godpowers 0.15.13 → 0.15.14

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/CHANGELOG.md CHANGED
@@ -5,6 +5,21 @@ All notable changes to Godpowers will be documented in this file.
5
5
  The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.1.0/),
6
6
  and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0.html).
7
7
 
8
+ ## [0.15.14] - 2026-05-11
9
+
10
+ Origin evidence release. Prevents `/god-mode --yolo` from inventing staging,
11
+ preview, or production domains during shipping closure.
12
+
13
+ ### Changed
14
+ - Added an Origin Evidence Rule to the Shipping Closure Protocol: deployed
15
+ origins must come from user input, env/config, deployment config, CI variable
16
+ references, IaC output, hosting CLI output, or deployment docs that explicitly
17
+ label the URL as owned and current.
18
+ - Deploy and launch instructions now forbid guessing domains from product name,
19
+ repo name, package name, README title, brand name, or common TLDs.
20
+ - Full-arc workflow metadata now marks deploy and launch closure as requiring
21
+ evidence-backed origins and forbidding inferred domains.
22
+
8
23
  ## [0.15.13] - 2026-05-11
9
24
 
10
25
  Access ladder release. Tightens `/god-mode --yolo` shipping closure so keys,
package/README.md CHANGED
@@ -2,7 +2,7 @@
2
2
 
3
3
  [![CI](https://github.com/aihxp/godpowers/actions/workflows/ci.yml/badge.svg)](https://github.com/aihxp/godpowers/actions/workflows/ci.yml)
4
4
  [![License: MIT](https://img.shields.io/badge/License-MIT-yellow.svg)](LICENSE)
5
- [![Version](https://img.shields.io/badge/version-0.15.13-blue)](CHANGELOG.md)
5
+ [![Version](https://img.shields.io/badge/version-0.15.14-blue)](CHANGELOG.md)
6
6
  [![npm](https://img.shields.io/npm/v/godpowers.svg)](https://www.npmjs.com/package/godpowers)
7
7
 
8
8
  **Ship fast. Ship right. Ship everything. Ship accountably.**
@@ -70,6 +70,15 @@ Build is complete. All tests pass. `.godpowers/build/STATE.md` shows green.
70
70
  dashboards, DNS tokens, production secrets, admin consoles, or test users
71
71
  until a named deploy, smoke, rollback, health, callback, webhook, export, or
72
72
  observability check cannot run without that exact item.
73
+ - Treat a staging or production origin as known only when it appears in direct
74
+ evidence: current user input, env/config values, deployment config, CI
75
+ variable references, IaC output, hosting CLI output, or deployment docs that
76
+ explicitly label the URL as owned and current. Never guess domains from the
77
+ product name, package name, repo name, README title, brand name, or common
78
+ TLDs.
79
+ - If only localhost or `127.0.0.1` exists, run local smoke only. If only
80
+ production is known, do not call it staging and do not use it as a yolo
81
+ default for staging smoke.
73
82
  - Add at most one new external access item per pause unless one command
74
83
  invocation genuinely requires several values together.
75
84
  - Do not return a broad checklist as the final answer. Either return tested
@@ -114,3 +123,5 @@ Write `.godpowers/deploy/STATE.md`:
114
123
  - Broad provider checklist with no scripts or exact access bundle
115
124
  - Marks deploy done when the only verified target is missing
116
125
  - Requests all provider keys before the staging URL smoke check has run
126
+ - Invents or guesses a staging or production domain
127
+ - Treats production as staging without explicit user approval
@@ -79,6 +79,13 @@ For each channel:
79
79
  - Do not ask for launch-channel accounts, analytics dashboards, provider
80
80
  dashboards, API keys, or admin consoles until a named launch-readiness or
81
81
  smoke check cannot run without that exact access.
82
+ - A URL is available only when it comes from direct evidence: current user
83
+ input, env/config, deployment config, CI variable references, IaC output,
84
+ hosting CLI output, or deployment docs that explicitly label it as owned and
85
+ current. Never infer a launch URL from product name, repo name, package name,
86
+ README title, brand name, or common TLDs.
87
+ - If only production is known, do not treat it as staging. If no deployed
88
+ origin is known, pause for `STAGING_APP_URL=<deployed staging origin>`.
82
89
 
83
90
  ## Output
84
91
 
@@ -97,6 +104,7 @@ Write `.godpowers/launch/STATE.md` with all artifacts.
97
104
  - Declares live launch without a verified live target
98
105
  - Requests launch or provider credentials before the live staging smoke check
99
106
  proves they are needed
107
+ - Invents or guesses launch, staging, or production domains
100
108
 
101
109
  ## Pause Conditions
102
110
 
@@ -361,7 +361,8 @@ For deploy, observe, harden, and launch:
361
361
 
362
362
  Use this order when external access is missing:
363
363
 
364
- 1. Ask for the deployed staging origin only if no live target URL is known.
364
+ 1. Ask for the deployed staging origin only if no live target URL is known from
365
+ explicit evidence.
365
366
  2. Run the real staging smoke command against that origin.
366
367
  3. Ask for a provider key, dashboard, admin console, or test user only when a
367
368
  named smoke, callback, webhook, export, observability, or rollback check
@@ -374,6 +375,23 @@ Use this order when external access is missing:
374
375
  Never request every possible key or API at the start of shipping. Keys and API
375
376
  tokens are last-mile inputs.
376
377
 
378
+ ### Origin Evidence Rule
379
+
380
+ A staging, production, or preview origin is known only when it appears in direct
381
+ evidence:
382
+
383
+ - user-provided value in the current session
384
+ - `STAGING_APP_URL`, `PUBLIC_APP_URL`, `APP_URL`, or equivalent env/config value
385
+ - deployment config, CI variable reference, IaC output, hosting CLI output, or
386
+ checked-in deployment docs that explicitly label the URL as owned and current
387
+ - an existing Godpowers artifact that cites one of the sources above
388
+
389
+ Never invent domains from the product name, package name, repo name, README
390
+ title, brand name, or common TLDs. Never turn `scriven` into
391
+ `https://scriven.app`, or any similar guessed URL. If only production is known,
392
+ do not call it staging. If only local URLs exist, run local smoke only and pause
393
+ for `STAGING_APP_URL=<deployed staging origin>` before deployed staging smoke.
394
+
377
395
  ## YOLO Behavior with Design + Linkage
378
396
 
379
397
  | Concern | Default | --yolo |
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "godpowers",
3
- "version": "0.15.13",
3
+ "version": "0.15.14",
4
4
  "description": "AI-powered development system: 104 slash commands and 38 specialist agents that take a project from raw idea to hardened production. Runs inside Claude Code, Codex, Cursor, Windsurf, Gemini, and 10+ other AI coding tools.",
5
5
  "bin": {
6
6
  "godpowers": "./bin/install.js"
@@ -54,6 +54,14 @@ Do not ask for provider keys, API tokens, dashboards, DNS tokens, production
54
54
  secrets, admin consoles, or test users until a specific scripted check proves
55
55
  that exact item is required.
56
56
 
57
+ Live target URLs must be evidence-backed. Accept current user input, env/config
58
+ values, deployment config, CI variable references, IaC output, hosting CLI
59
+ output, or deployment docs that explicitly label the URL as owned and current.
60
+ Never invent a domain from the product name, repo name, package name, README
61
+ title, brand name, or common TLDs. If only local URLs exist, run local smoke
62
+ only and pause for `STAGING_APP_URL=<deployed staging origin>`. If only
63
+ production is known, do not use it as staging without explicit user approval.
64
+
57
65
 
58
66
  ## Re-invocation contract
59
67
 
@@ -59,6 +59,12 @@ provider credential. Ask only for the next missing access item needed to run a
59
59
  named live smoke, launch-readiness, attribution, or monitoring check. If no
60
60
  live target URL is known, ask only for `STAGING_APP_URL=<staging-origin>`.
61
61
 
62
+ Live target URLs must be evidence-backed. Never invent a domain from the
63
+ product name, repo name, package name, README title, brand name, or common TLDs.
64
+ If only localhost or `127.0.0.1` exists, launch can only mark local readiness.
65
+ If only production is known, do not treat it as staging without explicit user
66
+ approval.
67
+
62
68
 
63
69
  ## Re-invocation contract
64
70
 
@@ -90,6 +90,10 @@ You are receiving a /god-mode invocation. Your job is to spawn the
90
90
  should ask only for the smallest next item needed by a concrete command,
91
91
  usually `STAGING_APP_URL=<staging-origin>`. Ask for additional provider
92
92
  access only after a named check proves it is needed.
93
+ - Instruction that staging, preview, and production URLs must come from
94
+ direct evidence. Never infer or invent a domain from project name, package
95
+ name, repo name, README title, or brand name. If no deployed origin is
96
+ evidenced, pause for `STAGING_APP_URL=<deployed staging origin>`.
93
97
 
94
98
  6. Orchestrator runs the appropriate workflow:
95
99
  - Greenfield -> full-arc
@@ -71,6 +71,8 @@ jobs:
71
71
  local-verification-required: true
72
72
  access-order: ask-for-staging-url-before-provider-keys
73
73
  max-new-access-items-per-pause: 1
74
+ origin-evidence-required: true
75
+ no-inferred-domains: true
74
76
 
75
77
  observe:
76
78
  tier: 3
@@ -98,3 +100,5 @@ jobs:
98
100
  on-missing-external-access: pause-with-single-access-bundle
99
101
  access-order: ask-for-staging-url-before-provider-keys
100
102
  max-new-access-items-per-pause: 1
103
+ origin-evidence-required: true
104
+ no-inferred-domains: true