devflow-kit 0.3.1 → 0.3.3
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +40 -0
- package/README.md +5 -7
- package/dist/commands/init.d.ts.map +1 -1
- package/dist/commands/init.js +90 -132
- package/dist/commands/init.js.map +1 -1
- package/package.json +1 -1
- package/src/claude/CLAUDE.md +76 -8
- package/src/claude/agents/devflow/audit-architecture.md +67 -1
- package/src/claude/agents/devflow/audit-complexity.md +67 -1
- package/src/claude/agents/devflow/audit-database.md +67 -1
- package/src/claude/agents/devflow/audit-dependencies.md +67 -1
- package/src/claude/agents/devflow/audit-documentation.md +66 -0
- package/src/claude/agents/devflow/audit-performance.md +67 -1
- package/src/claude/agents/devflow/audit-security.md +67 -1
- package/src/claude/agents/devflow/audit-tests.md +67 -1
- package/src/claude/agents/devflow/audit-typescript.md +66 -0
- package/src/claude/agents/devflow/release.md +283 -8
- package/src/claude/commands/devflow/{pre-pr.md → code-review.md} +52 -13
- package/src/claude/scripts/statusline.sh +37 -69
- package/src/claude/commands/devflow/pre-commit.md +0 -153
|
@@ -81,4 +81,70 @@ For each finding, include:
|
|
|
81
81
|
- Example implementations
|
|
82
82
|
- Migration strategies for large changes
|
|
83
83
|
|
|
84
|
-
Focus on structural issues that affect long-term maintainability and team productivity.
|
|
84
|
+
Focus on structural issues that affect long-term maintainability and team productivity.
|
|
85
|
+
|
|
86
|
+
## Report Storage
|
|
87
|
+
|
|
88
|
+
**IMPORTANT**: When invoked by `/code-review`, save your audit report to the standardized location:
|
|
89
|
+
|
|
90
|
+
```bash
|
|
91
|
+
# Expect these variables from the orchestrator:
|
|
92
|
+
# - CURRENT_BRANCH: Current git branch name
|
|
93
|
+
# - AUDIT_BASE_DIR: Base directory (.docs/audits/${CURRENT_BRANCH})
|
|
94
|
+
# - TIMESTAMP: Timestamp for report filename
|
|
95
|
+
|
|
96
|
+
# Save report to:
|
|
97
|
+
REPORT_FILE="${AUDIT_BASE_DIR}/architecture-report.${TIMESTAMP}.md"
|
|
98
|
+
|
|
99
|
+
# Create report
|
|
100
|
+
cat > "$REPORT_FILE" <<'EOF'
|
|
101
|
+
# Architecture Audit Report
|
|
102
|
+
|
|
103
|
+
**Branch**: ${CURRENT_BRANCH}
|
|
104
|
+
**Date**: $(date +%Y-%m-%d)
|
|
105
|
+
**Time**: $(date +%H:%M:%S)
|
|
106
|
+
**Auditor**: DevFlow Architecture Agent
|
|
107
|
+
|
|
108
|
+
---
|
|
109
|
+
|
|
110
|
+
## Executive Summary
|
|
111
|
+
|
|
112
|
+
{Brief summary of architectural quality}
|
|
113
|
+
|
|
114
|
+
---
|
|
115
|
+
|
|
116
|
+
## Critical Issues
|
|
117
|
+
|
|
118
|
+
{CRITICAL severity fundamental architectural flaws}
|
|
119
|
+
|
|
120
|
+
---
|
|
121
|
+
|
|
122
|
+
## High Priority Issues
|
|
123
|
+
|
|
124
|
+
{HIGH severity significant design issues}
|
|
125
|
+
|
|
126
|
+
---
|
|
127
|
+
|
|
128
|
+
## Medium Priority Issues
|
|
129
|
+
|
|
130
|
+
{MEDIUM severity pattern inconsistencies}
|
|
131
|
+
|
|
132
|
+
---
|
|
133
|
+
|
|
134
|
+
## Low Priority Issues
|
|
135
|
+
|
|
136
|
+
{LOW severity minor organizational improvements}
|
|
137
|
+
|
|
138
|
+
---
|
|
139
|
+
|
|
140
|
+
## Architecture Score: {X}/10
|
|
141
|
+
|
|
142
|
+
**Recommendation**: {BLOCK MERGE | REVIEW REQUIRED | APPROVED WITH CONDITIONS | APPROVED}
|
|
143
|
+
|
|
144
|
+
EOF
|
|
145
|
+
|
|
146
|
+
echo "✅ Architecture audit report saved to: $REPORT_FILE"
|
|
147
|
+
```
|
|
148
|
+
|
|
149
|
+
**If invoked standalone** (not by /code-review), use a simpler path:
|
|
150
|
+
- `.docs/audits/standalone/architecture-report.${TIMESTAMP}.md`
|
|
@@ -99,4 +99,70 @@ For each finding, include:
|
|
|
99
99
|
- Example improvements
|
|
100
100
|
- Estimated effort for fixes
|
|
101
101
|
|
|
102
|
-
Focus on complexity issues that significantly impact code maintainability, readability, and development velocity.
|
|
102
|
+
Focus on complexity issues that significantly impact code maintainability, readability, and development velocity.
|
|
103
|
+
|
|
104
|
+
## Report Storage
|
|
105
|
+
|
|
106
|
+
**IMPORTANT**: When invoked by `/code-review`, save your audit report to the standardized location:
|
|
107
|
+
|
|
108
|
+
```bash
|
|
109
|
+
# Expect these variables from the orchestrator:
|
|
110
|
+
# - CURRENT_BRANCH: Current git branch name
|
|
111
|
+
# - AUDIT_BASE_DIR: Base directory (.docs/audits/${CURRENT_BRANCH})
|
|
112
|
+
# - TIMESTAMP: Timestamp for report filename
|
|
113
|
+
|
|
114
|
+
# Save report to:
|
|
115
|
+
REPORT_FILE="${AUDIT_BASE_DIR}/complexity-report.${TIMESTAMP}.md"
|
|
116
|
+
|
|
117
|
+
# Create report
|
|
118
|
+
cat > "$REPORT_FILE" <<'EOF'
|
|
119
|
+
# Complexity Audit Report
|
|
120
|
+
|
|
121
|
+
**Branch**: ${CURRENT_BRANCH}
|
|
122
|
+
**Date**: $(date +%Y-%m-%d)
|
|
123
|
+
**Time**: $(date +%H:%M:%S)
|
|
124
|
+
**Auditor**: DevFlow Complexity Agent
|
|
125
|
+
|
|
126
|
+
---
|
|
127
|
+
|
|
128
|
+
## Executive Summary
|
|
129
|
+
|
|
130
|
+
{Brief summary of complexity and maintainability}
|
|
131
|
+
|
|
132
|
+
---
|
|
133
|
+
|
|
134
|
+
## Critical Issues
|
|
135
|
+
|
|
136
|
+
{CRITICAL severity extremely complex code hampering development}
|
|
137
|
+
|
|
138
|
+
---
|
|
139
|
+
|
|
140
|
+
## High Priority Issues
|
|
141
|
+
|
|
142
|
+
{HIGH severity significant complexity issues}
|
|
143
|
+
|
|
144
|
+
---
|
|
145
|
+
|
|
146
|
+
## Medium Priority Issues
|
|
147
|
+
|
|
148
|
+
{MEDIUM severity moderate complexity improvements needed}
|
|
149
|
+
|
|
150
|
+
---
|
|
151
|
+
|
|
152
|
+
## Low Priority Issues
|
|
153
|
+
|
|
154
|
+
{LOW severity minor complexity optimizations}
|
|
155
|
+
|
|
156
|
+
---
|
|
157
|
+
|
|
158
|
+
## Maintainability Score: {X}/10
|
|
159
|
+
|
|
160
|
+
**Recommendation**: {BLOCK MERGE | REVIEW REQUIRED | APPROVED WITH CONDITIONS | APPROVED}
|
|
161
|
+
|
|
162
|
+
EOF
|
|
163
|
+
|
|
164
|
+
echo "✅ Complexity audit report saved to: $REPORT_FILE"
|
|
165
|
+
```
|
|
166
|
+
|
|
167
|
+
**If invoked standalone** (not by /code-review), use a simpler path:
|
|
168
|
+
- `.docs/audits/standalone/complexity-report.${TIMESTAMP}.md`
|
|
@@ -104,4 +104,70 @@ For each finding, include:
|
|
|
104
104
|
- Migration considerations
|
|
105
105
|
- Monitoring suggestions
|
|
106
106
|
|
|
107
|
-
Focus on database issues that affect data integrity, query performance, or system scalability.
|
|
107
|
+
Focus on database issues that affect data integrity, query performance, or system scalability.
|
|
108
|
+
|
|
109
|
+
## Report Storage
|
|
110
|
+
|
|
111
|
+
**IMPORTANT**: When invoked by `/code-review`, save your audit report to the standardized location:
|
|
112
|
+
|
|
113
|
+
```bash
|
|
114
|
+
# Expect these variables from the orchestrator:
|
|
115
|
+
# - CURRENT_BRANCH: Current git branch name
|
|
116
|
+
# - AUDIT_BASE_DIR: Base directory (.docs/audits/${CURRENT_BRANCH})
|
|
117
|
+
# - TIMESTAMP: Timestamp for report filename
|
|
118
|
+
|
|
119
|
+
# Save report to:
|
|
120
|
+
REPORT_FILE="${AUDIT_BASE_DIR}/database-report.${TIMESTAMP}.md"
|
|
121
|
+
|
|
122
|
+
# Create report
|
|
123
|
+
cat > "$REPORT_FILE" <<'EOF'
|
|
124
|
+
# Database Audit Report
|
|
125
|
+
|
|
126
|
+
**Branch**: ${CURRENT_BRANCH}
|
|
127
|
+
**Date**: $(date +%Y-%m-%d)
|
|
128
|
+
**Time**: $(date +%H:%M:%S)
|
|
129
|
+
**Auditor**: DevFlow Database Agent
|
|
130
|
+
|
|
131
|
+
---
|
|
132
|
+
|
|
133
|
+
## Executive Summary
|
|
134
|
+
|
|
135
|
+
{Brief summary of database design and performance}
|
|
136
|
+
|
|
137
|
+
---
|
|
138
|
+
|
|
139
|
+
## Critical Issues
|
|
140
|
+
|
|
141
|
+
{CRITICAL severity data integrity or severe performance issues}
|
|
142
|
+
|
|
143
|
+
---
|
|
144
|
+
|
|
145
|
+
## High Priority Issues
|
|
146
|
+
|
|
147
|
+
{HIGH severity significant performance or design problems}
|
|
148
|
+
|
|
149
|
+
---
|
|
150
|
+
|
|
151
|
+
## Medium Priority Issues
|
|
152
|
+
|
|
153
|
+
{MEDIUM severity optimization opportunities}
|
|
154
|
+
|
|
155
|
+
---
|
|
156
|
+
|
|
157
|
+
## Low Priority Issues
|
|
158
|
+
|
|
159
|
+
{LOW severity minor improvements}
|
|
160
|
+
|
|
161
|
+
---
|
|
162
|
+
|
|
163
|
+
## Database Health Score: {X}/10
|
|
164
|
+
|
|
165
|
+
**Recommendation**: {BLOCK MERGE | REVIEW REQUIRED | APPROVED WITH CONDITIONS | APPROVED}
|
|
166
|
+
|
|
167
|
+
EOF
|
|
168
|
+
|
|
169
|
+
echo "✅ Database audit report saved to: $REPORT_FILE"
|
|
170
|
+
```
|
|
171
|
+
|
|
172
|
+
**If invoked standalone** (not by /code-review), use a simpler path:
|
|
173
|
+
- `.docs/audits/standalone/database-report.${TIMESTAMP}.md`
|
|
@@ -105,4 +105,70 @@ For each finding, include:
|
|
|
105
105
|
- Alternative package suggestions
|
|
106
106
|
- Update compatibility notes
|
|
107
107
|
|
|
108
|
-
Focus on dependency issues that pose security, legal, or maintenance risks to the project.
|
|
108
|
+
Focus on dependency issues that pose security, legal, or maintenance risks to the project.
|
|
109
|
+
|
|
110
|
+
## Report Storage
|
|
111
|
+
|
|
112
|
+
**IMPORTANT**: When invoked by `/code-review`, save your audit report to the standardized location:
|
|
113
|
+
|
|
114
|
+
```bash
|
|
115
|
+
# Expect these variables from the orchestrator:
|
|
116
|
+
# - CURRENT_BRANCH: Current git branch name
|
|
117
|
+
# - AUDIT_BASE_DIR: Base directory (.docs/audits/${CURRENT_BRANCH})
|
|
118
|
+
# - TIMESTAMP: Timestamp for report filename
|
|
119
|
+
|
|
120
|
+
# Save report to:
|
|
121
|
+
REPORT_FILE="${AUDIT_BASE_DIR}/dependencies-report.${TIMESTAMP}.md"
|
|
122
|
+
|
|
123
|
+
# Create report
|
|
124
|
+
cat > "$REPORT_FILE" <<'EOF'
|
|
125
|
+
# Dependency Audit Report
|
|
126
|
+
|
|
127
|
+
**Branch**: ${CURRENT_BRANCH}
|
|
128
|
+
**Date**: $(date +%Y-%m-%d)
|
|
129
|
+
**Time**: $(date +%H:%M:%S)
|
|
130
|
+
**Auditor**: DevFlow Dependencies Agent
|
|
131
|
+
|
|
132
|
+
---
|
|
133
|
+
|
|
134
|
+
## Executive Summary
|
|
135
|
+
|
|
136
|
+
{Brief summary of dependency health and security}
|
|
137
|
+
|
|
138
|
+
---
|
|
139
|
+
|
|
140
|
+
## Critical Issues
|
|
141
|
+
|
|
142
|
+
{CRITICAL severity security vulnerabilities requiring immediate action}
|
|
143
|
+
|
|
144
|
+
---
|
|
145
|
+
|
|
146
|
+
## High Priority Issues
|
|
147
|
+
|
|
148
|
+
{HIGH severity significant security or legal risks}
|
|
149
|
+
|
|
150
|
+
---
|
|
151
|
+
|
|
152
|
+
## Medium Priority Issues
|
|
153
|
+
|
|
154
|
+
{MEDIUM severity maintenance or performance concerns}
|
|
155
|
+
|
|
156
|
+
---
|
|
157
|
+
|
|
158
|
+
## Low Priority Issues
|
|
159
|
+
|
|
160
|
+
{LOW severity minor improvements or optimizations}
|
|
161
|
+
|
|
162
|
+
---
|
|
163
|
+
|
|
164
|
+
## Dependency Health Score: {X}/10
|
|
165
|
+
|
|
166
|
+
**Recommendation**: {BLOCK MERGE | REVIEW REQUIRED | APPROVED WITH CONDITIONS | APPROVED}
|
|
167
|
+
|
|
168
|
+
EOF
|
|
169
|
+
|
|
170
|
+
echo "✅ Dependency audit report saved to: $REPORT_FILE"
|
|
171
|
+
```
|
|
172
|
+
|
|
173
|
+
**If invoked standalone** (not by /code-review), use a simpler path:
|
|
174
|
+
- `.docs/audits/standalone/dependencies-report.${TIMESTAMP}.md`
|
|
@@ -305,3 +305,69 @@ Detect documentation format from language and validate accordingly.
|
|
|
305
305
|
- Show correct examples
|
|
306
306
|
|
|
307
307
|
Focus on documentation issues that prevent users from using the software correctly or developers from understanding the codebase.
|
|
308
|
+
|
|
309
|
+
## Report Storage
|
|
310
|
+
|
|
311
|
+
**IMPORTANT**: When invoked by `/code-review`, save your audit report to the standardized location:
|
|
312
|
+
|
|
313
|
+
```bash
|
|
314
|
+
# Expect these variables from the orchestrator:
|
|
315
|
+
# - CURRENT_BRANCH: Current git branch name
|
|
316
|
+
# - AUDIT_BASE_DIR: Base directory (.docs/audits/${CURRENT_BRANCH})
|
|
317
|
+
# - TIMESTAMP: Timestamp for report filename
|
|
318
|
+
|
|
319
|
+
# Save report to:
|
|
320
|
+
REPORT_FILE="${AUDIT_BASE_DIR}/documentation-report.${TIMESTAMP}.md"
|
|
321
|
+
|
|
322
|
+
# Create report
|
|
323
|
+
cat > "$REPORT_FILE" <<'EOF'
|
|
324
|
+
# Documentation Audit Report
|
|
325
|
+
|
|
326
|
+
**Branch**: ${CURRENT_BRANCH}
|
|
327
|
+
**Date**: $(date +%Y-%m-%d)
|
|
328
|
+
**Time**: $(date +%H:%M:%S)
|
|
329
|
+
**Auditor**: DevFlow Documentation Agent
|
|
330
|
+
|
|
331
|
+
---
|
|
332
|
+
|
|
333
|
+
## Executive Summary
|
|
334
|
+
|
|
335
|
+
{Brief summary of documentation quality and alignment}
|
|
336
|
+
|
|
337
|
+
---
|
|
338
|
+
|
|
339
|
+
## Critical Issues
|
|
340
|
+
|
|
341
|
+
{CRITICAL severity documentation contradicts code behavior}
|
|
342
|
+
|
|
343
|
+
---
|
|
344
|
+
|
|
345
|
+
## High Priority Issues
|
|
346
|
+
|
|
347
|
+
{HIGH severity missing docs for public APIs or key features}
|
|
348
|
+
|
|
349
|
+
---
|
|
350
|
+
|
|
351
|
+
## Medium Priority Issues
|
|
352
|
+
|
|
353
|
+
{MEDIUM severity incomplete or unclear documentation}
|
|
354
|
+
|
|
355
|
+
---
|
|
356
|
+
|
|
357
|
+
## Low Priority Issues
|
|
358
|
+
|
|
359
|
+
{LOW severity minor improvements or style issues}
|
|
360
|
+
|
|
361
|
+
---
|
|
362
|
+
|
|
363
|
+
## Documentation Quality Score: {X}/10
|
|
364
|
+
|
|
365
|
+
**Recommendation**: {BLOCK MERGE | REVIEW REQUIRED | APPROVED WITH CONDITIONS | APPROVED}
|
|
366
|
+
|
|
367
|
+
EOF
|
|
368
|
+
|
|
369
|
+
echo "✅ Documentation audit report saved to: $REPORT_FILE"
|
|
370
|
+
```
|
|
371
|
+
|
|
372
|
+
**If invoked standalone** (not by /code-review), use a simpler path:
|
|
373
|
+
- `.docs/audits/standalone/documentation-report.${TIMESTAMP}.md`
|
|
@@ -82,4 +82,70 @@ For each finding, include:
|
|
|
82
82
|
- Implementation examples
|
|
83
83
|
- Measurement suggestions
|
|
84
84
|
|
|
85
|
-
Focus on performance issues that will have measurable impact on user experience or system scalability.
|
|
85
|
+
Focus on performance issues that will have measurable impact on user experience or system scalability.
|
|
86
|
+
|
|
87
|
+
## Report Storage
|
|
88
|
+
|
|
89
|
+
**IMPORTANT**: When invoked by `/code-review`, save your audit report to the standardized location:
|
|
90
|
+
|
|
91
|
+
```bash
|
|
92
|
+
# Expect these variables from the orchestrator:
|
|
93
|
+
# - CURRENT_BRANCH: Current git branch name
|
|
94
|
+
# - AUDIT_BASE_DIR: Base directory (.docs/audits/${CURRENT_BRANCH})
|
|
95
|
+
# - TIMESTAMP: Timestamp for report filename
|
|
96
|
+
|
|
97
|
+
# Save report to:
|
|
98
|
+
REPORT_FILE="${AUDIT_BASE_DIR}/performance-report.${TIMESTAMP}.md"
|
|
99
|
+
|
|
100
|
+
# Create report
|
|
101
|
+
cat > "$REPORT_FILE" <<'EOF'
|
|
102
|
+
# Performance Audit Report
|
|
103
|
+
|
|
104
|
+
**Branch**: ${CURRENT_BRANCH}
|
|
105
|
+
**Date**: $(date +%Y-%m-%d)
|
|
106
|
+
**Time**: $(date +%H:%M:%S)
|
|
107
|
+
**Auditor**: DevFlow Performance Agent
|
|
108
|
+
|
|
109
|
+
---
|
|
110
|
+
|
|
111
|
+
## Executive Summary
|
|
112
|
+
|
|
113
|
+
{Brief summary of performance analysis}
|
|
114
|
+
|
|
115
|
+
---
|
|
116
|
+
|
|
117
|
+
## Critical Issues
|
|
118
|
+
|
|
119
|
+
{CRITICAL severity performance bottlenecks}
|
|
120
|
+
|
|
121
|
+
---
|
|
122
|
+
|
|
123
|
+
## High Priority Issues
|
|
124
|
+
|
|
125
|
+
{HIGH severity optimization opportunities}
|
|
126
|
+
|
|
127
|
+
---
|
|
128
|
+
|
|
129
|
+
## Medium Priority Issues
|
|
130
|
+
|
|
131
|
+
{MEDIUM severity performance improvements}
|
|
132
|
+
|
|
133
|
+
---
|
|
134
|
+
|
|
135
|
+
## Low Priority Issues
|
|
136
|
+
|
|
137
|
+
{LOW severity minor optimizations}
|
|
138
|
+
|
|
139
|
+
---
|
|
140
|
+
|
|
141
|
+
## Performance Score: {X}/10
|
|
142
|
+
|
|
143
|
+
**Recommendation**: {BLOCK MERGE | REVIEW REQUIRED | APPROVED WITH CONDITIONS | APPROVED}
|
|
144
|
+
|
|
145
|
+
EOF
|
|
146
|
+
|
|
147
|
+
echo "✅ Performance audit report saved to: $REPORT_FILE"
|
|
148
|
+
```
|
|
149
|
+
|
|
150
|
+
**If invoked standalone** (not by /code-review), use a simpler path:
|
|
151
|
+
- `.docs/audits/standalone/performance-report.${TIMESTAMP}.md`
|
|
@@ -72,4 +72,70 @@ For each finding, include:
|
|
|
72
72
|
- Specific remediation steps
|
|
73
73
|
- Relevant security standards (OWASP, etc.)
|
|
74
74
|
|
|
75
|
-
Focus on actionable, specific security issues that can be immediately addressed by developers.
|
|
75
|
+
Focus on actionable, specific security issues that can be immediately addressed by developers.
|
|
76
|
+
|
|
77
|
+
## Report Storage
|
|
78
|
+
|
|
79
|
+
**IMPORTANT**: When invoked by `/code-review`, save your audit report to the standardized location:
|
|
80
|
+
|
|
81
|
+
```bash
|
|
82
|
+
# Expect these variables from the orchestrator:
|
|
83
|
+
# - CURRENT_BRANCH: Current git branch name
|
|
84
|
+
# - AUDIT_BASE_DIR: Base directory (.docs/audits/${CURRENT_BRANCH})
|
|
85
|
+
# - TIMESTAMP: Timestamp for report filename
|
|
86
|
+
|
|
87
|
+
# Save report to:
|
|
88
|
+
REPORT_FILE="${AUDIT_BASE_DIR}/security-report.${TIMESTAMP}.md"
|
|
89
|
+
|
|
90
|
+
# Create report
|
|
91
|
+
cat > "$REPORT_FILE" <<'EOF'
|
|
92
|
+
# Security Audit Report
|
|
93
|
+
|
|
94
|
+
**Branch**: ${CURRENT_BRANCH}
|
|
95
|
+
**Date**: $(date +%Y-%m-%d)
|
|
96
|
+
**Time**: $(date +%H:%M:%S)
|
|
97
|
+
**Auditor**: DevFlow Security Agent
|
|
98
|
+
|
|
99
|
+
---
|
|
100
|
+
|
|
101
|
+
## Executive Summary
|
|
102
|
+
|
|
103
|
+
{Brief summary of security posture}
|
|
104
|
+
|
|
105
|
+
---
|
|
106
|
+
|
|
107
|
+
## Critical Findings
|
|
108
|
+
|
|
109
|
+
{CRITICAL severity issues}
|
|
110
|
+
|
|
111
|
+
---
|
|
112
|
+
|
|
113
|
+
## High Priority Findings
|
|
114
|
+
|
|
115
|
+
{HIGH severity issues}
|
|
116
|
+
|
|
117
|
+
---
|
|
118
|
+
|
|
119
|
+
## Medium Priority Findings
|
|
120
|
+
|
|
121
|
+
{MEDIUM severity issues}
|
|
122
|
+
|
|
123
|
+
---
|
|
124
|
+
|
|
125
|
+
## Low Priority Findings
|
|
126
|
+
|
|
127
|
+
{LOW severity issues}
|
|
128
|
+
|
|
129
|
+
---
|
|
130
|
+
|
|
131
|
+
## Security Score: {X}/10
|
|
132
|
+
|
|
133
|
+
**Recommendation**: {BLOCK MERGE | REVIEW REQUIRED | APPROVED WITH CONDITIONS | APPROVED}
|
|
134
|
+
|
|
135
|
+
EOF
|
|
136
|
+
|
|
137
|
+
echo "✅ Security audit report saved to: $REPORT_FILE"
|
|
138
|
+
```
|
|
139
|
+
|
|
140
|
+
**If invoked standalone** (not by /code-review), use a simpler path:
|
|
141
|
+
- `.docs/audits/standalone/security-report.${TIMESTAMP}.md`
|
|
@@ -452,4 +452,70 @@ For each finding, include:
|
|
|
452
452
|
- Example implementations
|
|
453
453
|
- Refactoring suggestions
|
|
454
454
|
|
|
455
|
-
Focus on test issues that affect code confidence, development velocity, and regression detection capabilities.
|
|
455
|
+
Focus on test issues that affect code confidence, development velocity, and regression detection capabilities.
|
|
456
|
+
|
|
457
|
+
## Report Storage
|
|
458
|
+
|
|
459
|
+
**IMPORTANT**: When invoked by `/code-review`, save your audit report to the standardized location:
|
|
460
|
+
|
|
461
|
+
```bash
|
|
462
|
+
# Expect these variables from the orchestrator:
|
|
463
|
+
# - CURRENT_BRANCH: Current git branch name
|
|
464
|
+
# - AUDIT_BASE_DIR: Base directory (.docs/audits/${CURRENT_BRANCH})
|
|
465
|
+
# - TIMESTAMP: Timestamp for report filename
|
|
466
|
+
|
|
467
|
+
# Save report to:
|
|
468
|
+
REPORT_FILE="${AUDIT_BASE_DIR}/tests-report.${TIMESTAMP}.md"
|
|
469
|
+
|
|
470
|
+
# Create report
|
|
471
|
+
cat > "$REPORT_FILE" <<'EOF'
|
|
472
|
+
# Test Quality Audit Report
|
|
473
|
+
|
|
474
|
+
**Branch**: ${CURRENT_BRANCH}
|
|
475
|
+
**Date**: $(date +%Y-%m-%d)
|
|
476
|
+
**Time**: $(date +%H:%M:%S)
|
|
477
|
+
**Auditor**: DevFlow Test Quality Agent
|
|
478
|
+
|
|
479
|
+
---
|
|
480
|
+
|
|
481
|
+
## Executive Summary
|
|
482
|
+
|
|
483
|
+
{Brief summary of test coverage and quality}
|
|
484
|
+
|
|
485
|
+
---
|
|
486
|
+
|
|
487
|
+
## Critical Issues
|
|
488
|
+
|
|
489
|
+
{CRITICAL severity major test gaps or quality issues}
|
|
490
|
+
|
|
491
|
+
---
|
|
492
|
+
|
|
493
|
+
## High Priority Issues
|
|
494
|
+
|
|
495
|
+
{HIGH severity significant testing problems}
|
|
496
|
+
|
|
497
|
+
---
|
|
498
|
+
|
|
499
|
+
## Medium Priority Issues
|
|
500
|
+
|
|
501
|
+
{MEDIUM severity test improvement opportunities}
|
|
502
|
+
|
|
503
|
+
---
|
|
504
|
+
|
|
505
|
+
## Low Priority Issues
|
|
506
|
+
|
|
507
|
+
{LOW severity minor test optimizations}
|
|
508
|
+
|
|
509
|
+
---
|
|
510
|
+
|
|
511
|
+
## Test Coverage Score: {X}/10
|
|
512
|
+
|
|
513
|
+
**Recommendation**: {BLOCK MERGE | REVIEW REQUIRED | APPROVED WITH CONDITIONS | APPROVED}
|
|
514
|
+
|
|
515
|
+
EOF
|
|
516
|
+
|
|
517
|
+
echo "✅ Test quality audit report saved to: $REPORT_FILE"
|
|
518
|
+
```
|
|
519
|
+
|
|
520
|
+
**If invoked standalone** (not by /code-review), use a simpler path:
|
|
521
|
+
- `.docs/audits/standalone/tests-report.${TIMESTAMP}.md`
|
|
@@ -292,3 +292,69 @@ CHANGED_TS_FILES=$(git diff --name-only --diff-filter=d HEAD | grep -E '\.(ts|ts
|
|
|
292
292
|
- `3`: Medium severity issues found
|
|
293
293
|
|
|
294
294
|
Focus on actionable, specific TypeScript issues that improve type safety and code quality.
|
|
295
|
+
|
|
296
|
+
## Report Storage
|
|
297
|
+
|
|
298
|
+
**IMPORTANT**: When invoked by `/code-review`, save your audit report to the standardized location:
|
|
299
|
+
|
|
300
|
+
```bash
|
|
301
|
+
# Expect these variables from the orchestrator:
|
|
302
|
+
# - CURRENT_BRANCH: Current git branch name
|
|
303
|
+
# - AUDIT_BASE_DIR: Base directory (.docs/audits/${CURRENT_BRANCH})
|
|
304
|
+
# - TIMESTAMP: Timestamp for report filename
|
|
305
|
+
|
|
306
|
+
# Save report to:
|
|
307
|
+
REPORT_FILE="${AUDIT_BASE_DIR}/typescript-report.${TIMESTAMP}.md"
|
|
308
|
+
|
|
309
|
+
# Create report
|
|
310
|
+
cat > "$REPORT_FILE" <<'EOF'
|
|
311
|
+
# TypeScript Audit Report
|
|
312
|
+
|
|
313
|
+
**Branch**: ${CURRENT_BRANCH}
|
|
314
|
+
**Date**: $(date +%Y-%m-%d)
|
|
315
|
+
**Time**: $(date +%H:%M:%S)
|
|
316
|
+
**Auditor**: DevFlow TypeScript Agent
|
|
317
|
+
|
|
318
|
+
---
|
|
319
|
+
|
|
320
|
+
## Executive Summary
|
|
321
|
+
|
|
322
|
+
{Brief summary of TypeScript type safety and code quality}
|
|
323
|
+
|
|
324
|
+
---
|
|
325
|
+
|
|
326
|
+
## Critical Issues
|
|
327
|
+
|
|
328
|
+
{CRITICAL severity type safety completely bypassed}
|
|
329
|
+
|
|
330
|
+
---
|
|
331
|
+
|
|
332
|
+
## High Priority Issues
|
|
333
|
+
|
|
334
|
+
{HIGH severity significant type safety or architectural issues}
|
|
335
|
+
|
|
336
|
+
---
|
|
337
|
+
|
|
338
|
+
## Medium Priority Issues
|
|
339
|
+
|
|
340
|
+
{MEDIUM severity moderate code quality issues}
|
|
341
|
+
|
|
342
|
+
---
|
|
343
|
+
|
|
344
|
+
## Low Priority Issues
|
|
345
|
+
|
|
346
|
+
{LOW severity minor improvement opportunities}
|
|
347
|
+
|
|
348
|
+
---
|
|
349
|
+
|
|
350
|
+
## Type Safety Score: {X}/10
|
|
351
|
+
|
|
352
|
+
**Recommendation**: {BLOCK MERGE | REVIEW REQUIRED | APPROVED WITH CONDITIONS | APPROVED}
|
|
353
|
+
|
|
354
|
+
EOF
|
|
355
|
+
|
|
356
|
+
echo "✅ TypeScript audit report saved to: $REPORT_FILE"
|
|
357
|
+
```
|
|
358
|
+
|
|
359
|
+
**If invoked standalone** (not by /code-review), use a simpler path:
|
|
360
|
+
- `.docs/audits/standalone/typescript-report.${TIMESTAMP}.md`
|