agents-templated 2.2.11 → 2.2.12

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (55) hide show
  1. package/README.md +2 -3
  2. package/agents/commands/README.md +2 -8
  3. package/agents/commands/arch-check.md +58 -33
  4. package/agents/commands/audit.md +58 -38
  5. package/agents/commands/debug-track.md +58 -33
  6. package/agents/commands/docs.md +58 -34
  7. package/agents/commands/fix.md +58 -34
  8. package/agents/commands/learn-loop.md +58 -33
  9. package/agents/commands/perf.md +58 -34
  10. package/agents/commands/plan.md +58 -34
  11. package/agents/commands/pr.md +58 -35
  12. package/agents/commands/problem-map.md +58 -33
  13. package/agents/commands/release-ready.md +58 -33
  14. package/agents/commands/release.md +58 -39
  15. package/agents/commands/risk-review.md +58 -33
  16. package/agents/commands/scope-shape.md +58 -33
  17. package/agents/commands/task.md +58 -35
  18. package/agents/commands/test.md +58 -34
  19. package/agents/commands/ux-bar.md +58 -33
  20. package/lib/workflow.js +8 -21
  21. package/package.json +1 -1
  22. package/templates/CLAUDE.md +3 -0
  23. package/templates/README.md +2 -3
  24. package/templates/agents/commands/README.md +2 -8
  25. package/templates/agents/commands/arch-check.md +58 -33
  26. package/templates/agents/commands/audit.md +58 -38
  27. package/templates/agents/commands/debug-track.md +58 -33
  28. package/templates/agents/commands/docs.md +58 -34
  29. package/templates/agents/commands/fix.md +58 -34
  30. package/templates/agents/commands/learn-loop.md +58 -33
  31. package/templates/agents/commands/perf.md +58 -34
  32. package/templates/agents/commands/plan.md +58 -34
  33. package/templates/agents/commands/pr.md +58 -35
  34. package/templates/agents/commands/problem-map.md +58 -33
  35. package/templates/agents/commands/release-ready.md +58 -33
  36. package/templates/agents/commands/release.md +58 -39
  37. package/templates/agents/commands/risk-review.md +58 -33
  38. package/templates/agents/commands/scope-shape.md +58 -33
  39. package/templates/agents/commands/task.md +58 -35
  40. package/templates/agents/commands/test.md +58 -34
  41. package/templates/agents/commands/ux-bar.md +58 -33
  42. package/templates/agents/skills/README.md +9 -0
  43. package/templates/agents/skills/debug-skill/SKILL.md +39 -0
  44. package/templates/agents/skills/feature-forge/SKILL.md +39 -0
  45. package/templates/agents/skills/secure-code-guardian/SKILL.md +39 -0
  46. package/agents/commands/docs-sync.md +0 -33
  47. package/agents/commands/perf-scan.md +0 -33
  48. package/agents/commands/quality-gate.md +0 -33
  49. package/agents/commands/refactor.md +0 -34
  50. package/agents/commands/scaffold.md +0 -34
  51. package/templates/agents/commands/docs-sync.md +0 -33
  52. package/templates/agents/commands/perf-scan.md +0 -33
  53. package/templates/agents/commands/quality-gate.md +0 -33
  54. package/templates/agents/commands/refactor.md +0 -34
  55. package/templates/agents/commands/scaffold.md +0 -34
@@ -1,34 +1,58 @@
1
- # /test
2
-
3
- ## A. Intent
4
- Generate or execute deterministic test plans and test artifacts.
5
-
6
- ## B. When to Use
7
- Use for feature validation, regression prevention, and release readiness.
8
-
9
- ## C. Required Inputs
10
- - Target scope
11
- - Test level
12
- - Expected behavior
13
-
14
- ## D. Deterministic Execution Flow
15
- 1. Resolve test scope.
16
- 2. Map behavior to test cases.
17
- 3. Execute or generate tests.
18
- 4. Capture pass/fail artifacts.
19
- 5. Classify failures.
20
- 6. Emit test report.
21
-
22
- ## E. Structured Output Template
23
- - `scope`
24
- - `test_matrix[]`
25
- - `execution_results[]`
26
- - `coverage_delta`
27
- - `failures[]`
28
-
29
- ## F. Stop Conditions
30
- - Unavailable runtime.
31
- - Undefined scope.
32
-
33
- ## G. Safety Constraints
34
- - Do not mark success if critical tests are skipped.
1
+ # /test
2
+
3
+ ## A. Intent
4
+ Run deterministic validation and gate release readiness based on test evidence.
5
+
6
+ ## B. When to Use
7
+ - Use when validating behavior after implementation or before merge/release.
8
+ - This command now includes quality-gate behavior; do not use /quality-gate.
9
+
10
+ ## C. Context Assumptions
11
+ - Test targets are defined.
12
+ - Required environments are available.
13
+ - Pass/fail criteria are explicit.
14
+
15
+ ## D. Required Inputs
16
+ | Input | Type | Example |
17
+ |---------------------|------------|----------------------------------|
18
+ | `test_scope` | string | "api regression" |
19
+ | `test_suites` | string[] | ["unit", "integration", "critical-flow"] |
20
+ | `evidence_artifact` | artifact | test report path or CI run URL |
21
+
22
+ ## E. Pre-Execution Guards <- fail fast, check ALL before running
23
+ - [ ] test scope is non-empty
24
+ - [ ] critical test suites are executable
25
+ - [ ] pass criteria are declared
26
+
27
+ ## F. Execution Flow
28
+ 1. Collect test targets and runtime config.
29
+ 2. Execute suites in deterministic order.
30
+ 3. Aggregate results and failures.
31
+ 4. Decision point ->
32
+ - condition A -> critical failures present -> gate = blocked
33
+ - condition B -> no critical failures -> gate = pass.
34
+ 5. Build validation evidence and remediation list.
35
+ 6. Emit test and gate report.
36
+
37
+ ## G. Output Schema
38
+
39
+ ```json
40
+ {
41
+ "test_run_id": "string",
42
+ "results": ["array","of","strings"],
43
+ "gate_status": "low | medium | high",
44
+ "blocker": "string | null"
45
+ }
46
+ ```
47
+
48
+ ## H. Output Target
49
+ - Default delivery: stdout
50
+ - Override flag: --output=<target>
51
+
52
+ ## I. Stop Conditions <- abort with error message, never emit partial output
53
+ - critical test suite cannot run
54
+ - result schema cannot be produced
55
+
56
+ ## J. Safety Constraints
57
+ - Hard block: hard block when critical flow tests fail
58
+ - Warn only: warn when flaky tests are excluded with justification
@@ -1,33 +1,58 @@
1
- # /ux-bar
2
-
3
- ## A. Intent
4
- Set a minimum UX quality bar with clear criteria before UI implementation.
5
-
6
- ## B. When to Use
7
- Use when a feature has user-facing interaction or visual design impact.
8
-
9
- ## C. Required Inputs
10
- - Target user flow
11
- - Existing design language
12
- - Accessibility requirements
13
-
14
- ## D. Deterministic Execution Flow
15
- 1. Evaluate key interaction states.
16
- 2. Check visual hierarchy and clarity.
17
- 3. Validate accessibility coverage.
18
- 4. Identify UX risks and gaps.
19
- 5. Emit UX quality checklist.
20
-
21
- ## E. Structured Output Template
22
- - `ux_scorecard[]`
23
- - `interaction_states[]`
24
- - `accessibility_checks[]`
25
- - `ux_gaps[]`
26
- - `improvements[]`
27
-
28
- ## F. Stop Conditions
29
- - Critical flow has undefined state handling.
30
- - Accessibility constraints are missing.
31
-
32
- ## G. Safety Constraints
33
- - Preserve existing design system patterns unless an explicit redesign is approved.
1
+ # /ux-bar
2
+
3
+ ## A. Intent
4
+ Assess UX quality bar and guarantee core interaction states are defined before build.
5
+
6
+ ## B. When to Use
7
+ - Use when UX quality and accessibility need pre-implementation validation.
8
+ - Do not use as a replacement for visual design exploration.
9
+
10
+ ## C. Context Assumptions
11
+ - Scope and architecture are available.
12
+ - Primary user flows are identified.
13
+ - Design references exist.
14
+
15
+ ## D. Required Inputs
16
+ | Input | Type | Example |
17
+ |---------------------|------------|----------------------------------|
18
+ | `ux_goal` | string | "reduce checkout friction" |
19
+ | `flows` | string[] | ["cart", "payment", "confirmation"] |
20
+ | `design_artifact` | artifact | wireframes, Figma link, screenshots |
21
+
22
+ ## E. Pre-Execution Guards <- fail fast, check ALL before running
23
+ - [ ] critical flows are enumerated
24
+ - [ ] interaction states include loading/error/empty
25
+ - [ ] accessibility checks are defined
26
+
27
+ ## F. Execution Flow
28
+ 1. Review flows and interaction states.
29
+ 2. Evaluate accessibility and usability risks.
30
+ 3. Score UX gaps by severity.
31
+ 4. Decision point ->
32
+ - condition A -> critical UX gap -> block readiness
33
+ - condition B -> manageable gaps -> continue.
34
+ 5. Build prioritized improvement list.
35
+ 6. Emit UX quality package.
36
+
37
+ ## G. Output Schema
38
+
39
+ ```json
40
+ {
41
+ "ux_review_id": "string",
42
+ "ux_gaps": ["array","of","strings"],
43
+ "severity": "low | medium | high",
44
+ "blocker": "string | null"
45
+ }
46
+ ```
47
+
48
+ ## H. Output Target
49
+ - Default delivery: stdout
50
+ - Override flag: --output=<target>
51
+
52
+ ## I. Stop Conditions <- abort with error message, never emit partial output
53
+ - critical flow lacks defined interaction states
54
+ - accessibility baseline is not addressed
55
+
56
+ ## J. Safety Constraints
57
+ - Hard block: hard block on unaddressed critical accessibility failures
58
+ - Warn only: warn when medium UX issues are deferred
@@ -61,6 +61,12 @@ To create a new skill for your specific domain:
61
61
  │ └── SKILL.md # Systematic feature scoping and execution contracts
62
62
  ├── bug-triage/
63
63
  │ └── SKILL.md # Reproduction-first debugging and regression workflows
64
+ ├── debug-skill/
65
+ │ └── SKILL.md # Breakpoint-first debugging and execution tracing
66
+ ├── secure-code-guardian/
67
+ │ └── SKILL.md # Secure-by-default coding for auth and input boundaries
68
+ ├── feature-forge/
69
+ │ └── SKILL.md # Requirements forging before implementation starts
64
70
  ├── error-patterns/
65
71
  │ └── SKILL.md # Persistent debugging memory and known-fix application
66
72
  ├── app-hardening/
@@ -102,6 +108,9 @@ Consider creating skills for:
102
108
 
103
109
  - `feature-delivery`: Use when user asks are broad and you need objective, scope, acceptance criteria, and validation plan.
104
110
  - `bug-triage`: Use for defects and regressions requiring reproducible evidence, root-cause isolation, and minimal safe patches.
111
+ - `debug-skill`: Use for breakpoint-driven debugging, execution tracing, and variable-state inspection.
112
+ - `secure-code-guardian`: Use for secure-by-default implementation across auth, secrets, and untrusted input.
113
+ - `feature-forge`: Use before coding to turn rough asks into execution-ready requirements and acceptance criteria.
105
114
  - `error-patterns`: Use when errors repeat to apply known fixes from lessons-learned and automatically record new resolutions.
106
115
  - `app-hardening`: Use for high-risk/distributed runtimes to enforce hardening profile, obfuscation decisions, and release evidence.
107
116
  - `shadcn-ui`: Use for shadcn/ui installation, component composition, form patterns, and theme customization.
@@ -0,0 +1,39 @@
1
+ ---
2
+ name: debug-skill
3
+ description: Enables breakpoint-driven debugging workflows with execution tracing, state inspection, and root-cause proof before patching.
4
+ ---
5
+
6
+ # Debug Skill
7
+
8
+ Use this skill when the user is stuck on a bug and needs debugger-style investigation instead of print-guessing.
9
+
10
+ ## Trigger Conditions
11
+
12
+ - User asks to debug, set breakpoints, step through code, or inspect runtime state.
13
+ - A bug is intermittent, difficult to localize, or likely branch/state dependent.
14
+ - Existing logs are insufficient to prove root cause.
15
+
16
+ ## Workflow
17
+
18
+ 1. Confirm a reproducible scenario and expected vs actual behavior.
19
+ 2. Define a checkpoint plan (breakpoints/log points/frames).
20
+ 3. Trace execution order across checkpoints.
21
+ 4. Capture variable-state transitions at failure boundaries.
22
+ 5. Prove root cause with execution evidence.
23
+ 6. Apply the smallest safe patch and run focused regressions.
24
+
25
+ ## Output Contract
26
+
27
+ - Reproduction summary
28
+ - Checkpoint plan
29
+ - Execution trace highlights
30
+ - State snapshots at critical steps
31
+ - Root-cause finding
32
+ - Minimal patch plan
33
+ - Regression checks and residual risk
34
+
35
+ ## Guardrails
36
+
37
+ - Do not ship speculative fixes without trace-backed evidence.
38
+ - Do not skip regression validation after state-sensitive fixes.
39
+ - If reproduction fails, stop and request missing runtime context.
@@ -0,0 +1,39 @@
1
+ ---
2
+ name: feature-forge
3
+ description: Turns vague feature requests into execution-ready requirements, acceptance criteria, and validation plans before coding starts.
4
+ ---
5
+
6
+ # Feature Forge
7
+
8
+ Use this skill before implementation when feature requests are high-level, ambiguous, or under-specified.
9
+
10
+ ## Trigger Conditions
11
+
12
+ - User says build/add/create/implement without a full spec.
13
+ - Requirements are broad or mixed between business and technical language.
14
+ - Scope boundaries and acceptance criteria are unclear.
15
+
16
+ ## Workflow
17
+
18
+ 1. Restate objective and target user outcome.
19
+ 2. Define in-scope and out-of-scope boundaries.
20
+ 3. Convert asks into concrete functional requirements.
21
+ 4. Produce testable acceptance criteria.
22
+ 5. Split work into dependency-ordered slices.
23
+ 6. Define validation approach and rollback notes.
24
+
25
+ ## Output Contract
26
+
27
+ - Objective summary
28
+ - Scope in/out
29
+ - Functional requirements
30
+ - Acceptance criteria
31
+ - Implementation slices
32
+ - Validation plan
33
+ - Risks, assumptions, and rollback notes
34
+
35
+ ## Guardrails
36
+
37
+ - Do not move to implementation planning without explicit scope boundaries.
38
+ - Keep acceptance criteria measurable and testable.
39
+ - Raise blockers when requirements conflict or remain ambiguous.
@@ -0,0 +1,39 @@
1
+ ---
2
+ name: secure-code-guardian
3
+ description: Enforces secure-by-default implementation for auth, credentials, and untrusted input paths with OWASP-aligned controls.
4
+ ---
5
+
6
+ # Secure Code Guardian
7
+
8
+ Use this skill when building or reviewing features that touch authentication, secrets, session logic, or user-controlled input.
9
+
10
+ ## Trigger Conditions
11
+
12
+ - User asks for secure implementation, auth, JWT, password handling, or OWASP checks.
13
+ - New endpoints, forms, or integrations expose untrusted input boundaries.
14
+ - A feature handles sensitive data, identity, or permissions.
15
+
16
+ ## Workflow
17
+
18
+ 1. Map trust boundaries, actors, and attack surface.
19
+ 2. Define authentication and authorization requirements.
20
+ 3. Apply input validation and injection defenses at boundaries.
21
+ 4. Enforce credential/secrets handling and safe logging rules.
22
+ 5. Add abuse protection controls (rate limiting, lockouts, replay defenses where relevant).
23
+ 6. Define security tests and residual risk before ship recommendation.
24
+
25
+ ## Output Contract
26
+
27
+ - Attack surface map
28
+ - Security requirements
29
+ - Applied controls by boundary
30
+ - OWASP alignment notes
31
+ - Security validation checklist
32
+ - Residual risks and mitigations
33
+ - Ship/block recommendation
34
+
35
+ ## Guardrails
36
+
37
+ - Never trust client-side validation alone.
38
+ - Never expose secrets, credentials, or sensitive payloads in logs.
39
+ - Block release recommendation if critical controls are missing.
@@ -1,33 +0,0 @@
1
- # /docs-sync
2
-
3
- ## A. Intent
4
- Keep documentation aligned with shipped behavior and contract changes.
5
-
6
- ## B. When to Use
7
- Use after implementation or release-prep changes.
8
-
9
- ## C. Required Inputs
10
- - Code changes summary
11
- - Updated behavior/contracts
12
- - Target documentation set
13
-
14
- ## D. Deterministic Execution Flow
15
- 1. Identify behavior and API changes.
16
- 2. Locate affected docs.
17
- 3. Update docs with minimal accurate edits.
18
- 4. Verify examples and command references.
19
- 5. Emit documentation update summary.
20
-
21
- ## E. Structured Output Template
22
- - `docs_updated[]`
23
- - `behavior_changes[]`
24
- - `contract_updates[]`
25
- - `example_checks[]`
26
- - `remaining_doc_gaps[]`
27
-
28
- ## F. Stop Conditions
29
- - Behavior changed with no corresponding doc update.
30
- - Example commands are unverified.
31
-
32
- ## G. Safety Constraints
33
- - Do not publish stale setup or command instructions.
@@ -1,33 +0,0 @@
1
- # /perf-scan
2
-
3
- ## A. Intent
4
- Measure baseline performance and detect regressions with deterministic thresholds.
5
-
6
- ## B. When to Use
7
- Use before and after performance-sensitive changes.
8
-
9
- ## C. Required Inputs
10
- - Baseline context
11
- - Target endpoints or flows
12
- - Performance thresholds
13
-
14
- ## D. Deterministic Execution Flow
15
- 1. Capture baseline metrics.
16
- 2. Execute candidate workload.
17
- 3. Compare p95/p99 latency and error rates.
18
- 4. Flag regressions with threshold deltas.
19
- 5. Emit optimization priorities.
20
-
21
- ## E. Structured Output Template
22
- - `baseline_metrics`
23
- - `candidate_metrics`
24
- - `regressions[]`
25
- - `threshold_checks[]`
26
- - `recommendations[]`
27
-
28
- ## F. Stop Conditions
29
- - Baseline missing.
30
- - Thresholds undefined.
31
-
32
- ## G. Safety Constraints
33
- - Avoid performance claims without before/after evidence.
@@ -1,33 +0,0 @@
1
- # /quality-gate
2
-
3
- ## A. Intent
4
- Enforce quality gates using test signals, behavior checks, and regression controls.
5
-
6
- ## B. When to Use
7
- Use before release, and after major bug fixes.
8
-
9
- ## C. Required Inputs
10
- - Target build/revision
11
- - Test scope
12
- - Critical user flows
13
-
14
- ## D. Deterministic Execution Flow
15
- 1. Run required test layers.
16
- 2. Validate critical user flows.
17
- 3. Inspect flaky or unstable results.
18
- 4. Define required remediations.
19
- 5. Emit pass/conditional/block outcome.
20
-
21
- ## E. Structured Output Template
22
- - `test_results[]`
23
- - `critical_flow_status[]`
24
- - `quality_findings[]`
25
- - `required_fixes[]`
26
- - `gate_status`
27
-
28
- ## F. Stop Conditions
29
- - Critical flow untested.
30
- - Required tests failed.
31
-
32
- ## G. Safety Constraints
33
- - Do not mark pass when critical regressions remain open.
@@ -1,34 +0,0 @@
1
- # /refactor
2
-
3
- ## A. Intent
4
- Improve internal structure without changing externally observable behavior.
5
-
6
- ## B. When to Use
7
- Use for maintainability and modularity improvements.
8
-
9
- ## C. Required Inputs
10
- - Target component/module
11
- - Non-functional goals
12
- - Behavior invariants
13
-
14
- ## D. Deterministic Execution Flow
15
- 1. Capture behavior invariants.
16
- 2. Define refactor units.
17
- 3. Apply one unit at a time.
18
- 4. Verify invariants after each unit.
19
- 5. Measure complexity delta.
20
- 6. Emit refactor report.
21
-
22
- ## E. Structured Output Template
23
- - `target`
24
- - `invariants[]`
25
- - `transformations[]`
26
- - `behavior_check_results[]`
27
- - `complexity_delta`
28
-
29
- ## F. Stop Conditions
30
- - Invariant violation.
31
- - Missing baseline behavior.
32
-
33
- ## G. Safety Constraints
34
- - Abort on behavior-change risk.
@@ -1,34 +0,0 @@
1
- # /scaffold
2
-
3
- ## A. Intent
4
- Create deterministic project/module boilerplate with secure defaults.
5
-
6
- ## B. When to Use
7
- Use to initialize new modules/features with approved structure.
8
-
9
- ## C. Required Inputs
10
- - Target module name
11
- - Runtime/stack
12
- - Required patterns
13
-
14
- ## D. Deterministic Execution Flow
15
- 1. Validate target path non-conflict.
16
- 2. Resolve scaffold template.
17
- 3. Generate file tree.
18
- 4. Apply secure defaults.
19
- 5. Generate baseline tests.
20
- 6. Emit scaffold manifest.
21
-
22
- ## E. Structured Output Template
23
- - `target`
24
- - `template_source`
25
- - `files_created[]`
26
- - `secure_defaults[]`
27
- - `tests_created[]`
28
-
29
- ## F. Stop Conditions
30
- - Path collision.
31
- - Unsupported template/runtime.
32
-
33
- ## G. Safety Constraints
34
- - Do not overwrite existing files without explicit confirmation.
@@ -1,33 +0,0 @@
1
- # /docs-sync
2
-
3
- ## A. Intent
4
- Keep documentation aligned with shipped behavior and contract changes.
5
-
6
- ## B. When to Use
7
- Use after implementation or release-prep changes.
8
-
9
- ## C. Required Inputs
10
- - Code changes summary
11
- - Updated behavior/contracts
12
- - Target documentation set
13
-
14
- ## D. Deterministic Execution Flow
15
- 1. Identify behavior and API changes.
16
- 2. Locate affected docs.
17
- 3. Update docs with minimal accurate edits.
18
- 4. Verify examples and command references.
19
- 5. Emit documentation update summary.
20
-
21
- ## E. Structured Output Template
22
- - `docs_updated[]`
23
- - `behavior_changes[]`
24
- - `contract_updates[]`
25
- - `example_checks[]`
26
- - `remaining_doc_gaps[]`
27
-
28
- ## F. Stop Conditions
29
- - Behavior changed with no corresponding doc update.
30
- - Example commands are unverified.
31
-
32
- ## G. Safety Constraints
33
- - Do not publish stale setup or command instructions.
@@ -1,33 +0,0 @@
1
- # /perf-scan
2
-
3
- ## A. Intent
4
- Measure baseline performance and detect regressions with deterministic thresholds.
5
-
6
- ## B. When to Use
7
- Use before and after performance-sensitive changes.
8
-
9
- ## C. Required Inputs
10
- - Baseline context
11
- - Target endpoints or flows
12
- - Performance thresholds
13
-
14
- ## D. Deterministic Execution Flow
15
- 1. Capture baseline metrics.
16
- 2. Execute candidate workload.
17
- 3. Compare p95/p99 latency and error rates.
18
- 4. Flag regressions with threshold deltas.
19
- 5. Emit optimization priorities.
20
-
21
- ## E. Structured Output Template
22
- - `baseline_metrics`
23
- - `candidate_metrics`
24
- - `regressions[]`
25
- - `threshold_checks[]`
26
- - `recommendations[]`
27
-
28
- ## F. Stop Conditions
29
- - Baseline missing.
30
- - Thresholds undefined.
31
-
32
- ## G. Safety Constraints
33
- - Avoid performance claims without before/after evidence.
@@ -1,33 +0,0 @@
1
- # /quality-gate
2
-
3
- ## A. Intent
4
- Enforce quality gates using test signals, behavior checks, and regression controls.
5
-
6
- ## B. When to Use
7
- Use before release, and after major bug fixes.
8
-
9
- ## C. Required Inputs
10
- - Target build/revision
11
- - Test scope
12
- - Critical user flows
13
-
14
- ## D. Deterministic Execution Flow
15
- 1. Run required test layers.
16
- 2. Validate critical user flows.
17
- 3. Inspect flaky or unstable results.
18
- 4. Define required remediations.
19
- 5. Emit pass/conditional/block outcome.
20
-
21
- ## E. Structured Output Template
22
- - `test_results[]`
23
- - `critical_flow_status[]`
24
- - `quality_findings[]`
25
- - `required_fixes[]`
26
- - `gate_status`
27
-
28
- ## F. Stop Conditions
29
- - Critical flow untested.
30
- - Required tests failed.
31
-
32
- ## G. Safety Constraints
33
- - Do not mark pass when critical regressions remain open.
@@ -1,34 +0,0 @@
1
- # /refactor
2
-
3
- ## A. Intent
4
- Improve internal structure without changing externally observable behavior.
5
-
6
- ## B. When to Use
7
- Use for maintainability and modularity improvements.
8
-
9
- ## C. Required Inputs
10
- - Target component/module
11
- - Non-functional goals
12
- - Behavior invariants
13
-
14
- ## D. Deterministic Execution Flow
15
- 1. Capture behavior invariants.
16
- 2. Define refactor units.
17
- 3. Apply one unit at a time.
18
- 4. Verify invariants after each unit.
19
- 5. Measure complexity delta.
20
- 6. Emit refactor report.
21
-
22
- ## E. Structured Output Template
23
- - `target`
24
- - `invariants[]`
25
- - `transformations[]`
26
- - `behavior_check_results[]`
27
- - `complexity_delta`
28
-
29
- ## F. Stop Conditions
30
- - Invariant violation.
31
- - Missing baseline behavior.
32
-
33
- ## G. Safety Constraints
34
- - Abort on behavior-change risk.
@@ -1,34 +0,0 @@
1
- # /scaffold
2
-
3
- ## A. Intent
4
- Create deterministic project/module boilerplate with secure defaults.
5
-
6
- ## B. When to Use
7
- Use to initialize new modules/features with approved structure.
8
-
9
- ## C. Required Inputs
10
- - Target module name
11
- - Runtime/stack
12
- - Required patterns
13
-
14
- ## D. Deterministic Execution Flow
15
- 1. Validate target path non-conflict.
16
- 2. Resolve scaffold template.
17
- 3. Generate file tree.
18
- 4. Apply secure defaults.
19
- 5. Generate baseline tests.
20
- 6. Emit scaffold manifest.
21
-
22
- ## E. Structured Output Template
23
- - `target`
24
- - `template_source`
25
- - `files_created[]`
26
- - `secure_defaults[]`
27
- - `tests_created[]`
28
-
29
- ## F. Stop Conditions
30
- - Path collision.
31
- - Unsupported template/runtime.
32
-
33
- ## G. Safety Constraints
34
- - Do not overwrite existing files without explicit confirmation.