claude-code-workflow 7.2.24 → 7.2.26

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (69) hide show
  1. package/.ccw/workflows/cli-tools-usage.md +123 -521
  2. package/.claude/CLAUDE.md +20 -0
  3. package/.claude/agents/action-planning-agent.md +6 -0
  4. package/.claude/agents/cli-explore-agent.md +63 -77
  5. package/.claude/agents/cli-lite-planning-agent.md +10 -11
  6. package/.claude/agents/issue-plan-agent.md +7 -2
  7. package/.claude/commands/workflow/spec/setup.md +1 -1
  8. package/.claude/skills/brainstorm/SKILL.md +408 -408
  9. package/.claude/skills/review-cycle/SKILL.md +132 -132
  10. package/.claude/skills/review-cycle/phases/review-module.md +4 -4
  11. package/.claude/skills/review-cycle/phases/review-session.md +4 -4
  12. package/.claude/skills/spec-generator/SKILL.md +1 -1
  13. package/.claude/skills/team-designer/phases/02-scaffold-generation.md +1 -1
  14. package/.claude/skills/team-lifecycle-v4/SKILL.md +1 -1
  15. package/.claude/skills/team-review/SKILL.md +1 -1
  16. package/.claude/skills/team-ultra-analyze/SKILL.md +1 -1
  17. package/.claude/skills/workflow-multi-cli-plan/SKILL.md +3 -3
  18. package/.claude/skills/workflow-plan/SKILL.md +1 -1
  19. package/.claude/skills/workflow-plan/phases/03-conflict-resolution.md +2 -2
  20. package/.claude/skills/workflow-plan/phases/05-plan-verify.md +2 -2
  21. package/.claude/skills/workflow-tdd-plan/phases/02-context-gathering.md +3 -3
  22. package/.claude/skills/workflow-tdd-plan/phases/04-conflict-resolution.md +2 -2
  23. package/.claude/skills/workflow-test-fix/SKILL.md +1 -1
  24. package/.claude/skills/workflow-test-fix/phases/02-test-context-gather.md +2 -2
  25. package/.codex/AGENTS.md +16 -0
  26. package/.codex/skills/analyze-with-file/SKILL.md +966 -966
  27. package/.codex/skills/issue-discover/SKILL.md +361 -361
  28. package/.codex/skills/review-cycle/SKILL.md +1 -1
  29. package/.codex/skills/roadmap-with-file/SKILL.md +901 -901
  30. package/.codex/skills/spec-generator/SKILL.md +425 -425
  31. package/.codex/skills/spec-setup/SKILL.md +669 -669
  32. package/.codex/skills/team-designer/phases/02-scaffold-generation.md +1 -1
  33. package/.codex/skills/workflow-test-fix-cycle/SKILL.md +402 -402
  34. package/ccw/dist/tools/index.d.ts.map +1 -1
  35. package/ccw/dist/tools/index.js +2 -0
  36. package/ccw/dist/tools/index.js.map +1 -1
  37. package/ccw/dist/tools/json-builder.d.ts +17 -0
  38. package/ccw/dist/tools/json-builder.d.ts.map +1 -0
  39. package/ccw/dist/tools/json-builder.js +746 -0
  40. package/ccw/dist/tools/json-builder.js.map +1 -0
  41. package/ccw/dist/tools/schema-registry.d.ts +71 -0
  42. package/ccw/dist/tools/schema-registry.d.ts.map +1 -0
  43. package/ccw/dist/tools/schema-registry.js +136 -0
  44. package/ccw/dist/tools/schema-registry.js.map +1 -0
  45. package/package.json +1 -1
  46. package/.claude/skills/team-iterdev/SKILL.md +0 -127
  47. package/.claude/skills/team-iterdev/roles/architect/role.md +0 -65
  48. package/.claude/skills/team-iterdev/roles/coordinator/commands/analyze.md +0 -62
  49. package/.claude/skills/team-iterdev/roles/coordinator/commands/dispatch.md +0 -234
  50. package/.claude/skills/team-iterdev/roles/coordinator/commands/monitor.md +0 -182
  51. package/.claude/skills/team-iterdev/roles/coordinator/role.md +0 -153
  52. package/.claude/skills/team-iterdev/roles/developer/role.md +0 -74
  53. package/.claude/skills/team-iterdev/roles/reviewer/role.md +0 -66
  54. package/.claude/skills/team-iterdev/roles/tester/role.md +0 -88
  55. package/.claude/skills/team-iterdev/specs/pipelines.md +0 -94
  56. package/.claude/skills/team-iterdev/specs/team-config.json +0 -172
  57. package/.codex/prompts/prep-cycle.md +0 -416
  58. package/.codex/prompts/prep-plan.md +0 -371
  59. package/.codex/skills/team-iterdev/SKILL.md +0 -219
  60. package/.codex/skills/team-iterdev/roles/architect/role.md +0 -65
  61. package/.codex/skills/team-iterdev/roles/coordinator/commands/analyze.md +0 -62
  62. package/.codex/skills/team-iterdev/roles/coordinator/commands/dispatch.md +0 -187
  63. package/.codex/skills/team-iterdev/roles/coordinator/commands/monitor.md +0 -227
  64. package/.codex/skills/team-iterdev/roles/coordinator/role.md +0 -193
  65. package/.codex/skills/team-iterdev/roles/developer/role.md +0 -74
  66. package/.codex/skills/team-iterdev/roles/reviewer/role.md +0 -66
  67. package/.codex/skills/team-iterdev/roles/tester/role.md +0 -88
  68. package/.codex/skills/team-iterdev/specs/pipelines.md +0 -94
  69. package/.codex/skills/team-iterdev/specs/team-config.json +0 -172
@@ -1,132 +1,132 @@
1
- ---
2
- name: review-cycle
3
- description: Unified multi-dimensional code review with automated fix orchestration. Routes to session-based (git changes), module-based (path patterns), or fix mode. Triggers on "workflow:review-cycle", "workflow:review-session-cycle", "workflow:review-module-cycle", "workflow:review-cycle-fix".
4
- allowed-tools: Agent, AskUserQuestion, TaskCreate, TaskUpdate, TaskList, Read, Write, Edit, Bash, Glob, Grep, Skill
5
- ---
6
-
7
- # Review Cycle
8
-
9
- Unified code review orchestrator with mode-based routing. Detects input type and dispatches to the appropriate execution phase.
10
-
11
- ## Architecture Overview
12
-
13
- ```
14
- ┌──────────────────────────────────────────────────────────┐
15
- │ Review Cycle Orchestrator (SKILL.md) │
16
- │ → Parse input → Detect mode → Read phase doc → Execute │
17
- └───────────────────────────┬──────────────────────────────┘
18
-
19
- ┌─────────────────┼─────────────────┐
20
- ↓ ↓ ↓
21
- ┌─────────────┐ ┌─────────────┐ ┌─────────────┐
22
- │ session │ │ module │ │ fix │
23
- │ (git changes│ │(path pattern│ │(export file │
24
- │ review) │ │ review) │ │ auto-fix) │
25
- └─────────────┘ └─────────────┘ └─────────────┘
26
- phases/ phases/ phases/
27
- review-session.md review-module.md review-fix.md
28
- ```
29
-
30
- ## Auto Mode Detection
31
-
32
- ```javascript
33
- // ★ 统一 auto mode 检测:-y/--yes 从 $ARGUMENTS 或 ccw 传播
34
- const autoYes = /\b(-y|--yes)\b/.test($ARGUMENTS)
35
- ```
36
-
37
- When `autoYes` is true, skip all interactive confirmations and use defaults throughout the review cycle phases.
38
-
39
- ## Mode Detection
40
-
41
- ```javascript
42
- function detectMode(args) {
43
- if (args.includes('--fix')) return 'fix';
44
- if (args.match(/\*|\.ts|\.js|\.py|\.vue|\.jsx|\.tsx|src\/|lib\//)) return 'module';
45
- if (args.match(/^WFS-/) || args.trim() === '') return 'session';
46
- return 'session'; // default
47
- }
48
- ```
49
-
50
- | Input Pattern | Detected Mode | Phase Doc |
51
- |---------------|---------------|-----------|
52
- | `src/auth/**` | `module` | phases/review-module.md |
53
- | `src/auth/**,src/payment/**` | `module` | phases/review-module.md |
54
- | `WFS-payment-integration` | `session` | phases/review-session.md |
55
- | _(empty)_ | `session` | phases/review-session.md |
56
- | `--fix .review/` | `fix` | phases/review-fix.md |
57
- | `--fix --resume` | `fix` | phases/review-fix.md |
58
-
59
- ## Usage
60
-
61
- ```
62
- Skill(skill="review-cycle", args="src/auth/**") # Module mode
63
- Skill(skill="review-cycle", args="src/auth/** --dimensions=security,architecture") # Module + custom dims
64
- Skill(skill="review-cycle", args="WFS-payment-integration") # Session mode
65
- Skill(skill="review-cycle", args="") # Session: auto-detect
66
- Skill(skill="review-cycle", args="--fix .workflow/active/WFS-123/.review/") # Fix mode
67
- Skill(skill="review-cycle", args="--fix --resume") # Fix: resume
68
- Skill(skill="review-cycle", args="-y src/auth/**") # Auto mode (skip confirmations)
69
-
70
- # Common flags (all modes):
71
- --dimensions=dim1,dim2,... Custom dimensions (default: all 7)
72
- --max-iterations=N Max deep-dive iterations (default: 3)
73
-
74
- # Fix-only flags:
75
- --fix Enter fix pipeline
76
- --resume Resume interrupted fix session
77
- --batch-size=N Findings per planning batch (default: 5)
78
- --max-iterations=N Max retry per finding (default: 3)
79
- ```
80
-
81
- ## Execution Flow
82
-
83
- ```
84
- 1. Parse $ARGUMENTS → extract mode + flags
85
- 2. Detect mode (session | module | fix)
86
- 3. Read corresponding phase doc:
87
- - session → Read phases/review-session.md → execute
88
- - module → Read phases/review-module.md → execute
89
- - fix → Read phases/review-fix.md → execute
90
- 4. Phase doc contains full execution detail (5 phases for review, 4+1 phases for fix)
91
- ```
92
-
93
- **Phase Reference Documents** (read on-demand based on detected mode):
94
-
95
- | Mode | Document | Source | Description |
96
- |------|----------|--------|-------------|
97
- | session | [phases/review-session.md](phases/review-session.md) | review-session-cycle.md | Session-based review: git changes → 7-dimension parallel analysis → aggregation → deep-dive → completion |
98
- | module | [phases/review-module.md](phases/review-module.md) | review-module-cycle.md | Module-based review: path patterns → 7-dimension parallel analysis → aggregation → deep-dive → completion |
99
- | fix | [phases/review-fix.md](phases/review-fix.md) | review-cycle-fix.md | Automated fix: export file → intelligent batching → parallel planning → execution → completion |
100
-
101
- ## Project Context
102
-
103
- Run `ccw spec load --category review` for review standards, checklists, and approval gates.
104
-
105
- ## Core Rules
106
-
107
- 1. **Mode Detection First**: Parse input to determine session/module/fix mode before anything else
108
- 2. **Progressive Loading**: Read ONLY the phase doc for the detected mode, not all three
109
- 3. **Full Delegation**: Once mode is detected, the phase doc owns the entire execution flow
110
- 4. **Auto-Continue**: Phase docs contain their own multi-phase execution (Phase 1-5 or Phase 1-4+5)
111
- 5. **DO NOT STOP**: Continuous execution until all internal phases within the phase doc complete
112
-
113
- ## Error Handling
114
-
115
- | Error | Action |
116
- |-------|--------|
117
- | Cannot determine mode from input | AskUserQuestion to clarify intent |
118
- | Phase doc not found | Error and exit with file path |
119
- | Invalid flags for mode | Warn and continue with defaults |
120
-
121
- ## Related Commands
122
-
123
- ```bash
124
- # View review/fix progress dashboard
125
- ccw view
126
-
127
- # Workflow pipeline
128
- # Step 1: Review
129
- Skill(skill="review-cycle", args="src/auth/**")
130
- # Step 2: Fix (after review complete)
131
- Skill(skill="review-cycle", args="--fix .workflow/active/WFS-{session-id}/.review/")
132
- ```
1
+ ---
2
+ name: review-cycle
3
+ description: "Unified multi-dimensional code review with automated fix orchestration. Routes to session-based (git changes), module-based (path patterns), or fix mode. Triggers on \"workflow:review-cycle\", \"workflow:review-session-cycle\", \"workflow:review-module-cycle\", \"workflow:review-cycle-fix\"."
4
+ allowed-tools: Agent, AskUserQuestion, TaskCreate, TaskUpdate, TaskList, Read, Write, Edit, Bash, Glob, Grep, Skill
5
+ ---
6
+
7
+ # Review Cycle
8
+
9
+ Unified code review orchestrator with mode-based routing. Detects input type and dispatches to the appropriate execution phase.
10
+
11
+ ## Architecture Overview
12
+
13
+ ```
14
+ ┌──────────────────────────────────────────────────────────┐
15
+ │ Review Cycle Orchestrator (SKILL.md) │
16
+ │ → Parse input → Detect mode → Read phase doc → Execute │
17
+ └───────────────────────────┬──────────────────────────────┘
18
+
19
+ ┌─────────────────┼─────────────────┐
20
+ ↓ ↓ ↓
21
+ ┌─────────────┐ ┌─────────────┐ ┌─────────────┐
22
+ │ session │ │ module │ │ fix │
23
+ │ (git changes│ │(path pattern│ │(export file │
24
+ │ review) │ │ review) │ │ auto-fix) │
25
+ └─────────────┘ └─────────────┘ └─────────────┘
26
+ phases/ phases/ phases/
27
+ review-session.md review-module.md review-fix.md
28
+ ```
29
+
30
+ ## Auto Mode Detection
31
+
32
+ ```javascript
33
+ // ★ 统一 auto mode 检测:-y/--yes 从 $ARGUMENTS 或 ccw 传播
34
+ const autoYes = /\b(-y|--yes)\b/.test($ARGUMENTS)
35
+ ```
36
+
37
+ When `autoYes` is true, skip all interactive confirmations and use defaults throughout the review cycle phases.
38
+
39
+ ## Mode Detection
40
+
41
+ ```javascript
42
+ function detectMode(args) {
43
+ if (args.includes('--fix')) return 'fix';
44
+ if (args.match(/\*|\.ts|\.js|\.py|\.vue|\.jsx|\.tsx|src\/|lib\//)) return 'module';
45
+ if (args.match(/^WFS-/) || args.trim() === '') return 'session';
46
+ return 'session'; // default
47
+ }
48
+ ```
49
+
50
+ | Input Pattern | Detected Mode | Phase Doc |
51
+ |---------------|---------------|-----------|
52
+ | `src/auth/**` | `module` | phases/review-module.md |
53
+ | `src/auth/**,src/payment/**` | `module` | phases/review-module.md |
54
+ | `WFS-payment-integration` | `session` | phases/review-session.md |
55
+ | _(empty)_ | `session` | phases/review-session.md |
56
+ | `--fix .review/` | `fix` | phases/review-fix.md |
57
+ | `--fix --resume` | `fix` | phases/review-fix.md |
58
+
59
+ ## Usage
60
+
61
+ ```
62
+ Skill(skill="review-cycle", args="src/auth/**") # Module mode
63
+ Skill(skill="review-cycle", args="src/auth/** --dimensions=security,architecture") # Module + custom dims
64
+ Skill(skill="review-cycle", args="WFS-payment-integration") # Session mode
65
+ Skill(skill="review-cycle", args="") # Session: auto-detect
66
+ Skill(skill="review-cycle", args="--fix .workflow/active/WFS-123/.review/") # Fix mode
67
+ Skill(skill="review-cycle", args="--fix --resume") # Fix: resume
68
+ Skill(skill="review-cycle", args="-y src/auth/**") # Auto mode (skip confirmations)
69
+
70
+ # Common flags (all modes):
71
+ --dimensions=dim1,dim2,... Custom dimensions (default: all 7)
72
+ --max-iterations=N Max deep-dive iterations (default: 3)
73
+
74
+ # Fix-only flags:
75
+ --fix Enter fix pipeline
76
+ --resume Resume interrupted fix session
77
+ --batch-size=N Findings per planning batch (default: 5)
78
+ --max-iterations=N Max retry per finding (default: 3)
79
+ ```
80
+
81
+ ## Execution Flow
82
+
83
+ ```
84
+ 1. Parse $ARGUMENTS → extract mode + flags
85
+ 2. Detect mode (session | module | fix)
86
+ 3. Read corresponding phase doc:
87
+ - session → Read phases/review-session.md → execute
88
+ - module → Read phases/review-module.md → execute
89
+ - fix → Read phases/review-fix.md → execute
90
+ 4. Phase doc contains full execution detail (5 phases for review, 4+1 phases for fix)
91
+ ```
92
+
93
+ **Phase Reference Documents** (read on-demand based on detected mode):
94
+
95
+ | Mode | Document | Source | Description |
96
+ |------|----------|--------|-------------|
97
+ | session | [phases/review-session.md](phases/review-session.md) | review-session-cycle.md | Session-based review: git changes → 7-dimension parallel analysis → aggregation → deep-dive → completion |
98
+ | module | [phases/review-module.md](phases/review-module.md) | review-module-cycle.md | Module-based review: path patterns → 7-dimension parallel analysis → aggregation → deep-dive → completion |
99
+ | fix | [phases/review-fix.md](phases/review-fix.md) | review-cycle-fix.md | Automated fix: export file → intelligent batching → parallel planning → execution → completion |
100
+
101
+ ## Project Context
102
+
103
+ Run `ccw spec load --category review` for review standards, checklists, and approval gates.
104
+
105
+ ## Core Rules
106
+
107
+ 1. **Mode Detection First**: Parse input to determine session/module/fix mode before anything else
108
+ 2. **Progressive Loading**: Read ONLY the phase doc for the detected mode, not all three
109
+ 3. **Full Delegation**: Once mode is detected, the phase doc owns the entire execution flow
110
+ 4. **Auto-Continue**: Phase docs contain their own multi-phase execution (Phase 1-5 or Phase 1-4+5)
111
+ 5. **DO NOT STOP**: Continuous execution until all internal phases within the phase doc complete
112
+
113
+ ## Error Handling
114
+
115
+ | Error | Action |
116
+ |-------|--------|
117
+ | Cannot determine mode from input | AskUserQuestion to clarify intent |
118
+ | Phase doc not found | Error and exit with file path |
119
+ | Invalid flags for mode | Warn and continue with defaults |
120
+
121
+ ## Related Commands
122
+
123
+ ```bash
124
+ # View review/fix progress dashboard
125
+ ccw view
126
+
127
+ # Workflow pipeline
128
+ # Step 1: Review
129
+ Skill(skill="review-cycle", args="src/auth/**")
130
+ # Step 2: Fix (after review complete)
131
+ Skill(skill="review-cycle", args="--fix .workflow/active/WFS-{session-id}/.review/")
132
+ ```
@@ -401,7 +401,7 @@ Task(
401
401
  1. Read review state: ${reviewStateJsonPath}
402
402
  2. Get target files: Read resolved_files from review-state.json
403
403
  3. Validate file access: bash(ls -la ${targetFiles.join(' ')})
404
- 4. Execute: cat ~/.ccw/workflows/cli-templates/schemas/review-dimension-results-schema.json (get output schema reference)
404
+ 4. Execute: ccw tool exec json_builder '{"cmd":"info","schema":"review-dim"}' (get output schema summary)
405
405
  5. Read: .workflow/project-tech.json (technology stack and architecture context)
406
406
  6. Read: .workflow/specs/*.md (user-defined constraints and conventions to validate against)
407
407
 
@@ -456,7 +456,7 @@ Task(
456
456
  ${getDimensionGuidance(dimension)}
457
457
 
458
458
  ## Success Criteria
459
- - [ ] Schema obtained via cat review-dimension-results-schema.json
459
+ - [ ] Schema obtained via json_builder info
460
460
  - [ ] All target files analyzed for ${dimension} concerns
461
461
  - [ ] All findings include file:line references with code snippets
462
462
  - [ ] Severity assessment follows established criteria (see reference)
@@ -505,7 +505,7 @@ Task(
505
505
  2. Read affected file: ${file}
506
506
  3. Identify related code: bash(grep -r "import.*${basename(file)}" ${projectDir}/src --include="*.ts")
507
507
  4. Read test files: bash(find ${projectDir}/tests -name "*${basename(file, '.ts')}*" -type f)
508
- 5. Execute: cat ~/.ccw/workflows/cli-templates/schemas/review-deep-dive-results-schema.json (get output schema reference)
508
+ 5. Execute: ccw tool exec json_builder '{"cmd":"info","schema":"review-deep"}' (get output schema summary)
509
509
  6. Read: .workflow/project-tech.json (technology stack and architecture context)
510
510
  7. Read: .workflow/specs/*.md (user-defined constraints for remediation compliance)
511
511
 
@@ -538,7 +538,7 @@ Task(
538
538
  - Impact assessment and rollback strategy
539
539
 
540
540
  ## Success Criteria
541
- - [ ] Schema obtained via cat review-deep-dive-results-schema.json
541
+ - [ ] Schema obtained via json_builder info
542
542
  - [ ] Root cause clearly identified with supporting evidence
543
543
  - [ ] Remediation plan is step-by-step actionable with exact file:line references
544
544
  - [ ] Each step includes specific commands and validation tests
@@ -412,7 +412,7 @@ Task(
412
412
  2. Read completed task summaries: bash(find ${summariesDir} -name "IMPL-*.md" -type f)
413
413
  3. Get changed files: bash(cd ${workflowDir} && git log --since="${sessionCreatedAt}" --name-only --pretty=format: | sort -u)
414
414
  4. Read review state: ${reviewStateJsonPath}
415
- 5. Execute: cat ~/.ccw/workflows/cli-templates/schemas/review-dimension-results-schema.json (get output schema reference)
415
+ 5. Execute: ccw tool exec json_builder '{"cmd":"info","schema":"review-dim"}' (get output schema summary)
416
416
  6. Read: .workflow/project-tech.json (technology stack and architecture context)
417
417
  7. Read: .workflow/specs/*.md (user-defined constraints and conventions to validate against)
418
418
 
@@ -467,7 +467,7 @@ Task(
467
467
  ${getDimensionGuidance(dimension)}
468
468
 
469
469
  ## Success Criteria
470
- - [ ] Schema obtained via cat review-dimension-results-schema.json
470
+ - [ ] Schema obtained via json_builder info
471
471
  - [ ] All changed files analyzed for ${dimension} concerns
472
472
  - [ ] All findings include file:line references with code snippets
473
473
  - [ ] Severity assessment follows established criteria (see reference)
@@ -516,7 +516,7 @@ Task(
516
516
  2. Read affected file: ${file}
517
517
  3. Identify related code: bash(grep -r "import.*${basename(file)}" ${workflowDir}/src --include="*.ts")
518
518
  4. Read test files: bash(find ${workflowDir}/tests -name "*${basename(file, '.ts')}*" -type f)
519
- 5. Execute: cat ~/.ccw/workflows/cli-templates/schemas/review-deep-dive-results-schema.json (get output schema reference)
519
+ 5. Execute: ccw tool exec json_builder '{"cmd":"info","schema":"review-deep"}' (get output schema summary)
520
520
  6. Read: .workflow/project-tech.json (technology stack and architecture context)
521
521
  7. Read: .workflow/specs/*.md (user-defined constraints for remediation compliance)
522
522
 
@@ -550,7 +550,7 @@ Task(
550
550
  - Impact assessment and rollback strategy
551
551
 
552
552
  ## Success Criteria
553
- - [ ] Schema obtained via cat review-deep-dive-results-schema.json
553
+ - [ ] Schema obtained via json_builder info
554
554
  - [ ] Root cause clearly identified with supporting evidence
555
555
  - [ ] Remediation plan is step-by-step actionable with exact file:line references
556
556
  - [ ] Each step includes specific commands and validation tests
@@ -1,6 +1,6 @@
1
1
  ---
2
2
  name: spec-generator
3
- description: Specification generator - 6 phase document chain producing product brief, PRD, architecture, and epics. Triggers on "generate spec", "create specification", "spec generator", "workflow:spec".
3
+ description: "Specification generator - 7 phase document chain producing product brief, PRD, architecture, epics, and issues with Codex review gates. Triggers on generate spec, create specification, spec generator, workflow:spec."
4
4
  allowed-tools: Agent, AskUserQuestion, TaskCreate, TaskUpdate, TaskList, Read, Write, Edit, Bash, Glob, Grep, Skill
5
5
  ---
6
6
 
@@ -37,7 +37,7 @@ The SKILL.md follows a strict template. Every generated SKILL.md contains these
37
37
  ```yaml
38
38
  ---
39
39
  name: ${teamConfig.skillName}
40
- description: ${teamConfig.domain}. Triggers on "${teamConfig.skillName}".
40
+ description: "${teamConfig.domain}. Triggers on ${teamConfig.skillName}."
41
41
  allowed-tools: TeamCreate(*), TeamDelete(*), SendMessage(*), TaskCreate(*), TaskUpdate(*), TaskList(*), TaskGet(*), Agent(*), AskUserQuestion(*), Read(*), Write(*), Edit(*), Bash(*), Glob(*), Grep(*)
42
42
  ---
43
43
  ```
@@ -1,6 +1,6 @@
1
1
  ---
2
2
  name: team-lifecycle-v4
3
- description: Full lifecycle team skill with clean architecture. SKILL.md is a universal router — all roles read it. Beat model is coordinator-only. Structure is roles/ + specs/ + templates/. Triggers on "team lifecycle v4".
3
+ description: Full lifecycle team skill plan, develop, test, review in one coordinated session. Role-based architecture with coordinator-driven beat model. Triggers on "team lifecycle v4".
4
4
  allowed-tools: TeamCreate(*), TeamDelete(*), SendMessage(*), TaskCreate(*), TaskUpdate(*), TaskList(*), TaskGet(*), Agent(*), AskUserQuestion(*), Read(*), Write(*), Edit(*), Bash(*), Glob(*), Grep(*)
5
5
  ---
6
6
 
@@ -1,6 +1,6 @@
1
1
  ---
2
2
  name: team-review
3
- description: Unified team skill for code review. 3-role pipeline: scanner, reviewer, fixer. Triggers on "team-review".
3
+ description: "Unified team skill for code review. 3-role pipeline: scanner, reviewer, fixer. Triggers on team-review."
4
4
  allowed-tools: TeamCreate(*), TeamDelete(*), SendMessage(*), TaskCreate(*), TaskUpdate(*), TaskList(*), TaskGet(*), Agent(*), AskUserQuestion(*), Read(*), Write(*), Edit(*), Bash(*), Glob(*), Grep(*), mcp__ace-tool__search_context(*)
5
5
  ---
6
6
 
@@ -1,6 +1,6 @@
1
1
  ---
2
2
  name: team-ultra-analyze
3
- description: Deep collaborative analysis team skill. All roles route via this SKILL.md. Beat model is coordinator-only (monitor.md). Structure is roles/ + specs/. Triggers on "team ultra-analyze", "team analyze".
3
+ description: Deep collaborative analysis team skill. Multi-role investigation with coordinator-driven synthesis. Triggers on "team ultra-analyze", "team analyze".
4
4
  allowed-tools: TeamCreate(*), TeamDelete(*), SendMessage(*), TaskCreate(*), TaskUpdate(*), TaskList(*), TaskGet(*), Agent(*), AskUserQuestion(*), Read(*), Write(*), Edit(*), Bash(*), Glob(*), Grep(*)
5
5
  ---
6
6
 
@@ -1,6 +1,6 @@
1
1
  ---
2
2
  name: workflow-multi-cli-plan
3
- description: Multi-CLI collaborative planning with ACE context gathering, iterative cross-verification, and execution handoff
3
+ description: Multi-CLI collaborative planning with codebase context gathering, iterative cross-verification, and execution handoff.
4
4
  allowed-tools: Skill, Agent, AskUserQuestion, TodoWrite, Read, Write, Edit, Bash, Glob, Grep
5
5
  ---
6
6
 
@@ -246,8 +246,8 @@ Agent({
246
246
  description: "Generate implementation plan",
247
247
  prompt: `
248
248
  ## Schema Reference
249
- Execute: cat ~/.ccw/workflows/cli-templates/schemas/plan-overview-base-schema.json
250
- Execute: cat ~/.ccw/workflows/cli-templates/schemas/task-schema.json
249
+ Execute: ccw tool exec json_builder '{"cmd":"info","schema":"plan"}'
250
+ Execute: ccw tool exec json_builder '{"cmd":"info","schema":"task"}'
251
251
 
252
252
  ## Output Format: Two-Layer Structure
253
253
  - plan.json: Overview with task_ids[] referencing .task/ files (NO tasks[] array)
@@ -1,6 +1,6 @@
1
1
  ---
2
2
  name: workflow-plan
3
- description: Unified planning skill - 4-phase planning workflow, plan verification, and interactive replanning. Triggers on "workflow-plan", "workflow-plan-verify", "workflow:replan".
3
+ description: "Unified planning skill - 4-phase planning workflow, plan verification, and interactive replanning. Triggers on \"workflow-plan\", \"workflow-plan-verify\", \"workflow:replan\"."
4
4
  allowed-tools: Skill, Agent, AskUserQuestion, TodoWrite, Read, Write, Edit, Bash, Glob, Grep
5
5
  ---
6
6
 
@@ -70,7 +70,7 @@ Task(subagent_type="cli-execution-agent", run_in_background=false, prompt=`
70
70
  ## Analysis Steps
71
71
 
72
72
  ### 0. Load Output Schema (MANDATORY)
73
- Execute: cat ~/.ccw/workflows/cli-templates/schemas/conflict-resolution-schema.json
73
+ Execute: ccw tool exec json_builder '{"cmd":"info","schema":"conflict"}' (get schema summary)
74
74
 
75
75
  ### 1. Load Context
76
76
  - Read existing files from conflict_detection.existing_files
@@ -119,7 +119,7 @@ Task(subagent_type="cli-execution-agent", run_in_background=false, prompt=`
119
119
 
120
120
  Output to conflict-resolution.json (generated in Phase 4)
121
121
 
122
- **Schema Reference**: Execute cat ~/.ccw/workflows/cli-templates/schemas/conflict-resolution-schema.json to get full schema
122
+ **Schema Reference**: Execute ccw tool exec json_builder '{"cmd":"info","schema":"conflict"}' to get schema summary
123
123
 
124
124
  Return JSON following the schema. Key requirements:
125
125
  - Minimum 2 strategies per conflict, max 4
@@ -195,8 +195,8 @@ Task(
195
195
  ## Plan Verification Task
196
196
 
197
197
  ### MANDATORY FIRST STEPS
198
- 1. Read: ~/.ccw/workflows/cli-templates/schemas/plan-verify-agent-schema.json (dimensions & rules)
199
- 2. Read: ~/.ccw/workflows/cli-templates/schemas/verify-json-schema.json (output schema)
198
+ 1. Execute: ccw tool exec json_builder '{"cmd":"info","schema":"plan-verify"}' (dimensions & rules)
199
+ 2. Execute: ccw tool exec json_builder '{"cmd":"info","schema":"verify"}' (output schema)
200
200
  3. Read: ${session_file} (user intent)
201
201
  4. Read: ${PLANNING_NOTES} (constraints & N+1 context)
202
202
  5. Read: ${IMPL_PLAN} (implementation plan)
@@ -99,7 +99,7 @@ Execute **${angle}** exploration for TDD task planning context. Analyze codebase
99
99
  ## MANDATORY FIRST STEPS (Execute by Agent)
100
100
  1. Run: ccw tool exec get_modules_by_depth '{}' (project structure)
101
101
  2. Run: rg -l "{keyword_from_task}" --type ts (locate relevant files)
102
- 3. Execute: cat ~/.ccw/workflows/cli-templates/schemas/explore-json-schema.json (get output schema reference)
102
+ 3. Execute: ccw tool exec json_builder '{"cmd":"init","schema":"explore","output":"${sessionFolder}/exploration-${angle}.json"}' (init output + get schema info)
103
103
 
104
104
  ## Exploration Strategy (${angle} focus)
105
105
 
@@ -121,7 +121,7 @@ Execute **${angle}** exploration for TDD task planning context. Analyze codebase
121
121
 
122
122
  **File**: ${sessionFolder}/exploration-${angle}.json
123
123
 
124
- **Schema Reference**: Schema obtained in MANDATORY FIRST STEPS step 3, follow schema exactly
124
+ **Schema Reference**: Skeleton initialized via json_builder in step 3. Use `set` to populate fields, `validate` before returning.
125
125
 
126
126
  **Required Fields** (all ${angle} focused):
127
127
  - project_structure: Modules/architecture relevant to ${angle}
@@ -141,7 +141,7 @@ Execute **${angle}** exploration for TDD task planning context. Analyze codebase
141
141
  - _metadata.exploration_angle: "${angle}"
142
142
 
143
143
  ## Success Criteria
144
- - [ ] Schema obtained via cat explore-json-schema.json
144
+ - [ ] Schema initialized via json_builder init
145
145
  - [ ] get_modules_by_depth.sh executed
146
146
  - [ ] At least 3 relevant files identified with ${angle} rationale
147
147
  - [ ] Patterns are actionable (code examples, not generic advice)
@@ -70,7 +70,7 @@ Task(subagent_type="cli-execution-agent", run_in_background=false, prompt=`
70
70
  ## Analysis Steps
71
71
 
72
72
  ### 0. Load Output Schema (MANDATORY)
73
- Execute: cat ~/.ccw/workflows/cli-templates/schemas/conflict-resolution-schema.json
73
+ Execute: ccw tool exec json_builder '{"cmd":"info","schema":"conflict"}'
74
74
 
75
75
  ### 1. Load Context
76
76
  - Read existing files from conflict_detection.existing_files
@@ -119,7 +119,7 @@ Task(subagent_type="cli-execution-agent", run_in_background=false, prompt=`
119
119
 
120
120
  Output to conflict-resolution.json (generated in Phase 4)
121
121
 
122
- **Schema Reference**: Execute cat ~/.ccw/workflows/cli-templates/schemas/conflict-resolution-schema.json to get full schema
122
+ **Schema Reference**: Execute ccw tool exec json_builder '{"cmd":"info","schema":"conflict"}' to get schema summary
123
123
 
124
124
  Return JSON following the schema. Key requirements:
125
125
  - Minimum 2 strategies per conflict, max 4
@@ -1,6 +1,6 @@
1
1
  ---
2
2
  name: workflow-test-fix
3
- description: Unified test-fix pipeline combining test generation (session, context, analysis, task gen) with iterative test-cycle execution (adaptive strategy, progressive testing, CLI fallback). Triggers on "workflow-test-fix", "workflow-test-fix", "test fix workflow".
3
+ description: Unified test-fix pipeline combining test generation (session, context, analysis, task gen) with iterative test-cycle execution (adaptive strategy, progressive testing, CLI fallback). Triggers on "workflow-test-fix", "test fix workflow".
4
4
  allowed-tools: Skill, Agent, AskUserQuestion, TaskCreate, TaskUpdate, TaskList, Read, Write, Edit, Bash, Glob, Grep
5
5
  ---
6
6
 
@@ -223,7 +223,7 @@ Execute **${angle}** exploration for task planning context. Analyze codebase fro
223
223
  ## MANDATORY FIRST STEPS (Execute by Agent)
224
224
  1. Run: ccw tool exec get_modules_by_depth '{}' (project structure)
225
225
  2. Run: rg -l "{keyword_from_task}" --type ts (locate relevant files)
226
- 3. Execute: cat ~/.ccw/workflows/cli-templates/schemas/explore-json-schema.json (get output schema reference)
226
+ 3. Execute: ccw tool exec json_builder '{"cmd":"init","schema":"explore","output":"${sessionFolder}/exploration-${angle}.json"}' (init output + get schema info)
227
227
 
228
228
  ## Exploration Strategy (${angle} focus)
229
229
 
@@ -265,7 +265,7 @@ Execute **${angle}** exploration for task planning context. Analyze codebase fro
265
265
  - _metadata.exploration_angle: "${angle}"
266
266
 
267
267
  ## Success Criteria
268
- - [ ] Schema obtained via cat explore-json-schema.json
268
+ - [ ] Schema initialized via json_builder init
269
269
  - [ ] get_modules_by_depth.sh executed
270
270
  - [ ] At least 3 relevant files identified with ${angle} rationale
271
271
  - [ ] Patterns are actionable (code examples, not generic advice)
package/.codex/AGENTS.md CHANGED
@@ -105,6 +105,22 @@ ACE search_context (semantic) → smart_search (structured) → read_file (batch
105
105
 
106
106
  **NEVER** use shell commands (`cat`, `find`, `grep`) when MCP tools are available.
107
107
 
108
+ ## Workflow Session Awareness
109
+
110
+ | Workflow | Directory | Summary File |
111
+ |----------|-----------|-------------|
112
+ | `workflow-plan` | `.workflow/active/WFS-*/` | `workflow-session.json` |
113
+ | `workflow-lite-plan` | `.workflow/.lite-plan/{slug}-{date}/` | `plan.json` |
114
+ | `analyze-with-file` | `.workflow/.analysis/ANL-*/` | `conclusions.json` |
115
+ | `multi-cli-plan` | `.workflow/.multi-cli-plan/*/` | `session-state.json` |
116
+ | `lite-fix` | `.workflow/.lite-fix/*/` | `fix-plan.json` |
117
+ | Other | `.workflow/.debug/`, `.workflow/.scratchpad/`, `.workflow/archives/` | — |
118
+
119
+ Before starting work, scan recent sessions (7 days) to avoid conflicts and reuse prior work:
120
+ - Overlapping file scope → warn, suggest referencing prior session
121
+ - Complementary findings → feed into current task context
122
+
123
+
108
124
  ## Execution Checklist
109
125
 
110
126
  **Before**: