claude-flow-novice 2.18.40 → 2.19.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (117) hide show
  1. package/.claude/agents/SHARED_PROTOCOL.md +25 -1
  2. package/.claude/agents/cfn-dev-team/dev-ops/fly-io-specialist.md +418 -0
  3. package/.claude/agents/cfn-dev-team/developers/database/mem0-specialist.md +579 -0
  4. package/.claude/agents/cfn-dev-team/developers/database/memgraph-specialist.md +722 -0
  5. package/.claude/agents/cfn-dev-team/documentation/pseudocode.md +1 -1
  6. package/.claude/agents/cfn-dev-team/documentation/specification-agent.md +1 -1
  7. package/.claude/agents/cfn-dev-team/testers/tester.md +35 -0
  8. package/.claude/commands/{cfn-ruvector → cfn-codesearch}/cfn-codebase-reindex.md +4 -4
  9. package/.claude/commands/{cfn-ruvector → cfn-codesearch}/cfn-codebase-search.md +7 -7
  10. package/.claude/commands/{cfn-ruvector → cfn-codesearch}/cfn-detect-stale-docs.md +3 -3
  11. package/.claude/commands/{cfn-ruvector-search.md → cfn-codesearch-search.md} +7 -7
  12. package/.claude/commands/cfn-fix-errors.md +1 -1
  13. package/.claude/commands/cfn-loop-task.md +66 -2
  14. package/.claude/skills/{bulk-add-ruvector-instructions.sh → bulk-add-codesearch-instructions.sh} +12 -12
  15. package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/AGENT_INTEGRATION_PATTERNS.md +20 -20
  16. package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/AGENT_LIFECYCLE_INTEGRATION.md +11 -11
  17. package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/Cargo.toml +9 -4
  18. package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/EXTRACTION_EXAMPLES.md +6 -6
  19. package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/IMMEDIATE_ACTION_REQUIRED.md +9 -9
  20. package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/README.md +7 -7
  21. package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/SCHEMA_V2_IMPLEMENTATION.md +1 -1
  22. package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/SECURITY_IMPLEMENTATION.md +3 -3
  23. package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/SECURITY_TESTING_COMPLETION.md +4 -4
  24. package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/SKILL.md +31 -31
  25. package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/analyze-agent-failures.sh +11 -11
  26. package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/cfn-integration.sh +27 -27
  27. package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/index-code.sh +11 -11
  28. package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/index_all.sh +2 -2
  29. package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/ingest-agent-transcript.sh +10 -10
  30. package/.claude/skills/{cfn-local-ruvector-accelerator/init-local-ruvector.sh → cfn-codesearch/init-local-codesearch.sh} +16 -16
  31. package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/project-structure.md +10 -10
  32. package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/query-local.sh +6 -6
  33. package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/src/cli/index.rs +233 -4
  34. package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/src/cli/init.rs +18 -18
  35. package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/src/cli/query.rs +64 -3
  36. package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/src/embeddings.rs +19 -5
  37. package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/src/lib.rs +6 -4
  38. package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/src/main.rs +35 -25
  39. package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/src/paths.rs +19 -13
  40. package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/src/query_v2.rs +3 -4
  41. package/.claude/skills/cfn-codesearch/src/store_pgvector.rs +301 -0
  42. package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/src/store_v2.rs +12 -1
  43. package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/test-agent-lifecycle-integration.sh +6 -6
  44. package/.claude/skills/{cfn-local-ruvector-accelerator/test-local-ruvector.sh → cfn-codesearch/test-local-codesearch.sh} +7 -7
  45. package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/test_query_api.sh +2 -2
  46. package/.claude/skills/cfn-epic-creator/SKILL.md +110 -2
  47. package/.claude/skills/cfn-epic-creator/invoke.sh +120 -1
  48. package/.claude/skills/cfn-mdap-context-injection/SKILL.md +2 -2
  49. package/.claude/skills/cfn-mdap-context-injection/inject.sh +21 -21
  50. package/package.json +11 -11
  51. package/readme/feature-status.md +405 -0
  52. package/.claude/agents/docker-ts-fixer.md +0 -65
  53. /package/.claude/agents/cfn-dev-team/{testing → testers}/test-validation-agent.md +0 -0
  54. /package/.claude/{agents/cfn-dev-team/utility → cfn-extras/agents}/context-curator.md +0 -0
  55. /package/.claude/{agents/custom → cfn-extras/agents/custom-agents}/cfn-docker-expert.md +0 -0
  56. /package/.claude/{agents/custom → cfn-extras/agents/custom-agents}/cfn-loops-cli-expert.md +0 -0
  57. /package/.claude/{agents/custom → cfn-extras/agents/custom-agents}/cfn-redis-operations.md +0 -0
  58. /package/.claude/{agents/custom → cfn-extras/agents/custom-agents}/cfn-system-expert.md +0 -0
  59. /package/.claude/{agents/csuite → cfn-extras/agents/custom-agents}/cto-agent.md +0 -0
  60. /package/.claude/{agents/custom → cfn-extras/agents/custom-agents}/trigger-dev-expert.md +0 -0
  61. /package/.claude/{agents/cfn-dev-team/coordinators → cfn-extras/agents/deprecated-coordinators}/consensus-builder.md +0 -0
  62. /package/.claude/{agents/cfn-dev-team/coordinators → cfn-extras/agents/deprecated-coordinators}/multi-sprint-coordinator.md +0 -0
  63. /package/.claude/{agents → cfn-extras/agents/docker-team}/docker-coordinators/cfn-docker-v3-coordinator.md +0 -0
  64. /package/.claude/{agents/cfn-dev-team/dev-ops → cfn-extras/agents}/kubernetes-specialist.md +0 -0
  65. /package/.claude/{agents/cfn-dev-team/architecture → cfn-extras/agents}/planner.md +0 -0
  66. /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/.claude/hooks/SessionStart-cfn-build-ruvector.sh +0 -0
  67. /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/Cargo.toml.backup +0 -0
  68. /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/SECURITY_FINDINGS_SUMMARY.txt +0 -0
  69. /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/docs/EXECUTIVE_SUMMARY.txt +0 -0
  70. /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/docs/PHASE_4_QUERY_API.md +0 -0
  71. /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/docs/RUST_AST_EXTRACTOR_IMPLEMENTATION.md +0 -0
  72. /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/docs/TRANSACTION_MANAGEMENT.md +0 -0
  73. /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/docs/VALIDATION_FINDINGS.txt +0 -0
  74. /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/embeddings_manager.py.backup +0 -0
  75. /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/epic-ast-indexer.json +0 -0
  76. /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/index/index.bin +0 -0
  77. /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/index/metadata.json +0 -0
  78. /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/index-code.sh.backup +0 -0
  79. /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/query-agent-patterns.sh +0 -0
  80. /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/requirements.txt +0 -0
  81. /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/search_engine_v2.py.backup +0 -0
  82. /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/sqlite_store.py.backup +0 -0
  83. /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/src/cli/cleanup.rs +0 -0
  84. /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/src/cli/export.rs +0 -0
  85. /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/src/cli/find.rs +0 -0
  86. /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/src/cli/index_ast.rs +0 -0
  87. /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/src/cli/index_modified.rs +0 -0
  88. /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/src/cli/migration.rs +0 -0
  89. /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/src/cli/mod.rs +0 -0
  90. /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/src/cli/refs.rs +0 -0
  91. /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/src/cli/reset.rs +0 -0
  92. /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/src/cli/stats.rs +0 -0
  93. /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/src/extractors/mod.rs +0 -0
  94. /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/src/extractors/rust.rs +0 -0
  95. /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/src/extractors/rust_placeholder.rs +0 -0
  96. /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/src/extractors/text_fallback.rs +0 -0
  97. /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/src/extractors/typescript.rs +0 -0
  98. /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/src/extractors/typescript_full.rs +0 -0
  99. /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/src/main.rs.backup +0 -0
  100. /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/src/migration.rs +0 -0
  101. /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/src/migration_backup.rs +0 -0
  102. /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/src/migration_tx.rs +0 -0
  103. /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/src/migration_v2.rs +0 -0
  104. /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/src/path_validator.rs +0 -0
  105. /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/src/query_api.rs +0 -0
  106. /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/src/schema_v2.rs +0 -0
  107. /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/src/search_engine.rs +0 -0
  108. /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/src/security_tests.rs +0 -0
  109. /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/src/sqlite_store.rs +0 -0
  110. /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/src/store_v2_backup.rs +0 -0
  111. /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/src/store_v2_fixed.rs +0 -0
  112. /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/src/store_v2_tx.rs +0 -0
  113. /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/src/test_schema.rs +0 -0
  114. /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/src/transaction_tests.rs +0 -0
  115. /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/test_ast_indexing.rs +0 -0
  116. /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/test_schema.sql +0 -0
  117. /package/.claude/skills/{cfn-local-ruvector-accelerator → cfn-codesearch}/test_schema_v2.sql +0 -0
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  name: pseudocode
3
3
  description: MUST BE USED for algorithm design, logic planning, code outline creation. Use PROACTIVELY for problem decomposition, planning. Keywords - pseudocode, algorithm, logic, planning
4
- model: haiku
4
+ model: opus
5
5
  color: indigo
6
6
  type: specialist
7
7
  capabilities:
@@ -2,7 +2,7 @@
2
2
  name: specification-agent
3
3
  description: MUST BE USED when defining requirements, specifications, or problem analysis in SPARC methodology. Use PROACTIVELY for requirements gathering, constraint identification, acceptance criteria definition, scope analysis, stakeholder requirements, domain analysis, use case documentation.
4
4
  type: specialist
5
- model: haiku
5
+ model: opus
6
6
  capabilities:
7
7
  - requirements_gathering
8
8
  - constraint_analysis
@@ -29,6 +29,41 @@ validation_hooks:
29
29
 
30
30
  # Comprehensive Tester Agent Profile
31
31
 
32
+ ## ⚠️ TEST FRAMEWORK ALIGNMENT (MANDATORY)
33
+
34
+ **Before writing ANY tests, you MUST detect and align with the existing test framework.**
35
+
36
+ ```bash
37
+ # Detect existing test framework
38
+ if grep -q "vitest" package.json 2>/dev/null; then
39
+ FRAMEWORK="vitest"
40
+ elif grep -q "jest" package.json 2>/dev/null; then
41
+ FRAMEWORK="jest"
42
+ elif ls *.test.ts *.spec.ts 2>/dev/null | head -1 | xargs grep -l "vitest\|vi\." 2>/dev/null; then
43
+ FRAMEWORK="vitest"
44
+ elif ls *.test.ts *.spec.ts 2>/dev/null | head -1 | xargs grep -l "jest\|expect(" 2>/dev/null; then
45
+ FRAMEWORK="jest"
46
+ fi
47
+ ```
48
+
49
+ | Check | Action |
50
+ |-------|--------|
51
+ | `vitest` in package.json | Use vitest patterns: `vi.fn()`, `vi.mock()` |
52
+ | `jest` in package.json | Use jest patterns: `jest.fn()`, `jest.mock()` |
53
+ | Existing `*.test.ts` files | Match their import style exactly |
54
+ | `vitest.config.ts` exists | Use vitest |
55
+ | `jest.config.js` exists | Use jest |
56
+
57
+ **NEVER mix frameworks. If project uses vitest, do NOT import from jest. If project uses jest, do NOT import from vitest.**
58
+
59
+ **Common mistakes to avoid:**
60
+ - ❌ `import { jest } from '@jest/globals'` in a vitest project
61
+ - ❌ `import { vi } from 'vitest'` in a jest project
62
+ - ❌ Using `jest.fn()` when project uses `vi.fn()`
63
+ - ❌ Creating `jest.config.js` when `vitest.config.ts` exists
64
+
65
+ ---
66
+
32
67
  ## Success Criteria Awareness (REQUIRED - Phase 2 TDD)
33
68
 
34
69
  → See: `.claude/skills/cfn-test-execution/SKILL.md` for test execution framework
@@ -17,7 +17,7 @@ Add `--force` flag for complete reindex:
17
17
  - Major restructuring
18
18
  - Index issues
19
19
 
20
- **Log file:** `/tmp/ruvector-index.log` - tail this for progress monitoring.
20
+ **Log file:** `/tmp/codesearch-index.log` - tail this for progress monitoring.
21
21
 
22
22
  ---
23
23
 
@@ -40,9 +40,9 @@ fi
40
40
  echo "✅ OpenAI key: ${OPENAI_API_KEY:0:12}..."
41
41
 
42
42
  # --- Setup ---
43
- RUVECTOR_BIN="${HOME}/.local/bin/local-ruvector"
44
- [ ! -f "$RUVECTOR_BIN" ] && RUVECTOR_BIN="./.claude/skills/cfn-local-ruvector-accelerator/target/release/local-ruvector"
45
- LOG_FILE="/tmp/ruvector-index.log"
43
+ RUVECTOR_BIN="${HOME}/.local/bin/local-codesearch"
44
+ [ ! -f "$RUVECTOR_BIN" ] && RUVECTOR_BIN="./.claude/skills/cfn-local-codesearch-accelerator/target/release/local-codesearch"
45
+ LOG_FILE="/tmp/codesearch-index.log"
46
46
 
47
47
  echo "📝 Logging to: $LOG_FILE"
48
48
  echo " Monitor with: tail -f $LOG_FILE"
@@ -1,5 +1,5 @@
1
1
  ---
2
- description: Search codebase using RuVector semantic index (400x faster than grep)
2
+ description: Search codebase using CodeSearch semantic index (400x faster than grep)
3
3
  arguments:
4
4
  query:
5
5
  description: Natural language search query
@@ -11,12 +11,12 @@ arguments:
11
11
 
12
12
  # Codebase Search Command
13
13
 
14
- Search your indexed codebase using RuVector. Uses SQLite index for fast lookups.
14
+ Search your indexed codebase using CodeSearch. Uses SQLite index for fast lookups.
15
15
 
16
16
  **Examples:**
17
- - `/cfn-ruvector:cfn-codebase-search authentication logic`
18
- - `/cfn-ruvector:cfn-codebase-search React components --top 20`
19
- - `/cfn-ruvector:cfn-codebase-search database migration`
17
+ - `/cfn-codesearch:cfn-codebase-search authentication logic`
18
+ - `/cfn-codesearch:cfn-codebase-search React components --top 20`
19
+ - `/cfn-codesearch:cfn-codebase-search database migration`
20
20
 
21
21
  **Prerequisites:**
22
22
  - Codebase must be indexed: `/cfn-codebase-reindex`
@@ -33,8 +33,8 @@ if [[ ! "$OPENAI_API_KEY" =~ ^sk- ]] && [[ -f ".env" ]]; then
33
33
  fi
34
34
  [[ ! "$OPENAI_API_KEY" =~ ^sk- ]] && { echo "❌ OPENAI_API_KEY invalid. Add to .env" >&2; exit 1; }
35
35
 
36
- RUVECTOR_BIN="${HOME}/.local/bin/local-ruvector"
37
- [ ! -f "$RUVECTOR_BIN" ] && RUVECTOR_BIN="./.claude/skills/cfn-local-ruvector-accelerator/target/release/local-ruvector"
36
+ RUVECTOR_BIN="${HOME}/.local/bin/local-codesearch"
37
+ [ ! -f "$RUVECTOR_BIN" ] && RUVECTOR_BIN="./.claude/skills/cfn-local-codesearch-accelerator/target/release/local-codesearch"
38
38
 
39
39
  # Use threshold 0.1 for better results (default 0.3 is too strict)
40
40
  "$RUVECTOR_BIN" query "{{query}}" --max-results {{#if top}}{{top}}{{else}}10{{/if}} --threshold 0.1
@@ -1,5 +1,5 @@
1
1
  ---
2
- description: Detect stale and legacy documentation using RuVector semantic analysis
2
+ description: Detect stale and legacy documentation using CodeSearch semantic analysis
3
3
  ---
4
4
 
5
5
  # Detect Stale Documentation
@@ -38,7 +38,7 @@ Analyzes all `.md` files in the codebase to detect legacy/outdated documentation
38
38
 
39
39
  ```bash
40
40
  # Find docs older than 90 days with no recent code references
41
- sqlite3 ~/.local/share/ruvector/index_v2.db "
41
+ sqlite3 ~/.local/share/codesearch/index_v2.db "
42
42
  SELECT e.file_path, e.name,
43
43
  datetime(e.created_at, 'unixepoch') as indexed_at
44
44
  FROM entities e
@@ -48,7 +48,7 @@ WHERE e.file_path LIKE '%.md'
48
48
  LIMIT 20;"
49
49
 
50
50
  # Find orphan docs (no references)
51
- sqlite3 ~/.local/share/ruvector/index_v2.db "
51
+ sqlite3 ~/.local/share/codesearch/index_v2.db "
52
52
  SELECT DISTINCT e.file_path
53
53
  FROM entities e
54
54
  LEFT JOIN refs r ON e.id = r.source_entity_id OR e.id = r.target_entity_id
@@ -1,17 +1,17 @@
1
1
  ---
2
- description: "Semantic code search with RuVector (400x faster than grep)"
2
+ description: "Semantic code search with CodeSearch (400x faster than grep)"
3
3
  argument-hint: "<query>"
4
4
  ---
5
5
 
6
- # RuVector Search
6
+ # CodeSearch Search
7
7
 
8
8
  Quick semantic search through your indexed codebase.
9
9
 
10
10
  ## Usage
11
11
 
12
12
  ```
13
- /cfn-ruvector-search "authentication middleware"
14
- /cfn-ruvector-search "error handling pattern"
13
+ /cfn-codesearch-search "authentication middleware"
14
+ /cfn-codesearch-search "error handling pattern"
15
15
  ```
16
16
 
17
17
  ## What it does
@@ -23,14 +23,14 @@ Quick semantic search through your indexed codebase.
23
23
  ## Prerequisites
24
24
 
25
25
  - Project must be indexed first
26
- - Run: `./local-ruvector index --path . --force`
26
+ - Run: `./local-codesearch index --path . --force`
27
27
 
28
28
  ---
29
29
 
30
30
  Execute search:
31
31
 
32
32
  ```bash
33
- RUVECTOR_BIN="${HOME}/.local/bin/local-ruvector"
34
- [ ! -f "$RUVECTOR_BIN" ] && RUVECTOR_BIN="./.claude/skills/cfn-local-ruvector-accelerator/target/release/local-ruvector"
33
+ RUVECTOR_BIN="${HOME}/.local/bin/local-codesearch"
34
+ [ ! -f "$RUVECTOR_BIN" ] && RUVECTOR_BIN="./.claude/skills/cfn-local-codesearch-accelerator/target/release/local-codesearch"
35
35
  "$RUVECTOR_BIN" query "$ARGUMENTS" --max-results 10
36
36
  ```
@@ -124,7 +124,7 @@ Task("typescript-specialist" /* or "rust-developer" */,
124
124
  ```typescript
125
125
  Task("typescript-specialist" /* or "rust-developer" */,
126
126
  `# FORBIDDEN: Do NOT run npx tsc, npm run typecheck, or cargo check
127
- # Use ruvector skills in place of 'search' or 'find'
127
+ # Use codesearch skills in place of 'search' or 'find'
128
128
  # REQUIRED: Use CFN hooks for validation
129
129
 
130
130
  ## MANDATORY WORKFLOW:
@@ -10,6 +10,47 @@ allowed-tools: ["Task", "TodoWrite", "Read", "Bash", "Grep", "Glob"]
10
10
 
11
11
  ---
12
12
 
13
+ ## ⚡ AUTONOMOUS PROGRESSION (CRITICAL)
14
+
15
+ **DO NOT stop to ask questions. Keep progressing by launching agents for next steps.**
16
+
17
+ | Stop For | Keep Going For |
18
+ |----------|----------------|
19
+ | Major regression (tests went from passing to failing) | Minor test failures (iterate to fix) |
20
+ | Structural mismatch (wrong architecture/framework) | Missing files (create them) |
21
+ | Security vulnerability found | Code style issues |
22
+ | Corrupted state requiring manual recovery | Ambiguous implementation details |
23
+ | Unclear requirements (feedback for epic improvement) | |
24
+
25
+ **Rules:**
26
+ - If uncertain about approach, pick the simpler option and iterate
27
+ - Spawn agents to investigate unknowns instead of asking user
28
+ - Only escalate to user for irreversible decisions or access issues
29
+ - Test failures are expected - that's why we iterate
30
+
31
+ ---
32
+
33
+ ## 🎯 0/0 POLICY (EXIT CRITERIA)
34
+
35
+ **Before PROCEED decision, verify:**
36
+
37
+ | Metric | Requirement |
38
+ |--------|-------------|
39
+ | Compilation errors (scoped work) | **0** |
40
+ | Compilation errors (scoped tests) | **0** |
41
+ | Todos remaining (scoped work) | **0** |
42
+
43
+ ```bash
44
+ # Verify 0/0 before PROCEED
45
+ npm run typecheck 2>&1 | grep -c "error" || echo "0" # Must be 0
46
+ npm run build 2>&1 | grep -c "error" || echo "0" # Must be 0
47
+ # Review TodoWrite - all scoped items must be completed
48
+ ```
49
+
50
+ **If not 0/0:** ITERATE, do not PROCEED. Fix errors before next gate check.
51
+
52
+ ---
53
+
13
54
  ## MANDATORY: Initialize State Tracking
14
55
 
15
56
  **IMMEDIATELY create this todo list using TodoWrite:**
@@ -184,6 +225,7 @@ CONTEXT:
184
225
  - Mode: ${MODE}
185
226
  - Iteration: ${ITERATION}
186
227
  - Gate pass rate: ${PASS_RATE}
228
+ - Epic file: ${EPIC_FILE_PATH} (if applicable)
187
229
 
188
230
  VALIDATOR FEEDBACK:
189
231
  ${VALIDATOR_1_FEEDBACK}
@@ -194,6 +236,13 @@ YOUR RESPONSIBILITIES:
194
236
  2. Classify each finding as IN-SCOPE or OUT-OF-SCOPE
195
237
  3. OUT-OF-SCOPE items: Log for backlog, do NOT require iteration
196
238
  4. IN-SCOPE items: Determine if they block PROCEED
239
+ 5. **EPIC CONSISTENCY CHECK**: Identify naming/reference mismatches in epic document
240
+
241
+ EPIC CONSISTENCY CHECK:
242
+ - Compare implemented names (files, modules, functions) against epic references
243
+ - Flag mismatches (e.g., phase 1 creates "AuthService" but phase 3 references "AuthenticationService")
244
+ - If mismatches found: Update epic document to match implementation
245
+ - Document all corrections in epic_corrections field
197
246
 
198
247
  DECISION CRITERIA:
199
248
  - PROCEED: All in-scope requirements met, tests pass, no blocking issues
@@ -206,12 +255,17 @@ RETURN FORMAT:
206
255
  "in_scope_findings": [...],
207
256
  "out_of_scope_findings": [...],
208
257
  "reasoning": "...",
209
- "iteration_guidance": "..." (if ITERATE)
258
+ "iteration_guidance": "..." (if ITERATE),
259
+ "epic_corrections": [
260
+ {"location": "Phase 3, step 2", "was": "XY", "now": "X", "reason": "Match phase 1 implementation"}
261
+ ]
210
262
  }
211
263
 
212
264
  AGENT_ID: product-owner-${TASK_ID}-iter${ITERATION}
213
265
  ```
214
266
 
267
+ **If epic_corrections returned:** Update the epic file to fix inconsistencies before next iteration.
268
+
215
269
  **WAIT for Product Owner agent to return decision.**
216
270
 
217
271
  **Handle Decision:**
@@ -276,6 +330,7 @@ Task(subagent_type="root-cause-analyst", prompt="Analyze repeated failures...")
276
330
  - OUT-OF-SCOPE items go to backlog, don't block PROCEED
277
331
  - Only IN-SCOPE issues can trigger ITERATE
278
332
  - ABORT is rare (corruption, security, dead-end architecture)
333
+ - **Epic consistency**: Fixes naming mismatches between phases (e.g., "X" vs "XY")
279
334
 
280
335
  ---
281
336
 
@@ -286,10 +341,19 @@ Task(subagent_type="root-cause-analyst", prompt="Analyze repeated failures...")
286
341
  - **DO NOT skip Product Owner** - Only PO can approve PROCEED
287
342
  - **DO NOT iterate on out-of-scope items** - PO filters these to backlog
288
343
  - **DO NOT stop on test failures** - That's what iteration fixes
344
+ - **DO NOT ask the user questions** - Make reasonable assumptions and iterate
289
345
  - **DO update todos** - This tracks your state as coordinator
290
346
  - **DO pass validator feedback to PO** - PO needs full context to decide
291
347
  - **DO inject PO guidance into next iteration** - Use iteration_guidance from PO
348
+ - **DO spawn agents to investigate unknowns** - Instead of asking user
349
+
350
+ **When to escalate to user (ONLY these cases):**
351
+ - Access denied / permission errors
352
+ - Irreversible destructive action needed
353
+ - Major regression detected (tests were passing, now failing)
354
+ - Structural mismatch with existing codebase
355
+ - Unclear requirements (helps improve epic creation process)
292
356
 
293
357
  ---
294
358
 
295
- **Version:** 2.0.0 | **Date:** 2026-01-09 | Restructured with enforced state tracking + Product Owner scope filtering
359
+ **Version:** 2.2.0 | **Date:** 2026-01-13 | Added 0/0 policy, epic consistency check, autonomous progression
@@ -1,30 +1,30 @@
1
1
  #!/bin/bash
2
2
  set -eu
3
3
 
4
- # Add RuVector instructions to all agent profiles with Post-Edit Pipeline
4
+ # Add CodeSearch instructions to all agent profiles with Post-Edit Pipeline
5
5
 
6
6
  SCRIPT_DIR="$(cd "$(dirname "${BASH_SOURCE[0]}")" && pwd)"
7
7
  AGENT_DIR="${SCRIPT_DIR}/../agents/cfn-dev-team"
8
8
 
9
- # RuVector instruction block to add
9
+ # CodeSearch instruction block to add
10
10
  RUVECTOR_BLOCK='
11
- # IMPORTANT: RuVector Semantic Search (Before Making Changes)
11
+ # IMPORTANT: CodeSearch Semantic Search (Before Making Changes)
12
12
  # Before implementing any changes, ALWAYS query the codebase for similar patterns:
13
13
  # /codebase-search "relevant search terms for your task" --top 5
14
14
  # /codebase-search "error pattern or issue you'\''re fixing" --top 3
15
15
  # Also query past errors and learnings:
16
- # ./.claude/skills/cfn-ruvector-codebase-index/query-error-patterns.sh --task-description "Your task description"
17
- # ./.claude/skills/cfn-ruvector-codebase-index/query-learnings.sh --task-description "Your task description" --category PATTERN
16
+ # ./.claude/skills/cfn-codesearch-codebase-index/query-error-patterns.sh --task-description "Your task description"
17
+ # ./.claude/skills/cfn-codesearch-codebase-index/query-learnings.sh --task-description "Your task description" --category PATTERN
18
18
  # This prevents duplicated work and leverages existing solutions.'
19
19
 
20
20
  # Function to add instructions after post-edit pipeline section
21
- add_ruvector_instructions() {
21
+ add_codesearch_instructions() {
22
22
  local file="$1"
23
23
  local temp_file=$(mktemp)
24
24
 
25
- # Check if file already has RuVector instructions
26
- if grep -q "RuVector Semantic Search" "$file"; then
27
- echo "⚠️ $(basename "$file") already has RuVector instructions"
25
+ # Check if file already has CodeSearch instructions
26
+ if grep -q "CodeSearch Semantic Search" "$file"; then
27
+ echo "⚠️ $(basename "$file") already has CodeSearch instructions"
28
28
  rm -f "$temp_file"
29
29
  return 0
30
30
  fi
@@ -41,7 +41,7 @@ add_ruvector_instructions() {
41
41
  {print}
42
42
  ' "$file" > "$temp_file"
43
43
  mv "$temp_file" "$file"
44
- echo "✅ Added RuVector to $(basename "$file")"
44
+ echo "✅ Added CodeSearch to $(basename "$file")"
45
45
  return 1
46
46
  else
47
47
  rm -f "$temp_file"
@@ -50,7 +50,7 @@ add_ruvector_instructions() {
50
50
  }
51
51
 
52
52
  # Process all agent files recursively
53
- echo "🔄 Adding RuVector instructions to agent profiles..."
53
+ echo "🔄 Adding CodeSearch instructions to agent profiles..."
54
54
  echo ""
55
55
 
56
56
  updated=0
@@ -64,7 +64,7 @@ while IFS= read -r -d '' agent_file; do
64
64
  continue
65
65
  fi
66
66
 
67
- if add_ruvector_instructions "$agent_file"; then
67
+ if add_codesearch_instructions "$agent_file"; then
68
68
  ((skipped++)) || true
69
69
  else
70
70
  ((updated++)) || true
@@ -1,10 +1,10 @@
1
- # Agent Integration Patterns for AST-Aware RuVector
1
+ # Agent Integration Patterns for AST-Aware CodeSearch
2
2
 
3
- This document describes how agents can integrate with the AST-aware RuVector indexer to achieve sub-50ms query performance for code intelligence tasks.
3
+ This document describes how agents can integrate with the AST-aware CodeSearch indexer to achieve sub-50ms query performance for code intelligence tasks.
4
4
 
5
5
  ## Overview
6
6
 
7
- The AST-Aware RuVector Accelerator provides:
7
+ The AST-Aware CodeSearch Accelerator provides:
8
8
  - Entity-based indexing (functions, structs, traits, etc.)
9
9
  - Reference tracking (calls, imports, type usage)
10
10
  - Vector embeddings for semantic search
@@ -15,11 +15,11 @@ The AST-Aware RuVector Accelerator provides:
15
15
  ### 1. Agent Setup
16
16
 
17
17
  ```bash
18
- # Initialize RuVector in the project
19
- ./target/release/local-ruvector init
18
+ # Initialize CodeSearch in the project
19
+ ./target/release/local-codesearch init
20
20
 
21
21
  # Index the codebase
22
- ./target/release/local-ruvector index --path . --types rs,ts,tsx,js,jsx --force
22
+ ./target/release/local-codesearch index --path . --types rs,ts,tsx,js,jsx --force
23
23
  ```
24
24
 
25
25
  ### 2. Query Patterns
@@ -28,7 +28,7 @@ The AST-Aware RuVector Accelerator provides:
28
28
 
29
29
  ```bash
30
30
  # Find all functions that use the `Album` type
31
- ./target/release/local-ruvector find --kind function --uses-type Album
31
+ ./target/release/local-codesearch find --kind function --uses-type Album
32
32
 
33
33
  # Example SQL query behind the scenes:
34
34
  SELECT e.* FROM entities e
@@ -40,10 +40,10 @@ WHERE e.kind = 'function' AND tu.type_name = 'Album';
40
40
 
41
41
  ```bash
42
42
  # Find all functions that call `create_album`
43
- ./target/release/local-ruvector refs --target create_album --kind calls
43
+ ./target/release/local-codesearch refs --target create_album --kind calls
44
44
 
45
45
  # Exclude calls within the same module
46
- ./target/release/local-ruvector refs --target create_album --kind calls --exclude-module src/album/
46
+ ./target/release/local-codesearch refs --target create_album --kind calls --exclude-module src/album/
47
47
 
48
48
  # Example SQL query:
49
49
  SELECT r.* FROM refs r
@@ -56,16 +56,16 @@ WHERE e.name = 'create_album' AND r.ref_kind = 'call'
56
56
 
57
57
  ```bash
58
58
  # Step 1: Find all references to a function
59
- ./target/release/local-ruvector refs --target function_name
59
+ ./target/release/local-codesearch refs --target function_name
60
60
 
61
61
  # Step 2: Find all implementations of a trait
62
- ./target/release/local-ruvector find --kind impl --implements Trait
62
+ ./target/release/local-codesearch find --kind impl --implements Trait
63
63
 
64
64
  # Step 3: Find types used in a module
65
- ./target/release/local-ruvector find --file-path src/module/ --kind struct
65
+ ./target/release/local-codesearch find --file-path src/module/ --kind struct
66
66
 
67
67
  # Step 4: Verify no breaks after refactoring
68
- ./target/release/local-ruvector query "broken reference error" --threshold 0.9
68
+ ./target/release/local-codesearch query "broken reference error" --threshold 0.9
69
69
  ```
70
70
 
71
71
  ### 3. Programmatic Integration
@@ -73,8 +73,8 @@ WHERE e.name = 'create_album' AND r.ref_kind = 'call'
73
73
  Agents can integrate using the Rust API directly:
74
74
 
75
75
  ```rust
76
- use local_ruvector::store_v2::StoreV2;
77
- use local_ruvector::query_api::QueryEngine;
76
+ use local_codesearch::store_v2::StoreV2;
77
+ use local_codesearch::query_api::QueryEngine;
78
78
 
79
79
  let store = StoreV2::new(&db_path)?;
80
80
  let query_engine = QueryEngine::new(store);
@@ -238,18 +238,18 @@ Based on the current implementation:
238
238
 
239
239
  ```bash
240
240
  # Check database health
241
- ./target/release/local-ruvector stats --detailed
241
+ ./target/release/local-codesearch stats --detailed
242
242
 
243
243
  # Rebuild index
244
- ./target/release/local-ruvector index --force
244
+ ./target/release/local-codesearch index --force
245
245
 
246
246
  # Query optimization
247
- sqlite3 .ruvector/index.db "EXPLAIN QUERY PLAN SELECT ..."
247
+ sqlite3 .codesearch/index.db "EXPLAIN QUERY PLAN SELECT ..."
248
248
 
249
249
  # Check embeddings
250
- ./target/release/local-ruvector query "test query" --format json
250
+ ./target/release/local-codesearch query "test query" --format json
251
251
  ```
252
252
 
253
253
  ## Conclusion
254
254
 
255
- The AST-Aware RuVector Accelerator provides a powerful foundation for agent-driven code intelligence. By leveraging entity-based indexing and structured queries, agents can achieve sub-50ms response times for complex code analysis tasks.
255
+ The AST-Aware CodeSearch Accelerator provides a powerful foundation for agent-driven code intelligence. By leveraging entity-based indexing and structured queries, agents can achieve sub-50ms response times for complex code analysis tasks.
@@ -1,8 +1,8 @@
1
- # RuVector Agent Lifecycle Integration
1
+ # CodeSearch Agent Lifecycle Integration
2
2
 
3
3
  ## Overview
4
4
 
5
- The RuVector Agent Lifecycle Integration automatically captures and indexes agent execution data, enabling semantic search over historical agent decisions, tool usage patterns, and failure recovery strategies.
5
+ The CodeSearch Agent Lifecycle Integration automatically captures and indexes agent execution data, enabling semantic search over historical agent decisions, tool usage patterns, and failure recovery strategies.
6
6
 
7
7
  ## Architecture
8
8
 
@@ -108,7 +108,7 @@ Search historical agent data for guidance on current tasks.
108
108
 
109
109
  ## Integration with cfn-subagent-stop.sh
110
110
 
111
- The subagent stop hook automatically triggers RuVector ingestion:
111
+ The subagent stop hook automatically triggers CodeSearch ingestion:
112
112
 
113
113
  ```bash
114
114
  # cfn-subagent-stop.sh (excerpt)
@@ -121,8 +121,8 @@ if awk "BEGIN {exit !($AGENT_CONFIDENCE < 0.70)}"; then
121
121
  AGENT_SUCCESS="false"
122
122
  fi
123
123
 
124
- # Call RuVector ingestion
125
- ./.claude/skills/cfn-local-ruvector-accelerator/ingest-agent-transcript.sh \
124
+ # Call CodeSearch ingestion
125
+ ./.claude/skills/cfn-local-codesearch-accelerator/ingest-agent-transcript.sh \
126
126
  --transcript "$TRANSCRIPT_ARCHIVE" \
127
127
  --agent-id "$AGENT_ID" \
128
128
  --agent-type "$AGENT_TYPE" \
@@ -283,9 +283,9 @@ sqlite3 "$DB_PATH" "DELETE FROM agent_failure_patterns WHERE occurrence_count <
283
283
 
284
284
  ### Log Management
285
285
 
286
- RuVector ingestion logs are written to:
287
- - `.artifacts/logs/ruvector-ingestion.log` - Transcript ingestion events
288
- - `.artifacts/logs/ruvector-failure-analysis.log` - Failure pattern analysis
286
+ CodeSearch ingestion logs are written to:
287
+ - `.artifacts/logs/codesearch-ingestion.log` - Transcript ingestion events
288
+ - `.artifacts/logs/codesearch-failure-analysis.log` - Failure pattern analysis
289
289
  - `.artifacts/logs/subagent-lifecycle.log` - Hook execution logs
290
290
 
291
291
  Rotate logs periodically:
@@ -305,14 +305,14 @@ tail -f .artifacts/logs/subagent-lifecycle.log
305
305
 
306
306
  Verify script exists and is executable:
307
307
  ```bash
308
- ls -l .claude/skills/cfn-local-ruvector-accelerator/ingest-agent-transcript.sh
308
+ ls -l .claude/skills/cfn-local-codesearch-accelerator/ingest-agent-transcript.sh
309
309
  ```
310
310
 
311
311
  ### No patterns found
312
312
 
313
313
  Run failure analysis manually:
314
314
  ```bash
315
- ./.claude/skills/cfn-local-ruvector-accelerator/analyze-agent-failures.sh --days 30
315
+ ./.claude/skills/cfn-local-codesearch-accelerator/analyze-agent-failures.sh --days 30
316
316
  ```
317
317
 
318
318
  Check database tables exist:
@@ -337,5 +337,5 @@ Run with broader query:
337
337
 
338
338
  - Analysis document: `docs/RUVECTOR_INTEGRATION_ANALYSIS.md`
339
339
  - Subagent hooks: `.claude/hooks/cfn-subagent-*.sh`
340
- - RuVector accelerator: `.claude/skills/cfn-local-ruvector-accelerator/`
340
+ - CodeSearch accelerator: `.claude/skills/cfn-local-codesearch-accelerator/`
341
341
  - Lifecycle database: `.claude/skills/cfn-redis-coordination/data/cfn-loop.db`
@@ -1,18 +1,23 @@
1
1
  [package]
2
- name = "local-ruvector"
3
- version = "0.1.0"
2
+ name = "codesearch"
3
+ version = "0.2.0"
4
4
  edition = "2021"
5
5
 
6
6
  [dependencies]
7
- # Database
7
+ # Database - SQLite for metadata (entities, refs, fast SQL queries)
8
8
  rusqlite = { version = "0.31", features = ["bundled", "vtab"] }
9
+ # Database - PostgreSQL/pgvector for embeddings (fast vector search)
10
+ tokio-postgres = { version = "0.7", features = ["with-chrono-0_4", "with-serde_json-1"] }
11
+ deadpool-postgres = { version = "0.12" }
12
+ # pgvector type support for postgres
13
+ pgvector = { version = "0.4", features = ["postgres"] }
9
14
  # Vector operations
10
15
  ndarray = { version = "0.15", features = ["rayon"], default-features = false }
11
16
  # Serialization
12
17
  serde = { version = "1.0", features = ["derive"] }
13
18
  serde_json = "1.0"
14
19
  # CLI
15
- clap = { version = "4.4", features = ["derive"] }
20
+ clap = { version = "4.4", features = ["derive", "env"] }
16
21
  anyhow = "1.0"
17
22
  # File system
18
23
  walkdir = "2.4"
@@ -1,4 +1,4 @@
1
- # RuVector Extraction Examples
1
+ # CodeSearch Extraction Examples
2
2
 
3
3
  This document demonstrates what the TypeScript/JavaScript and text-based fallback extractors capture from different file types.
4
4
 
@@ -207,7 +207,7 @@ setup_environment
207
207
 
208
208
  ## Indexing Results
209
209
 
210
- When you run `local-ruvector index`, the system:
210
+ When you run `local-codesearch index`, the system:
211
211
 
212
212
  1. **Scans** all files in the project
213
213
  2. **Routes** files to appropriate extractors based on extension
@@ -279,9 +279,9 @@ Complete project indexing (10,000 files): ~30-50 seconds depending on file types
279
279
 
280
280
  After indexing:
281
281
 
282
- 1. **Query** using `local-ruvector query`
283
- 2. **Export** results using `local-ruvector export`
284
- 3. **Analyze** dependencies using `local-ruvector refs`
285
- 4. **Monitor** with `local-ruvector stats`
282
+ 1. **Query** using `local-codesearch query`
283
+ 2. **Export** results using `local-codesearch export`
284
+ 3. **Analyze** dependencies using `local-codesearch refs`
285
+ 4. **Monitor** with `local-codesearch stats`
286
286
 
287
287
  See the main README for detailed usage instructions.