kiro-agent-team 1.0.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.kiro/README.md +228 -0
- package/.kiro/agents/backend-engineer.json +6 -0
- package/.kiro/agents/backend-engineer.md +643 -0
- package/.kiro/agents/database-specialist.json +6 -0
- package/.kiro/agents/database-specialist.md +390 -0
- package/.kiro/agents/development-logger.json +6 -0
- package/.kiro/agents/development-logger.md +265 -0
- package/.kiro/agents/devops-engineer.json +6 -0
- package/.kiro/agents/devops-engineer.md +287 -0
- package/.kiro/agents/frontend-architect.json +6 -0
- package/.kiro/agents/frontend-architect.md +1032 -0
- package/.kiro/agents/hooks/backend-engineer-hooks.yaml +540 -0
- package/.kiro/agents/hooks/database-specialist-hooks.yaml +488 -0
- package/.kiro/agents/hooks/development-logger-hooks.yaml +361 -0
- package/.kiro/agents/hooks/devops-engineer-hooks.yaml +345 -0
- package/.kiro/agents/hooks/frontend-architect-hooks.yaml +521 -0
- package/.kiro/agents/hooks/project-manager-hooks.yaml +513 -0
- package/.kiro/agents/hooks/security-specialist-hooks.yaml +358 -0
- package/.kiro/agents/hooks/test-orchestrator-hooks.yaml +380 -0
- package/.kiro/agents/hooks/ui-ux-designer-hooks.yaml +353 -0
- package/.kiro/agents/project-manager.json +6 -0
- package/.kiro/agents/project-manager.md +344 -0
- package/.kiro/agents/prompts/backend-engineer-system.md +815 -0
- package/.kiro/agents/prompts/database-specialist-system.md +332 -0
- package/.kiro/agents/prompts/development-logger-system.md +232 -0
- package/.kiro/agents/prompts/devops-engineer-system.md +260 -0
- package/.kiro/agents/prompts/frontend-architect-system.md +305 -0
- package/.kiro/agents/prompts/project-manager-system.md +285 -0
- package/.kiro/agents/prompts/security-specialist-system.md +231 -0
- package/.kiro/agents/prompts/test-orchestrator-system.md +214 -0
- package/.kiro/agents/prompts/ui-ux-designer-system.md +270 -0
- package/.kiro/agents/security-specialist.json +6 -0
- package/.kiro/agents/security-specialist.md +277 -0
- package/.kiro/agents/test-orchestrator.json +6 -0
- package/.kiro/agents/test-orchestrator.md +266 -0
- package/.kiro/agents/ui-ux-designer.json +6 -0
- package/.kiro/agents/ui-ux-designer.md +284 -0
- package/.kiro/devlog/00-START-HERE.md +444 -0
- package/.kiro/devlog/COMPLETE-WORKFLOW.md +553 -0
- package/.kiro/devlog/DEVLOG-INTEGRATION.md +413 -0
- package/.kiro/devlog/DEVLOG-PROCESS-FLOWS.md +484 -0
- package/.kiro/devlog/DEVLOG-QUICK-REF.md +299 -0
- package/.kiro/devlog/DEVLOG.md +22 -0
- package/.kiro/devlog/IMPLEMENTATION-COMPLETE.txt +434 -0
- package/.kiro/devlog/IMPLEMENTATION-SUMMARY.md +358 -0
- package/.kiro/devlog/README.md +363 -0
- package/.kiro/devlog/devlog-update.bat +136 -0
- package/.kiro/devlog/devlog-update.sh +275 -0
- package/.kiro/devlog/feature-completion-hook.bat +78 -0
- package/.kiro/devlog/feature-completion-hook.sh +84 -0
- package/.kiro/documentation/cli.md +31 -0
- package/.kiro/documentation/docs_cli.md +41 -0
- package/.kiro/documentation/docs_cli_authentication.md +43 -0
- package/.kiro/documentation/docs_cli_autocomplete.md +132 -0
- package/.kiro/documentation/docs_cli_billing.md +31 -0
- package/.kiro/documentation/docs_cli_billing_contact-support.md +43 -0
- package/.kiro/documentation/docs_cli_billing_managing-taxes.md +67 -0
- package/.kiro/documentation/docs_cli_billing_related-questions.md +49 -0
- package/.kiro/documentation/docs_cli_billing_subscription-portal.md +31 -0
- package/.kiro/documentation/docs_cli_chat.md +84 -0
- package/.kiro/documentation/docs_cli_chat_configuration.md +40 -0
- package/.kiro/documentation/docs_cli_chat_context.md +258 -0
- package/.kiro/documentation/docs_cli_chat_git-aware-selection.md +41 -0
- package/.kiro/documentation/docs_cli_chat_images.md +53 -0
- package/.kiro/documentation/docs_cli_chat_manage-prompts.md +216 -0
- package/.kiro/documentation/docs_cli_chat_model-selection.md +153 -0
- package/.kiro/documentation/docs_cli_chat_permissions.md +68 -0
- package/.kiro/documentation/docs_cli_chat_planning-agent.md +230 -0
- package/.kiro/documentation/docs_cli_chat_responding.md +123 -0
- package/.kiro/documentation/docs_cli_chat_security.md +87 -0
- package/.kiro/documentation/docs_cli_chat_subagents.md +77 -0
- package/.kiro/documentation/docs_cli_code-intelligence.md +251 -0
- package/.kiro/documentation/docs_cli_custom-agents.md +37 -0
- package/.kiro/documentation/docs_cli_custom-agents_configuration-reference.md +941 -0
- package/.kiro/documentation/docs_cli_custom-agents_creating.md +93 -0
- package/.kiro/documentation/docs_cli_custom-agents_examples.md +360 -0
- package/.kiro/documentation/docs_cli_custom-agents_troubleshooting.md +180 -0
- package/.kiro/documentation/docs_cli_enterprise_billing.md +33 -0
- package/.kiro/documentation/docs_cli_enterprise_concepts.md +34 -0
- package/.kiro/documentation/docs_cli_enterprise_getting-started.md +19 -0
- package/.kiro/documentation/docs_cli_enterprise_iam.md +251 -0
- package/.kiro/documentation/docs_cli_enterprise_monitor-and-track.md +15 -0
- package/.kiro/documentation/docs_cli_enterprise_monitor-and-track_dashboard.md +62 -0
- package/.kiro/documentation/docs_cli_enterprise_monitor-and-track_prompt-logging.md +165 -0
- package/.kiro/documentation/docs_cli_enterprise_monitor-and-track_user-activity.md +123 -0
- package/.kiro/documentation/docs_cli_enterprise_settings.md +15 -0
- package/.kiro/documentation/docs_cli_enterprise_subscribe.md +36 -0
- package/.kiro/documentation/docs_cli_enterprise_subscription-management.md +55 -0
- package/.kiro/documentation/docs_cli_enterprise_supported-regions.md +39 -0
- package/.kiro/documentation/docs_cli_experimental.md +282 -0
- package/.kiro/documentation/docs_cli_experimental_checkpointing.md +439 -0
- package/.kiro/documentation/docs_cli_experimental_delegate.md +422 -0
- package/.kiro/documentation/docs_cli_experimental_knowledge-management.md +449 -0
- package/.kiro/documentation/docs_cli_experimental_tangent-mode.md +357 -0
- package/.kiro/documentation/docs_cli_experimental_thinking.md +331 -0
- package/.kiro/documentation/docs_cli_experimental_todo-lists.md +385 -0
- package/.kiro/documentation/docs_cli_hooks.md +207 -0
- package/.kiro/documentation/docs_cli_installation.md +235 -0
- package/.kiro/documentation/docs_cli_mcp.md +106 -0
- package/.kiro/documentation/docs_cli_mcp_configuration.md +294 -0
- package/.kiro/documentation/docs_cli_mcp_examples.md +273 -0
- package/.kiro/documentation/docs_cli_mcp_governance.md +436 -0
- package/.kiro/documentation/docs_cli_mcp_security.md +77 -0
- package/.kiro/documentation/docs_cli_migrating-from-q.md +129 -0
- package/.kiro/documentation/docs_cli_privacy-and-security.md +83 -0
- package/.kiro/documentation/docs_cli_privacy-and-security_compliance-validation.md +17 -0
- package/.kiro/documentation/docs_cli_privacy-and-security_data-protection.md +104 -0
- package/.kiro/documentation/docs_cli_privacy-and-security_firewalls.md +26 -0
- package/.kiro/documentation/docs_cli_privacy-and-security_infrastructure-security.md +10 -0
- package/.kiro/documentation/docs_cli_privacy-and-security_vpc-endpoints.md +41 -0
- package/.kiro/documentation/docs_cli_reference_built-in-tools.md +624 -0
- package/.kiro/documentation/docs_cli_reference_cli-commands.md +689 -0
- package/.kiro/documentation/docs_cli_reference_settings.md +294 -0
- package/.kiro/documentation/docs_cli_reference_slash-commands.md +559 -0
- package/.kiro/documentation/docs_cli_steering.md +84 -0
- package/.kiro/guides/AGENT_WORKFLOW_GUIDE.md +294 -0
- package/.kiro/guides/DEVLOG.md +882 -0
- package/.kiro/guides/IMPLEMENTATION_EXAMPLES.md +611 -0
- package/.kiro/guides/PIV Loop.md +122 -0
- package/.kiro/guides/PIV Loop.png +0 -0
- package/.kiro/guides/PIVLoop.png +0 -0
- package/.kiro/guides/QUICK_REFERENCE.md +202 -0
- package/.kiro/guides/README.md +149 -0
- package/.kiro/guides/advanced-patterns.md +514 -0
- package/.kiro/guides/agent-coordination.md +434 -0
- package/.kiro/guides/core-workflows.md +409 -0
- package/.kiro/guides/emergency-procedures.md +414 -0
- package/.kiro/guides/project-evaluation.md +534 -0
- package/.kiro/guides/quality-assurance.md +431 -0
- package/.kiro/guides/quick-start.md +235 -0
- package/.kiro/guides/troubleshooting.md +575 -0
- package/.kiro/guides/walkthroughs.md +711 -0
- package/.kiro/prompts/add-to-devlog.md +263 -0
- package/.kiro/prompts/code-review-fix.md +18 -0
- package/.kiro/prompts/code-review-hackathon.md +167 -0
- package/.kiro/prompts/code-review-security.md +454 -0
- package/.kiro/prompts/code-review.md +113 -0
- package/.kiro/prompts/create-prd.md +151 -0
- package/.kiro/prompts/execute-backend.md +257 -0
- package/.kiro/prompts/execute-frontend.md +438 -0
- package/.kiro/prompts/execute-logging.md +491 -0
- package/.kiro/prompts/execute-security.md +482 -0
- package/.kiro/prompts/execute-testing.md +528 -0
- package/.kiro/prompts/execute.md +101 -0
- package/.kiro/prompts/execution-report.md +72 -0
- package/.kiro/prompts/implement-fix.md +228 -0
- package/.kiro/prompts/plan-feature.md +433 -0
- package/.kiro/prompts/prime.md +73 -0
- package/.kiro/prompts/quality-metrics.md +622 -0
- package/.kiro/prompts/quickstart.md +318 -0
- package/.kiro/prompts/rca.md +220 -0
- package/.kiro/prompts/system-review.md +189 -0
- package/README.md +32 -0
- package/bin/cli.js +97 -0
- package/package.json +33 -0
|
@@ -0,0 +1,611 @@
|
|
|
1
|
+
# Agent Team Implementation Examples
|
|
2
|
+
|
|
3
|
+
## Real-World Implementation Scenarios
|
|
4
|
+
|
|
5
|
+
This document provides concrete examples of how to execute the agent workflows with actual commands, expected outputs, and success criteria.
|
|
6
|
+
|
|
7
|
+
## Example 1: Building a User Authentication System
|
|
8
|
+
|
|
9
|
+
### Scenario Setup
|
|
10
|
+
- **Project**: TaskFlow Application
|
|
11
|
+
- **Feature**: Complete user authentication with JWT tokens
|
|
12
|
+
- **Timeline**: 2-week sprint
|
|
13
|
+
- **Team**: Full 9-agent team coordination
|
|
14
|
+
|
|
15
|
+
### Step-by-Step Implementation
|
|
16
|
+
|
|
17
|
+
#### Phase 1: Project Context and Planning
|
|
18
|
+
|
|
19
|
+
**1. Load Project Context**
|
|
20
|
+
```bash
|
|
21
|
+
# Command
|
|
22
|
+
@prime
|
|
23
|
+
|
|
24
|
+
# Expected Agent Response (Project Manager)
|
|
25
|
+
🎯 **Project Context Loading Complete**
|
|
26
|
+
|
|
27
|
+
**Project Analysis:**
|
|
28
|
+
- Codebase: Node.js/TypeScript backend, React/TypeScript frontend
|
|
29
|
+
- Database: PostgreSQL with Prisma ORM
|
|
30
|
+
- Current State: Basic project structure, no authentication
|
|
31
|
+
- Architecture: RESTful API with React SPA frontend
|
|
32
|
+
|
|
33
|
+
**Key Findings:**
|
|
34
|
+
- Authentication infrastructure needs to be built from scratch
|
|
35
|
+
- Security considerations for JWT token management
|
|
36
|
+
- Frontend state management for user sessions
|
|
37
|
+
- Database schema updates required for user management
|
|
38
|
+
|
|
39
|
+
**Recommendations:**
|
|
40
|
+
- Implement JWT-based authentication with refresh tokens
|
|
41
|
+
- Use bcrypt for password hashing
|
|
42
|
+
- Implement role-based access control (RBAC)
|
|
43
|
+
- Add comprehensive security middleware
|
|
44
|
+
|
|
45
|
+
**Next Steps:** Use @plan-feature to create detailed implementation plan
|
|
46
|
+
```
|
|
47
|
+
|
|
48
|
+
**2. Create Comprehensive Feature Plan**
|
|
49
|
+
```bash
|
|
50
|
+
# Command
|
|
51
|
+
@plan-feature "User Authentication System"
|
|
52
|
+
|
|
53
|
+
# Expected Agent Response (Project Manager)
|
|
54
|
+
📋 **Feature Implementation Plan: User Authentication System**
|
|
55
|
+
|
|
56
|
+
**Architecture Decisions:**
|
|
57
|
+
- JWT access tokens (15min expiry) + refresh tokens (7 days)
|
|
58
|
+
- bcrypt password hashing with salt rounds: 12
|
|
59
|
+
- Role-based access control with user roles
|
|
60
|
+
- Secure HTTP-only cookies for token storage
|
|
61
|
+
- Rate limiting for authentication endpoints
|
|
62
|
+
|
|
63
|
+
**Task Breakdown:**
|
|
64
|
+
|
|
65
|
+
**Database Layer (Database Specialist - 6 hours)**
|
|
66
|
+
1. Create user table with authentication fields (1 hour)
|
|
67
|
+
2. Add user roles and permissions tables (1 hour)
|
|
68
|
+
3. Create refresh token storage table (1 hour)
|
|
69
|
+
4. Add database indexes for performance (1 hour)
|
|
70
|
+
5. Create user management stored procedures (2 hours)
|
|
71
|
+
|
|
72
|
+
**Backend Implementation (Backend Engineer - 12 hours)**
|
|
73
|
+
1. Set up JWT token generation and validation (2 hours)
|
|
74
|
+
2. Implement password hashing service (1 hour)
|
|
75
|
+
3. Create authentication middleware (2 hours)
|
|
76
|
+
4. Build user registration endpoint (2 hours)
|
|
77
|
+
5. Build login/logout endpoints (2 hours)
|
|
78
|
+
6. Implement refresh token rotation (2 hours)
|
|
79
|
+
7. Add rate limiting and security headers (1 hour)
|
|
80
|
+
|
|
81
|
+
**Frontend Implementation (Frontend Architect - 10 hours)**
|
|
82
|
+
1. Create authentication context and hooks (2 hours)
|
|
83
|
+
2. Build login/register forms with validation (3 hours)
|
|
84
|
+
3. Implement protected route components (2 hours)
|
|
85
|
+
4. Add user profile management UI (2 hours)
|
|
86
|
+
5. Handle token refresh and logout flows (1 hour)
|
|
87
|
+
|
|
88
|
+
**Security Review (Security Specialist - 4 hours)**
|
|
89
|
+
1. Review authentication flow security (1 hour)
|
|
90
|
+
2. Validate JWT implementation (1 hour)
|
|
91
|
+
3. Test for common vulnerabilities (1 hour)
|
|
92
|
+
4. Security documentation and guidelines (1 hour)
|
|
93
|
+
|
|
94
|
+
**Testing Strategy (Test Orchestrator - 8 hours)**
|
|
95
|
+
1. Unit tests for authentication services (2 hours)
|
|
96
|
+
2. Integration tests for auth endpoints (2 hours)
|
|
97
|
+
3. E2E tests for complete auth flows (2 hours)
|
|
98
|
+
4. Security testing and penetration tests (2 hours)
|
|
99
|
+
|
|
100
|
+
**Total Estimated Effort:** 40 hours across 5 agents
|
|
101
|
+
**Timeline:** 2 weeks with parallel development
|
|
102
|
+
**Dependencies:** Database → Backend → Frontend → Testing
|
|
103
|
+
```
|
|
104
|
+
|
|
105
|
+
#### Phase 2: Systematic Implementation
|
|
106
|
+
|
|
107
|
+
**3. Database Implementation**
|
|
108
|
+
```bash
|
|
109
|
+
# Database Specialist executes
|
|
110
|
+
@execute
|
|
111
|
+
|
|
112
|
+
# Implementation Process:
|
|
113
|
+
✅ Created comprehensive user authentication schema
|
|
114
|
+
✅ Added proper indexes for query performance
|
|
115
|
+
✅ Implemented secure password storage design
|
|
116
|
+
✅ Created refresh token management tables
|
|
117
|
+
✅ Added user role and permission system
|
|
118
|
+
|
|
119
|
+
# Validation Results:
|
|
120
|
+
- Migration executed successfully
|
|
121
|
+
- All constraints and indexes created
|
|
122
|
+
- Test data populated for development
|
|
123
|
+
- Performance benchmarks within targets
|
|
124
|
+
```
|
|
125
|
+
|
|
126
|
+
**4. Backend Implementation**
|
|
127
|
+
```bash
|
|
128
|
+
# Backend Engineer executes
|
|
129
|
+
@execute
|
|
130
|
+
|
|
131
|
+
# Implementation Process:
|
|
132
|
+
✅ JWT service with secure token generation
|
|
133
|
+
✅ bcrypt password hashing with proper salt rounds
|
|
134
|
+
✅ Authentication middleware with role validation
|
|
135
|
+
✅ Complete user registration with validation
|
|
136
|
+
✅ Secure login/logout with refresh token rotation
|
|
137
|
+
✅ Rate limiting and security headers implemented
|
|
138
|
+
|
|
139
|
+
# Validation Results:
|
|
140
|
+
- All endpoints tested with Postman
|
|
141
|
+
- Security headers properly configured
|
|
142
|
+
- Rate limiting working as expected
|
|
143
|
+
- JWT tokens properly signed and validated
|
|
144
|
+
```
|
|
145
|
+
|
|
146
|
+
**5. Frontend Implementation**
|
|
147
|
+
```bash
|
|
148
|
+
# Frontend Architect executes
|
|
149
|
+
@execute
|
|
150
|
+
|
|
151
|
+
# Implementation Process:
|
|
152
|
+
✅ Authentication context with TypeScript types
|
|
153
|
+
✅ Login/register forms with Zod validation
|
|
154
|
+
✅ Protected routes with role-based access
|
|
155
|
+
✅ User profile management interface
|
|
156
|
+
✅ Automatic token refresh handling
|
|
157
|
+
|
|
158
|
+
# Validation Results:
|
|
159
|
+
- All components render without errors
|
|
160
|
+
- Form validation working correctly
|
|
161
|
+
- Protected routes properly secured
|
|
162
|
+
- User experience smooth and intuitive
|
|
163
|
+
```
|
|
164
|
+
|
|
165
|
+
#### Phase 3: Quality Assurance
|
|
166
|
+
|
|
167
|
+
**6. Comprehensive Code Review**
|
|
168
|
+
```bash
|
|
169
|
+
# Test Orchestrator executes
|
|
170
|
+
@code-review
|
|
171
|
+
|
|
172
|
+
# Code Review Results:
|
|
173
|
+
🔍 **Authentication System Code Review**
|
|
174
|
+
|
|
175
|
+
**Security Assessment: ✅ PASS**
|
|
176
|
+
- JWT implementation follows security best practices
|
|
177
|
+
- Password hashing properly implemented with bcrypt
|
|
178
|
+
- Rate limiting configured correctly
|
|
179
|
+
- HTTPS-only cookies for token storage
|
|
180
|
+
- No hardcoded secrets or credentials
|
|
181
|
+
|
|
182
|
+
**Code Quality: ✅ PASS**
|
|
183
|
+
- TypeScript types properly defined
|
|
184
|
+
- Error handling comprehensive
|
|
185
|
+
- Code follows project conventions
|
|
186
|
+
- Proper separation of concerns
|
|
187
|
+
- Good test coverage (87%)
|
|
188
|
+
|
|
189
|
+
**Performance: ✅ PASS**
|
|
190
|
+
- Database queries optimized with indexes
|
|
191
|
+
- JWT token size reasonable
|
|
192
|
+
- Frontend bundle impact minimal
|
|
193
|
+
- API response times within targets
|
|
194
|
+
|
|
195
|
+
**Recommendations:**
|
|
196
|
+
- Add password strength requirements
|
|
197
|
+
- Implement account lockout after failed attempts
|
|
198
|
+
- Add audit logging for authentication events
|
|
199
|
+
- Consider implementing 2FA for admin users
|
|
200
|
+
|
|
201
|
+
**Overall Assessment: APPROVED FOR DEPLOYMENT**
|
|
202
|
+
```
|
|
203
|
+
|
|
204
|
+
**7. Implementation Report**
|
|
205
|
+
```bash
|
|
206
|
+
# Test Orchestrator executes
|
|
207
|
+
@execution-report
|
|
208
|
+
|
|
209
|
+
# Implementation Report:
|
|
210
|
+
📊 **Authentication System Implementation Report**
|
|
211
|
+
|
|
212
|
+
**Planned vs Actual:**
|
|
213
|
+
- Estimated: 40 hours | Actual: 38 hours ✅
|
|
214
|
+
- Timeline: 2 weeks | Completed: 1.8 weeks ✅
|
|
215
|
+
- All planned features implemented successfully
|
|
216
|
+
|
|
217
|
+
**Quality Metrics:**
|
|
218
|
+
- Test Coverage: 87% (target: 80%) ✅
|
|
219
|
+
- Security Scan: 0 critical vulnerabilities ✅
|
|
220
|
+
- Performance: All endpoints < 200ms ✅
|
|
221
|
+
- Code Review: Approved with minor recommendations
|
|
222
|
+
|
|
223
|
+
**Challenges Overcome:**
|
|
224
|
+
- JWT refresh token rotation complexity
|
|
225
|
+
- Frontend state management for auth context
|
|
226
|
+
- Database migration coordination across environments
|
|
227
|
+
|
|
228
|
+
**Key Learnings:**
|
|
229
|
+
- Early security consultation prevented vulnerabilities
|
|
230
|
+
- Parallel development reduced overall timeline
|
|
231
|
+
- Comprehensive testing caught integration issues early
|
|
232
|
+
|
|
233
|
+
**Recommendations for Future:**
|
|
234
|
+
- Include security specialist from planning phase
|
|
235
|
+
- Add more comprehensive E2E testing scenarios
|
|
236
|
+
- Consider automated security scanning in CI/CD
|
|
237
|
+
```
|
|
238
|
+
|
|
239
|
+
#### Phase 4: Process Improvement
|
|
240
|
+
|
|
241
|
+
**8. System Review and Process Analysis**
|
|
242
|
+
```bash
|
|
243
|
+
# Development Logger executes
|
|
244
|
+
@system-review [authentication-plan.md] [auth-execution-report.md]
|
|
245
|
+
|
|
246
|
+
# System Review Results:
|
|
247
|
+
🔄 **Authentication System Process Review**
|
|
248
|
+
|
|
249
|
+
**Overall Alignment Score: 9/10**
|
|
250
|
+
|
|
251
|
+
**What Worked Exceptionally Well:**
|
|
252
|
+
- Systematic planning with @plan-feature prevented scope creep
|
|
253
|
+
- Agent coordination through Project Manager eliminated conflicts
|
|
254
|
+
- Early security consultation prevented major vulnerabilities
|
|
255
|
+
- Parallel development approach reduced timeline by 20%
|
|
256
|
+
|
|
257
|
+
**Process Improvements Identified:**
|
|
258
|
+
- Add security requirements to initial planning template
|
|
259
|
+
- Include performance benchmarks in acceptance criteria
|
|
260
|
+
- Create reusable authentication patterns for future features
|
|
261
|
+
- Establish security testing automation in CI/CD
|
|
262
|
+
|
|
263
|
+
**Recommended Updates:**
|
|
264
|
+
- Update plan-feature.md to include security consultation step
|
|
265
|
+
- Add authentication patterns to project steering documents
|
|
266
|
+
- Create security testing checklist for Test Orchestrator
|
|
267
|
+
- Document JWT implementation patterns for reuse
|
|
268
|
+
|
|
269
|
+
**Key Success Factors:**
|
|
270
|
+
- Comprehensive upfront planning
|
|
271
|
+
- Clear agent role definitions
|
|
272
|
+
- Systematic quality gates
|
|
273
|
+
- Continuous documentation and learning
|
|
274
|
+
```
|
|
275
|
+
|
|
276
|
+
### Success Metrics Achieved
|
|
277
|
+
|
|
278
|
+
**Development Velocity:**
|
|
279
|
+
- ✅ Feature completed 10% ahead of schedule
|
|
280
|
+
- ✅ Zero major rework required
|
|
281
|
+
- ✅ All acceptance criteria met
|
|
282
|
+
|
|
283
|
+
**Quality Metrics:**
|
|
284
|
+
- ✅ 87% test coverage (exceeded 80% target)
|
|
285
|
+
- ✅ Zero security vulnerabilities
|
|
286
|
+
- ✅ All performance benchmarks met
|
|
287
|
+
- ✅ Code review passed on first attempt
|
|
288
|
+
|
|
289
|
+
**Process Effectiveness:**
|
|
290
|
+
- ✅ Perfect agent coordination with no conflicts
|
|
291
|
+
- ✅ Comprehensive documentation generated
|
|
292
|
+
- ✅ Process improvements identified and documented
|
|
293
|
+
- ✅ Reusable patterns created for future use
|
|
294
|
+
|
|
295
|
+
---
|
|
296
|
+
|
|
297
|
+
## Example 2: Emergency Security Fix
|
|
298
|
+
|
|
299
|
+
### Scenario Setup
|
|
300
|
+
- **Issue**: Critical SQL injection vulnerability discovered
|
|
301
|
+
- **Severity**: High - affects user data security
|
|
302
|
+
- **Timeline**: Must be fixed within 24 hours
|
|
303
|
+
- **GitHub Issue**: #247
|
|
304
|
+
|
|
305
|
+
### Emergency Response Implementation
|
|
306
|
+
|
|
307
|
+
#### Phase 1: Root Cause Analysis
|
|
308
|
+
|
|
309
|
+
**1. Immediate Security Assessment**
|
|
310
|
+
```bash
|
|
311
|
+
# Security Specialist executes
|
|
312
|
+
@rca 247
|
|
313
|
+
|
|
314
|
+
# Root Cause Analysis Results:
|
|
315
|
+
🚨 **Security RCA: SQL Injection Vulnerability #247**
|
|
316
|
+
|
|
317
|
+
**Issue Summary:**
|
|
318
|
+
- GitHub Issue: #247
|
|
319
|
+
- Severity: HIGH
|
|
320
|
+
- Affected Component: User search functionality
|
|
321
|
+
- Discovery: Security audit found unsanitized input
|
|
322
|
+
|
|
323
|
+
**Root Cause Analysis:**
|
|
324
|
+
- Location: backend/src/routes/users.ts:45
|
|
325
|
+
- Issue: Direct string concatenation in SQL query
|
|
326
|
+
- Vulnerable Code: `SELECT * FROM users WHERE name = '${searchTerm}'`
|
|
327
|
+
- Impact: Full database access possible through injection
|
|
328
|
+
|
|
329
|
+
**Affected Systems:**
|
|
330
|
+
- User search API endpoint
|
|
331
|
+
- Potentially all user data accessible
|
|
332
|
+
- Admin functions could be compromised
|
|
333
|
+
|
|
334
|
+
**Proposed Fix Strategy:**
|
|
335
|
+
1. Replace string concatenation with parameterized queries
|
|
336
|
+
2. Add input validation and sanitization
|
|
337
|
+
3. Implement query result limiting
|
|
338
|
+
4. Add security logging for search operations
|
|
339
|
+
5. Update all similar patterns in codebase
|
|
340
|
+
|
|
341
|
+
**Testing Requirements:**
|
|
342
|
+
- SQL injection penetration testing
|
|
343
|
+
- Input validation testing with malicious payloads
|
|
344
|
+
- Performance testing with parameterized queries
|
|
345
|
+
- Security regression testing
|
|
346
|
+
|
|
347
|
+
**Timeline:** 6 hours for complete fix and validation
|
|
348
|
+
```
|
|
349
|
+
|
|
350
|
+
#### Phase 2: Fix Implementation
|
|
351
|
+
|
|
352
|
+
**2. Systematic Security Fix**
|
|
353
|
+
```bash
|
|
354
|
+
# Security Specialist executes
|
|
355
|
+
@implement-fix 247
|
|
356
|
+
|
|
357
|
+
# Fix Implementation Results:
|
|
358
|
+
🔧 **Security Fix Implementation: Issue #247**
|
|
359
|
+
|
|
360
|
+
**Changes Made:**
|
|
361
|
+
|
|
362
|
+
**File: backend/src/routes/users.ts**
|
|
363
|
+
- Replaced string concatenation with Prisma parameterized queries
|
|
364
|
+
- Added Zod input validation for search parameters
|
|
365
|
+
- Implemented query result limiting (max 100 results)
|
|
366
|
+
- Added security logging for all search operations
|
|
367
|
+
|
|
368
|
+
**File: backend/src/middleware/validation.ts**
|
|
369
|
+
- Created reusable input sanitization middleware
|
|
370
|
+
- Added SQL injection pattern detection
|
|
371
|
+
- Implemented rate limiting for search endpoints
|
|
372
|
+
|
|
373
|
+
**File: backend/src/services/auditService.ts**
|
|
374
|
+
- Added security event logging
|
|
375
|
+
- Implemented suspicious activity detection
|
|
376
|
+
- Created audit trail for all database queries
|
|
377
|
+
|
|
378
|
+
**Testing Results:**
|
|
379
|
+
✅ SQL injection tests: All blocked successfully
|
|
380
|
+
✅ Input validation: Malicious payloads rejected
|
|
381
|
+
✅ Performance: Query time improved by 15%
|
|
382
|
+
✅ Security scan: Zero vulnerabilities detected
|
|
383
|
+
|
|
384
|
+
**Deployment Validation:**
|
|
385
|
+
- Staging environment: All tests passing
|
|
386
|
+
- Security penetration test: No vulnerabilities found
|
|
387
|
+
- Performance benchmarks: Within acceptable limits
|
|
388
|
+
- Rollback plan: Prepared and tested
|
|
389
|
+
|
|
390
|
+
**Ready for Production Deployment**
|
|
391
|
+
```
|
|
392
|
+
|
|
393
|
+
#### Phase 3: Quality Validation
|
|
394
|
+
|
|
395
|
+
**3. Emergency Code Review**
|
|
396
|
+
```bash
|
|
397
|
+
# Test Orchestrator executes
|
|
398
|
+
@code-review
|
|
399
|
+
|
|
400
|
+
# Emergency Code Review Results:
|
|
401
|
+
🔍 **Emergency Security Fix Code Review**
|
|
402
|
+
|
|
403
|
+
**Security Assessment: ✅ CRITICAL PASS**
|
|
404
|
+
- SQL injection vulnerability completely eliminated
|
|
405
|
+
- Input validation comprehensive and effective
|
|
406
|
+
- Parameterized queries properly implemented
|
|
407
|
+
- Security logging captures all relevant events
|
|
408
|
+
- No new vulnerabilities introduced
|
|
409
|
+
|
|
410
|
+
**Code Quality: ✅ PASS**
|
|
411
|
+
- Fix follows established patterns
|
|
412
|
+
- Error handling maintained
|
|
413
|
+
- Performance not degraded
|
|
414
|
+
- Proper TypeScript types maintained
|
|
415
|
+
|
|
416
|
+
**Testing Coverage: ✅ PASS**
|
|
417
|
+
- Security tests cover all attack vectors
|
|
418
|
+
- Regression tests ensure no functionality broken
|
|
419
|
+
- Performance tests validate query optimization
|
|
420
|
+
- Integration tests confirm end-to-end security
|
|
421
|
+
|
|
422
|
+
**Deployment Readiness: ✅ APPROVED**
|
|
423
|
+
- All quality gates passed
|
|
424
|
+
- Security validation complete
|
|
425
|
+
- Performance benchmarks met
|
|
426
|
+
- Rollback procedures tested
|
|
427
|
+
|
|
428
|
+
**Recommendation: IMMEDIATE DEPLOYMENT APPROVED**
|
|
429
|
+
```
|
|
430
|
+
|
|
431
|
+
### Emergency Response Success
|
|
432
|
+
|
|
433
|
+
**Response Time:**
|
|
434
|
+
- ✅ Issue identified to fix deployed: 8 hours
|
|
435
|
+
- ✅ Target 24 hours: Exceeded by 16 hours
|
|
436
|
+
- ✅ Zero downtime during fix implementation
|
|
437
|
+
|
|
438
|
+
**Security Outcome:**
|
|
439
|
+
- ✅ Vulnerability completely eliminated
|
|
440
|
+
- ✅ No data breach occurred
|
|
441
|
+
- ✅ Enhanced security monitoring implemented
|
|
442
|
+
- ✅ Prevention measures added for similar issues
|
|
443
|
+
|
|
444
|
+
**Process Effectiveness:**
|
|
445
|
+
- ✅ Systematic RCA prevented incomplete fixes
|
|
446
|
+
- ✅ Agent coordination ensured comprehensive solution
|
|
447
|
+
- ✅ Quality gates maintained even under pressure
|
|
448
|
+
- ✅ Documentation complete for future reference
|
|
449
|
+
|
|
450
|
+
---
|
|
451
|
+
|
|
452
|
+
## Example 3: Hackathon Project Evaluation
|
|
453
|
+
|
|
454
|
+
### Scenario Setup
|
|
455
|
+
- **Project**: Complete TaskFlow application
|
|
456
|
+
- **Purpose**: Hackathon submission evaluation
|
|
457
|
+
- **Criteria**: 5 judging categories, 100 points total
|
|
458
|
+
- **Timeline**: Final evaluation before submission
|
|
459
|
+
|
|
460
|
+
### Comprehensive Project Evaluation
|
|
461
|
+
|
|
462
|
+
**1. Complete Project Assessment**
|
|
463
|
+
```bash
|
|
464
|
+
# Test Orchestrator executes
|
|
465
|
+
@code-review-hackathon
|
|
466
|
+
|
|
467
|
+
# Hackathon Evaluation Results:
|
|
468
|
+
🏆 **TaskFlow Application - Hackathon Submission Review**
|
|
469
|
+
|
|
470
|
+
**Overall Score: 87/100**
|
|
471
|
+
|
|
472
|
+
**Application Quality (35/40 points)**
|
|
473
|
+
- Functionality & Completeness (14/15): Feature-complete with minor polish needed
|
|
474
|
+
- Real-World Value (14/15): Solves genuine productivity problem effectively
|
|
475
|
+
- Code Quality (7/10): Good architecture, some refactoring opportunities
|
|
476
|
+
|
|
477
|
+
**Kiro CLI Usage (18/20 points)**
|
|
478
|
+
- Effective Use of Features (9/10): Excellent agent coordination and workflow
|
|
479
|
+
- Custom Commands Quality (6/7): Well-designed prompts and automation
|
|
480
|
+
- Workflow Innovation (3/3): Creative use of agent collaboration patterns
|
|
481
|
+
|
|
482
|
+
**Documentation (17/20 points)**
|
|
483
|
+
- Completeness (8/9): All required documentation present
|
|
484
|
+
- Clarity (6/7): Clear instructions and explanations
|
|
485
|
+
- Process Transparency (3/4): Good development process visibility
|
|
486
|
+
|
|
487
|
+
**Innovation (12/15 points)**
|
|
488
|
+
- Uniqueness (6/8): Novel approach to task management
|
|
489
|
+
- Creative Problem-Solving (6/7): Innovative agent workflow integration
|
|
490
|
+
|
|
491
|
+
**Presentation (5/5 points)**
|
|
492
|
+
- Demo Video (3/3): Clear, engaging demonstration
|
|
493
|
+
- README (2/2): Excellent setup instructions and overview
|
|
494
|
+
|
|
495
|
+
**Strengths:**
|
|
496
|
+
- Exceptional use of Kiro CLI agent team
|
|
497
|
+
- Comprehensive documentation and process transparency
|
|
498
|
+
- Innovative workflow patterns that could benefit other developers
|
|
499
|
+
- High-quality implementation with good security practices
|
|
500
|
+
|
|
501
|
+
**Areas for Improvement:**
|
|
502
|
+
- Code refactoring for better maintainability
|
|
503
|
+
- Additional error handling in edge cases
|
|
504
|
+
- More comprehensive testing coverage
|
|
505
|
+
- Enhanced UI/UX polish
|
|
506
|
+
|
|
507
|
+
**Hackathon Readiness: READY FOR SUBMISSION**
|
|
508
|
+
**Competitive Position: STRONG (Top 25% likely)**
|
|
509
|
+
```
|
|
510
|
+
|
|
511
|
+
**2. Final Documentation Review**
|
|
512
|
+
```bash
|
|
513
|
+
# Project Manager executes
|
|
514
|
+
@create-prd "TaskFlow Application - Complete Specification"
|
|
515
|
+
|
|
516
|
+
# Product Requirements Document Generated:
|
|
517
|
+
📋 **TaskFlow Application - Product Requirements Document**
|
|
518
|
+
|
|
519
|
+
**Product Overview:**
|
|
520
|
+
- Purpose: Collaborative task management with AI agent assistance
|
|
521
|
+
- Target Users: Development teams and project managers
|
|
522
|
+
- Key Value: Systematic workflow with quality assurance
|
|
523
|
+
|
|
524
|
+
**Feature Specifications:**
|
|
525
|
+
- User authentication with JWT tokens
|
|
526
|
+
- Task creation, assignment, and tracking
|
|
527
|
+
- Agent-assisted development workflows
|
|
528
|
+
- Real-time collaboration features
|
|
529
|
+
- Comprehensive reporting and analytics
|
|
530
|
+
|
|
531
|
+
**Technical Architecture:**
|
|
532
|
+
- Frontend: React/TypeScript with Redux Toolkit
|
|
533
|
+
- Backend: Node.js/Express with TypeScript
|
|
534
|
+
- Database: PostgreSQL with Prisma ORM
|
|
535
|
+
- Authentication: JWT with refresh token rotation
|
|
536
|
+
- Testing: Jest, React Testing Library, Playwright
|
|
537
|
+
|
|
538
|
+
**Quality Standards:**
|
|
539
|
+
- 80%+ test coverage achieved (87% actual)
|
|
540
|
+
- Zero critical security vulnerabilities
|
|
541
|
+
- Sub-200ms API response times
|
|
542
|
+
- WCAG 2.1 AA accessibility compliance
|
|
543
|
+
|
|
544
|
+
**Success Criteria:**
|
|
545
|
+
✅ All planned features implemented
|
|
546
|
+
✅ Quality gates passed
|
|
547
|
+
✅ Security validation complete
|
|
548
|
+
✅ Performance benchmarks met
|
|
549
|
+
✅ Documentation comprehensive
|
|
550
|
+
✅ Hackathon submission ready
|
|
551
|
+
```
|
|
552
|
+
|
|
553
|
+
### Hackathon Submission Success
|
|
554
|
+
|
|
555
|
+
**Evaluation Results:**
|
|
556
|
+
- ✅ Score: 87/100 (Excellent)
|
|
557
|
+
- ✅ All documentation complete and high-quality
|
|
558
|
+
- ✅ Innovative use of Kiro CLI demonstrated
|
|
559
|
+
- ✅ Strong competitive position for judging
|
|
560
|
+
|
|
561
|
+
**Key Success Factors:**
|
|
562
|
+
- ✅ Systematic development approach with agent coordination
|
|
563
|
+
- ✅ Comprehensive quality assurance throughout development
|
|
564
|
+
- ✅ Excellent documentation and process transparency
|
|
565
|
+
- ✅ Creative workflow innovation that showcases Kiro CLI capabilities
|
|
566
|
+
|
|
567
|
+
---
|
|
568
|
+
|
|
569
|
+
## Key Takeaways from Examples
|
|
570
|
+
|
|
571
|
+
### 🎯 Success Patterns
|
|
572
|
+
|
|
573
|
+
**1. Always Start with Context**
|
|
574
|
+
- Use `@prime` to establish comprehensive project understanding
|
|
575
|
+
- Ensures all agents work from shared knowledge base
|
|
576
|
+
|
|
577
|
+
**2. Plan Before Implementation**
|
|
578
|
+
- `@plan-feature` prevents scope creep and coordination issues
|
|
579
|
+
- Detailed planning reduces implementation time and rework
|
|
580
|
+
|
|
581
|
+
**3. Maintain Quality Gates**
|
|
582
|
+
- `@code-review` catches issues before they reach production
|
|
583
|
+
- Systematic quality assurance prevents technical debt
|
|
584
|
+
|
|
585
|
+
**4. Document Everything**
|
|
586
|
+
- `@execution-report` captures implementation insights
|
|
587
|
+
- `@system-review` drives continuous process improvement
|
|
588
|
+
|
|
589
|
+
**5. Learn and Improve**
|
|
590
|
+
- Regular process analysis identifies optimization opportunities
|
|
591
|
+
- Systematic approach to workflow refinement
|
|
592
|
+
|
|
593
|
+
### 🚀 Efficiency Multipliers
|
|
594
|
+
|
|
595
|
+
**Agent Coordination:**
|
|
596
|
+
- Project Manager as central coordinator eliminates conflicts
|
|
597
|
+
- Clear handoff protocols ensure smooth collaboration
|
|
598
|
+
|
|
599
|
+
**Quality Automation:**
|
|
600
|
+
- Integrated quality gates prevent issues from propagating
|
|
601
|
+
- Systematic testing and validation reduce manual effort
|
|
602
|
+
|
|
603
|
+
**Knowledge Capture:**
|
|
604
|
+
- Comprehensive documentation enables knowledge reuse
|
|
605
|
+
- Process insights drive continuous improvement
|
|
606
|
+
|
|
607
|
+
**Workflow Standardization:**
|
|
608
|
+
- Consistent prompt usage creates predictable outcomes
|
|
609
|
+
- Standardized processes reduce cognitive load and errors
|
|
610
|
+
|
|
611
|
+
These examples demonstrate how the integrated agent-prompt system creates a systematic, quality-driven development approach that scales from individual features to complete applications.
|