agents-templated 2.2.11 → 2.2.13

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (85) hide show
  1. package/README.md +34 -8
  2. package/bin/cli.js +49 -0
  3. package/lib/orchestrator.js +562 -0
  4. package/lib/workflow.js +478 -22
  5. package/package.json +1 -1
  6. package/templates/.claude/agents/README.md +15 -1
  7. package/templates/.claude/agents/architect.md +79 -106
  8. package/templates/.claude/agents/backend-specialist.md +79 -0
  9. package/templates/.claude/agents/build-error-resolver.md +78 -119
  10. package/templates/.claude/agents/code-reviewer.md +79 -116
  11. package/templates/.claude/agents/compatibility-checker.md +79 -79
  12. package/templates/.claude/agents/configuration-validator.md +79 -85
  13. package/templates/.claude/agents/database-migrator.md +79 -83
  14. package/templates/.claude/agents/dependency-auditor.md +79 -92
  15. package/templates/.claude/agents/deployment-specialist.md +91 -0
  16. package/templates/.claude/agents/doc-updater.md +78 -130
  17. package/templates/.claude/agents/e2e-runner.md +78 -122
  18. package/templates/.claude/agents/frontend-specialist.md +79 -0
  19. package/templates/.claude/agents/load-tester.md +79 -80
  20. package/templates/.claude/agents/performance-profiler.md +79 -103
  21. package/templates/.claude/agents/performance-specialist.md +91 -0
  22. package/templates/.claude/agents/planner.md +81 -87
  23. package/templates/.claude/agents/qa-specialist.md +92 -0
  24. package/templates/.claude/agents/refactor-cleaner.md +79 -137
  25. package/templates/.claude/agents/release-ops-specialist.md +80 -0
  26. package/templates/.claude/agents/security-reviewer.md +80 -138
  27. package/templates/.claude/agents/tdd-guide.md +79 -98
  28. package/templates/.claude/agents/test-data-builder.md +79 -0
  29. package/templates/CLAUDE.md +10 -0
  30. package/templates/README.md +36 -8
  31. package/templates/agent-docs/ARCHITECTURE.md +6 -0
  32. package/templates/agents/commands/README.md +81 -8
  33. package/templates/agents/commands/SCHEMA.md +21 -1
  34. package/templates/agents/commands/arch-check.md +58 -33
  35. package/templates/agents/commands/audit.md +58 -38
  36. package/templates/agents/commands/debug-track.md +58 -33
  37. package/templates/agents/commands/docs.md +58 -34
  38. package/templates/agents/commands/fix.md +58 -34
  39. package/templates/agents/commands/learn-loop.md +58 -33
  40. package/templates/agents/commands/perf.md +58 -34
  41. package/templates/agents/commands/plan.md +58 -34
  42. package/templates/agents/commands/pr.md +58 -35
  43. package/templates/agents/commands/problem-map.md +58 -33
  44. package/templates/agents/commands/release-ready.md +58 -33
  45. package/templates/agents/commands/release.md +58 -39
  46. package/templates/agents/commands/risk-review.md +58 -33
  47. package/templates/agents/commands/scope-shape.md +58 -33
  48. package/templates/agents/commands/task.md +58 -35
  49. package/templates/agents/commands/test-data.md +56 -0
  50. package/templates/agents/commands/test.md +58 -34
  51. package/templates/agents/commands/ux-bar.md +58 -33
  52. package/templates/agents/skills/README.md +9 -0
  53. package/templates/agents/skills/debug-skill/SKILL.md +39 -0
  54. package/templates/agents/skills/feature-forge/SKILL.md +39 -0
  55. package/templates/agents/skills/secure-code-guardian/SKILL.md +39 -0
  56. package/agents/commands/README.md +0 -70
  57. package/agents/commands/SCHEMA.md +0 -22
  58. package/agents/commands/arch-check.md +0 -33
  59. package/agents/commands/audit.md +0 -38
  60. package/agents/commands/debug-track.md +0 -33
  61. package/agents/commands/docs-sync.md +0 -33
  62. package/agents/commands/docs.md +0 -34
  63. package/agents/commands/fix.md +0 -34
  64. package/agents/commands/learn-loop.md +0 -33
  65. package/agents/commands/perf-scan.md +0 -33
  66. package/agents/commands/perf.md +0 -34
  67. package/agents/commands/plan.md +0 -34
  68. package/agents/commands/pr.md +0 -35
  69. package/agents/commands/problem-map.md +0 -33
  70. package/agents/commands/quality-gate.md +0 -33
  71. package/agents/commands/refactor.md +0 -34
  72. package/agents/commands/release-ready.md +0 -33
  73. package/agents/commands/release.md +0 -39
  74. package/agents/commands/risk-review.md +0 -33
  75. package/agents/commands/scaffold.md +0 -34
  76. package/agents/commands/scope-shape.md +0 -33
  77. package/agents/commands/task.md +0 -35
  78. package/agents/commands/test.md +0 -34
  79. package/agents/commands/ux-bar.md +0 -33
  80. package/agents/rules/planning.mdc +0 -69
  81. package/templates/agents/commands/docs-sync.md +0 -33
  82. package/templates/agents/commands/perf-scan.md +0 -33
  83. package/templates/agents/commands/quality-gate.md +0 -33
  84. package/templates/agents/commands/refactor.md +0 -34
  85. package/templates/agents/commands/scaffold.md +0 -34
@@ -1,70 +0,0 @@
1
- # Deterministic Slash Command Contracts
2
-
3
- This directory is the modular source of truth for slash-command execution contracts.
4
-
5
- - Global protocol and safety framework: `AGENTS.MD` → `Deterministic Slash Command System Standard`
6
- - Global response schema: `agents/commands/SCHEMA.md`
7
- - Command contracts:
8
- - `plan.md`
9
- - `task.md`
10
- - `scaffold.md`
11
- - `fix.md`
12
- - `refactor.md`
13
- - `audit.md`
14
- - `perf.md`
15
- - `test.md`
16
- - `pr.md`
17
- - `release.md`
18
- - `docs.md`
19
- - `problem-map.md`
20
- - `scope-shape.md`
21
- - `arch-check.md`
22
- - `ux-bar.md`
23
- - `debug-track.md`
24
- - `risk-review.md`
25
- - `quality-gate.md`
26
- - `perf-scan.md`
27
- - `release-ready.md`
28
- - `docs-sync.md`
29
- - `learn-loop.md`
30
-
31
- Execution requirements:
32
- - Parse slash commands deterministically.
33
- - Return structured output only.
34
- - No conversational fallback in slash mode.
35
- - Enforce destructive confirmation token: `CONFIRM-DESTRUCTIVE:<target>`.
36
- - Enforce unique command purpose for each primary workflow command.
37
-
38
- ## Command Integrity Guards
39
-
40
- - Primary workflow commands must have unique purpose identifiers.
41
- - Duplicate command purpose definitions fail CLI startup validation.
42
- - Deprecated aliases are not part of the active command surface.
43
-
44
- ## Publish Inclusion
45
-
46
- The npm package includes command contracts from both:
47
-
48
- - `agents/commands/` (root mirror)
49
- - `templates/agents/commands/` (scaffold source)
50
-
51
- ## Workflow Command Mapping
52
-
53
- Use these lifecycle commands as the recommended specialist sequence:
54
-
55
- - `problem-map` -> `plan.md`
56
- - `scope-shape` -> `plan.md`
57
- - `arch-check` -> `plan.md`
58
- - `ux-bar` -> `plan.md`
59
- - `debug-track` -> `fix.md`
60
- - `risk-review` -> `audit.md`
61
- - `quality-gate` -> `test.md`
62
- - `perf-scan` -> `perf.md`
63
- - `release-ready` -> `release.md`
64
- - `docs-sync` -> `docs.md`
65
- - `learn-loop` -> `task.md`
66
-
67
- The CLI command `agents-templated workflow` prints this lifecycle in order:
68
-
69
- Think -> Plan -> Build -> Review -> Test -> Ship -> Reflect
70
-
@@ -1,22 +0,0 @@
1
- # Slash Command Output Schema
2
-
3
- All slash command responses MUST include the following top-level fields:
4
-
5
- - `command`
6
- - `execution_id`
7
- - `mode`
8
- - `status`
9
- - `inputs`
10
- - `prechecks`
11
- - `execution_log`
12
- - `artifacts`
13
- - `risks`
14
- - `safety_checks`
15
- - `stop_condition`
16
- - `next_action`
17
-
18
- Constraints:
19
- - `mode` MUST be one of: `slash-command`, `slash-command-auto`.
20
- - `status` MUST be one of: `completed`, `blocked`, `failed`.
21
- - If a field value is unknown, set it to `null`.
22
- - Unknown or malformed slash commands MUST return structured error output and stop.
@@ -1,33 +0,0 @@
1
- # /arch-check
2
-
3
- ## A. Intent
4
- Validate architecture decisions, dependency boundaries, and failure handling before coding.
5
-
6
- ## B. When to Use
7
- Use after scope lock and before implementation starts.
8
-
9
- ## C. Required Inputs
10
- - Scoped feature set
11
- - Existing system boundaries
12
- - Non-functional requirements
13
-
14
- ## D. Deterministic Execution Flow
15
- 1. Map data and control flow.
16
- 2. Identify component boundaries.
17
- 3. Enumerate failure modes.
18
- 4. Define testing and validation checkpoints.
19
- 5. Emit architecture decision set.
20
-
21
- ## E. Structured Output Template
22
- - `architecture_summary`
23
- - `boundaries[]`
24
- - `data_flow`
25
- - `failure_modes[]`
26
- - `validation_plan[]`
27
-
28
- ## F. Stop Conditions
29
- - Critical dependency unclear.
30
- - Failure modes not covered.
31
-
32
- ## G. Safety Constraints
33
- - Include security and testing gates for each critical path.
@@ -1,38 +0,0 @@
1
- # /audit
2
-
3
- ## A. Intent
4
- Run structured engineering audit across security, correctness, and maintainability.
5
-
6
- ## B. When to Use
7
- Use before high-impact merges, releases, and external reviews.
8
-
9
- ## C. Required Inputs
10
- - Audit scope
11
- - Risk profile
12
- - Compliance baseline
13
- - Hardening profile requirement (if applicable)
14
-
15
- ## D. Deterministic Execution Flow
16
- 1. Resolve audit scope.
17
- 2. Run static checks.
18
- 3. Run security checks.
19
- 4. Run dependency/config checks.
20
- 5. Verify hardening evidence when hardening-required profile applies.
21
- 6. Classify findings by severity.
22
- 7. Emit audit report.
23
-
24
- ## E. Structured Output Template
25
- - `scope`
26
- - `checks_executed[]`
27
- - `findings[]`
28
- - `severity_summary`
29
- - `remediation_plan[]`
30
- - `hardening_evidence_status`
31
-
32
- ## F. Stop Conditions
33
- - Inaccessible scope.
34
- - Unavailable tooling.
35
-
36
- ## G. Safety Constraints
37
- - Classify secret leaks and auth bypass as critical.
38
- - Classify missing hardening verification evidence as release-blocking when hardening is required.
@@ -1,33 +0,0 @@
1
- # /debug-track
2
-
3
- ## A. Intent
4
- Produce a root-cause-first defect investigation path with bounded fixes.
5
-
6
- ## B. When to Use
7
- Use for bugs, regressions, and unexpected runtime behavior.
8
-
9
- ## C. Required Inputs
10
- - Defect symptom
11
- - Reproduction context
12
- - Expected behavior
13
-
14
- ## D. Deterministic Execution Flow
15
- 1. Reproduce defect consistently.
16
- 2. Trace data and execution path.
17
- 3. Confirm root cause with evidence.
18
- 4. Propose minimal patch.
19
- 5. Validate fix and regression safety.
20
-
21
- ## E. Structured Output Template
22
- - `reproduction_steps[]`
23
- - `root_cause`
24
- - `affected_surface[]`
25
- - `patch_plan`
26
- - `regression_checks[]`
27
-
28
- ## F. Stop Conditions
29
- - Defect not reproducible.
30
- - Root cause remains unverified.
31
-
32
- ## G. Safety Constraints
33
- - Do not patch symptoms without root-cause evidence.
@@ -1,33 +0,0 @@
1
- # /docs-sync
2
-
3
- ## A. Intent
4
- Keep documentation aligned with shipped behavior and contract changes.
5
-
6
- ## B. When to Use
7
- Use after implementation or release-prep changes.
8
-
9
- ## C. Required Inputs
10
- - Code changes summary
11
- - Updated behavior/contracts
12
- - Target documentation set
13
-
14
- ## D. Deterministic Execution Flow
15
- 1. Identify behavior and API changes.
16
- 2. Locate affected docs.
17
- 3. Update docs with minimal accurate edits.
18
- 4. Verify examples and command references.
19
- 5. Emit documentation update summary.
20
-
21
- ## E. Structured Output Template
22
- - `docs_updated[]`
23
- - `behavior_changes[]`
24
- - `contract_updates[]`
25
- - `example_checks[]`
26
- - `remaining_doc_gaps[]`
27
-
28
- ## F. Stop Conditions
29
- - Behavior changed with no corresponding doc update.
30
- - Example commands are unverified.
31
-
32
- ## G. Safety Constraints
33
- - Do not publish stale setup or command instructions.
@@ -1,34 +0,0 @@
1
- # /docs
2
-
3
- ## A. Intent
4
- Generate or update documentation aligned to implemented behavior.
5
-
6
- ## B. When to Use
7
- Use when code, APIs, operations, or workflows change.
8
-
9
- ## C. Required Inputs
10
- - Documentation scope
11
- - Source changes
12
- - Target audience
13
-
14
- ## D. Deterministic Execution Flow
15
- 1. Resolve source-of-truth artifacts.
16
- 2. Extract behavior and API deltas.
17
- 3. Map deltas to sections.
18
- 4. Apply concise updates.
19
- 5. Validate examples/commands.
20
- 6. Emit docs change report.
21
-
22
- ## E. Structured Output Template
23
- - `scope`
24
- - `sources[]`
25
- - `sections_updated[]`
26
- - `example_validation`
27
- - `follow_up_actions[]`
28
-
29
- ## F. Stop Conditions
30
- - Missing source artifacts.
31
- - Unresolved ambiguity.
32
-
33
- ## G. Safety Constraints
34
- - Do not publish secrets, tokens, or credentials.
@@ -1,34 +0,0 @@
1
- # /fix
2
-
3
- ## A. Intent
4
- Apply the smallest safe change that resolves a verified defect.
5
-
6
- ## B. When to Use
7
- Use for bugs with reproducible evidence.
8
-
9
- ## C. Required Inputs
10
- - Defect description
11
- - Reproduction evidence
12
- - Target scope
13
-
14
- ## D. Deterministic Execution Flow
15
- 1. Validate defect evidence.
16
- 2. Reproduce failure.
17
- 3. Locate root cause.
18
- 4. Generate minimal patch.
19
- 5. Execute targeted validation.
20
- 6. Emit fix report.
21
-
22
- ## E. Structured Output Template
23
- - `defect_id`
24
- - `root_cause`
25
- - `patch_summary`
26
- - `files_changed[]`
27
- - `validation_results[]`
28
-
29
- ## F. Stop Conditions
30
- - Non-reproducible failure.
31
- - Root cause unresolved.
32
-
33
- ## G. Safety Constraints
34
- - Do not broaden scope beyond defect boundary.
@@ -1,33 +0,0 @@
1
- # /learn-loop
2
-
3
- ## A. Intent
4
- Capture delivery lessons and convert them into concrete next-cycle actions.
5
-
6
- ## B. When to Use
7
- Use after release or milestone completion.
8
-
9
- ## C. Required Inputs
10
- - Completed work summary
11
- - Incident/defect outcomes
12
- - Team or process observations
13
-
14
- ## D. Deterministic Execution Flow
15
- 1. Summarize wins and misses.
16
- 2. Identify repeated friction points.
17
- 3. Propose concrete process and tooling actions.
18
- 4. Assign ownership and priority.
19
- 5. Emit next-cycle action list.
20
-
21
- ## E. Structured Output Template
22
- - `wins[]`
23
- - `misses[]`
24
- - `root_process_issues[]`
25
- - `next_actions[]`
26
- - `owner_map`
27
-
28
- ## F. Stop Conditions
29
- - No actionable next steps.
30
- - Lessons are not tied to observable outcomes.
31
-
32
- ## G. Safety Constraints
33
- - Avoid vague retrospectives without owned follow-through actions.
@@ -1,33 +0,0 @@
1
- # /perf-scan
2
-
3
- ## A. Intent
4
- Measure baseline performance and detect regressions with deterministic thresholds.
5
-
6
- ## B. When to Use
7
- Use before and after performance-sensitive changes.
8
-
9
- ## C. Required Inputs
10
- - Baseline context
11
- - Target endpoints or flows
12
- - Performance thresholds
13
-
14
- ## D. Deterministic Execution Flow
15
- 1. Capture baseline metrics.
16
- 2. Execute candidate workload.
17
- 3. Compare p95/p99 latency and error rates.
18
- 4. Flag regressions with threshold deltas.
19
- 5. Emit optimization priorities.
20
-
21
- ## E. Structured Output Template
22
- - `baseline_metrics`
23
- - `candidate_metrics`
24
- - `regressions[]`
25
- - `threshold_checks[]`
26
- - `recommendations[]`
27
-
28
- ## F. Stop Conditions
29
- - Baseline missing.
30
- - Thresholds undefined.
31
-
32
- ## G. Safety Constraints
33
- - Avoid performance claims without before/after evidence.
@@ -1,34 +0,0 @@
1
- # /perf
2
-
3
- ## A. Intent
4
- Evaluate and optimize performance using measurable baselines.
5
-
6
- ## B. When to Use
7
- Use when latency, throughput, memory, or build-time regressions are reported.
8
-
9
- ## C. Required Inputs
10
- - Target metrics
11
- - Baseline environment
12
- - Optimization scope
13
-
14
- ## D. Deterministic Execution Flow
15
- 1. Capture baseline metrics.
16
- 2. Identify bottlenecks.
17
- 3. Apply one optimization unit.
18
- 4. Re-measure metrics.
19
- 5. Compare against baseline.
20
- 6. Emit performance report.
21
-
22
- ## E. Structured Output Template
23
- - `baseline_metrics`
24
- - `optimization_units[]`
25
- - `post_metrics`
26
- - `regression_check`
27
- - `recommendation`
28
-
29
- ## F. Stop Conditions
30
- - Missing baseline metrics.
31
- - Non-reproducible benchmark.
32
-
33
- ## G. Safety Constraints
34
- - Do not trade security controls for performance.
@@ -1,34 +0,0 @@
1
- # /plan
2
-
3
- ## A. Intent
4
- Generate an executable implementation plan with ordered steps and risk controls.
5
-
6
- ## B. When to Use
7
- Use for non-trivial work requiring sequencing, dependencies, and checkpoints.
8
-
9
- ## C. Required Inputs
10
- - Objective
11
- - Scope boundaries
12
- - Constraints
13
-
14
- ## D. Deterministic Execution Flow
15
- 1. Parse objective and constraints.
16
- 2. Extract atomic work units.
17
- 3. Compute dependency order.
18
- 4. Attach validation checkpoints.
19
- 5. Attach risk and rollback notes.
20
- 6. Emit plan artifacts.
21
-
22
- ## E. Structured Output Template
23
- - `plan_summary`
24
- - `work_units[]`
25
- - `dependency_graph`
26
- - `validation_checkpoints[]`
27
- - `risk_register[]`
28
-
29
- ## F. Stop Conditions
30
- - Missing objective or scope.
31
- - Contradictory constraints.
32
-
33
- ## G. Safety Constraints
34
- - Include security and testing gates for code-changing units.
@@ -1,35 +0,0 @@
1
- # /pr
2
-
3
- ## A. Intent
4
- Prepare a deterministic pull request payload with implementation evidence.
5
-
6
- ## B. When to Use
7
- Use after validated changes are ready for review.
8
-
9
- ## C. Required Inputs
10
- - Change summary
11
- - Linked issues/tasks
12
- - Validation evidence
13
-
14
- ## D. Deterministic Execution Flow
15
- 1. Collect changed files.
16
- 2. Summarize intent and impact.
17
- 3. Attach validation evidence.
18
- 4. Classify risk and rollout impact.
19
- 5. Build reviewer checklist.
20
- 6. Emit PR package.
21
-
22
- ## E. Structured Output Template
23
- - `title`
24
- - `summary`
25
- - `files_changed[]`
26
- - `validation_evidence[]`
27
- - `risk_assessment`
28
- - `review_checklist[]`
29
-
30
- ## F. Stop Conditions
31
- - Missing validation evidence.
32
- - Open critical findings.
33
-
34
- ## G. Safety Constraints
35
- - Block PR package when critical issues remain unresolved.
@@ -1,33 +0,0 @@
1
- # /problem-map
2
-
3
- ## A. Intent
4
- Define the actual user problem and measurable pain signals before solutioning.
5
-
6
- ## B. When to Use
7
- Use at the start of an initiative when the request is a feature idea rather than a validated problem.
8
-
9
- ## C. Required Inputs
10
- - Problem statement
11
- - Current user pain examples
12
- - Target user segment
13
-
14
- ## D. Deterministic Execution Flow
15
- 1. Extract user outcomes and friction points.
16
- 2. Separate symptoms from root pain.
17
- 3. Identify constraints and non-goals.
18
- 4. Propose a focused problem frame.
19
- 5. Emit acceptance signals for success.
20
-
21
- ## E. Structured Output Template
22
- - `problem_frame`
23
- - `pain_signals[]`
24
- - `root_causes[]`
25
- - `target_user_segment`
26
- - `success_signals[]`
27
-
28
- ## F. Stop Conditions
29
- - Missing target user segment.
30
- - No concrete pain evidence provided.
31
-
32
- ## G. Safety Constraints
33
- - Do not lock implementation details in this stage.
@@ -1,33 +0,0 @@
1
- # /quality-gate
2
-
3
- ## A. Intent
4
- Enforce quality gates using test signals, behavior checks, and regression controls.
5
-
6
- ## B. When to Use
7
- Use before release, and after major bug fixes.
8
-
9
- ## C. Required Inputs
10
- - Target build/revision
11
- - Test scope
12
- - Critical user flows
13
-
14
- ## D. Deterministic Execution Flow
15
- 1. Run required test layers.
16
- 2. Validate critical user flows.
17
- 3. Inspect flaky or unstable results.
18
- 4. Define required remediations.
19
- 5. Emit pass/conditional/block outcome.
20
-
21
- ## E. Structured Output Template
22
- - `test_results[]`
23
- - `critical_flow_status[]`
24
- - `quality_findings[]`
25
- - `required_fixes[]`
26
- - `gate_status`
27
-
28
- ## F. Stop Conditions
29
- - Critical flow untested.
30
- - Required tests failed.
31
-
32
- ## G. Safety Constraints
33
- - Do not mark pass when critical regressions remain open.
@@ -1,34 +0,0 @@
1
- # /refactor
2
-
3
- ## A. Intent
4
- Improve internal structure without changing externally observable behavior.
5
-
6
- ## B. When to Use
7
- Use for maintainability and modularity improvements.
8
-
9
- ## C. Required Inputs
10
- - Target component/module
11
- - Non-functional goals
12
- - Behavior invariants
13
-
14
- ## D. Deterministic Execution Flow
15
- 1. Capture behavior invariants.
16
- 2. Define refactor units.
17
- 3. Apply one unit at a time.
18
- 4. Verify invariants after each unit.
19
- 5. Measure complexity delta.
20
- 6. Emit refactor report.
21
-
22
- ## E. Structured Output Template
23
- - `target`
24
- - `invariants[]`
25
- - `transformations[]`
26
- - `behavior_check_results[]`
27
- - `complexity_delta`
28
-
29
- ## F. Stop Conditions
30
- - Invariant violation.
31
- - Missing baseline behavior.
32
-
33
- ## G. Safety Constraints
34
- - Abort on behavior-change risk.
@@ -1,33 +0,0 @@
1
- # /release-ready
2
-
3
- ## A. Intent
4
- Validate release readiness with checks for quality, risk, and rollback.
5
-
6
- ## B. When to Use
7
- Use immediately before opening or merging a release PR.
8
-
9
- ## C. Required Inputs
10
- - Change summary
11
- - Validation evidence
12
- - Deployment path
13
-
14
- ## D. Deterministic Execution Flow
15
- 1. Confirm test and quality gate outcomes.
16
- 2. Confirm risk-review status.
17
- 3. Verify migration and deploy prerequisites.
18
- 4. Verify rollback plan.
19
- 5. Emit release readiness decision.
20
-
21
- ## E. Structured Output Template
22
- - `release_scope`
23
- - `checks_passed[]`
24
- - `blocking_issues[]`
25
- - `rollback_plan`
26
- - `ready_status`
27
-
28
- ## F. Stop Conditions
29
- - Blocking issue unresolved.
30
- - Rollback plan absent.
31
-
32
- ## G. Safety Constraints
33
- - Do not approve release when required evidence is missing.
@@ -1,39 +0,0 @@
1
- # /release
2
-
3
- ## A. Intent
4
- Produce deterministic release readiness decision and rollout contract.
5
-
6
- ## B. When to Use
7
- Use when promoting validated changes to release channels.
8
-
9
- ## C. Required Inputs
10
- - Version/tag
11
- - Change manifest
12
- - Rollback strategy
13
- - Hardening verification evidence (when required by risk profile)
14
-
15
- ## D. Deterministic Execution Flow
16
- 1. Validate release prerequisites.
17
- 2. Validate compatibility and migration risks.
18
- 3. Validate security and test gates.
19
- 4. Validate hardening verification evidence when hardening-required profile applies.
20
- 5. Build release notes.
21
- 6. Build rollout and rollback steps.
22
- 7. Emit release contract.
23
-
24
- ## E. Structured Output Template
25
- - `version`
26
- - `release_readiness`
27
- - `gates[]`
28
- - `rollout_plan[]`
29
- - `rollback_plan[]`
30
- - `release_notes`
31
- - `hardening_verification`
32
-
33
- ## F. Stop Conditions
34
- - Gate failure.
35
- - Missing rollback strategy.
36
-
37
- ## G. Safety Constraints
38
- - Block release when any critical gate fails.
39
- - Block release when required hardening evidence is missing.
@@ -1,33 +0,0 @@
1
- # /risk-review
2
-
3
- ## A. Intent
4
- Identify release risks that may pass CI but fail in production.
5
-
6
- ## B. When to Use
7
- Use before merge or release candidate approval.
8
-
9
- ## C. Required Inputs
10
- - Proposed changes
11
- - Test and validation status
12
- - Deployment context
13
-
14
- ## D. Deterministic Execution Flow
15
- 1. Inspect behavior deltas.
16
- 2. Rank risks by impact and likelihood.
17
- 3. Validate mitigation or rollback paths.
18
- 4. Identify missing tests.
19
- 5. Emit ship recommendation.
20
-
21
- ## E. Structured Output Template
22
- - `risk_findings[]`
23
- - `severity_summary`
24
- - `mitigations[]`
25
- - `rollback_readiness`
26
- - `release_recommendation`
27
-
28
- ## F. Stop Conditions
29
- - High-severity risk has no mitigation.
30
- - Rollback path is undefined.
31
-
32
- ## G. Safety Constraints
33
- - Block release for unresolved high-severity findings.