claude-code-workflow 6.3.32 → 6.3.36

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (483) hide show
  1. package/.claude/CLAUDE.md +6 -1
  2. package/.claude/agents/action-planning-agent.md +885 -885
  3. package/.claude/agents/cli-discuss-agent.md +391 -391
  4. package/.claude/agents/cli-execution-agent.md +68 -6
  5. package/.claude/agents/cli-lite-planning-agent.md +323 -37
  6. package/.claude/agents/cli-planning-agent.md +2 -2
  7. package/.claude/agents/code-developer.md +407 -403
  8. package/.claude/agents/conceptual-planning-agent.md +11 -0
  9. package/.claude/agents/debug-explore-agent.md +3 -3
  10. package/.claude/agents/doc-generator.md +3 -3
  11. package/.claude/agents/issue-plan-agent.md +417 -340
  12. package/.claude/agents/issue-queue-agent.md +1 -1
  13. package/.claude/agents/memory-bridge.md +95 -95
  14. package/.claude/agents/test-context-search-agent.md +402 -402
  15. package/.claude/agents/ui-design-agent.md +595 -595
  16. package/.claude/agents/universal-executor.md +134 -134
  17. package/.claude/commands/cli/codex-review.md +361 -0
  18. package/.claude/commands/issue/discover-by-prompt.md +1 -1
  19. package/.claude/commands/issue/execute.md +581 -581
  20. package/.claude/commands/issue/new.md +413 -413
  21. package/.claude/commands/issue/plan.md +21 -7
  22. package/.claude/commands/issue/queue.md +441 -382
  23. package/.claude/commands/memory/code-map-memory.md +687 -687
  24. package/.claude/commands/memory/compact.md +383 -383
  25. package/.claude/commands/memory/docs-full-cli.md +471 -471
  26. package/.claude/commands/memory/docs-related-cli.md +386 -386
  27. package/.claude/commands/memory/docs.md +615 -615
  28. package/.claude/commands/memory/load-skill-memory.md +182 -182
  29. package/.claude/commands/memory/skill-memory.md +525 -525
  30. package/.claude/commands/memory/style-skill-memory.md +396 -396
  31. package/.claude/commands/memory/swagger-docs.md +773 -773
  32. package/.claude/commands/memory/tech-research-rules.md +2 -2
  33. package/.claude/commands/memory/update-full.md +332 -332
  34. package/.claude/commands/memory/workflow-skill-memory.md +517 -517
  35. package/.claude/commands/task/create.md +151 -151
  36. package/.claude/commands/task/replan.md +436 -436
  37. package/.claude/commands/version.md +254 -254
  38. package/.claude/commands/workflow/brainstorm/api-designer.md +587 -587
  39. package/.claude/commands/workflow/brainstorm/auto-parallel.md +11 -0
  40. package/.claude/commands/workflow/brainstorm/data-architect.md +220 -220
  41. package/.claude/commands/workflow/brainstorm/product-manager.md +200 -200
  42. package/.claude/commands/workflow/brainstorm/product-owner.md +200 -200
  43. package/.claude/commands/workflow/brainstorm/scrum-master.md +200 -200
  44. package/.claude/commands/workflow/brainstorm/subject-matter-expert.md +200 -200
  45. package/.claude/commands/workflow/brainstorm/system-architect.md +389 -389
  46. package/.claude/commands/workflow/brainstorm/ui-designer.md +221 -221
  47. package/.claude/commands/workflow/brainstorm/ux-expert.md +221 -221
  48. package/.claude/commands/workflow/debug-with-file.md +666 -0
  49. package/.claude/commands/workflow/debug.md +327 -327
  50. package/.claude/commands/workflow/execute.md +498 -498
  51. package/.claude/commands/workflow/lite-execute.md +74 -31
  52. package/.claude/commands/workflow/lite-fix.md +631 -631
  53. package/.claude/commands/workflow/lite-lite-lite.md +39 -11
  54. package/.claude/commands/workflow/lite-plan.md +4 -2
  55. package/.claude/commands/workflow/multi-cli-plan.md +97 -39
  56. package/.claude/commands/workflow/plan.md +551 -551
  57. package/.claude/commands/workflow/replan.md +515 -515
  58. package/.claude/commands/workflow/review-fix.md +610 -610
  59. package/.claude/commands/workflow/review-module-cycle.md +771 -771
  60. package/.claude/commands/workflow/review-session-cycle.md +782 -782
  61. package/.claude/commands/workflow/review.md +322 -322
  62. package/.claude/commands/workflow/session/list.md +95 -95
  63. package/.claude/commands/workflow/session/resume.md +60 -60
  64. package/.claude/commands/workflow/session/solidify.md +299 -299
  65. package/.claude/commands/workflow/tdd-plan.md +597 -460
  66. package/.claude/commands/workflow/test-cycle-execute.md +504 -504
  67. package/.claude/commands/workflow/test-fix-gen.md +699 -699
  68. package/.claude/commands/workflow/tools/conflict-resolution.md +2 -2
  69. package/.claude/commands/workflow/tools/task-generate-tdd.md +517 -517
  70. package/.claude/commands/workflow/tools/tdd-coverage-analysis.md +309 -309
  71. package/.claude/commands/workflow/tools/test-concept-enhanced.md +1 -1
  72. package/.claude/commands/workflow/tools/test-context-gather.md +235 -235
  73. package/.claude/commands/workflow/tools/test-task-generate.md +255 -255
  74. package/.claude/commands/workflow/ui-design/animation-extract.md +1150 -1150
  75. package/.claude/commands/workflow/ui-design/design-sync.md +454 -454
  76. package/.claude/commands/workflow/ui-design/explore-auto.md +678 -678
  77. package/.claude/commands/workflow/ui-design/imitate-auto.md +745 -745
  78. package/.claude/commands/workflow/ui-design/layout-extract.md +788 -788
  79. package/.claude/commands/workflow/ui-design/reference-page-generator.md +356 -356
  80. package/.claude/commands/workflow/ui-design/style-extract.md +773 -773
  81. package/.claude/skills/ccw/SKILL.md +522 -352
  82. package/.claude/skills/ccw/command.json +641 -547
  83. package/.claude/skills/ccw-help/SKILL.md +116 -116
  84. package/.claude/skills/ccw-help/command.json +520 -520
  85. package/.claude/skills/copyright-docs/phases/01.5-project-exploration.md +150 -150
  86. package/.claude/skills/copyright-docs/phases/02.5-consolidation.md +192 -192
  87. package/.claude/skills/copyright-docs/templates/agent-base.md +200 -200
  88. package/.claude/skills/project-analyze/phases/03.5-consolidation.md +233 -233
  89. package/.claude/skills/project-analyze/specs/writing-style.md +152 -152
  90. package/.claude/skills/review-code/phases/state-manager.md +752 -752
  91. package/.claude/skills/review-code/specs/rules/index.md +140 -140
  92. package/.claude/skills/skill-generator/specs/cli-integration.md +13 -19
  93. package/.claude/skills/skill-generator/specs/scripting-integration.md +265 -265
  94. package/.claude/skills/skill-generator/templates/code-analysis-action.md +503 -503
  95. package/.claude/skills/skill-generator/templates/llm-action.md +355 -355
  96. package/.claude/skills/skill-generator/templates/script-bash.md +277 -277
  97. package/.claude/skills/skill-generator/templates/script-python.md +198 -198
  98. package/.claude/skills/skill-generator/templates/skill-md.md +235 -235
  99. package/.claude/skills/skill-tuning/SKILL.md +303 -303
  100. package/.claude/skills/skill-tuning/phases/actions/action-abort.md +164 -164
  101. package/.claude/skills/skill-tuning/phases/actions/action-apply-fix.md +206 -206
  102. package/.claude/skills/skill-tuning/phases/actions/action-complete.md +195 -195
  103. package/.claude/skills/skill-tuning/phases/actions/action-diagnose-agent.md +317 -317
  104. package/.claude/skills/skill-tuning/phases/actions/action-diagnose-context.md +243 -243
  105. package/.claude/skills/skill-tuning/phases/actions/action-diagnose-dataflow.md +318 -318
  106. package/.claude/skills/skill-tuning/phases/actions/action-diagnose-memory.md +269 -269
  107. package/.claude/skills/skill-tuning/phases/actions/action-diagnose-token-consumption.md +200 -200
  108. package/.claude/skills/skill-tuning/phases/actions/action-gemini-analysis.md +322 -322
  109. package/.claude/skills/skill-tuning/phases/actions/action-generate-report.md +228 -228
  110. package/.claude/skills/skill-tuning/phases/actions/action-init.md +149 -149
  111. package/.claude/skills/skill-tuning/phases/actions/action-propose-fixes.md +317 -317
  112. package/.claude/skills/skill-tuning/phases/actions/action-verify.md +222 -222
  113. package/.claude/skills/skill-tuning/phases/orchestrator.md +377 -377
  114. package/.claude/skills/skill-tuning/phases/state-schema.md +378 -378
  115. package/.claude/skills/skill-tuning/specs/problem-taxonomy.md +318 -318
  116. package/.claude/skills/skill-tuning/specs/quality-gates.md +263 -263
  117. package/.claude/skills/skill-tuning/specs/tuning-strategies.md +1537 -1537
  118. package/.claude/skills/skill-tuning/templates/diagnosis-report.md +153 -153
  119. package/.claude/skills/skill-tuning/templates/fix-proposal.md +204 -204
  120. package/.claude/skills/software-manual/SKILL.md +184 -184
  121. package/.claude/skills/software-manual/phases/01-requirements-discovery.md +162 -162
  122. package/.claude/skills/software-manual/phases/02-project-exploration.md +101 -101
  123. package/.claude/skills/software-manual/phases/03-parallel-analysis.md +183 -183
  124. package/.claude/skills/software-manual/phases/03.5-consolidation.md +82 -82
  125. package/.claude/skills/software-manual/phases/04-screenshot-capture.md +89 -89
  126. package/.claude/skills/software-manual/phases/05-html-assembly.md +132 -132
  127. package/.claude/skills/software-manual/phases/06-iterative-refinement.md +259 -259
  128. package/.claude/skills/software-manual/scripts/screenshot-helper.md +447 -447
  129. package/.claude/skills/software-manual/scripts/swagger-runner.md +419 -419
  130. package/.claude/skills/software-manual/scripts/typedoc-runner.md +357 -357
  131. package/.claude/skills/software-manual/specs/html-template.md +325 -325
  132. package/.claude/skills/software-manual/specs/quality-standards.md +253 -253
  133. package/.claude/skills/software-manual/specs/writing-style.md +298 -298
  134. package/.claude/skills/text-formatter/SKILL.md +196 -196
  135. package/.claude/skills/text-formatter/phases/01-input-collection.md +111 -111
  136. package/.claude/skills/text-formatter/phases/02-content-analysis.md +248 -248
  137. package/.claude/skills/text-formatter/phases/03-format-transform.md +245 -245
  138. package/.claude/skills/text-formatter/phases/04-output-preview.md +183 -183
  139. package/.claude/skills/text-formatter/specs/callout-types.md +293 -293
  140. package/.claude/skills/text-formatter/specs/element-mapping.md +226 -226
  141. package/.claude/skills/text-formatter/specs/format-rules.md +273 -273
  142. package/.claude/skills/text-formatter/templates/bbcode-template.md +350 -350
  143. package/.claude/workflows/chinese-response.md +25 -25
  144. package/.claude/workflows/cli-templates/memory/style-skill-memory/skill-md-template.md +299 -299
  145. package/.claude/workflows/cli-templates/planning-roles/product-owner.md +261 -261
  146. package/.claude/workflows/cli-templates/prompts/{analysis/03-analyze-performance.txt → analysis-analyze-performance.txt} +29 -29
  147. package/.claude/workflows/cli-templates/prompts/{analysis/03-assess-security-risks.txt → analysis-assess-security-risks.txt} +29 -29
  148. package/.claude/workflows/cli-templates/prompts/{analysis/02-review-architecture.txt → analysis-review-architecture.txt} +29 -29
  149. package/.claude/workflows/cli-templates/prompts/{analysis/02-review-code-quality.txt → analysis-review-code-quality.txt} +28 -28
  150. package/.claude/workflows/cli-templates/prompts/{analysis/03-review-quality-standards.txt → analysis-review-quality-standards.txt} +29 -29
  151. package/.claude/workflows/cli-templates/prompts/{analysis/01-trace-code-execution.txt → analysis-trace-code-execution.txt} +115 -115
  152. package/.claude/workflows/cli-templates/prompts/{documentation/api.txt → documentation-api.txt} +14 -14
  153. package/.claude/workflows/cli-templates/prompts/{documentation/folder-navigation.txt → documentation-folder-navigation.txt} +26 -26
  154. package/.claude/workflows/cli-templates/prompts/{documentation/project-architecture.txt → documentation-project-architecture.txt} +40 -40
  155. package/.claude/workflows/cli-templates/prompts/{documentation/project-examples.txt → documentation-project-examples.txt} +34 -34
  156. package/.claude/workflows/cli-templates/prompts/{documentation/project-readme.txt → documentation-project-readme.txt} +34 -34
  157. package/.claude/workflows/cli-templates/prompts/{documentation/swagger-api.txt → documentation-swagger-api.txt} +266 -266
  158. package/.claude/workflows/cli-templates/prompts/{planning/02-design-component-spec.txt → planning-design-component-spec.txt} +28 -28
  159. package/.claude/workflows/cli-templates/prompts/{verification/codex-technical.txt → verification-codex-technical.txt} +28 -28
  160. package/.claude/workflows/cli-templates/prompts/{verification/cross-validation.txt → verification-cross-validation.txt} +28 -28
  161. package/.claude/workflows/cli-templates/prompts/{verification/gemini-strategic.txt → verification-gemini-strategic.txt} +27 -27
  162. package/.claude/workflows/cli-templates/prompts/{workflow/analysis-results-structure.txt → workflow-analysis-results-structure.txt} +224 -224
  163. package/.claude/workflows/cli-templates/prompts/{workflow/impl-plan-template.txt → workflow-impl-plan-template.txt} +286 -286
  164. package/.claude/workflows/cli-templates/prompts/{workflow/skill-conflict-patterns.txt → workflow-skill-conflict-patterns.txt} +2 -2
  165. package/.claude/workflows/cli-templates/prompts/{workflow/skill-lessons-learned.txt → workflow-skill-lessons-learned.txt} +2 -2
  166. package/.claude/workflows/cli-templates/prompts/{workflow/task-json-agent-mode.txt → workflow-task-json-agent-mode.txt} +123 -123
  167. package/.claude/workflows/cli-templates/schemas/issues-jsonl-schema.json +29 -0
  168. package/.claude/workflows/cli-templates/schemas/plan-json-schema.json +200 -0
  169. package/.claude/workflows/cli-templates/schemas/project-guidelines-schema.json +141 -141
  170. package/.claude/workflows/cli-tools-usage.md +113 -117
  171. package/.claude/workflows/coding-philosophy.md +69 -69
  172. package/.claude/workflows/context-tools.md +76 -76
  173. package/.claude/workflows/file-modification.md +64 -64
  174. package/.claude/workflows/review-directory-specification.md +336 -336
  175. package/.claude/workflows/windows-platform.md +19 -19
  176. package/.claude/workflows/workflow-architecture.md +942 -942
  177. package/.codex/prompts/debug-with-file.md +609 -0
  178. package/.codex/prompts/issue-execute.md +176 -70
  179. package/README.md +250 -214
  180. package/ccw/dist/cli.d.ts.map +1 -1
  181. package/ccw/dist/cli.js +15 -0
  182. package/ccw/dist/cli.js.map +1 -1
  183. package/ccw/dist/commands/cli.d.ts +5 -0
  184. package/ccw/dist/commands/cli.d.ts.map +1 -1
  185. package/ccw/dist/commands/cli.js +114 -18
  186. package/ccw/dist/commands/cli.js.map +1 -1
  187. package/ccw/dist/commands/install.d.ts +17 -0
  188. package/ccw/dist/commands/install.d.ts.map +1 -1
  189. package/ccw/dist/commands/install.js +211 -2
  190. package/ccw/dist/commands/install.js.map +1 -1
  191. package/ccw/dist/commands/issue.d.ts.map +1 -1
  192. package/ccw/dist/commands/issue.js +245 -32
  193. package/ccw/dist/commands/issue.js.map +1 -1
  194. package/ccw/dist/commands/uninstall.d.ts.map +1 -1
  195. package/ccw/dist/commands/uninstall.js +22 -1
  196. package/ccw/dist/commands/uninstall.js.map +1 -1
  197. package/ccw/dist/commands/view.d.ts.map +1 -1
  198. package/ccw/dist/commands/view.js +3 -0
  199. package/ccw/dist/commands/view.js.map +1 -1
  200. package/ccw/dist/commands/workflow.d.ts +11 -0
  201. package/ccw/dist/commands/workflow.d.ts.map +1 -0
  202. package/ccw/dist/commands/workflow.js +294 -0
  203. package/ccw/dist/commands/workflow.js.map +1 -0
  204. package/ccw/dist/core/routes/claude-routes.d.ts.map +1 -1
  205. package/ccw/dist/core/routes/claude-routes.js +57 -3
  206. package/ccw/dist/core/routes/claude-routes.js.map +1 -1
  207. package/ccw/dist/core/routes/cli-routes.d.ts +13 -0
  208. package/ccw/dist/core/routes/cli-routes.d.ts.map +1 -1
  209. package/ccw/dist/core/routes/cli-routes.js +46 -0
  210. package/ccw/dist/core/routes/cli-routes.js.map +1 -1
  211. package/ccw/dist/core/routes/hooks-routes.d.ts.map +1 -1
  212. package/ccw/dist/core/routes/hooks-routes.js +36 -0
  213. package/ccw/dist/core/routes/hooks-routes.js.map +1 -1
  214. package/ccw/dist/core/routes/issue-routes.d.ts.map +1 -1
  215. package/ccw/dist/core/routes/issue-routes.js +211 -29
  216. package/ccw/dist/core/routes/issue-routes.js.map +1 -1
  217. package/ccw/dist/core/routes/mcp-routes.d.ts.map +1 -1
  218. package/ccw/dist/core/routes/mcp-routes.js +4 -1
  219. package/ccw/dist/core/routes/mcp-routes.js.map +1 -1
  220. package/ccw/dist/core/routes/rules-routes.d.ts.map +1 -1
  221. package/ccw/dist/core/routes/rules-routes.js +22 -6
  222. package/ccw/dist/core/routes/rules-routes.js.map +1 -1
  223. package/ccw/dist/core/routes/session-routes.d.ts.map +1 -1
  224. package/ccw/dist/core/routes/session-routes.js +23 -1
  225. package/ccw/dist/core/routes/session-routes.js.map +1 -1
  226. package/ccw/dist/mcp-server/index.js +8 -2
  227. package/ccw/dist/mcp-server/index.js.map +1 -1
  228. package/ccw/dist/tools/claude-cli-tools.d.ts.map +1 -1
  229. package/ccw/dist/tools/claude-cli-tools.js +52 -28
  230. package/ccw/dist/tools/claude-cli-tools.js.map +1 -1
  231. package/ccw/dist/tools/cli-executor-core.d.ts.map +1 -1
  232. package/ccw/dist/tools/cli-executor-core.js +33 -8
  233. package/ccw/dist/tools/cli-executor-core.js.map +1 -1
  234. package/ccw/dist/tools/cli-executor-state.d.ts +2 -0
  235. package/ccw/dist/tools/cli-executor-state.d.ts.map +1 -1
  236. package/ccw/dist/tools/cli-executor-state.js.map +1 -1
  237. package/ccw/dist/tools/cli-executor-utils.d.ts +7 -0
  238. package/ccw/dist/tools/cli-executor-utils.d.ts.map +1 -1
  239. package/ccw/dist/tools/cli-executor-utils.js +18 -4
  240. package/ccw/dist/tools/cli-executor-utils.js.map +1 -1
  241. package/ccw/dist/tools/cli-history-store.d.ts +21 -0
  242. package/ccw/dist/tools/cli-history-store.d.ts.map +1 -1
  243. package/ccw/dist/tools/cli-history-store.js +106 -30
  244. package/ccw/dist/tools/cli-history-store.js.map +1 -1
  245. package/ccw/dist/tools/cli-output-converter.d.ts +2 -1
  246. package/ccw/dist/tools/cli-output-converter.d.ts.map +1 -1
  247. package/ccw/dist/tools/cli-output-converter.js +65 -10
  248. package/ccw/dist/tools/cli-output-converter.js.map +1 -1
  249. package/ccw/dist/tools/codex-lens-lsp.d.ts +61 -0
  250. package/ccw/dist/tools/codex-lens-lsp.d.ts.map +1 -0
  251. package/ccw/dist/tools/codex-lens-lsp.js +320 -0
  252. package/ccw/dist/tools/codex-lens-lsp.js.map +1 -0
  253. package/ccw/dist/tools/codex-lens.d.ts.map +1 -1
  254. package/ccw/dist/tools/codex-lens.js +130 -91
  255. package/ccw/dist/tools/codex-lens.js.map +1 -1
  256. package/ccw/dist/tools/index.d.ts.map +1 -1
  257. package/ccw/dist/tools/index.js +4 -0
  258. package/ccw/dist/tools/index.js.map +1 -1
  259. package/ccw/dist/tools/template-discovery.d.ts +85 -0
  260. package/ccw/dist/tools/template-discovery.d.ts.map +1 -0
  261. package/ccw/dist/tools/template-discovery.js +239 -0
  262. package/ccw/dist/tools/template-discovery.js.map +1 -0
  263. package/ccw/dist/tools/vscode-lsp.d.ts +57 -0
  264. package/ccw/dist/tools/vscode-lsp.d.ts.map +1 -0
  265. package/ccw/dist/tools/vscode-lsp.js +250 -0
  266. package/ccw/dist/tools/vscode-lsp.js.map +1 -0
  267. package/ccw/dist/utils/path-resolver.d.ts +16 -2
  268. package/ccw/dist/utils/path-resolver.d.ts.map +1 -1
  269. package/ccw/dist/utils/path-resolver.js +36 -6
  270. package/ccw/dist/utils/path-resolver.js.map +1 -1
  271. package/ccw/dist/utils/path-validator.d.ts +5 -0
  272. package/ccw/dist/utils/path-validator.d.ts.map +1 -1
  273. package/ccw/dist/utils/path-validator.js +16 -5
  274. package/ccw/dist/utils/path-validator.js.map +1 -1
  275. package/ccw/dist/utils/project-root.d.ts +25 -0
  276. package/ccw/dist/utils/project-root.d.ts.map +1 -0
  277. package/ccw/dist/utils/project-root.js +63 -0
  278. package/ccw/dist/utils/project-root.js.map +1 -0
  279. package/ccw/dist/utils/shell-escape.d.ts +47 -3
  280. package/ccw/dist/utils/shell-escape.d.ts.map +1 -1
  281. package/ccw/dist/utils/shell-escape.js +98 -15
  282. package/ccw/dist/utils/shell-escape.js.map +1 -1
  283. package/ccw/dist/utils/update-checker.d.ts +11 -0
  284. package/ccw/dist/utils/update-checker.d.ts.map +1 -0
  285. package/ccw/dist/utils/update-checker.js +167 -0
  286. package/ccw/dist/utils/update-checker.js.map +1 -0
  287. package/ccw/scripts/IMPLEMENTATION-SUMMARY.md +2 -2
  288. package/ccw/scripts/QUICK-REFERENCE.md +1 -1
  289. package/ccw/scripts/README-memory-embedder.md +1 -1
  290. package/ccw/scripts/memory_embedder.py +1 -1
  291. package/ccw/src/cli.ts +16 -0
  292. package/ccw/src/commands/cli.ts +124 -18
  293. package/ccw/src/commands/install.ts +239 -2
  294. package/ccw/src/commands/issue.ts +286 -36
  295. package/ccw/src/commands/uninstall.ts +23 -1
  296. package/ccw/src/commands/view.ts +4 -0
  297. package/ccw/src/commands/workflow.ts +348 -0
  298. package/ccw/src/core/routes/claude-routes.ts +64 -3
  299. package/ccw/src/core/routes/cli-routes.ts +58 -0
  300. package/ccw/src/core/routes/hooks-routes.ts +35 -0
  301. package/ccw/src/core/routes/issue-routes.ts +242 -28
  302. package/ccw/src/core/routes/mcp-routes.ts +6 -2
  303. package/ccw/src/core/routes/rules-routes.ts +24 -6
  304. package/ccw/src/core/routes/session-routes.ts +24 -1
  305. package/ccw/src/mcp-server/index.ts +7 -2
  306. package/ccw/src/templates/dashboard-css/26-claude-manager.css +179 -0
  307. package/ccw/src/templates/dashboard-css/32-issue-manager.css +3587 -3302
  308. package/ccw/src/templates/dashboard-css/33-cli-stream-viewer.css +1 -0
  309. package/ccw/src/templates/dashboard-js/components/cli-history.js +4 -1
  310. package/ccw/src/templates/dashboard-js/components/cli-stream-viewer.js +57 -21
  311. package/ccw/src/templates/dashboard-js/components/hook-manager.js +1492 -1492
  312. package/ccw/src/templates/dashboard-js/components/mcp-manager.js +107 -20
  313. package/ccw/src/templates/dashboard-js/components/version-check.js +135 -1
  314. package/ccw/src/templates/dashboard-js/i18n.js +42 -0
  315. package/ccw/src/templates/dashboard-js/views/claude-manager.js +168 -0
  316. package/ccw/src/templates/dashboard-js/views/cli-manager.js +1 -0
  317. package/ccw/src/templates/dashboard-js/views/issue-manager.js +360 -1
  318. package/ccw/src/templates/dashboard-js/views/lite-tasks.js +3502 -3478
  319. package/ccw/src/templates/dashboard-js/views/mcp-manager.js +16 -0
  320. package/ccw/src/templates/dashboard.html +112 -0
  321. package/ccw/src/tools/claude-cli-tools.ts +54 -28
  322. package/ccw/src/tools/cli-executor-core.ts +36 -8
  323. package/ccw/src/tools/cli-executor-state.ts +2 -0
  324. package/ccw/src/tools/cli-executor-utils.ts +26 -4
  325. package/ccw/src/tools/cli-history-store.ts +122 -31
  326. package/ccw/src/tools/cli-output-converter.ts +76 -12
  327. package/ccw/src/tools/codex-lens-lsp.ts +405 -0
  328. package/ccw/src/tools/codex-lens.ts +143 -93
  329. package/ccw/src/tools/index.ts +4 -0
  330. package/ccw/src/tools/template-discovery.ts +303 -0
  331. package/ccw/src/tools/vscode-lsp.ts +317 -0
  332. package/ccw/src/utils/path-resolver.ts +37 -6
  333. package/ccw/src/utils/path-validator.ts +17 -5
  334. package/ccw/src/utils/project-root.ts +73 -0
  335. package/ccw/src/utils/shell-escape.ts +103 -16
  336. package/ccw/src/utils/update-checker.ts +178 -0
  337. package/codex-lens/pyproject.toml +14 -0
  338. package/codex-lens/src/codexlens/__pycache__/config.cpython-312.pyc +0 -0
  339. package/codex-lens/src/codexlens/__pycache__/config.cpython-313.pyc +0 -0
  340. package/codex-lens/src/codexlens/__pycache__/errors.cpython-312.pyc +0 -0
  341. package/codex-lens/src/codexlens/__pycache__/errors.cpython-313.pyc +0 -0
  342. package/codex-lens/src/codexlens/api/__init__.py +88 -0
  343. package/codex-lens/src/codexlens/api/__pycache__/__init__.cpython-312.pyc +0 -0
  344. package/codex-lens/src/codexlens/api/__pycache__/__init__.cpython-313.pyc +0 -0
  345. package/codex-lens/src/codexlens/api/__pycache__/definition.cpython-312.pyc +0 -0
  346. package/codex-lens/src/codexlens/api/__pycache__/definition.cpython-313.pyc +0 -0
  347. package/codex-lens/src/codexlens/api/__pycache__/file_context.cpython-312.pyc +0 -0
  348. package/codex-lens/src/codexlens/api/__pycache__/file_context.cpython-313.pyc +0 -0
  349. package/codex-lens/src/codexlens/api/__pycache__/hover.cpython-312.pyc +0 -0
  350. package/codex-lens/src/codexlens/api/__pycache__/hover.cpython-313.pyc +0 -0
  351. package/codex-lens/src/codexlens/api/__pycache__/models.cpython-312.pyc +0 -0
  352. package/codex-lens/src/codexlens/api/__pycache__/models.cpython-313.pyc +0 -0
  353. package/codex-lens/src/codexlens/api/__pycache__/references.cpython-312.pyc +0 -0
  354. package/codex-lens/src/codexlens/api/__pycache__/references.cpython-313.pyc +0 -0
  355. package/codex-lens/src/codexlens/api/__pycache__/semantic.cpython-312.pyc +0 -0
  356. package/codex-lens/src/codexlens/api/__pycache__/semantic.cpython-313.pyc +0 -0
  357. package/codex-lens/src/codexlens/api/__pycache__/symbols.cpython-312.pyc +0 -0
  358. package/codex-lens/src/codexlens/api/__pycache__/symbols.cpython-313.pyc +0 -0
  359. package/codex-lens/src/codexlens/api/__pycache__/utils.cpython-312.pyc +0 -0
  360. package/codex-lens/src/codexlens/api/__pycache__/utils.cpython-313.pyc +0 -0
  361. package/codex-lens/src/codexlens/api/definition.py +126 -0
  362. package/codex-lens/src/codexlens/api/file_context.py +271 -0
  363. package/codex-lens/src/codexlens/api/hover.py +148 -0
  364. package/codex-lens/src/codexlens/api/models.py +281 -0
  365. package/codex-lens/src/codexlens/api/references.py +345 -0
  366. package/codex-lens/src/codexlens/api/semantic.py +471 -0
  367. package/codex-lens/src/codexlens/api/symbols.py +146 -0
  368. package/codex-lens/src/codexlens/api/utils.py +153 -0
  369. package/codex-lens/src/codexlens/config.py +7 -0
  370. package/codex-lens/src/codexlens/errors.py +4 -0
  371. package/codex-lens/src/codexlens/hybrid_search/__init__.py +28 -0
  372. package/codex-lens/src/codexlens/hybrid_search/__pycache__/__init__.cpython-312.pyc +0 -0
  373. package/codex-lens/src/codexlens/hybrid_search/__pycache__/__init__.cpython-313.pyc +0 -0
  374. package/codex-lens/src/codexlens/hybrid_search/__pycache__/data_structures.cpython-312.pyc +0 -0
  375. package/codex-lens/src/codexlens/hybrid_search/__pycache__/data_structures.cpython-313.pyc +0 -0
  376. package/codex-lens/src/codexlens/hybrid_search/__pycache__/engine.cpython-313.pyc +0 -0
  377. package/codex-lens/src/codexlens/hybrid_search/data_structures.py +602 -0
  378. package/codex-lens/src/codexlens/lsp/__init__.py +34 -0
  379. package/codex-lens/src/codexlens/lsp/__pycache__/__init__.cpython-312.pyc +0 -0
  380. package/codex-lens/src/codexlens/lsp/__pycache__/__init__.cpython-313.pyc +0 -0
  381. package/codex-lens/src/codexlens/lsp/__pycache__/handlers.cpython-313.pyc +0 -0
  382. package/codex-lens/src/codexlens/lsp/__pycache__/lsp_bridge.cpython-312.pyc +0 -0
  383. package/codex-lens/src/codexlens/lsp/__pycache__/lsp_bridge.cpython-313.pyc +0 -0
  384. package/codex-lens/src/codexlens/lsp/__pycache__/lsp_graph_builder.cpython-312.pyc +0 -0
  385. package/codex-lens/src/codexlens/lsp/__pycache__/lsp_graph_builder.cpython-313.pyc +0 -0
  386. package/codex-lens/src/codexlens/lsp/__pycache__/providers.cpython-313.pyc +0 -0
  387. package/codex-lens/src/codexlens/lsp/__pycache__/server.cpython-313.pyc +0 -0
  388. package/codex-lens/src/codexlens/lsp/__pycache__/standalone_manager.cpython-313.pyc +0 -0
  389. package/codex-lens/src/codexlens/lsp/handlers.py +551 -0
  390. package/codex-lens/src/codexlens/lsp/lsp_bridge.py +834 -0
  391. package/codex-lens/src/codexlens/lsp/lsp_graph_builder.py +375 -0
  392. package/codex-lens/src/codexlens/lsp/providers.py +177 -0
  393. package/codex-lens/src/codexlens/lsp/server.py +263 -0
  394. package/codex-lens/src/codexlens/lsp/standalone_manager.py +1159 -0
  395. package/codex-lens/src/codexlens/mcp/__init__.py +20 -0
  396. package/codex-lens/src/codexlens/mcp/__pycache__/__init__.cpython-313.pyc +0 -0
  397. package/codex-lens/src/codexlens/mcp/__pycache__/hooks.cpython-313.pyc +0 -0
  398. package/codex-lens/src/codexlens/mcp/__pycache__/provider.cpython-313.pyc +0 -0
  399. package/codex-lens/src/codexlens/mcp/__pycache__/schema.cpython-313.pyc +0 -0
  400. package/codex-lens/src/codexlens/mcp/hooks.py +170 -0
  401. package/codex-lens/src/codexlens/mcp/provider.py +202 -0
  402. package/codex-lens/src/codexlens/mcp/schema.py +113 -0
  403. package/codex-lens/src/codexlens/search/__init__.py +53 -15
  404. package/codex-lens/src/codexlens/search/__pycache__/__init__.cpython-312.pyc +0 -0
  405. package/codex-lens/src/codexlens/search/__pycache__/__init__.cpython-313.pyc +0 -0
  406. package/codex-lens/src/codexlens/search/__pycache__/chain_search.cpython-312.pyc +0 -0
  407. package/codex-lens/src/codexlens/search/__pycache__/chain_search.cpython-313.pyc +0 -0
  408. package/codex-lens/src/codexlens/search/__pycache__/hybrid_search.cpython-312.pyc +0 -0
  409. package/codex-lens/src/codexlens/search/__pycache__/hybrid_search.cpython-313.pyc +0 -0
  410. package/codex-lens/src/codexlens/search/__pycache__/ranking.cpython-312.pyc +0 -0
  411. package/codex-lens/src/codexlens/search/__pycache__/ranking.cpython-313.pyc +0 -0
  412. package/codex-lens/src/codexlens/search/association_tree/QUICK_START.md +257 -0
  413. package/codex-lens/src/codexlens/search/association_tree/README.md +188 -0
  414. package/codex-lens/src/codexlens/search/association_tree/__init__.py +21 -0
  415. package/codex-lens/src/codexlens/search/association_tree/__pycache__/__init__.cpython-313.pyc +0 -0
  416. package/codex-lens/src/codexlens/search/association_tree/__pycache__/builder.cpython-313.pyc +0 -0
  417. package/codex-lens/src/codexlens/search/association_tree/__pycache__/data_structures.cpython-313.pyc +0 -0
  418. package/codex-lens/src/codexlens/search/association_tree/__pycache__/deduplicator.cpython-313.pyc +0 -0
  419. package/codex-lens/src/codexlens/search/association_tree/builder.py +450 -0
  420. package/codex-lens/src/codexlens/search/association_tree/data_structures.py +191 -0
  421. package/codex-lens/src/codexlens/search/association_tree/deduplicator.py +301 -0
  422. package/codex-lens/src/codexlens/search/chain_search.py +864 -3
  423. package/codex-lens/src/codexlens/search/clustering/__init__.py +124 -0
  424. package/codex-lens/src/codexlens/search/clustering/__pycache__/__init__.cpython-312.pyc +0 -0
  425. package/codex-lens/src/codexlens/search/clustering/__pycache__/__init__.cpython-313.pyc +0 -0
  426. package/codex-lens/src/codexlens/search/clustering/__pycache__/base.cpython-312.pyc +0 -0
  427. package/codex-lens/src/codexlens/search/clustering/__pycache__/base.cpython-313.pyc +0 -0
  428. package/codex-lens/src/codexlens/search/clustering/__pycache__/dbscan_strategy.cpython-313.pyc +0 -0
  429. package/codex-lens/src/codexlens/search/clustering/__pycache__/factory.cpython-312.pyc +0 -0
  430. package/codex-lens/src/codexlens/search/clustering/__pycache__/factory.cpython-313.pyc +0 -0
  431. package/codex-lens/src/codexlens/search/clustering/__pycache__/frequency_strategy.cpython-312.pyc +0 -0
  432. package/codex-lens/src/codexlens/search/clustering/__pycache__/frequency_strategy.cpython-313.pyc +0 -0
  433. package/codex-lens/src/codexlens/search/clustering/__pycache__/hdbscan_strategy.cpython-313.pyc +0 -0
  434. package/codex-lens/src/codexlens/search/clustering/__pycache__/noop_strategy.cpython-312.pyc +0 -0
  435. package/codex-lens/src/codexlens/search/clustering/__pycache__/noop_strategy.cpython-313.pyc +0 -0
  436. package/codex-lens/src/codexlens/search/clustering/base.py +153 -0
  437. package/codex-lens/src/codexlens/search/clustering/dbscan_strategy.py +197 -0
  438. package/codex-lens/src/codexlens/search/clustering/factory.py +202 -0
  439. package/codex-lens/src/codexlens/search/clustering/frequency_strategy.py +263 -0
  440. package/codex-lens/src/codexlens/search/clustering/hdbscan_strategy.py +153 -0
  441. package/codex-lens/src/codexlens/search/clustering/noop_strategy.py +83 -0
  442. package/codex-lens/src/codexlens/search/hybrid_search.py +194 -2
  443. package/codex-lens/src/codexlens/search/ranking.py +6 -4
  444. package/codex-lens/src/codexlens/semantic/__pycache__/chunker.cpython-312.pyc +0 -0
  445. package/codex-lens/src/codexlens/storage/__pycache__/dir_index.cpython-312.pyc +0 -0
  446. package/codex-lens/src/codexlens/storage/__pycache__/dir_index.cpython-313.pyc +0 -0
  447. package/codex-lens/src/codexlens/storage/__pycache__/global_index.cpython-312.pyc +0 -0
  448. package/codex-lens/src/codexlens/storage/__pycache__/global_index.cpython-313.pyc +0 -0
  449. package/codex-lens/src/codexlens/storage/dir_index.py +172 -0
  450. package/codex-lens/src/codexlens/storage/global_index.py +33 -0
  451. package/package.json +92 -92
  452. /package/.claude/workflows/cli-templates/prompts/{analysis/02-analyze-code-patterns.txt → analysis-analyze-code-patterns.txt} +0 -0
  453. /package/.claude/workflows/cli-templates/prompts/{analysis/02-analyze-technical-document.txt → analysis-analyze-technical-document.txt} +0 -0
  454. /package/.claude/workflows/cli-templates/prompts/{analysis/01-diagnose-bug-root-cause.txt → analysis-diagnose-bug-root-cause.txt} +0 -0
  455. /package/.claude/workflows/cli-templates/prompts/{development/03-debug-runtime-issues.txt → development-debug-runtime-issues.txt} +0 -0
  456. /package/.claude/workflows/cli-templates/prompts/{development/02-generate-tests.txt → development-generate-tests.txt} +0 -0
  457. /package/.claude/workflows/cli-templates/prompts/{development/02-implement-component-ui.txt → development-implement-component-ui.txt} +0 -0
  458. /package/.claude/workflows/cli-templates/prompts/{development/02-implement-feature.txt → development-implement-feature.txt} +0 -0
  459. /package/.claude/workflows/cli-templates/prompts/{development/02-refactor-codebase.txt → development-refactor-codebase.txt} +0 -0
  460. /package/.claude/workflows/cli-templates/prompts/{documentation/module-readme.txt → documentation-module-readme.txt} +0 -0
  461. /package/.claude/workflows/cli-templates/prompts/{memory/02-document-module-structure.txt → memory-document-module-structure.txt} +0 -0
  462. /package/.claude/workflows/cli-templates/prompts/{planning/02-breakdown-task-steps.txt → planning-breakdown-task-steps.txt} +0 -0
  463. /package/.claude/workflows/cli-templates/prompts/{planning/03-evaluate-concept-feasibility.txt → planning-evaluate-concept-feasibility.txt} +0 -0
  464. /package/.claude/workflows/cli-templates/prompts/{planning/01-plan-architecture-design.txt → planning-plan-architecture-design.txt} +0 -0
  465. /package/.claude/workflows/cli-templates/prompts/{planning/03-plan-migration-strategy.txt → planning-plan-migration-strategy.txt} +0 -0
  466. /package/.claude/workflows/cli-templates/prompts/{rules/rule-api.txt → rules-rule-api.txt} +0 -0
  467. /package/.claude/workflows/cli-templates/prompts/{rules/rule-components.txt → rules-rule-components.txt} +0 -0
  468. /package/.claude/workflows/cli-templates/prompts/{rules/rule-config.txt → rules-rule-config.txt} +0 -0
  469. /package/.claude/workflows/cli-templates/prompts/{rules/rule-core.txt → rules-rule-core.txt} +0 -0
  470. /package/.claude/workflows/cli-templates/prompts/{rules/rule-patterns.txt → rules-rule-patterns.txt} +0 -0
  471. /package/.claude/workflows/cli-templates/prompts/{rules/rule-testing.txt → rules-rule-testing.txt} +0 -0
  472. /package/.claude/workflows/cli-templates/prompts/{rules/tech-rules-agent-prompt.txt → rules-tech-rules-agent-prompt.txt} +0 -0
  473. /package/.claude/workflows/cli-templates/prompts/{tech/tech-module-format.txt → tech-tech-module-format.txt} +0 -0
  474. /package/.claude/workflows/cli-templates/prompts/{tech/tech-skill-index.txt → tech-tech-skill-index.txt} +0 -0
  475. /package/.claude/workflows/cli-templates/prompts/{test/test-concept-analysis.txt → test-test-concept-analysis.txt} +0 -0
  476. /package/.claude/workflows/cli-templates/prompts/{universal/00-universal-creative-style.txt → universal-universal-creative-style.txt} +0 -0
  477. /package/.claude/workflows/cli-templates/prompts/{universal/00-universal-rigorous-style.txt → universal-universal-rigorous-style.txt} +0 -0
  478. /package/.claude/workflows/cli-templates/prompts/{workflow/codex-feasibility-validation.txt → workflow-codex-feasibility-validation.txt} +0 -0
  479. /package/.claude/workflows/cli-templates/prompts/{workflow/gemini-solution-design.txt → workflow-gemini-solution-design.txt} +0 -0
  480. /package/.claude/workflows/cli-templates/prompts/{workflow/skill-aggregation.txt → workflow-skill-aggregation.txt} +0 -0
  481. /package/.claude/workflows/cli-templates/prompts/{workflow/skill-index.txt → workflow-skill-index.txt} +0 -0
  482. /package/.claude/workflows/cli-templates/prompts/{workflow/skill-sessions-timeline.txt → workflow-skill-sessions-timeline.txt} +0 -0
  483. /package/.claude/workflows/cli-templates/prompts/{workflow/task-json-cli-mode.txt → workflow-task-json-cli-mode.txt} +0 -0
@@ -1,771 +1,771 @@
1
- ---
2
- name: review-module-cycle
3
- description: Independent multi-dimensional code review for specified modules/files. Analyzes specific code paths across 7 dimensions with hybrid parallel-iterative execution, independent of workflow sessions.
4
- argument-hint: "<path-pattern> [--dimensions=security,architecture,...] [--max-iterations=N]"
5
- allowed-tools: SlashCommand(*), TodoWrite(*), Read(*), Bash(*), Task(*)
6
- ---
7
-
8
- # Workflow Review-Module-Cycle Command
9
-
10
- ## Quick Start
11
-
12
- ```bash
13
- # Review specific module (all 7 dimensions)
14
- /workflow:review-module-cycle src/auth/**
15
-
16
- # Review multiple modules
17
- /workflow:review-module-cycle src/auth/**,src/payment/**
18
-
19
- # Review with custom dimensions
20
- /workflow:review-module-cycle src/payment/** --dimensions=security,architecture,quality
21
-
22
- # Review specific files
23
- /workflow:review-module-cycle src/payment/processor.ts,src/payment/validator.ts
24
- ```
25
-
26
- **Review Scope**: Specified modules/files only (independent of git history)
27
- **Session Requirement**: Auto-creates workflow session via `/workflow:session:start`
28
- **Output Directory**: `.workflow/active/WFS-{session-id}/.review/` (session-based)
29
- **Default Dimensions**: Security, Architecture, Quality, Action-Items, Performance, Maintainability, Best-Practices
30
- **Max Iterations**: 3 (adjustable via --max-iterations)
31
- **Default Iterations**: 1 (deep-dive runs once; use --max-iterations=0 to skip)
32
- **CLI Tools**: Gemini → Qwen → Codex (fallback chain)
33
-
34
- ## What & Why
35
-
36
- ### Core Concept
37
- Independent multi-dimensional code review orchestrator with **hybrid parallel-iterative execution** for comprehensive quality assessment of **specific modules or files**.
38
-
39
- **Review Scope**:
40
- - **Module-based**: Reviews specified file patterns (e.g., `src/auth/**`, `*.ts`)
41
- - **Session-integrated**: Runs within workflow session context for unified tracking
42
- - **Output location**: `.review/` subdirectory within active session
43
-
44
- **vs Session Review**:
45
- - **Session Review** (`review-session-cycle`): Reviews git changes within a workflow session
46
- - **Module Review** (`review-module-cycle`): Reviews any specified code paths, regardless of git history
47
- - **Common output**: Both use same `.review/` directory structure within session
48
-
49
- ### Value Proposition
50
- 1. **Module-Focused Review**: Target specific code areas independent of git history
51
- 2. **Session-Integrated**: Review results tracked within workflow session for unified management
52
- 3. **Comprehensive Coverage**: Same 7 specialized dimensions as session review
53
- 4. **Intelligent Prioritization**: Automatic identification of critical issues and cross-cutting concerns
54
- 5. **Unified Archive**: Review results archived with session for historical reference
55
-
56
- ### Orchestrator Boundary (CRITICAL)
57
- - **ONLY command** for independent multi-dimensional module review
58
- - Manages: dimension coordination, aggregation, iteration control, progress tracking
59
- - Delegates: Code exploration and analysis to @cli-explore-agent, dimension-specific reviews via Deep Scan mode
60
-
61
- ## How It Works
62
-
63
- ### Execution Flow
64
-
65
- ```
66
- Phase 1: Discovery & Initialization
67
- └─ Resolve file patterns, validate paths, initialize state, create output structure
68
-
69
- Phase 2: Parallel Reviews (for each dimension)
70
- ├─ Launch 7 review agents simultaneously
71
- ├─ Each executes CLI analysis via Gemini/Qwen on specified files
72
- ├─ Generate dimension JSON + markdown reports
73
- └─ Update review-progress.json
74
-
75
- Phase 3: Aggregation
76
- ├─ Load all dimension JSON files
77
- ├─ Calculate severity distribution (critical/high/medium/low)
78
- ├─ Identify cross-cutting concerns (files in 3+ dimensions)
79
- └─ Decision:
80
- ├─ Critical findings OR high > 5 OR critical files → Phase 4 (Iterate)
81
- └─ Else → Phase 5 (Complete)
82
-
83
- Phase 4: Iterative Deep-Dive (optional)
84
- ├─ Select critical findings (max 5 per iteration)
85
- ├─ Launch deep-dive agents for root cause analysis
86
- ├─ Generate remediation plans with impact assessment
87
- ├─ Re-assess severity based on analysis
88
- └─ Loop until no critical findings OR max iterations
89
-
90
- Phase 5: Completion
91
- └─ Finalize review-progress.json
92
- ```
93
-
94
- ### Agent Roles
95
-
96
- | Agent | Responsibility |
97
- |-------|---------------|
98
- | **Orchestrator** | Phase control, path resolution, state management, aggregation logic, iteration control |
99
- | **@cli-explore-agent** (Review) | Execute dimension-specific code analysis via Deep Scan mode, generate findings JSON with dual-source strategy (Bash + Gemini), create structured analysis reports |
100
- | **@cli-explore-agent** (Deep-dive) | Focused root cause analysis using dependency mapping, remediation planning with architectural insights, impact assessment, severity re-assessment |
101
-
102
- ## Enhanced Features
103
-
104
- ### 1. Review Dimensions Configuration
105
-
106
- **7 Specialized Dimensions** with priority-based allocation:
107
-
108
- | Dimension | Template | Priority | Timeout |
109
- |-----------|----------|----------|---------|
110
- | **Security** | 03-assess-security-risks.txt | 1 (Critical) | 60min |
111
- | **Architecture** | 02-review-architecture.txt | 2 (High) | 60min |
112
- | **Quality** | 02-review-code-quality.txt | 3 (Medium) | 40min |
113
- | **Action-Items** | 02-analyze-code-patterns.txt | 2 (High) | 40min |
114
- | **Performance** | 03-analyze-performance.txt | 3 (Medium) | 60min |
115
- | **Maintainability** | 02-review-code-quality.txt* | 3 (Medium) | 40min |
116
- | **Best-Practices** | 03-review-quality-standards.txt | 3 (Medium) | 40min |
117
-
118
- *Custom focus: "Assess technical debt and maintainability"
119
-
120
- **Category Definitions by Dimension**:
121
-
122
- ```javascript
123
- const CATEGORIES = {
124
- security: ['injection', 'authentication', 'authorization', 'encryption', 'input-validation', 'access-control', 'data-exposure'],
125
- architecture: ['coupling', 'cohesion', 'layering', 'dependency', 'pattern-violation', 'scalability', 'separation-of-concerns'],
126
- quality: ['code-smell', 'duplication', 'complexity', 'naming', 'error-handling', 'testability', 'readability'],
127
- 'action-items': ['requirement-coverage', 'acceptance-criteria', 'documentation', 'deployment-readiness', 'missing-functionality'],
128
- performance: ['n-plus-one', 'inefficient-query', 'memory-leak', 'blocking-operation', 'caching', 'resource-usage'],
129
- maintainability: ['technical-debt', 'magic-number', 'long-method', 'large-class', 'dead-code', 'commented-code'],
130
- 'best-practices': ['convention-violation', 'anti-pattern', 'deprecated-api', 'missing-validation', 'inconsistent-style']
131
- };
132
- ```
133
-
134
- ### 2. Path Pattern Resolution
135
-
136
- **Syntax Rules**:
137
- - All paths are **relative** from project root (e.g., `src/auth/**` not `/src/auth/**`)
138
- - Multiple patterns: comma-separated, **no spaces** (e.g., `src/auth/**,src/payment/**`)
139
- - Glob and specific files can be mixed (e.g., `src/auth/**,src/config.ts`)
140
-
141
- **Supported Patterns**:
142
- | Pattern Type | Example | Description |
143
- |--------------|---------|-------------|
144
- | Glob directory | `src/auth/**` | All files under src/auth/ |
145
- | Glob with extension | `src/**/*.ts` | All .ts files under src/ |
146
- | Specific file | `src/payment/processor.ts` | Single file |
147
- | Multiple patterns | `src/auth/**,src/payment/**` | Comma-separated (no spaces) |
148
-
149
- **Resolution Process**:
150
- 1. Parse input pattern (split by comma, trim whitespace)
151
- 2. Expand glob patterns to file list via `find` command
152
- 3. Validate all files exist and are readable
153
- 4. Error if pattern matches 0 files
154
- 5. Store resolved file list in review-state.json
155
-
156
- ### 3. Aggregation Logic
157
-
158
- **Cross-Cutting Concern Detection**:
159
- 1. Files appearing in 3+ dimensions = **Critical Files**
160
- 2. Same issue pattern across dimensions = **Systemic Issue**
161
- 3. Severity clustering in specific files = **Hotspots**
162
-
163
- **Deep-Dive Selection Criteria**:
164
- - All critical severity findings (priority 1)
165
- - Top 3 high-severity findings in critical files (priority 2)
166
- - Max 5 findings per iteration (prevent overwhelm)
167
-
168
- ### 4. Severity Assessment
169
-
170
- **Severity Levels**:
171
- - **Critical**: Security vulnerabilities, data corruption risks, system-wide failures, authentication/authorization bypass
172
- - **High**: Feature degradation, performance bottlenecks, architecture violations, significant technical debt
173
- - **Medium**: Code smells, minor performance issues, style inconsistencies, maintainability concerns
174
- - **Low**: Documentation gaps, minor refactoring opportunities, cosmetic issues
175
-
176
- **Iteration Trigger**:
177
- - Critical findings > 0 OR
178
- - High findings > 5 OR
179
- - Critical files count > 0
180
-
181
- ## Core Responsibilities
182
-
183
- ### Orchestrator
184
-
185
- **Phase 1: Discovery & Initialization**
186
-
187
- **Step 1: Session Creation**
188
- ```javascript
189
- // Create workflow session for this review (type: review)
190
- SlashCommand(command="/workflow:session:start --type review \"Code review for [target_pattern]\"")
191
-
192
- // Parse output
193
- const sessionId = output.match(/SESSION_ID: (WFS-[^\s]+)/)[1];
194
- ```
195
-
196
- **Step 2: Path Resolution & Validation**
197
- ```bash
198
- # Expand glob pattern to file list (relative paths from project root)
199
- find . -path "./src/auth/**" -type f | sed 's|^\./||'
200
-
201
- # Validate files exist and are readable
202
- for file in ${resolvedFiles[@]}; do
203
- test -r "$file" || error "File not readable: $file"
204
- done
205
- ```
206
- - Parse and expand file patterns (glob support): `src/auth/**` → actual file list
207
- - Validation: Ensure all specified files exist and are readable
208
- - Store as **relative paths** from project root (e.g., `src/auth/service.ts`)
209
- - Agents construct absolute paths dynamically during execution
210
-
211
- **Step 3: Output Directory Setup**
212
- - Output directory: `.workflow/active/${sessionId}/.review/`
213
- - Create directory structure:
214
- ```bash
215
- mkdir -p ${sessionDir}/.review/{dimensions,iterations,reports}
216
- ```
217
-
218
- **Step 4: Initialize Review State**
219
- - State initialization: Create `review-state.json` with metadata, dimensions, max_iterations, resolved_files (merged metadata + state)
220
- - Progress tracking: Create `review-progress.json` for progress tracking
221
-
222
- **Step 5: TodoWrite Initialization**
223
- - Set up progress tracking with hierarchical structure
224
- - Mark Phase 1 completed, Phase 2 in_progress
225
-
226
- **Phase 2: Parallel Review Coordination**
227
- - Launch 7 @cli-explore-agent instances simultaneously (Deep Scan mode)
228
- - Pass dimension-specific context (template, timeout, custom focus, **target files**)
229
- - Monitor completion via review-progress.json updates
230
- - TodoWrite updates: Mark dimensions as completed
231
- - CLI tool fallback: Gemini → Qwen → Codex (on error/timeout)
232
-
233
- **Phase 3: Aggregation**
234
- - Load all dimension JSON files from dimensions/
235
- - Calculate severity distribution: Count by critical/high/medium/low
236
- - Identify cross-cutting concerns: Files in 3+ dimensions
237
- - Select deep-dive findings: Critical + high in critical files (max 5)
238
- - Decision logic: Iterate if critical > 0 OR high > 5 OR critical files exist
239
- - Update review-state.json with aggregation results
240
-
241
- **Phase 4: Iteration Control**
242
- - Check iteration count < max_iterations (default 3)
243
- - Launch deep-dive agents for selected findings
244
- - Collect remediation plans and re-assessed severities
245
- - Update severity distribution based on re-assessments
246
- - Record iteration in review-state.json
247
- - Loop back to aggregation if still have critical/high findings
248
-
249
- **Phase 5: Completion**
250
- - Finalize review-progress.json with completion statistics
251
- - Update review-state.json with completion_time and phase=complete
252
- - TodoWrite completion: Mark all tasks done
253
-
254
-
255
-
256
- ### Output File Structure
257
-
258
- ```
259
- .workflow/active/WFS-{session-id}/.review/
260
- ├── review-state.json # Orchestrator state machine (includes metadata)
261
- ├── review-progress.json # Real-time progress for dashboard
262
- ├── dimensions/ # Per-dimension results
263
- │ ├── security.json
264
- │ ├── architecture.json
265
- │ ├── quality.json
266
- │ ├── action-items.json
267
- │ ├── performance.json
268
- │ ├── maintainability.json
269
- │ └── best-practices.json
270
- ├── iterations/ # Deep-dive results
271
- │ ├── iteration-1-finding-{uuid}.json
272
- │ └── iteration-2-finding-{uuid}.json
273
- └── reports/ # Human-readable reports
274
- ├── security-analysis.md
275
- ├── security-cli-output.txt
276
- ├── deep-dive-1-{uuid}.md
277
- └── ...
278
- ```
279
-
280
- **Session Context**:
281
- ```
282
- .workflow/active/WFS-{session-id}/
283
- ├── workflow-session.json
284
- ├── IMPL_PLAN.md
285
- ├── TODO_LIST.md
286
- ├── .task/
287
- ├── .summaries/
288
- └── .review/ # Review results (this command)
289
- └── (structure above)
290
- ```
291
-
292
- ### Review State JSON
293
-
294
- **Purpose**: Unified state machine and metadata (merged from metadata + state)
295
-
296
- ```json
297
- {
298
- "review_id": "review-20250125-143022",
299
- "review_type": "module",
300
- "session_id": "WFS-auth-system",
301
- "metadata": {
302
- "created_at": "2025-01-25T14:30:22Z",
303
- "target_pattern": "src/auth/**",
304
- "resolved_files": [
305
- "src/auth/service.ts",
306
- "src/auth/validator.ts",
307
- "src/auth/middleware.ts"
308
- ],
309
- "dimensions": ["security", "architecture", "quality", "action-items", "performance", "maintainability", "best-practices"],
310
- "max_iterations": 3
311
- },
312
- "phase": "parallel|aggregate|iterate|complete",
313
- "current_iteration": 1,
314
- "dimensions_reviewed": ["security", "architecture", "quality", "action-items", "performance", "maintainability", "best-practices"],
315
- "selected_strategy": "comprehensive",
316
- "next_action": "execute_parallel_reviews|aggregate_findings|execute_deep_dive|generate_final_report|complete",
317
- "severity_distribution": {
318
- "critical": 2,
319
- "high": 5,
320
- "medium": 12,
321
- "low": 8
322
- },
323
- "critical_files": [...],
324
- "iterations": [...],
325
- "completion_criteria": {...}
326
- }
327
- ```
328
-
329
- ### Review Progress JSON
330
-
331
- **Purpose**: Real-time dashboard updates via polling
332
-
333
- ```json
334
- {
335
- "review_id": "review-20250125-143022",
336
- "last_update": "2025-01-25T14:35:10Z",
337
- "phase": "parallel|aggregate|iterate|complete",
338
- "current_iteration": 1,
339
- "progress": {
340
- "parallel_review": {
341
- "total_dimensions": 7,
342
- "completed": 5,
343
- "in_progress": 2,
344
- "percent_complete": 71
345
- },
346
- "deep_dive": {
347
- "total_findings": 6,
348
- "analyzed": 2,
349
- "in_progress": 1,
350
- "percent_complete": 33
351
- }
352
- },
353
- "agent_status": [
354
- {
355
- "agent_type": "review-agent",
356
- "dimension": "security",
357
- "status": "completed",
358
- "started_at": "2025-01-25T14:30:00Z",
359
- "completed_at": "2025-01-25T15:15:00Z",
360
- "duration_ms": 2700000
361
- },
362
- {
363
- "agent_type": "deep-dive-agent",
364
- "finding_id": "sec-001-uuid",
365
- "status": "in_progress",
366
- "started_at": "2025-01-25T14:32:00Z"
367
- }
368
- ],
369
- "estimated_completion": "2025-01-25T16:00:00Z"
370
- }
371
- ```
372
-
373
- ### Agent Output Schemas
374
-
375
- **Agent-produced JSON files follow standardized schemas**:
376
-
377
- 1. **Dimension Results** (cli-explore-agent output from parallel reviews)
378
- - Schema: `~/.claude/workflows/cli-templates/schemas/review-dimension-results-schema.json`
379
- - Output: `{output-dir}/dimensions/{dimension}.json`
380
- - Contains: findings array, summary statistics, cross_references
381
-
382
- 2. **Deep-Dive Results** (cli-explore-agent output from iterations)
383
- - Schema: `~/.claude/workflows/cli-templates/schemas/review-deep-dive-results-schema.json`
384
- - Output: `{output-dir}/iterations/iteration-{N}-finding-{uuid}.json`
385
- - Contains: root_cause, remediation_plan, impact_assessment, reassessed_severity
386
-
387
- ### Agent Invocation Template
388
-
389
- **Review Agent** (parallel execution, 7 instances):
390
-
391
- ```javascript
392
- Task(
393
- subagent_type="cli-explore-agent",
394
- run_in_background=false,
395
- description=`Execute ${dimension} review analysis via Deep Scan`,
396
- prompt=`
397
- ## Task Objective
398
- Conduct comprehensive ${dimension} code exploration and analysis using Deep Scan mode (Bash + Gemini dual-source strategy) for specified module files
399
-
400
- ## Analysis Mode Selection
401
- Use **Deep Scan mode** for this review:
402
- - Phase 1: Bash structural scan for standard patterns (classes, functions, imports)
403
- - Phase 2: Gemini semantic analysis for design intent, non-standard patterns, ${dimension}-specific concerns
404
- - Phase 3: Synthesis with attribution (bash-discovered vs gemini-discovered findings)
405
-
406
- ## MANDATORY FIRST STEPS (Execute by Agent)
407
- **You (cli-explore-agent) MUST execute these steps in order:**
408
- 1. Read review state: ${reviewStateJsonPath}
409
- 2. Get target files: Read resolved_files from review-state.json
410
- 3. Validate file access: bash(ls -la ${targetFiles.join(' ')})
411
- 4. Execute: cat ~/.claude/workflows/cli-templates/schemas/review-dimension-results-schema.json (get output schema reference)
412
- 5. Read: .workflow/project-tech.json (technology stack and architecture context)
413
- 6. Read: .workflow/project-guidelines.json (user-defined constraints and conventions to validate against)
414
-
415
- ## Review Context
416
- - Review Type: module (independent)
417
- - Review Dimension: ${dimension}
418
- - Review ID: ${reviewId}
419
- - Target Pattern: ${targetPattern}
420
- - Resolved Files: ${resolvedFiles.length} files
421
- - Output Directory: ${outputDir}
422
-
423
- ## CLI Configuration
424
- - Tool Priority: gemini → qwen → codex (fallback chain)
425
- - Custom Focus: ${customFocus || 'Standard dimension analysis'}
426
- - Mode: analysis (READ-ONLY)
427
- - Context Pattern: ${targetFiles.map(f => `@${f}`).join(' ')}
428
-
429
- ## Expected Deliverables
430
-
431
- **Schema Reference**: Schema obtained in MANDATORY FIRST STEPS step 4, follow schema exactly
432
-
433
- 1. Dimension Results JSON: ${outputDir}/dimensions/${dimension}.json
434
-
435
- **⚠️ CRITICAL JSON STRUCTURE REQUIREMENTS**:
436
-
437
- Root structure MUST be array: \`[{ ... }]\` NOT \`{ ... }\`
438
-
439
- Required top-level fields:
440
- - dimension, review_id, analysis_timestamp (NOT timestamp/analyzed_at)
441
- - cli_tool_used (gemini|qwen|codex), model, analysis_duration_ms
442
- - summary (FLAT structure), findings, cross_references
443
-
444
- Summary MUST be FLAT (NOT nested by_severity):
445
- \`{ "total_findings": N, "critical": N, "high": N, "medium": N, "low": N, "files_analyzed": N, "lines_reviewed": N }\`
446
-
447
- Finding required fields:
448
- - id: format \`{dim}-{seq}-{uuid8}\` e.g., \`sec-001-a1b2c3d4\` (lowercase)
449
- - severity: lowercase only (critical|high|medium|low)
450
- - snippet (NOT code_snippet), impact (NOT exploit_scenario)
451
- - metadata, iteration (0), status (pending_remediation), cross_references
452
-
453
- 2. Analysis Report: ${outputDir}/reports/${dimension}-analysis.md
454
- - Human-readable summary with recommendations
455
- - Grouped by severity: critical → high → medium → low
456
- - Include file:line references for all findings
457
-
458
- 3. CLI Output Log: ${outputDir}/reports/${dimension}-cli-output.txt
459
- - Raw CLI tool output for debugging
460
- - Include full analysis text
461
-
462
- ## Dimension-Specific Guidance
463
- ${getDimensionGuidance(dimension)}
464
-
465
- ## Success Criteria
466
- - [ ] Schema obtained via cat review-dimension-results-schema.json
467
- - [ ] All target files analyzed for ${dimension} concerns
468
- - [ ] All findings include file:line references with code snippets
469
- - [ ] Severity assessment follows established criteria (see reference)
470
- - [ ] Recommendations are actionable with code examples
471
- - [ ] JSON output follows schema exactly
472
- - [ ] Report is comprehensive and well-organized
473
- `
474
- )
475
- ```
476
-
477
- **Deep-Dive Agent** (iteration execution):
478
-
479
- ```javascript
480
- Task(
481
- subagent_type="cli-explore-agent",
482
- run_in_background=false,
483
- description=`Deep-dive analysis for critical finding: ${findingTitle} via Dependency Map + Deep Scan`,
484
- prompt=`
485
- ## Task Objective
486
- Perform focused root cause analysis using Dependency Map mode (for impact analysis) + Deep Scan mode (for semantic understanding) to generate comprehensive remediation plan for critical ${dimension} issue
487
-
488
- ## Analysis Mode Selection
489
- Use **Dependency Map mode** first to understand dependencies:
490
- - Build dependency graph around ${file} to identify affected components
491
- - Detect circular dependencies or tight coupling related to this finding
492
- - Calculate change risk scores for remediation impact
493
-
494
- Then apply **Deep Scan mode** for semantic analysis:
495
- - Understand design intent and architectural context
496
- - Identify non-standard patterns or implicit dependencies
497
- - Extract remediation insights from code structure
498
-
499
- ## Finding Context
500
- - Finding ID: ${findingId}
501
- - Original Dimension: ${dimension}
502
- - Title: ${findingTitle}
503
- - File: ${file}:${line}
504
- - Severity: ${severity}
505
- - Category: ${category}
506
- - Original Description: ${description}
507
- - Iteration: ${iteration}
508
-
509
- ## MANDATORY FIRST STEPS (Execute by Agent)
510
- **You (cli-explore-agent) MUST execute these steps in order:**
511
- 1. Read original finding: ${dimensionJsonPath}
512
- 2. Read affected file: ${file}
513
- 3. Identify related code: bash(grep -r "import.*${basename(file)}" ${projectDir}/src --include="*.ts")
514
- 4. Read test files: bash(find ${projectDir}/tests -name "*${basename(file, '.ts')}*" -type f)
515
- 5. Execute: cat ~/.claude/workflows/cli-templates/schemas/review-deep-dive-results-schema.json (get output schema reference)
516
- 6. Read: .workflow/project-tech.json (technology stack and architecture context)
517
- 7. Read: .workflow/project-guidelines.json (user-defined constraints for remediation compliance)
518
-
519
- ## CLI Configuration
520
- - Tool Priority: gemini → qwen → codex
521
- - Template: ~/.claude/workflows/cli-templates/prompts/analysis/01-diagnose-bug-root-cause.txt
522
- - Mode: analysis (READ-ONLY)
523
-
524
- ## Expected Deliverables
525
-
526
- **Schema Reference**: Schema obtained in MANDATORY FIRST STEPS step 5, follow schema exactly
527
-
528
- 1. Deep-Dive Results JSON: ${outputDir}/iterations/iteration-${iteration}-finding-${findingId}.json
529
-
530
- **⚠️ CRITICAL JSON STRUCTURE REQUIREMENTS**:
531
-
532
- Root structure MUST be array: \`[{ ... }]\` NOT \`{ ... }\`
533
-
534
- Required top-level fields:
535
- - finding_id, dimension, iteration, analysis_timestamp
536
- - cli_tool_used, model, analysis_duration_ms
537
- - original_finding, root_cause, remediation_plan
538
- - impact_assessment, reassessed_severity, confidence_score, cross_references
539
-
540
- All nested objects must follow schema exactly - read schema for field names
541
-
542
- 2. Analysis Report: ${outputDir}/reports/deep-dive-${iteration}-${findingId}.md
543
- - Detailed root cause analysis
544
- - Step-by-step remediation plan
545
- - Impact assessment and rollback strategy
546
-
547
- ## Success Criteria
548
- - [ ] Schema obtained via cat review-deep-dive-results-schema.json
549
- - [ ] Root cause clearly identified with supporting evidence
550
- - [ ] Remediation plan is step-by-step actionable with exact file:line references
551
- - [ ] Each step includes specific commands and validation tests
552
- - [ ] Impact fully assessed (files, tests, breaking changes, dependencies)
553
- - [ ] Severity re-evaluation justified with evidence
554
- - [ ] Confidence score accurately reflects certainty of analysis
555
- - [ ] JSON output follows schema exactly
556
- - [ ] References include project-specific and external documentation
557
- `
558
- )
559
- ```
560
-
561
- ### Dimension Guidance Reference
562
-
563
- ```javascript
564
- function getDimensionGuidance(dimension) {
565
- const guidance = {
566
- security: `
567
- Focus Areas:
568
- - Input validation and sanitization
569
- - Authentication and authorization mechanisms
570
- - Data encryption (at-rest and in-transit)
571
- - SQL/NoSQL injection vulnerabilities
572
- - XSS, CSRF, and other web vulnerabilities
573
- - Sensitive data exposure
574
- - Access control and privilege escalation
575
-
576
- Severity Criteria:
577
- - Critical: Authentication bypass, SQL injection, RCE, sensitive data exposure
578
- - High: Missing authorization checks, weak encryption, exposed secrets
579
- - Medium: Missing input validation, insecure defaults, weak password policies
580
- - Low: Security headers missing, verbose error messages, outdated dependencies
581
- `,
582
- architecture: `
583
- Focus Areas:
584
- - Layering and separation of concerns
585
- - Coupling and cohesion
586
- - Design pattern adherence
587
- - Dependency management
588
- - Scalability and extensibility
589
- - Module boundaries
590
- - API design consistency
591
-
592
- Severity Criteria:
593
- - Critical: Circular dependencies, god objects, tight coupling across layers
594
- - High: Violated architectural principles, scalability bottlenecks
595
- - Medium: Missing abstractions, inconsistent patterns, suboptimal design
596
- - Low: Minor coupling issues, documentation gaps, naming inconsistencies
597
- `,
598
- quality: `
599
- Focus Areas:
600
- - Code duplication
601
- - Complexity (cyclomatic, cognitive)
602
- - Naming conventions
603
- - Error handling patterns
604
- - Code readability
605
- - Comment quality
606
- - Dead code
607
-
608
- Severity Criteria:
609
- - Critical: Severe complexity (CC > 20), massive duplication (>50 lines)
610
- - High: High complexity (CC > 10), significant duplication, poor error handling
611
- - Medium: Moderate complexity (CC > 5), naming issues, code smells
612
- - Low: Minor duplication, documentation gaps, cosmetic issues
613
- `,
614
- 'action-items': `
615
- Focus Areas:
616
- - Requirements coverage verification
617
- - Acceptance criteria met
618
- - Documentation completeness
619
- - Deployment readiness
620
- - Missing functionality
621
- - Test coverage gaps
622
- - Configuration management
623
-
624
- Severity Criteria:
625
- - Critical: Core requirements not met, deployment blockers
626
- - High: Significant functionality missing, acceptance criteria not met
627
- - Medium: Minor requirements gaps, documentation incomplete
628
- - Low: Nice-to-have features missing, minor documentation gaps
629
- `,
630
- performance: `
631
- Focus Areas:
632
- - N+1 query problems
633
- - Inefficient algorithms (O(n²) where O(n log n) possible)
634
- - Memory leaks
635
- - Blocking operations on main thread
636
- - Missing caching opportunities
637
- - Resource usage (CPU, memory, network)
638
- - Database query optimization
639
-
640
- Severity Criteria:
641
- - Critical: Memory leaks, O(n²) in hot path, blocking main thread
642
- - High: N+1 queries, missing indexes, inefficient algorithms
643
- - Medium: Suboptimal caching, unnecessary computations, lazy loading issues
644
- - Low: Minor optimization opportunities, redundant operations
645
- `,
646
- maintainability: `
647
- Focus Areas:
648
- - Technical debt indicators
649
- - Magic numbers and hardcoded values
650
- - Long methods (>50 lines)
651
- - Large classes (>500 lines)
652
- - Dead code and commented code
653
- - Code documentation
654
- - Test coverage
655
-
656
- Severity Criteria:
657
- - Critical: Massive methods (>200 lines), severe technical debt blocking changes
658
- - High: Large methods (>100 lines), significant dead code, undocumented complex logic
659
- - Medium: Magic numbers, moderate technical debt, missing tests
660
- - Low: Minor refactoring opportunities, cosmetic improvements
661
- `,
662
- 'best-practices': `
663
- Focus Areas:
664
- - Framework conventions adherence
665
- - Language idioms
666
- - Anti-patterns
667
- - Deprecated API usage
668
- - Coding standards compliance
669
- - Error handling patterns
670
- - Logging and monitoring
671
-
672
- Severity Criteria:
673
- - Critical: Severe anti-patterns, deprecated APIs with security risks
674
- - High: Major convention violations, poor error handling, missing logging
675
- - Medium: Minor anti-patterns, style inconsistencies, suboptimal patterns
676
- - Low: Cosmetic style issues, minor convention deviations
677
- `
678
- };
679
-
680
- return guidance[dimension] || 'Standard code review analysis';
681
- }
682
- ```
683
-
684
- ### Completion Conditions
685
-
686
- **Full Success**:
687
- - All dimensions reviewed
688
- - Critical findings = 0
689
- - High findings ≤ 5
690
- - Action: Generate final report, mark phase=complete
691
-
692
- **Partial Success**:
693
- - All dimensions reviewed
694
- - Max iterations reached
695
- - Still have critical/high findings
696
- - Action: Generate report with warnings, recommend follow-up
697
-
698
- ### Error Handling
699
-
700
- **Phase-Level Error Matrix**:
701
-
702
- | Phase | Error | Blocking? | Action |
703
- |-------|-------|-----------|--------|
704
- | Phase 1 | Invalid path pattern | Yes | Error and exit |
705
- | Phase 1 | No files matched | Yes | Error and exit |
706
- | Phase 1 | Files not readable | Yes | Error and exit |
707
- | Phase 2 | Single dimension fails | No | Log warning, continue other dimensions |
708
- | Phase 2 | All dimensions fail | Yes | Error and exit |
709
- | Phase 3 | Missing dimension JSON | No | Skip in aggregation, log warning |
710
- | Phase 4 | Deep-dive agent fails | No | Skip finding, continue others |
711
- | Phase 4 | Max iterations reached | No | Generate partial report |
712
-
713
- **CLI Fallback Chain**: Gemini → Qwen → Codex → degraded mode
714
-
715
- **Fallback Triggers**:
716
- 1. HTTP 429, 5xx errors, connection timeout
717
- 2. Invalid JSON output (parse error, missing required fields)
718
- 3. Low confidence score < 0.4
719
- 4. Analysis too brief (< 100 words in report)
720
-
721
- **Fallback Behavior**:
722
- - On trigger: Retry with next tool in chain
723
- - After Codex fails: Enter degraded mode (skip analysis, log error)
724
- - Degraded mode: Continue workflow with available results
725
-
726
- ### TodoWrite Structure
727
-
728
- ```javascript
729
- TodoWrite({
730
- todos: [
731
- { content: "Phase 1: Discovery & Initialization", status: "completed", activeForm: "Initializing" },
732
- { content: "Phase 2: Parallel Reviews (7 dimensions)", status: "in_progress", activeForm: "Reviewing" },
733
- { content: " → Security review", status: "in_progress", activeForm: "Analyzing security" },
734
- // ... other dimensions as sub-items
735
- { content: "Phase 3: Aggregation", status: "pending", activeForm: "Aggregating" },
736
- { content: "Phase 4: Deep-dive", status: "pending", activeForm: "Deep-diving" },
737
- { content: "Phase 5: Completion", status: "pending", activeForm: "Completing" }
738
- ]
739
- });
740
- ```
741
-
742
- ## Best Practices
743
-
744
- 1. **Start Specific**: Begin with focused module patterns for faster results
745
- 2. **Expand Gradually**: Add more modules based on initial findings
746
- 3. **Use Glob Wisely**: `src/auth/**` is more efficient than `src/**` with lots of irrelevant files
747
- 4. **Trust Aggregation Logic**: Auto-selection based on proven heuristics
748
- 5. **Monitor Logs**: Check reports/ directory for CLI analysis insights
749
-
750
- ## Related Commands
751
-
752
- ### View Review Progress
753
- Use `ccw view` to open the review dashboard in browser:
754
-
755
- ```bash
756
- ccw view
757
- ```
758
-
759
- ### Automated Fix Workflow
760
- After completing a module review, use the generated findings JSON for automated fixing:
761
-
762
- ```bash
763
- # Step 1: Complete review (this command)
764
- /workflow:review-module-cycle src/auth/**
765
-
766
- # Step 2: Run automated fixes using dimension findings
767
- /workflow:review-fix .workflow/active/WFS-{session-id}/.review/
768
- ```
769
-
770
- See `/workflow:review-fix` for automated fixing with smart grouping, parallel execution, and test verification.
771
-
1
+ ---
2
+ name: review-module-cycle
3
+ description: Independent multi-dimensional code review for specified modules/files. Analyzes specific code paths across 7 dimensions with hybrid parallel-iterative execution, independent of workflow sessions.
4
+ argument-hint: "<path-pattern> [--dimensions=security,architecture,...] [--max-iterations=N]"
5
+ allowed-tools: SlashCommand(*), TodoWrite(*), Read(*), Bash(*), Task(*)
6
+ ---
7
+
8
+ # Workflow Review-Module-Cycle Command
9
+
10
+ ## Quick Start
11
+
12
+ ```bash
13
+ # Review specific module (all 7 dimensions)
14
+ /workflow:review-module-cycle src/auth/**
15
+
16
+ # Review multiple modules
17
+ /workflow:review-module-cycle src/auth/**,src/payment/**
18
+
19
+ # Review with custom dimensions
20
+ /workflow:review-module-cycle src/payment/** --dimensions=security,architecture,quality
21
+
22
+ # Review specific files
23
+ /workflow:review-module-cycle src/payment/processor.ts,src/payment/validator.ts
24
+ ```
25
+
26
+ **Review Scope**: Specified modules/files only (independent of git history)
27
+ **Session Requirement**: Auto-creates workflow session via `/workflow:session:start`
28
+ **Output Directory**: `.workflow/active/WFS-{session-id}/.review/` (session-based)
29
+ **Default Dimensions**: Security, Architecture, Quality, Action-Items, Performance, Maintainability, Best-Practices
30
+ **Max Iterations**: 3 (adjustable via --max-iterations)
31
+ **Default Iterations**: 1 (deep-dive runs once; use --max-iterations=0 to skip)
32
+ **CLI Tools**: Gemini → Qwen → Codex (fallback chain)
33
+
34
+ ## What & Why
35
+
36
+ ### Core Concept
37
+ Independent multi-dimensional code review orchestrator with **hybrid parallel-iterative execution** for comprehensive quality assessment of **specific modules or files**.
38
+
39
+ **Review Scope**:
40
+ - **Module-based**: Reviews specified file patterns (e.g., `src/auth/**`, `*.ts`)
41
+ - **Session-integrated**: Runs within workflow session context for unified tracking
42
+ - **Output location**: `.review/` subdirectory within active session
43
+
44
+ **vs Session Review**:
45
+ - **Session Review** (`review-session-cycle`): Reviews git changes within a workflow session
46
+ - **Module Review** (`review-module-cycle`): Reviews any specified code paths, regardless of git history
47
+ - **Common output**: Both use same `.review/` directory structure within session
48
+
49
+ ### Value Proposition
50
+ 1. **Module-Focused Review**: Target specific code areas independent of git history
51
+ 2. **Session-Integrated**: Review results tracked within workflow session for unified management
52
+ 3. **Comprehensive Coverage**: Same 7 specialized dimensions as session review
53
+ 4. **Intelligent Prioritization**: Automatic identification of critical issues and cross-cutting concerns
54
+ 5. **Unified Archive**: Review results archived with session for historical reference
55
+
56
+ ### Orchestrator Boundary (CRITICAL)
57
+ - **ONLY command** for independent multi-dimensional module review
58
+ - Manages: dimension coordination, aggregation, iteration control, progress tracking
59
+ - Delegates: Code exploration and analysis to @cli-explore-agent, dimension-specific reviews via Deep Scan mode
60
+
61
+ ## How It Works
62
+
63
+ ### Execution Flow
64
+
65
+ ```
66
+ Phase 1: Discovery & Initialization
67
+ └─ Resolve file patterns, validate paths, initialize state, create output structure
68
+
69
+ Phase 2: Parallel Reviews (for each dimension)
70
+ ├─ Launch 7 review agents simultaneously
71
+ ├─ Each executes CLI analysis via Gemini/Qwen on specified files
72
+ ├─ Generate dimension JSON + markdown reports
73
+ └─ Update review-progress.json
74
+
75
+ Phase 3: Aggregation
76
+ ├─ Load all dimension JSON files
77
+ ├─ Calculate severity distribution (critical/high/medium/low)
78
+ ├─ Identify cross-cutting concerns (files in 3+ dimensions)
79
+ └─ Decision:
80
+ ├─ Critical findings OR high > 5 OR critical files → Phase 4 (Iterate)
81
+ └─ Else → Phase 5 (Complete)
82
+
83
+ Phase 4: Iterative Deep-Dive (optional)
84
+ ├─ Select critical findings (max 5 per iteration)
85
+ ├─ Launch deep-dive agents for root cause analysis
86
+ ├─ Generate remediation plans with impact assessment
87
+ ├─ Re-assess severity based on analysis
88
+ └─ Loop until no critical findings OR max iterations
89
+
90
+ Phase 5: Completion
91
+ └─ Finalize review-progress.json
92
+ ```
93
+
94
+ ### Agent Roles
95
+
96
+ | Agent | Responsibility |
97
+ |-------|---------------|
98
+ | **Orchestrator** | Phase control, path resolution, state management, aggregation logic, iteration control |
99
+ | **@cli-explore-agent** (Review) | Execute dimension-specific code analysis via Deep Scan mode, generate findings JSON with dual-source strategy (Bash + Gemini), create structured analysis reports |
100
+ | **@cli-explore-agent** (Deep-dive) | Focused root cause analysis using dependency mapping, remediation planning with architectural insights, impact assessment, severity re-assessment |
101
+
102
+ ## Enhanced Features
103
+
104
+ ### 1. Review Dimensions Configuration
105
+
106
+ **7 Specialized Dimensions** with priority-based allocation:
107
+
108
+ | Dimension | Template | Priority | Timeout |
109
+ |-----------|----------|----------|---------|
110
+ | **Security** | 03-assess-security-risks.txt | 1 (Critical) | 60min |
111
+ | **Architecture** | 02-review-architecture.txt | 2 (High) | 60min |
112
+ | **Quality** | 02-review-code-quality.txt | 3 (Medium) | 40min |
113
+ | **Action-Items** | 02-analyze-code-patterns.txt | 2 (High) | 40min |
114
+ | **Performance** | 03-analyze-performance.txt | 3 (Medium) | 60min |
115
+ | **Maintainability** | 02-review-code-quality.txt* | 3 (Medium) | 40min |
116
+ | **Best-Practices** | 03-review-quality-standards.txt | 3 (Medium) | 40min |
117
+
118
+ *Custom focus: "Assess technical debt and maintainability"
119
+
120
+ **Category Definitions by Dimension**:
121
+
122
+ ```javascript
123
+ const CATEGORIES = {
124
+ security: ['injection', 'authentication', 'authorization', 'encryption', 'input-validation', 'access-control', 'data-exposure'],
125
+ architecture: ['coupling', 'cohesion', 'layering', 'dependency', 'pattern-violation', 'scalability', 'separation-of-concerns'],
126
+ quality: ['code-smell', 'duplication', 'complexity', 'naming', 'error-handling', 'testability', 'readability'],
127
+ 'action-items': ['requirement-coverage', 'acceptance-criteria', 'documentation', 'deployment-readiness', 'missing-functionality'],
128
+ performance: ['n-plus-one', 'inefficient-query', 'memory-leak', 'blocking-operation', 'caching', 'resource-usage'],
129
+ maintainability: ['technical-debt', 'magic-number', 'long-method', 'large-class', 'dead-code', 'commented-code'],
130
+ 'best-practices': ['convention-violation', 'anti-pattern', 'deprecated-api', 'missing-validation', 'inconsistent-style']
131
+ };
132
+ ```
133
+
134
+ ### 2. Path Pattern Resolution
135
+
136
+ **Syntax Rules**:
137
+ - All paths are **relative** from project root (e.g., `src/auth/**` not `/src/auth/**`)
138
+ - Multiple patterns: comma-separated, **no spaces** (e.g., `src/auth/**,src/payment/**`)
139
+ - Glob and specific files can be mixed (e.g., `src/auth/**,src/config.ts`)
140
+
141
+ **Supported Patterns**:
142
+ | Pattern Type | Example | Description |
143
+ |--------------|---------|-------------|
144
+ | Glob directory | `src/auth/**` | All files under src/auth/ |
145
+ | Glob with extension | `src/**/*.ts` | All .ts files under src/ |
146
+ | Specific file | `src/payment/processor.ts` | Single file |
147
+ | Multiple patterns | `src/auth/**,src/payment/**` | Comma-separated (no spaces) |
148
+
149
+ **Resolution Process**:
150
+ 1. Parse input pattern (split by comma, trim whitespace)
151
+ 2. Expand glob patterns to file list via `find` command
152
+ 3. Validate all files exist and are readable
153
+ 4. Error if pattern matches 0 files
154
+ 5. Store resolved file list in review-state.json
155
+
156
+ ### 3. Aggregation Logic
157
+
158
+ **Cross-Cutting Concern Detection**:
159
+ 1. Files appearing in 3+ dimensions = **Critical Files**
160
+ 2. Same issue pattern across dimensions = **Systemic Issue**
161
+ 3. Severity clustering in specific files = **Hotspots**
162
+
163
+ **Deep-Dive Selection Criteria**:
164
+ - All critical severity findings (priority 1)
165
+ - Top 3 high-severity findings in critical files (priority 2)
166
+ - Max 5 findings per iteration (prevent overwhelm)
167
+
168
+ ### 4. Severity Assessment
169
+
170
+ **Severity Levels**:
171
+ - **Critical**: Security vulnerabilities, data corruption risks, system-wide failures, authentication/authorization bypass
172
+ - **High**: Feature degradation, performance bottlenecks, architecture violations, significant technical debt
173
+ - **Medium**: Code smells, minor performance issues, style inconsistencies, maintainability concerns
174
+ - **Low**: Documentation gaps, minor refactoring opportunities, cosmetic issues
175
+
176
+ **Iteration Trigger**:
177
+ - Critical findings > 0 OR
178
+ - High findings > 5 OR
179
+ - Critical files count > 0
180
+
181
+ ## Core Responsibilities
182
+
183
+ ### Orchestrator
184
+
185
+ **Phase 1: Discovery & Initialization**
186
+
187
+ **Step 1: Session Creation**
188
+ ```javascript
189
+ // Create workflow session for this review (type: review)
190
+ SlashCommand(command="/workflow:session:start --type review \"Code review for [target_pattern]\"")
191
+
192
+ // Parse output
193
+ const sessionId = output.match(/SESSION_ID: (WFS-[^\s]+)/)[1];
194
+ ```
195
+
196
+ **Step 2: Path Resolution & Validation**
197
+ ```bash
198
+ # Expand glob pattern to file list (relative paths from project root)
199
+ find . -path "./src/auth/**" -type f | sed 's|^\./||'
200
+
201
+ # Validate files exist and are readable
202
+ for file in ${resolvedFiles[@]}; do
203
+ test -r "$file" || error "File not readable: $file"
204
+ done
205
+ ```
206
+ - Parse and expand file patterns (glob support): `src/auth/**` → actual file list
207
+ - Validation: Ensure all specified files exist and are readable
208
+ - Store as **relative paths** from project root (e.g., `src/auth/service.ts`)
209
+ - Agents construct absolute paths dynamically during execution
210
+
211
+ **Step 3: Output Directory Setup**
212
+ - Output directory: `.workflow/active/${sessionId}/.review/`
213
+ - Create directory structure:
214
+ ```bash
215
+ mkdir -p ${sessionDir}/.review/{dimensions,iterations,reports}
216
+ ```
217
+
218
+ **Step 4: Initialize Review State**
219
+ - State initialization: Create `review-state.json` with metadata, dimensions, max_iterations, resolved_files (merged metadata + state)
220
+ - Progress tracking: Create `review-progress.json` for progress tracking
221
+
222
+ **Step 5: TodoWrite Initialization**
223
+ - Set up progress tracking with hierarchical structure
224
+ - Mark Phase 1 completed, Phase 2 in_progress
225
+
226
+ **Phase 2: Parallel Review Coordination**
227
+ - Launch 7 @cli-explore-agent instances simultaneously (Deep Scan mode)
228
+ - Pass dimension-specific context (template, timeout, custom focus, **target files**)
229
+ - Monitor completion via review-progress.json updates
230
+ - TodoWrite updates: Mark dimensions as completed
231
+ - CLI tool fallback: Gemini → Qwen → Codex (on error/timeout)
232
+
233
+ **Phase 3: Aggregation**
234
+ - Load all dimension JSON files from dimensions/
235
+ - Calculate severity distribution: Count by critical/high/medium/low
236
+ - Identify cross-cutting concerns: Files in 3+ dimensions
237
+ - Select deep-dive findings: Critical + high in critical files (max 5)
238
+ - Decision logic: Iterate if critical > 0 OR high > 5 OR critical files exist
239
+ - Update review-state.json with aggregation results
240
+
241
+ **Phase 4: Iteration Control**
242
+ - Check iteration count < max_iterations (default 3)
243
+ - Launch deep-dive agents for selected findings
244
+ - Collect remediation plans and re-assessed severities
245
+ - Update severity distribution based on re-assessments
246
+ - Record iteration in review-state.json
247
+ - Loop back to aggregation if still have critical/high findings
248
+
249
+ **Phase 5: Completion**
250
+ - Finalize review-progress.json with completion statistics
251
+ - Update review-state.json with completion_time and phase=complete
252
+ - TodoWrite completion: Mark all tasks done
253
+
254
+
255
+
256
+ ### Output File Structure
257
+
258
+ ```
259
+ .workflow/active/WFS-{session-id}/.review/
260
+ ├── review-state.json # Orchestrator state machine (includes metadata)
261
+ ├── review-progress.json # Real-time progress for dashboard
262
+ ├── dimensions/ # Per-dimension results
263
+ │ ├── security.json
264
+ │ ├── architecture.json
265
+ │ ├── quality.json
266
+ │ ├── action-items.json
267
+ │ ├── performance.json
268
+ │ ├── maintainability.json
269
+ │ └── best-practices.json
270
+ ├── iterations/ # Deep-dive results
271
+ │ ├── iteration-1-finding-{uuid}.json
272
+ │ └── iteration-2-finding-{uuid}.json
273
+ └── reports/ # Human-readable reports
274
+ ├── security-analysis.md
275
+ ├── security-cli-output.txt
276
+ ├── deep-dive-1-{uuid}.md
277
+ └── ...
278
+ ```
279
+
280
+ **Session Context**:
281
+ ```
282
+ .workflow/active/WFS-{session-id}/
283
+ ├── workflow-session.json
284
+ ├── IMPL_PLAN.md
285
+ ├── TODO_LIST.md
286
+ ├── .task/
287
+ ├── .summaries/
288
+ └── .review/ # Review results (this command)
289
+ └── (structure above)
290
+ ```
291
+
292
+ ### Review State JSON
293
+
294
+ **Purpose**: Unified state machine and metadata (merged from metadata + state)
295
+
296
+ ```json
297
+ {
298
+ "review_id": "review-20250125-143022",
299
+ "review_type": "module",
300
+ "session_id": "WFS-auth-system",
301
+ "metadata": {
302
+ "created_at": "2025-01-25T14:30:22Z",
303
+ "target_pattern": "src/auth/**",
304
+ "resolved_files": [
305
+ "src/auth/service.ts",
306
+ "src/auth/validator.ts",
307
+ "src/auth/middleware.ts"
308
+ ],
309
+ "dimensions": ["security", "architecture", "quality", "action-items", "performance", "maintainability", "best-practices"],
310
+ "max_iterations": 3
311
+ },
312
+ "phase": "parallel|aggregate|iterate|complete",
313
+ "current_iteration": 1,
314
+ "dimensions_reviewed": ["security", "architecture", "quality", "action-items", "performance", "maintainability", "best-practices"],
315
+ "selected_strategy": "comprehensive",
316
+ "next_action": "execute_parallel_reviews|aggregate_findings|execute_deep_dive|generate_final_report|complete",
317
+ "severity_distribution": {
318
+ "critical": 2,
319
+ "high": 5,
320
+ "medium": 12,
321
+ "low": 8
322
+ },
323
+ "critical_files": [...],
324
+ "iterations": [...],
325
+ "completion_criteria": {...}
326
+ }
327
+ ```
328
+
329
+ ### Review Progress JSON
330
+
331
+ **Purpose**: Real-time dashboard updates via polling
332
+
333
+ ```json
334
+ {
335
+ "review_id": "review-20250125-143022",
336
+ "last_update": "2025-01-25T14:35:10Z",
337
+ "phase": "parallel|aggregate|iterate|complete",
338
+ "current_iteration": 1,
339
+ "progress": {
340
+ "parallel_review": {
341
+ "total_dimensions": 7,
342
+ "completed": 5,
343
+ "in_progress": 2,
344
+ "percent_complete": 71
345
+ },
346
+ "deep_dive": {
347
+ "total_findings": 6,
348
+ "analyzed": 2,
349
+ "in_progress": 1,
350
+ "percent_complete": 33
351
+ }
352
+ },
353
+ "agent_status": [
354
+ {
355
+ "agent_type": "review-agent",
356
+ "dimension": "security",
357
+ "status": "completed",
358
+ "started_at": "2025-01-25T14:30:00Z",
359
+ "completed_at": "2025-01-25T15:15:00Z",
360
+ "duration_ms": 2700000
361
+ },
362
+ {
363
+ "agent_type": "deep-dive-agent",
364
+ "finding_id": "sec-001-uuid",
365
+ "status": "in_progress",
366
+ "started_at": "2025-01-25T14:32:00Z"
367
+ }
368
+ ],
369
+ "estimated_completion": "2025-01-25T16:00:00Z"
370
+ }
371
+ ```
372
+
373
+ ### Agent Output Schemas
374
+
375
+ **Agent-produced JSON files follow standardized schemas**:
376
+
377
+ 1. **Dimension Results** (cli-explore-agent output from parallel reviews)
378
+ - Schema: `~/.claude/workflows/cli-templates/schemas/review-dimension-results-schema.json`
379
+ - Output: `{output-dir}/dimensions/{dimension}.json`
380
+ - Contains: findings array, summary statistics, cross_references
381
+
382
+ 2. **Deep-Dive Results** (cli-explore-agent output from iterations)
383
+ - Schema: `~/.claude/workflows/cli-templates/schemas/review-deep-dive-results-schema.json`
384
+ - Output: `{output-dir}/iterations/iteration-{N}-finding-{uuid}.json`
385
+ - Contains: root_cause, remediation_plan, impact_assessment, reassessed_severity
386
+
387
+ ### Agent Invocation Template
388
+
389
+ **Review Agent** (parallel execution, 7 instances):
390
+
391
+ ```javascript
392
+ Task(
393
+ subagent_type="cli-explore-agent",
394
+ run_in_background=false,
395
+ description=`Execute ${dimension} review analysis via Deep Scan`,
396
+ prompt=`
397
+ ## Task Objective
398
+ Conduct comprehensive ${dimension} code exploration and analysis using Deep Scan mode (Bash + Gemini dual-source strategy) for specified module files
399
+
400
+ ## Analysis Mode Selection
401
+ Use **Deep Scan mode** for this review:
402
+ - Phase 1: Bash structural scan for standard patterns (classes, functions, imports)
403
+ - Phase 2: Gemini semantic analysis for design intent, non-standard patterns, ${dimension}-specific concerns
404
+ - Phase 3: Synthesis with attribution (bash-discovered vs gemini-discovered findings)
405
+
406
+ ## MANDATORY FIRST STEPS (Execute by Agent)
407
+ **You (cli-explore-agent) MUST execute these steps in order:**
408
+ 1. Read review state: ${reviewStateJsonPath}
409
+ 2. Get target files: Read resolved_files from review-state.json
410
+ 3. Validate file access: bash(ls -la ${targetFiles.join(' ')})
411
+ 4. Execute: cat ~/.claude/workflows/cli-templates/schemas/review-dimension-results-schema.json (get output schema reference)
412
+ 5. Read: .workflow/project-tech.json (technology stack and architecture context)
413
+ 6. Read: .workflow/project-guidelines.json (user-defined constraints and conventions to validate against)
414
+
415
+ ## Review Context
416
+ - Review Type: module (independent)
417
+ - Review Dimension: ${dimension}
418
+ - Review ID: ${reviewId}
419
+ - Target Pattern: ${targetPattern}
420
+ - Resolved Files: ${resolvedFiles.length} files
421
+ - Output Directory: ${outputDir}
422
+
423
+ ## CLI Configuration
424
+ - Tool Priority: gemini → qwen → codex (fallback chain)
425
+ - Custom Focus: ${customFocus || 'Standard dimension analysis'}
426
+ - Mode: analysis (READ-ONLY)
427
+ - Context Pattern: ${targetFiles.map(f => `@${f}`).join(' ')}
428
+
429
+ ## Expected Deliverables
430
+
431
+ **Schema Reference**: Schema obtained in MANDATORY FIRST STEPS step 4, follow schema exactly
432
+
433
+ 1. Dimension Results JSON: ${outputDir}/dimensions/${dimension}.json
434
+
435
+ **⚠️ CRITICAL JSON STRUCTURE REQUIREMENTS**:
436
+
437
+ Root structure MUST be array: \`[{ ... }]\` NOT \`{ ... }\`
438
+
439
+ Required top-level fields:
440
+ - dimension, review_id, analysis_timestamp (NOT timestamp/analyzed_at)
441
+ - cli_tool_used (gemini|qwen|codex), model, analysis_duration_ms
442
+ - summary (FLAT structure), findings, cross_references
443
+
444
+ Summary MUST be FLAT (NOT nested by_severity):
445
+ \`{ "total_findings": N, "critical": N, "high": N, "medium": N, "low": N, "files_analyzed": N, "lines_reviewed": N }\`
446
+
447
+ Finding required fields:
448
+ - id: format \`{dim}-{seq}-{uuid8}\` e.g., \`sec-001-a1b2c3d4\` (lowercase)
449
+ - severity: lowercase only (critical|high|medium|low)
450
+ - snippet (NOT code_snippet), impact (NOT exploit_scenario)
451
+ - metadata, iteration (0), status (pending_remediation), cross_references
452
+
453
+ 2. Analysis Report: ${outputDir}/reports/${dimension}-analysis.md
454
+ - Human-readable summary with recommendations
455
+ - Grouped by severity: critical → high → medium → low
456
+ - Include file:line references for all findings
457
+
458
+ 3. CLI Output Log: ${outputDir}/reports/${dimension}-cli-output.txt
459
+ - Raw CLI tool output for debugging
460
+ - Include full analysis text
461
+
462
+ ## Dimension-Specific Guidance
463
+ ${getDimensionGuidance(dimension)}
464
+
465
+ ## Success Criteria
466
+ - [ ] Schema obtained via cat review-dimension-results-schema.json
467
+ - [ ] All target files analyzed for ${dimension} concerns
468
+ - [ ] All findings include file:line references with code snippets
469
+ - [ ] Severity assessment follows established criteria (see reference)
470
+ - [ ] Recommendations are actionable with code examples
471
+ - [ ] JSON output follows schema exactly
472
+ - [ ] Report is comprehensive and well-organized
473
+ `
474
+ )
475
+ ```
476
+
477
+ **Deep-Dive Agent** (iteration execution):
478
+
479
+ ```javascript
480
+ Task(
481
+ subagent_type="cli-explore-agent",
482
+ run_in_background=false,
483
+ description=`Deep-dive analysis for critical finding: ${findingTitle} via Dependency Map + Deep Scan`,
484
+ prompt=`
485
+ ## Task Objective
486
+ Perform focused root cause analysis using Dependency Map mode (for impact analysis) + Deep Scan mode (for semantic understanding) to generate comprehensive remediation plan for critical ${dimension} issue
487
+
488
+ ## Analysis Mode Selection
489
+ Use **Dependency Map mode** first to understand dependencies:
490
+ - Build dependency graph around ${file} to identify affected components
491
+ - Detect circular dependencies or tight coupling related to this finding
492
+ - Calculate change risk scores for remediation impact
493
+
494
+ Then apply **Deep Scan mode** for semantic analysis:
495
+ - Understand design intent and architectural context
496
+ - Identify non-standard patterns or implicit dependencies
497
+ - Extract remediation insights from code structure
498
+
499
+ ## Finding Context
500
+ - Finding ID: ${findingId}
501
+ - Original Dimension: ${dimension}
502
+ - Title: ${findingTitle}
503
+ - File: ${file}:${line}
504
+ - Severity: ${severity}
505
+ - Category: ${category}
506
+ - Original Description: ${description}
507
+ - Iteration: ${iteration}
508
+
509
+ ## MANDATORY FIRST STEPS (Execute by Agent)
510
+ **You (cli-explore-agent) MUST execute these steps in order:**
511
+ 1. Read original finding: ${dimensionJsonPath}
512
+ 2. Read affected file: ${file}
513
+ 3. Identify related code: bash(grep -r "import.*${basename(file)}" ${projectDir}/src --include="*.ts")
514
+ 4. Read test files: bash(find ${projectDir}/tests -name "*${basename(file, '.ts')}*" -type f)
515
+ 5. Execute: cat ~/.claude/workflows/cli-templates/schemas/review-deep-dive-results-schema.json (get output schema reference)
516
+ 6. Read: .workflow/project-tech.json (technology stack and architecture context)
517
+ 7. Read: .workflow/project-guidelines.json (user-defined constraints for remediation compliance)
518
+
519
+ ## CLI Configuration
520
+ - Tool Priority: gemini → qwen → codex
521
+ - Template: ~/.claude/workflows/cli-templates/prompts/analysis/01-diagnose-bug-root-cause.txt
522
+ - Mode: analysis (READ-ONLY)
523
+
524
+ ## Expected Deliverables
525
+
526
+ **Schema Reference**: Schema obtained in MANDATORY FIRST STEPS step 5, follow schema exactly
527
+
528
+ 1. Deep-Dive Results JSON: ${outputDir}/iterations/iteration-${iteration}-finding-${findingId}.json
529
+
530
+ **⚠️ CRITICAL JSON STRUCTURE REQUIREMENTS**:
531
+
532
+ Root structure MUST be array: \`[{ ... }]\` NOT \`{ ... }\`
533
+
534
+ Required top-level fields:
535
+ - finding_id, dimension, iteration, analysis_timestamp
536
+ - cli_tool_used, model, analysis_duration_ms
537
+ - original_finding, root_cause, remediation_plan
538
+ - impact_assessment, reassessed_severity, confidence_score, cross_references
539
+
540
+ All nested objects must follow schema exactly - read schema for field names
541
+
542
+ 2. Analysis Report: ${outputDir}/reports/deep-dive-${iteration}-${findingId}.md
543
+ - Detailed root cause analysis
544
+ - Step-by-step remediation plan
545
+ - Impact assessment and rollback strategy
546
+
547
+ ## Success Criteria
548
+ - [ ] Schema obtained via cat review-deep-dive-results-schema.json
549
+ - [ ] Root cause clearly identified with supporting evidence
550
+ - [ ] Remediation plan is step-by-step actionable with exact file:line references
551
+ - [ ] Each step includes specific commands and validation tests
552
+ - [ ] Impact fully assessed (files, tests, breaking changes, dependencies)
553
+ - [ ] Severity re-evaluation justified with evidence
554
+ - [ ] Confidence score accurately reflects certainty of analysis
555
+ - [ ] JSON output follows schema exactly
556
+ - [ ] References include project-specific and external documentation
557
+ `
558
+ )
559
+ ```
560
+
561
+ ### Dimension Guidance Reference
562
+
563
+ ```javascript
564
+ function getDimensionGuidance(dimension) {
565
+ const guidance = {
566
+ security: `
567
+ Focus Areas:
568
+ - Input validation and sanitization
569
+ - Authentication and authorization mechanisms
570
+ - Data encryption (at-rest and in-transit)
571
+ - SQL/NoSQL injection vulnerabilities
572
+ - XSS, CSRF, and other web vulnerabilities
573
+ - Sensitive data exposure
574
+ - Access control and privilege escalation
575
+
576
+ Severity Criteria:
577
+ - Critical: Authentication bypass, SQL injection, RCE, sensitive data exposure
578
+ - High: Missing authorization checks, weak encryption, exposed secrets
579
+ - Medium: Missing input validation, insecure defaults, weak password policies
580
+ - Low: Security headers missing, verbose error messages, outdated dependencies
581
+ `,
582
+ architecture: `
583
+ Focus Areas:
584
+ - Layering and separation of concerns
585
+ - Coupling and cohesion
586
+ - Design pattern adherence
587
+ - Dependency management
588
+ - Scalability and extensibility
589
+ - Module boundaries
590
+ - API design consistency
591
+
592
+ Severity Criteria:
593
+ - Critical: Circular dependencies, god objects, tight coupling across layers
594
+ - High: Violated architectural principles, scalability bottlenecks
595
+ - Medium: Missing abstractions, inconsistent patterns, suboptimal design
596
+ - Low: Minor coupling issues, documentation gaps, naming inconsistencies
597
+ `,
598
+ quality: `
599
+ Focus Areas:
600
+ - Code duplication
601
+ - Complexity (cyclomatic, cognitive)
602
+ - Naming conventions
603
+ - Error handling patterns
604
+ - Code readability
605
+ - Comment quality
606
+ - Dead code
607
+
608
+ Severity Criteria:
609
+ - Critical: Severe complexity (CC > 20), massive duplication (>50 lines)
610
+ - High: High complexity (CC > 10), significant duplication, poor error handling
611
+ - Medium: Moderate complexity (CC > 5), naming issues, code smells
612
+ - Low: Minor duplication, documentation gaps, cosmetic issues
613
+ `,
614
+ 'action-items': `
615
+ Focus Areas:
616
+ - Requirements coverage verification
617
+ - Acceptance criteria met
618
+ - Documentation completeness
619
+ - Deployment readiness
620
+ - Missing functionality
621
+ - Test coverage gaps
622
+ - Configuration management
623
+
624
+ Severity Criteria:
625
+ - Critical: Core requirements not met, deployment blockers
626
+ - High: Significant functionality missing, acceptance criteria not met
627
+ - Medium: Minor requirements gaps, documentation incomplete
628
+ - Low: Nice-to-have features missing, minor documentation gaps
629
+ `,
630
+ performance: `
631
+ Focus Areas:
632
+ - N+1 query problems
633
+ - Inefficient algorithms (O(n²) where O(n log n) possible)
634
+ - Memory leaks
635
+ - Blocking operations on main thread
636
+ - Missing caching opportunities
637
+ - Resource usage (CPU, memory, network)
638
+ - Database query optimization
639
+
640
+ Severity Criteria:
641
+ - Critical: Memory leaks, O(n²) in hot path, blocking main thread
642
+ - High: N+1 queries, missing indexes, inefficient algorithms
643
+ - Medium: Suboptimal caching, unnecessary computations, lazy loading issues
644
+ - Low: Minor optimization opportunities, redundant operations
645
+ `,
646
+ maintainability: `
647
+ Focus Areas:
648
+ - Technical debt indicators
649
+ - Magic numbers and hardcoded values
650
+ - Long methods (>50 lines)
651
+ - Large classes (>500 lines)
652
+ - Dead code and commented code
653
+ - Code documentation
654
+ - Test coverage
655
+
656
+ Severity Criteria:
657
+ - Critical: Massive methods (>200 lines), severe technical debt blocking changes
658
+ - High: Large methods (>100 lines), significant dead code, undocumented complex logic
659
+ - Medium: Magic numbers, moderate technical debt, missing tests
660
+ - Low: Minor refactoring opportunities, cosmetic improvements
661
+ `,
662
+ 'best-practices': `
663
+ Focus Areas:
664
+ - Framework conventions adherence
665
+ - Language idioms
666
+ - Anti-patterns
667
+ - Deprecated API usage
668
+ - Coding standards compliance
669
+ - Error handling patterns
670
+ - Logging and monitoring
671
+
672
+ Severity Criteria:
673
+ - Critical: Severe anti-patterns, deprecated APIs with security risks
674
+ - High: Major convention violations, poor error handling, missing logging
675
+ - Medium: Minor anti-patterns, style inconsistencies, suboptimal patterns
676
+ - Low: Cosmetic style issues, minor convention deviations
677
+ `
678
+ };
679
+
680
+ return guidance[dimension] || 'Standard code review analysis';
681
+ }
682
+ ```
683
+
684
+ ### Completion Conditions
685
+
686
+ **Full Success**:
687
+ - All dimensions reviewed
688
+ - Critical findings = 0
689
+ - High findings ≤ 5
690
+ - Action: Generate final report, mark phase=complete
691
+
692
+ **Partial Success**:
693
+ - All dimensions reviewed
694
+ - Max iterations reached
695
+ - Still have critical/high findings
696
+ - Action: Generate report with warnings, recommend follow-up
697
+
698
+ ### Error Handling
699
+
700
+ **Phase-Level Error Matrix**:
701
+
702
+ | Phase | Error | Blocking? | Action |
703
+ |-------|-------|-----------|--------|
704
+ | Phase 1 | Invalid path pattern | Yes | Error and exit |
705
+ | Phase 1 | No files matched | Yes | Error and exit |
706
+ | Phase 1 | Files not readable | Yes | Error and exit |
707
+ | Phase 2 | Single dimension fails | No | Log warning, continue other dimensions |
708
+ | Phase 2 | All dimensions fail | Yes | Error and exit |
709
+ | Phase 3 | Missing dimension JSON | No | Skip in aggregation, log warning |
710
+ | Phase 4 | Deep-dive agent fails | No | Skip finding, continue others |
711
+ | Phase 4 | Max iterations reached | No | Generate partial report |
712
+
713
+ **CLI Fallback Chain**: Gemini → Qwen → Codex → degraded mode
714
+
715
+ **Fallback Triggers**:
716
+ 1. HTTP 429, 5xx errors, connection timeout
717
+ 2. Invalid JSON output (parse error, missing required fields)
718
+ 3. Low confidence score < 0.4
719
+ 4. Analysis too brief (< 100 words in report)
720
+
721
+ **Fallback Behavior**:
722
+ - On trigger: Retry with next tool in chain
723
+ - After Codex fails: Enter degraded mode (skip analysis, log error)
724
+ - Degraded mode: Continue workflow with available results
725
+
726
+ ### TodoWrite Structure
727
+
728
+ ```javascript
729
+ TodoWrite({
730
+ todos: [
731
+ { content: "Phase 1: Discovery & Initialization", status: "completed", activeForm: "Initializing" },
732
+ { content: "Phase 2: Parallel Reviews (7 dimensions)", status: "in_progress", activeForm: "Reviewing" },
733
+ { content: " → Security review", status: "in_progress", activeForm: "Analyzing security" },
734
+ // ... other dimensions as sub-items
735
+ { content: "Phase 3: Aggregation", status: "pending", activeForm: "Aggregating" },
736
+ { content: "Phase 4: Deep-dive", status: "pending", activeForm: "Deep-diving" },
737
+ { content: "Phase 5: Completion", status: "pending", activeForm: "Completing" }
738
+ ]
739
+ });
740
+ ```
741
+
742
+ ## Best Practices
743
+
744
+ 1. **Start Specific**: Begin with focused module patterns for faster results
745
+ 2. **Expand Gradually**: Add more modules based on initial findings
746
+ 3. **Use Glob Wisely**: `src/auth/**` is more efficient than `src/**` with lots of irrelevant files
747
+ 4. **Trust Aggregation Logic**: Auto-selection based on proven heuristics
748
+ 5. **Monitor Logs**: Check reports/ directory for CLI analysis insights
749
+
750
+ ## Related Commands
751
+
752
+ ### View Review Progress
753
+ Use `ccw view` to open the review dashboard in browser:
754
+
755
+ ```bash
756
+ ccw view
757
+ ```
758
+
759
+ ### Automated Fix Workflow
760
+ After completing a module review, use the generated findings JSON for automated fixing:
761
+
762
+ ```bash
763
+ # Step 1: Complete review (this command)
764
+ /workflow:review-module-cycle src/auth/**
765
+
766
+ # Step 2: Run automated fixes using dimension findings
767
+ /workflow:review-fix .workflow/active/WFS-{session-id}/.review/
768
+ ```
769
+
770
+ See `/workflow:review-fix` for automated fixing with smart grouping, parallel execution, and test verification.
771
+