takt 0.33.1 → 0.33.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (122) hide show
  1. package/builtins/en/facets/instructions/architecture-audit-plan.md +13 -0
  2. package/builtins/en/facets/instructions/architecture-audit-review.md +15 -0
  3. package/builtins/en/facets/instructions/architecture-audit-supervise.md +14 -0
  4. package/builtins/en/facets/instructions/architecture-audit-team-leader.md +22 -0
  5. package/builtins/en/facets/instructions/e2e-audit-plan.md +13 -0
  6. package/builtins/en/facets/instructions/e2e-audit-review.md +16 -0
  7. package/builtins/en/facets/instructions/e2e-audit-supervise.md +11 -0
  8. package/builtins/en/facets/instructions/e2e-audit-team-leader.md +22 -0
  9. package/builtins/en/facets/instructions/unit-audit-plan.md +13 -0
  10. package/builtins/en/facets/instructions/unit-audit-review.md +16 -0
  11. package/builtins/en/facets/instructions/unit-audit-supervise.md +11 -0
  12. package/builtins/en/facets/instructions/unit-audit-team-leader.md +22 -0
  13. package/builtins/en/facets/output-contracts/architecture-audit-plan.md +26 -0
  14. package/builtins/en/facets/output-contracts/architecture-audit.md +38 -0
  15. package/builtins/en/facets/output-contracts/{security-audit.md → audit-security.md} +15 -0
  16. package/builtins/en/facets/output-contracts/e2e-audit-plan.md +26 -0
  17. package/builtins/en/facets/output-contracts/e2e-audit.md +41 -0
  18. package/builtins/en/facets/output-contracts/unit-audit-plan.md +26 -0
  19. package/builtins/en/facets/output-contracts/unit-audit.md +41 -0
  20. package/builtins/en/piece-categories.yaml +7 -5
  21. package/builtins/en/pieces/audit-architecture-backend.yaml +83 -0
  22. package/builtins/en/pieces/audit-architecture-dual.yaml +87 -0
  23. package/builtins/en/pieces/audit-architecture-frontend.yaml +87 -0
  24. package/builtins/en/pieces/audit-architecture.yaml +75 -0
  25. package/builtins/en/pieces/audit-e2e.yaml +92 -0
  26. package/builtins/en/pieces/{security-audit.yaml → audit-security.yaml} +7 -7
  27. package/builtins/en/pieces/audit-unit.yaml +94 -0
  28. package/builtins/ja/facets/instructions/architecture-audit-plan.md +13 -0
  29. package/builtins/ja/facets/instructions/architecture-audit-review.md +15 -0
  30. package/builtins/ja/facets/instructions/architecture-audit-supervise.md +14 -0
  31. package/builtins/ja/facets/instructions/architecture-audit-team-leader.md +22 -0
  32. package/builtins/ja/facets/instructions/e2e-audit-plan.md +13 -0
  33. package/builtins/ja/facets/instructions/e2e-audit-review.md +16 -0
  34. package/builtins/ja/facets/instructions/e2e-audit-supervise.md +11 -0
  35. package/builtins/ja/facets/instructions/e2e-audit-team-leader.md +22 -0
  36. package/builtins/ja/facets/instructions/unit-audit-plan.md +13 -0
  37. package/builtins/ja/facets/instructions/unit-audit-review.md +16 -0
  38. package/builtins/ja/facets/instructions/unit-audit-supervise.md +11 -0
  39. package/builtins/ja/facets/instructions/unit-audit-team-leader.md +22 -0
  40. package/builtins/ja/facets/output-contracts/architecture-audit-plan.md +26 -0
  41. package/builtins/ja/facets/output-contracts/architecture-audit.md +38 -0
  42. package/builtins/ja/facets/output-contracts/{security-audit.md → audit-security.md} +15 -0
  43. package/builtins/ja/facets/output-contracts/e2e-audit-plan.md +26 -0
  44. package/builtins/ja/facets/output-contracts/e2e-audit.md +41 -0
  45. package/builtins/ja/facets/output-contracts/unit-audit-plan.md +26 -0
  46. package/builtins/ja/facets/output-contracts/unit-audit.md +41 -0
  47. package/builtins/ja/piece-categories.yaml +7 -5
  48. package/builtins/ja/pieces/audit-architecture-backend.yaml +83 -0
  49. package/builtins/ja/pieces/audit-architecture-dual.yaml +87 -0
  50. package/builtins/ja/pieces/audit-architecture-frontend.yaml +87 -0
  51. package/builtins/ja/pieces/audit-architecture.yaml +75 -0
  52. package/builtins/ja/pieces/audit-e2e.yaml +92 -0
  53. package/builtins/ja/pieces/{security-audit.yaml → audit-security.yaml} +7 -7
  54. package/builtins/ja/pieces/audit-unit.yaml +94 -0
  55. package/dist/app/cli/routing-inputs.d.ts +2 -2
  56. package/dist/app/cli/routing-inputs.d.ts.map +1 -1
  57. package/dist/app/cli/routing-inputs.js +11 -8
  58. package/dist/app/cli/routing-inputs.js.map +1 -1
  59. package/dist/features/pipeline/steps.d.ts.map +1 -1
  60. package/dist/features/pipeline/steps.js +7 -6
  61. package/dist/features/pipeline/steps.js.map +1 -1
  62. package/dist/features/tasks/add/index.js +4 -4
  63. package/dist/features/tasks/add/index.js.map +1 -1
  64. package/dist/features/tasks/add/issueTask.d.ts +1 -0
  65. package/dist/features/tasks/add/issueTask.d.ts.map +1 -1
  66. package/dist/features/tasks/add/issueTask.js +1 -1
  67. package/dist/features/tasks/add/issueTask.js.map +1 -1
  68. package/dist/features/tasks/execute/postExecution.js +4 -4
  69. package/dist/features/tasks/execute/postExecution.js.map +1 -1
  70. package/dist/features/tasks/execute/resolveTask.js +1 -1
  71. package/dist/features/tasks/execute/resolveTask.js.map +1 -1
  72. package/dist/infra/git/detect.d.ts +1 -1
  73. package/dist/infra/git/detect.d.ts.map +1 -1
  74. package/dist/infra/git/detect.js +2 -2
  75. package/dist/infra/git/detect.js.map +1 -1
  76. package/dist/infra/git/index.d.ts +2 -2
  77. package/dist/infra/git/index.d.ts.map +1 -1
  78. package/dist/infra/git/index.js +8 -8
  79. package/dist/infra/git/index.js.map +1 -1
  80. package/dist/infra/git/types.d.ts +5 -5
  81. package/dist/infra/git/types.d.ts.map +1 -1
  82. package/dist/infra/github/GitHubProvider.d.ts +7 -7
  83. package/dist/infra/github/GitHubProvider.d.ts.map +1 -1
  84. package/dist/infra/github/GitHubProvider.js +14 -14
  85. package/dist/infra/github/GitHubProvider.js.map +1 -1
  86. package/dist/infra/github/issue.d.ts +3 -3
  87. package/dist/infra/github/issue.d.ts.map +1 -1
  88. package/dist/infra/github/issue.js +11 -9
  89. package/dist/infra/github/issue.js.map +1 -1
  90. package/dist/infra/github/pr.d.ts +4 -4
  91. package/dist/infra/github/pr.d.ts.map +1 -1
  92. package/dist/infra/github/pr.js +11 -11
  93. package/dist/infra/github/pr.js.map +1 -1
  94. package/dist/infra/gitlab/GitLabProvider.d.ts +5 -5
  95. package/dist/infra/gitlab/GitLabProvider.d.ts.map +1 -1
  96. package/dist/infra/gitlab/GitLabProvider.js +10 -10
  97. package/dist/infra/gitlab/GitLabProvider.js.map +1 -1
  98. package/dist/infra/gitlab/issue.d.ts +1 -1
  99. package/dist/infra/gitlab/issue.d.ts.map +1 -1
  100. package/dist/infra/gitlab/issue.js +3 -3
  101. package/dist/infra/gitlab/issue.js.map +1 -1
  102. package/dist/infra/gitlab/pr.d.ts +4 -4
  103. package/dist/infra/gitlab/pr.d.ts.map +1 -1
  104. package/dist/infra/gitlab/pr.js +8 -8
  105. package/dist/infra/gitlab/pr.js.map +1 -1
  106. package/dist/infra/gitlab/utils.d.ts +1 -1
  107. package/dist/infra/gitlab/utils.d.ts.map +1 -1
  108. package/dist/infra/gitlab/utils.js +4 -4
  109. package/dist/infra/gitlab/utils.js.map +1 -1
  110. package/package.json +1 -1
  111. package/builtins/en/pieces/fill-e2e.yaml +0 -239
  112. package/builtins/en/pieces/fill-unit.yaml +0 -269
  113. package/builtins/ja/pieces/fill-e2e.yaml +0 -239
  114. package/builtins/ja/pieces/fill-unit.yaml +0 -269
  115. /package/builtins/en/facets/instructions/{security-audit-plan.md → audit-security-plan.md} +0 -0
  116. /package/builtins/en/facets/instructions/{security-audit-review.md → audit-security-review.md} +0 -0
  117. /package/builtins/en/facets/instructions/{security-audit-supervise.md → audit-security-supervise.md} +0 -0
  118. /package/builtins/en/facets/instructions/{security-audit-team-leader.md → audit-security-team-leader.md} +0 -0
  119. /package/builtins/ja/facets/instructions/{security-audit-plan.md → audit-security-plan.md} +0 -0
  120. /package/builtins/ja/facets/instructions/{security-audit-review.md → audit-security-review.md} +0 -0
  121. /package/builtins/ja/facets/instructions/{security-audit-supervise.md → audit-security-supervise.md} +0 -0
  122. /package/builtins/ja/facets/instructions/{security-audit-team-leader.md → audit-security-team-leader.md} +0 -0
@@ -0,0 +1,13 @@
1
+ Audit the project architecture before making changes.
2
+
3
+ **What to do:**
4
+ 1. Enumerate the main modules, layers, boundaries, and public entry points using Read, Glob, and Grep
5
+ 2. Identify the dependency directions, shared abstractions, and major call chains
6
+ 3. Build an audit scope that covers all modules relevant to structure, ownership, and wiring
7
+ 4. Highlight modules with higher architectural risk (boundary leaks, giant files, scattered logic, coupling hotspots)
8
+ 5. Prepare an audit order that reviews the highest-risk modules first
9
+
10
+ **Important:**
11
+ - Start from full module and boundary enumeration, not from a few suspicious files
12
+ - Focus on structure and wiring, not style-only comments
13
+ - If the architecture cannot be inferred from code alone, state the missing evidence explicitly
@@ -0,0 +1,15 @@
1
+ Re-audit the modules or boundaries that were judged insufficient in the previous architecture audit.
2
+
3
+ **Important:** Refer to these reports:
4
+ - Plan report: {report:01-architecture-audit-plan.md}
5
+ - Audit report: {report:02-architecture-audit.md}
6
+
7
+ **What to do:**
8
+ 1. Read the flagged modules, boundaries, and call chains in full
9
+ 2. Re-check the structural claims and identify what was previously skipped or weakly evidenced
10
+ 3. Update the audit result with concrete file evidence, explicit scope coverage, and missing-item reasons where applicable
11
+
12
+ **Strictly prohibited:**
13
+ - Modifying production code
14
+ - Claiming a boundary or dependency direction is valid without file evidence
15
+ - Skipping a flagged module because it "looks standard"
@@ -0,0 +1,14 @@
1
+ Verify the completeness and quality of the architecture audit itself.
2
+
3
+ **Important:** Refer to these reports:
4
+ - Plan report: {report:01-architecture-audit-plan.md}
5
+ - Audit report: {report:02-architecture-audit.md}
6
+
7
+ **Verification procedure:**
8
+ 1. Cross-check the module inventory from the plan against the audited modules in the audit report
9
+ 2. Reject if important modules or boundaries remain unaudited
10
+ 3. Reject if key dependency directions, wiring paths, ownership boundaries, or call chains from the plan are missing from the audit result without an explicit reason
11
+ 4. Verify the audit report includes concrete structural evidence, not just design opinions
12
+ 5. Verify the report includes the enumeration commands used and that they are sufficient to support the claimed scope
13
+ 6. Sample-read a few high-risk modules yourself to confirm the structural claims are credible
14
+ 7. Require re-audit if findings or suggested issue titles are too vague to file directly
@@ -0,0 +1,22 @@
1
+ Decompose the architecture audit, assign modules to each part, and execute in parallel.
2
+
3
+ **Important:** Refer to the plan report: {report:01-architecture-audit-plan.md}
4
+
5
+ **What to do:**
6
+ 1. Review the module inventory and architectural risk areas from the plan report
7
+ 2. Split the audit into 3 groups by module or boundary
8
+ 3. Assign exclusive ownership to each part so every relevant module is audited once
9
+
10
+ **Each part's instruction MUST include:**
11
+ - Assigned module and file list
12
+ - The boundaries and call chains to verify
13
+ - Required audit procedure:
14
+ 1. Read the assigned files in full
15
+ 2. Trace dependency direction, entry points, and shared abstractions
16
+ 3. Record structural findings with concrete file evidence
17
+ - Completion criteria: every assigned module has been audited and all findings are reported with evidence
18
+
19
+ **Constraints:**
20
+ - Each part is read-only
21
+ - Do not audit files outside the assignment
22
+ - Prefer evidence from code structure and call chains over style-only comments
@@ -0,0 +1,13 @@
1
+ Audit the target for E2E coverage before making changes.
2
+
3
+ **What to do:**
4
+ 1. Enumerate all user entry points, major routes, task flows, and failure paths from the codebase
5
+ 2. Read the existing E2E tests and map which flows and scenarios are already covered
6
+ 3. Build a complete list of auditable user flows and scenario variants
7
+ 4. Identify missing E2E scenarios and prioritize them by user impact and regression risk
8
+ 5. Prepare an implementation order that covers the highest-risk missing scenarios first
9
+
10
+ **Important:**
11
+ - Start from complete route and flow enumeration, not from a few obvious pages
12
+ - Include unhappy paths, permission differences, and recovery paths when relevant
13
+ - If a flow cannot be audited from local code and tests alone, state the missing evidence explicitly
@@ -0,0 +1,16 @@
1
+ Re-audit the routes or scenarios that were judged insufficient in the previous E2E audit.
2
+
3
+ **Important:** Review the supervisor's verification results and understand:
4
+ - Unaudited flows or scenarios
5
+ - Coverage claims lacking evidence
6
+ - Specific feedback on issue quality or scope
7
+
8
+ **What to do:**
9
+ 1. Read the flagged route-related code and corresponding E2E tests in full
10
+ 2. Re-check the coverage claims for the flagged scenarios and identify what was previously skipped or weakly evidenced
11
+ 3. Update the audit result in issue-ready form with concrete evidence, explicit scope coverage, and missing-item reasons where applicable
12
+
13
+ **Strictly prohibited:**
14
+ - Modifying E2E tests or production code
15
+ - Claiming a scenario is covered without citing the actual test evidence
16
+ - Skipping a flagged route because it "looks fine"
@@ -0,0 +1,11 @@
1
+ Verify the completeness and quality of the E2E audit itself.
2
+
3
+ **Important:** Refer to the audit plan report: {report:01-e2e-audit-plan.md}
4
+
5
+ **Verification procedure:**
6
+ 1. Cross-check the full route and flow inventory in the plan against the audited scenarios in the audit report
7
+ 2. Reject if any important entry point, user flow, unhappy path, permission variant, or recovery path from the plan is missing from the audit result without an explicit reason
8
+ 3. Verify the audit report includes concrete evidence for covered and missing scenarios, not just high-level claims
9
+ 4. Verify the report includes the enumeration commands used and that they are sufficient to support the claimed scope
10
+ 5. Sample-read a few high-risk routes and corresponding tests yourself to validate the coverage claims
11
+ 6. Require re-audit if issue titles, priorities, or recommended actions are too vague to be filed directly
@@ -0,0 +1,22 @@
1
+ Decompose the E2E audit, assign flows to each part, and execute in parallel.
2
+
3
+ **Important:** Refer to the plan report: {report:01-e2e-audit-plan.md}
4
+
5
+ **What to do:**
6
+ 1. Review the user flow list, existing scenarios, and risk areas from the plan report
7
+ 2. Split the audit into 3 groups by feature area or route cluster
8
+ 3. Assign exclusive ownership so every audited flow is reviewed once
9
+
10
+ **Each part's instruction MUST include:**
11
+ - Assigned routes, entry points, and corresponding E2E files
12
+ - The happy paths, failure paths, and permission variants to verify
13
+ - Required audit procedure:
14
+ 1. Read the relevant code for the assigned flows
15
+ 2. Read the corresponding E2E tests in full
16
+ 3. Record covered and missing scenarios with concrete evidence
17
+ - Completion criteria: every assigned flow has been audited and findings are reported in issue-ready form
18
+
19
+ **Constraints:**
20
+ - Each part is read-only
21
+ - Do not modify E2E tests or production code
22
+ - Do not audit routes outside the assignment
@@ -0,0 +1,13 @@
1
+ Audit the target for unit test coverage before making changes.
2
+
3
+ **What to do:**
4
+ 1. Enumerate the target production files, exported APIs, internal branches, error paths, boundary checks, and state transitions using Read, Glob, and Grep
5
+ 2. Read existing unit tests and map which behaviors are already covered
6
+ 3. Build a complete inventory of auditable behaviors for each target file
7
+ 4. Identify missing unit tests and prioritize them by regression risk
8
+ 5. Prepare an implementation order that covers the highest-risk gaps first
9
+
10
+ **Important:**
11
+ - Start from complete enumeration, not from a few obvious gaps
12
+ - Do not stop after identifying a handful of missing tests
13
+ - If the scope is unclear, state exactly which files or behaviors need clarification
@@ -0,0 +1,16 @@
1
+ Re-audit the files or behaviors that were judged insufficient in the previous unit audit.
2
+
3
+ **Important:** Review the supervisor's verification results and understand:
4
+ - Unaudited files or behaviors
5
+ - Coverage claims lacking evidence
6
+ - Specific feedback on issue quality or scope
7
+
8
+ **What to do:**
9
+ 1. Read the flagged production files and corresponding tests in full
10
+ 2. Re-check the coverage claims for the flagged behaviors and identify what was previously skipped or weakly evidenced
11
+ 3. Update the audit result in issue-ready form with concrete evidence, explicit scope coverage, and missing-item reasons where applicable
12
+
13
+ **Strictly prohibited:**
14
+ - Modifying tests or production code
15
+ - Claiming a behavior is covered without citing the actual test evidence
16
+ - Skipping a flagged file or behavior because it "looks fine"
@@ -0,0 +1,11 @@
1
+ Verify the completeness and quality of the unit test audit itself.
2
+
3
+ **Important:** Refer to the audit plan report: {report:01-unit-audit-plan.md}
4
+
5
+ **Verification procedure:**
6
+ 1. Cross-check the full target inventory in the plan against the audited files and behaviors in the audit report
7
+ 2. Reject if any production file, exported API, branch, error path, boundary check, or state transition from the plan is missing from the audit result without an explicit reason
8
+ 3. Verify the audit report includes concrete evidence for both covered and missing behaviors, not just conclusions
9
+ 4. Verify the report includes the enumeration commands used and that they are sufficient to support the claimed scope
10
+ 5. Sample-read a few target production files and corresponding tests yourself to confirm the coverage claims are credible
11
+ 6. Require re-audit if issue titles, priorities, or recommended actions are too vague to be filed directly
@@ -0,0 +1,22 @@
1
+ Decompose the unit audit, assign files to each part, and execute in parallel.
2
+
3
+ **Important:** Refer to the plan report: {report:01-unit-audit-plan.md}
4
+
5
+ **What to do:**
6
+ 1. Review the production file list, existing tests, and audited behavior inventory from the plan report
7
+ 2. Split the audit into 3 groups by module or test area
8
+ 3. Assign exclusive ownership so every target file and behavior is audited once
9
+
10
+ **Each part's instruction MUST include:**
11
+ - Assigned production files and corresponding test files
12
+ - The behaviors, branches, error paths, and boundary checks to verify
13
+ - Required audit procedure:
14
+ 1. Read every assigned production file in full
15
+ 2. Read the corresponding unit tests in full
16
+ 3. Record covered and missing behaviors with concrete file evidence
17
+ - Completion criteria: every assigned target has been audited and findings are reported in issue-ready form
18
+
19
+ **Constraints:**
20
+ - Each part is read-only
21
+ - Do not modify tests or production code
22
+ - Do not audit files outside the assignment
@@ -0,0 +1,26 @@
1
+ ```markdown
2
+ # Architecture Audit Plan
3
+
4
+ ## Enumeration Evidence
5
+ - Commands used:
6
+ - `rg ...`
7
+ - `rg --files ...`
8
+ - Scope notes:
9
+ - {how modules, layers, boundaries, and entry points were enumerated}
10
+
11
+ ## Module Inventory
12
+ | # | Module / Layer | Key Files | Responsibility | Main Boundaries | Risk |
13
+ |---|----------------|-----------|----------------|-----------------|------|
14
+ | 1 | {module or layer} | `src/file.ts` | {primary responsibility} | {boundary summary} | High / Medium / Low |
15
+
16
+ ## Audit Targets
17
+ | # | Module / Layer | What to Verify | Priority |
18
+ |---|----------------|----------------|----------|
19
+ | 1 | {module or layer} | {dependency direction, wiring, ownership, abstraction} | High / Medium / Low |
20
+
21
+ ## Audit Order
22
+ - {ordered module review plan}
23
+
24
+ ## Clarifications / Risks
25
+ - {open questions or constraints}
26
+ ```
@@ -0,0 +1,38 @@
1
+ ```markdown
2
+ # Architecture Audit Report
3
+
4
+ ## Result: APPROVE / IMPROVE / REJECT
5
+
6
+ ## Enumeration Evidence
7
+ - Commands used:
8
+ - `rg ...`
9
+ - `rg --files ...`
10
+ - Coverage notes:
11
+ - {how you confirmed the full module and boundary set was audited}
12
+
13
+ ## Audit Scope
14
+ | # | Module / Layer | Audited | Key Files | Boundaries Verified |
15
+ |---|----------------|---------|-----------|---------------------|
16
+ | 1 | {module or layer} | ✅ | `src/file.ts` | {boundary summary} |
17
+
18
+ ## Findings
19
+ | # | Severity | Category | Location | Issue | Recommended Fix |
20
+ |---|----------|----------|----------|-------|-----------------|
21
+ | 1 | High / Medium / Low | boundary / coupling / wiring / dead-code | `src/file.ts:42` | {issue description} | {fix suggestion} |
22
+
23
+ ## Modules with No Blocking Issues
24
+ - {modules audited with no blocking findings}
25
+
26
+ ## Suggested Issue Titles
27
+ 1. {Issue title}
28
+ 2. {Issue title}
29
+
30
+ ## Follow-up Notes
31
+ - {non-blocking observations or constraints}
32
+ - {explicit reasons for any intentionally unaudited item}
33
+ ```
34
+
35
+ **Cognitive load reduction rules:**
36
+ - APPROVE → Scope table only (15 lines max)
37
+ - IMPROVE → Scope table + relevant findings only
38
+ - REJECT → Include only blocking findings and impacted modules
@@ -5,6 +5,13 @@
5
5
 
6
6
  ## Severity: None / Low / Medium / High / Critical
7
7
 
8
+ ## Enumeration Evidence
9
+ - Commands used:
10
+ - `rg ...`
11
+ - `rg --files ...`
12
+ - Coverage notes:
13
+ - {how you confirmed the full file set was audited}
14
+
8
15
  ## Audit Scope
9
16
  | # | File | Audited | Risk Classification |
10
17
  |---|------|---------|-------------------|
@@ -18,9 +25,17 @@
18
25
  ## Files with No Issues
19
26
  - {list of files where no issues were detected}
20
27
 
28
+ ## Suggested Issue Titles
29
+ 1. {Issue title}
30
+ 2. {Issue title}
31
+
21
32
  ## Recommendations (non-blocking)
22
33
  - {security improvement suggestions}
23
34
 
35
+ ## Notes
36
+ - {constraints, assumptions, or audit limits}
37
+ - {explicit reasons for any intentionally unaudited item}
38
+
24
39
  ## REJECT Criteria
25
40
  - REJECT if one or more High or Critical issues exist
26
41
  ```
@@ -0,0 +1,26 @@
1
+ ```markdown
2
+ # E2E Audit Plan
3
+
4
+ ## Enumeration Evidence
5
+ - Commands used:
6
+ - `rg ...`
7
+ - `rg --files ...`
8
+ - Scope notes:
9
+ - {how routes, flows, and E2E specs were enumerated}
10
+
11
+ ## Audited User Flows
12
+ | # | Area | Route / Entry | Existing Scenarios | Coverage Status | Risk |
13
+ |---|------|---------------|--------------------|-----------------|------|
14
+ | 1 | {feature area} | {route or entry point} | {existing test names} | Covered / Partial / Missing | High / Medium / Low |
15
+
16
+ ## Missing Scenarios
17
+ | # | Area | Scenario | Priority | Planned Test Location |
18
+ |---|------|----------|----------|-----------------------|
19
+ | 1 | {feature area} | {missing scenario} | High / Medium / Low | `e2e/example.spec.ts` |
20
+
21
+ ## Audit Order
22
+ - {ordered audit plan}
23
+
24
+ ## Clarifications / Risks
25
+ - {open questions or constraints}
26
+ ```
@@ -0,0 +1,41 @@
1
+ ```markdown
2
+ # E2E Audit Report
3
+
4
+ ## Result: APPROVE / IMPROVE / REJECT
5
+
6
+ ## Summary
7
+ {1-3 sentences summarizing the flow coverage situation}
8
+
9
+ ## Enumeration Evidence
10
+ - Commands used:
11
+ - `rg ...`
12
+ - `rg --files ...`
13
+ - Coverage notes:
14
+ - {how you confirmed the full flow set was audited}
15
+
16
+ ## Scope
17
+ | # | Area | Route / Entry | Existing Scenarios | Coverage Status | Risk |
18
+ |---|------|---------------|--------------------|-----------------|------|
19
+ | 1 | {feature area} | {route or entry point} | {existing test names} | Covered / Partial / Missing | High / Medium / Low |
20
+
21
+ ## Findings
22
+ | # | Priority | Area | Location | Gap | Recommended Action |
23
+ |---|----------|------|----------|-----|--------------------|
24
+ | 1 | High / Medium / Low | e2e-testing | `e2e/example.spec.ts` / `src/page.tsx:42` | {missing or weakly tested scenario} | {issue-ready action} |
25
+
26
+ ## No-Issue Areas
27
+ - {flows confirmed as adequately covered}
28
+
29
+ ## Suggested Issue Titles
30
+ 1. {Issue title}
31
+ 2. {Issue title}
32
+
33
+ ## Notes
34
+ - {constraints, assumptions, or audit limits}
35
+ - {explicit reasons for any intentionally unaudited item}
36
+ ```
37
+
38
+ **Cognitive load reduction rules:**
39
+ - APPROVE → Summary + Scope only
40
+ - IMPROVE → Include only relevant gaps
41
+ - REJECT → Include only blocking or high-priority gaps
@@ -0,0 +1,26 @@
1
+ ```markdown
2
+ # Unit Test Audit Plan
3
+
4
+ ## Enumeration Evidence
5
+ - Commands used:
6
+ - `rg ...`
7
+ - `rg --files ...`
8
+ - Scope notes:
9
+ - {how target production files and tests were enumerated}
10
+
11
+ ## Audit Scope
12
+ | # | Production File | Existing Test Files | Audited Behaviors / Branches | Coverage Status |
13
+ |---|-----------------|---------------------|------------------------------|-----------------|
14
+ | 1 | `src/file.ts` | `src/__tests__/file.test.ts` | {exported APIs, branches, errors, boundaries} | Covered / Partial / Missing |
15
+
16
+ ## Missing Test Cases
17
+ | # | Production File | Behavior / Branch | Priority | Planned Test Location |
18
+ |---|-----------------|-------------------|----------|-----------------------|
19
+ | 1 | `src/file.ts` | {missing behavior} | High / Medium / Low | `src/__tests__/file.test.ts` |
20
+
21
+ ## Audit Order
22
+ - {ordered audit plan}
23
+
24
+ ## Clarifications / Risks
25
+ - {open questions or constraints}
26
+ ```
@@ -0,0 +1,41 @@
1
+ ```markdown
2
+ # Unit Audit Report
3
+
4
+ ## Result: APPROVE / IMPROVE / REJECT
5
+
6
+ ## Summary
7
+ {1-3 sentences summarizing the coverage situation}
8
+
9
+ ## Enumeration Evidence
10
+ - Commands used:
11
+ - `rg ...`
12
+ - `rg --files ...`
13
+ - Coverage notes:
14
+ - {how you confirmed the full target set was audited}
15
+
16
+ ## Scope
17
+ | # | Production File | Existing Test Files | Audited Behaviors | Coverage Status |
18
+ |---|-----------------|---------------------|-------------------|-----------------|
19
+ | 1 | `src/file.ts` | `src/__tests__/file.test.ts` | {key behaviors} | Covered / Partial / Missing |
20
+
21
+ ## Findings
22
+ | # | Priority | Area | Location | Gap | Recommended Action |
23
+ |---|----------|------|----------|-----|--------------------|
24
+ | 1 | High / Medium / Low | unit-testing | `src/file.ts:42` | {missing or weakly tested behavior} | {issue-ready action} |
25
+
26
+ ## No-Issue Areas
27
+ - {files or behaviors confirmed as adequately covered}
28
+
29
+ ## Suggested Issue Titles
30
+ 1. {Issue title}
31
+ 2. {Issue title}
32
+
33
+ ## Notes
34
+ - {constraints, assumptions, or audit limits}
35
+ - {explicit reasons for any intentionally unaudited item}
36
+ ```
37
+
38
+ **Cognitive load reduction rules:**
39
+ - APPROVE → Summary + Scope only
40
+ - IMPROVE → Include only relevant gaps
41
+ - REJECT → Include only blocking or high-priority gaps
@@ -47,11 +47,13 @@ piece_categories:
47
47
  - review-fix-backend-cqrs
48
48
  - review-takt-default
49
49
  - review-fix-takt-default
50
- - security-audit
51
- 🧪 Testing:
52
- pieces:
53
- - fill-unit
54
- - fill-e2e
50
+ - audit-unit
51
+ - audit-e2e
52
+ - audit-security
53
+ - audit-architecture
54
+ - audit-architecture-frontend
55
+ - audit-architecture-backend
56
+ - audit-architecture-dual
55
57
  🎵 TAKT Development:
56
58
  pieces:
57
59
  - takt-default
@@ -0,0 +1,83 @@
1
+ name: audit-architecture-backend
2
+ description: Backend-focused architecture audit. Enumerate service modules and boundaries, then produce an issue-ready report without modifying code
3
+ max_movements: 12
4
+ initial_movement: plan
5
+
6
+ loop_monitors:
7
+ - cycle: [supervise, review]
8
+ threshold: 4
9
+ judge:
10
+ persona: supervisor
11
+ instruction: |
12
+ The supervise → review cycle for the backend architecture audit has repeated {cycle_count} times.
13
+ Judge the overall completeness and quality of the audit, and decide whether the current results are acceptable.
14
+ rules:
15
+ - condition: Quality is sufficient
16
+ next: COMPLETE
17
+ - condition: Quality is insufficient with no prospect of improvement
18
+ next: ABORT
19
+
20
+ movements:
21
+ - name: plan
22
+ persona: planner
23
+ knowledge:
24
+ - backend
25
+ - architecture
26
+ instruction: architecture-audit-plan
27
+ edit: false
28
+ output_contracts:
29
+ report:
30
+ - name: 01-architecture-audit-plan.md
31
+ format: architecture-audit-plan
32
+ rules:
33
+ - condition: Module inventory and audit scope complete
34
+ next: audit
35
+ - condition: Requirements unclear, insufficient info
36
+ next: ABORT
37
+
38
+ - name: audit
39
+ persona: architecture-reviewer
40
+ policy: review
41
+ knowledge:
42
+ - backend
43
+ - architecture
44
+ instruction: architecture-audit-team-leader
45
+ edit: false
46
+ team_leader:
47
+ max_parts: 3
48
+ part_persona: architecture-reviewer
49
+ part_edit: false
50
+ output_contracts:
51
+ report:
52
+ - name: 02-architecture-audit.md
53
+ format: architecture-audit
54
+ rules:
55
+ - condition: Audit complete
56
+ next: supervise
57
+
58
+ - name: supervise
59
+ persona: supervisor
60
+ policy: review
61
+ knowledge:
62
+ - backend
63
+ - architecture
64
+ instruction: architecture-audit-supervise
65
+ edit: false
66
+ pass_previous_response: false
67
+ rules:
68
+ - condition: Audit is complete and issue-ready
69
+ next: COMPLETE
70
+ - condition: Architecture audit is incomplete or evidence is insufficient
71
+ next: review
72
+
73
+ - name: review
74
+ persona: architecture-reviewer
75
+ policy: review
76
+ knowledge:
77
+ - backend
78
+ - architecture
79
+ instruction: architecture-audit-review
80
+ edit: false
81
+ rules:
82
+ - condition: Re-audit complete
83
+ next: supervise
@@ -0,0 +1,87 @@
1
+ name: audit-architecture-dual
2
+ description: Full-stack architecture audit. Enumerate frontend/backend boundaries and cross-layer wiring, then produce an issue-ready report without modifying code
3
+ max_movements: 12
4
+ initial_movement: plan
5
+
6
+ loop_monitors:
7
+ - cycle: [supervise, review]
8
+ threshold: 4
9
+ judge:
10
+ persona: supervisor
11
+ instruction: |
12
+ The supervise → review cycle for the dual architecture audit has repeated {cycle_count} times.
13
+ Judge the overall completeness and quality of the audit, and decide whether the current results are acceptable.
14
+ rules:
15
+ - condition: Quality is sufficient
16
+ next: COMPLETE
17
+ - condition: Quality is insufficient with no prospect of improvement
18
+ next: ABORT
19
+
20
+ movements:
21
+ - name: plan
22
+ persona: planner
23
+ knowledge:
24
+ - frontend
25
+ - backend
26
+ - architecture
27
+ instruction: architecture-audit-plan
28
+ edit: false
29
+ output_contracts:
30
+ report:
31
+ - name: 01-architecture-audit-plan.md
32
+ format: architecture-audit-plan
33
+ rules:
34
+ - condition: Module inventory and audit scope complete
35
+ next: audit
36
+ - condition: Requirements unclear, insufficient info
37
+ next: ABORT
38
+
39
+ - name: audit
40
+ persona: architecture-reviewer
41
+ policy: review
42
+ knowledge:
43
+ - frontend
44
+ - backend
45
+ - architecture
46
+ instruction: architecture-audit-team-leader
47
+ edit: false
48
+ team_leader:
49
+ max_parts: 3
50
+ part_persona: architecture-reviewer
51
+ part_edit: false
52
+ output_contracts:
53
+ report:
54
+ - name: 02-architecture-audit.md
55
+ format: architecture-audit
56
+ rules:
57
+ - condition: Audit complete
58
+ next: supervise
59
+
60
+ - name: supervise
61
+ persona: supervisor
62
+ policy: review
63
+ knowledge:
64
+ - frontend
65
+ - backend
66
+ - architecture
67
+ instruction: architecture-audit-supervise
68
+ edit: false
69
+ pass_previous_response: false
70
+ rules:
71
+ - condition: Audit is complete and issue-ready
72
+ next: COMPLETE
73
+ - condition: Architecture audit is incomplete or evidence is insufficient
74
+ next: review
75
+
76
+ - name: review
77
+ persona: architecture-reviewer
78
+ policy: review
79
+ knowledge:
80
+ - frontend
81
+ - backend
82
+ - architecture
83
+ instruction: architecture-audit-review
84
+ edit: false
85
+ rules:
86
+ - condition: Re-audit complete
87
+ next: supervise