sneakoscope 0.7.66 → 0.7.68

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/README.md CHANGED
@@ -1,7 +1,5 @@
1
1
  # Sneakoscope Codex
2
2
 
3
- ![](https://github.com/mandarange/Sneakoscope-Codex/raw/dev/docs/assets/sneakoscope-codex-logo.png)
4
-
5
3
  Sneakoscope Codex (`sks`) is a Codex CLI/App harness for repeatable workflows. It adds terminal commands, Codex App `$` commands, tmux workspaces, Team/QA/Research routes, pipeline plans, Computer Use, imagegen UI/UX review, Goal, Context7, DB safety, TriWiki, design-system routing, skill dreaming, Honest Mode.
6
4
 
7
5
  ## Quick Start
@@ -40,32 +38,14 @@ sks selftest --mock
40
38
 
41
39
  ## What Sneakoscope Adds
42
40
 
43
- | Area | What it does |
44
- | --- | --- |
45
- | CLI runtime | Bare `sks` opens or reuses the default tmux Codex CLI workspace. `sks tmux open` remains the explicit form for session/workspace flags, and `sks --mad` launches a single-pane MAD tmux session with the explicit full-access high-reasoning profile. Split panes are reserved for active Team scout/worker lanes. |
46
- | Codex App commands | Installs generated skills so `$Team`, `$From-Chat-IMG`, `$DFix`, `$QA-LOOP`, `$PPT`, `$Image-UX-Review`, `$UX-Review`, `$Goal`, `$DB`, `$Wiki`, `$Help`, and related routes are visible in prompt workflows. `sks codex-app remote-control` wraps Codex CLI 0.130.0+ headless remote control without falling back to older app-server internals. |
47
- | OpenClaw agents | Generates an OpenClaw skill package so OpenClaw agents can attach `sneakoscope-codex`, enable the `shell` tool, and discover/use SKS commands from the target repo root. |
48
- | Pipeline plans | Writes `pipeline-plan.json` for stateful routes so the runtime lane, kept stages, skipped stages, verification commands, and no-unrequested-fallback invariant are visible with `sks pipeline plan`. |
49
- | Team orchestration | Runs substantial work through score-based ambiguity handling, scouts, TriWiki refresh, debate, runtime task graphs, worker inboxes, implementation, review, cleanup, reflection, and Honest Mode; narrow work should use Proof Field evidence to skip unrelated pipeline work instead of expanding Team. |
50
- | Skill dreaming | Records cheap generated-skill usage counters in JSON and only periodically scans `.agents/skills` for keep, merge, prune, and improvement candidates. Reports are recommendation-only and never delete skills automatically. |
51
- | From-Chat-IMG | Turns chat screenshots plus original attachments into source-bound work orders, then requires scoped QA evidence before completion. |
52
- | QA loop | Dogfoods UI/API behavior with safety gates, Codex Computer Use-only UI evidence, safe fixes, and rechecks. |
53
- | PPT pipeline | Uses `$PPT` for restrained HTML/PDF presentation artifacts with sealed delivery context, audience, STP, decision context, source research, design SSOT, export QA, editable source HTML, and real `$imagegen` assets when required. |
54
- | Image UX Review | Uses `$Image-UX-Review` / `$UX-Review` for UI/UX audits that require generated annotated review images through Codex App `$imagegen`/`gpt-image-2` before issue extraction and optional rechecks. |
55
- | Computer Use fast lane | Uses `$Computer-Use` / `$CU` for UI/browser/visual work that needs maximum speed: skip Team debate and upfront TriWiki loops, use Codex Computer Use directly, then refresh/validate TriWiki and run Honest Mode at final closeout. |
56
- | Goal | Bridges Codex native `/goal` create, pause, resume, and clear controls while implementation continues through the selected SKS route. |
57
- | TriWiki voxels | Maintains `.sneakoscope/wiki/context-pack.json` as the context SSOT with coordinate anchors, voxel metadata, `attention.use_first`, `attention.hydrate_first`, and prompt-bound mistake recall ledgers. |
58
- | Context7 | Requires current docs for external packages, APIs, MCPs, SDKs, and framework/runtime behavior when correctness depends on current guidance. |
59
- | Design SSOT | Treats `design.md` as the only design decision source of truth. `docs/Design-Sys-Prompt.md` is the builder prompt; getdesign.md, official getdesign docs, and curated DESIGN.md examples from `VoltAgent/awesome-design-md` are source inputs that must be fused into `design.md` or route-local style tokens instead of becoming parallel authorities. |
60
- | DB safety | Treats SQL, migrations, Supabase, RLS, and destructive operations as high risk. |
61
- | Release hygiene | Checks versioning, changelog, package size, syntax, selftests. |
41
+ `sks` adds a tmux Codex CLI runtime, Codex App `$` commands, Team/QA/PPT/Research/DB/GX/Wiki routes, OpenClaw skill generation, Context7-gated current docs, TriWiki context packs, DB safety, design SSOT policy, skill dreaming, release checks, and Honest Mode.
62
42
 
63
43
  ## Requirements
64
44
 
65
45
  - Node.js `>=20.11`
66
46
  - npm
67
47
  - Codex CLI for terminal workflows
68
- - Codex App for app-facing workflows, with Codex Computer Use required for UI/browser evidence and `$imagegen`/`gpt-image-2` required for generated raster assets or generated image-review evidence
48
+ - Codex App for app-facing workflows, including Codex Computer Use and `$imagegen`/`gpt-image-2` evidence when required
69
49
  - tmux for the CLI-first runtime
70
50
  - Context7 MCP for current-docs-gated routes
71
51
 
@@ -75,12 +55,7 @@ Install tmux from [tmux.dev/download](https://www.tmux.dev/download). On macOS,
75
55
  brew install tmux
76
56
  ```
77
57
 
78
- The default `sks` runtime checks npm for newer `sneakoscope` and `@openai/codex` versions before opening tmux and prompts to update when the terminal can answer y/n. If you approve the Codex CLI update, SKS installs `@openai/codex@latest` and opens tmux with the version visible on PATH. `sks --mad` is stricter than the normal runtime path:
79
-
80
- - Checks npm for newer `sneakoscope` and `@openai/codex` versions before launch and asks whether to update when the terminal can answer y/n.
81
- - Installs the latest Codex CLI with `npm i -g @openai/codex@latest` when it is missing and you approve or pass `--yes`.
82
- - Requires tmux 3.x or newer before opening the session.
83
- - Creates a named detached single-pane tmux session and prints only the session, gate, attach, and blocker details needed to act.
58
+ The default `sks` runtime checks npm for newer `sneakoscope` and `@openai/codex` versions before opening tmux. `sks --mad` also checks dependencies, requires tmux 3.x, and prints only the session, gate, attach, and blocker details needed to act.
84
59
 
85
60
  ## Installation
86
61
 
@@ -97,7 +72,7 @@ sks root
97
72
 
98
73
  Project setup writes shared `.gitignore` entries for generated SKS files: `.sneakoscope/`, `.codex/`, `.agents/`, and managed `AGENTS.md`. Setup, doctor repair, and npm postinstall refreshes also compare the previous SKS generated-file manifest with the current package templates and prune stale SKS-generated legacy skills or agent files while preserving user-owned custom skills. Use `sks setup --local-only` when you want those excludes kept only in `.git/info/exclude`.
99
74
 
100
- During npm postinstall, SKS also installs generated Codex App skills and tries the official getdesign Codex skill command, `skills add MohtashamMurshid/getdesign`, when the `skills` CLI is available. If that CLI is missing, setup still installs the generated `getdesign-reference` skill. Design work still flows through one authority: `design.md`. When `design.md` is missing, `docs/Design-Sys-Prompt.md` is the builder prompt and getdesign plus curated DESIGN.md examples such as [VoltAgent/awesome-design-md](https://github.com/VoltAgent/awesome-design-md) are inputs to fuse into that SSOT or into route-local `$PPT` style tokens.
75
+ During npm postinstall, SKS installs generated Codex App skills and tries `skills add MohtashamMurshid/getdesign` when the `skills` CLI is available. Design work still flows through one authority: `design.md`.
101
76
 
102
77
  ### One-Shot Install
103
78
 
@@ -179,9 +154,9 @@ sks codex-lb repair
179
154
  sks
180
155
  ```
181
156
 
182
- Bare `sks` can also prompt for codex-lb auth before launch; SKS stores the key in `~/.codex/sks-codex-lb.env`, syncs `codex login --with-api-key`, and loads it into a fresh tmux session.
157
+ Bare `sks` can also prompt for codex-lb auth; SKS stores the base URL/key in `~/.codex/sks-codex-lb.env`, syncs `codex login --with-api-key`, and loads it in tmux.
183
158
 
184
- If Codex CLI auth drifts after a launch or reinstall, run `sks codex-lb repair`; to replace it, run `sks codex-lb reconfigure --host <domain> --api-key <key>`.
159
+ If Codex CLI auth drifts after launch/reinstall, run `sks doctor --fix` or `sks codex-lb repair`; to replace it, run `sks codex-lb reconfigure --host <domain> --api-key <key>`.
185
160
 
186
161
  ### MAD tmux Launch
187
162
 
@@ -190,17 +165,9 @@ sks --mad
190
165
  sks --mad --yes
191
166
  ```
192
167
 
193
- This syncs existing codex-lb/Codex CLI auth before launch, creates/uses the `sks-mad-high` Codex profile for a one-shot full-access, high-reasoning tmux session with `sandbox_mode = "danger-full-access"` and `approval_policy = "never"`, opens an active MAD-SKS permission gate for that tmux run, then launches a single Codex CLI pane. The session recreates the named session on launch so stale split-pane MAD sessions collapse back to the single-pane default, then attaches in an interactive terminal. If codex-lb is configured and no explicit `--workspace`/`--session` was passed, SKS opens a fresh tmux session so the repaired key is loaded by the Codex process immediately. While the gate is active, live server work, Supabase MCP database writes, direct SQL, targeted DML, schema cleanup, Supabase MCP `apply_migration`, and required Supabase CLI migration application such as `supabase migration up` or `supabase db push` are allowed. Catastrophic database wipe/all-row/project-management safeguards remain active.
168
+ This syncs existing codex-lb/Codex CLI auth, creates/uses the `sks-mad-high` full-access profile, opens the MAD-SKS permission gate for that tmux run, and launches a single Codex CLI pane. The session recreates the named session so stale split-pane MAD sessions collapse back to one pane. Catastrophic database wipe/all-row/project-management safeguards remain active, and the pipeline contract still forbids unrequested fallback implementation code.
194
169
 
195
- MAD does not disable the pipeline contract: stages, executors, reviewers, and auto-review policy still must not invent unrequested fallback implementation code. If the requested path cannot be implemented, SKS should block with evidence rather than add substitute behavior.
196
-
197
- Before launching, SKS checks whether a newer `sneakoscope` exists on npm. In an interactive terminal it prompts:
198
-
199
- ```text
200
- SKS 0.x.y -> 0.x.z update before MAD launch? [Y/n]
201
- ```
202
-
203
- Answer `y` to install `sneakoscope@latest`, then rerun `sks --mad`. Answer `n` to continue with the current version. Use `--yes` to approve missing dependency installs automatically.
170
+ Before launching, SKS checks npm for a newer `sneakoscope`; answer `y` to update or `n` to continue. Use `--yes` to approve missing dependency installs automatically.
204
171
 
205
172
  ### Team Missions
206
173
 
@@ -216,17 +183,7 @@ sks team dashboard latest
216
183
  sks team log latest
217
184
  ```
218
185
 
219
- By default, Team missions keep at least five QA/reviewer lanes active. Use explicit role counts only when you need to raise or otherwise pin the lane mix for a specific mission.
220
-
221
- Team mode prepares the mission, records live events, compiles runtime tasks and worker inboxes, writes schema-backed effort/work-order/dashboard artifacts, and reconciles split live lanes inside the current SKS-owned tmux session when available. Outside an SKS tmux session, `sks team open-tmux --separate-session` keeps the named `sks-team-*` fallback view. Use `--no-open-tmux` for artifact-only mission creation. The default terminal output stays compact: mission id, agent count, role count, tmux status, watch command, and artifact directory. `sks team dashboard` renders the cockpit panes for mission overview, agent lanes, task DAG, QA/dogfood, artifacts/evidence, and performance.
222
-
223
- The tmux Team launch is a live orchestration screen in one tmux window: the main Codex pane stays alive, a managed overview pane follows `sks team watch <mission-id> --follow`, and neighboring managed split panes follow individual `sks team lane <mission-id> --agent <name> --follow` views. Pane headers show only mission, lane, phase, follow command, and cleanup command. SKS tags Team panes with tmux user options, closes only those managed panes when agent lanes complete or cleanup is requested, and recalculates the tiled layout after split/close operations. The separate `sks-team-*` session remains available as a fallback. SKS gives lanes role-specific colors, labels, and terminal titles, so scouts, planning/debate voices, executors, reviewers, and safety lanes are visually distinct while detailed evidence is mirrored into `team-transcript.jsonl`, `team-live.md`, and `team-dashboard.json`.
224
-
225
- Team roster and runtime artifacts now include per-agent Fast reasoning metadata. Simple bounded Team lanes can use low reasoning, tool-heavy runtime/CLI/tmux work uses medium, and knowledge, current-docs, safety, DB, release, commit, or research-heavy lanes use high or xhigh as appropriate instead of opening every scout at high.
226
-
227
- Agent sessions communicate through the bounded Team transcript. Use `sks team message <mission-id|latest> --from <agent> --to <agent|all> --message "..."` to add direct or broadcast messages; lane panes show messages addressed to that agent plus the fallback global tail.
228
-
229
- When the Team route reaches `session_cleanup`, SKS marks the tmux session record complete and asks `watch --follow` / `lane --follow` panes to show a cleanup summary and stop. You can also run `sks team cleanup-tmux <mission-id|latest>` manually, or `sks team cleanup-tmux latest --close` to kill the recorded tmux session.
186
+ Team missions keep at least five QA/reviewer lanes active, record live events, compile runtime tasks and worker inboxes, write schema-backed effort/work-order/dashboard artifacts, and reconcile split live lanes in tmux when available. Use `sks team watch`, `sks team lane`, `sks team message`, and `sks team cleanup-tmux` to inspect or close the live view.
230
187
 
231
188
  ### QA, Computer Use, Goal, Research, DB, Wiki, GX
232
189
 
@@ -235,6 +192,8 @@ sks qa-loop prepare "http://localhost:3000"
235
192
  sks qa-loop run latest --max-cycles 2
236
193
  sks goal create "persist this migration workflow"
237
194
  sks research prepare "evaluate this approach"
195
+ sks research run latest --max-cycles 3
196
+ sks research status latest
238
197
  sks db scan --json
239
198
  sks wiki refresh
240
199
  sks wiki sweep latest --json
@@ -252,21 +211,13 @@ sks skill-dream run --json
252
211
  sks code-structure scan --json
253
212
  ```
254
213
 
255
- `sks pipeline plan` is the 0.7 runtime map. It reads or refreshes `.sneakoscope/missions/<id>/pipeline-plan.json`, then shows which lane is active, which stages are kept or skipped, which verification commands are required, and whether the no-unrequested-fallback invariant is present.
214
+ `sks research` prepares a genius-lens scout council, requires every scout to run at `xhigh`, records one literal `Eureka!` idea per scout, runs an evidence-bound debate, maximizes available web/source retrieval before synthesis, and requires `source-ledger.json`, `scout-ledger.json`, `debate-ledger.json`, `novelty-ledger.json`, `falsification-ledger.json`, and `research-gate.json` so research runs stay source-backed, adversarially checked, and falsifiable. `research status` reports source entries, counterevidence, xhigh scout count, Eureka moments, debate exchanges, scout findings, and falsification cases alongside the gate.
256
215
 
257
- `sks proof-field scan` is SKS's lightweight outcome rubric: it maps the goal to proof cones, records unrelated work that can be skipped with evidence, reports a simplicity score, and names escalation triggers for when the route must return to the full Team/Honest proof path. The rubric embeds Hyperplan-style adversarial pressure as compact lenses instead of a new command: challenge framing, subtract surface, demand evidence, test integration risk, and consider one simpler alternative. When `execution_lane.lane` is `proof_field_fast_lane`, SKS can keep the parent-owned minimal patch plus listed verification and skip Team debate, fresh executor teams, broad route rework, and unrelated checks. Database, security, visual-forensic, unknown, broad, failed, or unsupported-claim signals fail closed to the normal Team/Honest path. Use `sks pipeline plan --proof-field` after changed files are known to bind that Proof Field decision to the mission plan.
216
+ `sks pipeline plan` shows the active route lane, kept/skipped stages, verification commands, and no-unrequested-fallback invariant. `sks proof-field scan` is the lightweight rubric for small changes; risky or broad signals return to the full Team/Honest path.
258
217
 
259
218
  ### Ambiguity Questions
260
219
 
261
- SKS no longer starts from a fixed checklist such as `GOAL_PRECISE` and `ACCEPTANCE_CRITERIA`. The clarification gate first scores goal clarity, constraint clarity, success-criteria clarity, and codebase-context clarity, then asks only the lowest-clarity item that can change execution. Predictable UI defaults, DB safety defaults, test scope, fallback policy, and ordinary implementation acceptance criteria are inferred and sealed automatically.
262
-
263
- The design borrows two useful ideas from external planning systems without copying their route weight: Ouroboros-style ambiguity thresholds decide whether the prompt is clear enough to proceed, while Prometheus/Hyperplan-style adversarial lenses challenge framing, remove unnecessary surface, demand evidence, test integration risk, and consider a simpler alternative before Team work starts.
264
-
265
- `sks skill-dream` keeps generated skill complexity bounded without doing a heavy evaluation on every prompt. Route use writes compact counters to `.sneakoscope/skills/dream-state.json`; after the configured 10-route-event threshold and cooldown, or when you run `sks skill-dream run`, SKS scans `.agents/skills` and writes `.sneakoscope/reports/skill-dream-latest.json` with keep, merge, prune, and improvement candidates. The report is intentionally advisory: deleting or merging skills requires explicit approval.
266
-
267
- `sks goal` and `$Goal` only prepare/control the native `/goal` persistence bridge. They do not replace Team, QA, DB, or other implementation routes; use the selected execution route for the actual work and verification. Context7 is only needed for Goal when external API/library documentation becomes relevant.
268
-
269
- Use `$Computer-Use` or `$CU` inside Codex App when the task specifically needs Codex Computer Use speed for UI/browser/visual work. This lane intentionally skips Team debate, QA-LOOP clarification, subagents, and upfront TriWiki refresh. It still requires Codex Computer Use as the evidence source, and it defers TriWiki refresh/validate plus Honest Mode to the final closeout. SKS does not install a generated skill named `computer-use`, because that name is reserved for the first-party Codex Computer Use plugin; use `$CU` or `$computer-use-fast` from the SKS picker for the SKS route, and use `@Computer` for the OpenAI plugin.
220
+ Clarification asks only for ambiguity that changes execution; predictable defaults are inferred and sealed. `sks skill-dream` records cheap counters and periodically writes advisory skill reports. `$Goal` controls native `/goal` persistence without replacing the selected execution route. `$Computer-Use` / `$CU` is the fast Codex Computer Use lane for UI/browser/visual work.
270
221
 
271
222
  ### Create A Presentation
272
223
 
@@ -274,9 +225,7 @@ Use `$Computer-Use` or `$CU` inside Codex App when the task specifically needs C
274
225
  $PPT create a customer proposal deck as HTML/PDF
275
226
  ```
276
227
 
277
- `$PPT` seals presentation-specific context before artifact work: delivery format, target audience, STP strategy, decision context, and at least three pain-point/solution/aha mappings. The route writes source and render evidence such as `ppt-audience-strategy.json`, `ppt-source-ledger.json`, `ppt-storyboard.json`, `ppt-style-tokens.json`, `ppt-render-report.json`, and `ppt-parallel-report.json`.
278
-
279
- Design references do not compete with each other. `design.md` is the design decision SSOT; if it is missing, SKS uses `docs/Design-Sys-Prompt.md` to build or project the system. getdesign.md, official getdesign docs, and curated DESIGN.md examples from `VoltAgent/awesome-design-md` are source inputs that get fused into `design.md` or route-local `$PPT` style tokens. `$PPT` ignores installed design skills and MCP servers that are not in the route allowlist; generic design skills such as `design-artifact-expert`, `design-ui-editor`, and `design-system-builder` are not automatically used just because they are installed. This is an anti-AI-like-design guard: `$PPT` must ground visual choices in audience, source material, getdesign reference, and the design SSOT instead of freeform cards, gradients, and vague SaaS styling.
228
+ `$PPT` seals presentation context before artifact work and grounds design in `design.md`, getdesign inputs, and source material.
280
229
 
281
230
  ## Codex App Usage
282
231
 
@@ -310,6 +259,7 @@ $DFix change this label and spacing only
310
259
  $QA-LOOP dogfood localhost:3000 and fix safe issues
311
260
  $PPT create an investor deck as HTML/PDF
312
261
  $Goal persist this migration workflow with native /goal continuation
262
+ $Research investigate this mechanism with source-backed scout lenses
313
263
  $Wiki refresh and validate the context pack
314
264
  $DB inspect this migration for destructive risk
315
265
  ```
@@ -339,41 +289,7 @@ sks openclaw install
339
289
  sks openclaw path
340
290
  ```
341
291
 
342
- By default this writes:
343
-
344
- ```text
345
- ~/.openclaw/skills/sneakoscope-codex/
346
- ```
347
-
348
- The generated skill contains `manifest.yaml`, `SKILL.md`, a skill README, and `openclaw-agent-config.example.yaml`. If you use a custom OpenClaw home, set `OPENCLAW_HOME` or pass `--dir`:
349
-
350
- ```sh
351
- OPENCLAW_HOME=/opt/openclaw sks openclaw install
352
- sks openclaw install --dir /opt/openclaw/skills/sneakoscope-codex
353
- ```
354
-
355
- Attach the skill to an OpenClaw agent with the built-in `shell` tool enabled:
356
-
357
- ```yaml
358
- agents:
359
- coding-agent:
360
- tools:
361
- - shell
362
- env:
363
- SKS_OPENCLAW: "1"
364
- skills:
365
- - sneakoscope-codex
366
- ```
367
-
368
- `SKS_OPENCLAW=1` tells SKS that commands are running from OpenClaw. In that mode, SKS auto-approves update/install prompts such as the Codex CLI update check before tmux launch, instead of waiting for a human `Y/n` response.
369
-
370
- Then prompt the OpenClaw agent from the target repo root:
371
-
372
- ```text
373
- Run sks root, inspect AGENTS.md, then use the SKS Team route to implement this fix and verify it.
374
- ```
375
-
376
- Useful commands for OpenClaw agents:
292
+ By default this writes `~/.openclaw/skills/sneakoscope-codex/` with `manifest.yaml`, `SKILL.md`, a README, and `openclaw-agent-config.example.yaml`. Set `OPENCLAW_HOME` or pass `--dir` for a custom location. Attach the skill with the built-in `shell` tool enabled and set `SKS_OPENCLAW=1` so SKS can auto-approve update/install prompts that would otherwise wait for `Y/n`.
377
293
 
378
294
  ```sh
379
295
  SKS_OPENCLAW=1 sks root
@@ -383,114 +299,43 @@ SKS_OPENCLAW=1 sks deps check
383
299
  SKS_OPENCLAW=1 sks proof-field scan --intent "small CLI change" --changed src/cli/main.mjs
384
300
  ```
385
301
 
386
- If OpenClaw runs the skill inside a sandbox, grant shell execution only for the trusted local workspace. Database, Supabase, migration, and destructive filesystem work should still follow the repo's SKS safety route and require explicit write scope.
302
+ If OpenClaw runs in a sandbox, grant shell execution only for trusted workspaces. Database, migration, and destructive work still follows SKS safety routes.
387
303
 
388
304
  ## Prompt `$` Commands
389
305
 
390
306
  Use these inside Codex App or another agent prompt. They are prompt commands, not terminal commands.
391
307
 
392
- | Prompt | Use when |
393
- | --- | --- |
394
- | `$Team` | You want implementation, code changes, or substantial repo work. |
395
- | `$From-Chat-IMG` | You have a chat screenshot plus original attachments and want each visible request mapped to work. |
396
- | `$DFix` | You need Direct Fix work: tiny copy/config/docs/labels/spacing/translation/simple mechanical edits, with broad implementation still routed to Team and UI design specifics handled by the relevant UI/design route rules. |
397
- | `$Answer` | You want an answer only and no implementation should start. |
398
- | `$SKS` | You need setup, status, usage, or workflow help. |
399
- | `$QA-LOOP` | You want UI/API dogfooding, safe fixes, and rechecks. |
400
- | `$PPT` | You want a restrained HTML/PDF presentation with sealed delivery context, audience profile, STP strategy, decision context, and 3+ pain-point/solution/aha mappings. |
401
- | `$Computer-Use` / `$CU` | You want the fastest Codex Computer Use lane for UI/browser/visual inspection or small safe fixes. |
402
- | `$Goal` | You want a fast SKS bridge overlay for Codex native persisted `/goal` continuation. |
403
- | `$Research` | You need frontier-style research with hypotheses and falsification. |
404
- | `$AutoResearch` | You want iterative improve/test/keep-or-discard optimization. |
405
- | `$DB` | You need database, Supabase, migration, SQL, or MCP safety checks. |
406
- | `$MAD-SKS` | You explicitly authorize scoped Supabase MCP DB cleanup/write permissions for the active invocation only, while keeping catastrophic wipe safeguards. |
407
- | `$GX` | You need deterministic visual context cartridges. |
408
- | `$Wiki` | You want TriWiki refresh, pack, prune, validate, or maintenance. |
409
- | `$Help` | You want installed command and workflow explanation. |
308
+ Common prompts: `$Team`, `$From-Chat-IMG`, `$DFix`, `$Answer`, `$SKS`, `$QA-LOOP`, `$PPT`, `$Computer-Use`/`$CU`, `$Goal`, `$Research`, `$AutoResearch`, `$DB`, `$MAD-SKS`, `$GX`, `$Wiki`, and `$Help`.
410
309
 
411
310
  ## Common Workflows
412
311
 
413
- ### First Install Checklist
414
-
415
- 1. Install SKS.
312
+ First install:
416
313
 
417
314
  ```sh
418
315
  npm i -g sneakoscope
419
- ```
420
-
421
- 2. Bootstrap and check dependencies.
422
-
423
- ```sh
424
316
  sks bootstrap
425
317
  sks deps check
426
- ```
427
-
428
- On macOS, missing tmux installs and Homebrew-managed tmux upgrades ask `Y/n` before running `brew install tmux` or `brew upgrade tmux`. If PATH resolves an npm-managed `tmux`, SKS prompts for `npm i -g tmux@latest` instead of using Homebrew. Unknown non-Homebrew `tmux` paths are reported as conflicts so the user can remove, upgrade with the owning package manager, or reorder PATH first.
429
-
430
- 3. Confirm Codex App command surfaces.
431
-
432
- ```sh
433
318
  sks codex-app check
434
- sks dollar-commands
435
- ```
436
-
437
- 4. Optional codex-lb key setup for CLI `sks` runs.
438
-
439
- ```sh
440
- sks codex-lb setup --host <domain> --api-key <key>
441
- sks codex-lb repair
442
- sks
443
- ```
444
-
445
- 5. Run a local smoke test.
446
-
447
- ```sh
448
319
  sks selftest --mock
449
320
  ```
450
321
 
451
- ### Start A CLI Workspace
322
+ Start a CLI workspace:
452
323
 
453
324
  ```sh
454
325
  sks tmux check
455
326
  sks
327
+ # or: sks --mad
456
328
  ```
457
329
 
458
- `sks tmux open` is the equivalent explicit launch form when you want to pass tmux session flags.
330
+ Use Codex App routes with `$Team`, `$DFix`, `$QA-LOOP`, `$PPT`, `$Goal`, `$Wiki`, and `$DB`. Team missions write artifacts under `.sneakoscope/missions/`; validate them with `sks validate-artifacts latest`.
459
331
 
460
- For the high-reasoning full-access profile:
461
-
462
- ```sh
463
- sks --mad
464
- ```
465
-
466
- ### Use Codex App `$Team`
467
-
468
- ```text
469
- $Team implement the requested change, update docs if needed, and verify with the relevant tests
470
- ```
471
-
472
- Team mode records a mission under `.sneakoscope/missions/`, keeps a live transcript, uses TriWiki context, and finishes with evidence and Honest Mode.
473
- Every new Team mission now also writes `work-order-ledger.json`, `effort-decision.json`, and `team-dashboard-state.json`. Run `sks validate-artifacts latest` to check the schema gates before treating mission artifacts as completion evidence.
474
-
475
- ### Dogfood A UI Or API
476
-
477
- ```sh
478
- sks qa-loop prepare "http://localhost:3000"
479
- sks qa-loop run latest --max-cycles 2
480
- sks qa-loop status latest
481
- ```
482
-
483
- Use `$QA-LOOP` in Codex App when UI-level E2E needs verification. UI verification must use Codex Computer Use evidence only; Chrome MCP, Browser Use, Playwright, Selenium, Puppeteer, and other browser automation do not satisfy UI-level E2E verification.
484
-
485
- ### Refresh Context Before Risky Work
332
+ Refresh context before risky work:
486
333
 
487
334
  ```sh
488
335
  sks wiki refresh
489
336
  sks wiki validate .sneakoscope/wiki/context-pack.json
490
337
  ```
491
338
 
492
- TriWiki is the long-running context source of truth. It keeps compact high-trust recall in `attention.use_first`, source-hydration targets in `attention.hydrate_first`, and binds relevant prior-mistake claims into the current decision contract when they match the prompt.
493
-
494
339
  ## Safety Model
495
340
 
496
341
  Sneakoscope intentionally treats these as high-risk:
@@ -514,7 +359,7 @@ node ./bin/sks.mjs --version
514
359
  npm install -g .
515
360
  ```
516
361
 
517
- If the global command is stale, reinstall globally from the repo or from npm.
362
+ If stale, reinstall globally from the repo or npm.
518
363
 
519
364
  ### tmux is missing
520
365
 
@@ -523,7 +368,7 @@ sks deps install tmux
523
368
  sks tmux check
524
369
  ```
525
370
 
526
- Install tmux from [tmux.dev/download](https://www.tmux.dev/download) or run `brew install tmux` on macOS, then re-run `sks tmux check`.
371
+ Install tmux from [tmux.dev/download](https://www.tmux.dev/download) or `brew install tmux` on macOS, then re-run the check.
527
372
 
528
373
  ### Codex App tools are missing
529
374
 
@@ -532,9 +377,7 @@ sks codex-app check
532
377
  codex mcp list
533
378
  ```
534
379
 
535
- Codex App workflows need the app installed. QA and UI/browser visual-evidence workflows require first-party Codex Computer Use; Browser Use may support non-UI browser context, but it is not valid UI/browser verification evidence. Generated raster assets and image-review evidence require real Codex App `$imagegen`/`gpt-image-2` output, or the route must stay blocked/unverified.
536
-
537
- SKS setup removes old SKS-generated `computer-use` skills from `.agents/skills` so they cannot shadow the first-party Computer Use plugin. If a running Codex App thread was opened before setup or upgrade, start a fresh thread and invoke `@Computer` or Browser again so the host reloads plugin tools.
380
+ Codex App workflows need the app installed. UI/browser evidence requires first-party Codex Computer Use, and generated raster/image-review evidence requires real `$imagegen`/`gpt-image-2` output. After setup/upgrade, start a fresh thread so Codex reloads plugin tools.
538
381
 
539
382
  ### Setup is blocked by another harness
540
383
 
@@ -543,7 +386,7 @@ sks conflicts check
543
386
  sks conflicts prompt
544
387
  ```
545
388
 
546
- OMX/DCodex conflicts intentionally block setup/doctor until the user approves cleanup.
389
+ OMX/DCodex conflicts block setup/doctor until the user approves cleanup.
547
390
 
548
391
  ### The route is stuck or a final hook keeps reopening
549
392
 
@@ -554,7 +397,7 @@ sks team lane latest --agent parent_orchestrator --follow
554
397
  sks wiki validate .sneakoscope/wiki/context-pack.json
555
398
  ```
556
399
 
557
- Finalization requires real evidence, no unsupported critical claims, valid Team cleanup artifacts, reflection when required, and Honest Mode.
400
+ Finalization requires evidence, valid Team cleanup artifacts, reflection when required, and Honest Mode.
558
401
 
559
402
  ## Development And Release
560
403
 
@@ -566,30 +409,12 @@ npm run changelog:check
566
409
  npm run packcheck
567
410
  npm run selftest
568
411
  npm run sizecheck
412
+ npm run registry:check
569
413
  npm run release:check
570
- ```
571
-
572
- Package pipeline UI/browser verification and visual inspection evidence must come from Codex Computer Use only. Do not use Playwright, Chrome MCP, Browser Use, Selenium, Puppeteer, or other browser automation as substitutes for that evidence. Package image-generation evidence must come from real `$imagegen`/`gpt-image-2` output when generated raster assets or generated image-review evidence are required.
573
-
574
- Dry-run publish:
575
-
576
- ```sh
577
414
  npm run publish:dry
578
415
  ```
579
416
 
580
- `publish:dry` proves the local package is packable. It does not prove npm ownership, OTP, or registry publish permission.
581
-
582
- ## Documentation Style
583
-
584
- This README follows a common open-source CLI shape:
585
-
586
- - quick start first
587
- - explicit install paths
588
- - separate CLI and app/plugin usage
589
- - command examples before internal architecture
590
- - troubleshooting and release checks near the end
591
-
592
- That shape mirrors how projects such as `rdme` and Vite separate quick start, setup/configuration, and CLI usage while keeping copy-ready commands visible.
417
+ `release:check` runs audit, changelog, syntax, selftest, size, and registry checks. `publish:dry` runs that same gate and then performs an npm dry-run publish against the public registry.
593
418
 
594
419
  ## License
595
420
 
package/package.json CHANGED
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "name": "sneakoscope",
3
3
  "displayName": "ㅅㅋㅅ",
4
- "version": "0.7.66",
4
+ "version": "0.7.68",
5
5
  "description": "Sneakoscope Codex: database-safe Codex CLI/App harness with Team, Goal, AutoResearch, TriWiki, and Honest Mode.",
6
6
  "type": "module",
7
7
  "homepage": "https://github.com/mandarange/Sneakoscope-Codex#readme",
@@ -37,10 +37,11 @@
37
37
  "packcheck": "find bin src scripts -name '*.mjs' -print0 | xargs -0 -n1 node --check",
38
38
  "changelog:check": "node ./scripts/changelog-check.mjs",
39
39
  "sizecheck": "node ./scripts/sizecheck.mjs",
40
- "release:check": "npm run repo-audit && npm run changelog:check && npm run packcheck && npm run selftest && npm run sizecheck",
41
- "publish:dry": "npm run release:check && npm --cache /tmp/sks-npm-cache pack --dry-run",
42
- "publish:npm": "npm --cache /tmp/sks-npm-cache publish --access public",
43
- "prepublishOnly": "npm run release:check"
40
+ "registry:check": "node ./scripts/release-registry-check.mjs",
41
+ "release:check": "npm run repo-audit && npm run changelog:check && npm run packcheck && npm run selftest && npm run sizecheck && npm run registry:check",
42
+ "publish:dry": "npm run release:check && npm --cache /tmp/sks-npm-cache publish --dry-run --registry https://registry.npmjs.org/ --access public",
43
+ "publish:npm": "npm --cache /tmp/sks-npm-cache publish --registry https://registry.npmjs.org/ --access public",
44
+ "prepublishOnly": "npm run release:check && node ./scripts/release-registry-check.mjs --require-unpublished"
44
45
  },
45
46
  "keywords": [
46
47
  "sneakoscope",