ccgx-workflow 1.0.0 → 1.0.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (60) hide show
  1. package/README.md +37 -5
  2. package/README.zh-CN.md +35 -5
  3. package/dist/cli.mjs +1 -1
  4. package/dist/index.mjs +2 -2
  5. package/dist/shared/{ccgx-workflow.WgUzkiC3.mjs → ccgx-workflow.SJPbUy5_.mjs} +17 -110
  6. package/package.json +2 -1
  7. package/templates/commands/agents/phase-runner.md +321 -321
  8. package/templates/commands/autonomous.md +792 -792
  9. package/templates/commands/cancel.md +132 -132
  10. package/templates/commands/debug.md +226 -226
  11. package/templates/commands/status.md +206 -206
  12. package/templates/commands/team.md +484 -0
  13. package/templates/hooks/ccg-session-state.cjs +510 -510
  14. package/templates/scripts/ccg-phase-runner-launcher.mjs +467 -467
  15. package/templates/scripts/invoke-model.mjs +64 -0
  16. package/templates/skills/domains/ai/SKILL.md +35 -35
  17. package/templates/skills/domains/ai/agent-dev.md +242 -242
  18. package/templates/skills/domains/ai/llm-security.md +288 -288
  19. package/templates/skills/domains/ai/rag-system.md +542 -542
  20. package/templates/skills/domains/architecture/SKILL.md +43 -43
  21. package/templates/skills/domains/architecture/api-design.md +225 -225
  22. package/templates/skills/domains/architecture/cloud-native.md +285 -285
  23. package/templates/skills/domains/architecture/security-arch.md +297 -297
  24. package/templates/skills/domains/data-engineering/SKILL.md +208 -208
  25. package/templates/skills/domains/development/SKILL.md +47 -47
  26. package/templates/skills/domains/development/cpp.md +246 -246
  27. package/templates/skills/domains/development/go.md +323 -323
  28. package/templates/skills/domains/development/java.md +277 -277
  29. package/templates/skills/domains/development/python.md +288 -288
  30. package/templates/skills/domains/development/rust.md +313 -313
  31. package/templates/skills/domains/development/shell.md +313 -313
  32. package/templates/skills/domains/development/typescript.md +277 -277
  33. package/templates/skills/domains/devops/SKILL.md +40 -40
  34. package/templates/skills/domains/devops/database.md +217 -217
  35. package/templates/skills/domains/devops/devsecops.md +198 -198
  36. package/templates/skills/domains/devops/git-workflow.md +181 -181
  37. package/templates/skills/domains/devops/testing.md +283 -283
  38. package/templates/skills/domains/frontend-design/SKILL.md +244 -244
  39. package/templates/skills/domains/frontend-design/claymorphism/SKILL.md +121 -121
  40. package/templates/skills/domains/frontend-design/component-patterns.md +202 -202
  41. package/templates/skills/domains/frontend-design/glassmorphism/SKILL.md +142 -142
  42. package/templates/skills/domains/frontend-design/liquid-glass/SKILL.md +139 -139
  43. package/templates/skills/domains/frontend-design/neubrutalism/SKILL.md +145 -145
  44. package/templates/skills/domains/frontend-design/state-management.md +680 -680
  45. package/templates/skills/domains/frontend-design/ui-aesthetics.md +110 -110
  46. package/templates/skills/domains/frontend-design/ux-principles.md +156 -156
  47. package/templates/skills/domains/infrastructure/SKILL.md +201 -201
  48. package/templates/skills/domains/mobile/SKILL.md +225 -225
  49. package/templates/skills/domains/orchestration/SKILL.md +30 -30
  50. package/templates/skills/domains/orchestration/multi-agent.md +228 -228
  51. package/templates/skills/domains/security/SKILL.md +73 -73
  52. package/templates/skills/domains/security/blue-team.md +436 -436
  53. package/templates/skills/domains/security/code-audit.md +265 -265
  54. package/templates/skills/domains/security/pentest.md +226 -226
  55. package/templates/skills/domains/security/red-team.md +374 -374
  56. package/templates/skills/domains/security/threat-intel.md +372 -372
  57. package/templates/skills/domains/security/vuln-research.md +369 -369
  58. package/templates/skills/tools/lib/shared.js +98 -98
  59. package/templates/skills/tools/override-refusal/SKILL.md +53 -53
  60. package/templates/skills/tools/override-refusal/scripts/refusal_rewriter.js +226 -226
@@ -1,198 +1,198 @@
1
- ---
2
- name: devsecops
3
- description: DevSecOps。CI/CD安全、供应链安全、合规自动化。当用户提到 DevSecOps、CI/CD、供应链安全、SAST、DAST时使用。
4
- ---
5
-
6
- # 🔧 炼器秘典 · DevSecOps
7
-
8
-
9
- ## 安全左移
10
-
11
- ```
12
- ┌─────────────────────────────────────────────────────────────┐
13
- │ 安全左移 │
14
- ├─────────────────────────────────────────────────────────────┤
15
- │ 计划 → 编码 → 构建 → 测试 → 发布 → 部署 → 运维 → 监控 │
16
- │ │ │ │ │ │ │ │ │ │
17
- │ 威胁 SAST SCA DAST 签名 配置 日志 告警 │
18
- │ 建模 IDE 依赖 渗透 验证 加固 审计 响应 │
19
- └─────────────────────────────────────────────────────────────┘
20
- ```
21
-
22
- ## CI/CD 安全
23
-
24
- ### GitHub Actions
25
- ```yaml
26
- name: Security Pipeline
27
-
28
- on: [push, pull_request]
29
-
30
- jobs:
31
- security:
32
- runs-on: ubuntu-latest
33
- steps:
34
- - uses: actions/checkout@v4
35
-
36
- # SAST - 静态分析
37
- - name: Run Semgrep
38
- uses: returntocorp/semgrep-action@v1
39
- with:
40
- config: p/security-audit
41
-
42
- # SCA - 依赖扫描
43
- - name: Run Trivy
44
- uses: aquasecurity/trivy-action@master
45
- with:
46
- scan-type: 'fs'
47
- severity: 'CRITICAL,HIGH'
48
-
49
- # Secret 扫描
50
- - name: Run Gitleaks
51
- uses: gitleaks/gitleaks-action@v2
52
-
53
- # 容器扫描
54
- - name: Build and scan image
55
- run: |
56
- docker build -t myapp:${{ github.sha }} .
57
- trivy image myapp:${{ github.sha }}
58
- ```
59
-
60
- ### GitLab CI
61
- ```yaml
62
- stages:
63
- - test
64
- - security
65
- - build
66
- - deploy
67
-
68
- sast:
69
- stage: security
70
- image: semgrep/semgrep
71
- script:
72
- - semgrep --config=p/security-audit .
73
-
74
- dependency_scan:
75
- stage: security
76
- image: aquasec/trivy
77
- script:
78
- - trivy fs --severity HIGH,CRITICAL .
79
-
80
- container_scan:
81
- stage: security
82
- image: aquasec/trivy
83
- script:
84
- - trivy image $CI_REGISTRY_IMAGE:$CI_COMMIT_SHA
85
- ```
86
-
87
- ## 安全扫描工具
88
-
89
- ### SAST (静态分析)
90
- ```yaml
91
- 工具:
92
- - Semgrep: 多语言,规则丰富
93
- - SonarQube: 企业级
94
- - CodeQL: GitHub 原生
95
- - Bandit: Python 专用
96
-
97
- 集成:
98
- - IDE 插件
99
- - Pre-commit hooks
100
- - CI/CD pipeline
101
- ```
102
-
103
- ### SCA (依赖扫描)
104
- ```yaml
105
- 工具:
106
- - Trivy: 全能扫描
107
- - Snyk: 商业方案
108
- - OWASP Dependency-Check
109
- - npm audit / pip-audit
110
-
111
- 检查项:
112
- - 已知漏洞 (CVE)
113
- - 许可证合规
114
- - 过期依赖
115
- ```
116
-
117
- ### DAST (动态分析)
118
- ```yaml
119
- 工具:
120
- - OWASP ZAP
121
- - Nuclei
122
- - Burp Suite
123
-
124
- 集成:
125
- - 部署后自动扫描
126
- - 定期扫描
127
- - PR 环境扫描
128
- ```
129
-
130
- ## 供应链安全
131
-
132
- ### 依赖管理
133
- ```yaml
134
- 原则:
135
- - 锁定依赖版本
136
- - 定期更新
137
- - 审查新依赖
138
- - 使用私有仓库
139
-
140
- 工具:
141
- - Dependabot
142
- - Renovate
143
- - Snyk
144
- ```
145
-
146
- ### 镜像安全
147
- ```yaml
148
- 原则:
149
- - 使用官方基础镜像
150
- - 最小化镜像
151
- - 扫描漏洞
152
- - 签名验证
153
-
154
- 工具:
155
- - Trivy
156
- - Cosign (签名)
157
- - Notary
158
- ```
159
-
160
- ### SBOM (软件物料清单)
161
- ```bash
162
- # 生成 SBOM
163
- syft packages dir:. -o spdx-json > sbom.json
164
-
165
- # 扫描 SBOM
166
- grype sbom:sbom.json
167
- ```
168
-
169
- ## 安全门禁
170
-
171
- ```yaml
172
- 阻断条件:
173
- - Critical 漏洞
174
- - 高危依赖
175
- - Secret 泄露
176
- - 许可证违规
177
-
178
- 警告条件:
179
- - High 漏洞
180
- - 中危依赖
181
- - 代码质量问题
182
- ```
183
-
184
- ## 合规自动化
185
-
186
- ```yaml
187
- 检查项:
188
- - CIS Benchmark
189
- - PCI DSS
190
- - SOC 2
191
- - GDPR
192
-
193
- 工具:
194
- - Open Policy Agent (OPA)
195
- - Checkov
196
- - Terrascan
197
- ```
198
-
1
+ ---
2
+ name: devsecops
3
+ description: DevSecOps。CI/CD安全、供应链安全、合规自动化。当用户提到 DevSecOps、CI/CD、供应链安全、SAST、DAST时使用。
4
+ ---
5
+
6
+ # 🔧 炼器秘典 · DevSecOps
7
+
8
+
9
+ ## 安全左移
10
+
11
+ ```
12
+ ┌─────────────────────────────────────────────────────────────┐
13
+ │ 安全左移 │
14
+ ├─────────────────────────────────────────────────────────────┤
15
+ │ 计划 → 编码 → 构建 → 测试 → 发布 → 部署 → 运维 → 监控 │
16
+ │ │ │ │ │ │ │ │ │ │
17
+ │ 威胁 SAST SCA DAST 签名 配置 日志 告警 │
18
+ │ 建模 IDE 依赖 渗透 验证 加固 审计 响应 │
19
+ └─────────────────────────────────────────────────────────────┘
20
+ ```
21
+
22
+ ## CI/CD 安全
23
+
24
+ ### GitHub Actions
25
+ ```yaml
26
+ name: Security Pipeline
27
+
28
+ on: [push, pull_request]
29
+
30
+ jobs:
31
+ security:
32
+ runs-on: ubuntu-latest
33
+ steps:
34
+ - uses: actions/checkout@v4
35
+
36
+ # SAST - 静态分析
37
+ - name: Run Semgrep
38
+ uses: returntocorp/semgrep-action@v1
39
+ with:
40
+ config: p/security-audit
41
+
42
+ # SCA - 依赖扫描
43
+ - name: Run Trivy
44
+ uses: aquasecurity/trivy-action@master
45
+ with:
46
+ scan-type: 'fs'
47
+ severity: 'CRITICAL,HIGH'
48
+
49
+ # Secret 扫描
50
+ - name: Run Gitleaks
51
+ uses: gitleaks/gitleaks-action@v2
52
+
53
+ # 容器扫描
54
+ - name: Build and scan image
55
+ run: |
56
+ docker build -t myapp:${{ github.sha }} .
57
+ trivy image myapp:${{ github.sha }}
58
+ ```
59
+
60
+ ### GitLab CI
61
+ ```yaml
62
+ stages:
63
+ - test
64
+ - security
65
+ - build
66
+ - deploy
67
+
68
+ sast:
69
+ stage: security
70
+ image: semgrep/semgrep
71
+ script:
72
+ - semgrep --config=p/security-audit .
73
+
74
+ dependency_scan:
75
+ stage: security
76
+ image: aquasec/trivy
77
+ script:
78
+ - trivy fs --severity HIGH,CRITICAL .
79
+
80
+ container_scan:
81
+ stage: security
82
+ image: aquasec/trivy
83
+ script:
84
+ - trivy image $CI_REGISTRY_IMAGE:$CI_COMMIT_SHA
85
+ ```
86
+
87
+ ## 安全扫描工具
88
+
89
+ ### SAST (静态分析)
90
+ ```yaml
91
+ 工具:
92
+ - Semgrep: 多语言,规则丰富
93
+ - SonarQube: 企业级
94
+ - CodeQL: GitHub 原生
95
+ - Bandit: Python 专用
96
+
97
+ 集成:
98
+ - IDE 插件
99
+ - Pre-commit hooks
100
+ - CI/CD pipeline
101
+ ```
102
+
103
+ ### SCA (依赖扫描)
104
+ ```yaml
105
+ 工具:
106
+ - Trivy: 全能扫描
107
+ - Snyk: 商业方案
108
+ - OWASP Dependency-Check
109
+ - npm audit / pip-audit
110
+
111
+ 检查项:
112
+ - 已知漏洞 (CVE)
113
+ - 许可证合规
114
+ - 过期依赖
115
+ ```
116
+
117
+ ### DAST (动态分析)
118
+ ```yaml
119
+ 工具:
120
+ - OWASP ZAP
121
+ - Nuclei
122
+ - Burp Suite
123
+
124
+ 集成:
125
+ - 部署后自动扫描
126
+ - 定期扫描
127
+ - PR 环境扫描
128
+ ```
129
+
130
+ ## 供应链安全
131
+
132
+ ### 依赖管理
133
+ ```yaml
134
+ 原则:
135
+ - 锁定依赖版本
136
+ - 定期更新
137
+ - 审查新依赖
138
+ - 使用私有仓库
139
+
140
+ 工具:
141
+ - Dependabot
142
+ - Renovate
143
+ - Snyk
144
+ ```
145
+
146
+ ### 镜像安全
147
+ ```yaml
148
+ 原则:
149
+ - 使用官方基础镜像
150
+ - 最小化镜像
151
+ - 扫描漏洞
152
+ - 签名验证
153
+
154
+ 工具:
155
+ - Trivy
156
+ - Cosign (签名)
157
+ - Notary
158
+ ```
159
+
160
+ ### SBOM (软件物料清单)
161
+ ```bash
162
+ # 生成 SBOM
163
+ syft packages dir:. -o spdx-json > sbom.json
164
+
165
+ # 扫描 SBOM
166
+ grype sbom:sbom.json
167
+ ```
168
+
169
+ ## 安全门禁
170
+
171
+ ```yaml
172
+ 阻断条件:
173
+ - Critical 漏洞
174
+ - 高危依赖
175
+ - Secret 泄露
176
+ - 许可证违规
177
+
178
+ 警告条件:
179
+ - High 漏洞
180
+ - 中危依赖
181
+ - 代码质量问题
182
+ ```
183
+
184
+ ## 合规自动化
185
+
186
+ ```yaml
187
+ 检查项:
188
+ - CIS Benchmark
189
+ - PCI DSS
190
+ - SOC 2
191
+ - GDPR
192
+
193
+ 工具:
194
+ - Open Policy Agent (OPA)
195
+ - Checkov
196
+ - Terrascan
197
+ ```
198
+