super-opencode 1.1.0 → 1.1.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.opencode/agents/architect.md +84 -84
- package/.opencode/agents/backend.md +124 -124
- package/.opencode/agents/frontend.md +137 -137
- package/.opencode/agents/optimizer.md +51 -51
- package/.opencode/agents/pm-agent.md +105 -105
- package/.opencode/agents/quality.md +107 -107
- package/.opencode/agents/researcher.md +105 -105
- package/.opencode/agents/reviewer.md +80 -80
- package/.opencode/agents/security.md +107 -107
- package/.opencode/agents/writer.md +136 -136
- package/.opencode/commands/soc-analyze.md +136 -137
- package/.opencode/commands/soc-brainstorm.md +109 -110
- package/.opencode/commands/soc-cleanup.md +107 -107
- package/.opencode/commands/soc-design.md +0 -1
- package/.opencode/commands/soc-explain.md +113 -113
- package/.opencode/commands/soc-git.md +104 -104
- package/.opencode/commands/soc-help.md +94 -94
- package/.opencode/commands/soc-implement.md +112 -112
- package/.opencode/commands/soc-improve.md +105 -105
- package/.opencode/commands/soc-pm.md +99 -99
- package/.opencode/commands/soc-research.md +105 -105
- package/.opencode/commands/soc-review.md +102 -102
- package/.opencode/commands/soc-test.md +109 -109
- package/.opencode/commands/soc-workflow.md +97 -97
- package/.opencode/settings.json +3 -3
- package/.opencode/skills/confidence-check/SKILL.md +97 -97
- package/.opencode/skills/debug-protocol/SKILL.md +83 -83
- package/.opencode/skills/reflexion/SKILL.md +108 -108
- package/.opencode/skills/security-audit/SKILL.md +90 -90
- package/.opencode/skills/self-check/SKILL.md +95 -95
- package/.opencode/skills/simplification/SKILL.md +92 -92
- package/AGENTS.md +175 -175
- package/LICENSE +21 -21
- package/dist/cli.js +2 -2
- package/package.json +45 -45
|
@@ -1,137 +1,136 @@
|
|
|
1
|
-
---
|
|
2
|
-
|
|
3
|
-
|
|
4
|
-
|
|
5
|
-
|
|
6
|
-
|
|
7
|
-
|
|
8
|
-
|
|
9
|
-
|
|
10
|
-
|
|
11
|
-
|
|
12
|
-
|
|
13
|
-
|
|
14
|
-
|
|
|
15
|
-
|
|
|
16
|
-
| **
|
|
17
|
-
| **
|
|
18
|
-
| **
|
|
19
|
-
| **
|
|
20
|
-
|
|
21
|
-
|
|
22
|
-
|
|
23
|
-
|
|
24
|
-
|
|
25
|
-
|
|
26
|
-
|
|
27
|
-
|
|
28
|
-
|
|
29
|
-
|
|
30
|
-
|
|
31
|
-
-
|
|
32
|
-
|
|
33
|
-
-
|
|
34
|
-
- `
|
|
35
|
-
|
|
36
|
-
-
|
|
37
|
-
- `
|
|
38
|
-
|
|
39
|
-
|
|
40
|
-
|
|
41
|
-
|
|
42
|
-
|
|
43
|
-
|
|
44
|
-
|
|
45
|
-
|
|
46
|
-
|
|
47
|
-
|
|
48
|
-
|
|
49
|
-
>
|
|
50
|
-
>
|
|
51
|
-
>
|
|
52
|
-
|
|
53
|
-
|
|
54
|
-
|
|
55
|
-
|
|
56
|
-
|
|
57
|
-
|
|
58
|
-
|
|
59
|
-
|
|
60
|
-
|
|
61
|
-
|
|
62
|
-
|
|
63
|
-
|
|
64
|
-
**
|
|
65
|
-
**
|
|
66
|
-
|
|
67
|
-
|
|
68
|
-
|
|
69
|
-
|
|
70
|
-
|
|
71
|
-
|
|
72
|
-
|
|
73
|
-
* *
|
|
74
|
-
* *
|
|
75
|
-
|
|
76
|
-
|
|
77
|
-
|
|
78
|
-
* *
|
|
79
|
-
|
|
80
|
-
|
|
81
|
-
|
|
82
|
-
- **
|
|
83
|
-
|
|
84
|
-
|
|
85
|
-
|
|
86
|
-
|
|
87
|
-
|
|
88
|
-
|
|
89
|
-
|
|
90
|
-
|
|
91
|
-
|
|
92
|
-
|
|
93
|
-
|
|
94
|
-
|
|
95
|
-
|
|
96
|
-
|
|
97
|
-
|
|
98
|
-
|
|
99
|
-
|
|
100
|
-
|
|
101
|
-
|
|
102
|
-
|
|
103
|
-
|
|
104
|
-
|
|
105
|
-
|
|
106
|
-
|
|
107
|
-
|
|
108
|
-
|
|
109
|
-
-
|
|
110
|
-
- `@[.opencode/agents/
|
|
111
|
-
- `@[.opencode/agents/
|
|
112
|
-
- `@[.opencode/agents/
|
|
113
|
-
- `@[.opencode/agents/
|
|
114
|
-
|
|
115
|
-
|
|
116
|
-
|
|
117
|
-
- **
|
|
118
|
-
- **
|
|
119
|
-
|
|
120
|
-
|
|
121
|
-
|
|
122
|
-
- **`
|
|
123
|
-
- **`
|
|
124
|
-
- **`
|
|
125
|
-
|
|
126
|
-
|
|
127
|
-
|
|
128
|
-
|
|
129
|
-
|
|
130
|
-
-
|
|
131
|
-
-
|
|
132
|
-
|
|
133
|
-
|
|
134
|
-
**
|
|
135
|
-
- **
|
|
136
|
-
- **
|
|
137
|
-
- **Hallucinate bugs**. (If an agent returns "No issues found," report "No issues found.")
|
|
1
|
+
---
|
|
2
|
+
description: "Orchestrator command that triggers specialized agents for code, security, and architecture review."
|
|
3
|
+
---
|
|
4
|
+
|
|
5
|
+
# /soc-analyze
|
|
6
|
+
|
|
7
|
+
## 1. Command Overview
|
|
8
|
+
The `/soc-analyze` command is the **primary entry point** for all code inspection tasks. It does not perform the analysis itself; instead, it acts as a **router**, identifying the correct specialized agent (`security`, `quality`, `architect`, or `backend`) and providing them with the necessary context and constraints.
|
|
9
|
+
|
|
10
|
+
## 2. Triggers & Routing
|
|
11
|
+
The command automatically routes to the best-suited agent based on the `--focus` flag or the context of the request.
|
|
12
|
+
|
|
13
|
+
| Trigger Scenario | Flag | Target Agent | Context Injected |
|
|
14
|
+
| :--- | :--- | :--- | :--- |
|
|
15
|
+
| **Security Audit** | `--focus security` | `[security]` | STRIDE model, OWASP Top 10 checklist |
|
|
16
|
+
| **Code Review** | `--focus quality` | `[quality]` | Test coverage stats, Linter rules |
|
|
17
|
+
| **System Design** | `--focus architecture` | `[architect]` | Current ADRs, Cloud constraints |
|
|
18
|
+
| **Database/API** | `--focus backend` | `[backend]` | Schema definitions, API contracts |
|
|
19
|
+
| **UI/UX Check** | `--focus frontend` | `[frontend]` | Mobile responsiveness, WCAG standards |
|
|
20
|
+
|
|
21
|
+
## 3. Usage & Arguments
|
|
22
|
+
```bash
|
|
23
|
+
/soc-analyze [target] [flags]
|
|
24
|
+
```
|
|
25
|
+
|
|
26
|
+
### Arguments
|
|
27
|
+
- **`[target]`**: (Optional) specific file, directory, or "all" (default: current context).
|
|
28
|
+
|
|
29
|
+
### Flags
|
|
30
|
+
- **`--focus [domain]`**: **MANDATORY** (if not implied). Forces a specific agent.
|
|
31
|
+
- Options: `security`, `quality`, `architecture`, `performance`, `backend`, `frontend`.
|
|
32
|
+
- **`--depth [level]`**:
|
|
33
|
+
- `quick`: Static checks, linting, known CVEs (Fast).
|
|
34
|
+
- `deep`: Logic flow analysis, race condition checks, architectural impact (Slow, uses `sequential-thinking`).
|
|
35
|
+
- **`--format [type]`**:
|
|
36
|
+
- `text`: Human-readable summary (default).
|
|
37
|
+
- `json`: Machine-parsable output for CI/CD pipelines.
|
|
38
|
+
|
|
39
|
+
## 4. Behavioral Flow (Orchestration)
|
|
40
|
+
|
|
41
|
+
### Phase 1: Context Gathering (The "Map")
|
|
42
|
+
1. **Scan**: The command uses `glob` to list relevant files in `[target]`.
|
|
43
|
+
2. **Filter**: It excludes `node_modules`, `.git`, and lockfiles.
|
|
44
|
+
3. **Detect**: It identifies the stack (e.g., "Next.js + Postgres") to inform the agent.
|
|
45
|
+
|
|
46
|
+
### Phase 2: Delegation (The "Handoff")
|
|
47
|
+
The command constructs a specific prompt for the target agent:
|
|
48
|
+
> "Agent **[Name]**, perform a **[Depth]** analysis on **[Target]**.
|
|
49
|
+
> Context: The project is **[Stack]**.
|
|
50
|
+
> Constraint: Focus strictly on **[Focus Area]**.
|
|
51
|
+
> Output: Use the standard **Analysis Report** format."
|
|
52
|
+
|
|
53
|
+
### Phase 3: Synthesis (The "Report")
|
|
54
|
+
The command collates the agent's output. If multiple agents were invoked (e.g., "full audit"), it merges their JSON outputs into a single artifact.
|
|
55
|
+
|
|
56
|
+
## 5. Output Guidelines (The Contract)
|
|
57
|
+
|
|
58
|
+
All triggered agents must return data in this structure so the user (or PM) can parse it.
|
|
59
|
+
|
|
60
|
+
### Standard Analysis Report
|
|
61
|
+
```markdown
|
|
62
|
+
# Analysis Report: [Focus Area]
|
|
63
|
+
**Target:** `src/auth/*`
|
|
64
|
+
**Agent:** `security`
|
|
65
|
+
**Date:** 2025-10-27
|
|
66
|
+
|
|
67
|
+
## Summary
|
|
68
|
+
Found **2 High** severity issues and **1 Low** severity issue.
|
|
69
|
+
|
|
70
|
+
## Critical Findings
|
|
71
|
+
1. **[High] SQL Injection Vulnerability**
|
|
72
|
+
* *File:* `src/auth/login.ts`
|
|
73
|
+
* *Context:* Raw string concatenation in query.
|
|
74
|
+
* *Recommendation:* Use parameterized queries (see `backend` agent guidelines).
|
|
75
|
+
|
|
76
|
+
2. **[Medium] Missing Rate Limiting**
|
|
77
|
+
* *File:* `src/api/routes.ts`
|
|
78
|
+
* *Recommendation:* Implement middleware adapter.
|
|
79
|
+
|
|
80
|
+
## Metrics
|
|
81
|
+
- **Files Scanned:** 12
|
|
82
|
+
- **Coverage:** 45% (Below threshold)
|
|
83
|
+
```
|
|
84
|
+
|
|
85
|
+
## 6. Examples
|
|
86
|
+
|
|
87
|
+
### A. Security Scan (Deep)
|
|
88
|
+
```bash
|
|
89
|
+
/soc-analyze src/payments --focus security --depth deep
|
|
90
|
+
```
|
|
91
|
+
*Effect:* Triggers `security` agent. It will use `tavily` to check CVEs for payment libraries and use `sequential-thinking` to look for logic flaws in the transaction flow.
|
|
92
|
+
|
|
93
|
+
### B. Architecture Review
|
|
94
|
+
```bash
|
|
95
|
+
/soc-analyze --focus architecture
|
|
96
|
+
```
|
|
97
|
+
*Effect:* Triggers `architect` agent. It scans the folder structure and `package.json` to generate a high-level component diagram and validates it against `ADR` files.
|
|
98
|
+
|
|
99
|
+
### C. Performance Check (Frontend)
|
|
100
|
+
```bash
|
|
101
|
+
/soc-analyze src/components/LandingPage --focus frontend --depth quick
|
|
102
|
+
```
|
|
103
|
+
*Effect:* Triggers `frontend` agent. Checks for `next/image` usage, large bundles, and CLS (Cumulative Layout Shift) risks.
|
|
104
|
+
|
|
105
|
+
## 7. Dependencies & Capabilities
|
|
106
|
+
|
|
107
|
+
### Agents
|
|
108
|
+
- **Primary Dispatch**:
|
|
109
|
+
- `@[.opencode/agents/security.md]`
|
|
110
|
+
- `@[.opencode/agents/quality.md]`
|
|
111
|
+
- `@[.opencode/agents/architect.md]`
|
|
112
|
+
- `@[.opencode/agents/backend.md]`
|
|
113
|
+
- `@[.opencode/agents/frontend.md]`
|
|
114
|
+
|
|
115
|
+
### Skills
|
|
116
|
+
- **Security Audit**: `@[.opencode/skills/security-audit/SKILL.md]` - For identifying vulnerabilities.
|
|
117
|
+
- **Reflexion**: `@[.opencode/skills/reflexion/SKILL.md]` - For deep analysis loops.
|
|
118
|
+
- **Debug Protocol**: `@[.opencode/skills/debug-protocol/SKILL.md]` - For tracing logic errors.
|
|
119
|
+
|
|
120
|
+
### MCP Integration
|
|
121
|
+
- **`tavily`**: Used for real-time CVE lookups and security advisory searches.
|
|
122
|
+
- **`context7`**: Used to fetch up-to-date documentation for libraries and frameworks to ensure analysis is accurate to the version used.
|
|
123
|
+
- **`filesystem`**: Native access used for `glob` scanning and file reading.
|
|
124
|
+
- **`sequential-thinking`**: Used for complex architectural reasoning and deep-dive analysis.
|
|
125
|
+
|
|
126
|
+
## 8. Boundaries
|
|
127
|
+
|
|
128
|
+
**Will:**
|
|
129
|
+
- Delegate to the most expert agent available.
|
|
130
|
+
- Provide file context to that agent.
|
|
131
|
+
- Summarize findings into a unified report.
|
|
132
|
+
|
|
133
|
+
**Will Not:**
|
|
134
|
+
- **Fix the code**. (Use `/soc-improve` for that).
|
|
135
|
+
- **Execute code**. (No runtime analysis unless `quality` agent uses `vitest`).
|
|
136
|
+
- **Hallucinate bugs**. (If an agent returns "No issues found," report "No issues found.")
|
|
@@ -1,110 +1,109 @@
|
|
|
1
|
-
---
|
|
2
|
-
|
|
3
|
-
|
|
4
|
-
|
|
5
|
-
|
|
6
|
-
|
|
7
|
-
|
|
8
|
-
|
|
9
|
-
|
|
10
|
-
|
|
11
|
-
|
|
12
|
-
|
|
13
|
-
|
|
14
|
-
|
|
|
15
|
-
|
|
|
16
|
-
| **
|
|
17
|
-
| **
|
|
18
|
-
| **
|
|
19
|
-
|
|
20
|
-
|
|
21
|
-
|
|
22
|
-
|
|
23
|
-
|
|
24
|
-
|
|
25
|
-
|
|
26
|
-
|
|
27
|
-
|
|
28
|
-
|
|
29
|
-
|
|
30
|
-
- **`--
|
|
31
|
-
- **`--
|
|
32
|
-
- **`--
|
|
33
|
-
|
|
34
|
-
|
|
35
|
-
|
|
36
|
-
|
|
37
|
-
|
|
38
|
-
|
|
39
|
-
|
|
40
|
-
|
|
41
|
-
|
|
42
|
-
|
|
43
|
-
- **
|
|
44
|
-
- **
|
|
45
|
-
|
|
46
|
-
|
|
47
|
-
|
|
48
|
-
-
|
|
49
|
-
|
|
50
|
-
|
|
51
|
-
|
|
52
|
-
|
|
53
|
-
|
|
54
|
-
|
|
55
|
-
|
|
56
|
-
|
|
57
|
-
|
|
58
|
-
|
|
59
|
-
|
|
60
|
-
|
|
61
|
-
|
|
62
|
-
|
|
63
|
-
|
|
64
|
-
-
|
|
65
|
-
|
|
66
|
-
|
|
67
|
-
|
|
68
|
-
|
|
69
|
-
|
|
70
|
-
|
|
71
|
-
|
|
72
|
-
|
|
73
|
-
|
|
74
|
-
|
|
75
|
-
|
|
76
|
-
|
|
77
|
-
|
|
78
|
-
|
|
79
|
-
|
|
80
|
-
|
|
81
|
-
|
|
82
|
-
|
|
83
|
-
|
|
84
|
-
|
|
85
|
-
|
|
86
|
-
|
|
87
|
-
|
|
88
|
-
- **
|
|
89
|
-
|
|
90
|
-
|
|
91
|
-
|
|
92
|
-
- **
|
|
93
|
-
|
|
94
|
-
|
|
95
|
-
|
|
96
|
-
- **`
|
|
97
|
-
- **`
|
|
98
|
-
|
|
99
|
-
|
|
100
|
-
|
|
101
|
-
|
|
102
|
-
|
|
103
|
-
-
|
|
104
|
-
-
|
|
105
|
-
|
|
106
|
-
|
|
107
|
-
**
|
|
108
|
-
- **
|
|
109
|
-
- **
|
|
110
|
-
- **Design Architecture**: It *explores* architecture boundaries, but `/soc-design` *defines* it.
|
|
1
|
+
---
|
|
2
|
+
description: "Interactive requirements discovery through Socratic dialogue and systematic exploration"
|
|
3
|
+
---
|
|
4
|
+
|
|
5
|
+
# /soc-brainstorm
|
|
6
|
+
|
|
7
|
+
## 1. Command Overview
|
|
8
|
+
The `/soc-brainstorm` command is the "Idea Incubator." It is strictly for **Context Trigger patterns** and does not execute code. It behaves as a multi-persona facilitator (Architect, PM, Analyst) to transform vague user intents into concrete requirements specifications. It uses Socratic dialogue to uncover hidden constraints and assumptions.
|
|
9
|
+
|
|
10
|
+
## 2. Triggers & Routing
|
|
11
|
+
The command activates specific personas based on the explored domain.
|
|
12
|
+
|
|
13
|
+
| Trigger Scenario | Flag | Target Agent | Context Injected |
|
|
14
|
+
| :--- | :--- | :--- | :--- |
|
|
15
|
+
| **New Startups** | `--strategy systematic` | `[architect]` + `[researcher]` | Market Analysis, Feasibility |
|
|
16
|
+
| **Feature Ideas** | `--strategy agile` | `[pm-agent]` | User Stories, Acceptance Criteria |
|
|
17
|
+
| **Complex Systems** | `--strategy enterprise` | `[architect]` + `[security]` | Compliance, Scalability |
|
|
18
|
+
| **UI Concepts** | `--parallel` | `[frontend]` + `[generate_image]` | UX Flows, Visual Mockups |
|
|
19
|
+
|
|
20
|
+
## 3. Usage & Arguments
|
|
21
|
+
```bash
|
|
22
|
+
/soc-brainstorm [topic] [flags]
|
|
23
|
+
```
|
|
24
|
+
|
|
25
|
+
### Arguments
|
|
26
|
+
- **`[topic]`**: The raw idea or problem statement (e.g., "AI-powered ToDo list").
|
|
27
|
+
|
|
28
|
+
### Flags
|
|
29
|
+
- **`--strategy [systematic|agile|enterprise]`**: (Default: `systematic`).
|
|
30
|
+
- **`--depth [shallow|normal|deep]`**: Controls the number of follow-up questions.
|
|
31
|
+
- **`--parallel`**: Activates concurrent analysis by multiple agents.
|
|
32
|
+
- **`--validate`**: Cross-checks ideas against market/tech constraints.
|
|
33
|
+
|
|
34
|
+
## 4. Behavioral Flow (Orchestration)
|
|
35
|
+
|
|
36
|
+
### Phase 1: Exploration (Socratic Mode)
|
|
37
|
+
1. **Ask**: "What is the core value proposition?" "Who is the user?"
|
|
38
|
+
2. **Challenge**: "How does this scale to 10k users?" "What if the API is down?"
|
|
39
|
+
3. **Synthesize**: Summarize user answers into bullet points.
|
|
40
|
+
|
|
41
|
+
### Phase 2: Analysis (The Experts)
|
|
42
|
+
- **Architect** evaluates technical feasibility ("Can we really do this with Serverless?").
|
|
43
|
+
- **Security** evaluates risk ("Is this PII compliant?").
|
|
44
|
+
- **Researcher** adds market context ("Competitor X already does this").
|
|
45
|
+
|
|
46
|
+
### Phase 3: Specification (The Handoff)
|
|
47
|
+
- Generates a "Requirements Brief" or `task.md` draft.
|
|
48
|
+
- Outputs a decision matrix if options were debated.
|
|
49
|
+
|
|
50
|
+
## 5. Output Guidelines (The Contract)
|
|
51
|
+
|
|
52
|
+
### Requirements Specification
|
|
53
|
+
```markdown
|
|
54
|
+
# Requirements: [Topic]
|
|
55
|
+
|
|
56
|
+
## 1. Executive Summary
|
|
57
|
+
[One paragaph vision]
|
|
58
|
+
|
|
59
|
+
## 2. User Stories
|
|
60
|
+
- As a [User], I want to [Action], so that [Benefit].
|
|
61
|
+
|
|
62
|
+
## 3. Technical Constraints
|
|
63
|
+
- Must run on Vercel Edge.
|
|
64
|
+
- Latency < 100ms.
|
|
65
|
+
|
|
66
|
+
## 4. Open Questions
|
|
67
|
+
- [ ] Do we need offline support?
|
|
68
|
+
```
|
|
69
|
+
|
|
70
|
+
## 6. Examples
|
|
71
|
+
|
|
72
|
+
### A. Startup Idea Validation
|
|
73
|
+
```bash
|
|
74
|
+
/soc-brainstorm "Uber for Dog Walking" --strategy systematic --depth deep
|
|
75
|
+
```
|
|
76
|
+
*Effect:* Architectural sizing, competitive analysis vs. Rover, and initial data model concepts.
|
|
77
|
+
|
|
78
|
+
### B. Feature Refinement
|
|
79
|
+
```bash
|
|
80
|
+
/soc-brainstorm "Add Collaboration to Canvas" --strategy agile
|
|
81
|
+
```
|
|
82
|
+
*Effect:* Generates a list of WebSocket requirements, race condition scenarios, and User Stories.
|
|
83
|
+
|
|
84
|
+
## 7. Dependencies & Capabilities
|
|
85
|
+
|
|
86
|
+
### Agents
|
|
87
|
+
- **Orchestrator**: `[pm-agent]` - Leads the discussion.
|
|
88
|
+
- **Consultants**: `[architect]`, `[security]`, `[researcher]` - Called in as needed.
|
|
89
|
+
|
|
90
|
+
### Skills
|
|
91
|
+
- **Sequential Thinking**: `@[.opencode/skills/sequential-thinking/SKILL.md]` - For deep logic chains.
|
|
92
|
+
- **Simplification**: `@[.opencode/skills/simplification/SKILL.md]` - To keep MVPs minimal.
|
|
93
|
+
|
|
94
|
+
### MCP Integration
|
|
95
|
+
- **`generate_image`**: Visualizing UI concepts during brainstorming.
|
|
96
|
+
- **`tavily`**: Real-time market research to validate user assumptions.
|
|
97
|
+
- **`context7`**: Checking feasibility of integrating specific libraries.
|
|
98
|
+
|
|
99
|
+
## 8. Boundaries
|
|
100
|
+
|
|
101
|
+
**Will:**
|
|
102
|
+
- Ask probing questions.
|
|
103
|
+
- Identify risks and constraints.
|
|
104
|
+
- Produce text specifications and requirements.
|
|
105
|
+
|
|
106
|
+
**Will Not:**
|
|
107
|
+
- **Write Code**: The output is documents, not code.
|
|
108
|
+
- **Make Final Decisions**: It provides options; the user decides.
|
|
109
|
+
- **Design Architecture**: It *explores* architecture boundaries, but `/soc-design` *defines* it.
|