agileflow 3.3.0 → 3.4.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (121) hide show
  1. package/CHANGELOG.md +5 -0
  2. package/README.md +6 -6
  3. package/lib/skill-loader.js +0 -1
  4. package/package.json +1 -1
  5. package/scripts/agileflow-statusline.sh +81 -0
  6. package/scripts/claude-tmux.sh +113 -22
  7. package/scripts/claude-watchdog.sh +225 -0
  8. package/scripts/generators/agent-registry.js +14 -1
  9. package/scripts/generators/inject-babysit.js +22 -9
  10. package/scripts/generators/inject-help.js +19 -9
  11. package/scripts/lib/audit-cleanup.js +250 -0
  12. package/scripts/lib/audit-registry.js +248 -0
  13. package/scripts/lib/feature-catalog.js +3 -3
  14. package/scripts/lib/gate-enforcer.js +295 -0
  15. package/scripts/lib/model-profiles.js +98 -0
  16. package/scripts/lib/signal-detectors.js +1 -1
  17. package/scripts/lib/skill-catalog.js +557 -0
  18. package/scripts/lib/skill-recommender.js +311 -0
  19. package/scripts/lib/tdd-phase-manager.js +455 -0
  20. package/scripts/lib/team-events.js +34 -3
  21. package/scripts/lib/tmux-group-colors.js +113 -0
  22. package/scripts/messaging-bridge.js +209 -1
  23. package/scripts/spawn-audit-sessions.js +549 -0
  24. package/scripts/team-manager.js +37 -16
  25. package/scripts/tmux-close-windows.sh +180 -0
  26. package/src/core/agents/ads-audit-budget.md +181 -0
  27. package/src/core/agents/ads-audit-compliance.md +169 -0
  28. package/src/core/agents/ads-audit-creative.md +164 -0
  29. package/src/core/agents/ads-audit-google.md +226 -0
  30. package/src/core/agents/ads-audit-meta.md +183 -0
  31. package/src/core/agents/ads-audit-tracking.md +197 -0
  32. package/src/core/agents/ads-consensus.md +322 -0
  33. package/src/core/agents/brainstorm-analyzer-features.md +169 -0
  34. package/src/core/agents/brainstorm-analyzer-growth.md +161 -0
  35. package/src/core/agents/brainstorm-analyzer-integration.md +172 -0
  36. package/src/core/agents/brainstorm-analyzer-market.md +147 -0
  37. package/src/core/agents/brainstorm-analyzer-ux.md +167 -0
  38. package/src/core/agents/brainstorm-consensus.md +237 -0
  39. package/src/core/agents/completeness-consensus.md +5 -5
  40. package/src/core/agents/perf-consensus.md +2 -2
  41. package/src/core/agents/security-consensus.md +2 -2
  42. package/src/core/agents/seo-analyzer-content.md +167 -0
  43. package/src/core/agents/seo-analyzer-images.md +187 -0
  44. package/src/core/agents/seo-analyzer-performance.md +206 -0
  45. package/src/core/agents/seo-analyzer-schema.md +176 -0
  46. package/src/core/agents/seo-analyzer-sitemap.md +172 -0
  47. package/src/core/agents/seo-analyzer-technical.md +144 -0
  48. package/src/core/agents/seo-consensus.md +289 -0
  49. package/src/core/agents/test-consensus.md +2 -2
  50. package/src/core/commands/ads/audit.md +375 -0
  51. package/src/core/commands/ads/budget.md +97 -0
  52. package/src/core/commands/ads/competitor.md +112 -0
  53. package/src/core/commands/ads/creative.md +85 -0
  54. package/src/core/commands/ads/google.md +112 -0
  55. package/src/core/commands/ads/landing.md +119 -0
  56. package/src/core/commands/ads/linkedin.md +112 -0
  57. package/src/core/commands/ads/meta.md +91 -0
  58. package/src/core/commands/ads/microsoft.md +115 -0
  59. package/src/core/commands/ads/plan.md +321 -0
  60. package/src/core/commands/ads/tiktok.md +129 -0
  61. package/src/core/commands/ads/youtube.md +124 -0
  62. package/src/core/commands/ads.md +128 -0
  63. package/src/core/commands/babysit.md +249 -1284
  64. package/src/core/commands/{audit → code}/completeness.md +35 -25
  65. package/src/core/commands/{audit → code}/legal.md +26 -16
  66. package/src/core/commands/{audit → code}/logic.md +27 -16
  67. package/src/core/commands/{audit → code}/performance.md +30 -20
  68. package/src/core/commands/{audit → code}/security.md +32 -19
  69. package/src/core/commands/{audit → code}/test.md +30 -20
  70. package/src/core/commands/{discovery → ideate}/brief.md +12 -12
  71. package/src/core/commands/{discovery/new.md → ideate/discover.md} +13 -13
  72. package/src/core/commands/ideate/features.md +435 -0
  73. package/src/core/commands/seo/audit.md +373 -0
  74. package/src/core/commands/seo/competitor.md +174 -0
  75. package/src/core/commands/seo/content.md +107 -0
  76. package/src/core/commands/seo/geo.md +229 -0
  77. package/src/core/commands/seo/hreflang.md +140 -0
  78. package/src/core/commands/seo/images.md +96 -0
  79. package/src/core/commands/seo/page.md +198 -0
  80. package/src/core/commands/seo/plan.md +163 -0
  81. package/src/core/commands/seo/programmatic.md +131 -0
  82. package/src/core/commands/seo/references/cwv-thresholds.md +64 -0
  83. package/src/core/commands/seo/references/eeat-framework.md +110 -0
  84. package/src/core/commands/seo/references/quality-gates.md +91 -0
  85. package/src/core/commands/seo/references/schema-types.md +102 -0
  86. package/src/core/commands/seo/schema.md +183 -0
  87. package/src/core/commands/seo/sitemap.md +97 -0
  88. package/src/core/commands/seo/technical.md +100 -0
  89. package/src/core/commands/seo.md +107 -0
  90. package/src/core/commands/skill/list.md +68 -212
  91. package/src/core/commands/skill/recommend.md +216 -0
  92. package/src/core/commands/tdd-next.md +238 -0
  93. package/src/core/commands/tdd.md +210 -0
  94. package/src/core/experts/_core-expertise.yaml +105 -0
  95. package/src/core/experts/analytics/expertise.yaml +5 -99
  96. package/src/core/experts/codebase-query/expertise.yaml +3 -72
  97. package/src/core/experts/compliance/expertise.yaml +6 -72
  98. package/src/core/experts/database/expertise.yaml +9 -52
  99. package/src/core/experts/documentation/expertise.yaml +7 -140
  100. package/src/core/experts/integrations/expertise.yaml +7 -127
  101. package/src/core/experts/mentor/expertise.yaml +8 -35
  102. package/src/core/experts/monitoring/expertise.yaml +7 -49
  103. package/src/core/experts/performance/expertise.yaml +1 -26
  104. package/src/core/experts/security/expertise.yaml +9 -34
  105. package/src/core/experts/ui/expertise.yaml +6 -36
  106. package/src/core/knowledge/ads/ad-audit-checklist-scoring.md +424 -0
  107. package/src/core/knowledge/ads/ad-optimization-logic.md +590 -0
  108. package/src/core/knowledge/ads/ad-technical-specifications.md +385 -0
  109. package/src/core/knowledge/ads/definitive-advertising-reference-2026.md +506 -0
  110. package/src/core/knowledge/ads/paid-advertising-research-2026.md +445 -0
  111. package/src/core/templates/agileflow-metadata.json +15 -1
  112. package/tools/cli/installers/ide/_base-ide.js +42 -5
  113. package/tools/cli/installers/ide/claude-code.js +3 -3
  114. package/tools/cli/lib/content-injector.js +160 -12
  115. package/tools/cli/lib/docs-setup.js +1 -1
  116. package/src/core/commands/skill/create.md +0 -698
  117. package/src/core/commands/skill/delete.md +0 -316
  118. package/src/core/commands/skill/edit.md +0 -359
  119. package/src/core/commands/skill/test.md +0 -394
  120. package/src/core/commands/skill/upgrade.md +0 -552
  121. package/src/core/templates/skill-template.md +0 -117
@@ -1,15 +1,15 @@
1
1
  ---
2
2
  description: Multi-agent analysis for forgotten features, dead handlers, stub code, and incomplete implementations
3
- argument-hint: "[file|directory] [DEPTH=quick|deep] [FOCUS=handlers|routes|api|stubs|state|imports|conditional|all]"
3
+ argument-hint: "[file|directory] [DEPTH=quick|deep|ultradeep] [FOCUS=handlers|routes|api|stubs|state|imports|conditional|all] [MODEL=haiku|sonnet|opus]"
4
4
  compact_context:
5
5
  priority: high
6
6
  preserve_rules:
7
- - "ACTIVE COMMAND: /agileflow:audit:completeness - Multi-agent forgotten features analysis"
7
+ - "ACTIVE COMMAND: /agileflow:code:completeness - Multi-agent forgotten features analysis"
8
8
  - "CRITICAL: Deploy analyzers IN PARALLEL in ONE message with multiple Task calls"
9
9
  - "CRITICAL: Wait for all results before running consensus (use TaskOutput with block=true)"
10
10
  - "CRITICAL: Severity scale: BROKEN > INCOMPLETE > PLACEHOLDER > DORMANT"
11
11
  - "CRITICAL: Confidence scoring: CONFIRMED (2+ agree), LIKELY (1 with evidence), INVESTIGATE (1 weak)"
12
- - "MUST parse arguments: TARGET (file/dir), DEPTH (quick/deep), FOCUS (handlers|routes|api|stubs|state|imports|conditional|all)"
12
+ - "MUST parse arguments: TARGET (file/dir), DEPTH (quick/deep/ultradeep), FOCUS (handlers|routes|api|stubs|state|imports|conditional|all)"
13
13
  - "Pass consensus all analyzer outputs, let it synthesize the final report"
14
14
  state_fields:
15
15
  - target_path
@@ -19,7 +19,7 @@ compact_context:
19
19
  - findings_collected
20
20
  ---
21
21
 
22
- # /agileflow:audit:completeness
22
+ # /agileflow:code:completeness
23
23
 
24
24
  Deploy multiple specialized completeness analyzers in parallel to find forgotten features, dead handlers, stub code, and incomplete implementations, then synthesize results through consensus voting into a prioritized Completeness Audit Report.
25
25
 
@@ -28,11 +28,11 @@ Deploy multiple specialized completeness analyzers in parallel to find forgotten
28
28
  ## Quick Reference
29
29
 
30
30
  ```
31
- /agileflow:audit:completeness app/ # Analyze app directory (quick, core 5 analyzers)
32
- /agileflow:audit:completeness . DEPTH=deep # Deep analysis - all 7 analyzers
33
- /agileflow:audit:completeness src/ FOCUS=handlers,routes # Focus on specific areas
34
- /agileflow:audit:completeness . DEPTH=deep FOCUS=all # Comprehensive full audit
35
- /agileflow:audit:completeness components/ FOCUS=stubs,state # Check stubs and unused state
31
+ /agileflow:code:completeness app/ # Analyze app directory (quick, core 5 analyzers)
32
+ /agileflow:code:completeness . DEPTH=deep # Deep analysis - all 7 analyzers
33
+ /agileflow:code:completeness src/ FOCUS=handlers,routes # Focus on specific areas
34
+ /agileflow:code:completeness . DEPTH=deep FOCUS=all # Comprehensive full audit
35
+ /agileflow:code:completeness components/ FOCUS=stubs,state # Check stubs and unused state
36
36
  ```
37
37
 
38
38
  ---
@@ -41,7 +41,7 @@ Deploy multiple specialized completeness analyzers in parallel to find forgotten
41
41
 
42
42
  ```
43
43
  ┌─────────────────────────────────────────────────────────────┐
44
- │ /agileflow:audit:completeness │
44
+ │ /agileflow:code:completeness │
45
45
  │ │
46
46
  │ 1. Parse arguments (target, depth, focus) │
47
47
  │ 2. Deploy analyzers IN PARALLEL │
@@ -74,8 +74,9 @@ Deploy multiple specialized completeness analyzers in parallel to find forgotten
74
74
  | Argument | Values | Default | Description |
75
75
  |----------|--------|---------|-------------|
76
76
  | TARGET | file/directory | `.` | What to analyze |
77
- | DEPTH | quick, deep | quick | quick = core 5 analyzers, deep = all 7 |
77
+ | DEPTH | quick, deep, ultradeep | quick | quick = core 5, deep = all 7, ultradeep = separate tmux sessions |
78
78
  | FOCUS | handlers,routes,api,stubs,state,imports,conditional,all | all | Which analyzers to deploy |
79
+ | MODEL | haiku, sonnet, opus | haiku | Model for analyzer subagents. Default preserves existing behavior. |
79
80
 
80
81
  ---
81
82
 
@@ -118,6 +119,15 @@ FOCUS = all (default) or comma-separated list
118
119
  **DEPTH behavior**:
119
120
  - `quick` (default): Deploy core 5 analyzers. Focus on BROKEN/INCOMPLETE issues only.
120
121
  - `deep`: Deploy all 7 analyzers. Include PLACEHOLDER/DORMANT findings.
122
+ - `ultradeep`: Spawn each analyzer as a separate Claude Code session in tmux. Requires tmux. Uses model profiles from metadata. Falls back to `deep` if tmux unavailable.
123
+
124
+ **ULTRADEEP mode** (DEPTH=ultradeep):
125
+ 1. Show cost estimate: `node .agileflow/scripts/spawn-audit-sessions.js --audit=completeness --target=TARGET --focus=FOCUS --model=MODEL --dry-run`
126
+ 2. Confirm with user before launching
127
+ 3. Spawn sessions: `node .agileflow/scripts/spawn-audit-sessions.js --audit=completeness --target=TARGET --focus=FOCUS --model=MODEL`
128
+ 4. Monitor sentinel files in `docs/09-agents/ultradeep/{trace_id}/` for completion
129
+ 5. Collect all findings and run consensus coordinator (same as deep mode)
130
+ 6. If tmux unavailable, fall back to `DEPTH=deep` with warning
121
131
 
122
132
  ### STEP 2: Deploy Analyzers in Parallel
123
133
 
@@ -377,13 +387,13 @@ Total: 10 findings (3 intentional exclusions)
377
387
  <!-- COMPACT_SUMMARY_START -->
378
388
  ## Compact Summary
379
389
 
380
- **Command**: `/agileflow:audit:completeness` - Multi-agent forgotten features analysis with consensus
390
+ **Command**: `/agileflow:code:completeness` - Multi-agent forgotten features analysis with consensus
381
391
 
382
392
  **Quick Usage**:
383
393
  ```
384
- /agileflow:audit:completeness app/ # Quick scan (core 5 analyzers)
385
- /agileflow:audit:completeness . DEPTH=deep # All 7 analyzers
386
- /agileflow:audit:completeness src/ FOCUS=handlers,routes # Specific areas
394
+ /agileflow:code:completeness app/ # Quick scan (core 5 analyzers)
395
+ /agileflow:code:completeness . DEPTH=deep # All 7 analyzers
396
+ /agileflow:code:completeness src/ FOCUS=handlers,routes # Specific areas
387
397
  ```
388
398
 
389
399
  **What It Does**: Deploy completeness analyzers in parallel -> Each finds different incomplete implementation classes -> Consensus coordinator validates, filters by project type, classifies user impact -> Actionable Completeness Audit Report
@@ -417,11 +427,11 @@ Total: 10 findings (3 intentional exclusions)
417
427
 
418
428
  ## Boundary Rules (No Overlap)
419
429
 
420
- - **vs audit:security**: No vulnerabilities, XSS, injection, auth bypass - those are security domain
421
- - **vs audit:logic**: No race conditions, type bugs, edge cases, control flow - those are logic domain
422
- - **vs audit:performance**: No slow queries, memory leaks, bundle size - those are performance domain
423
- - **vs audit:test**: No missing tests, weak assertions, test patterns - those are test domain
424
- - **vs audit:legal**: No compliance, GDPR, licensing - those are legal domain
430
+ - **vs code:security**: No vulnerabilities, XSS, injection, auth bypass - those are security domain
431
+ - **vs code:logic**: No race conditions, type bugs, edge cases, control flow - those are logic domain
432
+ - **vs code:performance**: No slow queries, memory leaks, bundle size - those are performance domain
433
+ - **vs code:test**: No missing tests, weak assertions, test patterns - those are test domain
434
+ - **vs code:legal**: No compliance, GDPR, licensing - those are legal domain
425
435
  - **This audit asks**: Are features fully wired up? Do buttons work? Is stub code shipped?
426
436
 
427
437
  ---
@@ -447,10 +457,10 @@ Fix before merging? [Y/n]
447
457
 
448
458
  ## Related Commands
449
459
 
450
- - `/agileflow:audit:security` - Security vulnerability analysis (similar architecture)
451
- - `/agileflow:audit:logic` - Logic bug analysis (similar architecture)
452
- - `/agileflow:audit:performance` - Performance bottleneck analysis (similar architecture)
453
- - `/agileflow:audit:test` - Test quality analysis (similar architecture)
454
- - `/agileflow:audit:legal` - Legal compliance analysis (similar architecture)
460
+ - `/agileflow:code:security` - Security vulnerability analysis (similar architecture)
461
+ - `/agileflow:code:logic` - Logic bug analysis (similar architecture)
462
+ - `/agileflow:code:performance` - Performance bottleneck analysis (similar architecture)
463
+ - `/agileflow:code:test` - Test quality analysis (similar architecture)
464
+ - `/agileflow:code:legal` - Legal compliance analysis (similar architecture)
455
465
  - `/agileflow:review` - Code review (includes some completeness checks)
456
466
  - `/agileflow:multi-expert` - General multi-expert analysis
@@ -1,14 +1,14 @@
1
1
  ---
2
2
  description: Multi-agent legal risk analysis with consensus voting for finding compliance gaps
3
- argument-hint: "[file|directory] [DEPTH=quick|deep] [FOCUS=privacy|terms|a11y|licensing|consumer|security|ai|content|international|all]"
3
+ argument-hint: "[file|directory] [DEPTH=quick|deep|ultradeep] [FOCUS=privacy|terms|a11y|licensing|consumer|security|ai|content|international|all] [MODEL=haiku|sonnet|opus]"
4
4
  compact_context:
5
5
  priority: high
6
6
  preserve_rules:
7
- - "ACTIVE COMMAND: /agileflow:audit:legal - Multi-agent legal risk analysis"
7
+ - "ACTIVE COMMAND: /agileflow:code:legal - Multi-agent legal risk analysis"
8
8
  - "CRITICAL: Deploy analyzers IN PARALLEL in ONE message with multiple Task calls"
9
9
  - "CRITICAL: Wait for all results before running consensus (use TaskOutput with block=true)"
10
10
  - "CRITICAL: Confidence scoring: CONFIRMED (2+ agree), LIKELY (1 with evidence), INVESTIGATE (1 weak)"
11
- - "MUST parse arguments: TARGET (file/dir), DEPTH (quick/deep), FOCUS (privacy|terms|a11y|licensing|consumer|security|ai|content|international|all)"
11
+ - "MUST parse arguments: TARGET (file/dir), DEPTH (quick/deep/ultradeep), FOCUS (privacy|terms|a11y|licensing|consumer|security|ai|content|international|all)"
12
12
  - "Pass consensus all analyzer outputs, let it synthesize the final report"
13
13
  state_fields:
14
14
  - target_path
@@ -18,7 +18,7 @@ compact_context:
18
18
  - findings_collected
19
19
  ---
20
20
 
21
- # /agileflow:audit:legal
21
+ # /agileflow:code:legal
22
22
 
23
23
  Deploy multiple specialized legal risk analyzers in parallel to find compliance gaps, then synthesize results through consensus voting into a prioritized Legal Risk Report.
24
24
 
@@ -27,11 +27,11 @@ Deploy multiple specialized legal risk analyzers in parallel to find compliance
27
27
  ## Quick Reference
28
28
 
29
29
  ```
30
- /agileflow:audit:legal app/ # Analyze app directory (quick, core 5 analyzers)
31
- /agileflow:audit:legal . DEPTH=deep # Deep analysis - all 9 analyzers
32
- /agileflow:audit:legal src/ FOCUS=privacy,a11y # Focus on specific areas
33
- /agileflow:audit:legal . DEPTH=deep FOCUS=all # Comprehensive full audit
34
- /agileflow:audit:legal app/page.tsx FOCUS=ai # Check single file for AI compliance
30
+ /agileflow:code:legal app/ # Analyze app directory (quick, core 5 analyzers)
31
+ /agileflow:code:legal . DEPTH=deep # Deep analysis - all 9 analyzers
32
+ /agileflow:code:legal src/ FOCUS=privacy,a11y # Focus on specific areas
33
+ /agileflow:code:legal . DEPTH=deep FOCUS=all # Comprehensive full audit
34
+ /agileflow:code:legal app/page.tsx FOCUS=ai # Check single file for AI compliance
35
35
  ```
36
36
 
37
37
  ---
@@ -40,7 +40,7 @@ Deploy multiple specialized legal risk analyzers in parallel to find compliance
40
40
 
41
41
  ```
42
42
  ┌─────────────────────────────────────────────────────────────┐
43
- │ /agileflow:audit:legal │
43
+ │ /agileflow:code:legal │
44
44
  │ │
45
45
  │ 1. Parse arguments (target, depth, focus) │
46
46
  │ 2. Deploy analyzers IN PARALLEL │
@@ -73,8 +73,9 @@ Deploy multiple specialized legal risk analyzers in parallel to find compliance
73
73
  | Argument | Values | Default | Description |
74
74
  |----------|--------|---------|-------------|
75
75
  | TARGET | file/directory | `.` | What to analyze |
76
- | DEPTH | quick, deep | quick | quick = core 5 analyzers, deep = all 9 |
76
+ | DEPTH | quick, deep, ultradeep | quick | quick = core 5, deep = all 9, ultradeep = separate tmux sessions |
77
77
  | FOCUS | privacy,terms,a11y,licensing,consumer,security,ai,content,international,all | all | Which analyzers to deploy |
78
+ | MODEL | haiku, sonnet, opus | haiku | Model for analyzer subagents. Default preserves existing behavior. |
78
79
 
79
80
  ---
80
81
 
@@ -108,6 +109,15 @@ FOCUS = all (default) or comma-separated list
108
109
  **DEPTH behavior**:
109
110
  - `quick` (default): Deploy core 5 analyzers. Focus on CRITICAL/HIGH issues only.
110
111
  - `deep`: Deploy all 9 analyzers. Include MEDIUM/LOW findings.
112
+ - `ultradeep`: Spawn each analyzer as a separate Claude Code session in tmux. Requires tmux. Uses model profiles from metadata. Falls back to `deep` if tmux unavailable.
113
+
114
+ **ULTRADEEP mode** (DEPTH=ultradeep):
115
+ 1. Show cost estimate: `node .agileflow/scripts/spawn-audit-sessions.js --audit=legal --target=TARGET --focus=FOCUS --model=MODEL --dry-run`
116
+ 2. Confirm with user before launching
117
+ 3. Spawn sessions: `node .agileflow/scripts/spawn-audit-sessions.js --audit=legal --target=TARGET --focus=FOCUS --model=MODEL`
118
+ 4. Monitor sentinel files in `docs/09-agents/ultradeep/{trace_id}/` for completion
119
+ 5. Collect all findings and run consensus coordinator (same as deep mode)
120
+ 6. If tmux unavailable, fall back to `DEPTH=deep` with warning
111
121
 
112
122
  ### STEP 2: Deploy Analyzers in Parallel
113
123
 
@@ -379,13 +389,13 @@ Total: 10 findings (3 false positives excluded)
379
389
  <!-- COMPACT_SUMMARY_START -->
380
390
  ## Compact Summary
381
391
 
382
- **Command**: `/agileflow:audit:legal` - Multi-agent legal risk analysis with consensus
392
+ **Command**: `/agileflow:code:legal` - Multi-agent legal risk analysis with consensus
383
393
 
384
394
  **Quick Usage**:
385
395
  ```
386
- /agileflow:audit:legal app/ # Quick scan (core 5 analyzers)
387
- /agileflow:audit:legal . DEPTH=deep # All 9 analyzers
388
- /agileflow:audit:legal src/ FOCUS=privacy,a11y # Specific areas
396
+ /agileflow:code:legal app/ # Quick scan (core 5 analyzers)
397
+ /agileflow:code:legal . DEPTH=deep # All 9 analyzers
398
+ /agileflow:code:legal src/ FOCUS=privacy,a11y # Specific areas
389
399
  ```
390
400
 
391
401
  **What It Does**: Deploy legal analyzers in parallel → Each finds different compliance gaps → Consensus coordinator validates, filters by project type, prioritizes → Actionable Legal Risk Report
@@ -440,7 +450,7 @@ Fix before launch? [Y/n]
440
450
 
441
451
  ## Related Commands
442
452
 
443
- - `/agileflow:audit:logic` - Logic bug analysis (similar architecture)
453
+ - `/agileflow:code:logic` - Logic bug analysis (similar architecture)
444
454
  - `/agileflow:review` - Code review (includes some compliance checks)
445
455
  - `/agileflow:multi-expert` - General multi-expert analysis
446
456
  - `/agileflow:verify` - Run tests
@@ -1,14 +1,14 @@
1
1
  ---
2
2
  description: Multi-agent logic analysis with consensus voting for finding logic bugs
3
- argument-hint: "[file|directory] [DEPTH=quick|deep] [FOCUS=edge|invariant|flow|type|race|all]"
3
+ argument-hint: "[file|directory] [DEPTH=quick|deep|ultradeep] [FOCUS=edge|invariant|flow|type|race|all] [MODEL=haiku|sonnet|opus]"
4
4
  compact_context:
5
5
  priority: high
6
6
  preserve_rules:
7
- - "ACTIVE COMMAND: /agileflow:audit:logic - Multi-agent logic analysis"
7
+ - "ACTIVE COMMAND: /agileflow:code:logic - Multi-agent logic analysis"
8
8
  - "CRITICAL: Deploy analyzers IN PARALLEL in ONE message with multiple Task calls"
9
9
  - "CRITICAL: Wait for all results before running consensus (use TaskOutput with block=true)"
10
10
  - "CRITICAL: Confidence scoring: CONFIRMED (2+ agree), LIKELY (1 with evidence), INVESTIGATE (1 weak)"
11
- - "MUST parse arguments: TARGET (file/dir), DEPTH (quick/deep), FOCUS (edge/invariant/flow/type/race/all)"
11
+ - "MUST parse arguments: TARGET (file/dir), DEPTH (quick/deep/ultradeep), FOCUS (edge/invariant/flow/type/race/all)"
12
12
  - "Pass consensus all analyzer outputs, let it synthesize the final report"
13
13
  state_fields:
14
14
  - target_path
@@ -18,7 +18,7 @@ compact_context:
18
18
  - findings_collected
19
19
  ---
20
20
 
21
- # /agileflow:audit:logic
21
+ # /agileflow:code:logic
22
22
 
23
23
  Deploy multiple specialized logic analyzers in parallel to find bugs, then synthesize results through consensus voting.
24
24
 
@@ -27,10 +27,12 @@ Deploy multiple specialized logic analyzers in parallel to find bugs, then synth
27
27
  ## Quick Reference
28
28
 
29
29
  ```
30
- /agileflow:audit:logic src/utils.js # Analyze single file
31
- /agileflow:audit:logic src/ DEPTH=deep # Deep analysis of directory
32
- /agileflow:audit:logic . FOCUS=race,type # Focus on race conditions and type issues
33
- /agileflow:audit:logic src/cart.js DEPTH=quick # Quick scan of specific file
30
+ /agileflow:code:logic src/utils.js # Analyze single file
31
+ /agileflow:code:logic src/ DEPTH=deep # Deep analysis of directory
32
+ /agileflow:code:logic . FOCUS=race,type # Focus on race conditions and type issues
33
+ /agileflow:code:logic src/cart.js DEPTH=quick # Quick scan of specific file
34
+ /agileflow:code:logic . DEPTH=ultradeep # Each analyzer in its own tmux session
35
+ /agileflow:code:logic src/ MODEL=sonnet # Use Sonnet for all analyzers
34
36
  ```
35
37
 
36
38
  ---
@@ -39,7 +41,7 @@ Deploy multiple specialized logic analyzers in parallel to find bugs, then synth
39
41
 
40
42
  ```
41
43
  ┌─────────────────────────────────────────────────────────────┐
42
- │ /agileflow:audit:logic │
44
+ │ /agileflow:code:logic │
43
45
  │ │
44
46
  │ 1. Parse arguments (target, depth, focus) │
45
47
  │ 2. Deploy 5 analyzers IN PARALLEL │
@@ -69,8 +71,9 @@ Deploy multiple specialized logic analyzers in parallel to find bugs, then synth
69
71
  | Argument | Values | Default | Description |
70
72
  |----------|--------|---------|-------------|
71
73
  | TARGET | file/directory | `.` | What to analyze |
72
- | DEPTH | quick, deep | quick | quick = high-impact only, deep = comprehensive |
74
+ | DEPTH | quick, deep, ultradeep | quick | quick = high-impact only, deep = comprehensive, ultradeep = separate tmux sessions |
73
75
  | FOCUS | edge,invariant,flow,type,race,all | all | Which analyzers to deploy |
76
+ | MODEL | haiku, sonnet, opus | haiku | Model for analyzer subagents. Default preserves existing behavior. |
74
77
 
75
78
  ---
76
79
 
@@ -80,10 +83,18 @@ Deploy multiple specialized logic analyzers in parallel to find bugs, then synth
80
83
 
81
84
  ```
82
85
  TARGET = first argument or current directory
83
- DEPTH = quick (default) or deep
86
+ DEPTH = quick (default), deep, or ultradeep
84
87
  FOCUS = all (default) or comma-separated list
85
88
  ```
86
89
 
90
+ **ULTRADEEP mode** (DEPTH=ultradeep):
91
+ 1. Show cost estimate: `node .agileflow/scripts/spawn-audit-sessions.js --audit=logic --target=TARGET --focus=FOCUS --model=MODEL --dry-run`
92
+ 2. Confirm with user before launching
93
+ 3. Spawn sessions: `node .agileflow/scripts/spawn-audit-sessions.js --audit=logic --target=TARGET --focus=FOCUS --model=MODEL`
94
+ 4. Monitor sentinel files in `docs/09-agents/ultradeep/{trace_id}/` for completion
95
+ 5. Collect all findings and run consensus coordinator (same as deep mode)
96
+ 6. If tmux unavailable, fall back to `DEPTH=deep` with warning
97
+
87
98
  **Analyzer Selection by FOCUS**:
88
99
 
89
100
  | FOCUS | Analyzers |
@@ -307,13 +318,13 @@ Total: 7 findings (2 false positives excluded)
307
318
  <!-- COMPACT_SUMMARY_START -->
308
319
  ## Compact Summary
309
320
 
310
- **Command**: `/agileflow:audit:logic` - Multi-agent logic analysis with consensus
321
+ **Command**: `/agileflow:code:logic` - Multi-agent logic analysis with consensus
311
322
 
312
323
  **Quick Usage**:
313
324
  ```
314
- /agileflow:audit:logic src/utils.js # Single file
315
- /agileflow:audit:logic src/ DEPTH=deep # Deep analysis
316
- /agileflow:audit:logic . FOCUS=race,type # Specific analyzers
325
+ /agileflow:code:logic src/utils.js # Single file
326
+ /agileflow:code:logic src/ DEPTH=deep # Deep analysis
327
+ /agileflow:code:logic . FOCUS=race,type # Specific analyzers
317
328
  ```
318
329
 
319
330
  **What It Does**: Deploy 5 logic analyzers in parallel → Each finds different bug classes → Consensus coordinator validates and prioritizes → Actionable report
@@ -354,7 +365,7 @@ Proceed with tests? [Y/n]
354
365
 
355
366
  To integrate with babysit, add to implementation workflow:
356
367
  1. Complete implementation
357
- 2. Run `/agileflow:audit:logic {changed_files} DEPTH=quick`
368
+ 2. Run `/agileflow:code:logic {changed_files} DEPTH=quick`
358
369
  3. If critical issues → block, show findings
359
370
  4. If no critical → proceed to tests
360
371
 
@@ -1,14 +1,14 @@
1
1
  ---
2
2
  description: Multi-agent performance bottleneck analysis with consensus voting for finding optimization opportunities
3
- argument-hint: "[file|directory] [DEPTH=quick|deep] [FOCUS=queries|rendering|memory|bundle|compute|network|caching|assets|all]"
3
+ argument-hint: "[file|directory] [DEPTH=quick|deep|ultradeep] [FOCUS=queries|rendering|memory|bundle|compute|network|caching|assets|all] [MODEL=haiku|sonnet|opus]"
4
4
  compact_context:
5
5
  priority: high
6
6
  preserve_rules:
7
- - "ACTIVE COMMAND: /agileflow:audit:performance - Multi-agent performance bottleneck analysis"
7
+ - "ACTIVE COMMAND: /agileflow:code:performance - Multi-agent performance bottleneck analysis"
8
8
  - "CRITICAL: Deploy analyzers IN PARALLEL in ONE message with multiple Task calls"
9
9
  - "CRITICAL: Wait for all results before running consensus (use TaskOutput with block=true)"
10
10
  - "CRITICAL: Confidence scoring: CONFIRMED (2+ agree), LIKELY (1 with evidence), INVESTIGATE (1 weak)"
11
- - "MUST parse arguments: TARGET (file/dir), DEPTH (quick/deep), FOCUS (queries|rendering|memory|bundle|compute|network|caching|assets|all)"
11
+ - "MUST parse arguments: TARGET (file/dir), DEPTH (quick/deep/ultradeep), FOCUS (queries|rendering|memory|bundle|compute|network|caching|assets|all)"
12
12
  - "Pass consensus all analyzer outputs, let it synthesize the final report"
13
13
  state_fields:
14
14
  - target_path
@@ -18,7 +18,7 @@ compact_context:
18
18
  - findings_collected
19
19
  ---
20
20
 
21
- # /agileflow:audit:performance
21
+ # /agileflow:code:performance
22
22
 
23
23
  Deploy multiple specialized performance analyzers in parallel to find bottlenecks and optimization opportunities, then synthesize results through consensus voting into a prioritized Performance Audit Report.
24
24
 
@@ -27,11 +27,11 @@ Deploy multiple specialized performance analyzers in parallel to find bottleneck
27
27
  ## Quick Reference
28
28
 
29
29
  ```
30
- /agileflow:audit:performance app/ # Analyze app directory (quick, core 5 analyzers)
31
- /agileflow:audit:performance . DEPTH=deep # Deep analysis - all 8 analyzers
32
- /agileflow:audit:performance src/ FOCUS=queries,memory # Focus on specific areas
33
- /agileflow:audit:performance . DEPTH=deep FOCUS=all # Comprehensive full audit
34
- /agileflow:audit:performance app/api/ FOCUS=queries # Check API queries specifically
30
+ /agileflow:code:performance app/ # Analyze app directory (quick, core 5 analyzers)
31
+ /agileflow:code:performance . DEPTH=deep # Deep analysis - all 8 analyzers
32
+ /agileflow:code:performance src/ FOCUS=queries,memory # Focus on specific areas
33
+ /agileflow:code:performance . DEPTH=deep FOCUS=all # Comprehensive full audit
34
+ /agileflow:code:performance app/api/ FOCUS=queries # Check API queries specifically
35
35
  ```
36
36
 
37
37
  ---
@@ -40,7 +40,7 @@ Deploy multiple specialized performance analyzers in parallel to find bottleneck
40
40
 
41
41
  ```
42
42
  +-------------------------------------------------------------+
43
- | /agileflow:audit:performance |
43
+ | /agileflow:code:performance |
44
44
  | |
45
45
  | 1. Parse arguments (target, depth, focus) |
46
46
  | 2. Deploy analyzers IN PARALLEL |
@@ -73,8 +73,9 @@ Deploy multiple specialized performance analyzers in parallel to find bottleneck
73
73
  | Argument | Values | Default | Description |
74
74
  |----------|--------|---------|-------------|
75
75
  | TARGET | file/directory | `.` | What to analyze |
76
- | DEPTH | quick, deep | quick | quick = core 5 analyzers, deep = all 8 |
76
+ | DEPTH | quick, deep, ultradeep | quick | quick = core 5, deep = all 8, ultradeep = separate tmux sessions |
77
77
  | FOCUS | queries,rendering,memory,bundle,compute,network,caching,assets,all | all | Which analyzers to deploy |
78
+ | MODEL | haiku, sonnet, opus | haiku | Model for analyzer subagents. Default preserves existing behavior. |
78
79
 
79
80
  ---
80
81
 
@@ -107,6 +108,15 @@ FOCUS = all (default) or comma-separated list
107
108
  **DEPTH behavior**:
108
109
  - `quick` (default): Deploy core 5 analyzers. Focus on CRITICAL/HIGH issues only.
109
110
  - `deep`: Deploy all 8 analyzers. Include MEDIUM/LOW findings.
111
+ - `ultradeep`: Spawn each analyzer as a separate Claude Code session in tmux. Requires tmux. Uses model profiles from metadata. Falls back to `deep` if tmux unavailable.
112
+
113
+ **ULTRADEEP mode** (DEPTH=ultradeep):
114
+ 1. Show cost estimate: `node .agileflow/scripts/spawn-audit-sessions.js --audit=performance --target=TARGET --focus=FOCUS --model=MODEL --dry-run`
115
+ 2. Confirm with user before launching
116
+ 3. Spawn sessions: `node .agileflow/scripts/spawn-audit-sessions.js --audit=performance --target=TARGET --focus=FOCUS --model=MODEL`
117
+ 4. Monitor sentinel files in `docs/09-agents/ultradeep/{trace_id}/` for completion
118
+ 5. Collect all findings and run consensus coordinator (same as deep mode)
119
+ 6. If tmux unavailable, fall back to `DEPTH=deep` with warning
110
120
 
111
121
  ### STEP 2: Deploy Analyzers in Parallel
112
122
 
@@ -368,13 +378,13 @@ FIX THIS SPRINT
368
378
  <!-- COMPACT_SUMMARY_START -->
369
379
  ## Compact Summary
370
380
 
371
- **Command**: `/agileflow:audit:performance` - Multi-agent performance bottleneck analysis with consensus
381
+ **Command**: `/agileflow:code:performance` - Multi-agent performance bottleneck analysis with consensus
372
382
 
373
383
  **Quick Usage**:
374
384
  ```
375
- /agileflow:audit:performance app/ # Quick scan (core 5 analyzers)
376
- /agileflow:audit:performance . DEPTH=deep # All 8 analyzers
377
- /agileflow:audit:performance src/ FOCUS=queries,memory # Specific areas
385
+ /agileflow:code:performance app/ # Quick scan (core 5 analyzers)
386
+ /agileflow:code:performance . DEPTH=deep # All 8 analyzers
387
+ /agileflow:code:performance src/ FOCUS=queries,memory # Specific areas
378
388
  ```
379
389
 
380
390
  **What It Does**: Deploy performance analyzers in parallel -> Each finds different bottleneck classes -> Consensus coordinator validates, filters by project type, estimates impact -> Actionable Performance Audit Report
@@ -409,8 +419,8 @@ FIX THIS SPRINT
409
419
 
410
420
  ## Boundary Rules (No Overlap)
411
421
 
412
- - **vs audit:logic**: No correctness bugs — only performance implications
413
- - **vs audit:security**: No vulnerability analysis — only efficiency
422
+ - **vs code:logic**: No correctness bugs — only performance implications
423
+ - **vs code:security**: No vulnerability analysis — only efficiency
414
424
  - **vs performance agent**: The `performance.md` agent is a team member for story work. This is an on-demand analysis tool
415
425
 
416
426
  ---
@@ -436,8 +446,8 @@ Fix before merging? [Y/n]
436
446
 
437
447
  ## Related Commands
438
448
 
439
- - `/agileflow:audit:logic` - Logic bug analysis (similar architecture)
440
- - `/agileflow:audit:security` - Security vulnerability analysis (similar architecture)
441
- - `/agileflow:audit:legal` - Legal compliance analysis (similar architecture)
449
+ - `/agileflow:code:logic` - Logic bug analysis (similar architecture)
450
+ - `/agileflow:code:security` - Security vulnerability analysis (similar architecture)
451
+ - `/agileflow:code:legal` - Legal compliance analysis (similar architecture)
442
452
  - `/agileflow:multi-expert` - General multi-expert analysis
443
453
  - `/agileflow:verify` - Run tests
@@ -1,14 +1,14 @@
1
1
  ---
2
2
  description: Multi-agent security vulnerability analysis with consensus voting for finding exploitable weaknesses
3
- argument-hint: "[file|directory] [DEPTH=quick|deep] [FOCUS=injection|auth|authz|secrets|input|deps|infra|api|all]"
3
+ argument-hint: "[file|directory] [DEPTH=quick|deep|ultradeep] [FOCUS=injection|auth|authz|secrets|input|deps|infra|api|all] [MODEL=haiku|sonnet|opus]"
4
4
  compact_context:
5
5
  priority: high
6
6
  preserve_rules:
7
- - "ACTIVE COMMAND: /agileflow:audit:security - Multi-agent security vulnerability analysis"
7
+ - "ACTIVE COMMAND: /agileflow:code:security - Multi-agent security vulnerability analysis"
8
8
  - "CRITICAL: Deploy analyzers IN PARALLEL in ONE message with multiple Task calls"
9
9
  - "CRITICAL: Wait for all results before running consensus (use TaskOutput with block=true)"
10
10
  - "CRITICAL: Confidence scoring: CONFIRMED (2+ agree), LIKELY (1 with evidence), INVESTIGATE (1 weak)"
11
- - "MUST parse arguments: TARGET (file/dir), DEPTH (quick/deep), FOCUS (injection|auth|authz|secrets|input|deps|infra|api|all)"
11
+ - "MUST parse arguments: TARGET (file/dir), DEPTH (quick/deep/ultradeep), FOCUS (injection|auth|authz|secrets|input|deps|infra|api|all)"
12
12
  - "Pass consensus all analyzer outputs, let it synthesize the final report"
13
13
  state_fields:
14
14
  - target_path
@@ -18,7 +18,7 @@ compact_context:
18
18
  - findings_collected
19
19
  ---
20
20
 
21
- # /agileflow:audit:security
21
+ # /agileflow:code:security
22
22
 
23
23
  Deploy multiple specialized security vulnerability analyzers in parallel to find exploitable weaknesses, then synthesize results through consensus voting into a prioritized Security Audit Report.
24
24
 
@@ -27,11 +27,14 @@ Deploy multiple specialized security vulnerability analyzers in parallel to find
27
27
  ## Quick Reference
28
28
 
29
29
  ```
30
- /agileflow:audit:security app/ # Analyze app directory (quick, core 5 analyzers)
31
- /agileflow:audit:security . DEPTH=deep # Deep analysis - all 8 analyzers
32
- /agileflow:audit:security src/ FOCUS=injection,auth # Focus on specific areas
33
- /agileflow:audit:security . DEPTH=deep FOCUS=all # Comprehensive full audit
34
- /agileflow:audit:security app/api/ FOCUS=api # Check API routes specifically
30
+ /agileflow:code:security app/ # Analyze app directory (quick, core 5 analyzers)
31
+ /agileflow:code:security . DEPTH=deep # Deep analysis - all 8 analyzers
32
+ /agileflow:code:security src/ FOCUS=injection,auth # Focus on specific areas
33
+ /agileflow:code:security . DEPTH=deep FOCUS=all # Comprehensive full audit
34
+ /agileflow:code:security . DEPTH=ultradeep # Each analyzer in its own tmux session
35
+ /agileflow:code:security src/ MODEL=sonnet # Use Sonnet for all analyzers
36
+ /agileflow:code:security . DEPTH=ultradeep MODEL=opus # Ultradeep with Opus
37
+ /agileflow:code:security app/api/ FOCUS=api # Check API routes specifically
35
38
  ```
36
39
 
37
40
  ---
@@ -40,7 +43,7 @@ Deploy multiple specialized security vulnerability analyzers in parallel to find
40
43
 
41
44
  ```
42
45
  ┌─────────────────────────────────────────────────────────────┐
43
- │ /agileflow:audit:security │
46
+ │ /agileflow:code:security │
44
47
  │ │
45
48
  │ 1. Parse arguments (target, depth, focus) │
46
49
  │ 2. Deploy analyzers IN PARALLEL │
@@ -73,8 +76,9 @@ Deploy multiple specialized security vulnerability analyzers in parallel to find
73
76
  | Argument | Values | Default | Description |
74
77
  |----------|--------|---------|-------------|
75
78
  | TARGET | file/directory | `.` | What to analyze |
76
- | DEPTH | quick, deep | quick | quick = core 5 analyzers, deep = all 8 |
79
+ | DEPTH | quick, deep, ultradeep | quick | quick = core 5, deep = all 8, ultradeep = separate tmux sessions |
77
80
  | FOCUS | injection,auth,authz,secrets,input,deps,infra,api,all | all | Which analyzers to deploy |
81
+ | MODEL | haiku, sonnet, opus | haiku | Model for analyzer subagents. Default preserves existing behavior. |
78
82
 
79
83
  ---
80
84
 
@@ -107,6 +111,15 @@ FOCUS = all (default) or comma-separated list
107
111
  **DEPTH behavior**:
108
112
  - `quick` (default): Deploy core 5 analyzers. Focus on CRITICAL/HIGH issues only.
109
113
  - `deep`: Deploy all 8 analyzers. Include MEDIUM/LOW findings.
114
+ - `ultradeep`: Spawn each analyzer as a separate Claude Code session in tmux. Requires tmux. Uses model profiles from metadata. Falls back to `deep` if tmux unavailable.
115
+
116
+ **ULTRADEEP mode** (DEPTH=ultradeep):
117
+ 1. Show cost estimate: `node .agileflow/scripts/spawn-audit-sessions.js --audit=security --target=TARGET --focus=FOCUS --model=MODEL --dry-run`
118
+ 2. Confirm with user before launching
119
+ 3. Spawn sessions: `node .agileflow/scripts/spawn-audit-sessions.js --audit=security --target=TARGET --focus=FOCUS --model=MODEL`
120
+ 4. Monitor sentinel files in `docs/09-agents/ultradeep/{trace_id}/` for completion
121
+ 5. Collect all findings and run consensus coordinator (same as deep mode)
122
+ 6. If tmux unavailable, fall back to `DEPTH=deep` with warning
110
123
 
111
124
  ### STEP 2: Deploy Analyzers in Parallel
112
125
 
@@ -368,13 +381,13 @@ Total: 7 findings (2 false positives excluded)
368
381
  <!-- COMPACT_SUMMARY_START -->
369
382
  ## Compact Summary
370
383
 
371
- **Command**: `/agileflow:audit:security` - Multi-agent security vulnerability analysis with consensus
384
+ **Command**: `/agileflow:code:security` - Multi-agent security vulnerability analysis with consensus
372
385
 
373
386
  **Quick Usage**:
374
387
  ```
375
- /agileflow:audit:security app/ # Quick scan (core 5 analyzers)
376
- /agileflow:audit:security . DEPTH=deep # All 8 analyzers
377
- /agileflow:audit:security src/ FOCUS=injection,auth # Specific areas
388
+ /agileflow:code:security app/ # Quick scan (core 5 analyzers)
389
+ /agileflow:code:security . DEPTH=deep # All 8 analyzers
390
+ /agileflow:code:security src/ FOCUS=injection,auth # Specific areas
378
391
  ```
379
392
 
380
393
  **What It Does**: Deploy security analyzers in parallel -> Each finds different vulnerability classes -> Consensus coordinator validates, filters by project type, maps to OWASP/CWE -> Actionable Security Audit Report
@@ -409,8 +422,8 @@ Total: 7 findings (2 false positives excluded)
409
422
 
410
423
  ## Boundary Rules (No Overlap)
411
424
 
412
- - **vs audit:logic**: No race conditions, type bugs, control flow, edge cases - those are logic domain
413
- - **vs audit:legal**: No breach notification, PCI-DSS compliance, encryption requirements, negligence liability - those are legal domain
425
+ - **vs code:logic**: No race conditions, type bugs, control flow, edge cases - those are logic domain
426
+ - **vs code:legal**: No breach notification, PCI-DSS compliance, encryption requirements, negligence liability - those are legal domain
414
427
  - **vs security agent**: The `security.md` agent is a team member for story work. This is an on-demand analysis tool
415
428
 
416
429
  ---
@@ -436,8 +449,8 @@ Fix before merging? [Y/n]
436
449
 
437
450
  ## Related Commands
438
451
 
439
- - `/agileflow:audit:logic` - Logic bug analysis (similar architecture)
440
- - `/agileflow:audit:legal` - Legal compliance analysis (similar architecture)
452
+ - `/agileflow:code:logic` - Logic bug analysis (similar architecture)
453
+ - `/agileflow:code:legal` - Legal compliance analysis (similar architecture)
441
454
  - `/agileflow:review` - Code review (includes some security checks)
442
455
  - `/agileflow:multi-expert` - General multi-expert analysis
443
456
  - `/agileflow:verify` - Run tests