qa-workflow-cc 1.0.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +461 -0
- package/VERSION +1 -0
- package/bin/install.js +116 -0
- package/commands/qa/continue.md +77 -0
- package/commands/qa/full.md +149 -0
- package/commands/qa/init.md +105 -0
- package/commands/qa/resume.md +91 -0
- package/commands/qa/status.md +66 -0
- package/package.json +28 -0
- package/skills/qa/SKILL.md +420 -0
- package/skills/qa/references/continuation-format.md +58 -0
- package/skills/qa/references/exit-criteria.md +53 -0
- package/skills/qa/references/lifecycle.md +181 -0
- package/skills/qa/references/model-profiles.md +77 -0
- package/skills/qa/templates/agent-skeleton.md +733 -0
- package/skills/qa/templates/component-test.md +1088 -0
- package/skills/qa/templates/domain-research-queries.md +101 -0
- package/skills/qa/templates/domain-security-profiles.md +182 -0
- package/skills/qa/templates/e2e-test.md +1200 -0
- package/skills/qa/templates/nielsen-heuristics.md +274 -0
- package/skills/qa/templates/performance-benchmarks-base.md +321 -0
- package/skills/qa/templates/qa-report-template.md +271 -0
- package/skills/qa/templates/security-checklist-owasp.md +451 -0
- package/skills/qa/templates/stop-points/bootstrap-complete.md +36 -0
- package/skills/qa/templates/stop-points/certified.md +25 -0
- package/skills/qa/templates/stop-points/escalated.md +32 -0
- package/skills/qa/templates/stop-points/fix-ready.md +43 -0
- package/skills/qa/templates/stop-points/phase-transition.md +4 -0
- package/skills/qa/templates/stop-points/status-dashboard.md +32 -0
- package/skills/qa/templates/test-standards.md +652 -0
- package/skills/qa/templates/unit-test.md +998 -0
- package/skills/qa/templates/visual-regression.md +418 -0
- package/skills/qa/workflows/bootstrap.md +45 -0
- package/skills/qa/workflows/decision-gate.md +66 -0
- package/skills/qa/workflows/fix-execute.md +132 -0
- package/skills/qa/workflows/fix-plan.md +52 -0
- package/skills/qa/workflows/report-phase.md +64 -0
- package/skills/qa/workflows/test-phase.md +86 -0
- package/skills/qa/workflows/verify-phase.md +65 -0
|
@@ -0,0 +1,101 @@
|
|
|
1
|
+
# Domain Research Query Templates
|
|
2
|
+
|
|
3
|
+
Used by B2 research agents during bootstrap. Variables like `{version}` and `{year}` are substituted at runtime from the detected profile and current date.
|
|
4
|
+
|
|
5
|
+
---
|
|
6
|
+
|
|
7
|
+
## By Framework
|
|
8
|
+
|
|
9
|
+
| Framework | Testing Queries |
|
|
10
|
+
|-----------|----------------|
|
|
11
|
+
| nextjs | `"Next.js {version} testing best practices {year}"`, `"Next.js App Router testing patterns vitest {year}"` |
|
|
12
|
+
| expo | `"Expo React Native testing patterns {year}"`, `"React Native Testing Library best practices {year}"` |
|
|
13
|
+
| fastify | `"Fastify API testing vitest {year}"`, `"Fastify route testing patterns"` |
|
|
14
|
+
| express | `"Express.js API testing patterns {year}"`, `"supertest express integration testing"` |
|
|
15
|
+
| remix | `"Remix testing best practices {year}"`, `"Remix loader action testing patterns"` |
|
|
16
|
+
| astro | `"Astro component testing {year}"`, `"Astro SSG testing patterns"` |
|
|
17
|
+
| nuxt | `"Nuxt 3 testing best practices {year}"`, `"Nuxt vitest component testing"` |
|
|
18
|
+
|
|
19
|
+
## By Test Runner
|
|
20
|
+
|
|
21
|
+
| Runner | Queries |
|
|
22
|
+
|--------|---------|
|
|
23
|
+
| vitest | `"vitest best practices advanced patterns {year}"` |
|
|
24
|
+
| jest | `"jest testing patterns {year} performance"` |
|
|
25
|
+
| playwright | `"Playwright E2E testing patterns {year}"`, `"Playwright component testing best practices"` |
|
|
26
|
+
| cypress | `"Cypress testing patterns {year}"`, `"Cypress component testing best practices"` |
|
|
27
|
+
|
|
28
|
+
## By Auth Provider
|
|
29
|
+
|
|
30
|
+
| Provider | Security Queries |
|
|
31
|
+
|----------|-----------------|
|
|
32
|
+
| supabase | `"Supabase RLS security best practices"`, `"Supabase Row Level Security testing patterns"` |
|
|
33
|
+
| clerk | `"Clerk authentication testing patterns"`, `"Clerk JWT security best practices"` |
|
|
34
|
+
| next-auth | `"NextAuth.js security best practices {year}"`, `"NextAuth session testing"` |
|
|
35
|
+
| passport | `"Passport.js security audit checklist"`, `"Passport strategy testing patterns"` |
|
|
36
|
+
|
|
37
|
+
## By ORM
|
|
38
|
+
|
|
39
|
+
| ORM | Security Queries |
|
|
40
|
+
|-----|-----------------|
|
|
41
|
+
| prisma | `"Prisma security best practices {year}"`, `"Prisma query injection prevention"` |
|
|
42
|
+
| drizzle | `"Drizzle ORM security patterns"`, `"Drizzle query safety best practices"` |
|
|
43
|
+
| mongoose | `"Mongoose NoSQL injection prevention"`, `"MongoDB security best practices {year}"` |
|
|
44
|
+
|
|
45
|
+
## By Domain
|
|
46
|
+
|
|
47
|
+
### safety-critical
|
|
48
|
+
|
|
49
|
+
| Category | Queries |
|
|
50
|
+
|----------|---------|
|
|
51
|
+
| Testing | `"crisis app testing methodology"`, `"safety-critical web application QA"`, `"accessibility testing for vulnerable populations"` |
|
|
52
|
+
| Security | `"DV survivor app privacy requirements"`, `"safety app browser history clearing"`, `"no-tracking web application privacy"` |
|
|
53
|
+
| UX | `"crisis UX patterns stress-aware design"`, `"trauma-informed design principles"`, `"quick exit button UX best practices"` |
|
|
54
|
+
|
|
55
|
+
### healthcare
|
|
56
|
+
|
|
57
|
+
| Category | Queries |
|
|
58
|
+
|----------|---------|
|
|
59
|
+
| Testing | `"HIPAA compliance testing checklist"`, `"healthcare application QA methodology"` |
|
|
60
|
+
| Security | `"healthcare app security audit HIPAA"`, `"PHI encryption at rest and transit requirements"`, `"BAA compliance third-party services"` |
|
|
61
|
+
| UX | `"healthcare UX accessibility best practices"`, `"patient portal usability standards"` |
|
|
62
|
+
|
|
63
|
+
### e-commerce
|
|
64
|
+
|
|
65
|
+
| Category | Queries |
|
|
66
|
+
|----------|---------|
|
|
67
|
+
| Testing | `"e-commerce testing checkout flows best practices"`, `"payment integration testing patterns"` |
|
|
68
|
+
| Security | `"PCI DSS compliance web application"`, `"e-commerce security audit checklist {year}"`, `"payment tokenization best practices"` |
|
|
69
|
+
| UX | `"e-commerce conversion UX best practices {year}"`, `"checkout flow optimization patterns"` |
|
|
70
|
+
|
|
71
|
+
### multi-tenant-saas
|
|
72
|
+
|
|
73
|
+
| Category | Queries |
|
|
74
|
+
|----------|---------|
|
|
75
|
+
| Testing | `"multi-tenant data isolation testing methodology"`, `"SaaS application testing patterns"` |
|
|
76
|
+
| Security | `"SaaS security tenant isolation best practices"`, `"multi-tenant authorization testing"`, `"cross-tenant data leak prevention"` |
|
|
77
|
+
| UX | `"SaaS dashboard UX patterns {year}"`, `"multi-tenant admin panel best practices"` |
|
|
78
|
+
|
|
79
|
+
### education
|
|
80
|
+
|
|
81
|
+
| Category | Queries |
|
|
82
|
+
|----------|---------|
|
|
83
|
+
| Testing | `"LMS application testing methodology"`, `"FERPA compliance testing checklist"` |
|
|
84
|
+
| Security | `"education app FERPA security requirements"`, `"student data privacy best practices"` |
|
|
85
|
+
| UX | `"educational platform accessibility WCAG"`, `"LMS usability best practices"` |
|
|
86
|
+
|
|
87
|
+
### fintech
|
|
88
|
+
|
|
89
|
+
| Category | Queries |
|
|
90
|
+
|----------|---------|
|
|
91
|
+
| Testing | `"fintech application testing methodology"`, `"financial transaction testing patterns"` |
|
|
92
|
+
| Security | `"fintech security audit checklist {year}"`, `"KYC AML compliance testing"`, `"transaction integrity testing"` |
|
|
93
|
+
| UX | `"fintech UX trust signals best practices"`, `"banking application accessibility standards"` |
|
|
94
|
+
|
|
95
|
+
### general
|
|
96
|
+
|
|
97
|
+
| Category | Queries |
|
|
98
|
+
|----------|---------|
|
|
99
|
+
| Testing | `"web application testing best practices {year}"`, `"modern frontend testing patterns"` |
|
|
100
|
+
| Security | `"OWASP web application security {year}"`, `"OWASP Top 10 testing methodology"` |
|
|
101
|
+
| UX | `"WCAG 2.2 compliance checklist {year}"`, `"web accessibility best practices {year}"` |
|
|
@@ -0,0 +1,182 @@
|
|
|
1
|
+
# Security Profiles by Domain
|
|
2
|
+
|
|
3
|
+
Used during B6 agent generation. The matching domain profile is injected into `{{SECURITY_PROFILE}}` in the qa-security-auditor agent alongside (not replacing) the existing tenant isolation audit.
|
|
4
|
+
|
|
5
|
+
---
|
|
6
|
+
|
|
7
|
+
## safety-critical
|
|
8
|
+
|
|
9
|
+
**Priority:** Privacy > Session Security > Data Integrity
|
|
10
|
+
|
|
11
|
+
### Must-Verify Checklist
|
|
12
|
+
|
|
13
|
+
- [ ] No user tracking or analytics scripts (Google Analytics, Mixpanel, etc.)
|
|
14
|
+
- [ ] No fingerprinting libraries or behavioral tracking
|
|
15
|
+
- [ ] Session data clears completely on exit/quick-exit
|
|
16
|
+
- [ ] Browser history uses `replaceState` not `pushState` for sensitive pages
|
|
17
|
+
- [ ] No persistent `localStorage` or `sessionStorage` with identifiable data
|
|
18
|
+
- [ ] CSP headers configured — no inline scripts, no unsafe-eval
|
|
19
|
+
- [ ] Referrer policy set to `no-referrer` or `same-origin`
|
|
20
|
+
- [ ] Quick exit button does not leave breadcrumbs (no confirmation dialogs, immediate redirect)
|
|
21
|
+
- [ ] No auto-complete on sensitive form fields
|
|
22
|
+
- [ ] Metadata (page titles, tab names) does not reveal app purpose when visible to others
|
|
23
|
+
- [ ] External links open in new tab with `rel="noopener noreferrer"`
|
|
24
|
+
- [ ] No geolocation or camera/microphone access unless explicitly consented
|
|
25
|
+
- [ ] Error messages do not reveal internal system details
|
|
26
|
+
|
|
27
|
+
### Severity Adjustments
|
|
28
|
+
|
|
29
|
+
Any tracking/privacy violation → **Critical** (not Minor)
|
|
30
|
+
Session data persistence after exit → **Critical**
|
|
31
|
+
Missing quick exit → **Major**
|
|
32
|
+
|
|
33
|
+
---
|
|
34
|
+
|
|
35
|
+
## healthcare
|
|
36
|
+
|
|
37
|
+
**Priority:** HIPAA Compliance > Audit Logging > Access Control
|
|
38
|
+
|
|
39
|
+
### Must-Verify Checklist
|
|
40
|
+
|
|
41
|
+
- [ ] PHI encrypted at rest (database-level encryption or field-level)
|
|
42
|
+
- [ ] PHI encrypted in transit (TLS 1.2+ enforced)
|
|
43
|
+
- [ ] Access logging for all PHI read/write operations
|
|
44
|
+
- [ ] Audit trail immutable and tamper-evident
|
|
45
|
+
- [ ] BAA compliance verified for all third-party services handling PHI
|
|
46
|
+
- [ ] Minimum necessary access principle enforced (role-based access)
|
|
47
|
+
- [ ] Session timeout for inactive users (configurable, default 15 min)
|
|
48
|
+
- [ ] PHI not included in error messages, logs, or stack traces
|
|
49
|
+
- [ ] Data export includes only authorized fields
|
|
50
|
+
- [ ] De-identification applied when PHI used for analytics
|
|
51
|
+
- [ ] Breach notification mechanism exists
|
|
52
|
+
|
|
53
|
+
### Severity Adjustments
|
|
54
|
+
|
|
55
|
+
PHI exposure without encryption → **Critical**
|
|
56
|
+
Missing audit log for PHI access → **Critical**
|
|
57
|
+
BAA missing for PHI-handling service → **Major**
|
|
58
|
+
|
|
59
|
+
---
|
|
60
|
+
|
|
61
|
+
## e-commerce
|
|
62
|
+
|
|
63
|
+
**Priority:** PCI DSS > Payment Security > Customer Data Protection
|
|
64
|
+
|
|
65
|
+
### Must-Verify Checklist
|
|
66
|
+
|
|
67
|
+
- [ ] Payment card data NEVER stored client-side (not even temporarily)
|
|
68
|
+
- [ ] PCI DSS compliance for checkout flow (tokenized processing)
|
|
69
|
+
- [ ] Payment forms served over HTTPS with valid certificates
|
|
70
|
+
- [ ] Credit card fields use dedicated iframes (Stripe Elements, etc.)
|
|
71
|
+
- [ ] Order confirmation does not display full card number
|
|
72
|
+
- [ ] Secure session management during checkout (no session fixation)
|
|
73
|
+
- [ ] CSRF protection on all payment endpoints
|
|
74
|
+
- [ ] Rate limiting on checkout/payment endpoints
|
|
75
|
+
- [ ] Price manipulation prevented (server-side validation of totals)
|
|
76
|
+
- [ ] Inventory race conditions handled (optimistic locking or reservations)
|
|
77
|
+
- [ ] Refund/void operations require elevated authorization
|
|
78
|
+
|
|
79
|
+
### Severity Adjustments
|
|
80
|
+
|
|
81
|
+
Payment data stored client-side → **Critical**
|
|
82
|
+
Price manipulation possible → **Critical**
|
|
83
|
+
Missing CSRF on payment endpoints → **Critical**
|
|
84
|
+
|
|
85
|
+
---
|
|
86
|
+
|
|
87
|
+
## multi-tenant-saas
|
|
88
|
+
|
|
89
|
+
**Priority:** Tenant Isolation > Authorization > Authentication
|
|
90
|
+
|
|
91
|
+
### Must-Verify Checklist
|
|
92
|
+
|
|
93
|
+
- [ ] Every database query filters by tenant field from authenticated context
|
|
94
|
+
- [ ] No cross-tenant data leaks in list views, detail views, or search results
|
|
95
|
+
- [ ] Tenant field set on all CREATE operations from authenticated context
|
|
96
|
+
- [ ] UPDATE/DELETE operations verify record belongs to authenticated tenant
|
|
97
|
+
- [ ] Admin vs user role separation enforced at API level
|
|
98
|
+
- [ ] API rate limiting applied per tenant (not just per IP)
|
|
99
|
+
- [ ] Tenant-scoped file uploads (no shared storage without isolation)
|
|
100
|
+
- [ ] Invitation/sharing flows validate target tenant context
|
|
101
|
+
- [ ] Webhook payloads include tenant context for verification
|
|
102
|
+
- [ ] Database indexes include tenant field for performance
|
|
103
|
+
- [ ] Raw SQL queries (if any) include tenant filter
|
|
104
|
+
|
|
105
|
+
### Severity Adjustments
|
|
106
|
+
|
|
107
|
+
Cross-tenant data access → **Critical**
|
|
108
|
+
Missing tenant filter on any query → **Critical**
|
|
109
|
+
Role bypass (user accessing admin) → **Critical**
|
|
110
|
+
|
|
111
|
+
---
|
|
112
|
+
|
|
113
|
+
## education
|
|
114
|
+
|
|
115
|
+
**Priority:** FERPA Compliance > Student Data Privacy > Access Control
|
|
116
|
+
|
|
117
|
+
### Must-Verify Checklist
|
|
118
|
+
|
|
119
|
+
- [ ] Student records (PII) encrypted at rest and in transit
|
|
120
|
+
- [ ] Parental consent mechanisms for minors (if applicable)
|
|
121
|
+
- [ ] Directory information opt-out respected
|
|
122
|
+
- [ ] Access limited to "legitimate educational interest"
|
|
123
|
+
- [ ] Student data not shared with third parties without consent
|
|
124
|
+
- [ ] Grades/assessments visible only to authorized roles
|
|
125
|
+
- [ ] Audit trail for student record access
|
|
126
|
+
- [ ] Data retention policies enforced (auto-deletion after period)
|
|
127
|
+
- [ ] Export functionality limited to authorized administrators
|
|
128
|
+
|
|
129
|
+
### Severity Adjustments
|
|
130
|
+
|
|
131
|
+
Student PII exposure → **Critical**
|
|
132
|
+
Unauthorized grade access → **Critical**
|
|
133
|
+
Missing parental consent for minors → **Major**
|
|
134
|
+
|
|
135
|
+
---
|
|
136
|
+
|
|
137
|
+
## fintech
|
|
138
|
+
|
|
139
|
+
**Priority:** Transaction Integrity > KYC/AML Compliance > Audit Trail
|
|
140
|
+
|
|
141
|
+
### Must-Verify Checklist
|
|
142
|
+
|
|
143
|
+
- [ ] Transaction operations are atomic and idempotent
|
|
144
|
+
- [ ] Idempotency keys enforced on all mutation endpoints
|
|
145
|
+
- [ ] Double-spend prevention mechanisms in place
|
|
146
|
+
- [ ] KYC verification flow enforced before financial operations
|
|
147
|
+
- [ ] AML screening integration for flagged transactions
|
|
148
|
+
- [ ] Complete audit trail for all financial operations (immutable)
|
|
149
|
+
- [ ] Monetary calculations use decimal/BigInt (not floating point)
|
|
150
|
+
- [ ] Currency handling explicit (no implicit conversions)
|
|
151
|
+
- [ ] Account balance reconciliation mechanisms exist
|
|
152
|
+
- [ ] Withdrawal limits enforced server-side
|
|
153
|
+
- [ ] API rate limiting on financial endpoints
|
|
154
|
+
|
|
155
|
+
### Severity Adjustments
|
|
156
|
+
|
|
157
|
+
Double-spend possible → **Critical**
|
|
158
|
+
Floating-point money calculations → **Critical**
|
|
159
|
+
Missing idempotency on mutations → **Major**
|
|
160
|
+
KYC bypass → **Critical**
|
|
161
|
+
|
|
162
|
+
---
|
|
163
|
+
|
|
164
|
+
## general
|
|
165
|
+
|
|
166
|
+
**Priority:** Authentication > Authorization > Input Validation
|
|
167
|
+
|
|
168
|
+
### Must-Verify Checklist
|
|
169
|
+
|
|
170
|
+
- [ ] OWASP Top 10 baseline checks (see security-checklist-owasp.md)
|
|
171
|
+
- [ ] Input validation at all system boundaries (user input, API params)
|
|
172
|
+
- [ ] Output encoding to prevent XSS
|
|
173
|
+
- [ ] SQL/NoSQL injection prevention (parameterized queries)
|
|
174
|
+
- [ ] Authentication tokens properly managed (HttpOnly, Secure, SameSite)
|
|
175
|
+
- [ ] CORS configured to allow only expected origins
|
|
176
|
+
- [ ] Error responses do not leak internal details (stack traces, DB schema)
|
|
177
|
+
- [ ] Dependency audit (no known vulnerabilities in production deps)
|
|
178
|
+
- [ ] Rate limiting on authentication endpoints
|
|
179
|
+
|
|
180
|
+
### Severity Adjustments
|
|
181
|
+
|
|
182
|
+
Standard OWASP severity mapping applies. No domain-specific adjustments.
|