miclaw-app 0.2.0 → 0.3.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.next/standalone/.next/BUILD_ID +1 -1
- package/.next/standalone/.next/build-manifest.json +3 -3
- package/.next/standalone/.next/server/app/_global-error.html +1 -1
- package/.next/standalone/.next/server/app/_global-error.rsc +1 -1
- package/.next/standalone/.next/server/app/_global-error.segments/__PAGE__.segment.rsc +1 -1
- package/.next/standalone/.next/server/app/_global-error.segments/_full.segment.rsc +1 -1
- package/.next/standalone/.next/server/app/_global-error.segments/_head.segment.rsc +1 -1
- package/.next/standalone/.next/server/app/_global-error.segments/_index.segment.rsc +1 -1
- package/.next/standalone/.next/server/app/_global-error.segments/_tree.segment.rsc +1 -1
- package/.next/standalone/.next/server/app/_not-found/page_client-reference-manifest.js +1 -1
- package/.next/standalone/.next/server/app/_not-found.html +2 -2
- package/.next/standalone/.next/server/app/_not-found.rsc +2 -2
- package/.next/standalone/.next/server/app/_not-found.segments/_full.segment.rsc +2 -2
- package/.next/standalone/.next/server/app/_not-found.segments/_head.segment.rsc +1 -1
- package/.next/standalone/.next/server/app/_not-found.segments/_index.segment.rsc +2 -2
- package/.next/standalone/.next/server/app/_not-found.segments/_not-found/__PAGE__.segment.rsc +1 -1
- package/.next/standalone/.next/server/app/_not-found.segments/_not-found.segment.rsc +1 -1
- package/.next/standalone/.next/server/app/_not-found.segments/_tree.segment.rsc +2 -2
- package/.next/standalone/.next/server/app/agents/page.js +2 -2
- package/.next/standalone/.next/server/app/agents/page.js.nft.json +1 -1
- package/.next/standalone/.next/server/app/agents/page_client-reference-manifest.js +1 -1
- package/.next/standalone/.next/server/app/agents.html +9 -9
- package/.next/standalone/.next/server/app/agents.rsc +16 -15
- package/.next/standalone/.next/server/app/agents.segments/_full.segment.rsc +16 -15
- package/.next/standalone/.next/server/app/agents.segments/_head.segment.rsc +1 -1
- package/.next/standalone/.next/server/app/agents.segments/_index.segment.rsc +2 -2
- package/.next/standalone/.next/server/app/agents.segments/_tree.segment.rsc +2 -2
- package/.next/standalone/.next/server/app/agents.segments/agents/__PAGE__.segment.rsc +18 -17
- package/.next/standalone/.next/server/app/agents.segments/agents.segment.rsc +1 -1
- package/.next/standalone/.next/server/app/commands/page.js +1 -1
- package/.next/standalone/.next/server/app/commands/page.js.nft.json +1 -1
- package/.next/standalone/.next/server/app/commands/page_client-reference-manifest.js +1 -1
- package/.next/standalone/.next/server/app/commands.html +14 -14
- package/.next/standalone/.next/server/app/commands.rsc +14 -14
- package/.next/standalone/.next/server/app/commands.segments/_full.segment.rsc +14 -14
- package/.next/standalone/.next/server/app/commands.segments/_head.segment.rsc +1 -1
- package/.next/standalone/.next/server/app/commands.segments/_index.segment.rsc +2 -2
- package/.next/standalone/.next/server/app/commands.segments/_tree.segment.rsc +2 -2
- package/.next/standalone/.next/server/app/commands.segments/commands/__PAGE__.segment.rsc +12 -12
- package/.next/standalone/.next/server/app/commands.segments/commands.segment.rsc +1 -1
- package/.next/standalone/.next/server/app/hooks/page.js +1 -1
- package/.next/standalone/.next/server/app/hooks/page.js.nft.json +1 -1
- package/.next/standalone/.next/server/app/hooks/page_client-reference-manifest.js +1 -1
- package/.next/standalone/.next/server/app/hooks.html +2 -2
- package/.next/standalone/.next/server/app/hooks.rsc +3 -3
- package/.next/standalone/.next/server/app/hooks.segments/_full.segment.rsc +3 -3
- package/.next/standalone/.next/server/app/hooks.segments/_head.segment.rsc +1 -1
- package/.next/standalone/.next/server/app/hooks.segments/_index.segment.rsc +2 -2
- package/.next/standalone/.next/server/app/hooks.segments/_tree.segment.rsc +2 -2
- package/.next/standalone/.next/server/app/hooks.segments/hooks/__PAGE__.segment.rsc +1 -1
- package/.next/standalone/.next/server/app/hooks.segments/hooks.segment.rsc +1 -1
- package/.next/standalone/.next/server/app/index.html +2 -2
- package/.next/standalone/.next/server/app/index.rsc +4 -4
- package/.next/standalone/.next/server/app/index.segments/__PAGE__.segment.rsc +3 -3
- package/.next/standalone/.next/server/app/index.segments/_full.segment.rsc +4 -4
- package/.next/standalone/.next/server/app/index.segments/_head.segment.rsc +1 -1
- package/.next/standalone/.next/server/app/index.segments/_index.segment.rsc +2 -2
- package/.next/standalone/.next/server/app/index.segments/_tree.segment.rsc +2 -2
- package/.next/standalone/.next/server/app/mcp/page.js +1 -1
- package/.next/standalone/.next/server/app/mcp/page.js.nft.json +1 -1
- package/.next/standalone/.next/server/app/mcp/page_client-reference-manifest.js +1 -1
- package/.next/standalone/.next/server/app/mcp.html +2 -2
- package/.next/standalone/.next/server/app/mcp.rsc +5 -6
- package/.next/standalone/.next/server/app/mcp.segments/_full.segment.rsc +5 -6
- package/.next/standalone/.next/server/app/mcp.segments/_head.segment.rsc +1 -1
- package/.next/standalone/.next/server/app/mcp.segments/_index.segment.rsc +2 -2
- package/.next/standalone/.next/server/app/mcp.segments/_tree.segment.rsc +2 -2
- package/.next/standalone/.next/server/app/mcp.segments/mcp/__PAGE__.segment.rsc +7 -8
- package/.next/standalone/.next/server/app/mcp.segments/mcp.segment.rsc +1 -1
- package/.next/standalone/.next/server/app/page_client-reference-manifest.js +1 -1
- package/.next/standalone/.next/server/app/projects/[slug]/page.js +1 -1
- package/.next/standalone/.next/server/app/projects/[slug]/page.js.nft.json +1 -1
- package/.next/standalone/.next/server/app/projects/[slug]/page_client-reference-manifest.js +1 -1
- package/.next/standalone/.next/server/app/rules/page.js +1 -1
- package/.next/standalone/.next/server/app/rules/page.js.nft.json +1 -1
- package/.next/standalone/.next/server/app/rules/page_client-reference-manifest.js +1 -1
- package/.next/standalone/.next/server/app/rules.html +8 -8
- package/.next/standalone/.next/server/app/rules.rsc +8 -8
- package/.next/standalone/.next/server/app/rules.segments/_full.segment.rsc +8 -8
- package/.next/standalone/.next/server/app/rules.segments/_head.segment.rsc +1 -1
- package/.next/standalone/.next/server/app/rules.segments/_index.segment.rsc +2 -2
- package/.next/standalone/.next/server/app/rules.segments/_tree.segment.rsc +2 -2
- package/.next/standalone/.next/server/app/rules.segments/rules/__PAGE__.segment.rsc +6 -6
- package/.next/standalone/.next/server/app/rules.segments/rules.segment.rsc +1 -1
- package/.next/standalone/.next/server/app/settings/page.js +1 -1
- package/.next/standalone/.next/server/app/settings/page.js.nft.json +1 -1
- package/.next/standalone/.next/server/app/settings/page_client-reference-manifest.js +1 -1
- package/.next/standalone/.next/server/app/settings.html +3 -3
- package/.next/standalone/.next/server/app/settings.rsc +217 -220
- package/.next/standalone/.next/server/app/settings.segments/_full.segment.rsc +217 -220
- package/.next/standalone/.next/server/app/settings.segments/_head.segment.rsc +1 -1
- package/.next/standalone/.next/server/app/settings.segments/_index.segment.rsc +2 -2
- package/.next/standalone/.next/server/app/settings.segments/_tree.segment.rsc +2 -2
- package/.next/standalone/.next/server/app/settings.segments/settings/__PAGE__.segment.rsc +197 -201
- package/.next/standalone/.next/server/app/settings.segments/settings.segment.rsc +1 -1
- package/.next/standalone/.next/server/app/skills/page.js +2 -2
- package/.next/standalone/.next/server/app/skills/page.js.nft.json +1 -1
- package/.next/standalone/.next/server/app/skills/page_client-reference-manifest.js +1 -1
- package/.next/standalone/.next/server/app/skills.html +9 -9
- package/.next/standalone/.next/server/app/skills.rsc +9 -9
- package/.next/standalone/.next/server/app/skills.segments/_full.segment.rsc +9 -9
- package/.next/standalone/.next/server/app/skills.segments/_head.segment.rsc +1 -1
- package/.next/standalone/.next/server/app/skills.segments/_index.segment.rsc +2 -2
- package/.next/standalone/.next/server/app/skills.segments/_tree.segment.rsc +2 -2
- package/.next/standalone/.next/server/app/skills.segments/skills/__PAGE__.segment.rsc +7 -7
- package/.next/standalone/.next/server/app/skills.segments/skills.segment.rsc +1 -1
- package/.next/standalone/.next/server/chunks/ssr/[root-of-the-server]__00k9.xh._.js +3 -0
- package/.next/standalone/.next/server/chunks/ssr/[root-of-the-server]__00s.xuw._.js +3 -0
- package/.next/standalone/.next/server/chunks/ssr/[root-of-the-server]__047d75d._.js +3 -0
- package/.next/standalone/.next/server/chunks/ssr/[root-of-the-server]__06j~1~c._.js +3 -0
- package/.next/standalone/.next/server/chunks/ssr/[root-of-the-server]__0cs_zi~._.js +3 -0
- package/.next/standalone/.next/server/chunks/ssr/[root-of-the-server]__0hjeiup._.js +3 -0
- package/.next/standalone/.next/server/chunks/ssr/[root-of-the-server]__0nftpag._.js +3 -0
- package/.next/standalone/.next/server/chunks/ssr/[root-of-the-server]__0uylvf-._.js +3 -0
- package/.next/standalone/.next/server/chunks/ssr/_09kkdgy._.js +1 -1
- package/.next/standalone/.next/server/chunks/ssr/src_components_OverviewClient_tsx_02hf4_.._.js +2 -4
- package/.next/standalone/.next/server/middleware-build-manifest.js +3 -3
- package/.next/standalone/.next/server/pages/404.html +2 -2
- package/.next/standalone/.next/server/pages/500.html +1 -1
- package/.next/standalone/package.json +1 -1
- package/.next/static/chunks/{0hbcy8fff~.ks.js → 03100ti-sepf~.js} +9 -11
- package/.next/static/chunks/0ta_ewsoz0zw3.css +4 -0
- package/README.md +1 -1
- package/package.json +1 -1
- package/.next/standalone/.next/server/chunks/ssr/[root-of-the-server]__0-h~dmy._.js +0 -3
- package/.next/standalone/.next/server/chunks/ssr/[root-of-the-server]__03-xb~6._.js +0 -3
- package/.next/standalone/.next/server/chunks/ssr/[root-of-the-server]__05bypkr._.js +0 -3
- package/.next/standalone/.next/server/chunks/ssr/[root-of-the-server]__0689aen._.js +0 -3
- package/.next/standalone/.next/server/chunks/ssr/[root-of-the-server]__09jukbl._.js +0 -3
- package/.next/standalone/.next/server/chunks/ssr/[root-of-the-server]__0bm8p5g._.js +0 -3
- package/.next/standalone/.next/server/chunks/ssr/[root-of-the-server]__0j~ozdd._.js +0 -3
- package/.next/standalone/.next/server/chunks/ssr/[root-of-the-server]__0m45oxh._.js +0 -3
- package/.next/static/chunks/0xlrze18so95w.css +0 -4
- /package/.next/static/{vFFhR9bZqGO0pHP7N7NNG → _j7rilZpHkhwJvNlkQL3G}/_buildManifest.js +0 -0
- /package/.next/static/{vFFhR9bZqGO0pHP7N7NNG → _j7rilZpHkhwJvNlkQL3G}/_clientMiddlewareManifest.js +0 -0
- /package/.next/static/{vFFhR9bZqGO0pHP7N7NNG → _j7rilZpHkhwJvNlkQL3G}/_ssgManifest.js +0 -0
|
@@ -1,4 +1,4 @@
|
|
|
1
|
-
<!DOCTYPE html><html lang="en" class="inter_fe8b9d92-module__LINzvG__variable geist_mono_8d43a2aa-module__8Li5zG__variable fira_code_d18ac710-module__OladcG__variable"><head><meta charSet="utf-8"/><meta name="viewport" content="width=device-width, initial-scale=1"/><link rel="preload" href="/_next/static/media/166ab60e98aadb0a-s.p.0mka4ru4_bj1d.woff2" as="font" crossorigin="" type="font/woff2"/><link rel="preload" href="/_next/static/media/797e433ab948586e-s.p.0.q-h669a_dqa.woff2" as="font" crossorigin="" type="font/woff2"/><link rel="preload" href="/_next/static/media/83afe278b6a6bb3c-s.p.0q-301v4kxxnr.woff2" as="font" crossorigin="" type="font/woff2"/><link rel="stylesheet" href="/_next/static/chunks/
|
|
1
|
+
<!DOCTYPE html><html lang="en" class="inter_fe8b9d92-module__LINzvG__variable geist_mono_8d43a2aa-module__8Li5zG__variable fira_code_d18ac710-module__OladcG__variable"><head><meta charSet="utf-8"/><meta name="viewport" content="width=device-width, initial-scale=1"/><link rel="preload" href="/_next/static/media/166ab60e98aadb0a-s.p.0mka4ru4_bj1d.woff2" as="font" crossorigin="" type="font/woff2"/><link rel="preload" href="/_next/static/media/797e433ab948586e-s.p.0.q-h669a_dqa.woff2" as="font" crossorigin="" type="font/woff2"/><link rel="preload" href="/_next/static/media/83afe278b6a6bb3c-s.p.0q-301v4kxxnr.woff2" as="font" crossorigin="" type="font/woff2"/><link rel="stylesheet" href="/_next/static/chunks/0ta_ewsoz0zw3.css" data-precedence="next"/><link rel="preload" as="script" fetchPriority="low" href="/_next/static/chunks/0bzupvr5gt3k9.js"/><script src="/_next/static/chunks/0y3~cortx~or~.js" async=""></script><script src="/_next/static/chunks/0bogtdbh.dcu1.js" async=""></script><script src="/_next/static/chunks/turbopack-06dy8k5p5cegf.js" async=""></script><script src="/_next/static/chunks/0mmpyn9fv2fjf.js" async=""></script><script src="/_next/static/chunks/0d3shmwh5_nmn.js" async=""></script><script src="/_next/static/chunks/12p3iqtw2ohfq.js" async=""></script><meta name="next-size-adjust" content=""/><title>MiClaw</title><meta name="description" content="Claude Code configuration visualizer"/><link rel="icon" href="/favicon.ico?favicon.0x3dzn~oxb6tn.ico" sizes="256x256" type="image/x-icon"/><script src="/_next/static/chunks/03~yq9q893hmn.js" noModule=""></script></head><body class="bg-surface text-text font-sans antialiased"><div hidden=""><!--$--><!--/$--></div><div class="flex h-screen overflow-hidden"><nav class="w-16 shrink-0 border-r border-border py-4 flex flex-col items-center gap-2 overflow-visible"><a class="mb-3" style="writing-mode:vertical-lr" href="/"><span class="text-sm font-bold tracking-wider" style="font-family:var(--font-fira-code), monospace"><span class="text-text-muted">Mi</span><span class="text-accent">Claw</span></span></a><a class="relative group w-10 h-10 flex items-center justify-center rounded-md transition-colors
|
|
2
2
|
text-text-dim hover:text-text hover:bg-surface-hover" href="/"><svg xmlns="http://www.w3.org/2000/svg" width="22" height="22" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-layout-dashboard" aria-hidden="true"><rect width="7" height="9" x="3" y="3" rx="1"></rect><rect width="7" height="5" x="14" y="3" rx="1"></rect><rect width="7" height="9" x="14" y="12" rx="1"></rect><rect width="7" height="5" x="3" y="16" rx="1"></rect></svg><span class="absolute left-full ml-3 px-2.5 py-1 rounded-md bg-surface-raised border border-border text-text text-xs font-medium whitespace-nowrap opacity-0 pointer-events-none group-hover:opacity-100 transition-opacity z-50 shadow-lg">Overview</span></a><a class="relative group w-10 h-10 flex items-center justify-center rounded-md transition-colors
|
|
3
3
|
text-text-dim hover:text-text hover:bg-surface-hover" href="/agents"><svg xmlns="http://www.w3.org/2000/svg" width="22" height="22" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-bot" aria-hidden="true"><path d="M12 8V4H8"></path><rect width="16" height="12" x="4" y="8" rx="2"></rect><path d="M2 14h2"></path><path d="M20 14h2"></path><path d="M15 13v2"></path><path d="M9 13v2"></path></svg><span class="absolute left-full ml-3 px-2.5 py-1 rounded-md bg-surface-raised border border-border text-text text-xs font-medium whitespace-nowrap opacity-0 pointer-events-none group-hover:opacity-100 transition-opacity z-50 shadow-lg">Agents</span></a><a class="relative group w-10 h-10 flex items-center justify-center rounded-md transition-colors
|
|
4
4
|
text-text-dim hover:text-text hover:bg-surface-hover" href="/skills"><svg xmlns="http://www.w3.org/2000/svg" width="22" height="22" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-zap" aria-hidden="true"><path d="M4 14a1 1 0 0 1-.78-1.63l9.9-10.2a.5.5 0 0 1 .86.46l-1.92 6.02A1 1 0 0 0 13 10h7a1 1 0 0 1 .78 1.63l-9.9 10.2a.5.5 0 0 1-.86-.46l1.92-6.02A1 1 0 0 0 11 14z"></path></svg><span class="absolute left-full ml-3 px-2.5 py-1 rounded-md bg-surface-raised border border-border text-text text-xs font-medium whitespace-nowrap opacity-0 pointer-events-none group-hover:opacity-100 transition-opacity z-50 shadow-lg">Skills</span></a><a class="relative group w-10 h-10 flex items-center justify-center rounded-md transition-colors
|
|
@@ -6,28 +6,28 @@
|
|
|
6
6
|
text-text-dim hover:text-text hover:bg-surface-hover" href="/mcp"><svg xmlns="http://www.w3.org/2000/svg" width="22" height="22" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-plug" aria-hidden="true"><path d="M12 22v-5"></path><path d="M15 8V2"></path><path d="M17 8a1 1 0 0 1 1 1v4a4 4 0 0 1-4 4h-4a4 4 0 0 1-4-4V9a1 1 0 0 1 1-1z"></path><path d="M9 8V2"></path></svg><span class="absolute left-full ml-3 px-2.5 py-1 rounded-md bg-surface-raised border border-border text-text text-xs font-medium whitespace-nowrap opacity-0 pointer-events-none group-hover:opacity-100 transition-opacity z-50 shadow-lg">MCP Servers</span></a><a class="relative group w-10 h-10 flex items-center justify-center rounded-md transition-colors
|
|
7
7
|
text-text-dim hover:text-text hover:bg-surface-hover" href="/hooks"><svg xmlns="http://www.w3.org/2000/svg" width="22" height="22" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-webhook" aria-hidden="true"><path d="M18 16.98h-5.99c-1.1 0-1.95.94-2.48 1.9A4 4 0 0 1 2 17c.01-.7.2-1.4.57-2"></path><path d="m6 17 3.13-5.78c.53-.97.1-2.18-.5-3.1a4 4 0 1 1 6.89-4.06"></path><path d="m12 6 3.13 5.73C15.66 12.7 16.9 13 18 13a4 4 0 0 1 0 8"></path></svg><span class="absolute left-full ml-3 px-2.5 py-1 rounded-md bg-surface-raised border border-border text-text text-xs font-medium whitespace-nowrap opacity-0 pointer-events-none group-hover:opacity-100 transition-opacity z-50 shadow-lg">Hooks</span></a><a class="relative group w-10 h-10 flex items-center justify-center rounded-md transition-colors
|
|
8
8
|
text-text-dim hover:text-text hover:bg-surface-hover" href="/settings"><svg xmlns="http://www.w3.org/2000/svg" width="22" height="22" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-shield" aria-hidden="true"><path d="M20 13c0 5-3.5 7.5-7.66 8.95a1 1 0 0 1-.67-.01C7.5 20.5 4 18 4 13V6a1 1 0 0 1 1-1c2 0 4.5-1.2 6.24-2.72a1.17 1.17 0 0 1 1.52 0C14.51 3.81 17 5 19 5a1 1 0 0 1 1 1z"></path></svg><span class="absolute left-full ml-3 px-2.5 py-1 rounded-md bg-surface-raised border border-border text-text text-xs font-medium whitespace-nowrap opacity-0 pointer-events-none group-hover:opacity-100 transition-opacity z-50 shadow-lg">Settings</span></a><a class="relative group w-10 h-10 flex items-center justify-center rounded-md transition-colors
|
|
9
|
-
text-text-dim hover:text-text hover:bg-surface-hover" href="/rules"><svg xmlns="http://www.w3.org/2000/svg" width="22" height="22" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-file-text" aria-hidden="true"><path d="M6 22a2 2 0 0 1-2-2V4a2 2 0 0 1 2-2h8a2.4 2.4 0 0 1 1.704.706l3.588 3.588A2.4 2.4 0 0 1 20 8v12a2 2 0 0 1-2 2z"></path><path d="M14 2v5a1 1 0 0 0 1 1h5"></path><path d="M10 9H8"></path><path d="M16 13H8"></path><path d="M16 17H8"></path></svg><span class="absolute left-full ml-3 px-2.5 py-1 rounded-md bg-surface-raised border border-border text-text text-xs font-medium whitespace-nowrap opacity-0 pointer-events-none group-hover:opacity-100 transition-opacity z-50 shadow-lg">Rules</span></a></nav><main class="flex-1 overflow-y-auto bg-grid"><div class="mx-auto max-w-5xl px-8 py-10"><div class="mb-8"><div class="flex items-baseline gap-3"><h1 class="text-2xl font-medium tracking-tight">Commands</h1><span class="text-sm text-text-
|
|
9
|
+
text-text-dim hover:text-text hover:bg-surface-hover" href="/rules"><svg xmlns="http://www.w3.org/2000/svg" width="22" height="22" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-file-text" aria-hidden="true"><path d="M6 22a2 2 0 0 1-2-2V4a2 2 0 0 1 2-2h8a2.4 2.4 0 0 1 1.704.706l3.588 3.588A2.4 2.4 0 0 1 20 8v12a2 2 0 0 1-2 2z"></path><path d="M14 2v5a1 1 0 0 0 1 1h5"></path><path d="M10 9H8"></path><path d="M16 13H8"></path><path d="M16 17H8"></path></svg><span class="absolute left-full ml-3 px-2.5 py-1 rounded-md bg-surface-raised border border-border text-text text-xs font-medium whitespace-nowrap opacity-0 pointer-events-none group-hover:opacity-100 transition-opacity z-50 shadow-lg">Rules</span></a></nav><main class="flex-1 overflow-y-auto bg-grid"><div class="mx-auto max-w-5xl px-8 py-10"><div class="mb-8"><div class="flex items-baseline gap-3"><h1 class="text-2xl font-mono font-medium tracking-tight">Commands</h1><span class="font-mono text-sm text-text-dim">12</span></div><p class="mt-1 text-sm text-text-muted">Procedural commands across projects</p></div><div class="mb-8"><div class="flex items-center gap-2 mb-3"><span class="font-mono text-xs text-text-dim">[<!-- -->INFRASTRUCTURE<!-- -->]</span><span class="text-xs text-text-dim font-mono">~/Desktop/infrastructure/.claude/commands</span></div><div class="space-y-3"><div id="security-audit" class="border border-border rounded-sm p-5 scroll-mt-4 "><h3 class="text-sm font-mono font-medium">security-audit</h3><div class="mt-3"><pre class="text-xs text-text-muted font-mono whitespace-pre-wrap leading-relaxed"># Infrastructure Security Audit
|
|
10
10
|
|
|
11
|
-
Scan all AWS infrastructure modules for security issues across four categories: IAM least-privilege, unprotected API routes, encryption, and factory module bypass.<span class="text-text-dim">...</span></pre><button class="mt-2 text-xs text-accent hover:text-accent-dim transition-colors">Show more</button></div></div></div></div><div class="mb-8"><div class="flex items-center gap-2 mb-3"><span class="
|
|
11
|
+
Scan all AWS infrastructure modules for security issues across four categories: IAM least-privilege, unprotected API routes, encryption, and factory module bypass.<span class="text-text-dim">...</span></pre><button class="mt-2 text-xs text-accent hover:text-accent-dim transition-colors">Show more</button></div></div></div></div><div class="mb-8"><div class="flex items-center gap-2 mb-3"><span class="font-mono text-xs text-text-dim">[<!-- -->PLATFORM-SERVICES<!-- -->]</span><span class="text-xs text-text-dim font-mono">~/Desktop/platform-services/.claude/commands</span></div><div class="space-y-3"><div id="access-control-scan" class="border border-border rounded-sm p-5 scroll-mt-4 "><h3 class="text-sm font-mono font-medium">access-control-scan</h3><div class="mt-3"><pre class="text-xs text-text-muted font-mono whitespace-pre-wrap leading-relaxed"># Broken Access Control Scan
|
|
12
12
|
|
|
13
|
-
Scan ALL route handlers and Lambda handlers in platform-services for broken access control vulnerabilities beyond IDOR (which is covered by the separate `idor-scan` command).<span class="text-text-dim">...</span></pre><button class="mt-2 text-xs text-accent hover:text-accent-dim transition-colors">Show more</button></div></div><div id="add-llm-proxy-service-model" class="border border-border rounded-sm p-5 scroll-mt-4 "><h3 class="text-sm font-medium">add-llm-proxy-service-model</h3><div class="mt-3"><pre class="text-xs text-text-muted font-mono whitespace-pre-wrap leading-relaxed"># Add a New Model to llm-proxy-service
|
|
13
|
+
Scan ALL route handlers and Lambda handlers in platform-services for broken access control vulnerabilities beyond IDOR (which is covered by the separate `idor-scan` command).<span class="text-text-dim">...</span></pre><button class="mt-2 text-xs text-accent hover:text-accent-dim transition-colors">Show more</button></div></div><div id="add-llm-proxy-service-model" class="border border-border rounded-sm p-5 scroll-mt-4 "><h3 class="text-sm font-mono font-medium">add-llm-proxy-service-model</h3><div class="mt-3"><pre class="text-xs text-text-muted font-mono whitespace-pre-wrap leading-relaxed"># Add a New Model to llm-proxy-service
|
|
14
14
|
|
|
15
|
-
Add a new LLM model to `llm-proxy-service`, ensuring accurate cost reporting.<span class="text-text-dim">...</span></pre><button class="mt-2 text-xs text-accent hover:text-accent-dim transition-colors">Show more</button></div></div><div id="idor-scan" class="border border-border rounded-sm p-5 scroll-mt-4 "><h3 class="text-sm font-medium">idor-scan</h3><div class="mt-3"><pre class="text-xs text-text-muted font-mono whitespace-pre-wrap leading-relaxed"># IDOR & Authorization Vulnerability Scan
|
|
15
|
+
Add a new LLM model to `llm-proxy-service`, ensuring accurate cost reporting.<span class="text-text-dim">...</span></pre><button class="mt-2 text-xs text-accent hover:text-accent-dim transition-colors">Show more</button></div></div><div id="idor-scan" class="border border-border rounded-sm p-5 scroll-mt-4 "><h3 class="text-sm font-mono font-medium">idor-scan</h3><div class="mt-3"><pre class="text-xs text-text-muted font-mono whitespace-pre-wrap leading-relaxed"># IDOR & Authorization Vulnerability Scan
|
|
16
16
|
|
|
17
|
-
Scan ALL route handlers in platform-services for IDOR (Insecure Direct Object Reference) and authorization vulnerabilities.<span class="text-text-dim">...</span></pre><button class="mt-2 text-xs text-accent hover:text-accent-dim transition-colors">Show more</button></div></div><div id="phi-exposure-scan" class="border border-border rounded-sm p-5 scroll-mt-4 "><h3 class="text-sm font-medium">phi-exposure-scan</h3><div class="mt-3"><pre class="text-xs text-text-muted font-mono whitespace-pre-wrap leading-relaxed"># PHI/PII Data Exposure Scan
|
|
17
|
+
Scan ALL route handlers in platform-services for IDOR (Insecure Direct Object Reference) and authorization vulnerabilities.<span class="text-text-dim">...</span></pre><button class="mt-2 text-xs text-accent hover:text-accent-dim transition-colors">Show more</button></div></div><div id="phi-exposure-scan" class="border border-border rounded-sm p-5 scroll-mt-4 "><h3 class="text-sm font-mono font-medium">phi-exposure-scan</h3><div class="mt-3"><pre class="text-xs text-text-muted font-mono whitespace-pre-wrap leading-relaxed"># PHI/PII Data Exposure Scan
|
|
18
18
|
|
|
19
|
-
Scan ALL application code in platform-services for Protected Health Information (PHI) and Personally Identifiable Information (PII) exposure vulnerabilities. This covers logging, error responses, API over-fetching, and any other channel where sensitive data could leak.<span class="text-text-dim">...</span></pre><button class="mt-2 text-xs text-accent hover:text-accent-dim transition-colors">Show more</button></div></div><div id="upgrade-litellm" class="border border-border rounded-sm p-5 scroll-mt-4 "><h3 class="text-sm font-medium">upgrade-litellm</h3><div class="mt-3"><pre class="text-xs text-text-muted font-mono whitespace-pre-wrap leading-relaxed"># Upgrade litellm in llm-proxy-service
|
|
19
|
+
Scan ALL application code in platform-services for Protected Health Information (PHI) and Personally Identifiable Information (PII) exposure vulnerabilities. This covers logging, error responses, API over-fetching, and any other channel where sensitive data could leak.<span class="text-text-dim">...</span></pre><button class="mt-2 text-xs text-accent hover:text-accent-dim transition-colors">Show more</button></div></div><div id="upgrade-litellm" class="border border-border rounded-sm p-5 scroll-mt-4 "><h3 class="text-sm font-mono font-medium">upgrade-litellm</h3><div class="mt-3"><pre class="text-xs text-text-muted font-mono whitespace-pre-wrap leading-relaxed"># Upgrade litellm in llm-proxy-service
|
|
20
20
|
|
|
21
|
-
Upgrade the `litellm` dependency in `llm-proxy-service` to a new version, validating that all supported models have correct pricing.<span class="text-text-dim">...</span></pre><button class="mt-2 text-xs text-accent hover:text-accent-dim transition-colors">Show more</button></div></div><div id="access-control-scan" class="border border-border rounded-sm p-5 scroll-mt-4 "><h3 class="text-sm font-medium">access-control-scan</h3><div class="mt-3"><pre class="text-xs text-text-muted font-mono whitespace-pre-wrap leading-relaxed"># Broken Access Control Scan
|
|
21
|
+
Upgrade the `litellm` dependency in `llm-proxy-service` to a new version, validating that all supported models have correct pricing.<span class="text-text-dim">...</span></pre><button class="mt-2 text-xs text-accent hover:text-accent-dim transition-colors">Show more</button></div></div><div id="access-control-scan" class="border border-border rounded-sm p-5 scroll-mt-4 "><h3 class="text-sm font-mono font-medium">access-control-scan</h3><div class="mt-3"><pre class="text-xs text-text-muted font-mono whitespace-pre-wrap leading-relaxed"># Broken Access Control Scan
|
|
22
22
|
|
|
23
|
-
Scan ALL route handlers and Lambda handlers in platform-services for broken access control vulnerabilities beyond IDOR (which is covered by the separate `idor-scan` command).<span class="text-text-dim">...</span></pre><button class="mt-2 text-xs text-accent hover:text-accent-dim transition-colors">Show more</button></div></div><div id="add-llm-proxy-service-model" class="border border-border rounded-sm p-5 scroll-mt-4 "><h3 class="text-sm font-medium">add-llm-proxy-service-model</h3><div class="mt-3"><pre class="text-xs text-text-muted font-mono whitespace-pre-wrap leading-relaxed"># Add a New Model to llm-proxy-service
|
|
23
|
+
Scan ALL route handlers and Lambda handlers in platform-services for broken access control vulnerabilities beyond IDOR (which is covered by the separate `idor-scan` command).<span class="text-text-dim">...</span></pre><button class="mt-2 text-xs text-accent hover:text-accent-dim transition-colors">Show more</button></div></div><div id="add-llm-proxy-service-model" class="border border-border rounded-sm p-5 scroll-mt-4 "><h3 class="text-sm font-mono font-medium">add-llm-proxy-service-model</h3><div class="mt-3"><pre class="text-xs text-text-muted font-mono whitespace-pre-wrap leading-relaxed"># Add a New Model to llm-proxy-service
|
|
24
24
|
|
|
25
|
-
Add a new LLM model to `llm-proxy-service`, ensuring accurate cost reporting.<span class="text-text-dim">...</span></pre><button class="mt-2 text-xs text-accent hover:text-accent-dim transition-colors">Show more</button></div></div><div id="idor-scan" class="border border-border rounded-sm p-5 scroll-mt-4 "><h3 class="text-sm font-medium">idor-scan</h3><div class="mt-3"><pre class="text-xs text-text-muted font-mono whitespace-pre-wrap leading-relaxed"># IDOR & Authorization Vulnerability Scan
|
|
25
|
+
Add a new LLM model to `llm-proxy-service`, ensuring accurate cost reporting.<span class="text-text-dim">...</span></pre><button class="mt-2 text-xs text-accent hover:text-accent-dim transition-colors">Show more</button></div></div><div id="idor-scan" class="border border-border rounded-sm p-5 scroll-mt-4 "><h3 class="text-sm font-mono font-medium">idor-scan</h3><div class="mt-3"><pre class="text-xs text-text-muted font-mono whitespace-pre-wrap leading-relaxed"># IDOR & Authorization Vulnerability Scan
|
|
26
26
|
|
|
27
|
-
Scan ALL route handlers in platform-services for IDOR (Insecure Direct Object Reference) and authorization vulnerabilities.<span class="text-text-dim">...</span></pre><button class="mt-2 text-xs text-accent hover:text-accent-dim transition-colors">Show more</button></div></div><div id="phi-exposure-scan" class="border border-border rounded-sm p-5 scroll-mt-4 "><h3 class="text-sm font-medium">phi-exposure-scan</h3><div class="mt-3"><pre class="text-xs text-text-muted font-mono whitespace-pre-wrap leading-relaxed"># PHI/PII Data Exposure Scan
|
|
27
|
+
Scan ALL route handlers in platform-services for IDOR (Insecure Direct Object Reference) and authorization vulnerabilities.<span class="text-text-dim">...</span></pre><button class="mt-2 text-xs text-accent hover:text-accent-dim transition-colors">Show more</button></div></div><div id="phi-exposure-scan" class="border border-border rounded-sm p-5 scroll-mt-4 "><h3 class="text-sm font-mono font-medium">phi-exposure-scan</h3><div class="mt-3"><pre class="text-xs text-text-muted font-mono whitespace-pre-wrap leading-relaxed"># PHI/PII Data Exposure Scan
|
|
28
28
|
|
|
29
|
-
Scan ALL application code in platform-services for Protected Health Information (PHI) and Personally Identifiable Information (PII) exposure vulnerabilities. This covers logging, error responses, API over-fetching, and any other channel where sensitive data could leak.<span class="text-text-dim">...</span></pre><button class="mt-2 text-xs text-accent hover:text-accent-dim transition-colors">Show more</button></div></div><div id="upgrade-litellm" class="border border-border rounded-sm p-5 scroll-mt-4 "><h3 class="text-sm font-medium">upgrade-litellm</h3><div class="mt-3"><pre class="text-xs text-text-muted font-mono whitespace-pre-wrap leading-relaxed"># Upgrade litellm in llm-proxy-service
|
|
29
|
+
Scan ALL application code in platform-services for Protected Health Information (PHI) and Personally Identifiable Information (PII) exposure vulnerabilities. This covers logging, error responses, API over-fetching, and any other channel where sensitive data could leak.<span class="text-text-dim">...</span></pre><button class="mt-2 text-xs text-accent hover:text-accent-dim transition-colors">Show more</button></div></div><div id="upgrade-litellm" class="border border-border rounded-sm p-5 scroll-mt-4 "><h3 class="text-sm font-mono font-medium">upgrade-litellm</h3><div class="mt-3"><pre class="text-xs text-text-muted font-mono whitespace-pre-wrap leading-relaxed"># Upgrade litellm in llm-proxy-service
|
|
30
30
|
|
|
31
|
-
Upgrade the `litellm` dependency in `llm-proxy-service` to a new version, validating that all supported models have correct pricing.<span class="text-text-dim">...</span></pre><button class="mt-2 text-xs text-accent hover:text-accent-dim transition-colors">Show more</button></div></div></div></div><div class="mb-8"><div class="flex items-center gap-2 mb-3"><span class="
|
|
31
|
+
Upgrade the `litellm` dependency in `llm-proxy-service` to a new version, validating that all supported models have correct pricing.<span class="text-text-dim">...</span></pre><button class="mt-2 text-xs text-accent hover:text-accent-dim transition-colors">Show more</button></div></div></div></div><div class="mb-8"><div class="flex items-center gap-2 mb-3"><span class="font-mono text-xs text-text-dim">[<!-- -->WGS-INGESTION-BOT<!-- -->]</span><span class="text-xs text-text-dim font-mono">~/Desktop/wgs-ingestion-bot/.claude/commands</span></div><div class="space-y-3"><div id="investigate-wgs-ingestion" class="border border-border rounded-sm p-5 scroll-mt-4 "><h3 class="text-sm font-mono font-medium">investigate-wgs-ingestion</h3><div class="mt-3"><pre class="text-xs text-text-muted font-mono whitespace-pre-wrap leading-relaxed"># Investigate WGS Ingestion Failure
|
|
32
32
|
|
|
33
|
-
You are investigating a WGS ingestion Step Function failure in production. Follow each step. Do NOT ask for user input -- work autonomously.
|
|
33
|
+
You are investigating a WGS ingestion Step Function failure in production. Follow each step. Do NOT ask for user input -- work autonomously.
|
|
@@ -7,11 +7,11 @@
|
|
|
7
7
|
a:I[97367,["/_next/static/chunks/0mmpyn9fv2fjf.js","/_next/static/chunks/0d3shmwh5_nmn.js"],"ViewportBoundary"]
|
|
8
8
|
c:I[97367,["/_next/static/chunks/0mmpyn9fv2fjf.js","/_next/static/chunks/0d3shmwh5_nmn.js"],"MetadataBoundary"]
|
|
9
9
|
e:I[68027,["/_next/static/chunks/0mmpyn9fv2fjf.js","/_next/static/chunks/0d3shmwh5_nmn.js"],"default",1]
|
|
10
|
-
:HL["/_next/static/chunks/
|
|
10
|
+
:HL["/_next/static/chunks/0ta_ewsoz0zw3.css","style"]
|
|
11
11
|
:HL["/_next/static/media/166ab60e98aadb0a-s.p.0mka4ru4_bj1d.woff2","font",{"crossOrigin":"","type":"font/woff2"}]
|
|
12
12
|
:HL["/_next/static/media/797e433ab948586e-s.p.0.q-h669a_dqa.woff2","font",{"crossOrigin":"","type":"font/woff2"}]
|
|
13
13
|
:HL["/_next/static/media/83afe278b6a6bb3c-s.p.0q-301v4kxxnr.woff2","font",{"crossOrigin":"","type":"font/woff2"}]
|
|
14
|
-
0:{"P":null,"c":["","commands"],"q":"","i":false,"f":[[["",{"children":["commands",{"children":["__PAGE__",{}]}]},"$undefined","$undefined",16],[["$","$1","c",{"children":[[["$","link","0",{"rel":"stylesheet","href":"/_next/static/chunks/
|
|
14
|
+
0:{"P":null,"c":["","commands"],"q":"","i":false,"f":[[["",{"children":["commands",{"children":["__PAGE__",{}]}]},"$undefined","$undefined",16],[["$","$1","c",{"children":[[["$","link","0",{"rel":"stylesheet","href":"/_next/static/chunks/0ta_ewsoz0zw3.css","precedence":"next","crossOrigin":"$undefined","nonce":"$undefined"}],["$","script","script-0",{"src":"/_next/static/chunks/0mmpyn9fv2fjf.js","async":true,"nonce":"$undefined"}],["$","script","script-1",{"src":"/_next/static/chunks/0d3shmwh5_nmn.js","async":true,"nonce":"$undefined"}]],["$","html",null,{"lang":"en","className":"inter_fe8b9d92-module__LINzvG__variable geist_mono_8d43a2aa-module__8Li5zG__variable fira_code_d18ac710-module__OladcG__variable","children":["$","body",null,{"className":"bg-surface text-text font-sans antialiased","children":["$","div",null,{"className":"flex h-screen overflow-hidden","children":[["$","$L2",null,{}],["$","main",null,{"className":"flex-1 overflow-y-auto bg-grid","children":["$","$L3",null,{"parallelRouterKey":"children","error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L4",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":[[["$","title",null,{"children":"404: This page could not be found."}],["$","div",null,{"style":{"fontFamily":"system-ui,\"Segoe UI\",Roboto,Helvetica,Arial,sans-serif,\"Apple Color Emoji\",\"Segoe UI Emoji\"","height":"100vh","textAlign":"center","display":"flex","flexDirection":"column","alignItems":"center","justifyContent":"center"},"children":["$","div",null,{"children":[["$","style",null,{"dangerouslySetInnerHTML":{"__html":"body{color:#000;background:#fff;margin:0}.next-error-h1{border-right:1px solid rgba(0,0,0,.3)}@media (prefers-color-scheme:dark){body{color:#fff;background:#000}.next-error-h1{border-right:1px solid rgba(255,255,255,.3)}}"}}],["$","h1",null,{"className":"next-error-h1","style":{"display":"inline-block","margin":"0 20px 0 0","padding":"0 23px 0 0","fontSize":24,"fontWeight":500,"verticalAlign":"top","lineHeight":"49px"},"children":404}],["$","div",null,{"style":{"display":"inline-block"},"children":["$","h2",null,{"style":{"fontSize":14,"fontWeight":400,"lineHeight":"49px","margin":0},"children":"This page could not be found."}]}]]}]}]],[]],"forbidden":"$undefined","unauthorized":"$undefined"}]}]]}]}]}]]}],{"children":[["$","$1","c",{"children":[null,["$","$L3",null,{"parallelRouterKey":"children","error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L4",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":"$undefined","forbidden":"$undefined","unauthorized":"$undefined"}]]}],{"children":[["$","$1","c",{"children":["$L5",[["$","script","script-0",{"src":"/_next/static/chunks/12p3iqtw2ohfq.js","async":true,"nonce":"$undefined"}]],["$","$L6",null,{"children":["$","$7",null,{"name":"Next.MetadataOutlet","children":"$@8"}]}]]}],{},null,false,null]},null,false,"$@9"]},null,false,null],["$","$1","h",{"children":[null,["$","$La",null,{"children":"$Lb"}],["$","div",null,{"hidden":true,"children":["$","$Lc",null,{"children":["$","$7",null,{"name":"Next.Metadata","children":"$Ld"}]}]}],["$","meta",null,{"name":"next-size-adjust","content":""}]]}],false]],"m":"$undefined","G":["$e",[["$","link","0",{"rel":"stylesheet","href":"/_next/static/chunks/0ta_ewsoz0zw3.css","precedence":"next","crossOrigin":"$undefined","nonce":"$undefined"}]]],"S":true,"h":null,"s":"$undefined","l":"$undefined","p":"$undefined","d":"$undefined","b":"_j7rilZpHkhwJvNlkQL3G"}
|
|
15
15
|
f:[]
|
|
16
16
|
9:"$Wf"
|
|
17
17
|
b:[["$","meta","0",{"charSet":"utf-8"}],["$","meta","1",{"name":"viewport","content":"width=device-width, initial-scale=1"}]]
|
|
@@ -131,7 +131,7 @@ Each sub-agent should write its report in this format:
|
|
|
131
131
|
|
|
132
132
|
After the aggregation agent completes, tell the user the full report is at `/tmp/infra-security-audit/SUMMARY.md` and output the brief summary.
|
|
133
133
|
|
|
134
|
-
Read the actual .tf files — don't guess based on module names. When a wildcard resource is found, check if it's a known AWS requirement before flagging.5:["$","div",null,{"className":"mx-auto max-w-5xl px-8 py-10","children":[["$","div",null,{"className":"mb-8","children":[["$","div",null,{"className":"flex items-baseline gap-3","children":[["$","h1",null,{"className":"text-2xl font-medium tracking-tight","children":"Commands"}],["$","span",null,{"className":"text-sm text-text-
|
|
134
|
+
Read the actual .tf files — don't guess based on module names. When a wildcard resource is found, check if it's a known AWS requirement before flagging.5:["$","div",null,{"className":"mx-auto max-w-5xl px-8 py-10","children":[["$","div",null,{"className":"mb-8","children":[["$","div",null,{"className":"flex items-baseline gap-3","children":[["$","h1",null,{"className":"text-2xl font-mono font-medium tracking-tight","children":"Commands"}],["$","span",null,{"className":"font-mono text-sm text-text-dim","children":12}]]}],["$","p",null,{"className":"mt-1 text-sm text-text-muted","children":"Procedural commands across projects"}]]}],[["$","div","infrastructure",{"className":"mb-8","children":[["$","div",null,{"className":"flex items-center gap-2 mb-3","children":[["$","span",null,{"className":"font-mono text-xs text-text-dim","children":["[","INFRASTRUCTURE","]"]}],["$","span",null,{"className":"text-xs text-text-dim font-mono","children":"~/Desktop/infrastructure/.claude/commands"}]]}],["$","div",null,{"className":"space-y-3","children":[["$","div","/Users/gabry/Desktop/infrastructure/.claude/commands/security-audit.md",{"id":"security-audit","className":"border border-border rounded-sm p-5 scroll-mt-4 ","children":[["$","h3",null,{"className":"text-sm font-mono font-medium","children":"security-audit"}],["$","$L11",null,{"content":"$12","previewLines":3}]]}]]}]]}],"$L13","$L14"],false]}]
|
|
135
135
|
15:T368e,# Broken Access Control Scan
|
|
136
136
|
|
|
137
137
|
Scan ALL route handlers and Lambda handlers in platform-services for broken access control vulnerabilities beyond IDOR (which is covered by the separate `idor-scan` command).
|
|
@@ -358,7 +358,7 @@ Write the final report to `access-control-scan-results/SUMMARY.md` with:
|
|
|
358
358
|
|
|
359
359
|
Then output the summary to the user.
|
|
360
360
|
|
|
361
|
-
Be thorough. Read the actual code — don't guess based on function names alone. When checking for role validation, trace the full dependency chain. If a role check happens in a called function or middleware rather than at the route level, note it but don't flag it as a vulnerability.13:["$","div","platform-services",{"className":"mb-8","children":[["$","div",null,{"className":"flex items-center gap-2 mb-3","children":[["$","span",null,{"className":"
|
|
361
|
+
Be thorough. Read the actual code — don't guess based on function names alone. When checking for role validation, trace the full dependency chain. If a role check happens in a called function or middleware rather than at the route level, note it but don't flag it as a vulnerability.13:["$","div","platform-services",{"className":"mb-8","children":[["$","div",null,{"className":"flex items-center gap-2 mb-3","children":[["$","span",null,{"className":"font-mono text-xs text-text-dim","children":["[","PLATFORM-SERVICES","]"]}],["$","span",null,{"className":"text-xs text-text-dim font-mono","children":"~/Desktop/platform-services/.claude/commands"}]]}],["$","div",null,{"className":"space-y-3","children":[["$","div","/Users/gabry/Desktop/platform-services/.claude/commands/access-control-scan.md",{"id":"access-control-scan","className":"border border-border rounded-sm p-5 scroll-mt-4 ","children":[["$","h3",null,{"className":"text-sm font-mono font-medium","children":"access-control-scan"}],["$","$L11",null,{"content":"$15","previewLines":3}]]}],"$L16","$L17","$L18","$L19","$L1a","$L1b","$L1c","$L1d","$L1e"]}]]}]
|
|
362
362
|
1f:T1605,# Investigate WGS Ingestion Failure
|
|
363
363
|
|
|
364
364
|
You are investigating a WGS ingestion Step Function failure in production. Follow each step. Do NOT ask for user input -- work autonomously.
|
|
@@ -500,7 +500,7 @@ Env-task name: `redrive-wgs-ingestion-execution`
|
|
|
500
500
|
- Do NOT ask for user input. Work fully autonomously.
|
|
501
501
|
- Do NOT include PII/PHI. Only UUIDs, error codes, timestamps, status values.
|
|
502
502
|
- Do NOT use Bash commands. Use only Read, Glob, Grep, Write, and mcp__axiom__queryDataset.
|
|
503
|
-
- If Axiom queries fail, proceed with code analysis and note the gap in the report.14:["$","div","wgs-ingestion-bot",{"className":"mb-8","children":[["$","div",null,{"className":"flex items-center gap-2 mb-3","children":[["$","span",null,{"className":"
|
|
503
|
+
- If Axiom queries fail, proceed with code analysis and note the gap in the report.14:["$","div","wgs-ingestion-bot",{"className":"mb-8","children":[["$","div",null,{"className":"flex items-center gap-2 mb-3","children":[["$","span",null,{"className":"font-mono text-xs text-text-dim","children":["[","WGS-INGESTION-BOT","]"]}],["$","span",null,{"className":"text-xs text-text-dim font-mono","children":"~/Desktop/wgs-ingestion-bot/.claude/commands"}]]}],["$","div",null,{"className":"space-y-3","children":[["$","div","/Users/gabry/Desktop/wgs-ingestion-bot/.claude/commands/investigate-wgs-ingestion.md",{"id":"investigate-wgs-ingestion","className":"border border-border rounded-sm p-5 scroll-mt-4 ","children":[["$","h3",null,{"className":"text-sm font-mono font-medium","children":"investigate-wgs-ingestion"}],["$","$L11",null,{"content":"$1f","previewLines":3}]]}]]}]]}]
|
|
504
504
|
20:Tf1d,# Add a New Model to llm-proxy-service
|
|
505
505
|
|
|
506
506
|
Add a new LLM model to `llm-proxy-service`, ensuring accurate cost reporting.
|
|
@@ -587,7 +587,7 @@ If the model requires additional env vars (vertex_ai, groq, or anthropic models)
|
|
|
587
587
|
|
|
588
588
|
1. Run `pnpm exec nx run bioscope-types:type-check` to verify the type is valid
|
|
589
589
|
2. Run `pnpm exec nx run llm-proxy-service:test` to verify tests pass
|
|
590
|
-
3. Run `pnpm exec nx run llm-proxy-service:lint` and `pnpm exec nx run llm-proxy-service:type-check`16:["$","div","/Users/gabry/Desktop/platform-services/.claude/commands/add-llm-proxy-service-model.md",{"id":"add-llm-proxy-service-model","className":"border border-border rounded-sm p-5 scroll-mt-4 ","children":[["$","h3",null,{"className":"text-sm font-medium","children":"add-llm-proxy-service-model"}],["$","$L11",null,{"content":"$20","previewLines":3}]]}]
|
|
590
|
+
3. Run `pnpm exec nx run llm-proxy-service:lint` and `pnpm exec nx run llm-proxy-service:type-check`16:["$","div","/Users/gabry/Desktop/platform-services/.claude/commands/add-llm-proxy-service-model.md",{"id":"add-llm-proxy-service-model","className":"border border-border rounded-sm p-5 scroll-mt-4 ","children":[["$","h3",null,{"className":"text-sm font-mono font-medium","children":"add-llm-proxy-service-model"}],["$","$L11",null,{"content":"$20","previewLines":3}]]}]
|
|
591
591
|
21:T1c43,# IDOR & Authorization Vulnerability Scan
|
|
592
592
|
|
|
593
593
|
Scan ALL route handlers in platform-services for IDOR (Insecure Direct Object Reference) and authorization vulnerabilities.
|
|
@@ -685,7 +685,7 @@ Write the final report to `/tmp/idor-scan-results/SUMMARY.md` with:
|
|
|
685
685
|
|
|
686
686
|
Then output the summary to the user.
|
|
687
687
|
|
|
688
|
-
Be thorough. Read the actual code — don't guess based on function names alone. When in doubt about whether a check exists, read the called functions to see if ownership validation happens deeper in the call chain. If validation happens in a called function rather than at the route level, note it but don't flag it as a vulnerability.17:["$","div","/Users/gabry/Desktop/platform-services/.claude/commands/idor-scan.md",{"id":"idor-scan","className":"border border-border rounded-sm p-5 scroll-mt-4 ","children":[["$","h3",null,{"className":"text-sm font-medium","children":"idor-scan"}],["$","$L11",null,{"content":"$21","previewLines":3}]]}]
|
|
688
|
+
Be thorough. Read the actual code — don't guess based on function names alone. When in doubt about whether a check exists, read the called functions to see if ownership validation happens deeper in the call chain. If validation happens in a called function rather than at the route level, note it but don't flag it as a vulnerability.17:["$","div","/Users/gabry/Desktop/platform-services/.claude/commands/idor-scan.md",{"id":"idor-scan","className":"border border-border rounded-sm p-5 scroll-mt-4 ","children":[["$","h3",null,{"className":"text-sm font-mono font-medium","children":"idor-scan"}],["$","$L11",null,{"content":"$21","previewLines":3}]]}]
|
|
689
689
|
22:T2543,# PHI/PII Data Exposure Scan
|
|
690
690
|
|
|
691
691
|
Scan ALL application code in platform-services for Protected Health Information (PHI) and Personally Identifiable Information (PII) exposure vulnerabilities. This covers logging, error responses, API over-fetching, and any other channel where sensitive data could leak.
|
|
@@ -857,7 +857,7 @@ Write the final report to `/tmp/phi-exposure-scan-results/SUMMARY.md` with:
|
|
|
857
857
|
|
|
858
858
|
Then output the summary to the user.
|
|
859
859
|
|
|
860
|
-
Be thorough. Read the actual code — don't guess based on function names alone. When checking log statements, look at what the `extra` dict actually contains. When checking for model dumps, trace the model class to see what fields it includes. If a model only contains safe fields (IDs, timestamps, statuses), it's not a PHI exposure even if it's logged via `model_dump()`.18:["$","div","/Users/gabry/Desktop/platform-services/.claude/commands/phi-exposure-scan.md",{"id":"phi-exposure-scan","className":"border border-border rounded-sm p-5 scroll-mt-4 ","children":[["$","h3",null,{"className":"text-sm font-medium","children":"phi-exposure-scan"}],["$","$L11",null,{"content":"$22","previewLines":3}]]}]
|
|
860
|
+
Be thorough. Read the actual code — don't guess based on function names alone. When checking log statements, look at what the `extra` dict actually contains. When checking for model dumps, trace the model class to see what fields it includes. If a model only contains safe fields (IDs, timestamps, statuses), it's not a PHI exposure even if it's logged via `model_dump()`.18:["$","div","/Users/gabry/Desktop/platform-services/.claude/commands/phi-exposure-scan.md",{"id":"phi-exposure-scan","className":"border border-border rounded-sm p-5 scroll-mt-4 ","children":[["$","h3",null,{"className":"text-sm font-mono font-medium","children":"phi-exposure-scan"}],["$","$L11",null,{"content":"$22","previewLines":3}]]}]
|
|
861
861
|
23:T1b86,# Upgrade litellm in llm-proxy-service
|
|
862
862
|
|
|
863
863
|
Upgrade the `litellm` dependency in `llm-proxy-service` to a new version, validating that all supported models have correct pricing.
|
|
@@ -971,7 +971,7 @@ After presenting findings to the user and getting their approval:
|
|
|
971
971
|
4. Run `uv sync --all-packages` from the `platform-services/` directory to update the lock file
|
|
972
972
|
5. Run `pnpm exec nx run llm-proxy-service:test` to verify tests pass
|
|
973
973
|
6. Run `pnpm exec nx run llm-proxy-service:lint` and `pnpm exec nx run llm-proxy-service:type-check`
|
|
974
|
-
7. Run `pnpm exec nx run embedding-service:test`, `pnpm exec nx run embedding-service:lint`, and `pnpm exec nx run embedding-service:type-check`19:["$","div","/Users/gabry/Desktop/platform-services/.claude/commands/upgrade-litellm.md",{"id":"upgrade-litellm","className":"border border-border rounded-sm p-5 scroll-mt-4 ","children":[["$","h3",null,{"className":"text-sm font-medium","children":"upgrade-litellm"}],["$","$L11",null,{"content":"$23","previewLines":3}]]}]
|
|
974
|
+
7. Run `pnpm exec nx run embedding-service:test`, `pnpm exec nx run embedding-service:lint`, and `pnpm exec nx run embedding-service:type-check`19:["$","div","/Users/gabry/Desktop/platform-services/.claude/commands/upgrade-litellm.md",{"id":"upgrade-litellm","className":"border border-border rounded-sm p-5 scroll-mt-4 ","children":[["$","h3",null,{"className":"text-sm font-mono font-medium","children":"upgrade-litellm"}],["$","$L11",null,{"content":"$23","previewLines":3}]]}]
|
|
975
975
|
24:T368e,# Broken Access Control Scan
|
|
976
976
|
|
|
977
977
|
Scan ALL route handlers and Lambda handlers in platform-services for broken access control vulnerabilities beyond IDOR (which is covered by the separate `idor-scan` command).
|
|
@@ -1198,7 +1198,7 @@ Write the final report to `access-control-scan-results/SUMMARY.md` with:
|
|
|
1198
1198
|
|
|
1199
1199
|
Then output the summary to the user.
|
|
1200
1200
|
|
|
1201
|
-
Be thorough. Read the actual code — don't guess based on function names alone. When checking for role validation, trace the full dependency chain. If a role check happens in a called function or middleware rather than at the route level, note it but don't flag it as a vulnerability.1a:["$","div","/Users/gabry/Desktop/ps-copy/platform-services/.claude/commands/access-control-scan.md",{"id":"access-control-scan","className":"border border-border rounded-sm p-5 scroll-mt-4 ","children":[["$","h3",null,{"className":"text-sm font-medium","children":"access-control-scan"}],["$","$L11",null,{"content":"$24","previewLines":3}]]}]
|
|
1201
|
+
Be thorough. Read the actual code — don't guess based on function names alone. When checking for role validation, trace the full dependency chain. If a role check happens in a called function or middleware rather than at the route level, note it but don't flag it as a vulnerability.1a:["$","div","/Users/gabry/Desktop/ps-copy/platform-services/.claude/commands/access-control-scan.md",{"id":"access-control-scan","className":"border border-border rounded-sm p-5 scroll-mt-4 ","children":[["$","h3",null,{"className":"text-sm font-mono font-medium","children":"access-control-scan"}],["$","$L11",null,{"content":"$24","previewLines":3}]]}]
|
|
1202
1202
|
25:Tf1d,# Add a New Model to llm-proxy-service
|
|
1203
1203
|
|
|
1204
1204
|
Add a new LLM model to `llm-proxy-service`, ensuring accurate cost reporting.
|
|
@@ -1285,7 +1285,7 @@ If the model requires additional env vars (vertex_ai, groq, or anthropic models)
|
|
|
1285
1285
|
|
|
1286
1286
|
1. Run `pnpm exec nx run bioscope-types:type-check` to verify the type is valid
|
|
1287
1287
|
2. Run `pnpm exec nx run llm-proxy-service:test` to verify tests pass
|
|
1288
|
-
3. Run `pnpm exec nx run llm-proxy-service:lint` and `pnpm exec nx run llm-proxy-service:type-check`1b:["$","div","/Users/gabry/Desktop/ps-copy/platform-services/.claude/commands/add-llm-proxy-service-model.md",{"id":"add-llm-proxy-service-model","className":"border border-border rounded-sm p-5 scroll-mt-4 ","children":[["$","h3",null,{"className":"text-sm font-medium","children":"add-llm-proxy-service-model"}],["$","$L11",null,{"content":"$25","previewLines":3}]]}]
|
|
1288
|
+
3. Run `pnpm exec nx run llm-proxy-service:lint` and `pnpm exec nx run llm-proxy-service:type-check`1b:["$","div","/Users/gabry/Desktop/ps-copy/platform-services/.claude/commands/add-llm-proxy-service-model.md",{"id":"add-llm-proxy-service-model","className":"border border-border rounded-sm p-5 scroll-mt-4 ","children":[["$","h3",null,{"className":"text-sm font-mono font-medium","children":"add-llm-proxy-service-model"}],["$","$L11",null,{"content":"$25","previewLines":3}]]}]
|
|
1289
1289
|
26:T1c43,# IDOR & Authorization Vulnerability Scan
|
|
1290
1290
|
|
|
1291
1291
|
Scan ALL route handlers in platform-services for IDOR (Insecure Direct Object Reference) and authorization vulnerabilities.
|
|
@@ -1383,7 +1383,7 @@ Write the final report to `/tmp/idor-scan-results/SUMMARY.md` with:
|
|
|
1383
1383
|
|
|
1384
1384
|
Then output the summary to the user.
|
|
1385
1385
|
|
|
1386
|
-
Be thorough. Read the actual code — don't guess based on function names alone. When in doubt about whether a check exists, read the called functions to see if ownership validation happens deeper in the call chain. If validation happens in a called function rather than at the route level, note it but don't flag it as a vulnerability.1c:["$","div","/Users/gabry/Desktop/ps-copy/platform-services/.claude/commands/idor-scan.md",{"id":"idor-scan","className":"border border-border rounded-sm p-5 scroll-mt-4 ","children":[["$","h3",null,{"className":"text-sm font-medium","children":"idor-scan"}],["$","$L11",null,{"content":"$26","previewLines":3}]]}]
|
|
1386
|
+
Be thorough. Read the actual code — don't guess based on function names alone. When in doubt about whether a check exists, read the called functions to see if ownership validation happens deeper in the call chain. If validation happens in a called function rather than at the route level, note it but don't flag it as a vulnerability.1c:["$","div","/Users/gabry/Desktop/ps-copy/platform-services/.claude/commands/idor-scan.md",{"id":"idor-scan","className":"border border-border rounded-sm p-5 scroll-mt-4 ","children":[["$","h3",null,{"className":"text-sm font-mono font-medium","children":"idor-scan"}],["$","$L11",null,{"content":"$26","previewLines":3}]]}]
|
|
1387
1387
|
27:T2543,# PHI/PII Data Exposure Scan
|
|
1388
1388
|
|
|
1389
1389
|
Scan ALL application code in platform-services for Protected Health Information (PHI) and Personally Identifiable Information (PII) exposure vulnerabilities. This covers logging, error responses, API over-fetching, and any other channel where sensitive data could leak.
|
|
@@ -1555,7 +1555,7 @@ Write the final report to `/tmp/phi-exposure-scan-results/SUMMARY.md` with:
|
|
|
1555
1555
|
|
|
1556
1556
|
Then output the summary to the user.
|
|
1557
1557
|
|
|
1558
|
-
Be thorough. Read the actual code — don't guess based on function names alone. When checking log statements, look at what the `extra` dict actually contains. When checking for model dumps, trace the model class to see what fields it includes. If a model only contains safe fields (IDs, timestamps, statuses), it's not a PHI exposure even if it's logged via `model_dump()`.1d:["$","div","/Users/gabry/Desktop/ps-copy/platform-services/.claude/commands/phi-exposure-scan.md",{"id":"phi-exposure-scan","className":"border border-border rounded-sm p-5 scroll-mt-4 ","children":[["$","h3",null,{"className":"text-sm font-medium","children":"phi-exposure-scan"}],["$","$L11",null,{"content":"$27","previewLines":3}]]}]
|
|
1558
|
+
Be thorough. Read the actual code — don't guess based on function names alone. When checking log statements, look at what the `extra` dict actually contains. When checking for model dumps, trace the model class to see what fields it includes. If a model only contains safe fields (IDs, timestamps, statuses), it's not a PHI exposure even if it's logged via `model_dump()`.1d:["$","div","/Users/gabry/Desktop/ps-copy/platform-services/.claude/commands/phi-exposure-scan.md",{"id":"phi-exposure-scan","className":"border border-border rounded-sm p-5 scroll-mt-4 ","children":[["$","h3",null,{"className":"text-sm font-mono font-medium","children":"phi-exposure-scan"}],["$","$L11",null,{"content":"$27","previewLines":3}]]}]
|
|
1559
1559
|
28:T1b86,# Upgrade litellm in llm-proxy-service
|
|
1560
1560
|
|
|
1561
1561
|
Upgrade the `litellm` dependency in `llm-proxy-service` to a new version, validating that all supported models have correct pricing.
|
|
@@ -1669,4 +1669,4 @@ After presenting findings to the user and getting their approval:
|
|
|
1669
1669
|
4. Run `uv sync --all-packages` from the `platform-services/` directory to update the lock file
|
|
1670
1670
|
5. Run `pnpm exec nx run llm-proxy-service:test` to verify tests pass
|
|
1671
1671
|
6. Run `pnpm exec nx run llm-proxy-service:lint` and `pnpm exec nx run llm-proxy-service:type-check`
|
|
1672
|
-
7. Run `pnpm exec nx run embedding-service:test`, `pnpm exec nx run embedding-service:lint`, and `pnpm exec nx run embedding-service:type-check`1e:["$","div","/Users/gabry/Desktop/ps-copy/platform-services/.claude/commands/upgrade-litellm.md",{"id":"upgrade-litellm","className":"border border-border rounded-sm p-5 scroll-mt-4 ","children":[["$","h3",null,{"className":"text-sm font-medium","children":"upgrade-litellm"}],["$","$L11",null,{"content":"$28","previewLines":3}]]}]
|
|
1672
|
+
7. Run `pnpm exec nx run embedding-service:test`, `pnpm exec nx run embedding-service:lint`, and `pnpm exec nx run embedding-service:type-check`1e:["$","div","/Users/gabry/Desktop/ps-copy/platform-services/.claude/commands/upgrade-litellm.md",{"id":"upgrade-litellm","className":"border border-border rounded-sm p-5 scroll-mt-4 ","children":[["$","h3",null,{"className":"text-sm font-mono font-medium","children":"upgrade-litellm"}],["$","$L11",null,{"content":"$28","previewLines":3}]]}]
|
|
@@ -7,11 +7,11 @@
|
|
|
7
7
|
a:I[97367,["/_next/static/chunks/0mmpyn9fv2fjf.js","/_next/static/chunks/0d3shmwh5_nmn.js"],"ViewportBoundary"]
|
|
8
8
|
c:I[97367,["/_next/static/chunks/0mmpyn9fv2fjf.js","/_next/static/chunks/0d3shmwh5_nmn.js"],"MetadataBoundary"]
|
|
9
9
|
e:I[68027,["/_next/static/chunks/0mmpyn9fv2fjf.js","/_next/static/chunks/0d3shmwh5_nmn.js"],"default",1]
|
|
10
|
-
:HL["/_next/static/chunks/
|
|
10
|
+
:HL["/_next/static/chunks/0ta_ewsoz0zw3.css","style"]
|
|
11
11
|
:HL["/_next/static/media/166ab60e98aadb0a-s.p.0mka4ru4_bj1d.woff2","font",{"crossOrigin":"","type":"font/woff2"}]
|
|
12
12
|
:HL["/_next/static/media/797e433ab948586e-s.p.0.q-h669a_dqa.woff2","font",{"crossOrigin":"","type":"font/woff2"}]
|
|
13
13
|
:HL["/_next/static/media/83afe278b6a6bb3c-s.p.0q-301v4kxxnr.woff2","font",{"crossOrigin":"","type":"font/woff2"}]
|
|
14
|
-
0:{"P":null,"c":["","commands"],"q":"","i":false,"f":[[["",{"children":["commands",{"children":["__PAGE__",{}]}]},"$undefined","$undefined",16],[["$","$1","c",{"children":[[["$","link","0",{"rel":"stylesheet","href":"/_next/static/chunks/
|
|
14
|
+
0:{"P":null,"c":["","commands"],"q":"","i":false,"f":[[["",{"children":["commands",{"children":["__PAGE__",{}]}]},"$undefined","$undefined",16],[["$","$1","c",{"children":[[["$","link","0",{"rel":"stylesheet","href":"/_next/static/chunks/0ta_ewsoz0zw3.css","precedence":"next","crossOrigin":"$undefined","nonce":"$undefined"}],["$","script","script-0",{"src":"/_next/static/chunks/0mmpyn9fv2fjf.js","async":true,"nonce":"$undefined"}],["$","script","script-1",{"src":"/_next/static/chunks/0d3shmwh5_nmn.js","async":true,"nonce":"$undefined"}]],["$","html",null,{"lang":"en","className":"inter_fe8b9d92-module__LINzvG__variable geist_mono_8d43a2aa-module__8Li5zG__variable fira_code_d18ac710-module__OladcG__variable","children":["$","body",null,{"className":"bg-surface text-text font-sans antialiased","children":["$","div",null,{"className":"flex h-screen overflow-hidden","children":[["$","$L2",null,{}],["$","main",null,{"className":"flex-1 overflow-y-auto bg-grid","children":["$","$L3",null,{"parallelRouterKey":"children","error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L4",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":[[["$","title",null,{"children":"404: This page could not be found."}],["$","div",null,{"style":{"fontFamily":"system-ui,\"Segoe UI\",Roboto,Helvetica,Arial,sans-serif,\"Apple Color Emoji\",\"Segoe UI Emoji\"","height":"100vh","textAlign":"center","display":"flex","flexDirection":"column","alignItems":"center","justifyContent":"center"},"children":["$","div",null,{"children":[["$","style",null,{"dangerouslySetInnerHTML":{"__html":"body{color:#000;background:#fff;margin:0}.next-error-h1{border-right:1px solid rgba(0,0,0,.3)}@media (prefers-color-scheme:dark){body{color:#fff;background:#000}.next-error-h1{border-right:1px solid rgba(255,255,255,.3)}}"}}],["$","h1",null,{"className":"next-error-h1","style":{"display":"inline-block","margin":"0 20px 0 0","padding":"0 23px 0 0","fontSize":24,"fontWeight":500,"verticalAlign":"top","lineHeight":"49px"},"children":404}],["$","div",null,{"style":{"display":"inline-block"},"children":["$","h2",null,{"style":{"fontSize":14,"fontWeight":400,"lineHeight":"49px","margin":0},"children":"This page could not be found."}]}]]}]}]],[]],"forbidden":"$undefined","unauthorized":"$undefined"}]}]]}]}]}]]}],{"children":[["$","$1","c",{"children":[null,["$","$L3",null,{"parallelRouterKey":"children","error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L4",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":"$undefined","forbidden":"$undefined","unauthorized":"$undefined"}]]}],{"children":[["$","$1","c",{"children":["$L5",[["$","script","script-0",{"src":"/_next/static/chunks/12p3iqtw2ohfq.js","async":true,"nonce":"$undefined"}]],["$","$L6",null,{"children":["$","$7",null,{"name":"Next.MetadataOutlet","children":"$@8"}]}]]}],{},null,false,null]},null,false,"$@9"]},null,false,null],["$","$1","h",{"children":[null,["$","$La",null,{"children":"$Lb"}],["$","div",null,{"hidden":true,"children":["$","$Lc",null,{"children":["$","$7",null,{"name":"Next.Metadata","children":"$Ld"}]}]}],["$","meta",null,{"name":"next-size-adjust","content":""}]]}],false]],"m":"$undefined","G":["$e",[["$","link","0",{"rel":"stylesheet","href":"/_next/static/chunks/0ta_ewsoz0zw3.css","precedence":"next","crossOrigin":"$undefined","nonce":"$undefined"}]]],"S":true,"h":null,"s":"$undefined","l":"$undefined","p":"$undefined","d":"$undefined","b":"_j7rilZpHkhwJvNlkQL3G"}
|
|
15
15
|
f:[]
|
|
16
16
|
9:"$Wf"
|
|
17
17
|
b:[["$","meta","0",{"charSet":"utf-8"}],["$","meta","1",{"name":"viewport","content":"width=device-width, initial-scale=1"}]]
|
|
@@ -131,7 +131,7 @@ Each sub-agent should write its report in this format:
|
|
|
131
131
|
|
|
132
132
|
After the aggregation agent completes, tell the user the full report is at `/tmp/infra-security-audit/SUMMARY.md` and output the brief summary.
|
|
133
133
|
|
|
134
|
-
Read the actual .tf files — don't guess based on module names. When a wildcard resource is found, check if it's a known AWS requirement before flagging.5:["$","div",null,{"className":"mx-auto max-w-5xl px-8 py-10","children":[["$","div",null,{"className":"mb-8","children":[["$","div",null,{"className":"flex items-baseline gap-3","children":[["$","h1",null,{"className":"text-2xl font-medium tracking-tight","children":"Commands"}],["$","span",null,{"className":"text-sm text-text-
|
|
134
|
+
Read the actual .tf files — don't guess based on module names. When a wildcard resource is found, check if it's a known AWS requirement before flagging.5:["$","div",null,{"className":"mx-auto max-w-5xl px-8 py-10","children":[["$","div",null,{"className":"mb-8","children":[["$","div",null,{"className":"flex items-baseline gap-3","children":[["$","h1",null,{"className":"text-2xl font-mono font-medium tracking-tight","children":"Commands"}],["$","span",null,{"className":"font-mono text-sm text-text-dim","children":12}]]}],["$","p",null,{"className":"mt-1 text-sm text-text-muted","children":"Procedural commands across projects"}]]}],[["$","div","infrastructure",{"className":"mb-8","children":[["$","div",null,{"className":"flex items-center gap-2 mb-3","children":[["$","span",null,{"className":"font-mono text-xs text-text-dim","children":["[","INFRASTRUCTURE","]"]}],["$","span",null,{"className":"text-xs text-text-dim font-mono","children":"~/Desktop/infrastructure/.claude/commands"}]]}],["$","div",null,{"className":"space-y-3","children":[["$","div","/Users/gabry/Desktop/infrastructure/.claude/commands/security-audit.md",{"id":"security-audit","className":"border border-border rounded-sm p-5 scroll-mt-4 ","children":[["$","h3",null,{"className":"text-sm font-mono font-medium","children":"security-audit"}],["$","$L11",null,{"content":"$12","previewLines":3}]]}]]}]]}],"$L13","$L14"],false]}]
|
|
135
135
|
15:T368e,# Broken Access Control Scan
|
|
136
136
|
|
|
137
137
|
Scan ALL route handlers and Lambda handlers in platform-services for broken access control vulnerabilities beyond IDOR (which is covered by the separate `idor-scan` command).
|
|
@@ -358,7 +358,7 @@ Write the final report to `access-control-scan-results/SUMMARY.md` with:
|
|
|
358
358
|
|
|
359
359
|
Then output the summary to the user.
|
|
360
360
|
|
|
361
|
-
Be thorough. Read the actual code — don't guess based on function names alone. When checking for role validation, trace the full dependency chain. If a role check happens in a called function or middleware rather than at the route level, note it but don't flag it as a vulnerability.13:["$","div","platform-services",{"className":"mb-8","children":[["$","div",null,{"className":"flex items-center gap-2 mb-3","children":[["$","span",null,{"className":"
|
|
361
|
+
Be thorough. Read the actual code — don't guess based on function names alone. When checking for role validation, trace the full dependency chain. If a role check happens in a called function or middleware rather than at the route level, note it but don't flag it as a vulnerability.13:["$","div","platform-services",{"className":"mb-8","children":[["$","div",null,{"className":"flex items-center gap-2 mb-3","children":[["$","span",null,{"className":"font-mono text-xs text-text-dim","children":["[","PLATFORM-SERVICES","]"]}],["$","span",null,{"className":"text-xs text-text-dim font-mono","children":"~/Desktop/platform-services/.claude/commands"}]]}],["$","div",null,{"className":"space-y-3","children":[["$","div","/Users/gabry/Desktop/platform-services/.claude/commands/access-control-scan.md",{"id":"access-control-scan","className":"border border-border rounded-sm p-5 scroll-mt-4 ","children":[["$","h3",null,{"className":"text-sm font-mono font-medium","children":"access-control-scan"}],["$","$L11",null,{"content":"$15","previewLines":3}]]}],"$L16","$L17","$L18","$L19","$L1a","$L1b","$L1c","$L1d","$L1e"]}]]}]
|
|
362
362
|
1f:T1605,# Investigate WGS Ingestion Failure
|
|
363
363
|
|
|
364
364
|
You are investigating a WGS ingestion Step Function failure in production. Follow each step. Do NOT ask for user input -- work autonomously.
|
|
@@ -500,7 +500,7 @@ Env-task name: `redrive-wgs-ingestion-execution`
|
|
|
500
500
|
- Do NOT ask for user input. Work fully autonomously.
|
|
501
501
|
- Do NOT include PII/PHI. Only UUIDs, error codes, timestamps, status values.
|
|
502
502
|
- Do NOT use Bash commands. Use only Read, Glob, Grep, Write, and mcp__axiom__queryDataset.
|
|
503
|
-
- If Axiom queries fail, proceed with code analysis and note the gap in the report.14:["$","div","wgs-ingestion-bot",{"className":"mb-8","children":[["$","div",null,{"className":"flex items-center gap-2 mb-3","children":[["$","span",null,{"className":"
|
|
503
|
+
- If Axiom queries fail, proceed with code analysis and note the gap in the report.14:["$","div","wgs-ingestion-bot",{"className":"mb-8","children":[["$","div",null,{"className":"flex items-center gap-2 mb-3","children":[["$","span",null,{"className":"font-mono text-xs text-text-dim","children":["[","WGS-INGESTION-BOT","]"]}],["$","span",null,{"className":"text-xs text-text-dim font-mono","children":"~/Desktop/wgs-ingestion-bot/.claude/commands"}]]}],["$","div",null,{"className":"space-y-3","children":[["$","div","/Users/gabry/Desktop/wgs-ingestion-bot/.claude/commands/investigate-wgs-ingestion.md",{"id":"investigate-wgs-ingestion","className":"border border-border rounded-sm p-5 scroll-mt-4 ","children":[["$","h3",null,{"className":"text-sm font-mono font-medium","children":"investigate-wgs-ingestion"}],["$","$L11",null,{"content":"$1f","previewLines":3}]]}]]}]]}]
|
|
504
504
|
20:Tf1d,# Add a New Model to llm-proxy-service
|
|
505
505
|
|
|
506
506
|
Add a new LLM model to `llm-proxy-service`, ensuring accurate cost reporting.
|
|
@@ -587,7 +587,7 @@ If the model requires additional env vars (vertex_ai, groq, or anthropic models)
|
|
|
587
587
|
|
|
588
588
|
1. Run `pnpm exec nx run bioscope-types:type-check` to verify the type is valid
|
|
589
589
|
2. Run `pnpm exec nx run llm-proxy-service:test` to verify tests pass
|
|
590
|
-
3. Run `pnpm exec nx run llm-proxy-service:lint` and `pnpm exec nx run llm-proxy-service:type-check`16:["$","div","/Users/gabry/Desktop/platform-services/.claude/commands/add-llm-proxy-service-model.md",{"id":"add-llm-proxy-service-model","className":"border border-border rounded-sm p-5 scroll-mt-4 ","children":[["$","h3",null,{"className":"text-sm font-medium","children":"add-llm-proxy-service-model"}],["$","$L11",null,{"content":"$20","previewLines":3}]]}]
|
|
590
|
+
3. Run `pnpm exec nx run llm-proxy-service:lint` and `pnpm exec nx run llm-proxy-service:type-check`16:["$","div","/Users/gabry/Desktop/platform-services/.claude/commands/add-llm-proxy-service-model.md",{"id":"add-llm-proxy-service-model","className":"border border-border rounded-sm p-5 scroll-mt-4 ","children":[["$","h3",null,{"className":"text-sm font-mono font-medium","children":"add-llm-proxy-service-model"}],["$","$L11",null,{"content":"$20","previewLines":3}]]}]
|
|
591
591
|
21:T1c43,# IDOR & Authorization Vulnerability Scan
|
|
592
592
|
|
|
593
593
|
Scan ALL route handlers in platform-services for IDOR (Insecure Direct Object Reference) and authorization vulnerabilities.
|
|
@@ -685,7 +685,7 @@ Write the final report to `/tmp/idor-scan-results/SUMMARY.md` with:
|
|
|
685
685
|
|
|
686
686
|
Then output the summary to the user.
|
|
687
687
|
|
|
688
|
-
Be thorough. Read the actual code — don't guess based on function names alone. When in doubt about whether a check exists, read the called functions to see if ownership validation happens deeper in the call chain. If validation happens in a called function rather than at the route level, note it but don't flag it as a vulnerability.17:["$","div","/Users/gabry/Desktop/platform-services/.claude/commands/idor-scan.md",{"id":"idor-scan","className":"border border-border rounded-sm p-5 scroll-mt-4 ","children":[["$","h3",null,{"className":"text-sm font-medium","children":"idor-scan"}],["$","$L11",null,{"content":"$21","previewLines":3}]]}]
|
|
688
|
+
Be thorough. Read the actual code — don't guess based on function names alone. When in doubt about whether a check exists, read the called functions to see if ownership validation happens deeper in the call chain. If validation happens in a called function rather than at the route level, note it but don't flag it as a vulnerability.17:["$","div","/Users/gabry/Desktop/platform-services/.claude/commands/idor-scan.md",{"id":"idor-scan","className":"border border-border rounded-sm p-5 scroll-mt-4 ","children":[["$","h3",null,{"className":"text-sm font-mono font-medium","children":"idor-scan"}],["$","$L11",null,{"content":"$21","previewLines":3}]]}]
|
|
689
689
|
22:T2543,# PHI/PII Data Exposure Scan
|
|
690
690
|
|
|
691
691
|
Scan ALL application code in platform-services for Protected Health Information (PHI) and Personally Identifiable Information (PII) exposure vulnerabilities. This covers logging, error responses, API over-fetching, and any other channel where sensitive data could leak.
|
|
@@ -857,7 +857,7 @@ Write the final report to `/tmp/phi-exposure-scan-results/SUMMARY.md` with:
|
|
|
857
857
|
|
|
858
858
|
Then output the summary to the user.
|
|
859
859
|
|
|
860
|
-
Be thorough. Read the actual code — don't guess based on function names alone. When checking log statements, look at what the `extra` dict actually contains. When checking for model dumps, trace the model class to see what fields it includes. If a model only contains safe fields (IDs, timestamps, statuses), it's not a PHI exposure even if it's logged via `model_dump()`.18:["$","div","/Users/gabry/Desktop/platform-services/.claude/commands/phi-exposure-scan.md",{"id":"phi-exposure-scan","className":"border border-border rounded-sm p-5 scroll-mt-4 ","children":[["$","h3",null,{"className":"text-sm font-medium","children":"phi-exposure-scan"}],["$","$L11",null,{"content":"$22","previewLines":3}]]}]
|
|
860
|
+
Be thorough. Read the actual code — don't guess based on function names alone. When checking log statements, look at what the `extra` dict actually contains. When checking for model dumps, trace the model class to see what fields it includes. If a model only contains safe fields (IDs, timestamps, statuses), it's not a PHI exposure even if it's logged via `model_dump()`.18:["$","div","/Users/gabry/Desktop/platform-services/.claude/commands/phi-exposure-scan.md",{"id":"phi-exposure-scan","className":"border border-border rounded-sm p-5 scroll-mt-4 ","children":[["$","h3",null,{"className":"text-sm font-mono font-medium","children":"phi-exposure-scan"}],["$","$L11",null,{"content":"$22","previewLines":3}]]}]
|
|
861
861
|
23:T1b86,# Upgrade litellm in llm-proxy-service
|
|
862
862
|
|
|
863
863
|
Upgrade the `litellm` dependency in `llm-proxy-service` to a new version, validating that all supported models have correct pricing.
|
|
@@ -971,7 +971,7 @@ After presenting findings to the user and getting their approval:
|
|
|
971
971
|
4. Run `uv sync --all-packages` from the `platform-services/` directory to update the lock file
|
|
972
972
|
5. Run `pnpm exec nx run llm-proxy-service:test` to verify tests pass
|
|
973
973
|
6. Run `pnpm exec nx run llm-proxy-service:lint` and `pnpm exec nx run llm-proxy-service:type-check`
|
|
974
|
-
7. Run `pnpm exec nx run embedding-service:test`, `pnpm exec nx run embedding-service:lint`, and `pnpm exec nx run embedding-service:type-check`19:["$","div","/Users/gabry/Desktop/platform-services/.claude/commands/upgrade-litellm.md",{"id":"upgrade-litellm","className":"border border-border rounded-sm p-5 scroll-mt-4 ","children":[["$","h3",null,{"className":"text-sm font-medium","children":"upgrade-litellm"}],["$","$L11",null,{"content":"$23","previewLines":3}]]}]
|
|
974
|
+
7. Run `pnpm exec nx run embedding-service:test`, `pnpm exec nx run embedding-service:lint`, and `pnpm exec nx run embedding-service:type-check`19:["$","div","/Users/gabry/Desktop/platform-services/.claude/commands/upgrade-litellm.md",{"id":"upgrade-litellm","className":"border border-border rounded-sm p-5 scroll-mt-4 ","children":[["$","h3",null,{"className":"text-sm font-mono font-medium","children":"upgrade-litellm"}],["$","$L11",null,{"content":"$23","previewLines":3}]]}]
|
|
975
975
|
24:T368e,# Broken Access Control Scan
|
|
976
976
|
|
|
977
977
|
Scan ALL route handlers and Lambda handlers in platform-services for broken access control vulnerabilities beyond IDOR (which is covered by the separate `idor-scan` command).
|
|
@@ -1198,7 +1198,7 @@ Write the final report to `access-control-scan-results/SUMMARY.md` with:
|
|
|
1198
1198
|
|
|
1199
1199
|
Then output the summary to the user.
|
|
1200
1200
|
|
|
1201
|
-
Be thorough. Read the actual code — don't guess based on function names alone. When checking for role validation, trace the full dependency chain. If a role check happens in a called function or middleware rather than at the route level, note it but don't flag it as a vulnerability.1a:["$","div","/Users/gabry/Desktop/ps-copy/platform-services/.claude/commands/access-control-scan.md",{"id":"access-control-scan","className":"border border-border rounded-sm p-5 scroll-mt-4 ","children":[["$","h3",null,{"className":"text-sm font-medium","children":"access-control-scan"}],["$","$L11",null,{"content":"$24","previewLines":3}]]}]
|
|
1201
|
+
Be thorough. Read the actual code — don't guess based on function names alone. When checking for role validation, trace the full dependency chain. If a role check happens in a called function or middleware rather than at the route level, note it but don't flag it as a vulnerability.1a:["$","div","/Users/gabry/Desktop/ps-copy/platform-services/.claude/commands/access-control-scan.md",{"id":"access-control-scan","className":"border border-border rounded-sm p-5 scroll-mt-4 ","children":[["$","h3",null,{"className":"text-sm font-mono font-medium","children":"access-control-scan"}],["$","$L11",null,{"content":"$24","previewLines":3}]]}]
|
|
1202
1202
|
25:Tf1d,# Add a New Model to llm-proxy-service
|
|
1203
1203
|
|
|
1204
1204
|
Add a new LLM model to `llm-proxy-service`, ensuring accurate cost reporting.
|
|
@@ -1285,7 +1285,7 @@ If the model requires additional env vars (vertex_ai, groq, or anthropic models)
|
|
|
1285
1285
|
|
|
1286
1286
|
1. Run `pnpm exec nx run bioscope-types:type-check` to verify the type is valid
|
|
1287
1287
|
2. Run `pnpm exec nx run llm-proxy-service:test` to verify tests pass
|
|
1288
|
-
3. Run `pnpm exec nx run llm-proxy-service:lint` and `pnpm exec nx run llm-proxy-service:type-check`1b:["$","div","/Users/gabry/Desktop/ps-copy/platform-services/.claude/commands/add-llm-proxy-service-model.md",{"id":"add-llm-proxy-service-model","className":"border border-border rounded-sm p-5 scroll-mt-4 ","children":[["$","h3",null,{"className":"text-sm font-medium","children":"add-llm-proxy-service-model"}],["$","$L11",null,{"content":"$25","previewLines":3}]]}]
|
|
1288
|
+
3. Run `pnpm exec nx run llm-proxy-service:lint` and `pnpm exec nx run llm-proxy-service:type-check`1b:["$","div","/Users/gabry/Desktop/ps-copy/platform-services/.claude/commands/add-llm-proxy-service-model.md",{"id":"add-llm-proxy-service-model","className":"border border-border rounded-sm p-5 scroll-mt-4 ","children":[["$","h3",null,{"className":"text-sm font-mono font-medium","children":"add-llm-proxy-service-model"}],["$","$L11",null,{"content":"$25","previewLines":3}]]}]
|
|
1289
1289
|
26:T1c43,# IDOR & Authorization Vulnerability Scan
|
|
1290
1290
|
|
|
1291
1291
|
Scan ALL route handlers in platform-services for IDOR (Insecure Direct Object Reference) and authorization vulnerabilities.
|
|
@@ -1383,7 +1383,7 @@ Write the final report to `/tmp/idor-scan-results/SUMMARY.md` with:
|
|
|
1383
1383
|
|
|
1384
1384
|
Then output the summary to the user.
|
|
1385
1385
|
|
|
1386
|
-
Be thorough. Read the actual code — don't guess based on function names alone. When in doubt about whether a check exists, read the called functions to see if ownership validation happens deeper in the call chain. If validation happens in a called function rather than at the route level, note it but don't flag it as a vulnerability.1c:["$","div","/Users/gabry/Desktop/ps-copy/platform-services/.claude/commands/idor-scan.md",{"id":"idor-scan","className":"border border-border rounded-sm p-5 scroll-mt-4 ","children":[["$","h3",null,{"className":"text-sm font-medium","children":"idor-scan"}],["$","$L11",null,{"content":"$26","previewLines":3}]]}]
|
|
1386
|
+
Be thorough. Read the actual code — don't guess based on function names alone. When in doubt about whether a check exists, read the called functions to see if ownership validation happens deeper in the call chain. If validation happens in a called function rather than at the route level, note it but don't flag it as a vulnerability.1c:["$","div","/Users/gabry/Desktop/ps-copy/platform-services/.claude/commands/idor-scan.md",{"id":"idor-scan","className":"border border-border rounded-sm p-5 scroll-mt-4 ","children":[["$","h3",null,{"className":"text-sm font-mono font-medium","children":"idor-scan"}],["$","$L11",null,{"content":"$26","previewLines":3}]]}]
|
|
1387
1387
|
27:T2543,# PHI/PII Data Exposure Scan
|
|
1388
1388
|
|
|
1389
1389
|
Scan ALL application code in platform-services for Protected Health Information (PHI) and Personally Identifiable Information (PII) exposure vulnerabilities. This covers logging, error responses, API over-fetching, and any other channel where sensitive data could leak.
|
|
@@ -1555,7 +1555,7 @@ Write the final report to `/tmp/phi-exposure-scan-results/SUMMARY.md` with:
|
|
|
1555
1555
|
|
|
1556
1556
|
Then output the summary to the user.
|
|
1557
1557
|
|
|
1558
|
-
Be thorough. Read the actual code — don't guess based on function names alone. When checking log statements, look at what the `extra` dict actually contains. When checking for model dumps, trace the model class to see what fields it includes. If a model only contains safe fields (IDs, timestamps, statuses), it's not a PHI exposure even if it's logged via `model_dump()`.1d:["$","div","/Users/gabry/Desktop/ps-copy/platform-services/.claude/commands/phi-exposure-scan.md",{"id":"phi-exposure-scan","className":"border border-border rounded-sm p-5 scroll-mt-4 ","children":[["$","h3",null,{"className":"text-sm font-medium","children":"phi-exposure-scan"}],["$","$L11",null,{"content":"$27","previewLines":3}]]}]
|
|
1558
|
+
Be thorough. Read the actual code — don't guess based on function names alone. When checking log statements, look at what the `extra` dict actually contains. When checking for model dumps, trace the model class to see what fields it includes. If a model only contains safe fields (IDs, timestamps, statuses), it's not a PHI exposure even if it's logged via `model_dump()`.1d:["$","div","/Users/gabry/Desktop/ps-copy/platform-services/.claude/commands/phi-exposure-scan.md",{"id":"phi-exposure-scan","className":"border border-border rounded-sm p-5 scroll-mt-4 ","children":[["$","h3",null,{"className":"text-sm font-mono font-medium","children":"phi-exposure-scan"}],["$","$L11",null,{"content":"$27","previewLines":3}]]}]
|
|
1559
1559
|
28:T1b86,# Upgrade litellm in llm-proxy-service
|
|
1560
1560
|
|
|
1561
1561
|
Upgrade the `litellm` dependency in `llm-proxy-service` to a new version, validating that all supported models have correct pricing.
|
|
@@ -1669,4 +1669,4 @@ After presenting findings to the user and getting their approval:
|
|
|
1669
1669
|
4. Run `uv sync --all-packages` from the `platform-services/` directory to update the lock file
|
|
1670
1670
|
5. Run `pnpm exec nx run llm-proxy-service:test` to verify tests pass
|
|
1671
1671
|
6. Run `pnpm exec nx run llm-proxy-service:lint` and `pnpm exec nx run llm-proxy-service:type-check`
|
|
1672
|
-
7. Run `pnpm exec nx run embedding-service:test`, `pnpm exec nx run embedding-service:lint`, and `pnpm exec nx run embedding-service:type-check`1e:["$","div","/Users/gabry/Desktop/ps-copy/platform-services/.claude/commands/upgrade-litellm.md",{"id":"upgrade-litellm","className":"border border-border rounded-sm p-5 scroll-mt-4 ","children":[["$","h3",null,{"className":"text-sm font-medium","children":"upgrade-litellm"}],["$","$L11",null,{"content":"$28","previewLines":3}]]}]
|
|
1672
|
+
7. Run `pnpm exec nx run embedding-service:test`, `pnpm exec nx run embedding-service:lint`, and `pnpm exec nx run embedding-service:type-check`1e:["$","div","/Users/gabry/Desktop/ps-copy/platform-services/.claude/commands/upgrade-litellm.md",{"id":"upgrade-litellm","className":"border border-border rounded-sm p-5 scroll-mt-4 ","children":[["$","h3",null,{"className":"text-sm font-mono font-medium","children":"upgrade-litellm"}],["$","$L11",null,{"content":"$28","previewLines":3}]]}]
|
|
@@ -3,4 +3,4 @@
|
|
|
3
3
|
3:I[97367,["/_next/static/chunks/0mmpyn9fv2fjf.js","/_next/static/chunks/0d3shmwh5_nmn.js"],"MetadataBoundary"]
|
|
4
4
|
4:"$Sreact.suspense"
|
|
5
5
|
5:I[27201,["/_next/static/chunks/0mmpyn9fv2fjf.js","/_next/static/chunks/0d3shmwh5_nmn.js"],"IconMark"]
|
|
6
|
-
0:{"rsc":["$","$1","h",{"children":[null,["$","$L2",null,{"children":[["$","meta","0",{"charSet":"utf-8"}],["$","meta","1",{"name":"viewport","content":"width=device-width, initial-scale=1"}]]}],["$","div",null,{"hidden":true,"children":["$","$L3",null,{"children":["$","$4",null,{"name":"Next.Metadata","children":[["$","title","0",{"children":"MiClaw"}],["$","meta","1",{"name":"description","content":"Claude Code configuration visualizer"}],["$","link","2",{"rel":"icon","href":"/favicon.ico?favicon.0x3dzn~oxb6tn.ico","sizes":"256x256","type":"image/x-icon"}],["$","$L5","3",{}]]}]}]}],["$","meta",null,{"name":"next-size-adjust","content":""}]]}],"isPartial":false,"staleTime":300,"varyParams":null,"buildId":"
|
|
6
|
+
0:{"rsc":["$","$1","h",{"children":[null,["$","$L2",null,{"children":[["$","meta","0",{"charSet":"utf-8"}],["$","meta","1",{"name":"viewport","content":"width=device-width, initial-scale=1"}]]}],["$","div",null,{"hidden":true,"children":["$","$L3",null,{"children":["$","$4",null,{"name":"Next.Metadata","children":[["$","title","0",{"children":"MiClaw"}],["$","meta","1",{"name":"description","content":"Claude Code configuration visualizer"}],["$","link","2",{"rel":"icon","href":"/favicon.ico?favicon.0x3dzn~oxb6tn.ico","sizes":"256x256","type":"image/x-icon"}],["$","$L5","3",{}]]}]}]}],["$","meta",null,{"name":"next-size-adjust","content":""}]]}],"isPartial":false,"staleTime":300,"varyParams":null,"buildId":"_j7rilZpHkhwJvNlkQL3G"}
|
|
@@ -2,5 +2,5 @@
|
|
|
2
2
|
2:I[22140,["/_next/static/chunks/0mmpyn9fv2fjf.js","/_next/static/chunks/0d3shmwh5_nmn.js"],"Sidebar"]
|
|
3
3
|
3:I[39756,["/_next/static/chunks/0mmpyn9fv2fjf.js","/_next/static/chunks/0d3shmwh5_nmn.js"],"default"]
|
|
4
4
|
4:I[37457,["/_next/static/chunks/0mmpyn9fv2fjf.js","/_next/static/chunks/0d3shmwh5_nmn.js"],"default"]
|
|
5
|
-
:HL["/_next/static/chunks/
|
|
6
|
-
0:{"rsc":["$","$1","c",{"children":[[["$","link","0",{"rel":"stylesheet","href":"/_next/static/chunks/
|
|
5
|
+
:HL["/_next/static/chunks/0ta_ewsoz0zw3.css","style"]
|
|
6
|
+
0:{"rsc":["$","$1","c",{"children":[[["$","link","0",{"rel":"stylesheet","href":"/_next/static/chunks/0ta_ewsoz0zw3.css","precedence":"next"}],["$","script","script-0",{"src":"/_next/static/chunks/0mmpyn9fv2fjf.js","async":true}],["$","script","script-1",{"src":"/_next/static/chunks/0d3shmwh5_nmn.js","async":true}]],["$","html",null,{"lang":"en","className":"inter_fe8b9d92-module__LINzvG__variable geist_mono_8d43a2aa-module__8Li5zG__variable fira_code_d18ac710-module__OladcG__variable","children":["$","body",null,{"className":"bg-surface text-text font-sans antialiased","children":["$","div",null,{"className":"flex h-screen overflow-hidden","children":[["$","$L2",null,{}],["$","main",null,{"className":"flex-1 overflow-y-auto bg-grid","children":["$","$L3",null,{"parallelRouterKey":"children","template":["$","$L4",null,{}],"notFound":[[["$","title",null,{"children":"404: This page could not be found."}],["$","div",null,{"style":{"fontFamily":"system-ui,\"Segoe UI\",Roboto,Helvetica,Arial,sans-serif,\"Apple Color Emoji\",\"Segoe UI Emoji\"","height":"100vh","textAlign":"center","display":"flex","flexDirection":"column","alignItems":"center","justifyContent":"center"},"children":["$","div",null,{"children":[["$","style",null,{"dangerouslySetInnerHTML":{"__html":"body{color:#000;background:#fff;margin:0}.next-error-h1{border-right:1px solid rgba(0,0,0,.3)}@media (prefers-color-scheme:dark){body{color:#fff;background:#000}.next-error-h1{border-right:1px solid rgba(255,255,255,.3)}}"}}],["$","h1",null,{"className":"next-error-h1","style":{"display":"inline-block","margin":"0 20px 0 0","padding":"0 23px 0 0","fontSize":24,"fontWeight":500,"verticalAlign":"top","lineHeight":"49px"},"children":404}],["$","div",null,{"style":{"display":"inline-block"},"children":["$","h2",null,{"style":{"fontSize":14,"fontWeight":400,"lineHeight":"49px","margin":0},"children":"This page could not be found."}]}]]}]}]],[]]}]}]]}]}]}]]}],"isPartial":false,"staleTime":300,"varyParams":null,"buildId":"_j7rilZpHkhwJvNlkQL3G"}
|
|
@@ -1,5 +1,5 @@
|
|
|
1
|
-
:HL["/_next/static/chunks/
|
|
1
|
+
:HL["/_next/static/chunks/0ta_ewsoz0zw3.css","style"]
|
|
2
2
|
:HL["/_next/static/media/166ab60e98aadb0a-s.p.0mka4ru4_bj1d.woff2","font",{"crossOrigin":"","type":"font/woff2"}]
|
|
3
3
|
:HL["/_next/static/media/797e433ab948586e-s.p.0.q-h669a_dqa.woff2","font",{"crossOrigin":"","type":"font/woff2"}]
|
|
4
4
|
:HL["/_next/static/media/83afe278b6a6bb3c-s.p.0q-301v4kxxnr.woff2","font",{"crossOrigin":"","type":"font/woff2"}]
|
|
5
|
-
0:{"tree":{"name":"","param":null,"prefetchHints":16,"slots":{"children":{"name":"commands","param":null,"prefetchHints":0,"slots":{"children":{"name":"__PAGE__","param":null,"prefetchHints":0,"slots":null}}}}},"staleTime":300,"buildId":"
|
|
5
|
+
0:{"tree":{"name":"","param":null,"prefetchHints":16,"slots":{"children":{"name":"commands","param":null,"prefetchHints":0,"slots":{"children":{"name":"__PAGE__","param":null,"prefetchHints":0,"slots":null}}}}},"staleTime":300,"buildId":"_j7rilZpHkhwJvNlkQL3G"}
|