agents-templated 2.2.11 → 2.2.13
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +34 -8
- package/bin/cli.js +49 -0
- package/lib/orchestrator.js +562 -0
- package/lib/workflow.js +478 -22
- package/package.json +1 -1
- package/templates/.claude/agents/README.md +15 -1
- package/templates/.claude/agents/architect.md +79 -106
- package/templates/.claude/agents/backend-specialist.md +79 -0
- package/templates/.claude/agents/build-error-resolver.md +78 -119
- package/templates/.claude/agents/code-reviewer.md +79 -116
- package/templates/.claude/agents/compatibility-checker.md +79 -79
- package/templates/.claude/agents/configuration-validator.md +79 -85
- package/templates/.claude/agents/database-migrator.md +79 -83
- package/templates/.claude/agents/dependency-auditor.md +79 -92
- package/templates/.claude/agents/deployment-specialist.md +91 -0
- package/templates/.claude/agents/doc-updater.md +78 -130
- package/templates/.claude/agents/e2e-runner.md +78 -122
- package/templates/.claude/agents/frontend-specialist.md +79 -0
- package/templates/.claude/agents/load-tester.md +79 -80
- package/templates/.claude/agents/performance-profiler.md +79 -103
- package/templates/.claude/agents/performance-specialist.md +91 -0
- package/templates/.claude/agents/planner.md +81 -87
- package/templates/.claude/agents/qa-specialist.md +92 -0
- package/templates/.claude/agents/refactor-cleaner.md +79 -137
- package/templates/.claude/agents/release-ops-specialist.md +80 -0
- package/templates/.claude/agents/security-reviewer.md +80 -138
- package/templates/.claude/agents/tdd-guide.md +79 -98
- package/templates/.claude/agents/test-data-builder.md +79 -0
- package/templates/CLAUDE.md +10 -0
- package/templates/README.md +36 -8
- package/templates/agent-docs/ARCHITECTURE.md +6 -0
- package/templates/agents/commands/README.md +81 -8
- package/templates/agents/commands/SCHEMA.md +21 -1
- package/templates/agents/commands/arch-check.md +58 -33
- package/templates/agents/commands/audit.md +58 -38
- package/templates/agents/commands/debug-track.md +58 -33
- package/templates/agents/commands/docs.md +58 -34
- package/templates/agents/commands/fix.md +58 -34
- package/templates/agents/commands/learn-loop.md +58 -33
- package/templates/agents/commands/perf.md +58 -34
- package/templates/agents/commands/plan.md +58 -34
- package/templates/agents/commands/pr.md +58 -35
- package/templates/agents/commands/problem-map.md +58 -33
- package/templates/agents/commands/release-ready.md +58 -33
- package/templates/agents/commands/release.md +58 -39
- package/templates/agents/commands/risk-review.md +58 -33
- package/templates/agents/commands/scope-shape.md +58 -33
- package/templates/agents/commands/task.md +58 -35
- package/templates/agents/commands/test-data.md +56 -0
- package/templates/agents/commands/test.md +58 -34
- package/templates/agents/commands/ux-bar.md +58 -33
- package/templates/agents/skills/README.md +9 -0
- package/templates/agents/skills/debug-skill/SKILL.md +39 -0
- package/templates/agents/skills/feature-forge/SKILL.md +39 -0
- package/templates/agents/skills/secure-code-guardian/SKILL.md +39 -0
- package/agents/commands/README.md +0 -70
- package/agents/commands/SCHEMA.md +0 -22
- package/agents/commands/arch-check.md +0 -33
- package/agents/commands/audit.md +0 -38
- package/agents/commands/debug-track.md +0 -33
- package/agents/commands/docs-sync.md +0 -33
- package/agents/commands/docs.md +0 -34
- package/agents/commands/fix.md +0 -34
- package/agents/commands/learn-loop.md +0 -33
- package/agents/commands/perf-scan.md +0 -33
- package/agents/commands/perf.md +0 -34
- package/agents/commands/plan.md +0 -34
- package/agents/commands/pr.md +0 -35
- package/agents/commands/problem-map.md +0 -33
- package/agents/commands/quality-gate.md +0 -33
- package/agents/commands/refactor.md +0 -34
- package/agents/commands/release-ready.md +0 -33
- package/agents/commands/release.md +0 -39
- package/agents/commands/risk-review.md +0 -33
- package/agents/commands/scaffold.md +0 -34
- package/agents/commands/scope-shape.md +0 -33
- package/agents/commands/task.md +0 -35
- package/agents/commands/test.md +0 -34
- package/agents/commands/ux-bar.md +0 -33
- package/agents/rules/planning.mdc +0 -69
- package/templates/agents/commands/docs-sync.md +0 -33
- package/templates/agents/commands/perf-scan.md +0 -33
- package/templates/agents/commands/quality-gate.md +0 -33
- package/templates/agents/commands/refactor.md +0 -34
- package/templates/agents/commands/scaffold.md +0 -34
|
@@ -1,70 +0,0 @@
|
|
|
1
|
-
# Deterministic Slash Command Contracts
|
|
2
|
-
|
|
3
|
-
This directory is the modular source of truth for slash-command execution contracts.
|
|
4
|
-
|
|
5
|
-
- Global protocol and safety framework: `AGENTS.MD` → `Deterministic Slash Command System Standard`
|
|
6
|
-
- Global response schema: `agents/commands/SCHEMA.md`
|
|
7
|
-
- Command contracts:
|
|
8
|
-
- `plan.md`
|
|
9
|
-
- `task.md`
|
|
10
|
-
- `scaffold.md`
|
|
11
|
-
- `fix.md`
|
|
12
|
-
- `refactor.md`
|
|
13
|
-
- `audit.md`
|
|
14
|
-
- `perf.md`
|
|
15
|
-
- `test.md`
|
|
16
|
-
- `pr.md`
|
|
17
|
-
- `release.md`
|
|
18
|
-
- `docs.md`
|
|
19
|
-
- `problem-map.md`
|
|
20
|
-
- `scope-shape.md`
|
|
21
|
-
- `arch-check.md`
|
|
22
|
-
- `ux-bar.md`
|
|
23
|
-
- `debug-track.md`
|
|
24
|
-
- `risk-review.md`
|
|
25
|
-
- `quality-gate.md`
|
|
26
|
-
- `perf-scan.md`
|
|
27
|
-
- `release-ready.md`
|
|
28
|
-
- `docs-sync.md`
|
|
29
|
-
- `learn-loop.md`
|
|
30
|
-
|
|
31
|
-
Execution requirements:
|
|
32
|
-
- Parse slash commands deterministically.
|
|
33
|
-
- Return structured output only.
|
|
34
|
-
- No conversational fallback in slash mode.
|
|
35
|
-
- Enforce destructive confirmation token: `CONFIRM-DESTRUCTIVE:<target>`.
|
|
36
|
-
- Enforce unique command purpose for each primary workflow command.
|
|
37
|
-
|
|
38
|
-
## Command Integrity Guards
|
|
39
|
-
|
|
40
|
-
- Primary workflow commands must have unique purpose identifiers.
|
|
41
|
-
- Duplicate command purpose definitions fail CLI startup validation.
|
|
42
|
-
- Deprecated aliases are not part of the active command surface.
|
|
43
|
-
|
|
44
|
-
## Publish Inclusion
|
|
45
|
-
|
|
46
|
-
The npm package includes command contracts from both:
|
|
47
|
-
|
|
48
|
-
- `agents/commands/` (root mirror)
|
|
49
|
-
- `templates/agents/commands/` (scaffold source)
|
|
50
|
-
|
|
51
|
-
## Workflow Command Mapping
|
|
52
|
-
|
|
53
|
-
Use these lifecycle commands as the recommended specialist sequence:
|
|
54
|
-
|
|
55
|
-
- `problem-map` -> `plan.md`
|
|
56
|
-
- `scope-shape` -> `plan.md`
|
|
57
|
-
- `arch-check` -> `plan.md`
|
|
58
|
-
- `ux-bar` -> `plan.md`
|
|
59
|
-
- `debug-track` -> `fix.md`
|
|
60
|
-
- `risk-review` -> `audit.md`
|
|
61
|
-
- `quality-gate` -> `test.md`
|
|
62
|
-
- `perf-scan` -> `perf.md`
|
|
63
|
-
- `release-ready` -> `release.md`
|
|
64
|
-
- `docs-sync` -> `docs.md`
|
|
65
|
-
- `learn-loop` -> `task.md`
|
|
66
|
-
|
|
67
|
-
The CLI command `agents-templated workflow` prints this lifecycle in order:
|
|
68
|
-
|
|
69
|
-
Think -> Plan -> Build -> Review -> Test -> Ship -> Reflect
|
|
70
|
-
|
|
@@ -1,22 +0,0 @@
|
|
|
1
|
-
# Slash Command Output Schema
|
|
2
|
-
|
|
3
|
-
All slash command responses MUST include the following top-level fields:
|
|
4
|
-
|
|
5
|
-
- `command`
|
|
6
|
-
- `execution_id`
|
|
7
|
-
- `mode`
|
|
8
|
-
- `status`
|
|
9
|
-
- `inputs`
|
|
10
|
-
- `prechecks`
|
|
11
|
-
- `execution_log`
|
|
12
|
-
- `artifacts`
|
|
13
|
-
- `risks`
|
|
14
|
-
- `safety_checks`
|
|
15
|
-
- `stop_condition`
|
|
16
|
-
- `next_action`
|
|
17
|
-
|
|
18
|
-
Constraints:
|
|
19
|
-
- `mode` MUST be one of: `slash-command`, `slash-command-auto`.
|
|
20
|
-
- `status` MUST be one of: `completed`, `blocked`, `failed`.
|
|
21
|
-
- If a field value is unknown, set it to `null`.
|
|
22
|
-
- Unknown or malformed slash commands MUST return structured error output and stop.
|
|
@@ -1,33 +0,0 @@
|
|
|
1
|
-
# /arch-check
|
|
2
|
-
|
|
3
|
-
## A. Intent
|
|
4
|
-
Validate architecture decisions, dependency boundaries, and failure handling before coding.
|
|
5
|
-
|
|
6
|
-
## B. When to Use
|
|
7
|
-
Use after scope lock and before implementation starts.
|
|
8
|
-
|
|
9
|
-
## C. Required Inputs
|
|
10
|
-
- Scoped feature set
|
|
11
|
-
- Existing system boundaries
|
|
12
|
-
- Non-functional requirements
|
|
13
|
-
|
|
14
|
-
## D. Deterministic Execution Flow
|
|
15
|
-
1. Map data and control flow.
|
|
16
|
-
2. Identify component boundaries.
|
|
17
|
-
3. Enumerate failure modes.
|
|
18
|
-
4. Define testing and validation checkpoints.
|
|
19
|
-
5. Emit architecture decision set.
|
|
20
|
-
|
|
21
|
-
## E. Structured Output Template
|
|
22
|
-
- `architecture_summary`
|
|
23
|
-
- `boundaries[]`
|
|
24
|
-
- `data_flow`
|
|
25
|
-
- `failure_modes[]`
|
|
26
|
-
- `validation_plan[]`
|
|
27
|
-
|
|
28
|
-
## F. Stop Conditions
|
|
29
|
-
- Critical dependency unclear.
|
|
30
|
-
- Failure modes not covered.
|
|
31
|
-
|
|
32
|
-
## G. Safety Constraints
|
|
33
|
-
- Include security and testing gates for each critical path.
|
package/agents/commands/audit.md
DELETED
|
@@ -1,38 +0,0 @@
|
|
|
1
|
-
# /audit
|
|
2
|
-
|
|
3
|
-
## A. Intent
|
|
4
|
-
Run structured engineering audit across security, correctness, and maintainability.
|
|
5
|
-
|
|
6
|
-
## B. When to Use
|
|
7
|
-
Use before high-impact merges, releases, and external reviews.
|
|
8
|
-
|
|
9
|
-
## C. Required Inputs
|
|
10
|
-
- Audit scope
|
|
11
|
-
- Risk profile
|
|
12
|
-
- Compliance baseline
|
|
13
|
-
- Hardening profile requirement (if applicable)
|
|
14
|
-
|
|
15
|
-
## D. Deterministic Execution Flow
|
|
16
|
-
1. Resolve audit scope.
|
|
17
|
-
2. Run static checks.
|
|
18
|
-
3. Run security checks.
|
|
19
|
-
4. Run dependency/config checks.
|
|
20
|
-
5. Verify hardening evidence when hardening-required profile applies.
|
|
21
|
-
6. Classify findings by severity.
|
|
22
|
-
7. Emit audit report.
|
|
23
|
-
|
|
24
|
-
## E. Structured Output Template
|
|
25
|
-
- `scope`
|
|
26
|
-
- `checks_executed[]`
|
|
27
|
-
- `findings[]`
|
|
28
|
-
- `severity_summary`
|
|
29
|
-
- `remediation_plan[]`
|
|
30
|
-
- `hardening_evidence_status`
|
|
31
|
-
|
|
32
|
-
## F. Stop Conditions
|
|
33
|
-
- Inaccessible scope.
|
|
34
|
-
- Unavailable tooling.
|
|
35
|
-
|
|
36
|
-
## G. Safety Constraints
|
|
37
|
-
- Classify secret leaks and auth bypass as critical.
|
|
38
|
-
- Classify missing hardening verification evidence as release-blocking when hardening is required.
|
|
@@ -1,33 +0,0 @@
|
|
|
1
|
-
# /debug-track
|
|
2
|
-
|
|
3
|
-
## A. Intent
|
|
4
|
-
Produce a root-cause-first defect investigation path with bounded fixes.
|
|
5
|
-
|
|
6
|
-
## B. When to Use
|
|
7
|
-
Use for bugs, regressions, and unexpected runtime behavior.
|
|
8
|
-
|
|
9
|
-
## C. Required Inputs
|
|
10
|
-
- Defect symptom
|
|
11
|
-
- Reproduction context
|
|
12
|
-
- Expected behavior
|
|
13
|
-
|
|
14
|
-
## D. Deterministic Execution Flow
|
|
15
|
-
1. Reproduce defect consistently.
|
|
16
|
-
2. Trace data and execution path.
|
|
17
|
-
3. Confirm root cause with evidence.
|
|
18
|
-
4. Propose minimal patch.
|
|
19
|
-
5. Validate fix and regression safety.
|
|
20
|
-
|
|
21
|
-
## E. Structured Output Template
|
|
22
|
-
- `reproduction_steps[]`
|
|
23
|
-
- `root_cause`
|
|
24
|
-
- `affected_surface[]`
|
|
25
|
-
- `patch_plan`
|
|
26
|
-
- `regression_checks[]`
|
|
27
|
-
|
|
28
|
-
## F. Stop Conditions
|
|
29
|
-
- Defect not reproducible.
|
|
30
|
-
- Root cause remains unverified.
|
|
31
|
-
|
|
32
|
-
## G. Safety Constraints
|
|
33
|
-
- Do not patch symptoms without root-cause evidence.
|
|
@@ -1,33 +0,0 @@
|
|
|
1
|
-
# /docs-sync
|
|
2
|
-
|
|
3
|
-
## A. Intent
|
|
4
|
-
Keep documentation aligned with shipped behavior and contract changes.
|
|
5
|
-
|
|
6
|
-
## B. When to Use
|
|
7
|
-
Use after implementation or release-prep changes.
|
|
8
|
-
|
|
9
|
-
## C. Required Inputs
|
|
10
|
-
- Code changes summary
|
|
11
|
-
- Updated behavior/contracts
|
|
12
|
-
- Target documentation set
|
|
13
|
-
|
|
14
|
-
## D. Deterministic Execution Flow
|
|
15
|
-
1. Identify behavior and API changes.
|
|
16
|
-
2. Locate affected docs.
|
|
17
|
-
3. Update docs with minimal accurate edits.
|
|
18
|
-
4. Verify examples and command references.
|
|
19
|
-
5. Emit documentation update summary.
|
|
20
|
-
|
|
21
|
-
## E. Structured Output Template
|
|
22
|
-
- `docs_updated[]`
|
|
23
|
-
- `behavior_changes[]`
|
|
24
|
-
- `contract_updates[]`
|
|
25
|
-
- `example_checks[]`
|
|
26
|
-
- `remaining_doc_gaps[]`
|
|
27
|
-
|
|
28
|
-
## F. Stop Conditions
|
|
29
|
-
- Behavior changed with no corresponding doc update.
|
|
30
|
-
- Example commands are unverified.
|
|
31
|
-
|
|
32
|
-
## G. Safety Constraints
|
|
33
|
-
- Do not publish stale setup or command instructions.
|
package/agents/commands/docs.md
DELETED
|
@@ -1,34 +0,0 @@
|
|
|
1
|
-
# /docs
|
|
2
|
-
|
|
3
|
-
## A. Intent
|
|
4
|
-
Generate or update documentation aligned to implemented behavior.
|
|
5
|
-
|
|
6
|
-
## B. When to Use
|
|
7
|
-
Use when code, APIs, operations, or workflows change.
|
|
8
|
-
|
|
9
|
-
## C. Required Inputs
|
|
10
|
-
- Documentation scope
|
|
11
|
-
- Source changes
|
|
12
|
-
- Target audience
|
|
13
|
-
|
|
14
|
-
## D. Deterministic Execution Flow
|
|
15
|
-
1. Resolve source-of-truth artifacts.
|
|
16
|
-
2. Extract behavior and API deltas.
|
|
17
|
-
3. Map deltas to sections.
|
|
18
|
-
4. Apply concise updates.
|
|
19
|
-
5. Validate examples/commands.
|
|
20
|
-
6. Emit docs change report.
|
|
21
|
-
|
|
22
|
-
## E. Structured Output Template
|
|
23
|
-
- `scope`
|
|
24
|
-
- `sources[]`
|
|
25
|
-
- `sections_updated[]`
|
|
26
|
-
- `example_validation`
|
|
27
|
-
- `follow_up_actions[]`
|
|
28
|
-
|
|
29
|
-
## F. Stop Conditions
|
|
30
|
-
- Missing source artifacts.
|
|
31
|
-
- Unresolved ambiguity.
|
|
32
|
-
|
|
33
|
-
## G. Safety Constraints
|
|
34
|
-
- Do not publish secrets, tokens, or credentials.
|
package/agents/commands/fix.md
DELETED
|
@@ -1,34 +0,0 @@
|
|
|
1
|
-
# /fix
|
|
2
|
-
|
|
3
|
-
## A. Intent
|
|
4
|
-
Apply the smallest safe change that resolves a verified defect.
|
|
5
|
-
|
|
6
|
-
## B. When to Use
|
|
7
|
-
Use for bugs with reproducible evidence.
|
|
8
|
-
|
|
9
|
-
## C. Required Inputs
|
|
10
|
-
- Defect description
|
|
11
|
-
- Reproduction evidence
|
|
12
|
-
- Target scope
|
|
13
|
-
|
|
14
|
-
## D. Deterministic Execution Flow
|
|
15
|
-
1. Validate defect evidence.
|
|
16
|
-
2. Reproduce failure.
|
|
17
|
-
3. Locate root cause.
|
|
18
|
-
4. Generate minimal patch.
|
|
19
|
-
5. Execute targeted validation.
|
|
20
|
-
6. Emit fix report.
|
|
21
|
-
|
|
22
|
-
## E. Structured Output Template
|
|
23
|
-
- `defect_id`
|
|
24
|
-
- `root_cause`
|
|
25
|
-
- `patch_summary`
|
|
26
|
-
- `files_changed[]`
|
|
27
|
-
- `validation_results[]`
|
|
28
|
-
|
|
29
|
-
## F. Stop Conditions
|
|
30
|
-
- Non-reproducible failure.
|
|
31
|
-
- Root cause unresolved.
|
|
32
|
-
|
|
33
|
-
## G. Safety Constraints
|
|
34
|
-
- Do not broaden scope beyond defect boundary.
|
|
@@ -1,33 +0,0 @@
|
|
|
1
|
-
# /learn-loop
|
|
2
|
-
|
|
3
|
-
## A. Intent
|
|
4
|
-
Capture delivery lessons and convert them into concrete next-cycle actions.
|
|
5
|
-
|
|
6
|
-
## B. When to Use
|
|
7
|
-
Use after release or milestone completion.
|
|
8
|
-
|
|
9
|
-
## C. Required Inputs
|
|
10
|
-
- Completed work summary
|
|
11
|
-
- Incident/defect outcomes
|
|
12
|
-
- Team or process observations
|
|
13
|
-
|
|
14
|
-
## D. Deterministic Execution Flow
|
|
15
|
-
1. Summarize wins and misses.
|
|
16
|
-
2. Identify repeated friction points.
|
|
17
|
-
3. Propose concrete process and tooling actions.
|
|
18
|
-
4. Assign ownership and priority.
|
|
19
|
-
5. Emit next-cycle action list.
|
|
20
|
-
|
|
21
|
-
## E. Structured Output Template
|
|
22
|
-
- `wins[]`
|
|
23
|
-
- `misses[]`
|
|
24
|
-
- `root_process_issues[]`
|
|
25
|
-
- `next_actions[]`
|
|
26
|
-
- `owner_map`
|
|
27
|
-
|
|
28
|
-
## F. Stop Conditions
|
|
29
|
-
- No actionable next steps.
|
|
30
|
-
- Lessons are not tied to observable outcomes.
|
|
31
|
-
|
|
32
|
-
## G. Safety Constraints
|
|
33
|
-
- Avoid vague retrospectives without owned follow-through actions.
|
|
@@ -1,33 +0,0 @@
|
|
|
1
|
-
# /perf-scan
|
|
2
|
-
|
|
3
|
-
## A. Intent
|
|
4
|
-
Measure baseline performance and detect regressions with deterministic thresholds.
|
|
5
|
-
|
|
6
|
-
## B. When to Use
|
|
7
|
-
Use before and after performance-sensitive changes.
|
|
8
|
-
|
|
9
|
-
## C. Required Inputs
|
|
10
|
-
- Baseline context
|
|
11
|
-
- Target endpoints or flows
|
|
12
|
-
- Performance thresholds
|
|
13
|
-
|
|
14
|
-
## D. Deterministic Execution Flow
|
|
15
|
-
1. Capture baseline metrics.
|
|
16
|
-
2. Execute candidate workload.
|
|
17
|
-
3. Compare p95/p99 latency and error rates.
|
|
18
|
-
4. Flag regressions with threshold deltas.
|
|
19
|
-
5. Emit optimization priorities.
|
|
20
|
-
|
|
21
|
-
## E. Structured Output Template
|
|
22
|
-
- `baseline_metrics`
|
|
23
|
-
- `candidate_metrics`
|
|
24
|
-
- `regressions[]`
|
|
25
|
-
- `threshold_checks[]`
|
|
26
|
-
- `recommendations[]`
|
|
27
|
-
|
|
28
|
-
## F. Stop Conditions
|
|
29
|
-
- Baseline missing.
|
|
30
|
-
- Thresholds undefined.
|
|
31
|
-
|
|
32
|
-
## G. Safety Constraints
|
|
33
|
-
- Avoid performance claims without before/after evidence.
|
package/agents/commands/perf.md
DELETED
|
@@ -1,34 +0,0 @@
|
|
|
1
|
-
# /perf
|
|
2
|
-
|
|
3
|
-
## A. Intent
|
|
4
|
-
Evaluate and optimize performance using measurable baselines.
|
|
5
|
-
|
|
6
|
-
## B. When to Use
|
|
7
|
-
Use when latency, throughput, memory, or build-time regressions are reported.
|
|
8
|
-
|
|
9
|
-
## C. Required Inputs
|
|
10
|
-
- Target metrics
|
|
11
|
-
- Baseline environment
|
|
12
|
-
- Optimization scope
|
|
13
|
-
|
|
14
|
-
## D. Deterministic Execution Flow
|
|
15
|
-
1. Capture baseline metrics.
|
|
16
|
-
2. Identify bottlenecks.
|
|
17
|
-
3. Apply one optimization unit.
|
|
18
|
-
4. Re-measure metrics.
|
|
19
|
-
5. Compare against baseline.
|
|
20
|
-
6. Emit performance report.
|
|
21
|
-
|
|
22
|
-
## E. Structured Output Template
|
|
23
|
-
- `baseline_metrics`
|
|
24
|
-
- `optimization_units[]`
|
|
25
|
-
- `post_metrics`
|
|
26
|
-
- `regression_check`
|
|
27
|
-
- `recommendation`
|
|
28
|
-
|
|
29
|
-
## F. Stop Conditions
|
|
30
|
-
- Missing baseline metrics.
|
|
31
|
-
- Non-reproducible benchmark.
|
|
32
|
-
|
|
33
|
-
## G. Safety Constraints
|
|
34
|
-
- Do not trade security controls for performance.
|
package/agents/commands/plan.md
DELETED
|
@@ -1,34 +0,0 @@
|
|
|
1
|
-
# /plan
|
|
2
|
-
|
|
3
|
-
## A. Intent
|
|
4
|
-
Generate an executable implementation plan with ordered steps and risk controls.
|
|
5
|
-
|
|
6
|
-
## B. When to Use
|
|
7
|
-
Use for non-trivial work requiring sequencing, dependencies, and checkpoints.
|
|
8
|
-
|
|
9
|
-
## C. Required Inputs
|
|
10
|
-
- Objective
|
|
11
|
-
- Scope boundaries
|
|
12
|
-
- Constraints
|
|
13
|
-
|
|
14
|
-
## D. Deterministic Execution Flow
|
|
15
|
-
1. Parse objective and constraints.
|
|
16
|
-
2. Extract atomic work units.
|
|
17
|
-
3. Compute dependency order.
|
|
18
|
-
4. Attach validation checkpoints.
|
|
19
|
-
5. Attach risk and rollback notes.
|
|
20
|
-
6. Emit plan artifacts.
|
|
21
|
-
|
|
22
|
-
## E. Structured Output Template
|
|
23
|
-
- `plan_summary`
|
|
24
|
-
- `work_units[]`
|
|
25
|
-
- `dependency_graph`
|
|
26
|
-
- `validation_checkpoints[]`
|
|
27
|
-
- `risk_register[]`
|
|
28
|
-
|
|
29
|
-
## F. Stop Conditions
|
|
30
|
-
- Missing objective or scope.
|
|
31
|
-
- Contradictory constraints.
|
|
32
|
-
|
|
33
|
-
## G. Safety Constraints
|
|
34
|
-
- Include security and testing gates for code-changing units.
|
package/agents/commands/pr.md
DELETED
|
@@ -1,35 +0,0 @@
|
|
|
1
|
-
# /pr
|
|
2
|
-
|
|
3
|
-
## A. Intent
|
|
4
|
-
Prepare a deterministic pull request payload with implementation evidence.
|
|
5
|
-
|
|
6
|
-
## B. When to Use
|
|
7
|
-
Use after validated changes are ready for review.
|
|
8
|
-
|
|
9
|
-
## C. Required Inputs
|
|
10
|
-
- Change summary
|
|
11
|
-
- Linked issues/tasks
|
|
12
|
-
- Validation evidence
|
|
13
|
-
|
|
14
|
-
## D. Deterministic Execution Flow
|
|
15
|
-
1. Collect changed files.
|
|
16
|
-
2. Summarize intent and impact.
|
|
17
|
-
3. Attach validation evidence.
|
|
18
|
-
4. Classify risk and rollout impact.
|
|
19
|
-
5. Build reviewer checklist.
|
|
20
|
-
6. Emit PR package.
|
|
21
|
-
|
|
22
|
-
## E. Structured Output Template
|
|
23
|
-
- `title`
|
|
24
|
-
- `summary`
|
|
25
|
-
- `files_changed[]`
|
|
26
|
-
- `validation_evidence[]`
|
|
27
|
-
- `risk_assessment`
|
|
28
|
-
- `review_checklist[]`
|
|
29
|
-
|
|
30
|
-
## F. Stop Conditions
|
|
31
|
-
- Missing validation evidence.
|
|
32
|
-
- Open critical findings.
|
|
33
|
-
|
|
34
|
-
## G. Safety Constraints
|
|
35
|
-
- Block PR package when critical issues remain unresolved.
|
|
@@ -1,33 +0,0 @@
|
|
|
1
|
-
# /problem-map
|
|
2
|
-
|
|
3
|
-
## A. Intent
|
|
4
|
-
Define the actual user problem and measurable pain signals before solutioning.
|
|
5
|
-
|
|
6
|
-
## B. When to Use
|
|
7
|
-
Use at the start of an initiative when the request is a feature idea rather than a validated problem.
|
|
8
|
-
|
|
9
|
-
## C. Required Inputs
|
|
10
|
-
- Problem statement
|
|
11
|
-
- Current user pain examples
|
|
12
|
-
- Target user segment
|
|
13
|
-
|
|
14
|
-
## D. Deterministic Execution Flow
|
|
15
|
-
1. Extract user outcomes and friction points.
|
|
16
|
-
2. Separate symptoms from root pain.
|
|
17
|
-
3. Identify constraints and non-goals.
|
|
18
|
-
4. Propose a focused problem frame.
|
|
19
|
-
5. Emit acceptance signals for success.
|
|
20
|
-
|
|
21
|
-
## E. Structured Output Template
|
|
22
|
-
- `problem_frame`
|
|
23
|
-
- `pain_signals[]`
|
|
24
|
-
- `root_causes[]`
|
|
25
|
-
- `target_user_segment`
|
|
26
|
-
- `success_signals[]`
|
|
27
|
-
|
|
28
|
-
## F. Stop Conditions
|
|
29
|
-
- Missing target user segment.
|
|
30
|
-
- No concrete pain evidence provided.
|
|
31
|
-
|
|
32
|
-
## G. Safety Constraints
|
|
33
|
-
- Do not lock implementation details in this stage.
|
|
@@ -1,33 +0,0 @@
|
|
|
1
|
-
# /quality-gate
|
|
2
|
-
|
|
3
|
-
## A. Intent
|
|
4
|
-
Enforce quality gates using test signals, behavior checks, and regression controls.
|
|
5
|
-
|
|
6
|
-
## B. When to Use
|
|
7
|
-
Use before release, and after major bug fixes.
|
|
8
|
-
|
|
9
|
-
## C. Required Inputs
|
|
10
|
-
- Target build/revision
|
|
11
|
-
- Test scope
|
|
12
|
-
- Critical user flows
|
|
13
|
-
|
|
14
|
-
## D. Deterministic Execution Flow
|
|
15
|
-
1. Run required test layers.
|
|
16
|
-
2. Validate critical user flows.
|
|
17
|
-
3. Inspect flaky or unstable results.
|
|
18
|
-
4. Define required remediations.
|
|
19
|
-
5. Emit pass/conditional/block outcome.
|
|
20
|
-
|
|
21
|
-
## E. Structured Output Template
|
|
22
|
-
- `test_results[]`
|
|
23
|
-
- `critical_flow_status[]`
|
|
24
|
-
- `quality_findings[]`
|
|
25
|
-
- `required_fixes[]`
|
|
26
|
-
- `gate_status`
|
|
27
|
-
|
|
28
|
-
## F. Stop Conditions
|
|
29
|
-
- Critical flow untested.
|
|
30
|
-
- Required tests failed.
|
|
31
|
-
|
|
32
|
-
## G. Safety Constraints
|
|
33
|
-
- Do not mark pass when critical regressions remain open.
|
|
@@ -1,34 +0,0 @@
|
|
|
1
|
-
# /refactor
|
|
2
|
-
|
|
3
|
-
## A. Intent
|
|
4
|
-
Improve internal structure without changing externally observable behavior.
|
|
5
|
-
|
|
6
|
-
## B. When to Use
|
|
7
|
-
Use for maintainability and modularity improvements.
|
|
8
|
-
|
|
9
|
-
## C. Required Inputs
|
|
10
|
-
- Target component/module
|
|
11
|
-
- Non-functional goals
|
|
12
|
-
- Behavior invariants
|
|
13
|
-
|
|
14
|
-
## D. Deterministic Execution Flow
|
|
15
|
-
1. Capture behavior invariants.
|
|
16
|
-
2. Define refactor units.
|
|
17
|
-
3. Apply one unit at a time.
|
|
18
|
-
4. Verify invariants after each unit.
|
|
19
|
-
5. Measure complexity delta.
|
|
20
|
-
6. Emit refactor report.
|
|
21
|
-
|
|
22
|
-
## E. Structured Output Template
|
|
23
|
-
- `target`
|
|
24
|
-
- `invariants[]`
|
|
25
|
-
- `transformations[]`
|
|
26
|
-
- `behavior_check_results[]`
|
|
27
|
-
- `complexity_delta`
|
|
28
|
-
|
|
29
|
-
## F. Stop Conditions
|
|
30
|
-
- Invariant violation.
|
|
31
|
-
- Missing baseline behavior.
|
|
32
|
-
|
|
33
|
-
## G. Safety Constraints
|
|
34
|
-
- Abort on behavior-change risk.
|
|
@@ -1,33 +0,0 @@
|
|
|
1
|
-
# /release-ready
|
|
2
|
-
|
|
3
|
-
## A. Intent
|
|
4
|
-
Validate release readiness with checks for quality, risk, and rollback.
|
|
5
|
-
|
|
6
|
-
## B. When to Use
|
|
7
|
-
Use immediately before opening or merging a release PR.
|
|
8
|
-
|
|
9
|
-
## C. Required Inputs
|
|
10
|
-
- Change summary
|
|
11
|
-
- Validation evidence
|
|
12
|
-
- Deployment path
|
|
13
|
-
|
|
14
|
-
## D. Deterministic Execution Flow
|
|
15
|
-
1. Confirm test and quality gate outcomes.
|
|
16
|
-
2. Confirm risk-review status.
|
|
17
|
-
3. Verify migration and deploy prerequisites.
|
|
18
|
-
4. Verify rollback plan.
|
|
19
|
-
5. Emit release readiness decision.
|
|
20
|
-
|
|
21
|
-
## E. Structured Output Template
|
|
22
|
-
- `release_scope`
|
|
23
|
-
- `checks_passed[]`
|
|
24
|
-
- `blocking_issues[]`
|
|
25
|
-
- `rollback_plan`
|
|
26
|
-
- `ready_status`
|
|
27
|
-
|
|
28
|
-
## F. Stop Conditions
|
|
29
|
-
- Blocking issue unresolved.
|
|
30
|
-
- Rollback plan absent.
|
|
31
|
-
|
|
32
|
-
## G. Safety Constraints
|
|
33
|
-
- Do not approve release when required evidence is missing.
|
|
@@ -1,39 +0,0 @@
|
|
|
1
|
-
# /release
|
|
2
|
-
|
|
3
|
-
## A. Intent
|
|
4
|
-
Produce deterministic release readiness decision and rollout contract.
|
|
5
|
-
|
|
6
|
-
## B. When to Use
|
|
7
|
-
Use when promoting validated changes to release channels.
|
|
8
|
-
|
|
9
|
-
## C. Required Inputs
|
|
10
|
-
- Version/tag
|
|
11
|
-
- Change manifest
|
|
12
|
-
- Rollback strategy
|
|
13
|
-
- Hardening verification evidence (when required by risk profile)
|
|
14
|
-
|
|
15
|
-
## D. Deterministic Execution Flow
|
|
16
|
-
1. Validate release prerequisites.
|
|
17
|
-
2. Validate compatibility and migration risks.
|
|
18
|
-
3. Validate security and test gates.
|
|
19
|
-
4. Validate hardening verification evidence when hardening-required profile applies.
|
|
20
|
-
5. Build release notes.
|
|
21
|
-
6. Build rollout and rollback steps.
|
|
22
|
-
7. Emit release contract.
|
|
23
|
-
|
|
24
|
-
## E. Structured Output Template
|
|
25
|
-
- `version`
|
|
26
|
-
- `release_readiness`
|
|
27
|
-
- `gates[]`
|
|
28
|
-
- `rollout_plan[]`
|
|
29
|
-
- `rollback_plan[]`
|
|
30
|
-
- `release_notes`
|
|
31
|
-
- `hardening_verification`
|
|
32
|
-
|
|
33
|
-
## F. Stop Conditions
|
|
34
|
-
- Gate failure.
|
|
35
|
-
- Missing rollback strategy.
|
|
36
|
-
|
|
37
|
-
## G. Safety Constraints
|
|
38
|
-
- Block release when any critical gate fails.
|
|
39
|
-
- Block release when required hardening evidence is missing.
|
|
@@ -1,33 +0,0 @@
|
|
|
1
|
-
# /risk-review
|
|
2
|
-
|
|
3
|
-
## A. Intent
|
|
4
|
-
Identify release risks that may pass CI but fail in production.
|
|
5
|
-
|
|
6
|
-
## B. When to Use
|
|
7
|
-
Use before merge or release candidate approval.
|
|
8
|
-
|
|
9
|
-
## C. Required Inputs
|
|
10
|
-
- Proposed changes
|
|
11
|
-
- Test and validation status
|
|
12
|
-
- Deployment context
|
|
13
|
-
|
|
14
|
-
## D. Deterministic Execution Flow
|
|
15
|
-
1. Inspect behavior deltas.
|
|
16
|
-
2. Rank risks by impact and likelihood.
|
|
17
|
-
3. Validate mitigation or rollback paths.
|
|
18
|
-
4. Identify missing tests.
|
|
19
|
-
5. Emit ship recommendation.
|
|
20
|
-
|
|
21
|
-
## E. Structured Output Template
|
|
22
|
-
- `risk_findings[]`
|
|
23
|
-
- `severity_summary`
|
|
24
|
-
- `mitigations[]`
|
|
25
|
-
- `rollback_readiness`
|
|
26
|
-
- `release_recommendation`
|
|
27
|
-
|
|
28
|
-
## F. Stop Conditions
|
|
29
|
-
- High-severity risk has no mitigation.
|
|
30
|
-
- Rollback path is undefined.
|
|
31
|
-
|
|
32
|
-
## G. Safety Constraints
|
|
33
|
-
- Block release for unresolved high-severity findings.
|