oh-my-claude-sisyphus 3.4.0 → 3.4.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (104) hide show
  1. package/README.md +71 -5
  2. package/commands/cancel-ecomode.md +71 -0
  3. package/commands/cancel.md +75 -0
  4. package/commands/pipeline.md +231 -0
  5. package/commands/planner.md +174 -0
  6. package/commands/swarm.md +280 -0
  7. package/dist/analytics/cost-estimator.d.ts +14 -0
  8. package/dist/analytics/cost-estimator.d.ts.map +1 -0
  9. package/dist/analytics/cost-estimator.js +70 -0
  10. package/dist/analytics/cost-estimator.js.map +1 -0
  11. package/dist/analytics/export.d.ts +7 -0
  12. package/dist/analytics/export.d.ts.map +1 -0
  13. package/dist/analytics/export.js +93 -0
  14. package/dist/analytics/export.js.map +1 -0
  15. package/dist/analytics/index.d.ts +14 -0
  16. package/dist/analytics/index.d.ts.map +1 -0
  17. package/dist/analytics/index.js +14 -0
  18. package/dist/analytics/index.js.map +1 -0
  19. package/dist/analytics/metrics-collector.d.ts +30 -0
  20. package/dist/analytics/metrics-collector.d.ts.map +1 -0
  21. package/dist/analytics/metrics-collector.js +96 -0
  22. package/dist/analytics/metrics-collector.js.map +1 -0
  23. package/dist/analytics/query-engine.d.ts +32 -0
  24. package/dist/analytics/query-engine.d.ts.map +1 -0
  25. package/dist/analytics/query-engine.js +151 -0
  26. package/dist/analytics/query-engine.js.map +1 -0
  27. package/dist/analytics/session-manager.d.ts +26 -0
  28. package/dist/analytics/session-manager.d.ts.map +1 -0
  29. package/dist/analytics/session-manager.js +201 -0
  30. package/dist/analytics/session-manager.js.map +1 -0
  31. package/dist/analytics/session-types.d.ts +37 -0
  32. package/dist/analytics/session-types.d.ts.map +1 -0
  33. package/dist/analytics/session-types.js +2 -0
  34. package/dist/analytics/session-types.js.map +1 -0
  35. package/dist/analytics/token-tracker.d.ts +24 -0
  36. package/dist/analytics/token-tracker.d.ts.map +1 -0
  37. package/dist/analytics/token-tracker.js +161 -0
  38. package/dist/analytics/token-tracker.js.map +1 -0
  39. package/dist/analytics/types.d.ts +37 -0
  40. package/dist/analytics/types.d.ts.map +1 -0
  41. package/dist/analytics/types.js +21 -0
  42. package/dist/analytics/types.js.map +1 -0
  43. package/dist/cli/analytics.d.ts +3 -0
  44. package/dist/cli/analytics.d.ts.map +1 -0
  45. package/dist/cli/analytics.js +74 -0
  46. package/dist/cli/analytics.js.map +1 -0
  47. package/dist/cli/commands/agents.d.ts +5 -0
  48. package/dist/cli/commands/agents.d.ts.map +1 -0
  49. package/dist/cli/commands/agents.js +29 -0
  50. package/dist/cli/commands/agents.js.map +1 -0
  51. package/dist/cli/commands/cleanup.d.ts +4 -0
  52. package/dist/cli/commands/cleanup.d.ts.map +1 -0
  53. package/dist/cli/commands/cleanup.js +17 -0
  54. package/dist/cli/commands/cleanup.js.map +1 -0
  55. package/dist/cli/commands/cost.d.ts +4 -0
  56. package/dist/cli/commands/cost.d.ts.map +1 -0
  57. package/dist/cli/commands/cost.js +53 -0
  58. package/dist/cli/commands/cost.js.map +1 -0
  59. package/dist/cli/commands/export.d.ts +5 -0
  60. package/dist/cli/commands/export.d.ts.map +1 -0
  61. package/dist/cli/commands/export.js +30 -0
  62. package/dist/cli/commands/export.js.map +1 -0
  63. package/dist/cli/commands/sessions.d.ts +5 -0
  64. package/dist/cli/commands/sessions.d.ts.map +1 -0
  65. package/dist/cli/commands/sessions.js +37 -0
  66. package/dist/cli/commands/sessions.js.map +1 -0
  67. package/dist/cli/commands/stats.d.ts +4 -0
  68. package/dist/cli/commands/stats.d.ts.map +1 -0
  69. package/dist/cli/commands/stats.js +43 -0
  70. package/dist/cli/commands/stats.js.map +1 -0
  71. package/dist/cli/utils/formatting.d.ts +22 -0
  72. package/dist/cli/utils/formatting.d.ts.map +1 -0
  73. package/dist/cli/utils/formatting.js +70 -0
  74. package/dist/cli/utils/formatting.js.map +1 -0
  75. package/dist/hud/analytics-display.d.ts +28 -0
  76. package/dist/hud/analytics-display.d.ts.map +1 -0
  77. package/dist/hud/analytics-display.js +105 -0
  78. package/dist/hud/analytics-display.js.map +1 -0
  79. package/dist/hud/background-cleanup.d.ts +28 -0
  80. package/dist/hud/background-cleanup.d.ts.map +1 -0
  81. package/dist/hud/background-cleanup.js +92 -0
  82. package/dist/hud/background-cleanup.js.map +1 -0
  83. package/dist/hud/index.js +4 -2
  84. package/dist/hud/index.js.map +1 -1
  85. package/dist/hud/render.d.ts +1 -1
  86. package/dist/hud/render.d.ts.map +1 -1
  87. package/dist/hud/render.js +32 -1
  88. package/dist/hud/render.js.map +1 -1
  89. package/dist/hud/state.d.ts +5 -0
  90. package/dist/hud/state.d.ts.map +1 -1
  91. package/dist/hud/state.js +13 -0
  92. package/dist/hud/state.js.map +1 -1
  93. package/dist/hud/types.d.ts +11 -1
  94. package/dist/hud/types.d.ts.map +1 -1
  95. package/dist/hud/types.js +19 -0
  96. package/dist/hud/types.js.map +1 -1
  97. package/docs/FULL-README.md +130 -16
  98. package/docs/MIGRATION.md +222 -1
  99. package/docs/SYNC-SYSTEM.md +528 -0
  100. package/package.json +8 -2
  101. package/scripts/sync-metadata.ts +363 -0
  102. package/skills/build-fix/SKILL.md +123 -0
  103. package/skills/code-review/SKILL.md +179 -0
  104. package/skills/security-review/SKILL.md +254 -0
@@ -0,0 +1,254 @@
1
+ ---
2
+ name: security-review
3
+ description: Run a comprehensive security review on code
4
+ ---
5
+
6
+ # Security Review Skill
7
+
8
+ Conduct a thorough security audit checking for OWASP Top 10 vulnerabilities, hardcoded secrets, and unsafe patterns.
9
+
10
+ ## When to Use
11
+
12
+ This skill activates when:
13
+ - User requests "security review", "security audit"
14
+ - After writing code that handles user input
15
+ - After adding new API endpoints
16
+ - After modifying authentication/authorization logic
17
+ - Before deploying to production
18
+ - After adding external dependencies
19
+
20
+ ## What It Does
21
+
22
+ Delegates to the `security-reviewer` agent (Opus model) for deep security analysis:
23
+
24
+ 1. **OWASP Top 10 Scan**
25
+ - A01: Broken Access Control
26
+ - A02: Cryptographic Failures
27
+ - A03: Injection (SQL, NoSQL, Command, XSS)
28
+ - A04: Insecure Design
29
+ - A05: Security Misconfiguration
30
+ - A06: Vulnerable and Outdated Components
31
+ - A07: Identification and Authentication Failures
32
+ - A08: Software and Data Integrity Failures
33
+ - A09: Security Logging and Monitoring Failures
34
+ - A10: Server-Side Request Forgery (SSRF)
35
+
36
+ 2. **Secrets Detection**
37
+ - Hardcoded API keys
38
+ - Passwords in source code
39
+ - Private keys in repo
40
+ - Tokens and credentials
41
+ - Connection strings with secrets
42
+
43
+ 3. **Input Validation**
44
+ - All user inputs sanitized
45
+ - SQL/NoSQL injection prevention
46
+ - Command injection prevention
47
+ - XSS prevention (output escaping)
48
+ - Path traversal prevention
49
+
50
+ 4. **Authentication/Authorization**
51
+ - Proper password hashing (bcrypt, argon2)
52
+ - Session management security
53
+ - Access control enforcement
54
+ - JWT implementation security
55
+
56
+ 5. **Dependency Security**
57
+ - Run `npm audit` for known vulnerabilities
58
+ - Check for outdated dependencies
59
+ - Identify high-severity CVEs
60
+
61
+ ## Agent Delegation
62
+
63
+ ```
64
+ Task(
65
+ subagent_type="oh-my-claudecode:security-reviewer",
66
+ model="opus",
67
+ prompt="SECURITY REVIEW TASK
68
+
69
+ Conduct comprehensive security audit of codebase.
70
+
71
+ Scope: [specific files or entire codebase]
72
+
73
+ Security Checklist:
74
+ 1. OWASP Top 10 scan
75
+ 2. Hardcoded secrets detection
76
+ 3. Input validation review
77
+ 4. Authentication/authorization review
78
+ 5. Dependency vulnerability scan (npm audit)
79
+
80
+ Output: Security review report with:
81
+ - Summary of findings by severity (CRITICAL, HIGH, MEDIUM, LOW)
82
+ - Specific file:line locations
83
+ - CVE references where applicable
84
+ - Remediation guidance for each issue
85
+ - Overall security posture assessment"
86
+ )
87
+ ```
88
+
89
+ ## Output Format
90
+
91
+ ```
92
+ SECURITY REVIEW REPORT
93
+ ======================
94
+
95
+ Scope: Entire codebase (42 files scanned)
96
+ Scan Date: 2026-01-24T14:30:00Z
97
+
98
+ CRITICAL (2)
99
+ ------------
100
+ 1. src/api/auth.ts:89 - Hardcoded API Key
101
+ Finding: AWS API key hardcoded in source code
102
+ Impact: Credential exposure if code is public or leaked
103
+ Remediation: Move to environment variables, rotate key immediately
104
+ Reference: OWASP A02:2021 – Cryptographic Failures
105
+
106
+ 2. src/db/query.ts:45 - SQL Injection Vulnerability
107
+ Finding: User input concatenated directly into SQL query
108
+ Impact: Attacker can execute arbitrary SQL commands
109
+ Remediation: Use parameterized queries or ORM
110
+ Reference: OWASP A03:2021 – Injection
111
+
112
+ HIGH (5)
113
+ --------
114
+ 3. src/auth/password.ts:22 - Weak Password Hashing
115
+ Finding: Passwords hashed with MD5 (cryptographically broken)
116
+ Impact: Passwords can be reversed via rainbow tables
117
+ Remediation: Use bcrypt or argon2 with appropriate work factor
118
+ Reference: OWASP A02:2021 – Cryptographic Failures
119
+
120
+ 4. src/components/UserInput.tsx:67 - XSS Vulnerability
121
+ Finding: User input rendered with dangerouslySetInnerHTML
122
+ Impact: Cross-site scripting attack vector
123
+ Remediation: Sanitize HTML or use safe rendering
124
+ Reference: OWASP A03:2021 – Injection (XSS)
125
+
126
+ 5. src/api/upload.ts:34 - Path Traversal Vulnerability
127
+ Finding: User-controlled filename used without validation
128
+ Impact: Attacker can read/write arbitrary files
129
+ Remediation: Validate and sanitize filenames, use allowlist
130
+ Reference: OWASP A01:2021 – Broken Access Control
131
+
132
+ ...
133
+
134
+ MEDIUM (8)
135
+ ----------
136
+ ...
137
+
138
+ LOW (12)
139
+ --------
140
+ ...
141
+
142
+ DEPENDENCY VULNERABILITIES
143
+ --------------------------
144
+ Found 3 vulnerabilities via npm audit:
145
+
146
+ CRITICAL: axios@0.21.0 - Server-Side Request Forgery (CVE-2021-3749)
147
+ Installed: axios@0.21.0
148
+ Fix: npm install axios@0.21.2
149
+
150
+ HIGH: lodash@4.17.19 - Prototype Pollution (CVE-2020-8203)
151
+ Installed: lodash@4.17.19
152
+ Fix: npm install lodash@4.17.21
153
+
154
+ ...
155
+
156
+ OVERALL ASSESSMENT
157
+ ------------------
158
+ Security Posture: POOR (2 CRITICAL, 5 HIGH issues)
159
+
160
+ Immediate Actions Required:
161
+ 1. Rotate exposed AWS API key
162
+ 2. Fix SQL injection in db/query.ts
163
+ 3. Upgrade password hashing to bcrypt
164
+ 4. Update vulnerable dependencies
165
+
166
+ Recommendation: DO NOT DEPLOY until CRITICAL and HIGH issues resolved.
167
+ ```
168
+
169
+ ## Security Checklist
170
+
171
+ The security-reviewer agent verifies:
172
+
173
+ ### Authentication & Authorization
174
+ - [ ] Passwords hashed with strong algorithm (bcrypt/argon2)
175
+ - [ ] Session tokens cryptographically random
176
+ - [ ] JWT tokens properly signed and validated
177
+ - [ ] Access control enforced on all protected resources
178
+ - [ ] No authentication bypass vulnerabilities
179
+
180
+ ### Input Validation
181
+ - [ ] All user inputs validated and sanitized
182
+ - [ ] SQL queries use parameterization (no string concatenation)
183
+ - [ ] NoSQL queries prevent injection
184
+ - [ ] File uploads validated (type, size, content)
185
+ - [ ] URLs validated to prevent SSRF
186
+
187
+ ### Output Encoding
188
+ - [ ] HTML output escaped to prevent XSS
189
+ - [ ] JSON responses properly encoded
190
+ - [ ] No user data in error messages
191
+ - [ ] Content-Security-Policy headers set
192
+
193
+ ### Secrets Management
194
+ - [ ] No hardcoded API keys
195
+ - [ ] No passwords in source code
196
+ - [ ] No private keys in repo
197
+ - [ ] Environment variables used for secrets
198
+ - [ ] Secrets not logged or exposed in errors
199
+
200
+ ### Cryptography
201
+ - [ ] Strong algorithms used (AES-256, RSA-2048+)
202
+ - [ ] Proper key management
203
+ - [ ] Random number generation cryptographically secure
204
+ - [ ] TLS/HTTPS enforced for sensitive data
205
+
206
+ ### Dependencies
207
+ - [ ] No known vulnerabilities in dependencies
208
+ - [ ] Dependencies up to date
209
+ - [ ] No CRITICAL or HIGH CVEs
210
+ - [ ] Dependency sources verified
211
+
212
+ ## Severity Definitions
213
+
214
+ **CRITICAL** - Exploitable vulnerability with severe impact (data breach, RCE, credential theft)
215
+ **HIGH** - Vulnerability requiring specific conditions but serious impact
216
+ **MEDIUM** - Security weakness with limited impact or difficult exploitation
217
+ **LOW** - Best practice violation or minor security concern
218
+
219
+ ## Remediation Priority
220
+
221
+ 1. **Rotate exposed secrets** - Immediate (within 1 hour)
222
+ 2. **Fix CRITICAL** - Urgent (within 24 hours)
223
+ 3. **Fix HIGH** - Important (within 1 week)
224
+ 4. **Fix MEDIUM** - Planned (within 1 month)
225
+ 5. **Fix LOW** - Backlog (when convenient)
226
+
227
+ ## Use with Other Skills
228
+
229
+ **With Pipeline:**
230
+ ```
231
+ /pipeline security "review authentication module"
232
+ ```
233
+ Uses: explore → security-reviewer → executor → security-reviewer-low (re-verify)
234
+
235
+ **With Swarm:**
236
+ ```
237
+ /swarm 4:security-reviewer "audit all API endpoints"
238
+ ```
239
+ Parallel security review across multiple endpoints.
240
+
241
+ **With Ralph:**
242
+ ```
243
+ /ralph security-review then fix all issues
244
+ ```
245
+ Review, fix, re-review until all issues resolved.
246
+
247
+ ## Best Practices
248
+
249
+ - **Review early** - Security by design, not afterthought
250
+ - **Review often** - Every major feature or API change
251
+ - **Automate** - Run security scans in CI/CD pipeline
252
+ - **Fix immediately** - Don't accumulate security debt
253
+ - **Educate** - Learn from findings to prevent future issues
254
+ - **Verify fixes** - Re-run security review after remediation