appiq-solution 1.4.3 → 1.4.5

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (95) hide show
  1. package/#Tools/APPIQ-METHOD/.cursor/commands/analyze.md +1 -1
  2. package/#Tools/APPIQ-METHOD/.cursor/commands/appiq.md +1 -1
  3. package/#Tools/APPIQ-METHOD/.cursor/commands/help.md +1 -1
  4. package/#Tools/APPIQ-METHOD/.cursor/commands/story.md +1 -1
  5. package/#Tools/APPIQ-METHOD/activate-appiq.js +1 -1
  6. package/#Tools/APPIQ-METHOD/bmad-core/agents/init-flow-po.md +219 -0
  7. package/#Tools/APPIQ-METHOD/commands/analyze.md +1 -1
  8. package/#Tools/APPIQ-METHOD/commands/appiq.md +1 -1
  9. package/#Tools/APPIQ-METHOD/commands/help.md +1 -1
  10. package/#Tools/APPIQ-METHOD/commands/story.md +1 -1
  11. package/#Tools/APPIQ-METHOD/package.json +1 -1
  12. package/#Tools/APPIQ-METHOD/tools/appiq-installer.js +31 -34
  13. package/#Tools/APPIQ-METHOD/tools/epic-solution-installer.js +47 -49
  14. package/#Tools/APPIQ-METHOD/tools/setup-ide-commands.js +40 -37
  15. package/#Tools/APPIQ-METHOD/tools/smart-installer.js +16 -13
  16. package/bmad-core/agent-teams/team-all.yaml +14 -0
  17. package/bmad-core/agent-teams/team-flutter-mobile.yaml +114 -0
  18. package/bmad-core/agent-teams/team-fullstack.yaml +28 -0
  19. package/bmad-core/agent-teams/team-ide-minimal.yaml +10 -0
  20. package/bmad-core/agent-teams/team-no-ui.yaml +13 -0
  21. package/bmad-core/agents/analyst.md +85 -0
  22. package/bmad-core/agents/architect.md +90 -0
  23. package/bmad-core/agents/bmad-master.md +108 -0
  24. package/bmad-core/agents/bmad-orchestrator.md +150 -0
  25. package/bmad-core/agents/bmad-smart-launcher.md +170 -0
  26. package/bmad-core/agents/dev.md +95 -0
  27. package/bmad-core/agents/init-flow-po.md +219 -0
  28. package/bmad-core/agents/pm.md +85 -0
  29. package/bmad-core/agents/po.md +76 -0
  30. package/bmad-core/agents/qa.md +86 -0
  31. package/bmad-core/agents/sm.md +67 -0
  32. package/bmad-core/agents/ux-expert.md +71 -0
  33. package/bmad-core/bmad-core/user-guide.md +0 -0
  34. package/bmad-core/checklists/architect-checklist.md +443 -0
  35. package/bmad-core/checklists/change-checklist.md +182 -0
  36. package/bmad-core/checklists/pm-checklist.md +375 -0
  37. package/bmad-core/checklists/po-master-checklist.md +441 -0
  38. package/bmad-core/checklists/security-validation-checklist.md +332 -0
  39. package/bmad-core/checklists/story-dod-checklist.md +101 -0
  40. package/bmad-core/checklists/story-draft-checklist.md +156 -0
  41. package/bmad-core/core-config.yaml +20 -0
  42. package/bmad-core/core-config.yaml.bak +20 -0
  43. package/bmad-core/data/backend-services-integration.md +686 -0
  44. package/bmad-core/data/bmad-kb.md +803 -0
  45. package/bmad-core/data/brainstorming-techniques.md +36 -0
  46. package/bmad-core/data/elicitation-methods.md +134 -0
  47. package/bmad-core/data/shadcn-ui-integration.md +388 -0
  48. package/bmad-core/data/technical-preferences.md +149 -0
  49. package/bmad-core/enhanced-ide-development-workflow.md +43 -0
  50. package/bmad-core/tasks/advanced-elicitation.md +117 -0
  51. package/bmad-core/tasks/brownfield-create-epic.md +160 -0
  52. package/bmad-core/tasks/brownfield-create-story.md +147 -0
  53. package/bmad-core/tasks/correct-course.md +70 -0
  54. package/bmad-core/tasks/create-brownfield-story.md +304 -0
  55. package/bmad-core/tasks/create-deep-research-prompt.md +289 -0
  56. package/bmad-core/tasks/create-flutter-story.md +197 -0
  57. package/bmad-core/tasks/create-next-story.md +112 -0
  58. package/bmad-core/tasks/document-project.md +341 -0
  59. package/bmad-core/tasks/facilitate-brainstorming-session.md +136 -0
  60. package/bmad-core/tasks/generate-ai-frontend-prompt.md +51 -0
  61. package/bmad-core/tasks/index-docs.md +179 -0
  62. package/bmad-core/tasks/intelligent-epic-creation.md +234 -0
  63. package/bmad-core/tasks/kb-mode-interaction.md +75 -0
  64. package/bmad-core/tasks/review-story.md +145 -0
  65. package/bmad-core/tasks/shard-doc.md +187 -0
  66. package/bmad-core/tasks/smart-project-analysis.md +289 -0
  67. package/bmad-core/tasks/validate-next-story.md +134 -0
  68. package/bmad-core/templates/architecture-tmpl.yaml +650 -0
  69. package/bmad-core/templates/brainstorming-output-tmpl.yaml +156 -0
  70. package/bmad-core/templates/brownfield-architecture-tmpl.yaml +476 -0
  71. package/bmad-core/templates/brownfield-prd-tmpl.yaml +280 -0
  72. package/bmad-core/templates/competitor-analysis-tmpl.yaml +293 -0
  73. package/bmad-core/templates/flutter-mobile-prd-tmpl.yaml +330 -0
  74. package/bmad-core/templates/flutter-story-tmpl.yaml +376 -0
  75. package/bmad-core/templates/flutter-ui-spec-tmpl.yaml +415 -0
  76. package/bmad-core/templates/front-end-architecture-tmpl.yaml +206 -0
  77. package/bmad-core/templates/front-end-spec-tmpl.yaml +349 -0
  78. package/bmad-core/templates/fullstack-architecture-tmpl.yaml +812 -0
  79. package/bmad-core/templates/market-research-tmpl.yaml +252 -0
  80. package/bmad-core/templates/prd-tmpl.yaml +202 -0
  81. package/bmad-core/templates/project-brief-tmpl.yaml +221 -0
  82. package/bmad-core/templates/story-tmpl.yaml +137 -0
  83. package/bmad-core/user-guide.md +251 -0
  84. package/bmad-core/workflows/brownfield-fullstack.yaml +311 -0
  85. package/bmad-core/workflows/brownfield-service.yaml +187 -0
  86. package/bmad-core/workflows/brownfield-ui.yaml +197 -0
  87. package/bmad-core/workflows/greenfield-fullstack.yaml +284 -0
  88. package/bmad-core/workflows/greenfield-service.yaml +206 -0
  89. package/bmad-core/workflows/greenfield-ui.yaml +235 -0
  90. package/bmad-core/working-in-the-brownfield.md +373 -0
  91. package/package.json +1 -1
  92. package/tools/appiq-installer.js +31 -34
  93. package/tools/epic-solution-installer.js +47 -49
  94. package/tools/setup-ide-commands.js +40 -37
  95. package/tools/smart-installer.js +16 -13
@@ -0,0 +1,332 @@
1
+ # Security Validation Checklist
2
+
3
+ ## 📋 Overview
4
+ This comprehensive security checklist ensures applications meet security standards across all supported frameworks (Web, Mobile, Backend) before production deployment.
5
+
6
+ ## 🔒 Authentication & Authorization
7
+
8
+ ### Web Applications (React, Vue, Angular)
9
+ - [ ] **JWT Token Security**: Tokens stored securely (httpOnly cookies or secure storage)
10
+ - [ ] **Token Expiration**: Proper token expiration and refresh mechanisms
11
+ - [ ] **Session Management**: Secure session handling and timeout
12
+ - [ ] **Multi-Factor Authentication**: MFA implemented where required
13
+ - [ ] **OAuth Integration**: Secure OAuth 2.0 implementation
14
+ - [ ] **Password Policy**: Strong password requirements enforced
15
+ - [ ] **Account Lockout**: Brute force protection implemented
16
+ - [ ] **CSRF Protection**: Cross-Site Request Forgery protection enabled
17
+
18
+ ### Mobile Applications (Flutter)
19
+ - [ ] **Biometric Authentication**: Secure biometric authentication where applicable
20
+ - [ ] **Secure Storage**: Sensitive data stored using flutter_secure_storage
21
+ - [ ] **Certificate Pinning**: SSL certificate pinning implemented
22
+ - [ ] **App Transport Security**: Proper ATS configuration for iOS
23
+ - [ ] **Root/Jailbreak Detection**: Detection and response to compromised devices
24
+ - [ ] **Keychain/Keystore**: Proper use of platform security features
25
+ - [ ] **Deep Link Security**: Secure handling of deep links and intents
26
+ - [ ] **Background App Security**: Secure handling of app backgrounding
27
+
28
+ ### Backend Services
29
+ - [ ] **API Authentication**: Proper API authentication mechanisms
30
+ - [ ] **Role-Based Access Control**: RBAC implemented correctly
31
+ - [ ] **Privilege Escalation**: Protection against privilege escalation
32
+ - [ ] **Service-to-Service Auth**: Secure service authentication
33
+ - [ ] **API Key Management**: Secure API key storage and rotation
34
+ - [ ] **Database Access Control**: Proper database user permissions
35
+ - [ ] **Admin Interface Security**: Secure admin panel access
36
+ - [ ] **Audit Logging**: Comprehensive authentication audit logs
37
+
38
+ ## 🛡️ Input Validation & Data Security
39
+
40
+ ### Client-Side Validation
41
+ - [ ] **Input Sanitization**: All user inputs sanitized before processing
42
+ - [ ] **XSS Prevention**: Cross-Site Scripting protection implemented
43
+ - [ ] **Form Validation**: Comprehensive client-side form validation
44
+ - [ ] **File Upload Security**: Secure file upload handling
45
+ - [ ] **Content Security Policy**: CSP headers properly configured
46
+ - [ ] **DOM Manipulation**: Safe DOM manipulation practices
47
+ - [ ] **Event Handler Security**: Secure event handler implementation
48
+ - [ ] **Third-Party Script Security**: Secure integration of third-party scripts
49
+
50
+ ### Server-Side Validation
51
+ - [ ] **Input Validation**: All inputs validated on server side
52
+ - [ ] **SQL Injection Prevention**: Parameterized queries used
53
+ - [ ] **NoSQL Injection Prevention**: NoSQL injection protection
54
+ - [ ] **Command Injection Prevention**: Command injection protection
55
+ - [ ] **Path Traversal Prevention**: Directory traversal protection
56
+ - [ ] **Data Type Validation**: Proper data type validation
57
+ - [ ] **Business Logic Validation**: Business rule validation
58
+ - [ ] **Rate Limiting**: API rate limiting implemented
59
+
60
+ ### Data Protection
61
+ - [ ] **Encryption at Rest**: Sensitive data encrypted in storage
62
+ - [ ] **Encryption in Transit**: All data encrypted during transmission
63
+ - [ ] **PII Handling**: Personal data handled according to regulations
64
+ - [ ] **Data Masking**: Sensitive data masked in logs and UI
65
+ - [ ] **Secure Deletion**: Secure data deletion procedures
66
+ - [ ] **Data Backup Security**: Secure backup procedures
67
+ - [ ] **Database Encryption**: Database encryption enabled
68
+ - [ ] **Key Management**: Proper encryption key management
69
+
70
+ ## 🌐 Network & API Security
71
+
72
+ ### HTTPS & TLS
73
+ - [ ] **HTTPS Enforcement**: All traffic uses HTTPS
74
+ - [ ] **TLS Version**: Modern TLS versions (1.2+) enforced
75
+ - [ ] **Certificate Validation**: Proper SSL certificate validation
76
+ - [ ] **HSTS Headers**: HTTP Strict Transport Security enabled
77
+ - [ ] **Certificate Transparency**: Certificate transparency compliance
78
+ - [ ] **Perfect Forward Secrecy**: PFS enabled for connections
79
+ - [ ] **Cipher Suite Security**: Secure cipher suites configured
80
+ - [ ] **Mixed Content Prevention**: No mixed HTTP/HTTPS content
81
+
82
+ ### API Security
83
+ - [ ] **API Versioning**: Proper API versioning strategy
84
+ - [ ] **CORS Configuration**: Correct CORS policy implementation
85
+ - [ ] **API Documentation**: Security considerations documented
86
+ - [ ] **Error Handling**: Secure error messages (no data leakage)
87
+ - [ ] **Request Size Limits**: Proper request size limitations
88
+ - [ ] **Timeout Configuration**: Appropriate timeout settings
89
+ - [ ] **API Gateway Security**: Secure API gateway configuration
90
+ - [ ] **Webhook Security**: Secure webhook implementation
91
+
92
+ ### Firebase/Supabase Security
93
+ - [ ] **Firestore Rules**: Proper Firestore security rules
94
+ - [ ] **Storage Rules**: Secure Firebase Storage rules
95
+ - [ ] **Cloud Function Security**: Secure Cloud Functions
96
+ - [ ] **Row Level Security**: Supabase RLS policies implemented
97
+ - [ ] **Database Policies**: Proper database access policies
98
+ - [ ] **Edge Function Security**: Secure Edge Functions
99
+ - [ ] **Real-time Security**: Secure real-time subscriptions
100
+ - [ ] **Service Account Security**: Secure service account usage
101
+
102
+ ## 📱 Mobile-Specific Security
103
+
104
+ ### Flutter Security
105
+ - [ ] **Code Obfuscation**: Release builds obfuscated
106
+ - [ ] **Debug Information**: Debug info removed from release
107
+ - [ ] **Asset Protection**: Sensitive assets protected
108
+ - [ ] **Network Security Config**: Proper network security configuration
109
+ - [ ] **Intent Filter Security**: Secure intent filter configuration
110
+ - [ ] **Permissions**: Minimal required permissions requested
111
+ - [ ] **Runtime Permissions**: Proper runtime permission handling
112
+ - [ ] **Secure Communication**: Secure inter-app communication
113
+
114
+ ### Platform Security
115
+ - [ ] **Android Security**: Android-specific security measures
116
+ - [ ] **iOS Security**: iOS-specific security measures
117
+ - [ ] **App Store Security**: App store security requirements met
118
+ - [ ] **Binary Protection**: Binary tampering protection
119
+ - [ ] **Reverse Engineering**: Protection against reverse engineering
120
+ - [ ] **Dynamic Analysis**: Protection against dynamic analysis
121
+ - [ ] **Hooking Protection**: Protection against runtime manipulation
122
+ - [ ] **Emulator Detection**: Emulator detection where required
123
+
124
+ ## 🔧 Infrastructure Security
125
+
126
+ ### Deployment Security
127
+ - [ ] **Environment Separation**: Proper environment isolation
128
+ - [ ] **Secret Management**: Secure secret storage and access
129
+ - [ ] **Container Security**: Secure container configuration
130
+ - [ ] **CI/CD Security**: Secure build and deployment pipeline
131
+ - [ ] **Dependency Scanning**: Automated dependency vulnerability scanning
132
+ - [ ] **Image Scanning**: Container image vulnerability scanning
133
+ - [ ] **Infrastructure as Code**: Secure IaC practices
134
+ - [ ] **Access Control**: Proper infrastructure access control
135
+
136
+ ### Monitoring & Logging
137
+ - [ ] **Security Monitoring**: Comprehensive security monitoring
138
+ - [ ] **Intrusion Detection**: Intrusion detection systems
139
+ - [ ] **Log Security**: Secure log storage and access
140
+ - [ ] **Audit Trails**: Comprehensive audit logging
141
+ - [ ] **Alerting**: Security incident alerting
142
+ - [ ] **SIEM Integration**: Security Information and Event Management
143
+ - [ ] **Vulnerability Scanning**: Regular vulnerability assessments
144
+ - [ ] **Penetration Testing**: Regular penetration testing
145
+
146
+ ## 🧪 Security Testing
147
+
148
+ ### Automated Testing
149
+ - [ ] **SAST Tools**: Static Application Security Testing
150
+ - [ ] **DAST Tools**: Dynamic Application Security Testing
151
+ - [ ] **Dependency Scanning**: Automated dependency vulnerability scanning
152
+ - [ ] **Container Scanning**: Container security scanning
153
+ - [ ] **Infrastructure Scanning**: Infrastructure security scanning
154
+ - [ ] **License Compliance**: Open source license compliance
155
+ - [ ] **Secret Scanning**: Automated secret detection
156
+ - [ ] **Security Unit Tests**: Security-focused unit tests
157
+
158
+ ### Manual Testing
159
+ - [ ] **Code Review**: Security-focused code reviews
160
+ - [ ] **Architecture Review**: Security architecture review
161
+ - [ ] **Threat Modeling**: Comprehensive threat modeling
162
+ - [ ] **Penetration Testing**: Professional penetration testing
163
+ - [ ] **Social Engineering**: Social engineering assessments
164
+ - [ ] **Physical Security**: Physical security assessments
165
+ - [ ] **Red Team Exercises**: Red team security exercises
166
+ - [ ] **Bug Bounty**: Bug bounty program participation
167
+
168
+ ## 📋 Compliance & Standards
169
+
170
+ ### Regulatory Compliance
171
+ - [ ] **GDPR Compliance**: General Data Protection Regulation
172
+ - [ ] **CCPA Compliance**: California Consumer Privacy Act
173
+ - [ ] **HIPAA Compliance**: Health Insurance Portability and Accountability Act
174
+ - [ ] **PCI DSS**: Payment Card Industry Data Security Standard
175
+ - [ ] **SOX Compliance**: Sarbanes-Oxley Act compliance
176
+ - [ ] **Industry Standards**: Industry-specific security standards
177
+ - [ ] **Privacy Policy**: Comprehensive privacy policy
178
+ - [ ] **Terms of Service**: Security-focused terms of service
179
+
180
+ ### Security Standards
181
+ - [ ] **OWASP Top 10**: OWASP Top 10 vulnerabilities addressed
182
+ - [ ] **NIST Framework**: NIST Cybersecurity Framework compliance
183
+ - [ ] **ISO 27001**: ISO 27001 security management
184
+ - [ ] **SOC 2**: SOC 2 compliance requirements
185
+ - [ ] **SANS Top 25**: SANS Top 25 software errors addressed
186
+ - [ ] **CIS Controls**: Center for Internet Security controls
187
+ - [ ] **Security Benchmarks**: Industry security benchmarks
188
+ - [ ] **Secure Coding Standards**: Secure coding practices
189
+
190
+ ## 🚨 Incident Response
191
+
192
+ ### Preparation
193
+ - [ ] **Incident Response Plan**: Comprehensive incident response plan
194
+ - [ ] **Security Team**: Dedicated security response team
195
+ - [ ] **Communication Plan**: Security incident communication plan
196
+ - [ ] **Escalation Procedures**: Clear escalation procedures
197
+ - [ ] **Contact Information**: Updated security contact information
198
+ - [ ] **Documentation**: Incident response documentation
199
+ - [ ] **Training**: Security incident response training
200
+ - [ ] **Testing**: Regular incident response testing
201
+
202
+ ### Response Capabilities
203
+ - [ ] **Detection Capabilities**: Rapid security incident detection
204
+ - [ ] **Containment Procedures**: Incident containment procedures
205
+ - [ ] **Eradication Process**: Threat eradication process
206
+ - [ ] **Recovery Procedures**: System recovery procedures
207
+ - [ ] **Forensic Capabilities**: Digital forensic capabilities
208
+ - [ ] **Legal Coordination**: Legal team coordination
209
+ - [ ] **Customer Communication**: Customer notification procedures
210
+ - [ ] **Regulatory Reporting**: Regulatory reporting procedures
211
+
212
+ ## ✅ Framework-Specific Security
213
+
214
+ ### React/Next.js Security
215
+ - [ ] **Server-Side Rendering Security**: Secure SSR implementation
216
+ - [ ] **Client-Side Routing Security**: Secure client-side routing
217
+ - [ ] **Component Security**: Secure React component practices
218
+ - [ ] **State Management Security**: Secure state management
219
+ - [ ] **Build Security**: Secure build configuration
220
+ - [ ] **Bundle Security**: Secure bundle configuration
221
+ - [ ] **Environment Variables**: Secure environment variable handling
222
+ - [ ] **Third-Party Libraries**: Secure third-party integrations
223
+
224
+ ### Vue.js Security
225
+ - [ ] **Template Security**: Secure Vue template practices
226
+ - [ ] **Directive Security**: Secure custom directive implementation
227
+ - [ ] **Vuex Security**: Secure Vuex state management
228
+ - [ ] **Router Security**: Secure Vue Router configuration
229
+ - [ ] **SSR Security**: Secure Nuxt.js server-side rendering
230
+ - [ ] **Plugin Security**: Secure Vue plugin usage
231
+ - [ ] **Composition API Security**: Secure Composition API usage
232
+ - [ ] **Build Tool Security**: Secure Vite/Webpack configuration
233
+
234
+ ### Angular Security
235
+ - [ ] **Template Security**: Secure Angular template practices
236
+ - [ ] **Service Security**: Secure Angular service implementation
237
+ - [ ] **Guard Security**: Secure route guard implementation
238
+ - [ ] **Interceptor Security**: Secure HTTP interceptor usage
239
+ - [ ] **Dependency Injection Security**: Secure DI practices
240
+ - [ ] **AOT Compilation**: Ahead-of-Time compilation enabled
241
+ - [ ] **Ivy Renderer Security**: Secure Ivy renderer usage
242
+ - [ ] **Universal Security**: Secure Angular Universal SSR
243
+
244
+ ### Flutter Security
245
+ - [ ] **Widget Security**: Secure widget implementation
246
+ - [ ] **Navigation Security**: Secure navigation handling
247
+ - [ ] **State Management Security**: Secure Cubit/BLoC implementation
248
+ - [ ] **HTTP Security**: Secure Dio HTTP client configuration
249
+ - [ ] **Local Storage Security**: Secure Hive/SharedPreferences usage
250
+ - [ ] **Platform Channel Security**: Secure platform channel usage
251
+ - [ ] **Plugin Security**: Secure Flutter plugin usage
252
+ - [ ] **Build Security**: Secure Flutter build configuration
253
+
254
+ ## 🎯 Security Validation Results
255
+
256
+ ### Critical Issues (Must Fix)
257
+ - [ ] No critical security vulnerabilities identified
258
+ - [ ] All authentication mechanisms secure
259
+ - [ ] All data encryption properly implemented
260
+ - [ ] All input validation in place
261
+ - [ ] All access controls functioning
262
+
263
+ ### High Priority Issues (Should Fix)
264
+ - [ ] No high priority security issues
265
+ - [ ] Security monitoring fully implemented
266
+ - [ ] Incident response plan tested
267
+ - [ ] Security training completed
268
+ - [ ] Compliance requirements met
269
+
270
+ ### Medium Priority Issues (Could Fix)
271
+ - [ ] No medium priority security issues
272
+ - [ ] Security documentation complete
273
+ - [ ] Automated security testing implemented
274
+ - [ ] Regular security assessments scheduled
275
+ - [ ] Security metrics tracked
276
+
277
+ ### Low Priority Issues (Nice to Have)
278
+ - [ ] No low priority security issues
279
+ - [ ] Advanced security features implemented
280
+ - [ ] Security research initiatives
281
+ - [ ] Industry best practices adopted
282
+ - [ ] Security community participation
283
+
284
+ ## 📊 Security Metrics
285
+
286
+ ### Security KPIs
287
+ - [ ] **Vulnerability Detection Time**: Average time to detect vulnerabilities
288
+ - [ ] **Vulnerability Resolution Time**: Average time to resolve vulnerabilities
289
+ - [ ] **Security Test Coverage**: Percentage of code covered by security tests
290
+ - [ ] **Incident Response Time**: Average incident response time
291
+ - [ ] **Security Training Completion**: Percentage of team with security training
292
+
293
+ ### Compliance Metrics
294
+ - [ ] **Regulatory Compliance Score**: Compliance with applicable regulations
295
+ - [ ] **Security Standard Compliance**: Compliance with security standards
296
+ - [ ] **Audit Results**: Results of security audits
297
+ - [ ] **Penetration Test Results**: Results of penetration tests
298
+ - [ ] **Bug Bounty Results**: Results of bug bounty programs
299
+
300
+ ## 🔍 Final Security Validation
301
+
302
+ ### Pre-Production Checklist
303
+ - [ ] All security tests passed
304
+ - [ ] Security code review completed
305
+ - [ ] Penetration testing completed
306
+ - [ ] Vulnerability assessment completed
307
+ - [ ] Security documentation updated
308
+ - [ ] Incident response plan updated
309
+ - [ ] Security monitoring configured
310
+ - [ ] Compliance requirements verified
311
+
312
+ ### Production Readiness
313
+ - [ ] Security baseline established
314
+ - [ ] Monitoring and alerting configured
315
+ - [ ] Incident response team ready
316
+ - [ ] Security documentation accessible
317
+ - [ ] Compliance evidence collected
318
+ - [ ] Security training completed
319
+ - [ ] Regular security assessments scheduled
320
+ - [ ] Security metrics tracking enabled
321
+
322
+ ---
323
+
324
+ **Security Validation Sign-off**
325
+
326
+ - [ ] **Security Lead**: Security validation completed and approved
327
+ - [ ] **Development Lead**: Security requirements implemented
328
+ - [ ] **QA Lead**: Security testing completed successfully
329
+ - [ ] **Compliance Officer**: Regulatory requirements met
330
+ - [ ] **Product Owner**: Security acceptance criteria satisfied
331
+
332
+ **Note**: This security checklist must be completed for all applications before production deployment. Any critical or high-priority security issues must be resolved before go-live.
@@ -0,0 +1,101 @@
1
+ # Story Definition of Done (DoD) Checklist
2
+
3
+ ## Instructions for Developer Agent
4
+
5
+ Before marking a story as 'Review', please go through each item in this checklist. Report the status of each item (e.g., [x] Done, [ ] Not Done, [N/A] Not Applicable) and provide brief comments if necessary.
6
+
7
+ [[LLM: INITIALIZATION INSTRUCTIONS - STORY DOD VALIDATION
8
+
9
+ This checklist is for DEVELOPER AGENTS to self-validate their work before marking a story complete.
10
+
11
+ IMPORTANT: This is a self-assessment. Be honest about what's actually done vs what should be done. It's better to identify issues now than have them found in review.
12
+
13
+ EXECUTION APPROACH:
14
+
15
+ 1. Go through each section systematically
16
+ 2. Mark items as [x] Done, [ ] Not Done, or [N/A] Not Applicable
17
+ 3. Add brief comments explaining any [ ] or [N/A] items
18
+ 4. Be specific about what was actually implemented
19
+ 5. Flag any concerns or technical debt created
20
+
21
+ The goal is quality delivery, not just checking boxes.]]
22
+
23
+ ## Checklist Items
24
+
25
+ 1. **Requirements Met:**
26
+
27
+ [[LLM: Be specific - list each requirement and whether it's complete]]
28
+
29
+ - [ ] All functional requirements specified in the story are implemented.
30
+ - [ ] All acceptance criteria defined in the story are met.
31
+
32
+ 2. **Coding Standards & Project Structure:**
33
+
34
+ [[LLM: Code quality matters for maintainability. Check each item carefully]]
35
+
36
+ - [ ] All new/modified code strictly adheres to `Operational Guidelines`.
37
+ - [ ] All new/modified code aligns with `Project Structure` (file locations, naming, etc.).
38
+ - [ ] Adherence to `Tech Stack` for technologies/versions used (if story introduces or modifies tech usage).
39
+ - [ ] Adherence to `Api Reference` and `Data Models` (if story involves API or data model changes).
40
+ - [ ] Basic security best practices (e.g., input validation, proper error handling, no hardcoded secrets) applied for new/modified code.
41
+ - [ ] No new linter errors or warnings introduced.
42
+ - [ ] Code is well-commented where necessary (clarifying complex logic, not obvious statements).
43
+
44
+ 3. **Testing:**
45
+
46
+ [[LLM: Testing proves your code works. Be honest about test coverage]]
47
+
48
+ - [ ] All required unit tests as per the story and `Operational Guidelines` Testing Strategy are implemented.
49
+ - [ ] All required integration tests (if applicable) as per the story and `Operational Guidelines` Testing Strategy are implemented.
50
+ - [ ] All tests (unit, integration, E2E if applicable) pass successfully.
51
+ - [ ] Test coverage meets project standards (if defined).
52
+
53
+ 4. **Functionality & Verification:**
54
+
55
+ [[LLM: Did you actually run and test your code? Be specific about what you tested]]
56
+
57
+ - [ ] Functionality has been manually verified by the developer (e.g., running the app locally, checking UI, testing API endpoints).
58
+ - [ ] Edge cases and potential error conditions considered and handled gracefully.
59
+
60
+ 5. **Story Administration:**
61
+
62
+ [[LLM: Documentation helps the next developer. What should they know?]]
63
+
64
+ - [ ] All tasks within the story file are marked as complete.
65
+ - [ ] Any clarifications or decisions made during development are documented in the story file or linked appropriately.
66
+ - [ ] The story wrap up section has been completed with notes of changes or information relevant to the next story or overall project, the agent model that was primarily used during development, and the changelog of any changes is properly updated.
67
+
68
+ 6. **Dependencies, Build & Configuration:**
69
+
70
+ [[LLM: Build issues block everyone. Ensure everything compiles and runs cleanly]]
71
+
72
+ - [ ] Project builds successfully without errors.
73
+ - [ ] Project linting passes
74
+ - [ ] Any new dependencies added were either pre-approved in the story requirements OR explicitly approved by the user during development (approval documented in story file).
75
+ - [ ] If new dependencies were added, they are recorded in the appropriate project files (e.g., `package.json`, `requirements.txt`) with justification.
76
+ - [ ] No known security vulnerabilities introduced by newly added and approved dependencies.
77
+ - [ ] If new environment variables or configurations were introduced by the story, they are documented and handled securely.
78
+
79
+ 7. **Documentation (If Applicable):**
80
+
81
+ [[LLM: Good documentation prevents future confusion. What needs explaining?]]
82
+
83
+ - [ ] Relevant inline code documentation (e.g., JSDoc, TSDoc, Python docstrings) for new public APIs or complex logic is complete.
84
+ - [ ] User-facing documentation updated, if changes impact users.
85
+ - [ ] Technical documentation (e.g., READMEs, system diagrams) updated if significant architectural changes were made.
86
+
87
+ ## Final Confirmation
88
+
89
+ [[LLM: FINAL DOD SUMMARY
90
+
91
+ After completing the checklist:
92
+
93
+ 1. Summarize what was accomplished in this story
94
+ 2. List any items marked as [ ] Not Done with explanations
95
+ 3. Identify any technical debt or follow-up work needed
96
+ 4. Note any challenges or learnings for future stories
97
+ 5. Confirm whether the story is truly ready for review
98
+
99
+ Be honest - it's better to flag issues now than have them discovered later.]]
100
+
101
+ - [ ] I, the Developer Agent, confirm that all applicable items above have been addressed.
@@ -0,0 +1,156 @@
1
+ # Story Draft Checklist
2
+
3
+ The Scrum Master should use this checklist to validate that each story contains sufficient context for a developer agent to implement it successfully, while assuming the dev agent has reasonable capabilities to figure things out.
4
+
5
+ [[LLM: INITIALIZATION INSTRUCTIONS - STORY DRAFT VALIDATION
6
+
7
+ Before proceeding with this checklist, ensure you have access to:
8
+
9
+ 1. The story document being validated (usually in docs/stories/ or provided directly)
10
+ 2. The parent epic context
11
+ 3. Any referenced architecture or design documents
12
+ 4. Previous related stories if this builds on prior work
13
+
14
+ IMPORTANT: This checklist validates individual stories BEFORE implementation begins.
15
+
16
+ VALIDATION PRINCIPLES:
17
+
18
+ 1. Clarity - A developer should understand WHAT to build
19
+ 2. Context - WHY this is being built and how it fits
20
+ 3. Guidance - Key technical decisions and patterns to follow
21
+ 4. Testability - How to verify the implementation works
22
+ 5. Self-Contained - Most info needed is in the story itself
23
+
24
+ REMEMBER: We assume competent developer agents who can:
25
+
26
+ - Research documentation and codebases
27
+ - Make reasonable technical decisions
28
+ - Follow established patterns
29
+ - Ask for clarification when truly stuck
30
+
31
+ We're checking for SUFFICIENT guidance, not exhaustive detail.]]
32
+
33
+ ## 1. GOAL & CONTEXT CLARITY
34
+
35
+ [[LLM: Without clear goals, developers build the wrong thing. Verify:
36
+
37
+ 1. The story states WHAT functionality to implement
38
+ 2. The business value or user benefit is clear
39
+ 3. How this fits into the larger epic/product is explained
40
+ 4. Dependencies are explicit ("requires Story X to be complete")
41
+ 5. Success looks like something specific, not vague]]
42
+
43
+ - [ ] Story goal/purpose is clearly stated
44
+ - [ ] Relationship to epic goals is evident
45
+ - [ ] How the story fits into overall system flow is explained
46
+ - [ ] Dependencies on previous stories are identified (if applicable)
47
+ - [ ] Business context and value are clear
48
+
49
+ ## 2. TECHNICAL IMPLEMENTATION GUIDANCE
50
+
51
+ [[LLM: Developers need enough technical context to start coding. Check:
52
+
53
+ 1. Key files/components to create or modify are mentioned
54
+ 2. Technology choices are specified where non-obvious
55
+ 3. Integration points with existing code are identified
56
+ 4. Data models or API contracts are defined or referenced
57
+ 5. Non-standard patterns or exceptions are called out
58
+
59
+ Note: We don't need every file listed - just the important ones.]]
60
+
61
+ - [ ] Key files to create/modify are identified (not necessarily exhaustive)
62
+ - [ ] Technologies specifically needed for this story are mentioned
63
+ - [ ] Critical APIs or interfaces are sufficiently described
64
+ - [ ] Necessary data models or structures are referenced
65
+ - [ ] Required environment variables are listed (if applicable)
66
+ - [ ] Any exceptions to standard coding patterns are noted
67
+
68
+ ## 3. REFERENCE EFFECTIVENESS
69
+
70
+ [[LLM: References should help, not create a treasure hunt. Ensure:
71
+
72
+ 1. References point to specific sections, not whole documents
73
+ 2. The relevance of each reference is explained
74
+ 3. Critical information is summarized in the story
75
+ 4. References are accessible (not broken links)
76
+ 5. Previous story context is summarized if needed]]
77
+
78
+ - [ ] References to external documents point to specific relevant sections
79
+ - [ ] Critical information from previous stories is summarized (not just referenced)
80
+ - [ ] Context is provided for why references are relevant
81
+ - [ ] References use consistent format (e.g., `docs/filename.md#section`)
82
+
83
+ ## 4. SELF-CONTAINMENT ASSESSMENT
84
+
85
+ [[LLM: Stories should be mostly self-contained to avoid context switching. Verify:
86
+
87
+ 1. Core requirements are in the story, not just in references
88
+ 2. Domain terms are explained or obvious from context
89
+ 3. Assumptions are stated explicitly
90
+ 4. Edge cases are mentioned (even if deferred)
91
+ 5. The story could be understood without reading 10 other documents]]
92
+
93
+ - [ ] Core information needed is included (not overly reliant on external docs)
94
+ - [ ] Implicit assumptions are made explicit
95
+ - [ ] Domain-specific terms or concepts are explained
96
+ - [ ] Edge cases or error scenarios are addressed
97
+
98
+ ## 5. TESTING GUIDANCE
99
+
100
+ [[LLM: Testing ensures the implementation actually works. Check:
101
+
102
+ 1. Test approach is specified (unit, integration, e2e)
103
+ 2. Key test scenarios are listed
104
+ 3. Success criteria are measurable
105
+ 4. Special test considerations are noted
106
+ 5. Acceptance criteria in the story are testable]]
107
+
108
+ - [ ] Required testing approach is outlined
109
+ - [ ] Key test scenarios are identified
110
+ - [ ] Success criteria are defined
111
+ - [ ] Special testing considerations are noted (if applicable)
112
+
113
+ ## VALIDATION RESULT
114
+
115
+ [[LLM: FINAL STORY VALIDATION REPORT
116
+
117
+ Generate a concise validation report:
118
+
119
+ 1. Quick Summary
120
+
121
+ - Story readiness: READY / NEEDS REVISION / BLOCKED
122
+ - Clarity score (1-10)
123
+ - Major gaps identified
124
+
125
+ 2. Fill in the validation table with:
126
+
127
+ - PASS: Requirements clearly met
128
+ - PARTIAL: Some gaps but workable
129
+ - FAIL: Critical information missing
130
+
131
+ 3. Specific Issues (if any)
132
+
133
+ - List concrete problems to fix
134
+ - Suggest specific improvements
135
+ - Identify any blocking dependencies
136
+
137
+ 4. Developer Perspective
138
+ - Could YOU implement this story as written?
139
+ - What questions would you have?
140
+ - What might cause delays or rework?
141
+
142
+ Be pragmatic - perfect documentation doesn't exist, but it must be enough to provide the extreme context a dev agent needs to get the work down and not create a mess.]]
143
+
144
+ | Category | Status | Issues |
145
+ | ------------------------------------ | ------ | ------ |
146
+ | 1. Goal & Context Clarity | _TBD_ | |
147
+ | 2. Technical Implementation Guidance | _TBD_ | |
148
+ | 3. Reference Effectiveness | _TBD_ | |
149
+ | 4. Self-Containment Assessment | _TBD_ | |
150
+ | 5. Testing Guidance | _TBD_ | |
151
+
152
+ **Final Assessment:**
153
+
154
+ - READY: The story provides sufficient context for implementation
155
+ - NEEDS REVISION: The story requires updates (see issues)
156
+ - BLOCKED: External information required (specify what information)
@@ -0,0 +1,20 @@
1
+ markdownExploder: true
2
+ prd:
3
+ prdFile: docs/prd.md
4
+ prdVersion: v4
5
+ prdSharded: true
6
+ prdShardedLocation: docs/prd
7
+ epicFilePattern: epic-{n}*.md
8
+ architecture:
9
+ architectureFile: docs/architecture.md
10
+ architectureVersion: v4
11
+ architectureSharded: true
12
+ architectureShardedLocation: docs/architecture
13
+ customTechnicalDocuments: null
14
+ devLoadAlwaysFiles:
15
+ - docs/architecture/coding-standards.md
16
+ - docs/architecture/tech-stack.md
17
+ - docs/architecture/source-tree.md
18
+ devDebugLog: .ai/debug-log.md
19
+ devStoryLocation: docs/stories
20
+ slashPrefix: BMad
@@ -0,0 +1,20 @@
1
+ markdownExploder: true
2
+ prd:
3
+ prdFile: docs/prd.md
4
+ prdVersion: v4
5
+ prdSharded: true
6
+ prdShardedLocation: docs/prd
7
+ epicFilePattern: epic-{n}*.md
8
+ architecture:
9
+ architectureFile: docs/architecture.md
10
+ architectureVersion: v4
11
+ architectureSharded: true
12
+ architectureShardedLocation: docs/architecture
13
+ customTechnicalDocuments: null
14
+ devLoadAlwaysFiles:
15
+ - docs/architecture/coding-standards.md
16
+ - docs/architecture/tech-stack.md
17
+ - docs/architecture/source-tree.md
18
+ devDebugLog: .ai/debug-log.md
19
+ devStoryLocation: docs/stories
20
+ slashPrefix: BMad