claude-code-workflow 7.2.24 → 7.2.26

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (69) hide show
  1. package/.ccw/workflows/cli-tools-usage.md +123 -521
  2. package/.claude/CLAUDE.md +20 -0
  3. package/.claude/agents/action-planning-agent.md +6 -0
  4. package/.claude/agents/cli-explore-agent.md +63 -77
  5. package/.claude/agents/cli-lite-planning-agent.md +10 -11
  6. package/.claude/agents/issue-plan-agent.md +7 -2
  7. package/.claude/commands/workflow/spec/setup.md +1 -1
  8. package/.claude/skills/brainstorm/SKILL.md +408 -408
  9. package/.claude/skills/review-cycle/SKILL.md +132 -132
  10. package/.claude/skills/review-cycle/phases/review-module.md +4 -4
  11. package/.claude/skills/review-cycle/phases/review-session.md +4 -4
  12. package/.claude/skills/spec-generator/SKILL.md +1 -1
  13. package/.claude/skills/team-designer/phases/02-scaffold-generation.md +1 -1
  14. package/.claude/skills/team-lifecycle-v4/SKILL.md +1 -1
  15. package/.claude/skills/team-review/SKILL.md +1 -1
  16. package/.claude/skills/team-ultra-analyze/SKILL.md +1 -1
  17. package/.claude/skills/workflow-multi-cli-plan/SKILL.md +3 -3
  18. package/.claude/skills/workflow-plan/SKILL.md +1 -1
  19. package/.claude/skills/workflow-plan/phases/03-conflict-resolution.md +2 -2
  20. package/.claude/skills/workflow-plan/phases/05-plan-verify.md +2 -2
  21. package/.claude/skills/workflow-tdd-plan/phases/02-context-gathering.md +3 -3
  22. package/.claude/skills/workflow-tdd-plan/phases/04-conflict-resolution.md +2 -2
  23. package/.claude/skills/workflow-test-fix/SKILL.md +1 -1
  24. package/.claude/skills/workflow-test-fix/phases/02-test-context-gather.md +2 -2
  25. package/.codex/AGENTS.md +16 -0
  26. package/.codex/skills/analyze-with-file/SKILL.md +966 -966
  27. package/.codex/skills/issue-discover/SKILL.md +361 -361
  28. package/.codex/skills/review-cycle/SKILL.md +1 -1
  29. package/.codex/skills/roadmap-with-file/SKILL.md +901 -901
  30. package/.codex/skills/spec-generator/SKILL.md +425 -425
  31. package/.codex/skills/spec-setup/SKILL.md +669 -669
  32. package/.codex/skills/team-designer/phases/02-scaffold-generation.md +1 -1
  33. package/.codex/skills/workflow-test-fix-cycle/SKILL.md +402 -402
  34. package/ccw/dist/tools/index.d.ts.map +1 -1
  35. package/ccw/dist/tools/index.js +2 -0
  36. package/ccw/dist/tools/index.js.map +1 -1
  37. package/ccw/dist/tools/json-builder.d.ts +17 -0
  38. package/ccw/dist/tools/json-builder.d.ts.map +1 -0
  39. package/ccw/dist/tools/json-builder.js +746 -0
  40. package/ccw/dist/tools/json-builder.js.map +1 -0
  41. package/ccw/dist/tools/schema-registry.d.ts +71 -0
  42. package/ccw/dist/tools/schema-registry.d.ts.map +1 -0
  43. package/ccw/dist/tools/schema-registry.js +136 -0
  44. package/ccw/dist/tools/schema-registry.js.map +1 -0
  45. package/package.json +1 -1
  46. package/.claude/skills/team-iterdev/SKILL.md +0 -127
  47. package/.claude/skills/team-iterdev/roles/architect/role.md +0 -65
  48. package/.claude/skills/team-iterdev/roles/coordinator/commands/analyze.md +0 -62
  49. package/.claude/skills/team-iterdev/roles/coordinator/commands/dispatch.md +0 -234
  50. package/.claude/skills/team-iterdev/roles/coordinator/commands/monitor.md +0 -182
  51. package/.claude/skills/team-iterdev/roles/coordinator/role.md +0 -153
  52. package/.claude/skills/team-iterdev/roles/developer/role.md +0 -74
  53. package/.claude/skills/team-iterdev/roles/reviewer/role.md +0 -66
  54. package/.claude/skills/team-iterdev/roles/tester/role.md +0 -88
  55. package/.claude/skills/team-iterdev/specs/pipelines.md +0 -94
  56. package/.claude/skills/team-iterdev/specs/team-config.json +0 -172
  57. package/.codex/prompts/prep-cycle.md +0 -416
  58. package/.codex/prompts/prep-plan.md +0 -371
  59. package/.codex/skills/team-iterdev/SKILL.md +0 -219
  60. package/.codex/skills/team-iterdev/roles/architect/role.md +0 -65
  61. package/.codex/skills/team-iterdev/roles/coordinator/commands/analyze.md +0 -62
  62. package/.codex/skills/team-iterdev/roles/coordinator/commands/dispatch.md +0 -187
  63. package/.codex/skills/team-iterdev/roles/coordinator/commands/monitor.md +0 -227
  64. package/.codex/skills/team-iterdev/roles/coordinator/role.md +0 -193
  65. package/.codex/skills/team-iterdev/roles/developer/role.md +0 -74
  66. package/.codex/skills/team-iterdev/roles/reviewer/role.md +0 -66
  67. package/.codex/skills/team-iterdev/roles/tester/role.md +0 -88
  68. package/.codex/skills/team-iterdev/specs/pipelines.md +0 -94
  69. package/.codex/skills/team-iterdev/specs/team-config.json +0 -172
package/.claude/CLAUDE.md CHANGED
@@ -36,6 +36,26 @@ Available CLI endpoints are dynamically defined by the config file
36
36
  - **Key scenarios**: Self-repair fails, ambiguous requirements, architecture decisions, pattern uncertainty, critical code paths
37
37
  - **Principles**: Default `--mode analysis`, no confirmation needed, wait for completion, flexible rule selection
38
38
 
39
+ ## Workflow Session Awareness
40
+
41
+ ### Artifact Locations
42
+
43
+ | Workflow | Directory | Summary File |
44
+ |----------|-----------|-------------|
45
+ | `workflow-plan` | `.workflow/active/WFS-*/` | `workflow-session.json` |
46
+ | `workflow-lite-plan` | `.workflow/.lite-plan/{slug}-{date}/` | `plan.json` |
47
+ | `analyze-with-file` | `.workflow/.analysis/ANL-*/` | `conclusions.json` |
48
+ | `multi-cli-plan` | `.workflow/.multi-cli-plan/*/` | `session-state.json` |
49
+ | `lite-fix` | `.workflow/.lite-fix/*/` | `fix-plan.json` |
50
+ | Other | `.workflow/.debug/`, `.workflow/.scratchpad/`, `.workflow/archives/` | — |
51
+
52
+ ### Pre-Task Discovery
53
+
54
+ Before starting any workflow skill, scan recent sessions (7 days) to avoid conflicts and reuse prior work:
55
+ - If overlapping file scope found: warn user, suggest `--continue` or reference prior session
56
+ - If complementary: feed prior findings into new session context
57
+ - `memory/MEMORY.md` for cross-session knowledge; `.workflow/` for session-specific artifacts — reference session IDs, don't duplicate
58
+
39
59
  ## Code Diagnostics
40
60
 
41
61
  - **Prefer `mcp__ide__getDiagnostics`** for code error checking over shell-based TypeScript compilation
@@ -829,6 +829,12 @@ Generate at `.workflow/active/{session_id}/plan.json` following `plan-overview-b
829
829
 
830
830
  **Generation Timing**: After all `.task/IMPL-*.json` files are generated, aggregate into plan.json.
831
831
 
832
+ **Validation**: After writing plan.json and task files, validate with json_builder:
833
+ ```bash
834
+ ccw tool exec json_builder '{"cmd":"validate","target":"<session>/plan.json","schema":"plan"}'
835
+ ccw tool exec json_builder '{"cmd":"validate","target":"<session>/.task/IMPL-001.json","schema":"task"}'
836
+ ```
837
+
832
838
  ### 2.3 IMPL_PLAN.md Structure
833
839
 
834
840
  **Template-Based Generation**:
@@ -5,6 +5,7 @@ description: |
5
5
  Orchestrates 4-phase workflow: Task Understanding → Analysis Execution → Schema Validation → Output Generation.
6
6
  Spawned by /explore command orchestrator.
7
7
  tools: Read, Bash, Glob, Grep
8
+ # json_builder available via: ccw tool exec json_builder '{"cmd":"..."}' (Bash)
8
9
  color: yellow
9
10
  ---
10
11
 
@@ -66,9 +67,9 @@ Phase 4: Output Generation
66
67
  Store result as `project_structure` for module-aware file discovery in Phase 2.
67
68
 
68
69
  2. **Output Schema Loading** (if output file path specified in prompt):
69
- - Exploration output `cat ~/.ccw/workflows/cli-templates/schemas/explore-json-schema.json`
70
- - Other schemas as specified in prompt
71
- Read and memorize schema requirements BEFORE any analysis begins (feeds Phase 3 validation).
70
+ - Get schema summary: `ccw tool exec json_builder '{"cmd":"info","schema":"explore"}'` (or "diagnosis" for bug analysis)
71
+ - Initialize output file: `ccw tool exec json_builder '{"cmd":"init","schema":"explore","output":"<output_path>"}'`
72
+ - The tool returns requiredFields, arrayFields, and enumFields memorize these for Phase 2.
72
73
 
73
74
  3. **Project Context Loading** (from spec system):
74
75
  - Load exploration specs using: `ccw spec load --category exploration`
@@ -150,55 +151,56 @@ RULES: {from prompt, if template specified} | analysis=READ-ONLY
150
151
  ---
151
152
 
152
153
  <schema_validation>
153
- ## Phase 3: Schema Validation
154
+ ## Phase 3: Incremental Build & Validation (via json_builder)
154
155
 
155
- ### CRITICAL: Schema Compliance Protocol
156
+ **This phase replaces manual JSON writing + self-validation with tool-assisted construction.**
156
157
 
157
- **This phase is MANDATORY when schema file is specified in prompt.**
158
+ **Step 1: Set text fields** (discovered during Phase 2 analysis)
159
+ ```bash
160
+ ccw tool exec json_builder '{"cmd":"set","target":"<output_path>","ops":[
161
+ {"path":"project_structure","value":"..."},
162
+ {"path":"patterns","value":"..."},
163
+ {"path":"dependencies","value":"..."},
164
+ {"path":"integration_points","value":"..."},
165
+ {"path":"constraints","value":"..."}
166
+ ]}'
167
+ ```
168
+
169
+ **Step 2: Append file entries** (as discovered — one `set` per batch)
170
+ ```bash
171
+ ccw tool exec json_builder '{"cmd":"set","target":"<output_path>","ops":[
172
+ {"path":"relevant_files[+]","value":{"path":"src/auth.ts","relevance":0.9,"rationale":"Contains AuthService.login() entry point for JWT generation","role":"modify_target","discovery_source":"bash-scan","key_code":[{"symbol":"login()","location":"L45-78","description":"JWT token generation with bcrypt verification"}],"topic_relation":"Security target — JWT generation lacks token rotation"}},
173
+ {"path":"relevant_files[+]","value":{...}}
174
+ ]}'
175
+ ```
158
176
 
159
- **Step 1: Read Schema FIRST**
177
+ The tool **automatically validates** each operation:
178
+ - enum values (role, discovery_source) → rejects invalid
179
+ - minLength (rationale >= 10) → rejects too short
180
+ - type checking → rejects wrong types
181
+
182
+ **Step 3: Set metadata**
183
+ ```bash
184
+ ccw tool exec json_builder '{"cmd":"set","target":"<output_path>","ops":[
185
+ {"path":"_metadata.timestamp","value":"auto"},
186
+ {"path":"_metadata.task_description","value":"..."},
187
+ {"path":"_metadata.source","value":"cli-explore-agent"},
188
+ {"path":"_metadata.exploration_angle","value":"..."},
189
+ {"path":"_metadata.exploration_index","value":1},
190
+ {"path":"_metadata.total_explorations","value":2}
191
+ ]}'
160
192
  ```
161
- Read(schema_file_path)
193
+
194
+ **Step 4: Final validation**
195
+ ```bash
196
+ ccw tool exec json_builder '{"cmd":"validate","target":"<output_path>"}'
162
197
  ```
198
+ Returns `{valid, errors, warnings, stats}`. If errors exist → fix with `set` → re-validate.
163
199
 
164
- **Step 2: Extract Schema Requirements**
165
-
166
- Parse and memorize:
167
- 1. **Root structure** - Is it array `[...]` or object `{...}`?
168
- 2. **Required fields** - List all `"required": [...]` arrays
169
- 3. **Field names EXACTLY** - Copy character-by-character (case-sensitive)
170
- 4. **Enum values** - Copy exact strings (e.g., `"critical"` not `"Critical"`)
171
- 5. **Nested structures** - Note flat vs nested requirements
172
-
173
- **Step 3: File Rationale Validation** (MANDATORY for relevant_files / affected_files)
174
-
175
- Every file entry MUST have:
176
- - `rationale` (required, minLength 10): Specific reason tied to the exploration topic, NOT generic
177
- - GOOD: "Contains AuthService.login() which is the entry point for JWT token generation"
178
- - BAD: "Related to auth" or "Relevant file"
179
- - `role` (required, enum): Structural classification of why it was selected
180
- - `discovery_source` (optional but recommended): How the file was found
181
- - `key_code` (strongly recommended for relevance >= 0.7): Array of {symbol, location?, description}
182
- - GOOD: [{"symbol": "AuthService.login()", "location": "L45-L78", "description": "JWT token generation with bcrypt verification, returns token pair"}]
183
- - BAD: [{"symbol": "login", "description": "login function"}]
184
- - `topic_relation` (strongly recommended for relevance >= 0.7): Connection from exploration angle perspective
185
- - GOOD: "Security exploration targets this file because JWT generation lacks token rotation"
186
- - BAD: "Related to security"
187
-
188
- **Step 4: Pre-Output Validation Checklist**
189
-
190
- Before writing ANY JSON output, verify:
191
-
192
- - [ ] Root structure matches schema (array vs object)
193
- - [ ] ALL required fields present at each level
194
- - [ ] Field names EXACTLY match schema (character-by-character)
195
- - [ ] Enum values EXACTLY match schema (case-sensitive)
196
- - [ ] Nested structures follow schema pattern (flat vs nested)
197
- - [ ] Data types correct (string, integer, array, object)
198
- - [ ] Every file in relevant_files has: path + relevance + rationale + role
199
- - [ ] Every rationale is specific (>10 chars, not generic)
200
- - [ ] Files with relevance >= 0.7 have key_code with symbol + description (minLength 10)
201
- - [ ] Files with relevance >= 0.7 have topic_relation explaining connection to angle (minLength 15)
200
+ **Quality reminders** (enforced by tool, but be aware):
201
+ - `rationale`: Must be specific, not generic ("Related to auth" → rejected by semantic check)
202
+ - `key_code`: Strongly recommended for relevance >= 0.7 (warnings if missing)
203
+ - `topic_relation`: Strongly recommended for relevance >= 0.7 (warnings if missing)
202
204
  </schema_validation>
203
205
 
204
206
  ---
@@ -212,16 +214,12 @@ Brief summary:
212
214
  - Task completion status
213
215
  - Key findings summary
214
216
  - Generated file paths (if any)
217
+ - Validation result (from Phase 3 Step 4)
215
218
 
216
- ### File Output (as specified in prompt)
217
-
218
- **MANDATORY WORKFLOW**:
219
+ ### File Output
219
220
 
220
- 1. `Read()` schema file BEFORE generating output
221
- 2. Extract ALL field names from schema
222
- 3. Build JSON using ONLY schema field names
223
- 4. Validate against checklist before writing
224
- 5. Write file with validated content
221
+ File is already written by json_builder during Phase 3 (init + set operations).
222
+ Phase 4 only verifies the final validation passed and returns the summary.
225
223
  </output_generation>
226
224
 
227
225
  ---
@@ -243,28 +241,19 @@ Brief summary:
243
241
 
244
242
  **ALWAYS**:
245
243
  1. **Search Tool Priority**: ACE (`mcp__ace-tool__search_context`) → CCW (`mcp__ccw-tools__smart_search`) / Built-in (`Grep`, `Glob`, `Read`)
246
- 2. Read schema file FIRST before generating any output (if schema specified)
247
- 3. Copy field names EXACTLY from schema (case-sensitive)
248
- 4. Verify root structure matches schema (array vs object)
249
- 5. Match nested/flat structures as schema requires
250
- 6. Use exact enum values from schema (case-sensitive)
251
- 7. Include ALL required fields at every level
252
- 8. Include file:line references in findings
253
- 9. **Every file MUST have rationale**: Specific selection basis tied to the topic (not generic)
254
- 10. **Every file MUST have role**: Classify as modify_target/dependency/pattern_reference/test_target/type_definition/integration_point/config/context_only
255
- 11. **Track discovery source**: Record how each file was found (bash-scan/cli-analysis/ace-search/dependency-trace/manual)
256
- 12. **Populate key_code for high-relevance files**: relevance >= 0.7 → key_code array with symbol, location, description
257
- 13. **Populate topic_relation for high-relevance files**: relevance >= 0.7 → topic_relation explaining file-to-angle connection
244
+ 2. **Use json_builder** for all JSON output: `init` `set` (incremental) `validate`
245
+ 3. Include file:line references in findings
246
+ 4. **Every file MUST have rationale + role** (enforced by json_builder set validation)
247
+ 5. **Track discovery source**: Record how each file was found (bash-scan/cli-analysis/ace-search/dependency-trace/manual)
248
+ 6. **Populate key_code + topic_relation for high-relevance files** (relevance >= 0.7; json_builder warns if missing)
258
249
 
259
250
  **Bash Tool**:
260
251
  - Use `run_in_background=false` for all Bash/CLI calls to ensure foreground execution
261
252
 
262
253
  **NEVER**:
263
- 1. Modify any files (read-only agent)
264
- 2. Skip schema reading step when schema is specified
265
- 3. Guess field names - ALWAYS copy from schema
266
- 4. Assume structure - ALWAYS verify against schema
267
- 5. Omit required fields
254
+ 1. Modify any source code files (read-only agent — json_builder writes only output JSON)
255
+ 2. Hand-write JSON output always use json_builder
256
+ 3. Skip the `validate` step before returning
268
257
  </operational_rules>
269
258
 
270
259
  <output_contract>
@@ -282,11 +271,8 @@ When exploration is complete, return one of:
282
271
 
283
272
  Before returning, verify:
284
273
  - [ ] All 4 phases were executed (or skipped with justification)
285
- - [ ] Schema was read BEFORE output generation (if schema specified)
286
- - [ ] All field names match schema exactly (case-sensitive)
287
- - [ ] Every file entry has rationale (specific, >10 chars) and role
288
- - [ ] High-relevance files (>= 0.7) have key_code and topic_relation
274
+ - [ ] json_builder `init` was called at start
275
+ - [ ] json_builder `validate` returned `valid: true` (or all errors were fixed)
289
276
  - [ ] Discovery sources are tracked for all findings
290
- - [ ] No files were modified (read-only agent)
291
- - [ ] Output format matches schema root structure (array vs object)
277
+ - [ ] No source code files were modified (read-only agent)
292
278
  </quality_gate>
@@ -139,16 +139,15 @@ When `process_docs: true`, generate planning-context.md before sub-plan.json:
139
139
 
140
140
  ## Schema-Driven Output
141
141
 
142
- **CRITICAL**: Read the schema reference first to determine output structure:
143
- - `plan-overview-base-schema.json` → Implementation plan with `approach`, `complexity`
144
- - `plan-overview-fix-schema.json` → Fix plan with `root_cause`, `severity`, `risk_level`
142
+ **CRITICAL**: Get schema info via json_builder to determine output structure:
143
+ - `ccw tool exec json_builder '{"cmd":"info","schema":"plan"}'` → Implementation plan with `approach`, `complexity`
144
+ - `ccw tool exec json_builder '{"cmd":"info","schema":"plan-fix"}'` → Fix plan with `root_cause`, `severity`, `risk_level`
145
145
 
146
- ```javascript
147
- // Step 1: Always read schema first
148
- const schema = Bash(`cat ${schema_path}`)
149
-
150
- // Step 2: Generate plan conforming to schema
151
- const planObject = generatePlanFromSchema(schema, context)
146
+ After generating plan.json and .task/*.json, validate:
147
+ ```bash
148
+ ccw tool exec json_builder '{"cmd":"validate","target":"<session>/plan.json","schema":"plan"}'
149
+ # For each task file:
150
+ ccw tool exec json_builder '{"cmd":"validate","target":"<session>/.task/TASK-001.json","schema":"task"}'
152
151
  ```
153
152
 
154
153
  </schema_driven_output>
@@ -863,7 +862,7 @@ function validateTask(task) {
863
862
 
864
863
  **ALWAYS**:
865
864
  - **Search Tool Priority**: ACE (`mcp__ace-tool__search_context`) → CCW (`mcp__ccw-tools__smart_search`) / Built-in (`Grep`, `Glob`, `Read`)
866
- - **Read schema first** to determine output structure
865
+ - **Get schema info via json_builder** to determine output structure
867
866
  - Generate task IDs (TASK-001/TASK-002 for plan, FIX-001/FIX-002 for fix-plan)
868
867
  - Include depends_on (even if empty [])
869
868
  - **Assign cli_execution_id** (`{sessionId}-{taskId}`)
@@ -981,7 +980,7 @@ Upon completion, return one of:
981
980
 
982
981
  Before returning, verify:
983
982
 
984
- - [ ] Schema reference was read and output structure matches schema type (base vs fix)
983
+ - [ ] Schema info was obtained via json_builder and output structure matches schema type (base vs fix)
985
984
  - [ ] All tasks have valid IDs (TASK-NNN or FIX-NNN format)
986
985
  - [ ] All tasks have 2+ implementation steps
987
986
  - [ ] All convergence criteria are quantified and testable (no vague language)
@@ -348,7 +348,7 @@ Write({ file_path: filePath, content: newContent })
348
348
  .workflow/issues/solutions/{issue-id}.jsonl
349
349
  ```
350
350
 
351
- Each line is a solution JSON containing tasks. Schema: `cat ~/.ccw/workflows/cli-templates/schemas/solution-schema.json`
351
+ Each line is a solution JSON containing tasks. Schema: `ccw tool exec json_builder '{"cmd":"info","schema":"solution"}'`
352
352
 
353
353
  ### 2.2 Return Summary
354
354
 
@@ -388,7 +388,7 @@ Each line is a solution JSON containing tasks. Schema: `cat ~/.ccw/workflows/cli
388
388
 
389
389
  **ALWAYS**:
390
390
  1. **Search Tool Priority**: ACE (`mcp__ace-tool__search_context`) → CCW (`mcp__ccw-tools__smart_search`) / Built-in (`Grep`, `Glob`, `Read`)
391
- 2. Read schema first: `cat ~/.ccw/workflows/cli-templates/schemas/solution-schema.json`
391
+ 2. Get schema info: `ccw tool exec json_builder '{"cmd":"info","schema":"solution"}'` (replaces reading raw schema)
392
392
  3. Use ACE semantic search as PRIMARY exploration tool
393
393
  4. Fetch issue details via `ccw issue status <id> --json`
394
394
  5. **Analyze failure history**: Check `issue.feedback` for type='failure', stage='execute'
@@ -408,6 +408,11 @@ Each line is a solution JSON containing tasks. Schema: `cat ~/.ccw/workflows/cli
408
408
  4. **Dependency ordering**: If issues must touch same files, encode execution order via `depends_on`
409
409
  5. **Scope minimization**: Prefer smaller, focused modifications over broad refactoring
410
410
 
411
+ **VALIDATE**: After writing solution JSONL, validate each solution:
412
+ ```bash
413
+ ccw tool exec json_builder '{"cmd":"validate","target":".workflow/issues/solutions/<issue-id>.jsonl","schema":"solution"}'
414
+ ```
415
+
411
416
  **NEVER**:
412
417
  1. Execute implementation (return plan only)
413
418
  2. Use vague criteria ("works correctly", "good performance")
@@ -129,7 +129,7 @@ Task(
129
129
  Analyze project for workflow initialization and generate .workflow/project-tech.json.
130
130
 
131
131
  ## MANDATORY FIRST STEPS
132
- 1. Execute: cat ~/.ccw/workflows/cli-templates/schemas/project-tech-schema.json (get schema reference)
132
+ 1. Execute: ccw tool exec json_builder '{"cmd":"info","schema":"tech"}' (get schema summary)
133
133
  2. Execute: ccw tool exec get_modules_by_depth '{}' (get project structure)
134
134
 
135
135
  ## Task