agents-templated 2.2.11 → 2.2.12
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +2 -3
- package/agents/commands/README.md +2 -8
- package/agents/commands/arch-check.md +58 -33
- package/agents/commands/audit.md +58 -38
- package/agents/commands/debug-track.md +58 -33
- package/agents/commands/docs.md +58 -34
- package/agents/commands/fix.md +58 -34
- package/agents/commands/learn-loop.md +58 -33
- package/agents/commands/perf.md +58 -34
- package/agents/commands/plan.md +58 -34
- package/agents/commands/pr.md +58 -35
- package/agents/commands/problem-map.md +58 -33
- package/agents/commands/release-ready.md +58 -33
- package/agents/commands/release.md +58 -39
- package/agents/commands/risk-review.md +58 -33
- package/agents/commands/scope-shape.md +58 -33
- package/agents/commands/task.md +58 -35
- package/agents/commands/test.md +58 -34
- package/agents/commands/ux-bar.md +58 -33
- package/lib/workflow.js +8 -21
- package/package.json +1 -1
- package/templates/CLAUDE.md +3 -0
- package/templates/README.md +2 -3
- package/templates/agents/commands/README.md +2 -8
- package/templates/agents/commands/arch-check.md +58 -33
- package/templates/agents/commands/audit.md +58 -38
- package/templates/agents/commands/debug-track.md +58 -33
- package/templates/agents/commands/docs.md +58 -34
- package/templates/agents/commands/fix.md +58 -34
- package/templates/agents/commands/learn-loop.md +58 -33
- package/templates/agents/commands/perf.md +58 -34
- package/templates/agents/commands/plan.md +58 -34
- package/templates/agents/commands/pr.md +58 -35
- package/templates/agents/commands/problem-map.md +58 -33
- package/templates/agents/commands/release-ready.md +58 -33
- package/templates/agents/commands/release.md +58 -39
- package/templates/agents/commands/risk-review.md +58 -33
- package/templates/agents/commands/scope-shape.md +58 -33
- package/templates/agents/commands/task.md +58 -35
- package/templates/agents/commands/test.md +58 -34
- package/templates/agents/commands/ux-bar.md +58 -33
- package/templates/agents/skills/README.md +9 -0
- package/templates/agents/skills/debug-skill/SKILL.md +39 -0
- package/templates/agents/skills/feature-forge/SKILL.md +39 -0
- package/templates/agents/skills/secure-code-guardian/SKILL.md +39 -0
- package/agents/commands/docs-sync.md +0 -33
- package/agents/commands/perf-scan.md +0 -33
- package/agents/commands/quality-gate.md +0 -33
- package/agents/commands/refactor.md +0 -34
- package/agents/commands/scaffold.md +0 -34
- package/templates/agents/commands/docs-sync.md +0 -33
- package/templates/agents/commands/perf-scan.md +0 -33
- package/templates/agents/commands/quality-gate.md +0 -33
- package/templates/agents/commands/refactor.md +0 -34
- package/templates/agents/commands/scaffold.md +0 -34
|
@@ -1,34 +1,58 @@
|
|
|
1
|
-
# /test
|
|
2
|
-
|
|
3
|
-
## A. Intent
|
|
4
|
-
|
|
5
|
-
|
|
6
|
-
## B. When to Use
|
|
7
|
-
Use
|
|
8
|
-
|
|
9
|
-
|
|
10
|
-
|
|
11
|
-
- Test
|
|
12
|
-
-
|
|
13
|
-
|
|
14
|
-
|
|
15
|
-
|
|
16
|
-
|
|
17
|
-
|
|
18
|
-
|
|
19
|
-
|
|
20
|
-
|
|
21
|
-
|
|
22
|
-
## E.
|
|
23
|
-
-
|
|
24
|
-
-
|
|
25
|
-
-
|
|
26
|
-
|
|
27
|
-
|
|
28
|
-
|
|
29
|
-
|
|
30
|
-
|
|
31
|
-
|
|
32
|
-
|
|
33
|
-
|
|
34
|
-
|
|
1
|
+
# /test
|
|
2
|
+
|
|
3
|
+
## A. Intent
|
|
4
|
+
Run deterministic validation and gate release readiness based on test evidence.
|
|
5
|
+
|
|
6
|
+
## B. When to Use
|
|
7
|
+
- Use when validating behavior after implementation or before merge/release.
|
|
8
|
+
- This command now includes quality-gate behavior; do not use /quality-gate.
|
|
9
|
+
|
|
10
|
+
## C. Context Assumptions
|
|
11
|
+
- Test targets are defined.
|
|
12
|
+
- Required environments are available.
|
|
13
|
+
- Pass/fail criteria are explicit.
|
|
14
|
+
|
|
15
|
+
## D. Required Inputs
|
|
16
|
+
| Input | Type | Example |
|
|
17
|
+
|---------------------|------------|----------------------------------|
|
|
18
|
+
| `test_scope` | string | "api regression" |
|
|
19
|
+
| `test_suites` | string[] | ["unit", "integration", "critical-flow"] |
|
|
20
|
+
| `evidence_artifact` | artifact | test report path or CI run URL |
|
|
21
|
+
|
|
22
|
+
## E. Pre-Execution Guards <- fail fast, check ALL before running
|
|
23
|
+
- [ ] test scope is non-empty
|
|
24
|
+
- [ ] critical test suites are executable
|
|
25
|
+
- [ ] pass criteria are declared
|
|
26
|
+
|
|
27
|
+
## F. Execution Flow
|
|
28
|
+
1. Collect test targets and runtime config.
|
|
29
|
+
2. Execute suites in deterministic order.
|
|
30
|
+
3. Aggregate results and failures.
|
|
31
|
+
4. Decision point ->
|
|
32
|
+
- condition A -> critical failures present -> gate = blocked
|
|
33
|
+
- condition B -> no critical failures -> gate = pass.
|
|
34
|
+
5. Build validation evidence and remediation list.
|
|
35
|
+
6. Emit test and gate report.
|
|
36
|
+
|
|
37
|
+
## G. Output Schema
|
|
38
|
+
|
|
39
|
+
```json
|
|
40
|
+
{
|
|
41
|
+
"test_run_id": "string",
|
|
42
|
+
"results": ["array","of","strings"],
|
|
43
|
+
"gate_status": "low | medium | high",
|
|
44
|
+
"blocker": "string | null"
|
|
45
|
+
}
|
|
46
|
+
```
|
|
47
|
+
|
|
48
|
+
## H. Output Target
|
|
49
|
+
- Default delivery: stdout
|
|
50
|
+
- Override flag: --output=<target>
|
|
51
|
+
|
|
52
|
+
## I. Stop Conditions <- abort with error message, never emit partial output
|
|
53
|
+
- critical test suite cannot run
|
|
54
|
+
- result schema cannot be produced
|
|
55
|
+
|
|
56
|
+
## J. Safety Constraints
|
|
57
|
+
- Hard block: hard block when critical flow tests fail
|
|
58
|
+
- Warn only: warn when flaky tests are excluded with justification
|
|
@@ -1,33 +1,58 @@
|
|
|
1
|
-
# /ux-bar
|
|
2
|
-
|
|
3
|
-
## A. Intent
|
|
4
|
-
|
|
5
|
-
|
|
6
|
-
## B. When to Use
|
|
7
|
-
Use when
|
|
8
|
-
|
|
9
|
-
|
|
10
|
-
|
|
11
|
-
-
|
|
12
|
-
-
|
|
13
|
-
|
|
14
|
-
|
|
15
|
-
|
|
16
|
-
|
|
17
|
-
|
|
18
|
-
|
|
19
|
-
|
|
20
|
-
|
|
21
|
-
|
|
22
|
-
-
|
|
23
|
-
-
|
|
24
|
-
-
|
|
25
|
-
-
|
|
26
|
-
|
|
27
|
-
|
|
28
|
-
|
|
29
|
-
|
|
30
|
-
|
|
31
|
-
|
|
32
|
-
|
|
33
|
-
-
|
|
1
|
+
# /ux-bar
|
|
2
|
+
|
|
3
|
+
## A. Intent
|
|
4
|
+
Assess UX quality bar and guarantee core interaction states are defined before build.
|
|
5
|
+
|
|
6
|
+
## B. When to Use
|
|
7
|
+
- Use when UX quality and accessibility need pre-implementation validation.
|
|
8
|
+
- Do not use as a replacement for visual design exploration.
|
|
9
|
+
|
|
10
|
+
## C. Context Assumptions
|
|
11
|
+
- Scope and architecture are available.
|
|
12
|
+
- Primary user flows are identified.
|
|
13
|
+
- Design references exist.
|
|
14
|
+
|
|
15
|
+
## D. Required Inputs
|
|
16
|
+
| Input | Type | Example |
|
|
17
|
+
|---------------------|------------|----------------------------------|
|
|
18
|
+
| `ux_goal` | string | "reduce checkout friction" |
|
|
19
|
+
| `flows` | string[] | ["cart", "payment", "confirmation"] |
|
|
20
|
+
| `design_artifact` | artifact | wireframes, Figma link, screenshots |
|
|
21
|
+
|
|
22
|
+
## E. Pre-Execution Guards <- fail fast, check ALL before running
|
|
23
|
+
- [ ] critical flows are enumerated
|
|
24
|
+
- [ ] interaction states include loading/error/empty
|
|
25
|
+
- [ ] accessibility checks are defined
|
|
26
|
+
|
|
27
|
+
## F. Execution Flow
|
|
28
|
+
1. Review flows and interaction states.
|
|
29
|
+
2. Evaluate accessibility and usability risks.
|
|
30
|
+
3. Score UX gaps by severity.
|
|
31
|
+
4. Decision point ->
|
|
32
|
+
- condition A -> critical UX gap -> block readiness
|
|
33
|
+
- condition B -> manageable gaps -> continue.
|
|
34
|
+
5. Build prioritized improvement list.
|
|
35
|
+
6. Emit UX quality package.
|
|
36
|
+
|
|
37
|
+
## G. Output Schema
|
|
38
|
+
|
|
39
|
+
```json
|
|
40
|
+
{
|
|
41
|
+
"ux_review_id": "string",
|
|
42
|
+
"ux_gaps": ["array","of","strings"],
|
|
43
|
+
"severity": "low | medium | high",
|
|
44
|
+
"blocker": "string | null"
|
|
45
|
+
}
|
|
46
|
+
```
|
|
47
|
+
|
|
48
|
+
## H. Output Target
|
|
49
|
+
- Default delivery: stdout
|
|
50
|
+
- Override flag: --output=<target>
|
|
51
|
+
|
|
52
|
+
## I. Stop Conditions <- abort with error message, never emit partial output
|
|
53
|
+
- critical flow lacks defined interaction states
|
|
54
|
+
- accessibility baseline is not addressed
|
|
55
|
+
|
|
56
|
+
## J. Safety Constraints
|
|
57
|
+
- Hard block: hard block on unaddressed critical accessibility failures
|
|
58
|
+
- Warn only: warn when medium UX issues are deferred
|
|
@@ -61,6 +61,12 @@ To create a new skill for your specific domain:
|
|
|
61
61
|
│ └── SKILL.md # Systematic feature scoping and execution contracts
|
|
62
62
|
├── bug-triage/
|
|
63
63
|
│ └── SKILL.md # Reproduction-first debugging and regression workflows
|
|
64
|
+
├── debug-skill/
|
|
65
|
+
│ └── SKILL.md # Breakpoint-first debugging and execution tracing
|
|
66
|
+
├── secure-code-guardian/
|
|
67
|
+
│ └── SKILL.md # Secure-by-default coding for auth and input boundaries
|
|
68
|
+
├── feature-forge/
|
|
69
|
+
│ └── SKILL.md # Requirements forging before implementation starts
|
|
64
70
|
├── error-patterns/
|
|
65
71
|
│ └── SKILL.md # Persistent debugging memory and known-fix application
|
|
66
72
|
├── app-hardening/
|
|
@@ -102,6 +108,9 @@ Consider creating skills for:
|
|
|
102
108
|
|
|
103
109
|
- `feature-delivery`: Use when user asks are broad and you need objective, scope, acceptance criteria, and validation plan.
|
|
104
110
|
- `bug-triage`: Use for defects and regressions requiring reproducible evidence, root-cause isolation, and minimal safe patches.
|
|
111
|
+
- `debug-skill`: Use for breakpoint-driven debugging, execution tracing, and variable-state inspection.
|
|
112
|
+
- `secure-code-guardian`: Use for secure-by-default implementation across auth, secrets, and untrusted input.
|
|
113
|
+
- `feature-forge`: Use before coding to turn rough asks into execution-ready requirements and acceptance criteria.
|
|
105
114
|
- `error-patterns`: Use when errors repeat to apply known fixes from lessons-learned and automatically record new resolutions.
|
|
106
115
|
- `app-hardening`: Use for high-risk/distributed runtimes to enforce hardening profile, obfuscation decisions, and release evidence.
|
|
107
116
|
- `shadcn-ui`: Use for shadcn/ui installation, component composition, form patterns, and theme customization.
|
|
@@ -0,0 +1,39 @@
|
|
|
1
|
+
---
|
|
2
|
+
name: debug-skill
|
|
3
|
+
description: Enables breakpoint-driven debugging workflows with execution tracing, state inspection, and root-cause proof before patching.
|
|
4
|
+
---
|
|
5
|
+
|
|
6
|
+
# Debug Skill
|
|
7
|
+
|
|
8
|
+
Use this skill when the user is stuck on a bug and needs debugger-style investigation instead of print-guessing.
|
|
9
|
+
|
|
10
|
+
## Trigger Conditions
|
|
11
|
+
|
|
12
|
+
- User asks to debug, set breakpoints, step through code, or inspect runtime state.
|
|
13
|
+
- A bug is intermittent, difficult to localize, or likely branch/state dependent.
|
|
14
|
+
- Existing logs are insufficient to prove root cause.
|
|
15
|
+
|
|
16
|
+
## Workflow
|
|
17
|
+
|
|
18
|
+
1. Confirm a reproducible scenario and expected vs actual behavior.
|
|
19
|
+
2. Define a checkpoint plan (breakpoints/log points/frames).
|
|
20
|
+
3. Trace execution order across checkpoints.
|
|
21
|
+
4. Capture variable-state transitions at failure boundaries.
|
|
22
|
+
5. Prove root cause with execution evidence.
|
|
23
|
+
6. Apply the smallest safe patch and run focused regressions.
|
|
24
|
+
|
|
25
|
+
## Output Contract
|
|
26
|
+
|
|
27
|
+
- Reproduction summary
|
|
28
|
+
- Checkpoint plan
|
|
29
|
+
- Execution trace highlights
|
|
30
|
+
- State snapshots at critical steps
|
|
31
|
+
- Root-cause finding
|
|
32
|
+
- Minimal patch plan
|
|
33
|
+
- Regression checks and residual risk
|
|
34
|
+
|
|
35
|
+
## Guardrails
|
|
36
|
+
|
|
37
|
+
- Do not ship speculative fixes without trace-backed evidence.
|
|
38
|
+
- Do not skip regression validation after state-sensitive fixes.
|
|
39
|
+
- If reproduction fails, stop and request missing runtime context.
|
|
@@ -0,0 +1,39 @@
|
|
|
1
|
+
---
|
|
2
|
+
name: feature-forge
|
|
3
|
+
description: Turns vague feature requests into execution-ready requirements, acceptance criteria, and validation plans before coding starts.
|
|
4
|
+
---
|
|
5
|
+
|
|
6
|
+
# Feature Forge
|
|
7
|
+
|
|
8
|
+
Use this skill before implementation when feature requests are high-level, ambiguous, or under-specified.
|
|
9
|
+
|
|
10
|
+
## Trigger Conditions
|
|
11
|
+
|
|
12
|
+
- User says build/add/create/implement without a full spec.
|
|
13
|
+
- Requirements are broad or mixed between business and technical language.
|
|
14
|
+
- Scope boundaries and acceptance criteria are unclear.
|
|
15
|
+
|
|
16
|
+
## Workflow
|
|
17
|
+
|
|
18
|
+
1. Restate objective and target user outcome.
|
|
19
|
+
2. Define in-scope and out-of-scope boundaries.
|
|
20
|
+
3. Convert asks into concrete functional requirements.
|
|
21
|
+
4. Produce testable acceptance criteria.
|
|
22
|
+
5. Split work into dependency-ordered slices.
|
|
23
|
+
6. Define validation approach and rollback notes.
|
|
24
|
+
|
|
25
|
+
## Output Contract
|
|
26
|
+
|
|
27
|
+
- Objective summary
|
|
28
|
+
- Scope in/out
|
|
29
|
+
- Functional requirements
|
|
30
|
+
- Acceptance criteria
|
|
31
|
+
- Implementation slices
|
|
32
|
+
- Validation plan
|
|
33
|
+
- Risks, assumptions, and rollback notes
|
|
34
|
+
|
|
35
|
+
## Guardrails
|
|
36
|
+
|
|
37
|
+
- Do not move to implementation planning without explicit scope boundaries.
|
|
38
|
+
- Keep acceptance criteria measurable and testable.
|
|
39
|
+
- Raise blockers when requirements conflict or remain ambiguous.
|
|
@@ -0,0 +1,39 @@
|
|
|
1
|
+
---
|
|
2
|
+
name: secure-code-guardian
|
|
3
|
+
description: Enforces secure-by-default implementation for auth, credentials, and untrusted input paths with OWASP-aligned controls.
|
|
4
|
+
---
|
|
5
|
+
|
|
6
|
+
# Secure Code Guardian
|
|
7
|
+
|
|
8
|
+
Use this skill when building or reviewing features that touch authentication, secrets, session logic, or user-controlled input.
|
|
9
|
+
|
|
10
|
+
## Trigger Conditions
|
|
11
|
+
|
|
12
|
+
- User asks for secure implementation, auth, JWT, password handling, or OWASP checks.
|
|
13
|
+
- New endpoints, forms, or integrations expose untrusted input boundaries.
|
|
14
|
+
- A feature handles sensitive data, identity, or permissions.
|
|
15
|
+
|
|
16
|
+
## Workflow
|
|
17
|
+
|
|
18
|
+
1. Map trust boundaries, actors, and attack surface.
|
|
19
|
+
2. Define authentication and authorization requirements.
|
|
20
|
+
3. Apply input validation and injection defenses at boundaries.
|
|
21
|
+
4. Enforce credential/secrets handling and safe logging rules.
|
|
22
|
+
5. Add abuse protection controls (rate limiting, lockouts, replay defenses where relevant).
|
|
23
|
+
6. Define security tests and residual risk before ship recommendation.
|
|
24
|
+
|
|
25
|
+
## Output Contract
|
|
26
|
+
|
|
27
|
+
- Attack surface map
|
|
28
|
+
- Security requirements
|
|
29
|
+
- Applied controls by boundary
|
|
30
|
+
- OWASP alignment notes
|
|
31
|
+
- Security validation checklist
|
|
32
|
+
- Residual risks and mitigations
|
|
33
|
+
- Ship/block recommendation
|
|
34
|
+
|
|
35
|
+
## Guardrails
|
|
36
|
+
|
|
37
|
+
- Never trust client-side validation alone.
|
|
38
|
+
- Never expose secrets, credentials, or sensitive payloads in logs.
|
|
39
|
+
- Block release recommendation if critical controls are missing.
|
|
@@ -1,33 +0,0 @@
|
|
|
1
|
-
# /docs-sync
|
|
2
|
-
|
|
3
|
-
## A. Intent
|
|
4
|
-
Keep documentation aligned with shipped behavior and contract changes.
|
|
5
|
-
|
|
6
|
-
## B. When to Use
|
|
7
|
-
Use after implementation or release-prep changes.
|
|
8
|
-
|
|
9
|
-
## C. Required Inputs
|
|
10
|
-
- Code changes summary
|
|
11
|
-
- Updated behavior/contracts
|
|
12
|
-
- Target documentation set
|
|
13
|
-
|
|
14
|
-
## D. Deterministic Execution Flow
|
|
15
|
-
1. Identify behavior and API changes.
|
|
16
|
-
2. Locate affected docs.
|
|
17
|
-
3. Update docs with minimal accurate edits.
|
|
18
|
-
4. Verify examples and command references.
|
|
19
|
-
5. Emit documentation update summary.
|
|
20
|
-
|
|
21
|
-
## E. Structured Output Template
|
|
22
|
-
- `docs_updated[]`
|
|
23
|
-
- `behavior_changes[]`
|
|
24
|
-
- `contract_updates[]`
|
|
25
|
-
- `example_checks[]`
|
|
26
|
-
- `remaining_doc_gaps[]`
|
|
27
|
-
|
|
28
|
-
## F. Stop Conditions
|
|
29
|
-
- Behavior changed with no corresponding doc update.
|
|
30
|
-
- Example commands are unverified.
|
|
31
|
-
|
|
32
|
-
## G. Safety Constraints
|
|
33
|
-
- Do not publish stale setup or command instructions.
|
|
@@ -1,33 +0,0 @@
|
|
|
1
|
-
# /perf-scan
|
|
2
|
-
|
|
3
|
-
## A. Intent
|
|
4
|
-
Measure baseline performance and detect regressions with deterministic thresholds.
|
|
5
|
-
|
|
6
|
-
## B. When to Use
|
|
7
|
-
Use before and after performance-sensitive changes.
|
|
8
|
-
|
|
9
|
-
## C. Required Inputs
|
|
10
|
-
- Baseline context
|
|
11
|
-
- Target endpoints or flows
|
|
12
|
-
- Performance thresholds
|
|
13
|
-
|
|
14
|
-
## D. Deterministic Execution Flow
|
|
15
|
-
1. Capture baseline metrics.
|
|
16
|
-
2. Execute candidate workload.
|
|
17
|
-
3. Compare p95/p99 latency and error rates.
|
|
18
|
-
4. Flag regressions with threshold deltas.
|
|
19
|
-
5. Emit optimization priorities.
|
|
20
|
-
|
|
21
|
-
## E. Structured Output Template
|
|
22
|
-
- `baseline_metrics`
|
|
23
|
-
- `candidate_metrics`
|
|
24
|
-
- `regressions[]`
|
|
25
|
-
- `threshold_checks[]`
|
|
26
|
-
- `recommendations[]`
|
|
27
|
-
|
|
28
|
-
## F. Stop Conditions
|
|
29
|
-
- Baseline missing.
|
|
30
|
-
- Thresholds undefined.
|
|
31
|
-
|
|
32
|
-
## G. Safety Constraints
|
|
33
|
-
- Avoid performance claims without before/after evidence.
|
|
@@ -1,33 +0,0 @@
|
|
|
1
|
-
# /quality-gate
|
|
2
|
-
|
|
3
|
-
## A. Intent
|
|
4
|
-
Enforce quality gates using test signals, behavior checks, and regression controls.
|
|
5
|
-
|
|
6
|
-
## B. When to Use
|
|
7
|
-
Use before release, and after major bug fixes.
|
|
8
|
-
|
|
9
|
-
## C. Required Inputs
|
|
10
|
-
- Target build/revision
|
|
11
|
-
- Test scope
|
|
12
|
-
- Critical user flows
|
|
13
|
-
|
|
14
|
-
## D. Deterministic Execution Flow
|
|
15
|
-
1. Run required test layers.
|
|
16
|
-
2. Validate critical user flows.
|
|
17
|
-
3. Inspect flaky or unstable results.
|
|
18
|
-
4. Define required remediations.
|
|
19
|
-
5. Emit pass/conditional/block outcome.
|
|
20
|
-
|
|
21
|
-
## E. Structured Output Template
|
|
22
|
-
- `test_results[]`
|
|
23
|
-
- `critical_flow_status[]`
|
|
24
|
-
- `quality_findings[]`
|
|
25
|
-
- `required_fixes[]`
|
|
26
|
-
- `gate_status`
|
|
27
|
-
|
|
28
|
-
## F. Stop Conditions
|
|
29
|
-
- Critical flow untested.
|
|
30
|
-
- Required tests failed.
|
|
31
|
-
|
|
32
|
-
## G. Safety Constraints
|
|
33
|
-
- Do not mark pass when critical regressions remain open.
|
|
@@ -1,34 +0,0 @@
|
|
|
1
|
-
# /refactor
|
|
2
|
-
|
|
3
|
-
## A. Intent
|
|
4
|
-
Improve internal structure without changing externally observable behavior.
|
|
5
|
-
|
|
6
|
-
## B. When to Use
|
|
7
|
-
Use for maintainability and modularity improvements.
|
|
8
|
-
|
|
9
|
-
## C. Required Inputs
|
|
10
|
-
- Target component/module
|
|
11
|
-
- Non-functional goals
|
|
12
|
-
- Behavior invariants
|
|
13
|
-
|
|
14
|
-
## D. Deterministic Execution Flow
|
|
15
|
-
1. Capture behavior invariants.
|
|
16
|
-
2. Define refactor units.
|
|
17
|
-
3. Apply one unit at a time.
|
|
18
|
-
4. Verify invariants after each unit.
|
|
19
|
-
5. Measure complexity delta.
|
|
20
|
-
6. Emit refactor report.
|
|
21
|
-
|
|
22
|
-
## E. Structured Output Template
|
|
23
|
-
- `target`
|
|
24
|
-
- `invariants[]`
|
|
25
|
-
- `transformations[]`
|
|
26
|
-
- `behavior_check_results[]`
|
|
27
|
-
- `complexity_delta`
|
|
28
|
-
|
|
29
|
-
## F. Stop Conditions
|
|
30
|
-
- Invariant violation.
|
|
31
|
-
- Missing baseline behavior.
|
|
32
|
-
|
|
33
|
-
## G. Safety Constraints
|
|
34
|
-
- Abort on behavior-change risk.
|
|
@@ -1,34 +0,0 @@
|
|
|
1
|
-
# /scaffold
|
|
2
|
-
|
|
3
|
-
## A. Intent
|
|
4
|
-
Create deterministic project/module boilerplate with secure defaults.
|
|
5
|
-
|
|
6
|
-
## B. When to Use
|
|
7
|
-
Use to initialize new modules/features with approved structure.
|
|
8
|
-
|
|
9
|
-
## C. Required Inputs
|
|
10
|
-
- Target module name
|
|
11
|
-
- Runtime/stack
|
|
12
|
-
- Required patterns
|
|
13
|
-
|
|
14
|
-
## D. Deterministic Execution Flow
|
|
15
|
-
1. Validate target path non-conflict.
|
|
16
|
-
2. Resolve scaffold template.
|
|
17
|
-
3. Generate file tree.
|
|
18
|
-
4. Apply secure defaults.
|
|
19
|
-
5. Generate baseline tests.
|
|
20
|
-
6. Emit scaffold manifest.
|
|
21
|
-
|
|
22
|
-
## E. Structured Output Template
|
|
23
|
-
- `target`
|
|
24
|
-
- `template_source`
|
|
25
|
-
- `files_created[]`
|
|
26
|
-
- `secure_defaults[]`
|
|
27
|
-
- `tests_created[]`
|
|
28
|
-
|
|
29
|
-
## F. Stop Conditions
|
|
30
|
-
- Path collision.
|
|
31
|
-
- Unsupported template/runtime.
|
|
32
|
-
|
|
33
|
-
## G. Safety Constraints
|
|
34
|
-
- Do not overwrite existing files without explicit confirmation.
|
|
@@ -1,33 +0,0 @@
|
|
|
1
|
-
# /docs-sync
|
|
2
|
-
|
|
3
|
-
## A. Intent
|
|
4
|
-
Keep documentation aligned with shipped behavior and contract changes.
|
|
5
|
-
|
|
6
|
-
## B. When to Use
|
|
7
|
-
Use after implementation or release-prep changes.
|
|
8
|
-
|
|
9
|
-
## C. Required Inputs
|
|
10
|
-
- Code changes summary
|
|
11
|
-
- Updated behavior/contracts
|
|
12
|
-
- Target documentation set
|
|
13
|
-
|
|
14
|
-
## D. Deterministic Execution Flow
|
|
15
|
-
1. Identify behavior and API changes.
|
|
16
|
-
2. Locate affected docs.
|
|
17
|
-
3. Update docs with minimal accurate edits.
|
|
18
|
-
4. Verify examples and command references.
|
|
19
|
-
5. Emit documentation update summary.
|
|
20
|
-
|
|
21
|
-
## E. Structured Output Template
|
|
22
|
-
- `docs_updated[]`
|
|
23
|
-
- `behavior_changes[]`
|
|
24
|
-
- `contract_updates[]`
|
|
25
|
-
- `example_checks[]`
|
|
26
|
-
- `remaining_doc_gaps[]`
|
|
27
|
-
|
|
28
|
-
## F. Stop Conditions
|
|
29
|
-
- Behavior changed with no corresponding doc update.
|
|
30
|
-
- Example commands are unverified.
|
|
31
|
-
|
|
32
|
-
## G. Safety Constraints
|
|
33
|
-
- Do not publish stale setup or command instructions.
|
|
@@ -1,33 +0,0 @@
|
|
|
1
|
-
# /perf-scan
|
|
2
|
-
|
|
3
|
-
## A. Intent
|
|
4
|
-
Measure baseline performance and detect regressions with deterministic thresholds.
|
|
5
|
-
|
|
6
|
-
## B. When to Use
|
|
7
|
-
Use before and after performance-sensitive changes.
|
|
8
|
-
|
|
9
|
-
## C. Required Inputs
|
|
10
|
-
- Baseline context
|
|
11
|
-
- Target endpoints or flows
|
|
12
|
-
- Performance thresholds
|
|
13
|
-
|
|
14
|
-
## D. Deterministic Execution Flow
|
|
15
|
-
1. Capture baseline metrics.
|
|
16
|
-
2. Execute candidate workload.
|
|
17
|
-
3. Compare p95/p99 latency and error rates.
|
|
18
|
-
4. Flag regressions with threshold deltas.
|
|
19
|
-
5. Emit optimization priorities.
|
|
20
|
-
|
|
21
|
-
## E. Structured Output Template
|
|
22
|
-
- `baseline_metrics`
|
|
23
|
-
- `candidate_metrics`
|
|
24
|
-
- `regressions[]`
|
|
25
|
-
- `threshold_checks[]`
|
|
26
|
-
- `recommendations[]`
|
|
27
|
-
|
|
28
|
-
## F. Stop Conditions
|
|
29
|
-
- Baseline missing.
|
|
30
|
-
- Thresholds undefined.
|
|
31
|
-
|
|
32
|
-
## G. Safety Constraints
|
|
33
|
-
- Avoid performance claims without before/after evidence.
|
|
@@ -1,33 +0,0 @@
|
|
|
1
|
-
# /quality-gate
|
|
2
|
-
|
|
3
|
-
## A. Intent
|
|
4
|
-
Enforce quality gates using test signals, behavior checks, and regression controls.
|
|
5
|
-
|
|
6
|
-
## B. When to Use
|
|
7
|
-
Use before release, and after major bug fixes.
|
|
8
|
-
|
|
9
|
-
## C. Required Inputs
|
|
10
|
-
- Target build/revision
|
|
11
|
-
- Test scope
|
|
12
|
-
- Critical user flows
|
|
13
|
-
|
|
14
|
-
## D. Deterministic Execution Flow
|
|
15
|
-
1. Run required test layers.
|
|
16
|
-
2. Validate critical user flows.
|
|
17
|
-
3. Inspect flaky or unstable results.
|
|
18
|
-
4. Define required remediations.
|
|
19
|
-
5. Emit pass/conditional/block outcome.
|
|
20
|
-
|
|
21
|
-
## E. Structured Output Template
|
|
22
|
-
- `test_results[]`
|
|
23
|
-
- `critical_flow_status[]`
|
|
24
|
-
- `quality_findings[]`
|
|
25
|
-
- `required_fixes[]`
|
|
26
|
-
- `gate_status`
|
|
27
|
-
|
|
28
|
-
## F. Stop Conditions
|
|
29
|
-
- Critical flow untested.
|
|
30
|
-
- Required tests failed.
|
|
31
|
-
|
|
32
|
-
## G. Safety Constraints
|
|
33
|
-
- Do not mark pass when critical regressions remain open.
|
|
@@ -1,34 +0,0 @@
|
|
|
1
|
-
# /refactor
|
|
2
|
-
|
|
3
|
-
## A. Intent
|
|
4
|
-
Improve internal structure without changing externally observable behavior.
|
|
5
|
-
|
|
6
|
-
## B. When to Use
|
|
7
|
-
Use for maintainability and modularity improvements.
|
|
8
|
-
|
|
9
|
-
## C. Required Inputs
|
|
10
|
-
- Target component/module
|
|
11
|
-
- Non-functional goals
|
|
12
|
-
- Behavior invariants
|
|
13
|
-
|
|
14
|
-
## D. Deterministic Execution Flow
|
|
15
|
-
1. Capture behavior invariants.
|
|
16
|
-
2. Define refactor units.
|
|
17
|
-
3. Apply one unit at a time.
|
|
18
|
-
4. Verify invariants after each unit.
|
|
19
|
-
5. Measure complexity delta.
|
|
20
|
-
6. Emit refactor report.
|
|
21
|
-
|
|
22
|
-
## E. Structured Output Template
|
|
23
|
-
- `target`
|
|
24
|
-
- `invariants[]`
|
|
25
|
-
- `transformations[]`
|
|
26
|
-
- `behavior_check_results[]`
|
|
27
|
-
- `complexity_delta`
|
|
28
|
-
|
|
29
|
-
## F. Stop Conditions
|
|
30
|
-
- Invariant violation.
|
|
31
|
-
- Missing baseline behavior.
|
|
32
|
-
|
|
33
|
-
## G. Safety Constraints
|
|
34
|
-
- Abort on behavior-change risk.
|
|
@@ -1,34 +0,0 @@
|
|
|
1
|
-
# /scaffold
|
|
2
|
-
|
|
3
|
-
## A. Intent
|
|
4
|
-
Create deterministic project/module boilerplate with secure defaults.
|
|
5
|
-
|
|
6
|
-
## B. When to Use
|
|
7
|
-
Use to initialize new modules/features with approved structure.
|
|
8
|
-
|
|
9
|
-
## C. Required Inputs
|
|
10
|
-
- Target module name
|
|
11
|
-
- Runtime/stack
|
|
12
|
-
- Required patterns
|
|
13
|
-
|
|
14
|
-
## D. Deterministic Execution Flow
|
|
15
|
-
1. Validate target path non-conflict.
|
|
16
|
-
2. Resolve scaffold template.
|
|
17
|
-
3. Generate file tree.
|
|
18
|
-
4. Apply secure defaults.
|
|
19
|
-
5. Generate baseline tests.
|
|
20
|
-
6. Emit scaffold manifest.
|
|
21
|
-
|
|
22
|
-
## E. Structured Output Template
|
|
23
|
-
- `target`
|
|
24
|
-
- `template_source`
|
|
25
|
-
- `files_created[]`
|
|
26
|
-
- `secure_defaults[]`
|
|
27
|
-
- `tests_created[]`
|
|
28
|
-
|
|
29
|
-
## F. Stop Conditions
|
|
30
|
-
- Path collision.
|
|
31
|
-
- Unsupported template/runtime.
|
|
32
|
-
|
|
33
|
-
## G. Safety Constraints
|
|
34
|
-
- Do not overwrite existing files without explicit confirmation.
|