agestra 4.14.2 → 4.14.3
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.claude-plugin/marketplace.json +1 -1
- package/.claude-plugin/plugin.json +1 -1
- package/agents/agestra-team-lead.md +73 -1
- package/commands/design.md +21 -7
- package/commands/idea.md +23 -8
- package/commands/implement.md +4 -4
- package/commands/qa.md +43 -15
- package/commands/research.md +4 -1
- package/commands/review.md +22 -8
- package/commands/security.md +22 -8
- package/commands/setup.md +1 -1
- package/dist/bundle.js +7 -7
- package/package.json +1 -1
- package/scripts/host-assets/categories.mjs +3 -0
- package/skills/design.md +20 -6
- package/skills/idea.md +23 -8
- package/skills/leader.md +27 -7
- package/skills/provider-guide.md +14 -2
- package/skills/qa.md +39 -14
- package/skills/research.md +4 -0
- package/skills/review.md +23 -9
- package/skills/security.md +21 -7
- package/skills/setup.md +5 -2
package/commands/security.md
CHANGED
|
@@ -19,7 +19,7 @@ Before anything else, call `setup_status`. If it reports `Setup required: yes` o
|
|
|
19
19
|
1. Invoke the `agestra:setup` skill (or run `/agestra setup` inline) — provider detection, selection, locale, `setup_apply`.
|
|
20
20
|
2. After the config is written, resume this `/agestra security` command **from Step 1**, preserving `$ARGUMENTS`. Do not ask the user to retype.
|
|
21
21
|
|
|
22
|
-
Before any provider fan-out, run the shared workspace trust preflight for the exact current project root. If supported providers are blocked, ask once whether to register only this project folder,
|
|
22
|
+
Before any provider fan-out, run the shared workspace trust preflight for the exact current project root. If supported providers are blocked, ask once whether to register only this project folder. This is a security approval gate, not a clarifying question; "keep going" / no-questions instructions are not approval. After approval, call `provider_trust_apply` once per blocked provider. Use `provider_trust_apply_all` only when the host permission model explicitly allows batch trust changes. If approval cannot be obtained, skip blocked providers.
|
|
23
23
|
|
|
24
24
|
## Step 1: Determine security scope
|
|
25
25
|
|
|
@@ -50,9 +50,22 @@ Use `AskUserQuestion` when available, or a plain numbered prompt as fallback. Do
|
|
|
50
50
|
|
|
51
51
|
Ask separately before any tool-assisted scan that installs tools, contacts package registries, uses network access, or produces large logs. The user must approve the exact tool, command, scope, expected time, privacy/telemetry behavior, and artifact path. If the user declines, continue with manual/code-based review and list the skipped checks as residual risk.
|
|
52
52
|
|
|
53
|
-
Then ask
|
|
53
|
+
Then ask research notes before provider fan-out: secrets / API key surfaces, auth / authz boundaries, file / command execution paths, network exposure, dependency / supply-chain concerns, unsafe defaults, or `skip`. Ask whether any provider or lens should receive a specific research assignment, or whether team-lead should choose.
|
|
54
54
|
|
|
55
|
-
## Step 3:
|
|
55
|
+
## Step 3: Choose 조사 방식
|
|
56
|
+
|
|
57
|
+
Before provider fan-out, ask once which investigation topology to use unless the user already specified it:
|
|
58
|
+
|
|
59
|
+
| Option | Description |
|
|
60
|
+
|--------|-------------|
|
|
61
|
+
| **Host-led Research (Recommended)** | The current host prepares bounded security evidence first; providers challenge and debate the prepared findings. Record internally as `host-seeded`. |
|
|
62
|
+
| **Council Research** | Host and providers independently inspect assigned security surfaces before consolidation and debate. |
|
|
63
|
+
| **Provider-seeded Research** | One selected provider creates the first security seed/evidence artifact; host and other providers challenge it. |
|
|
64
|
+
| **Decide automatically** | Use Host-led for bounded audits, Council for broad/full security reviews, and Provider-seeded only when the user named a provider to lead. |
|
|
65
|
+
|
|
66
|
+
Use `AskUserQuestion` when available, or a plain numbered prompt as fallback. This is a cost/latency gate, not a security clarification. If a host-level no-questions directive prevents asking, choose Host-led Research (`host-seeded`) and report that broader provider investigation was skipped. If Provider-seeded Research is selected and the seed provider is not explicit, record the seed provider as pending; after provider availability is listed, ask which available provider should seed. Do not infer it.
|
|
67
|
+
|
|
68
|
+
## Step 4: Route execution
|
|
56
69
|
|
|
57
70
|
Call `environment_check` and `provider_list`.
|
|
58
71
|
|
|
@@ -60,7 +73,7 @@ Call `environment_check` and `provider_list`.
|
|
|
60
73
|
Stop Agestra orchestration and tell the user to run `/agestra setup` to enable a provider, or ask the current host to run a security review directly outside Agestra. Do not spawn a host specialist from this command.
|
|
61
74
|
|
|
62
75
|
**Provider-backed path — 1+ external providers available (multi-AI):**
|
|
63
|
-
Hand off to `agestra:agestra-team-lead`. Provider-backed security uses the
|
|
76
|
+
Hand off to `agestra:agestra-team-lead`. Provider-backed security uses the selected research topology flow:
|
|
64
77
|
|
|
65
78
|
```text
|
|
66
79
|
호스트가 조사한다.
|
|
@@ -79,18 +92,19 @@ External AI research and debate run in separate fresh sessions, even when the sa
|
|
|
79
92
|
- **Tool permission choices:** approved / declined / not asked, with exact approved commands if any
|
|
80
93
|
- **Report artifact path expectation:** `docs/reports/security/YYYY-MM-DD-security-[target].md`
|
|
81
94
|
- **Consensus domain:** `security`
|
|
82
|
-
- **Research
|
|
95
|
+
- **Research topology / 조사 방식:** selected in Step 3 (`host-seeded`, `council`, `provider-seeded`, or `automatic`)
|
|
96
|
+
- **Research notes:** what the selected investigation should look for (secrets/keys, auth/authz boundaries, file/command execution, network exposure, dependency concerns, unsafe defaults)
|
|
83
97
|
- **Research assignments:** optional participant/lens rows for `research_assignments`
|
|
84
98
|
- **Available providers:** from `environment_check`; include configured providers when their detected model capability is suitable, using read-only security-review tools unless the user explicitly approves a separate implementation task
|
|
85
99
|
- **Requested providers:** explicit names captured from user wording; otherwise "all available security-capable"
|
|
86
|
-
- **Specialist handoff (host-native security):** when a host-native security lens is needed, team-lead runs that specialist through the active host layer and includes the result in the
|
|
100
|
+
- **Specialist handoff (host-native security):** when a host-native security lens is needed, team-lead runs that specialist through the active host layer and includes the result in the selected research/consolidation inputs. Do not use host-specialist handoff to create a bundled research participant.
|
|
87
101
|
- **Locale:** from `setup_status`
|
|
88
102
|
- **Target workspace root:** absolute project folder if the user supplied or implied one; pass it to workspace/debate MCP calls as `workspace_base_dir`
|
|
89
103
|
- **Original user request:** preserve verbatim
|
|
90
104
|
|
|
91
|
-
Team-lead owns calling `agent_research_consensus_start`
|
|
105
|
+
Team-lead owns resolving the selected research topology, then calling `agent_research_consensus_start` when investigation fan-out is required or `agent_consensus_start` with prepared `initial_aggregation.items` when seed/host evidence is already available. Team-lead must ensure external AI research and debate use separate fresh sessions when a research phase is used, must never create a bundled research pseudo-participant, and must never carry research bundles through `source_documents`. Inspect `aggregation_record.json`, `open_debate_items.json`, `round_packet.{round}.{provider}.json`, the aggregation document, and the leader-authored final decision document under `docs/agestra/`. The brigade must not run destructive exploit tests and must not install tools or run heavyweight/networked scans without explicit user approval.
|
|
92
106
|
|
|
93
|
-
## Step
|
|
107
|
+
## Step 5: Present the result
|
|
94
108
|
|
|
95
109
|
When security review returns:
|
|
96
110
|
- Show SECURITY PASS / PASS WITH HARDENING / SECURITY BLOCK
|
package/commands/setup.md
CHANGED
|
@@ -84,7 +84,7 @@ Ask the workspace trust policy question once. Default to `ask` unless the user e
|
|
|
84
84
|
- `auto-exact`: automatically register only the exact current project root when discovery is clean
|
|
85
85
|
- `never`: never modify provider trust stores
|
|
86
86
|
|
|
87
|
-
Do not treat "등록하고 계속" / "Trust this project and continue" as consent to store `auto-exact`; that action only applies the current exact root through `provider_trust_apply_all
|
|
87
|
+
Do not treat "등록하고 계속" / "Trust this project and continue" as consent to store `auto-exact`; that action only applies the current exact root through `provider_trust_apply` calls for the selected providers. Use `provider_trust_apply_all` only when the host permission model explicitly allows batch trust changes.
|
|
88
88
|
|
|
89
89
|
Call `setup_apply` with:
|
|
90
90
|
- `enabled_providers`: the selected provider IDs
|