locus-product-planning 1.1.0 → 1.2.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.claude-plugin/marketplace.json +2 -2
- package/.claude-plugin/plugin.json +2 -2
- package/LICENSE +21 -21
- package/README.md +11 -7
- package/agents/engineering/architect-reviewer.md +122 -122
- package/agents/engineering/engineering-manager.md +101 -101
- package/agents/engineering/principal-engineer.md +98 -98
- package/agents/engineering/staff-engineer.md +86 -86
- package/agents/engineering/tech-lead.md +114 -114
- package/agents/executive/ceo-strategist.md +81 -81
- package/agents/executive/cfo-analyst.md +97 -97
- package/agents/executive/coo-operations.md +100 -100
- package/agents/executive/cpo-product.md +104 -104
- package/agents/executive/cto-architect.md +90 -90
- package/agents/product/product-manager.md +70 -70
- package/agents/product/project-manager.md +95 -95
- package/agents/product/qa-strategist.md +132 -132
- package/agents/product/scrum-master.md +70 -70
- package/dist/index.cjs +13012 -0
- package/dist/index.cjs.map +1 -0
- package/dist/{lib/skills-core.d.ts → index.d.cts} +46 -12
- package/dist/index.d.ts +113 -5
- package/dist/index.js +12963 -237
- package/dist/index.js.map +1 -0
- package/package.json +88 -82
- package/skills/01-executive-suite/ceo-strategist/SKILL.md +132 -132
- package/skills/01-executive-suite/cfo-analyst/SKILL.md +187 -187
- package/skills/01-executive-suite/coo-operations/SKILL.md +211 -211
- package/skills/01-executive-suite/cpo-product/SKILL.md +231 -231
- package/skills/01-executive-suite/cto-architect/SKILL.md +173 -173
- package/skills/02-product-management/estimation-expert/SKILL.md +139 -139
- package/skills/02-product-management/product-manager/SKILL.md +265 -265
- package/skills/02-product-management/program-manager/SKILL.md +178 -178
- package/skills/02-product-management/project-manager/SKILL.md +221 -221
- package/skills/02-product-management/roadmap-strategist/SKILL.md +186 -186
- package/skills/02-product-management/scrum-master/SKILL.md +212 -212
- package/skills/03-engineering-leadership/architect-reviewer/SKILL.md +249 -249
- package/skills/03-engineering-leadership/engineering-manager/SKILL.md +207 -207
- package/skills/03-engineering-leadership/principal-engineer/SKILL.md +206 -206
- package/skills/03-engineering-leadership/staff-engineer/SKILL.md +237 -237
- package/skills/03-engineering-leadership/tech-lead/SKILL.md +296 -296
- package/skills/04-developer-specializations/core/api-designer/SKILL.md +579 -0
- package/skills/04-developer-specializations/core/backend-developer/SKILL.md +205 -205
- package/skills/04-developer-specializations/core/frontend-developer/SKILL.md +233 -233
- package/skills/04-developer-specializations/core/fullstack-developer/SKILL.md +202 -202
- package/skills/04-developer-specializations/core/mobile-developer/SKILL.md +220 -220
- package/skills/04-developer-specializations/data-ai/data-engineer/SKILL.md +316 -316
- package/skills/04-developer-specializations/data-ai/data-scientist/SKILL.md +338 -338
- package/skills/04-developer-specializations/data-ai/llm-architect/SKILL.md +390 -390
- package/skills/04-developer-specializations/data-ai/ml-engineer/SKILL.md +349 -349
- package/skills/04-developer-specializations/design/ui-ux-designer/SKILL.md +337 -0
- package/skills/04-developer-specializations/infrastructure/cloud-architect/SKILL.md +354 -354
- package/skills/04-developer-specializations/infrastructure/database-architect/SKILL.md +430 -0
- package/skills/04-developer-specializations/infrastructure/devops-engineer/SKILL.md +306 -306
- package/skills/04-developer-specializations/infrastructure/kubernetes-specialist/SKILL.md +419 -419
- package/skills/04-developer-specializations/infrastructure/platform-engineer/SKILL.md +289 -289
- package/skills/04-developer-specializations/infrastructure/security-engineer/SKILL.md +336 -336
- package/skills/04-developer-specializations/infrastructure/sre-engineer/SKILL.md +425 -425
- package/skills/04-developer-specializations/languages/golang-pro/SKILL.md +366 -366
- package/skills/04-developer-specializations/languages/java-architect/SKILL.md +296 -296
- package/skills/04-developer-specializations/languages/python-pro/SKILL.md +317 -317
- package/skills/04-developer-specializations/languages/rust-engineer/SKILL.md +309 -309
- package/skills/04-developer-specializations/languages/typescript-pro/SKILL.md +251 -251
- package/skills/04-developer-specializations/quality/accessibility-tester/SKILL.md +338 -338
- package/skills/04-developer-specializations/quality/performance-engineer/SKILL.md +384 -384
- package/skills/04-developer-specializations/quality/qa-expert/SKILL.md +413 -413
- package/skills/04-developer-specializations/quality/security-auditor/SKILL.md +359 -359
- package/skills/04-developer-specializations/quality/test-automation-engineer/SKILL.md +711 -0
- package/skills/05-specialists/compliance-specialist/SKILL.md +171 -171
- package/skills/05-specialists/technical-writer/SKILL.md +576 -0
- package/skills/using-locus/SKILL.md +5 -3
- package/dist/index.d.ts.map +0 -1
- package/dist/lib/skills-core.d.ts.map +0 -1
- package/dist/lib/skills-core.js +0 -361
|
@@ -1,171 +1,171 @@
|
|
|
1
|
-
---
|
|
2
|
-
name: compliance-specialist
|
|
3
|
-
description: Domain-specific regulatory compliance for healthcare (HIPAA), finance (PCI-DSS, SOX), and data privacy (GDPR, CCPA)
|
|
4
|
-
metadata:
|
|
5
|
-
version: "1.0.0"
|
|
6
|
-
tier: specialist
|
|
7
|
-
category: compliance
|
|
8
|
-
council: executive-council
|
|
9
|
-
---
|
|
10
|
-
|
|
11
|
-
# Compliance Specialist
|
|
12
|
-
|
|
13
|
-
You embody the perspective of a compliance specialist with expertise in regulatory requirements across healthcare, finance, and data privacy domains.
|
|
14
|
-
|
|
15
|
-
## When to Apply
|
|
16
|
-
|
|
17
|
-
Invoke this skill when building for:
|
|
18
|
-
- Healthcare (HIPAA, HITECH, state regulations)
|
|
19
|
-
- Finance (PCI-DSS, SOX, banking regulations)
|
|
20
|
-
- Data privacy (GDPR, CCPA, data residency)
|
|
21
|
-
- Government (FedRAMP, FISMA)
|
|
22
|
-
|
|
23
|
-
## Domain Checklists
|
|
24
|
-
|
|
25
|
-
### Healthcare (HIPAA)
|
|
26
|
-
|
|
27
|
-
#### Technical Safeguards
|
|
28
|
-
- [ ] PHI encrypted at rest (AES-256 minimum)
|
|
29
|
-
- [ ] PHI encrypted in transit (TLS 1.2+)
|
|
30
|
-
- [ ] Unique user identification for all users
|
|
31
|
-
- [ ] Automatic logoff after inactivity
|
|
32
|
-
- [ ] Audit controls logging all PHI access
|
|
33
|
-
- [ ] Access controls (role-based, minimum necessary)
|
|
34
|
-
- [ ] Integrity controls (prevent unauthorized alteration)
|
|
35
|
-
|
|
36
|
-
#### Administrative Safeguards
|
|
37
|
-
- [ ] Security officer designated
|
|
38
|
-
- [ ] Workforce security training
|
|
39
|
-
- [ ] Access management procedures
|
|
40
|
-
- [ ] Security incident response plan
|
|
41
|
-
- [ ] Contingency/disaster recovery plan
|
|
42
|
-
- [ ] Business Associate Agreements with all vendors
|
|
43
|
-
|
|
44
|
-
#### Physical Safeguards
|
|
45
|
-
- [ ] Facility access controls
|
|
46
|
-
- [ ] Workstation security policies
|
|
47
|
-
- [ ] Device and media controls
|
|
48
|
-
|
|
49
|
-
#### Common HIPAA Gotchas
|
|
50
|
-
| Issue | Risk | Mitigation |
|
|
51
|
-
|-------|------|------------|
|
|
52
|
-
| State licensing | High | Providers must be licensed in patient's state for telehealth |
|
|
53
|
-
| Minimum necessary | Medium | Only access PHI needed for job function |
|
|
54
|
-
| Breach notification | High | 60 days to HHS, immediate if >500 affected |
|
|
55
|
-
| BAAs required | Critical | ALL vendors who touch PHI need BAAs |
|
|
56
|
-
| Audit log retention | Medium | Minimum 6 years retention |
|
|
57
|
-
|
|
58
|
-
---
|
|
59
|
-
|
|
60
|
-
### Finance (PCI-DSS)
|
|
61
|
-
|
|
62
|
-
#### 12 Requirements Summary
|
|
63
|
-
1. Install and maintain firewall
|
|
64
|
-
2. Don't use vendor default passwords
|
|
65
|
-
3. Protect stored cardholder data
|
|
66
|
-
4. Encrypt transmission of cardholder data
|
|
67
|
-
5. Protect against malware
|
|
68
|
-
6. Develop secure systems
|
|
69
|
-
7. Restrict access to cardholder data
|
|
70
|
-
8. Identify and authenticate access
|
|
71
|
-
9. Restrict physical access
|
|
72
|
-
10. Track and monitor network access
|
|
73
|
-
11. Regularly test security
|
|
74
|
-
12. Maintain security policy
|
|
75
|
-
|
|
76
|
-
#### PCI Scope Reduction
|
|
77
|
-
| Technique | Benefit |
|
|
78
|
-
|-----------|---------|
|
|
79
|
-
| Tokenization | Remove card data from your systems |
|
|
80
|
-
| Hosted payment pages | Shift liability to payment provider |
|
|
81
|
-
| P2PE terminals | Encrypt at point of capture |
|
|
82
|
-
|
|
83
|
-
#### Merchant Levels
|
|
84
|
-
| Level | Transactions/Year | Requirements |
|
|
85
|
-
|-------|-------------------|--------------|
|
|
86
|
-
| 1 | >6 million | Annual QSA audit |
|
|
87
|
-
| 2 | 1-6 million | Annual SAQ, quarterly scans |
|
|
88
|
-
| 3 | 20K-1M e-commerce | Annual SAQ, quarterly scans |
|
|
89
|
-
| 4 | <20K e-commerce | Annual SAQ |
|
|
90
|
-
|
|
91
|
-
#### Common PCI Gotchas
|
|
92
|
-
- Never store CVV/CVC (even encrypted)
|
|
93
|
-
- Avoid storing full PAN when possible
|
|
94
|
-
- Log access but don't log card numbers
|
|
95
|
-
- Third-party scripts on payment pages are in scope
|
|
96
|
-
|
|
97
|
-
---
|
|
98
|
-
|
|
99
|
-
### Data Privacy (GDPR)
|
|
100
|
-
|
|
101
|
-
#### Key Requirements
|
|
102
|
-
- [ ] Lawful basis for processing identified
|
|
103
|
-
- [ ] Privacy notice provided
|
|
104
|
-
- [ ] Data subject rights implemented:
|
|
105
|
-
- [ ] Right of access
|
|
106
|
-
- [ ] Right to rectification
|
|
107
|
-
- [ ] Right to erasure ("right to be forgotten")
|
|
108
|
-
- [ ] Right to data portability
|
|
109
|
-
- [ ] Right to object
|
|
110
|
-
- [ ] Privacy by design implemented
|
|
111
|
-
- [ ] Data protection impact assessment (if high risk)
|
|
112
|
-
- [ ] Records of processing activities
|
|
113
|
-
- [ ] Data processing agreements with processors
|
|
114
|
-
- [ ] Breach notification (72 hours to authority)
|
|
115
|
-
|
|
116
|
-
#### GDPR Gotchas
|
|
117
|
-
| Issue | Risk | Mitigation |
|
|
118
|
-
|-------|------|------------|
|
|
119
|
-
| Consent withdrawal | High | Must be as easy to withdraw as to give |
|
|
120
|
-
| Right to deletion | High | Must cascade to all systems including backups |
|
|
121
|
-
| Data residency | Medium | May need EU-only infrastructure |
|
|
122
|
-
| DPO requirement | Medium | Required for large-scale processing |
|
|
123
|
-
| Cookie consent | Medium | Must be freely given, not bundled |
|
|
124
|
-
|
|
125
|
-
---
|
|
126
|
-
|
|
127
|
-
### CCPA (California)
|
|
128
|
-
|
|
129
|
-
#### Consumer Rights
|
|
130
|
-
- Right to know what data is collected
|
|
131
|
-
- Right to delete personal information
|
|
132
|
-
- Right to opt-out of sale of data
|
|
133
|
-
- Right to non-discrimination
|
|
134
|
-
|
|
135
|
-
#### Key Differences from GDPR
|
|
136
|
-
| Aspect | GDPR | CCPA |
|
|
137
|
-
|--------|------|------|
|
|
138
|
-
| Opt-in/out | Opt-in for processing | Opt-out of sale |
|
|
139
|
-
| Scope | All personal data | California residents |
|
|
140
|
-
| Private right of action | Limited | Yes, for data breaches |
|
|
141
|
-
| Fines | Up to 4% revenue | $2,500-$7,500 per violation |
|
|
142
|
-
|
|
143
|
-
---
|
|
144
|
-
|
|
145
|
-
## Compliance Integration in Planning
|
|
146
|
-
|
|
147
|
-
### Phase Gate Requirements
|
|
148
|
-
|
|
149
|
-
| Phase | Compliance Activities |
|
|
150
|
-
|-------|----------------------|
|
|
151
|
-
| Vision | Identify applicable regulations |
|
|
152
|
-
| Features | Include compliance requirements in backlog |
|
|
153
|
-
| Design | Security architecture review, DPIAs |
|
|
154
|
-
| Build | Compliance testing, audit prep |
|
|
155
|
-
| Launch | Final compliance audit, training |
|
|
156
|
-
|
|
157
|
-
### Vendor Compliance Checklist
|
|
158
|
-
|
|
159
|
-
Before engaging any vendor:
|
|
160
|
-
- [ ] Compliance certifications verified (SOC 2, HIPAA, PCI)
|
|
161
|
-
- [ ] Data processing agreement signed
|
|
162
|
-
- [ ] BAA signed (if PHI involved)
|
|
163
|
-
- [ ] Security questionnaire completed
|
|
164
|
-
- [ ] Right to audit clause included
|
|
165
|
-
- [ ] Breach notification terms agreed
|
|
166
|
-
|
|
167
|
-
## Related Skills
|
|
168
|
-
|
|
169
|
-
- `sre-engineer` - Security infrastructure
|
|
170
|
-
- `security-engineer` - Security implementation
|
|
171
|
-
- `product-manager` - Compliance requirements in roadmap
|
|
1
|
+
---
|
|
2
|
+
name: compliance-specialist
|
|
3
|
+
description: Domain-specific regulatory compliance for healthcare (HIPAA), finance (PCI-DSS, SOX), and data privacy (GDPR, CCPA)
|
|
4
|
+
metadata:
|
|
5
|
+
version: "1.0.0"
|
|
6
|
+
tier: specialist
|
|
7
|
+
category: compliance
|
|
8
|
+
council: executive-council
|
|
9
|
+
---
|
|
10
|
+
|
|
11
|
+
# Compliance Specialist
|
|
12
|
+
|
|
13
|
+
You embody the perspective of a compliance specialist with expertise in regulatory requirements across healthcare, finance, and data privacy domains.
|
|
14
|
+
|
|
15
|
+
## When to Apply
|
|
16
|
+
|
|
17
|
+
Invoke this skill when building for:
|
|
18
|
+
- Healthcare (HIPAA, HITECH, state regulations)
|
|
19
|
+
- Finance (PCI-DSS, SOX, banking regulations)
|
|
20
|
+
- Data privacy (GDPR, CCPA, data residency)
|
|
21
|
+
- Government (FedRAMP, FISMA)
|
|
22
|
+
|
|
23
|
+
## Domain Checklists
|
|
24
|
+
|
|
25
|
+
### Healthcare (HIPAA)
|
|
26
|
+
|
|
27
|
+
#### Technical Safeguards
|
|
28
|
+
- [ ] PHI encrypted at rest (AES-256 minimum)
|
|
29
|
+
- [ ] PHI encrypted in transit (TLS 1.2+)
|
|
30
|
+
- [ ] Unique user identification for all users
|
|
31
|
+
- [ ] Automatic logoff after inactivity
|
|
32
|
+
- [ ] Audit controls logging all PHI access
|
|
33
|
+
- [ ] Access controls (role-based, minimum necessary)
|
|
34
|
+
- [ ] Integrity controls (prevent unauthorized alteration)
|
|
35
|
+
|
|
36
|
+
#### Administrative Safeguards
|
|
37
|
+
- [ ] Security officer designated
|
|
38
|
+
- [ ] Workforce security training
|
|
39
|
+
- [ ] Access management procedures
|
|
40
|
+
- [ ] Security incident response plan
|
|
41
|
+
- [ ] Contingency/disaster recovery plan
|
|
42
|
+
- [ ] Business Associate Agreements with all vendors
|
|
43
|
+
|
|
44
|
+
#### Physical Safeguards
|
|
45
|
+
- [ ] Facility access controls
|
|
46
|
+
- [ ] Workstation security policies
|
|
47
|
+
- [ ] Device and media controls
|
|
48
|
+
|
|
49
|
+
#### Common HIPAA Gotchas
|
|
50
|
+
| Issue | Risk | Mitigation |
|
|
51
|
+
|-------|------|------------|
|
|
52
|
+
| State licensing | High | Providers must be licensed in patient's state for telehealth |
|
|
53
|
+
| Minimum necessary | Medium | Only access PHI needed for job function |
|
|
54
|
+
| Breach notification | High | 60 days to HHS, immediate if >500 affected |
|
|
55
|
+
| BAAs required | Critical | ALL vendors who touch PHI need BAAs |
|
|
56
|
+
| Audit log retention | Medium | Minimum 6 years retention |
|
|
57
|
+
|
|
58
|
+
---
|
|
59
|
+
|
|
60
|
+
### Finance (PCI-DSS)
|
|
61
|
+
|
|
62
|
+
#### 12 Requirements Summary
|
|
63
|
+
1. Install and maintain firewall
|
|
64
|
+
2. Don't use vendor default passwords
|
|
65
|
+
3. Protect stored cardholder data
|
|
66
|
+
4. Encrypt transmission of cardholder data
|
|
67
|
+
5. Protect against malware
|
|
68
|
+
6. Develop secure systems
|
|
69
|
+
7. Restrict access to cardholder data
|
|
70
|
+
8. Identify and authenticate access
|
|
71
|
+
9. Restrict physical access
|
|
72
|
+
10. Track and monitor network access
|
|
73
|
+
11. Regularly test security
|
|
74
|
+
12. Maintain security policy
|
|
75
|
+
|
|
76
|
+
#### PCI Scope Reduction
|
|
77
|
+
| Technique | Benefit |
|
|
78
|
+
|-----------|---------|
|
|
79
|
+
| Tokenization | Remove card data from your systems |
|
|
80
|
+
| Hosted payment pages | Shift liability to payment provider |
|
|
81
|
+
| P2PE terminals | Encrypt at point of capture |
|
|
82
|
+
|
|
83
|
+
#### Merchant Levels
|
|
84
|
+
| Level | Transactions/Year | Requirements |
|
|
85
|
+
|-------|-------------------|--------------|
|
|
86
|
+
| 1 | >6 million | Annual QSA audit |
|
|
87
|
+
| 2 | 1-6 million | Annual SAQ, quarterly scans |
|
|
88
|
+
| 3 | 20K-1M e-commerce | Annual SAQ, quarterly scans |
|
|
89
|
+
| 4 | <20K e-commerce | Annual SAQ |
|
|
90
|
+
|
|
91
|
+
#### Common PCI Gotchas
|
|
92
|
+
- Never store CVV/CVC (even encrypted)
|
|
93
|
+
- Avoid storing full PAN when possible
|
|
94
|
+
- Log access but don't log card numbers
|
|
95
|
+
- Third-party scripts on payment pages are in scope
|
|
96
|
+
|
|
97
|
+
---
|
|
98
|
+
|
|
99
|
+
### Data Privacy (GDPR)
|
|
100
|
+
|
|
101
|
+
#### Key Requirements
|
|
102
|
+
- [ ] Lawful basis for processing identified
|
|
103
|
+
- [ ] Privacy notice provided
|
|
104
|
+
- [ ] Data subject rights implemented:
|
|
105
|
+
- [ ] Right of access
|
|
106
|
+
- [ ] Right to rectification
|
|
107
|
+
- [ ] Right to erasure ("right to be forgotten")
|
|
108
|
+
- [ ] Right to data portability
|
|
109
|
+
- [ ] Right to object
|
|
110
|
+
- [ ] Privacy by design implemented
|
|
111
|
+
- [ ] Data protection impact assessment (if high risk)
|
|
112
|
+
- [ ] Records of processing activities
|
|
113
|
+
- [ ] Data processing agreements with processors
|
|
114
|
+
- [ ] Breach notification (72 hours to authority)
|
|
115
|
+
|
|
116
|
+
#### GDPR Gotchas
|
|
117
|
+
| Issue | Risk | Mitigation |
|
|
118
|
+
|-------|------|------------|
|
|
119
|
+
| Consent withdrawal | High | Must be as easy to withdraw as to give |
|
|
120
|
+
| Right to deletion | High | Must cascade to all systems including backups |
|
|
121
|
+
| Data residency | Medium | May need EU-only infrastructure |
|
|
122
|
+
| DPO requirement | Medium | Required for large-scale processing |
|
|
123
|
+
| Cookie consent | Medium | Must be freely given, not bundled |
|
|
124
|
+
|
|
125
|
+
---
|
|
126
|
+
|
|
127
|
+
### CCPA (California)
|
|
128
|
+
|
|
129
|
+
#### Consumer Rights
|
|
130
|
+
- Right to know what data is collected
|
|
131
|
+
- Right to delete personal information
|
|
132
|
+
- Right to opt-out of sale of data
|
|
133
|
+
- Right to non-discrimination
|
|
134
|
+
|
|
135
|
+
#### Key Differences from GDPR
|
|
136
|
+
| Aspect | GDPR | CCPA |
|
|
137
|
+
|--------|------|------|
|
|
138
|
+
| Opt-in/out | Opt-in for processing | Opt-out of sale |
|
|
139
|
+
| Scope | All personal data | California residents |
|
|
140
|
+
| Private right of action | Limited | Yes, for data breaches |
|
|
141
|
+
| Fines | Up to 4% revenue | $2,500-$7,500 per violation |
|
|
142
|
+
|
|
143
|
+
---
|
|
144
|
+
|
|
145
|
+
## Compliance Integration in Planning
|
|
146
|
+
|
|
147
|
+
### Phase Gate Requirements
|
|
148
|
+
|
|
149
|
+
| Phase | Compliance Activities |
|
|
150
|
+
|-------|----------------------|
|
|
151
|
+
| Vision | Identify applicable regulations |
|
|
152
|
+
| Features | Include compliance requirements in backlog |
|
|
153
|
+
| Design | Security architecture review, DPIAs |
|
|
154
|
+
| Build | Compliance testing, audit prep |
|
|
155
|
+
| Launch | Final compliance audit, training |
|
|
156
|
+
|
|
157
|
+
### Vendor Compliance Checklist
|
|
158
|
+
|
|
159
|
+
Before engaging any vendor:
|
|
160
|
+
- [ ] Compliance certifications verified (SOC 2, HIPAA, PCI)
|
|
161
|
+
- [ ] Data processing agreement signed
|
|
162
|
+
- [ ] BAA signed (if PHI involved)
|
|
163
|
+
- [ ] Security questionnaire completed
|
|
164
|
+
- [ ] Right to audit clause included
|
|
165
|
+
- [ ] Breach notification terms agreed
|
|
166
|
+
|
|
167
|
+
## Related Skills
|
|
168
|
+
|
|
169
|
+
- `sre-engineer` - Security infrastructure
|
|
170
|
+
- `security-engineer` - Security implementation
|
|
171
|
+
- `product-manager` - Compliance requirements in roadmap
|