agents-templated 2.2.21 → 2.2.22

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (55) hide show
  1. package/package.json +2 -1
  2. package/templates/agents/commands/README.md +0 -144
  3. package/templates/agents/commands/SCHEMA.md +0 -42
  4. package/templates/agents/commands/arch-check.md +0 -58
  5. package/templates/agents/commands/audit.md +0 -58
  6. package/templates/agents/commands/debug-track.md +0 -58
  7. package/templates/agents/commands/docs.md +0 -58
  8. package/templates/agents/commands/fix.md +0 -58
  9. package/templates/agents/commands/learn-loop.md +0 -58
  10. package/templates/agents/commands/perf.md +0 -58
  11. package/templates/agents/commands/plan.md +0 -58
  12. package/templates/agents/commands/pr.md +0 -58
  13. package/templates/agents/commands/problem-map.md +0 -58
  14. package/templates/agents/commands/release-ready.md +0 -58
  15. package/templates/agents/commands/release.md +0 -58
  16. package/templates/agents/commands/risk-review.md +0 -58
  17. package/templates/agents/commands/scope-shape.md +0 -58
  18. package/templates/agents/commands/task.md +0 -58
  19. package/templates/agents/commands/test-data.md +0 -56
  20. package/templates/agents/commands/test.md +0 -58
  21. package/templates/agents/commands/ux-bar.md +0 -58
  22. package/templates/agents/rules/ai-integration.md +0 -54
  23. package/templates/agents/rules/core.md +0 -173
  24. package/templates/agents/rules/database.md +0 -305
  25. package/templates/agents/rules/frontend.md +0 -217
  26. package/templates/agents/rules/guardrails.md +0 -97
  27. package/templates/agents/rules/hardening.md +0 -52
  28. package/templates/agents/rules/intent-routing.md +0 -54
  29. package/templates/agents/rules/lessons-learned.md +0 -44
  30. package/templates/agents/rules/planning.md +0 -69
  31. package/templates/agents/rules/security.md +0 -278
  32. package/templates/agents/rules/style.md +0 -344
  33. package/templates/agents/rules/system-workflow.md +0 -63
  34. package/templates/agents/rules/testing.md +0 -371
  35. package/templates/agents/rules/workflows.md +0 -56
  36. package/templates/agents/skills/README.md +0 -198
  37. package/templates/agents/skills/api-design/SKILL.md +0 -59
  38. package/templates/agents/skills/app-hardening/SKILL.md +0 -45
  39. package/templates/agents/skills/bug-triage/SKILL.md +0 -36
  40. package/templates/agents/skills/debug-skill/SKILL.md +0 -39
  41. package/templates/agents/skills/emilkowalski-skill/SKILL.md +0 -51
  42. package/templates/agents/skills/error-patterns/SKILL.md +0 -70
  43. package/templates/agents/skills/feature-delivery/SKILL.md +0 -38
  44. package/templates/agents/skills/feature-forge/SKILL.md +0 -39
  45. package/templates/agents/skills/find-skills/SKILL.md +0 -133
  46. package/templates/agents/skills/llm-integration/SKILL.md +0 -64
  47. package/templates/agents/skills/raphaelsalaja-userinterface-wiki/SKILL.md +0 -51
  48. package/templates/agents/skills/secure-code-guardian/SKILL.md +0 -39
  49. package/templates/agents/skills/shadcn-ui/SKILL.md +0 -1932
  50. package/templates/agents/skills/shadcn-ui/references/chart.md +0 -306
  51. package/templates/agents/skills/shadcn-ui/references/learn.md +0 -145
  52. package/templates/agents/skills/shadcn-ui/references/official-ui-reference.md +0 -1729
  53. package/templates/agents/skills/shadcn-ui/references/reference.md +0 -586
  54. package/templates/agents/skills/shadcn-ui/references/ui-reference.md +0 -1578
  55. package/templates/agents/skills/ui-ux-pro-max/SKILL.md +0 -386
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "agents-templated",
3
- "version": "2.2.21",
3
+ "version": "2.2.22",
4
4
  "description": "Technology-agnostic development template with multi-AI agent support (Cursor, Copilot, VSCode, Gemini), security-first patterns, and comprehensive testing guidelines",
5
5
  "main": "index.js",
6
6
  "bin": {
@@ -39,6 +39,7 @@
39
39
  "lib",
40
40
  "agents",
41
41
  "templates",
42
+ "templates/.claude/agents",
42
43
  "templates/presets",
43
44
  "index.js",
44
45
  "README.md",
@@ -1,144 +0,0 @@
1
- # Deterministic Slash Command Contracts
2
-
3
- This directory is the modular source of truth for slash-command execution contracts.
4
-
5
- - Global protocol and safety framework: `AGENTS.MD` → `Deterministic Slash Command System Standard`
6
- - Global response schema: `.claude/commands/SCHEMA.md`
7
- - Command contracts:
8
- - `plan.md`
9
- - `task.md`
10
- - `fix.md`
11
- - `audit.md`
12
- - `perf.md`
13
- - `test.md`
14
- - `pr.md`
15
- - `release.md`
16
- - `docs.md`
17
- - `problem-map.md`
18
- - `scope-shape.md`
19
- - `arch-check.md`
20
- - `ux-bar.md`
21
- - `debug-track.md`
22
- - `test-data.md`
23
- - `risk-review.md`
24
- - `release-ready.md`
25
- - `learn-loop.md`
26
-
27
- Execution requirements:
28
- - Parse slash commands deterministically.
29
- - Return structured output only.
30
- - No conversational fallback in slash mode.
31
- - Enforce destructive confirmation token: `CONFIRM-DESTRUCTIVE:<target>`.
32
- - Enforce unique command purpose for each primary workflow command.
33
-
34
- ## Command Integrity Guards
35
-
36
- - Primary workflow commands must have unique purpose identifiers.
37
- - Duplicate command purpose definitions fail CLI startup validation.
38
- - Deprecated aliases are not part of the active command surface.
39
-
40
- ## Publish Inclusion
41
-
42
- The npm package scaffolds command contracts into `.claude/commands/`.
43
-
44
- Template source path in this repository:
45
-
46
- - `templates/agents/commands/`
47
-
48
- ## Workflow Command Mapping
49
-
50
- Use these lifecycle commands as the recommended specialist sequence:
51
-
52
- - `problem-map` -> `plan.md`
53
- - `scope-shape` -> `plan.md`
54
- - `arch-check` -> `plan.md`
55
- - `ux-bar` -> `plan.md`
56
- - `debug-track` -> `fix.md`
57
- - `test-data` -> `test.md`
58
- - `risk-review` -> `audit.md`
59
- - `perf` -> `perf.md`
60
- - `release-ready` -> `release.md`
61
- - `docs` -> `docs.md`
62
- - `learn-loop` -> `task.md`
63
-
64
- The CLI command `agents-templated workflow` prints this lifecycle in order:
65
-
66
- Think -> Plan -> Build -> Review -> Test -> Ship -> Reflect
67
-
68
- ## Non-Overlap Routing Boundaries
69
-
70
- The orchestrator preserves explicit ownership boundaries between specialist decision surfaces.
71
-
72
- - Backend implementation remains separate from tactical build and compatibility remediation:
73
- - `backend-specialist` owns implementation.
74
- - `build-error-resolver` owns build/type/lint fixes.
75
- - `compatibility-checker` owns external contract compatibility decisions.
76
- - Review chain remains ordered and non-overlapping:
77
- - `code-reviewer` -> `dependency-auditor` -> `doc-updater`
78
- - `doc-updater` should not absorb review or dependency decisions.
79
-
80
- ## Test Data Handoff Routing
81
-
82
- The orchestrator routes deterministic data preparation through `test-data-builder` and then hands off to downstream consumers.
83
-
84
- - Upstream routes:
85
- - `qa-design` and backend/database-oriented phases can route to `test-data-builder`.
86
- - Downstream consumers:
87
- - `qa-specialist(mode=validation)`
88
- - `e2e-runner`
89
- - `performance-specialist(mode=load)`
90
- - Handoff metadata is emitted in orchestration output as `handoff_inputs`.
91
-
92
- ## Deprecated Alias Redirects
93
-
94
- Deprecated workflow command aliases are supported as non-breaking redirects with deterministic notices.
95
-
96
- | Deprecated | Redirects To |
97
- |------------|--------------|
98
- | `quality-gate` | `risk-review` |
99
- | `perf-scan` | `perf` |
100
- | `docs-sync` | `docs` |
101
-
102
- Alias policy:
103
-
104
- - Redirects preserve behavior of the canonical command.
105
- - CLI prints a deprecation notice on each alias invocation.
106
- - New automation should use canonical command names only.
107
-
108
- ## Automatic Orchestration
109
-
110
- The CLI command `agents-templated orchestrate "<objective>"` builds an automatic multi-phase handoff plan across specialist tracks.
111
-
112
- - Uses static scenario routing first.
113
- - Falls back to keyword intent matching when no explicit scenario override is provided.
114
- - Emits deterministic structured output compatible with `SCHEMA.md` in `slash-command-auto` mode.
115
- - Stops the chain on `blocked` or `failed` state and returns a populated `stop_condition`.
116
- - Includes scenario-conditioned optional delegation to existing subagents (for example `security-reviewer`, `e2e-runner`, `dependency-auditor`) without making them mandatory.
117
-
118
- Example:
119
-
120
- `agents-templated orchestrate "build auth api and dashboard" --json`
121
-
122
- ## Mode-Locked Specialist Invocation
123
-
124
- The orchestrator must pass explicit mode values for mode-locked specialists and must never allow self-selection.
125
-
126
- Mode-locked specialists:
127
-
128
- - `qa-specialist`
129
- - Allowed modes: `design`, `validation`
130
- - Required invocation examples:
131
- - `qa-specialist(mode=design, input=<spec>)`
132
- - `qa-specialist(mode=validation, input=<changed_files + scope>)`
133
- - `performance-specialist`
134
- - Allowed modes: `profile`, `load`
135
- - Required invocation examples:
136
- - `performance-specialist(mode=profile, input=<scope>)`
137
- - `performance-specialist(mode=load, input=<scope + thresholds>)`
138
-
139
- HALT rules:
140
-
141
- - Missing mode -> stop execution and return a clarification request.
142
- - Unsupported mode -> stop execution and return allowed values.
143
- - Mode inference from context is forbidden.
144
-
@@ -1,42 +0,0 @@
1
- # Slash Command Output Schema
2
-
3
- All slash command responses MUST include the following top-level fields:
4
-
5
- - `command`
6
- - `execution_id`
7
- - `mode`
8
- - `status`
9
- - `inputs`
10
- - `prechecks`
11
- - `execution_log`
12
- - `artifacts`
13
- - `risks`
14
- - `safety_checks`
15
- - `stop_condition`
16
- - `next_action`
17
-
18
- Optional orchestration fields:
19
- - `artifacts.scenario`
20
- - `artifacts.scenario_reason`
21
- - `artifacts.phases[]`
22
- - `artifacts.phases[].optional_subagents[]`
23
- - `artifacts.phases[].invocation_mode`
24
- - `artifacts.phases[].handoff_inputs[]`
25
- - `artifacts.deprecation_notices[]`
26
- - `execution_log[].orchestration_phase`
27
- - `execution_log[].routed_subagent`
28
- - `execution_log[].routed_track`
29
- - `execution_log[].routed_skills`
30
- - `execution_log[].optional_subagents[]`
31
- - `execution_log[].invocation_mode`
32
- - `execution_log[].handoff_inputs[]`
33
-
34
- Constraints:
35
- - `mode` MUST be one of: `slash-command`, `slash-command-auto`.
36
- - `status` MUST be one of: `completed`, `blocked`, `failed`.
37
- - If a field value is unknown, set it to `null`.
38
- - Unknown or malformed slash commands MUST return structured error output and stop.
39
- - In `slash-command-auto` mode, orchestration chains MUST stop on first `blocked` or `failed` phase and return a non-null `stop_condition`.
40
- - Optional subagent delegation MUST remain non-required and scenario-conditioned.
41
- - For `qa-specialist` and `performance-specialist`, orchestrator invocation MUST include an explicit mode.
42
- - Missing or unsupported mode for mode-locked specialists MUST return `status=blocked` with a non-null `stop_condition`.
@@ -1,58 +0,0 @@
1
- # /arch-check
2
-
3
- ## A. Intent
4
- Validate architecture readiness and implementation constraints before build begins.
5
-
6
- ## B. When to Use
7
- - Use after scope lock and before implementation starts.
8
- - Do not use for post-release retrospectives.
9
-
10
- ## C. Context Assumptions
11
- - Scope is frozen for current increment.
12
- - Architecture options are documented.
13
- - Test strategy can be defined.
14
-
15
- ## D. Required Inputs
16
- | Input | Type | Example |
17
- |---------------------|------------|----------------------------------|
18
- | `architecture_goal` | string | "multi-tenant API isolation" |
19
- | `design_options` | string[] | ["shared schema", "schema-per-tenant"] |
20
- | `design_artifact` | artifact | ADR doc, sequence diagram |
21
-
22
- ## E. Pre-Execution Guards <- fail fast, check ALL before running
23
- - [ ] design options are comparable
24
- - [ ] key edge cases are identified
25
- - [ ] test strategy exists for selected design
26
-
27
- ## F. Execution Flow
28
- 1. Review architecture options and constraints.
29
- 2. Evaluate edge cases and failure modes.
30
- 3. Validate selected option against requirements.
31
- 4. Decision point ->
32
- - condition A -> critical gap found -> block readiness
33
- - condition B -> no critical gaps -> continue.
34
- 5. Build architecture decision and test implications.
35
- 6. Emit architecture readiness report.
36
-
37
- ## G. Output Schema
38
-
39
- ```json
40
- {
41
- "architecture_id": "string",
42
- "decisions": ["array","of","strings"],
43
- "risk_level": "low | medium | high",
44
- "blocker": "string | null"
45
- }
46
- ```
47
-
48
- ## H. Output Target
49
- - Default delivery: stdout
50
- - Override flag: --output=<target>
51
-
52
- ## I. Stop Conditions <- abort with error message, never emit partial output
53
- - selected architecture lacks testable validation path
54
- - critical edge case has no mitigation
55
-
56
- ## J. Safety Constraints
57
- - Hard block: hard block on architecture with unresolved critical failure modes
58
- - Warn only: warn when non-critical tradeoffs are accepted
@@ -1,58 +0,0 @@
1
- # /audit
2
-
3
- ## A. Intent
4
- Produce a deterministic risk and compliance audit with prioritized findings.
5
-
6
- ## B. When to Use
7
- - Use before release or for targeted quality/security reviews.
8
- - Do not use as a substitute for implementation planning.
9
-
10
- ## C. Context Assumptions
11
- - Audit scope is defined.
12
- - Relevant artifacts are available.
13
- - Severity rubric is agreed.
14
-
15
- ## D. Required Inputs
16
- | Input | Type | Example |
17
- |---------------------|------------|----------------------------------|
18
- | `audit_scope` | string | "authentication flows" |
19
- | `checklist` | string[] | ["security", "tests", "rollback"] |
20
- | `evidence_set` | artifact | PR diff, logs, reports |
21
-
22
- ## E. Pre-Execution Guards <- fail fast, check ALL before running
23
- - [ ] scope is explicit
24
- - [ ] evidence artifacts are accessible
25
- - [ ] severity model is available
26
-
27
- ## F. Execution Flow
28
- 1. Collect scoped evidence and standards.
29
- 2. Evaluate checks against evidence.
30
- 3. Classify findings by severity.
31
- 4. Decision point ->
32
- - condition A -> critical unresolved finding -> block recommendation
33
- - condition B -> no critical blocker -> continue.
34
- 5. Assemble remediation actions and owners.
35
- 6. Emit audit report.
36
-
37
- ## G. Output Schema
38
-
39
- ```json
40
- {
41
- "audit_id": "string",
42
- "findings": ["array","of","strings"],
43
- "severity": "low | medium | high",
44
- "blocker": "string | null"
45
- }
46
- ```
47
-
48
- ## H. Output Target
49
- - Default delivery: stdout
50
- - Override flag: --output=<target>
51
-
52
- ## I. Stop Conditions <- abort with error message, never emit partial output
53
- - scope cannot be determined
54
- - critical evidence is missing
55
-
56
- ## J. Safety Constraints
57
- - Hard block: hard block when critical finding lacks mitigation
58
- - Warn only: warn when medium findings are deferred
@@ -1,58 +0,0 @@
1
- # /debug-track
2
-
3
- ## A. Intent
4
- Run root-cause-first debugging workflow and guarantee evidence-backed defect diagnosis.
5
-
6
- ## B. When to Use
7
- - Use when behavior is broken, failing, or regressing in runtime.
8
- - Do not use to apply speculative patches without diagnosis.
9
-
10
- ## C. Context Assumptions
11
- - Defect symptom is captured.
12
- - A reproduction path is available or can be derived.
13
- - Runtime context is accessible.
14
-
15
- ## D. Required Inputs
16
- | Input | Type | Example |
17
- |---------------------|------------|----------------------------------|
18
- | `defect_symptom` | string | "payment retries loop forever" |
19
- | `repro_steps` | string[] | ["submit order", "disconnect network"] |
20
- | `runtime_artifact` | artifact | error logs, trace screenshot, failing test |
21
-
22
- ## E. Pre-Execution Guards <- fail fast, check ALL before running
23
- - [ ] reproduction path is actionable
24
- - [ ] evidence can be collected at runtime
25
- - [ ] investigation scope is bounded
26
-
27
- ## F. Execution Flow
28
- 1. Reproduce issue and capture trace.
29
- 2. Follow execution and state transitions.
30
- 3. Confirm root cause with evidence.
31
- 4. Decision point ->
32
- - condition A -> root cause unverified -> continue investigation
33
- - condition B -> verified -> continue.
34
- 5. Draft minimal patch strategy and checks.
35
- 6. Emit debug investigation report.
36
-
37
- ## G. Output Schema
38
-
39
- ```json
40
- {
41
- "debug_id": "string",
42
- "evidence": ["array","of","strings"],
43
- "certainty": "low | medium | high",
44
- "root_cause": "string | null"
45
- }
46
- ```
47
-
48
- ## H. Output Target
49
- - Default delivery: stdout
50
- - Override flag: --output=<target>
51
-
52
- ## I. Stop Conditions <- abort with error message, never emit partial output
53
- - issue cannot be reproduced with available context
54
- - root cause cannot be evidenced
55
-
56
- ## J. Safety Constraints
57
- - Hard block: hard block on symptom-only fixes without diagnosis
58
- - Warn only: warn when reproduction is intermittent
@@ -1,58 +0,0 @@
1
- # /docs
2
-
3
- ## A. Intent
4
- Create deterministic documentation outputs aligned with current implementation behavior.
5
-
6
- ## B. When to Use
7
- - Use when generating or updating docs as a direct deliverable.
8
- - Do not use for release decision making.
9
-
10
- ## C. Context Assumptions
11
- - Source behavior is known.
12
- - Target audience is defined.
13
- - Doc destination is available.
14
-
15
- ## D. Required Inputs
16
- | Input | Type | Example |
17
- |---------------------|------------|----------------------------------|
18
- | `doc_scope` | string | "API auth endpoints" |
19
- | `source_refs` | string[] | ["src/auth.ts", "openapi.yaml"] |
20
- | `doc_artifact` | artifact | existing README path or docs URL |
21
-
22
- ## E. Pre-Execution Guards <- fail fast, check ALL before running
23
- - [ ] scope is explicit
24
- - [ ] source refs are accessible
25
- - [ ] destination path is writable
26
-
27
- ## F. Execution Flow
28
- 1. Collect implementation references.
29
- 2. Draft structured documentation content.
30
- 3. Validate examples and references.
31
- 4. Decision point ->
32
- - condition A -> mismatch with implementation -> revise doc content
33
- - condition B -> aligned -> continue.
34
- 5. Assemble final documentation package.
35
- 6. Emit documentation output.
36
-
37
- ## G. Output Schema
38
-
39
- ```json
40
- {
41
- "doc_id": "string",
42
- "updated_sections": ["array","of","strings"],
43
- "confidence": "low | medium | high",
44
- "gap": "string | null"
45
- }
46
- ```
47
-
48
- ## H. Output Target
49
- - Default delivery: file
50
- - Override flag: --output=<target>
51
-
52
- ## I. Stop Conditions <- abort with error message, never emit partial output
53
- - source references are unavailable
54
- - critical behavior cannot be documented accurately
55
-
56
- ## J. Safety Constraints
57
- - Hard block: hard block on knowingly incorrect implementation claims
58
- - Warn only: warn when sections remain TODO with owner
@@ -1,58 +0,0 @@
1
- # /fix
2
-
3
- ## A. Intent
4
- Apply the smallest safe code fix with regression evidence and bounded impact.
5
-
6
- ## B. When to Use
7
- - Use after root cause is confirmed and a targeted fix is required.
8
- - Do not use when defect cause is still speculative.
9
-
10
- ## C. Context Assumptions
11
- - Issue is reproducible or sufficiently evidenced.
12
- - Root cause has been identified.
13
- - Regression checks are available.
14
-
15
- ## D. Required Inputs
16
- | Input | Type | Example |
17
- |---------------------|------------|----------------------------------|
18
- | `defect_id` | string | "BUG-142" |
19
- | `affected_paths` | string[] | ["src/auth.ts", "tests/auth.test.ts"] |
20
- | `evidence` | artifact | stack trace, failing test output, screenshot |
21
-
22
- ## E. Pre-Execution Guards <- fail fast, check ALL before running
23
- - [ ] root cause evidence is present
24
- - [ ] fix scope is bounded
25
- - [ ] regression checks are defined
26
-
27
- ## F. Execution Flow
28
- 1. Read defect evidence and failing paths.
29
- 2. Implement minimal change set.
30
- 3. Run targeted validations.
31
- 4. Decision point ->
32
- - condition A -> validation fails -> iterate fix or abort
33
- - condition B -> validation passes -> continue.
34
- 5. Prepare change rationale and impact summary.
35
- 6. Emit fix package with evidence.
36
-
37
- ## G. Output Schema
38
-
39
- ```json
40
- {
41
- "fix_id": "string",
42
- "changed_files": ["array","of","strings"],
43
- "risk": "low | medium | high",
44
- "rollback_note": "string | null"
45
- }
46
- ```
47
-
48
- ## H. Output Target
49
- - Default delivery: stdout
50
- - Override flag: --output=<target>
51
-
52
- ## I. Stop Conditions <- abort with error message, never emit partial output
53
- - no verified root-cause evidence
54
- - regression validation unavailable for critical path
55
-
56
- ## J. Safety Constraints
57
- - Hard block: no broad refactor inside fix-only workflow
58
- - Warn only: warn when temporary workaround is used
@@ -1,58 +0,0 @@
1
- # /learn-loop
2
-
3
- ## A. Intent
4
- Capture deterministic retrospective outcomes and convert lessons into next-cycle actions.
5
-
6
- ## B. When to Use
7
- - Use after delivery milestones, incidents, or release cycles.
8
- - Do not use for pre-implementation planning.
9
-
10
- ## C. Context Assumptions
11
- - Cycle outcome data is available.
12
- - Owners for follow-up actions can be assigned.
13
- - Retrospective scope is defined.
14
-
15
- ## D. Required Inputs
16
- | Input | Type | Example |
17
- |---------------------|------------|----------------------------------|
18
- | `cycle_name` | string | "Sprint 18" |
19
- | `observations` | string[] | ["test flakiness", "scope churn"] |
20
- | `evidence_artifact` | artifact | metrics dashboard, incident notes, PR links |
21
-
22
- ## E. Pre-Execution Guards <- fail fast, check ALL before running
23
- - [ ] observations are evidence-backed
24
- - [ ] action owners can be assigned
25
- - [ ] follow-up window is defined
26
-
27
- ## F. Execution Flow
28
- 1. Collect outcomes, wins, and misses.
29
- 2. Identify root process issues and patterns.
30
- 3. Prioritize actionable improvements.
31
- 4. Decision point ->
32
- - condition A -> no actionable item -> request clearer observations
33
- - condition B -> actionable set ready -> continue.
34
- 5. Map actions to owners and timelines.
35
- 6. Emit learn-loop action report.
36
-
37
- ## G. Output Schema
38
-
39
- ```json
40
- {
41
- "loop_id": "string",
42
- "actions": ["array","of","strings"],
43
- "urgency": "low | medium | high",
44
- "blocker": "string | null"
45
- }
46
- ```
47
-
48
- ## H. Output Target
49
- - Default delivery: stdout
50
- - Override flag: --output=<target>
51
-
52
- ## I. Stop Conditions <- abort with error message, never emit partial output
53
- - retrospective inputs are anecdotal without evidence
54
- - no owner can be assigned to critical actions
55
-
56
- ## J. Safety Constraints
57
- - Hard block: hard block on publishing blame-focused output without actionable remediation
58
- - Warn only: warn when metrics are incomplete but direction is still usable
@@ -1,58 +0,0 @@
1
- # /perf
2
-
3
- ## A. Intent
4
- Define and execute deterministic performance optimization workflow against known baselines.
5
-
6
- ## B. When to Use
7
- - Use when improving latency, throughput, or resource efficiency.
8
- - Do not use for one-off smoke checks; use /perf-scan for quick regression comparison.
9
-
10
- ## C. Context Assumptions
11
- - Baseline metrics exist or can be captured.
12
- - Performance target is defined.
13
- - Measurement method is repeatable.
14
-
15
- ## D. Required Inputs
16
- | Input | Type | Example |
17
- |---------------------|------------|----------------------------------|
18
- | `performance_goal` | string | "p95 latency under 200ms" |
19
- | `baseline_metrics` | string[] | ["p95=260ms", "cpu=70%"] |
20
- | `benchmark_artifact` | artifact | profiling report or benchmark output |
21
-
22
- ## E. Pre-Execution Guards <- fail fast, check ALL before running
23
- - [ ] goal is measurable
24
- - [ ] baseline metric set is present
25
- - [ ] benchmark method is consistent
26
-
27
- ## F. Execution Flow
28
- 1. Capture or validate baseline metrics.
29
- 2. Apply targeted optimization changes.
30
- 3. Measure post-change metrics.
31
- 4. Decision point ->
32
- - condition A -> target unmet -> iterate optimization
33
- - condition B -> target met -> continue.
34
- 5. Summarize gains, tradeoffs, and risks.
35
- 6. Emit performance optimization report.
36
-
37
- ## G. Output Schema
38
-
39
- ```json
40
- {
41
- "perf_run_id": "string",
42
- "metrics": ["array","of","strings"],
43
- "impact": "low | medium | high",
44
- "regression": "string | null"
45
- }
46
- ```
47
-
48
- ## H. Output Target
49
- - Default delivery: stdout
50
- - Override flag: --output=<target>
51
-
52
- ## I. Stop Conditions <- abort with error message, never emit partial output
53
- - baseline cannot be measured reliably
54
- - measurement method is non-deterministic
55
-
56
- ## J. Safety Constraints
57
- - Hard block: do not trade correctness/security for performance gains
58
- - Warn only: warn when gains are within noise threshold
@@ -1,58 +0,0 @@
1
- # /plan
2
-
3
- ## A. Intent
4
- Build a deterministic implementation plan with scoped phases and acceptance checks.
5
-
6
- ## B. When to Use
7
- - Use when a feature or change request is approved for planning before coding starts.
8
- - Do not use for post-incident debugging; use /debug-track instead.
9
-
10
- ## C. Context Assumptions
11
- - Problem statement and objective are available.
12
- - Primary stakeholders and delivery window are known.
13
- - Scope boundaries can be explicitly defined.
14
-
15
- ## D. Required Inputs
16
- | Input | Type | Example |
17
- |---------------------|------------|----------------------------------|
18
- | `objective` | string | "Ship onboarding v2" |
19
- | `constraints` | string[] | ["2-week deadline", "no schema rewrite"] |
20
- | `references` | artifact | PRD link, issue URL, screenshot |
21
-
22
- ## E. Pre-Execution Guards <- fail fast, check ALL before running
23
- - [ ] objective is non-empty and testable
24
- - [ ] constraints are explicit and non-contradictory
25
- - [ ] required references are accessible
26
-
27
- ## F. Execution Flow
28
- 1. Collect requirements and constraints.
29
- 2. Split work into ordered phases and milestones.
30
- 3. Attach measurable acceptance criteria per phase.
31
- 4. Decision point ->
32
- - condition A -> phase risk > threshold -> add mitigation gate
33
- - condition B -> otherwise -> continue with baseline plan.
34
- 5. Assemble plan artifacts and dependency map.
35
- 6. Emit final plan package.
36
-
37
- ## G. Output Schema
38
-
39
- ```json
40
- {
41
- "plan_id": "string",
42
- "phases": ["array","of","strings"],
43
- "risk_level": "low | medium | high",
44
- "notes": "string | null"
45
- }
46
- ```
47
-
48
- ## H. Output Target
49
- - Default delivery: stdout
50
- - Override flag: --output=<target>
51
-
52
- ## I. Stop Conditions <- abort with error message, never emit partial output
53
- - any guard in section E fails
54
- - acceptance criteria cannot be made measurable
55
-
56
- ## J. Safety Constraints
57
- - Hard block: no hidden scope expansion beyond declared boundaries
58
- - Warn only: allow proceed with warning when estimate confidence is low