omgkit 2.21.7 → 2.22.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -0,0 +1,130 @@
1
+ ---
2
+ name: testing/comprehensive-testing
3
+ description: Comprehensive Omega testing workflow covering all 4 dimensions - Accuracy, Performance, Security, and Accessibility
4
+ category: testing
5
+ complexity: high
6
+ agents:
7
+ - tester
8
+ - security-auditor
9
+ - performance-engineer
10
+ - code-reviewer
11
+ skills:
12
+ - testing/comprehensive-testing
13
+ - testing/property-testing
14
+ - testing/mutation-testing
15
+ - testing/security-testing
16
+ - testing/performance-testing
17
+ commands:
18
+ - /quality:test-omega
19
+ - /quality:test-property
20
+ - /quality:test-mutate
21
+ - /quality:test-security
22
+ - /quality:test-performance
23
+ tags:
24
+ - testing
25
+ - quality
26
+ - omega
27
+ - comprehensive
28
+ ---
29
+
30
+ # Omega Testing Workflow
31
+
32
+ Comprehensive testing workflow that covers all 4 dimensions of software quality.
33
+
34
+ ## Overview
35
+
36
+ This workflow orchestrates comprehensive testing across:
37
+ 1. **Accuracy** - Correctness of functionality
38
+ 2. **Performance** - Speed and resource efficiency
39
+ 3. **Security** - Protection against vulnerabilities
40
+ 4. **Accessibility** - Usability for all users
41
+
42
+ ## Steps
43
+
44
+ 1. **Plan**: Define testing dimensions and coverage targets
45
+ 2. **Accuracy**: Run unit, integration, and E2E tests
46
+ 3. **Performance**: Execute benchmarks and load tests
47
+ 4. **Security**: Run OWASP and vulnerability tests
48
+ 5. **Accessibility**: Check WCAG compliance
49
+ 6. **Mutation**: Verify test quality with mutations
50
+ 7. **Report**: Generate quality dashboard
51
+
52
+ ## Workflow Phases
53
+
54
+ ### Phase 1: Test Planning
55
+ 1. Analyze codebase for testable components
56
+ 2. Identify critical paths and risk areas
57
+ 3. Define coverage targets per dimension
58
+ 4. Establish SLAs and thresholds
59
+
60
+ ### Phase 2: Accuracy Testing
61
+ 1. Run unit tests with property-based tests
62
+ 2. Execute integration tests
63
+ 3. Run E2E tests for critical flows
64
+ 4. Measure code coverage
65
+
66
+ ### Phase 3: Performance Testing
67
+ 1. Run benchmarks for key operations
68
+ 2. Execute load tests for APIs
69
+ 3. Perform memory leak detection
70
+ 4. Compare against performance budget
71
+
72
+ ### Phase 4: Security Testing
73
+ 1. Run OWASP Top 10 tests
74
+ 2. Execute injection tests
75
+ 3. Verify authentication/authorization
76
+ 4. Scan for vulnerabilities
77
+
78
+ ### Phase 5: Accessibility Testing
79
+ 1. Run WCAG compliance checks
80
+ 2. Test keyboard navigation
81
+ 3. Verify screen reader compatibility
82
+ 4. Check color contrast and focus indicators
83
+
84
+ ### Phase 6: Mutation Testing
85
+ 1. Generate code mutations
86
+ 2. Verify test quality
87
+ 3. Identify weak assertions
88
+ 4. Improve mutation score
89
+
90
+ ### Phase 7: Reporting
91
+ 1. Aggregate test results
92
+ 2. Generate quality dashboard
93
+ 3. Create action items for failures
94
+ 4. Document lessons learned
95
+
96
+ ## Quality Gates
97
+
98
+ | Dimension | Minimum | Target | Excellent |
99
+ |-----------|---------|--------|-----------|
100
+ | Unit Coverage | 80% | 90% | 95% |
101
+ | Integration Coverage | 60% | 75% | 85% |
102
+ | Performance SLA | Pass | <100ms p95 | <50ms p95 |
103
+ | Security | No critical | No high | No medium |
104
+ | Accessibility | AA | AAA partial | Full AAA |
105
+ | Mutation Score | 50% | 75% | 85% |
106
+
107
+ ## Triggers
108
+
109
+ - Pre-commit (fast tests only)
110
+ - Pre-merge (full suite)
111
+ - Scheduled (comprehensive + performance)
112
+ - Release (all + security audit)
113
+
114
+ ## Agent Responsibilities
115
+
116
+ | Agent | Responsibility |
117
+ |-------|----------------|
118
+ | tester | Unit, integration, E2E, property tests |
119
+ | security-auditor | Security tests, vulnerability scanning |
120
+ | performance-engineer | Benchmarks, load tests, profiling |
121
+ | code-reviewer | Test quality review, coverage analysis |
122
+
123
+ ## Success Criteria
124
+
125
+ - All tests pass
126
+ - Coverage meets thresholds
127
+ - No security vulnerabilities
128
+ - Performance within SLAs
129
+ - Accessibility compliant
130
+ - Mutation score above threshold
@@ -0,0 +1,196 @@
1
+ ---
2
+ name: testing/security-hardening
3
+ description: Security hardening workflow with vulnerability assessment, penetration testing, and remediation
4
+ category: testing
5
+ complexity: high
6
+ agents:
7
+ - security-auditor
8
+ - vulnerability-scanner
9
+ - tester
10
+ - fullstack-developer
11
+ skills:
12
+ - testing/security-testing
13
+ - security/owasp
14
+ - security/security-hardening
15
+ - testing/comprehensive-testing
16
+ commands:
17
+ - /quality:test-security
18
+ - /security:scan
19
+ - /quality:security-scan
20
+ tags:
21
+ - security
22
+ - testing
23
+ - hardening
24
+ - owasp
25
+ ---
26
+
27
+ # Security Hardening Workflow
28
+
29
+ Comprehensive security testing and hardening workflow.
30
+
31
+ ## Overview
32
+
33
+ This workflow provides systematic security assessment and hardening through:
34
+ 1. Vulnerability scanning and assessment
35
+ 2. Penetration testing simulation
36
+ 3. Security test development
37
+ 4. Remediation and verification
38
+
39
+ ## Steps
40
+
41
+ 1. **Inventory**: Identify assets, endpoints, and data flows
42
+ 2. **Scan**: Run vulnerability and dependency scanning
43
+ 3. **Test**: Execute OWASP Top 10 test suite
44
+ 4. **Penetrate**: Simulate attacker perspective
45
+ 5. **Remediate**: Fix vulnerabilities by severity
46
+ 6. **Verify**: Re-run tests and confirm fixes
47
+ 7. **Document**: Update security documentation
48
+
49
+ ## Workflow Phases
50
+
51
+ ### Phase 1: Asset Inventory
52
+ 1. Identify all endpoints and entry points
53
+ 2. Map authentication/authorization flows
54
+ 3. Catalog sensitive data handling
55
+ 4. Document third-party dependencies
56
+
57
+ ### Phase 2: Vulnerability Assessment
58
+ 1. Run dependency vulnerability scan
59
+ 2. Perform static analysis (SAST)
60
+ 3. Execute dynamic analysis (DAST)
61
+ 4. Review security configurations
62
+
63
+ ```bash
64
+ # Dependency scanning
65
+ npm audit
66
+ npx snyk test
67
+
68
+ # Static analysis
69
+ npx eslint --plugin security .
70
+
71
+ # Configuration review
72
+ npx audit-ci
73
+ ```
74
+
75
+ ### Phase 3: OWASP Top 10 Testing
76
+
77
+ #### A01: Injection
78
+ - SQL injection tests
79
+ - Command injection tests
80
+ - XSS tests
81
+ - YAML/XML injection tests
82
+
83
+ #### A02: Broken Authentication
84
+ - Password policy tests
85
+ - Session management tests
86
+ - Token validation tests
87
+ - Brute force protection tests
88
+
89
+ #### A03: Sensitive Data Exposure
90
+ - Encryption at rest tests
91
+ - Encryption in transit tests
92
+ - PII handling tests
93
+ - Secret exposure tests
94
+
95
+ #### A04: Access Control
96
+ - Horizontal escalation tests
97
+ - Vertical escalation tests
98
+ - Resource ownership tests
99
+ - CORS configuration tests
100
+
101
+ #### A05: Security Misconfiguration
102
+ - Default credential tests
103
+ - Debug mode tests
104
+ - Error handling tests
105
+ - Security header tests
106
+
107
+ #### A06: Vulnerable Components
108
+ - Dependency audit
109
+ - Known CVE checks
110
+ - Outdated package detection
111
+
112
+ #### A07: Auth Failures
113
+ - Login flow tests
114
+ - Password reset tests
115
+ - MFA bypass attempts
116
+ - Session fixation tests
117
+
118
+ #### A08: Data Integrity
119
+ - Input validation tests
120
+ - File upload tests
121
+ - Deserialization tests
122
+
123
+ #### A09: Logging Failures
124
+ - Audit log tests
125
+ - Log injection tests
126
+ - Sensitive data in logs tests
127
+
128
+ #### A10: SSRF
129
+ - URL validation tests
130
+ - Internal network access tests
131
+ - Redirect tests
132
+
133
+ ### Phase 4: Penetration Testing
134
+ 1. Simulate attacker perspective
135
+ 2. Test attack chains
136
+ 3. Verify defense in depth
137
+ 4. Document exploitation paths
138
+
139
+ ### Phase 5: Remediation
140
+ 1. Prioritize by severity and exploitability
141
+ 2. Develop fixes for each vulnerability
142
+ 3. Write tests to prevent regression
143
+ 4. Review and approve fixes
144
+
145
+ ### Phase 6: Verification
146
+ 1. Re-run all security tests
147
+ 2. Verify fixes are effective
148
+ 3. Ensure no new vulnerabilities
149
+ 4. Update security documentation
150
+
151
+ ## Severity Levels
152
+
153
+ | Level | Response Time | Examples |
154
+ |-------|---------------|----------|
155
+ | Critical | 24 hours | RCE, auth bypass, data breach |
156
+ | High | 1 week | SQL injection, XSS, CSRF |
157
+ | Medium | 1 month | Info disclosure, weak crypto |
158
+ | Low | Next release | Minor misconfigs, best practices |
159
+
160
+ ## Security Headers Checklist
161
+
162
+ ```
163
+ Content-Security-Policy: default-src 'self'
164
+ X-Content-Type-Options: nosniff
165
+ X-Frame-Options: DENY
166
+ X-XSS-Protection: 1; mode=block
167
+ Strict-Transport-Security: max-age=31536000
168
+ Referrer-Policy: strict-origin-when-cross-origin
169
+ Permissions-Policy: geolocation=()
170
+ ```
171
+
172
+ ## Agent Responsibilities
173
+
174
+ | Agent | Responsibility |
175
+ |-------|----------------|
176
+ | security-auditor | Overall security assessment, OWASP review |
177
+ | vulnerability-scanner | Automated scanning, CVE detection |
178
+ | tester | Security test development |
179
+ | fullstack-developer | Remediation implementation |
180
+
181
+ ## Quality Gates
182
+
183
+ - No critical vulnerabilities
184
+ - No high vulnerabilities in new code
185
+ - All OWASP categories tested
186
+ - Security headers configured
187
+ - Dependencies up to date
188
+ - Secrets not exposed
189
+
190
+ ## Success Criteria
191
+
192
+ - All critical/high vulnerabilities resolved
193
+ - Security test suite comprehensive
194
+ - No regression in security posture
195
+ - Documentation updated
196
+ - Team security awareness increased
@@ -0,0 +1,181 @@
1
+ ---
2
+ name: testing/test-driven-development
3
+ description: Test-Driven Development workflow with red-green-refactor cycle and continuous test feedback
4
+ category: testing
5
+ complexity: medium
6
+ agents:
7
+ - tester
8
+ - fullstack-developer
9
+ - code-reviewer
10
+ skills:
11
+ - methodology/test-driven-development
12
+ - testing/comprehensive-testing
13
+ - testing/property-testing
14
+ - testing/vitest
15
+ commands:
16
+ - /dev:test
17
+ - /dev:feature
18
+ - /quality:test-property
19
+ tags:
20
+ - testing
21
+ - tdd
22
+ - methodology
23
+ - development
24
+ ---
25
+
26
+ # Test-Driven Development Workflow
27
+
28
+ Systematic TDD workflow following the red-green-refactor cycle.
29
+
30
+ ## Overview
31
+
32
+ This workflow implements Test-Driven Development where:
33
+ 1. **Red** - Write a failing test first
34
+ 2. **Green** - Write minimal code to pass
35
+ 3. **Refactor** - Improve code while tests pass
36
+
37
+ ## Steps
38
+
39
+ 1. **Analyze**: Break down feature into testable behaviors
40
+ 2. **Red**: Write a failing test first
41
+ 3. **Green**: Write minimal code to pass the test
42
+ 4. **Refactor**: Improve code while tests pass
43
+ 5. **Iterate**: Add more tests and repeat
44
+ 6. **Integrate**: Run full test suite and commit
45
+
46
+ ## Workflow Phases
47
+
48
+ ### Phase 1: Requirement Analysis
49
+ 1. Break down feature into testable behaviors
50
+ 2. Identify edge cases and error conditions
51
+ 3. Define expected inputs and outputs
52
+ 4. Prioritize test cases by importance
53
+
54
+ ### Phase 2: Red Phase - Write Failing Test
55
+ 1. Write the simplest test that fails
56
+ 2. Verify test fails for the right reason
57
+ 3. Ensure test is readable and descriptive
58
+ 4. Add assertions for expected behavior
59
+
60
+ ```javascript
61
+ // Example: Red phase
62
+ describe('calculateDiscount', () => {
63
+ it('applies 10% discount for orders over $100', () => {
64
+ const order = { total: 150 };
65
+ expect(calculateDiscount(order)).toBe(15);
66
+ });
67
+ });
68
+ // Run: Test should fail (function doesn't exist yet)
69
+ ```
70
+
71
+ ### Phase 3: Green Phase - Make Test Pass
72
+ 1. Write minimal code to pass the test
73
+ 2. Don't worry about elegance yet
74
+ 3. Focus on correctness only
75
+ 4. Verify test passes
76
+
77
+ ```javascript
78
+ // Example: Green phase
79
+ function calculateDiscount(order) {
80
+ if (order.total > 100) {
81
+ return order.total * 0.1;
82
+ }
83
+ return 0;
84
+ }
85
+ // Run: Test should pass now
86
+ ```
87
+
88
+ ### Phase 4: Refactor Phase - Improve Code
89
+ 1. Clean up implementation
90
+ 2. Remove duplication
91
+ 3. Improve naming and structure
92
+ 4. Verify tests still pass
93
+
94
+ ```javascript
95
+ // Example: Refactor phase
96
+ const DISCOUNT_THRESHOLD = 100;
97
+ const DISCOUNT_RATE = 0.1;
98
+
99
+ function calculateDiscount(order) {
100
+ return order.total > DISCOUNT_THRESHOLD
101
+ ? order.total * DISCOUNT_RATE
102
+ : 0;
103
+ }
104
+ // Run: Tests should still pass
105
+ ```
106
+
107
+ ### Phase 5: Add More Tests
108
+ 1. Add edge cases
109
+ 2. Add error handling tests
110
+ 3. Add property-based tests
111
+ 4. Repeat red-green-refactor
112
+
113
+ ```javascript
114
+ // Additional tests
115
+ it('returns 0 for orders exactly $100', () => {
116
+ expect(calculateDiscount({ total: 100 })).toBe(0);
117
+ });
118
+
119
+ it('returns 0 for orders under $100', () => {
120
+ expect(calculateDiscount({ total: 50 })).toBe(0);
121
+ });
122
+
123
+ it('handles negative totals', () => {
124
+ expect(calculateDiscount({ total: -10 })).toBe(0);
125
+ });
126
+ ```
127
+
128
+ ### Phase 6: Integration
129
+ 1. Run full test suite
130
+ 2. Check coverage metrics
131
+ 3. Update documentation
132
+ 4. Commit with test evidence
133
+
134
+ ## TDD Best Practices
135
+
136
+ ### Do
137
+ - Write tests before implementation
138
+ - Keep tests focused and simple
139
+ - Test one thing at a time
140
+ - Use descriptive test names
141
+ - Refactor only when green
142
+
143
+ ### Don't
144
+ - Skip the red phase
145
+ - Write multiple tests at once
146
+ - Over-engineer in green phase
147
+ - Refactor while tests fail
148
+ - Ignore edge cases
149
+
150
+ ## F.I.R.S.T. Principles
151
+
152
+ | Principle | Description |
153
+ |-----------|-------------|
154
+ | **Fast** | Tests run in milliseconds |
155
+ | **Independent** | No test depends on another |
156
+ | **Repeatable** | Same result every time |
157
+ | **Self-Validating** | Pass or fail, no manual check |
158
+ | **Timely** | Written before or with code |
159
+
160
+ ## Agent Responsibilities
161
+
162
+ | Agent | Responsibility |
163
+ |-------|----------------|
164
+ | tester | Write failing tests, verify coverage |
165
+ | fullstack-developer | Implement to pass tests |
166
+ | code-reviewer | Review test quality, suggest improvements |
167
+
168
+ ## Quality Gates
169
+
170
+ - All tests pass
171
+ - Coverage above 80%
172
+ - No skipped tests
173
+ - Property tests included for pure functions
174
+ - Edge cases documented
175
+
176
+ ## Success Criteria
177
+
178
+ - Feature implemented with full test coverage
179
+ - All edge cases handled
180
+ - Code is refactored and clean
181
+ - Tests serve as documentation