baselines.
5
+
6
+ ## B. When to Use
7
+ - Use when improving latency, throughput, or resource efficiency.
8
+ - Do not use for one-off smoke checks; use /perf-scan for quick regression comparison.
9
+
10
+ ## C. Context Assumptions
11
+ - Baseline metrics exist or can be captured.
12
+ - Performance target is defined.
13
+ - Measurement method is repeatable.
14
+
15
+ ## D. Required Inputs
16
+ | Input | Type | Example |
17
+ |---------------------|------------|----------------------------------|
18
+ | `performance_goal` | string | "p95 latency under 200ms" |
19
+ | `baseline_metrics` | string[] | ["p95=260ms", "cpu=70%"] |
20
+ | `benchmark_artifact` | artifact | profiling report or benchmark output |
21
+
22
+ ## E. Pre-Execution Guards <- fail fast, check ALL before running
23
+ - [ ] goal is measurable
24
+ - [ ] baseline metric set is present
25
+ - [ ] benchmark method is consistent
26
+
27
+ ## F. Execution Flow
28
+ 1. Capture or validate baseline metrics.
29
+ 2. Apply targeted optimization changes.
30
+ 3. Measure post-change metrics.
31
+ 4. Decision point ->
32
+ - condition A -> target unmet -> iterate optimization
33
+ - condition B -> target met -> continue.
34
+ 5. Summarize gains, tradeoffs, and risks.
35
+ 6. Emit performance optimization report.
36
+
37
+ ## G. Output Schema
38
+
39
+ ```json
40
+ {
41
+ "perf_run_id": "string",
42
+ "metrics": ["array","of","strings"],
43
+ "impact": "low | medium | high",
44
+ "regression": "string | null"
45
+ }
46
+ ```
47
+
48
+ ## H. Output Target
49
+ - Default delivery: stdout
50
+ - Override flag: --output=<target>
51
+
52
+ ## I. Stop Conditions <- abort with error message, never emit partial output
53
+ - baseline cannot be measured reliably
54
+ - measurement method is non-deterministic
55
+
56
+ ## J. Safety Constraints
57
+ - Hard block: do not trade correctness/security for performance gains
58
+ - Warn only: warn when gains are within noise threshold
@@ -1,34 +1,58 @@
1
- # /plan
2
-
3
- ## A. Intent
4
- Generate an executable implementation plan with ordered steps and risk controls.
5
-
6
- ## B. When to Use
7
- Use for non-trivial work requiring sequencing, dependencies, and checkpoints.
8
-
9
- ## C. Required Inputs
10
- - Objective
11
- - Scope boundaries
12
- - Constraints
13
-
14
- ## D. Deterministic Execution Flow
15
- 1. Parse objective and constraints.
16
- 2. Extract atomic work units.
17
- 3. Compute dependency order.
18
- 4. Attach validation checkpoints.
19
- 5. Attach risk and rollback notes.
20
- 6. Emit plan artifacts.
21
-
22
- ## E. Structured Output Template
23
- - `plan_summary`
24
- - `work_units[]`
25
- - `dependency_graph`
26
- - `validation_checkpoints[]`
27
- - `risk_register[]`
28
-
29
- ## F. Stop Conditions
30
- - Missing objective or scope.
31
- - Contradictory constraints.
32
-
33
- ## G. Safety Constraints
34
- - Include security and testing gates for code-changing units.
1
+ # /plan
2
+
3
+ ## A. Intent
4
+ Build a deterministic implementation plan with scoped phases and acceptance checks.
5
+
6
+ ## B. When to Use
7
+ - Use when a feature or change request is approved for planning before coding starts.
8
+ - Do not use for post-incident debugging; use /debug-track instead.
9
+
10
+ ## C. Context Assumptions
11
+ - Problem statement and objective are available.
12
+ - Primary stakeholders and delivery window are known.
13
+ - Scope boundaries can be explicitly defined.
14
+
15
+ ## D. Required Inputs
16
+ | Input | Type | Example |
17
+ |---------------------|------------|----------------------------------|
18
+ | `objective` | string | "Ship onboarding v2" |
19
+ | `constraints` | string[] | ["2-week deadline", "no schema rewrite"] |
20
+ | `references` | artifact | PRD link, issue URL, screenshot |
21
+
22
+ ## E. Pre-Execution Guards <- fail fast, check ALL before running
23
+ - [ ] objective is non-empty and testable
24
+ - [ ] constraints are explicit and non-contradictory
25
+ - [ ] required references are accessible
26
+
27
+ ## F. Execution Flow
28
+ 1. Collect requirements and constraints.
29
+ 2. Split work into ordered phases and milestones.
30
+ 3. Attach measurable acceptance criteria per phase.
31
+ 4. Decision point ->
32
+ - condition A -> phase risk > threshold -> add mitigation gate
33
+ - condition B -> otherwise -> continue with baseline plan.
34
+ 5. Assemble plan artifacts and dependency map.
35
+ 6. Emit final plan package.
36
+
37
+ ## G. Output Schema
38
+
39
+ ```json
40
+ {
41
+ "plan_id": "string",
42
+ "phases": ["array","of","strings"],
43
+ "risk_level": "low | medium | high",
44
+ "notes": "string | null"
45
+ }
46
+ ```
47
+
48
+ ## H. Output Target
49
+ - Default delivery: stdout
50
+ - Override flag: --output=<target>
51
+
52
+ ## I. Stop Conditions <- abort with error message, never emit partial output
53
+ - any guard in section E fails
54
+ - acceptance criteria cannot be made measurable
55
+
56
+ ## J. Safety Constraints
57
+ - Hard block: no hidden scope expansion beyond declared boundaries
58
+ - Warn only: allow proceed with warning when estimate confidence is low
@@ -1,35 +1,58 @@
1
- # /pr
2
-
3
- ## A. Intent
4
- Prepare a deterministic pull request payload with implementation evidence.
5
-
6
- ## B. When to Use
7
- Use after validated changes are ready for review.
8
-
9
- ## C. Required Inputs
10
- - Change summary
11
- - Linked issues/tasks
12
- - Validation evidence
13
-
14
- ## D. Deterministic Execution Flow
15
- 1. Collect changed files.
16
- 2. Summarize intent and impact.
17
- 3. Attach validation evidence.
18
- 4. Classify risk and rollout impact.
19
- 5. Build reviewer checklist.
20
- 6. Emit PR package.
21
-
22
- ## E. Structured Output Template
23
- - `title`
24
- - `summary`
25
- - `files_changed[]`
26
- - `validation_evidence[]`
27
- - `risk_assessment`
28
- - `review_checklist[]`
29
-
30
- ## F. Stop Conditions
31
- - Missing validation evidence.
32
- - Open critical findings.
33
-
34
- ## G. Safety Constraints
35
- - Block PR package when critical issues remain unresolved.
1
+ # /pr
2
+
3
+ ## A. Intent
4
+ Prepare a deterministic pull request package with implementation and validation evidence.
5
+
6
+ ## B. When to Use
7
+ - Use after code changes and validation are complete and review package is needed.
8
+ - Do not use when critical findings are still unresolved.
9
+
10
+ ## C. Context Assumptions
11
+ - Change set exists.
12
+ - Validation evidence is available.
13
+ - Linked issue/task context is known.
14
+
15
+ ## D. Required Inputs
16
+ | Input | Type | Example |
17
+ |---------------------|------------|----------------------------------|
18
+ | `change_summary` | string | "add retry policy to webhook worker" |
19
+ | `linked_items` | string[] | ["ISSUE-18", "TASK-42"] |
20
+ | `validation_evidence` | artifact | test report, benchmark output, screenshot |
21
+
22
+ ## E. Pre-Execution Guards <- fail fast, check ALL before running
23
+ - [ ] change summary is complete
24
+ - [ ] linked items are resolvable
25
+ - [ ] validation evidence is present
26
+
27
+ ## F. Execution Flow
28
+ 1. Collect changed files and linked references.
29
+ 2. Summarize intent, impact, and scope.
30
+ 3. Attach validation and risk evidence.
31
+ 4. Decision point ->
32
+ - condition A -> critical blocker open -> abort PR package
33
+ - condition B -> no blocker -> continue.
34
+ 5. Build reviewer checklist and rollout notes.
35
+ 6. Emit PR payload.
36
+
37
+ ## G. Output Schema
38
+
39
+ ```json
40
+ {
41
+ "title": "string",
42
+ "files_changed": ["array","of","strings"],
43
+ "risk_assessment": "low | medium | high",
44
+ "blockers": "string | null"
45
+ }
46
+ ```
47
+
48
+ ## H. Output Target
49
+ - Default delivery: stdout
50
+ - Override flag: --output=<target>
51
+
52
+ ## I. Stop Conditions <- abort with error message, never emit partial output
53
+ - validation evidence missing for critical changes
54
+ - open critical findings remain unresolved
55
+
56
+ ## J. Safety Constraints
57
+ - Hard block: hard block if critical issues remain
58
+ - Warn only: warn when non-critical follow-up items are deferred
@@ -1,33 +1,58 @@
1
- # /problem-map
2
-
3
- ## A. Intent
4
- Define the actual user problem and measurable pain signals before solutioning.
5
-
6
- ## B. When to Use
7
- Use at the start of an initiative when the request is a feature idea rather than a validated problem.
8
-
9
- ## C. Required Inputs
10
- - Problem statement
11
- - Current user pain examples
12
- - Target user segment
13
-
14
- ## D. Deterministic Execution Flow
15
- 1. Extract user outcomes and friction points.
16
- 2. Separate symptoms from root pain.
17
- 3. Identify constraints and non-goals.
18
- 4. Propose a focused problem frame.
19
- 5. Emit acceptance signals for success.
20
-
21
- ## E. Structured Output Template
22
- - `problem_frame`
23
- - `pain_signals[]`
24
- - `root_causes[]`
25
- - `target_user_segment`
26
- - `success_signals[]`
27
-
28
- ## F. Stop Conditions
29
- - Missing target user segment.
30
- - No concrete pain evidence provided.
31
-
32
- ## G. Safety Constraints
33
- - Do not lock implementation details in this stage.
1
+ # /problem-map
2
+
3
+ ## A. Intent
4
+ Frame the real user problem and guarantee a clear problem statement before planning.
5
+
6
+ ## B. When to Use
7
+ - Use at the start of a feature cycle when pain points are unclear or broad.
8
+ - Do not use for implementation details or code-level debugging.
9
+
10
+ ## C. Context Assumptions
11
+ - User objective is available.
12
+ - Stakeholder context can be collected.
13
+ - Outcome can be stated as a measurable problem.
14
+
15
+ ## D. Required Inputs
16
+ | Input | Type | Example |
17
+ |---------------------|------------|----------------------------------|
18
+ | `user_problem` | string | "onboarding drop-off at step 2" |
19
+ | `signals` | string[] | ["support tickets", "analytics"] |
20
+ | `evidence_artifact` | artifact | funnel screenshot, issue links |
21
+
22
+ ## E. Pre-Execution Guards <- fail fast, check ALL before running
23
+ - [ ] problem statement is concrete
24
+ - [ ] signals support the stated pain
25
+ - [ ] scope remains problem-focused
26
+
27
+ ## F. Execution Flow
28
+ 1. Collect user pain signals and context.
29
+ 2. Synthesize candidate problem statements.
30
+ 3. Validate statement against evidence.
31
+ 4. Decision point ->
32
+ - condition A -> weak evidence -> request stronger signals
33
+ - condition B -> strong evidence -> continue.
34
+ 5. Produce framed problem and success criteria.
35
+ 6. Emit problem map package.
36
+
37
+ ## G. Output Schema
38
+
39
+ ```json
40
+ {
41
+ "problem_id": "string",
42
+ "core_pains": ["array","of","strings"],
43
+ "urgency": "low | medium | high",
44
+ "unknowns": "string | null"
45
+ }
46
+ ```
47
+
48
+ ## H. Output Target
49
+ - Default delivery: stdout
50
+ - Override flag: --output=<target>
51
+
52
+ ## I. Stop Conditions <- abort with error message, never emit partial output
53
+ - problem statement remains vague
54
+ - evidence contradicts proposed framing
55
+
56
+ ## J. Safety Constraints
57
+ - Hard block: hard block on fabricated assumptions presented as facts
58
+ - Warn only: warn when evidence quality is limited
@@ -1,33 +1,58 @@
1
- # /release-ready
2
-
3
- ## A. Intent
4
- Validate release readiness with checks for quality, risk, and rollback.
5
-
6
- ## B. When to Use
7
- Use immediately before opening or merging a release PR.
8
-
9
- ## C. Required Inputs
10
- - Change summary
11
- - Validation evidence
12
- - Deployment path
13
-
14
- ## D. Deterministic Execution Flow
15
- 1. Confirm test and quality gate outcomes.
16
- 2. Confirm risk-review status.
17
- 3. Verify migration and deploy prerequisites.
18
- 4. Verify rollback plan.
19
- 5. Emit release readiness decision.
20
-
21
- ## E. Structured Output Template
22
- - `release_scope`
23
- - `checks_passed[]`
24
- - `blocking_issues[]`
25
- - `rollback_plan`
26
- - `ready_status`
27
-
28
- ## F. Stop Conditions
29
- - Blocking issue unresolved.
30
- - Rollback plan absent.
31
-
32
- ## G. Safety Constraints
33
- - Do not approve release when required evidence is missing.
1
+ # /release-ready
2
+
3
+ ## A. Intent
4
+ Validate pre-release readiness gates and guarantee deploy prerequisites are satisfied.
5
+
6
+ ## B. When to Use
7
+ - Use after implementation/tests/risk review and before final release decision.
8
+ - Do not use to execute deployment itself.
9
+
10
+ ## C. Context Assumptions
11
+ - Release candidate exists.
12
+ - All required gate outputs are available.
13
+ - Rollout and rollback plans are drafted.
14
+
15
+ ## D. Required Inputs
16
+ | Input | Type | Example |
17
+ |---------------------|------------|----------------------------------|
18
+ | `candidate_version` | string | "v2.4.0-rc1" |
19
+ | `gate_artifacts` | string[] | ["test", "risk-review", "perf-scan"] |
20
+ | `release_artifact` | artifact | release checklist, migration plan |
21
+
22
+ ## E. Pre-Execution Guards <- fail fast, check ALL before running
23
+ - [ ] mandatory gates are present
24
+ - [ ] critical blockers are resolved
25
+ - [ ] rollback steps are executable
26
+
27
+ ## F. Execution Flow
28
+ 1. Collect gate evidence for candidate.
29
+ 2. Validate checklist completion.
30
+ 3. Verify rollout and rollback readiness.
31
+ 4. Decision point ->
32
+ - condition A -> missing mandatory gate -> block readiness
33
+ - condition B -> all gates complete -> continue.
34
+ 5. Assemble readiness summary and open items.
35
+ 6. Emit release-ready report.
36
+
37
+ ## G. Output Schema
38
+
39
+ ```json
40
+ {
41
+ "readiness_id": "string",
42
+ "gate_status": ["array","of","strings"],
43
+ "readiness_risk": "low | medium | high",
44
+ "blocker": "string | null"
45
+ }
46
+ ```
47
+
48
+ ## H. Output Target
49
+ - Default delivery: stdout
50
+ - Override flag: --output=<target>
51
+
52
+ ## I. Stop Conditions <- abort with error message, never emit partial output
53
+ - mandatory gate missing or failed
54
+ - rollback execution path is unverified
55
+
56
+ ## J. Safety Constraints
57
+ - Hard block: hard block when release checklist is incomplete on critical items
58
+ - Warn only: warn when non-critical items are deferred
@@ -1,39 +1,58 @@
1
- # /release
2
-
3
- ## A. Intent
4
- Produce deterministic release readiness decision and rollout contract.
5
-
6
- ## B. When to Use
7
- Use when promoting validated changes to release channels.
8
-
9
- ## C. Required Inputs
10
- - Version/tag
11
- - Change manifest
12
- - Rollback strategy
13
- - Hardening verification evidence (when required by risk profile)
14
-
15
- ## D. Deterministic Execution Flow
16
- 1. Validate release prerequisites.
17
- 2. Validate compatibility and migration risks.
18
- 3. Validate security and test gates.
19
- 4. Validate hardening verification evidence when hardening-required profile applies.
20
- 5. Build release notes.
21
- 6. Build rollout and rollback steps.
22
- 7. Emit release contract.
23
-
24
- ## E. Structured Output Template
25
- - `version`
26
- - `release_readiness`
27
- - `gates[]`
28
- - `rollout_plan[]`
29
- - `rollback_plan[]`
30
- - `release_notes`
31
- - `hardening_verification`
32
-
33
- ## F. Stop Conditions
34
- - Gate failure.
35
- - Missing rollback strategy.
36
-
37
- ## G. Safety Constraints
38
- - Block release when any critical gate fails.
39
- - Block release when required hardening evidence is missing.
1
+ # /release
2
+
3
+ ## A. Intent
4
+ Generate deterministic release decision package with rollout and rollback readiness.
5
+
6
+ ## B. When to Use
7
+ - Use when deciding whether to ship to production.
8
+ - Do not use before release-ready checks are complete.
9
+
10
+ ## C. Context Assumptions
11
+ - Release candidate is identified.
12
+ - Pre-release checks are completed.
13
+ - Rollback strategy is defined.
14
+
15
+ ## D. Required Inputs
16
+ | Input | Type | Example |
17
+ |---------------------|------------|----------------------------------|
18
+ | `version` | string | "v2.4.0" |
19
+ | `gate_results` | string[] | ["tests-pass", "risk-review-pass"] |
20
+ | `release_artifacts` | artifact | release notes draft, migration plan |
21
+
22
+ ## E. Pre-Execution Guards <- fail fast, check ALL before running
23
+ - [ ] version is valid and unique
24
+ - [ ] required gates are complete
25
+ - [ ] rollback plan exists
26
+
27
+ ## F. Execution Flow
28
+ 1. Collect gate outputs and release artifacts.
29
+ 2. Validate rollout and rollback prerequisites.
30
+ 3. Classify release risk.
31
+ 4. Decision point ->
32
+ - condition A -> high unresolved risk -> block release
33
+ - condition B -> acceptable risk -> continue.
34
+ 5. Build release decision and communication payload.
35
+ 6. Emit release package.
36
+
37
+ ## G. Output Schema
38
+
39
+ ```json
40
+ {
41
+ "release_id": "string",
42
+ "gates": ["array","of","strings"],
43
+ "release_risk": "low | medium | high",
44
+ "rollback_status": "string | null"
45
+ }
46
+ ```
47
+
48
+ ## H. Output Target
49
+ - Default delivery: stdout
50
+ - Override flag: --output=<target>
51
+
52
+ ## I. Stop Conditions <- abort with error message, never emit partial output
53
+ - required gate missing or failed
54
+ - rollback plan is undefined
55
+
56
+ ## J. Safety Constraints
57
+ - Hard block: hard block on unresolved high-severity release risks
58
+ - Warn only: warn when rollout is phased due to uncertainty
@@ -1,33 +1,58 @@
1
- # /risk-review
2
-
3
- ## A. Intent
4
- Identify release risks that may pass CI but fail in production.
5
-
6
- ## B. When to Use
7
- Use before merge or release candidate approval.
8
-
9
- ## C. Required Inputs
10
- - Proposed changes
11
- - Test and validation status
12
- - Deployment context
13
-
14
- ## D. Deterministic Execution Flow
15
- 1. Inspect behavior deltas.
16
- 2. Rank risks by impact and likelihood.
17
- 3. Validate mitigation or rollback paths.
18
- 4. Identify missing tests.
19
- 5. Emit ship recommendation.
20
-
21
- ## E. Structured Output Template
22
- - `risk_findings[]`
23
- - `severity_summary`
24
- - `mitigations[]`
25
- - `rollback_readiness`
26
- - `release_recommendation`
27
-
28
- ## F. Stop Conditions
29
- - High-severity risk has no mitigation.
30
- - Rollback path is undefined.
31
-
32
- ## G. Safety Constraints
33
- - Block release for unresolved high-severity findings.
1
+ # /risk-review
2
+
3
+ ## A. Intent
4
+ Perform deterministic release risk review with mitigation and rollback readiness.
5
+
6
+ ## B. When to Use
7
+ - Use before merge or release approval on non-trivial changes.
8
+ - Do not use as a substitute for running tests.
9
+
10
+ ## C. Context Assumptions
11
+ - Change set is available.
12
+ - Validation evidence exists.
13
+ - Deployment context is known.
14
+
15
+ ## D. Required Inputs
16
+ | Input | Type | Example |
17
+ |---------------------|------------|----------------------------------|
18
+ | `change_set` | string | "payment retry + queue changes" |
19
+ | `validation_status` | string[] | ["unit pass", "integration pass"] |
20
+ | `deployment_artifact` | artifact | rollout plan, env config snapshot |
21
+
22
+ ## E. Pre-Execution Guards <- fail fast, check ALL before running
23
+ - [ ] change set is fully described
24
+ - [ ] validation status is current
25
+ - [ ] rollback path is defined
26
+
27
+ ## F. Execution Flow
28
+ 1. Inspect behavior deltas and blast radius.
29
+ 2. Rank risks by impact and likelihood.
30
+ 3. Validate mitigations and rollback readiness.
31
+ 4. Decision point ->
32
+ - condition A -> high unresolved risk -> block recommendation
33
+ - condition B -> acceptable risk -> continue.
34
+ 5. Build release risk summary and actions.
35
+ 6. Emit risk review report.
36
+
37
+ ## G. Output Schema
38
+
39
+ ```json
40
+ {
41
+ "review_id": "string",
42
+ "risks": ["array","of","strings"],
43
+ "risk_level": "low | medium | high",
44
+ "recommendation": "string | null"
45
+ }
46
+ ```
47
+
48
+ ## H. Output Target
49
+ - Default delivery: stdout
50
+ - Override flag: --output=<target>
51
+
52
+ ## I. Stop Conditions <- abort with error message, never emit partial output
53
+ - high-severity risk has no mitigation
54
+ - rollback readiness is undefined
55
+
56
+ ## J. Safety Constraints
57
+ - Hard block: hard block on unresolved high-severity risks
58
+ - Warn only: warn when medium risks are accepted with owner