takt 0.33.1 → 0.33.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/builtins/en/facets/instructions/architecture-audit-plan.md +13 -0
- package/builtins/en/facets/instructions/architecture-audit-review.md +15 -0
- package/builtins/en/facets/instructions/architecture-audit-supervise.md +14 -0
- package/builtins/en/facets/instructions/architecture-audit-team-leader.md +22 -0
- package/builtins/en/facets/instructions/e2e-audit-plan.md +13 -0
- package/builtins/en/facets/instructions/e2e-audit-review.md +16 -0
- package/builtins/en/facets/instructions/e2e-audit-supervise.md +11 -0
- package/builtins/en/facets/instructions/e2e-audit-team-leader.md +22 -0
- package/builtins/en/facets/instructions/unit-audit-plan.md +13 -0
- package/builtins/en/facets/instructions/unit-audit-review.md +16 -0
- package/builtins/en/facets/instructions/unit-audit-supervise.md +11 -0
- package/builtins/en/facets/instructions/unit-audit-team-leader.md +22 -0
- package/builtins/en/facets/output-contracts/architecture-audit-plan.md +26 -0
- package/builtins/en/facets/output-contracts/architecture-audit.md +38 -0
- package/builtins/en/facets/output-contracts/{security-audit.md → audit-security.md} +15 -0
- package/builtins/en/facets/output-contracts/e2e-audit-plan.md +26 -0
- package/builtins/en/facets/output-contracts/e2e-audit.md +41 -0
- package/builtins/en/facets/output-contracts/unit-audit-plan.md +26 -0
- package/builtins/en/facets/output-contracts/unit-audit.md +41 -0
- package/builtins/en/piece-categories.yaml +7 -5
- package/builtins/en/pieces/audit-architecture-backend.yaml +83 -0
- package/builtins/en/pieces/audit-architecture-dual.yaml +87 -0
- package/builtins/en/pieces/audit-architecture-frontend.yaml +87 -0
- package/builtins/en/pieces/audit-architecture.yaml +75 -0
- package/builtins/en/pieces/audit-e2e.yaml +92 -0
- package/builtins/en/pieces/{security-audit.yaml → audit-security.yaml} +7 -7
- package/builtins/en/pieces/audit-unit.yaml +94 -0
- package/builtins/ja/facets/instructions/architecture-audit-plan.md +13 -0
- package/builtins/ja/facets/instructions/architecture-audit-review.md +15 -0
- package/builtins/ja/facets/instructions/architecture-audit-supervise.md +14 -0
- package/builtins/ja/facets/instructions/architecture-audit-team-leader.md +22 -0
- package/builtins/ja/facets/instructions/e2e-audit-plan.md +13 -0
- package/builtins/ja/facets/instructions/e2e-audit-review.md +16 -0
- package/builtins/ja/facets/instructions/e2e-audit-supervise.md +11 -0
- package/builtins/ja/facets/instructions/e2e-audit-team-leader.md +22 -0
- package/builtins/ja/facets/instructions/unit-audit-plan.md +13 -0
- package/builtins/ja/facets/instructions/unit-audit-review.md +16 -0
- package/builtins/ja/facets/instructions/unit-audit-supervise.md +11 -0
- package/builtins/ja/facets/instructions/unit-audit-team-leader.md +22 -0
- package/builtins/ja/facets/output-contracts/architecture-audit-plan.md +26 -0
- package/builtins/ja/facets/output-contracts/architecture-audit.md +38 -0
- package/builtins/ja/facets/output-contracts/{security-audit.md → audit-security.md} +15 -0
- package/builtins/ja/facets/output-contracts/e2e-audit-plan.md +26 -0
- package/builtins/ja/facets/output-contracts/e2e-audit.md +41 -0
- package/builtins/ja/facets/output-contracts/unit-audit-plan.md +26 -0
- package/builtins/ja/facets/output-contracts/unit-audit.md +41 -0
- package/builtins/ja/piece-categories.yaml +7 -5
- package/builtins/ja/pieces/audit-architecture-backend.yaml +83 -0
- package/builtins/ja/pieces/audit-architecture-dual.yaml +87 -0
- package/builtins/ja/pieces/audit-architecture-frontend.yaml +87 -0
- package/builtins/ja/pieces/audit-architecture.yaml +75 -0
- package/builtins/ja/pieces/audit-e2e.yaml +92 -0
- package/builtins/ja/pieces/{security-audit.yaml → audit-security.yaml} +7 -7
- package/builtins/ja/pieces/audit-unit.yaml +94 -0
- package/dist/app/cli/routing-inputs.d.ts +2 -2
- package/dist/app/cli/routing-inputs.d.ts.map +1 -1
- package/dist/app/cli/routing-inputs.js +11 -8
- package/dist/app/cli/routing-inputs.js.map +1 -1
- package/dist/features/pipeline/steps.d.ts.map +1 -1
- package/dist/features/pipeline/steps.js +7 -6
- package/dist/features/pipeline/steps.js.map +1 -1
- package/dist/features/tasks/add/index.js +4 -4
- package/dist/features/tasks/add/index.js.map +1 -1
- package/dist/features/tasks/add/issueTask.d.ts +1 -0
- package/dist/features/tasks/add/issueTask.d.ts.map +1 -1
- package/dist/features/tasks/add/issueTask.js +1 -1
- package/dist/features/tasks/add/issueTask.js.map +1 -1
- package/dist/features/tasks/execute/postExecution.js +4 -4
- package/dist/features/tasks/execute/postExecution.js.map +1 -1
- package/dist/features/tasks/execute/resolveTask.js +1 -1
- package/dist/features/tasks/execute/resolveTask.js.map +1 -1
- package/dist/infra/git/detect.d.ts +1 -1
- package/dist/infra/git/detect.d.ts.map +1 -1
- package/dist/infra/git/detect.js +2 -2
- package/dist/infra/git/detect.js.map +1 -1
- package/dist/infra/git/index.d.ts +2 -2
- package/dist/infra/git/index.d.ts.map +1 -1
- package/dist/infra/git/index.js +8 -8
- package/dist/infra/git/index.js.map +1 -1
- package/dist/infra/git/types.d.ts +5 -5
- package/dist/infra/git/types.d.ts.map +1 -1
- package/dist/infra/github/GitHubProvider.d.ts +7 -7
- package/dist/infra/github/GitHubProvider.d.ts.map +1 -1
- package/dist/infra/github/GitHubProvider.js +14 -14
- package/dist/infra/github/GitHubProvider.js.map +1 -1
- package/dist/infra/github/issue.d.ts +3 -3
- package/dist/infra/github/issue.d.ts.map +1 -1
- package/dist/infra/github/issue.js +11 -9
- package/dist/infra/github/issue.js.map +1 -1
- package/dist/infra/github/pr.d.ts +4 -4
- package/dist/infra/github/pr.d.ts.map +1 -1
- package/dist/infra/github/pr.js +11 -11
- package/dist/infra/github/pr.js.map +1 -1
- package/dist/infra/gitlab/GitLabProvider.d.ts +5 -5
- package/dist/infra/gitlab/GitLabProvider.d.ts.map +1 -1
- package/dist/infra/gitlab/GitLabProvider.js +10 -10
- package/dist/infra/gitlab/GitLabProvider.js.map +1 -1
- package/dist/infra/gitlab/issue.d.ts +1 -1
- package/dist/infra/gitlab/issue.d.ts.map +1 -1
- package/dist/infra/gitlab/issue.js +3 -3
- package/dist/infra/gitlab/issue.js.map +1 -1
- package/dist/infra/gitlab/pr.d.ts +4 -4
- package/dist/infra/gitlab/pr.d.ts.map +1 -1
- package/dist/infra/gitlab/pr.js +8 -8
- package/dist/infra/gitlab/pr.js.map +1 -1
- package/dist/infra/gitlab/utils.d.ts +1 -1
- package/dist/infra/gitlab/utils.d.ts.map +1 -1
- package/dist/infra/gitlab/utils.js +4 -4
- package/dist/infra/gitlab/utils.js.map +1 -1
- package/package.json +1 -1
- package/builtins/en/pieces/fill-e2e.yaml +0 -239
- package/builtins/en/pieces/fill-unit.yaml +0 -269
- package/builtins/ja/pieces/fill-e2e.yaml +0 -239
- package/builtins/ja/pieces/fill-unit.yaml +0 -269
- /package/builtins/en/facets/instructions/{security-audit-plan.md → audit-security-plan.md} +0 -0
- /package/builtins/en/facets/instructions/{security-audit-review.md → audit-security-review.md} +0 -0
- /package/builtins/en/facets/instructions/{security-audit-supervise.md → audit-security-supervise.md} +0 -0
- /package/builtins/en/facets/instructions/{security-audit-team-leader.md → audit-security-team-leader.md} +0 -0
- /package/builtins/ja/facets/instructions/{security-audit-plan.md → audit-security-plan.md} +0 -0
- /package/builtins/ja/facets/instructions/{security-audit-review.md → audit-security-review.md} +0 -0
- /package/builtins/ja/facets/instructions/{security-audit-supervise.md → audit-security-supervise.md} +0 -0
- /package/builtins/ja/facets/instructions/{security-audit-team-leader.md → audit-security-team-leader.md} +0 -0
|
@@ -0,0 +1,13 @@
|
|
|
1
|
+
Audit the project architecture before making changes.
|
|
2
|
+
|
|
3
|
+
**What to do:**
|
|
4
|
+
1. Enumerate the main modules, layers, boundaries, and public entry points using Read, Glob, and Grep
|
|
5
|
+
2. Identify the dependency directions, shared abstractions, and major call chains
|
|
6
|
+
3. Build an audit scope that covers all modules relevant to structure, ownership, and wiring
|
|
7
|
+
4. Highlight modules with higher architectural risk (boundary leaks, giant files, scattered logic, coupling hotspots)
|
|
8
|
+
5. Prepare an audit order that reviews the highest-risk modules first
|
|
9
|
+
|
|
10
|
+
**Important:**
|
|
11
|
+
- Start from full module and boundary enumeration, not from a few suspicious files
|
|
12
|
+
- Focus on structure and wiring, not style-only comments
|
|
13
|
+
- If the architecture cannot be inferred from code alone, state the missing evidence explicitly
|
|
@@ -0,0 +1,15 @@
|
|
|
1
|
+
Re-audit the modules or boundaries that were judged insufficient in the previous architecture audit.
|
|
2
|
+
|
|
3
|
+
**Important:** Refer to these reports:
|
|
4
|
+
- Plan report: {report:01-architecture-audit-plan.md}
|
|
5
|
+
- Audit report: {report:02-architecture-audit.md}
|
|
6
|
+
|
|
7
|
+
**What to do:**
|
|
8
|
+
1. Read the flagged modules, boundaries, and call chains in full
|
|
9
|
+
2. Re-check the structural claims and identify what was previously skipped or weakly evidenced
|
|
10
|
+
3. Update the audit result with concrete file evidence, explicit scope coverage, and missing-item reasons where applicable
|
|
11
|
+
|
|
12
|
+
**Strictly prohibited:**
|
|
13
|
+
- Modifying production code
|
|
14
|
+
- Claiming a boundary or dependency direction is valid without file evidence
|
|
15
|
+
- Skipping a flagged module because it "looks standard"
|
|
@@ -0,0 +1,14 @@
|
|
|
1
|
+
Verify the completeness and quality of the architecture audit itself.
|
|
2
|
+
|
|
3
|
+
**Important:** Refer to these reports:
|
|
4
|
+
- Plan report: {report:01-architecture-audit-plan.md}
|
|
5
|
+
- Audit report: {report:02-architecture-audit.md}
|
|
6
|
+
|
|
7
|
+
**Verification procedure:**
|
|
8
|
+
1. Cross-check the module inventory from the plan against the audited modules in the audit report
|
|
9
|
+
2. Reject if important modules or boundaries remain unaudited
|
|
10
|
+
3. Reject if key dependency directions, wiring paths, ownership boundaries, or call chains from the plan are missing from the audit result without an explicit reason
|
|
11
|
+
4. Verify the audit report includes concrete structural evidence, not just design opinions
|
|
12
|
+
5. Verify the report includes the enumeration commands used and that they are sufficient to support the claimed scope
|
|
13
|
+
6. Sample-read a few high-risk modules yourself to confirm the structural claims are credible
|
|
14
|
+
7. Require re-audit if findings or suggested issue titles are too vague to file directly
|
|
@@ -0,0 +1,22 @@
|
|
|
1
|
+
Decompose the architecture audit, assign modules to each part, and execute in parallel.
|
|
2
|
+
|
|
3
|
+
**Important:** Refer to the plan report: {report:01-architecture-audit-plan.md}
|
|
4
|
+
|
|
5
|
+
**What to do:**
|
|
6
|
+
1. Review the module inventory and architectural risk areas from the plan report
|
|
7
|
+
2. Split the audit into 3 groups by module or boundary
|
|
8
|
+
3. Assign exclusive ownership to each part so every relevant module is audited once
|
|
9
|
+
|
|
10
|
+
**Each part's instruction MUST include:**
|
|
11
|
+
- Assigned module and file list
|
|
12
|
+
- The boundaries and call chains to verify
|
|
13
|
+
- Required audit procedure:
|
|
14
|
+
1. Read the assigned files in full
|
|
15
|
+
2. Trace dependency direction, entry points, and shared abstractions
|
|
16
|
+
3. Record structural findings with concrete file evidence
|
|
17
|
+
- Completion criteria: every assigned module has been audited and all findings are reported with evidence
|
|
18
|
+
|
|
19
|
+
**Constraints:**
|
|
20
|
+
- Each part is read-only
|
|
21
|
+
- Do not audit files outside the assignment
|
|
22
|
+
- Prefer evidence from code structure and call chains over style-only comments
|
|
@@ -0,0 +1,13 @@
|
|
|
1
|
+
Audit the target for E2E coverage before making changes.
|
|
2
|
+
|
|
3
|
+
**What to do:**
|
|
4
|
+
1. Enumerate all user entry points, major routes, task flows, and failure paths from the codebase
|
|
5
|
+
2. Read the existing E2E tests and map which flows and scenarios are already covered
|
|
6
|
+
3. Build a complete list of auditable user flows and scenario variants
|
|
7
|
+
4. Identify missing E2E scenarios and prioritize them by user impact and regression risk
|
|
8
|
+
5. Prepare an implementation order that covers the highest-risk missing scenarios first
|
|
9
|
+
|
|
10
|
+
**Important:**
|
|
11
|
+
- Start from complete route and flow enumeration, not from a few obvious pages
|
|
12
|
+
- Include unhappy paths, permission differences, and recovery paths when relevant
|
|
13
|
+
- If a flow cannot be audited from local code and tests alone, state the missing evidence explicitly
|
|
@@ -0,0 +1,16 @@
|
|
|
1
|
+
Re-audit the routes or scenarios that were judged insufficient in the previous E2E audit.
|
|
2
|
+
|
|
3
|
+
**Important:** Review the supervisor's verification results and understand:
|
|
4
|
+
- Unaudited flows or scenarios
|
|
5
|
+
- Coverage claims lacking evidence
|
|
6
|
+
- Specific feedback on issue quality or scope
|
|
7
|
+
|
|
8
|
+
**What to do:**
|
|
9
|
+
1. Read the flagged route-related code and corresponding E2E tests in full
|
|
10
|
+
2. Re-check the coverage claims for the flagged scenarios and identify what was previously skipped or weakly evidenced
|
|
11
|
+
3. Update the audit result in issue-ready form with concrete evidence, explicit scope coverage, and missing-item reasons where applicable
|
|
12
|
+
|
|
13
|
+
**Strictly prohibited:**
|
|
14
|
+
- Modifying E2E tests or production code
|
|
15
|
+
- Claiming a scenario is covered without citing the actual test evidence
|
|
16
|
+
- Skipping a flagged route because it "looks fine"
|
|
@@ -0,0 +1,11 @@
|
|
|
1
|
+
Verify the completeness and quality of the E2E audit itself.
|
|
2
|
+
|
|
3
|
+
**Important:** Refer to the audit plan report: {report:01-e2e-audit-plan.md}
|
|
4
|
+
|
|
5
|
+
**Verification procedure:**
|
|
6
|
+
1. Cross-check the full route and flow inventory in the plan against the audited scenarios in the audit report
|
|
7
|
+
2. Reject if any important entry point, user flow, unhappy path, permission variant, or recovery path from the plan is missing from the audit result without an explicit reason
|
|
8
|
+
3. Verify the audit report includes concrete evidence for covered and missing scenarios, not just high-level claims
|
|
9
|
+
4. Verify the report includes the enumeration commands used and that they are sufficient to support the claimed scope
|
|
10
|
+
5. Sample-read a few high-risk routes and corresponding tests yourself to validate the coverage claims
|
|
11
|
+
6. Require re-audit if issue titles, priorities, or recommended actions are too vague to be filed directly
|
|
@@ -0,0 +1,22 @@
|
|
|
1
|
+
Decompose the E2E audit, assign flows to each part, and execute in parallel.
|
|
2
|
+
|
|
3
|
+
**Important:** Refer to the plan report: {report:01-e2e-audit-plan.md}
|
|
4
|
+
|
|
5
|
+
**What to do:**
|
|
6
|
+
1. Review the user flow list, existing scenarios, and risk areas from the plan report
|
|
7
|
+
2. Split the audit into 3 groups by feature area or route cluster
|
|
8
|
+
3. Assign exclusive ownership so every audited flow is reviewed once
|
|
9
|
+
|
|
10
|
+
**Each part's instruction MUST include:**
|
|
11
|
+
- Assigned routes, entry points, and corresponding E2E files
|
|
12
|
+
- The happy paths, failure paths, and permission variants to verify
|
|
13
|
+
- Required audit procedure:
|
|
14
|
+
1. Read the relevant code for the assigned flows
|
|
15
|
+
2. Read the corresponding E2E tests in full
|
|
16
|
+
3. Record covered and missing scenarios with concrete evidence
|
|
17
|
+
- Completion criteria: every assigned flow has been audited and findings are reported in issue-ready form
|
|
18
|
+
|
|
19
|
+
**Constraints:**
|
|
20
|
+
- Each part is read-only
|
|
21
|
+
- Do not modify E2E tests or production code
|
|
22
|
+
- Do not audit routes outside the assignment
|
|
@@ -0,0 +1,13 @@
|
|
|
1
|
+
Audit the target for unit test coverage before making changes.
|
|
2
|
+
|
|
3
|
+
**What to do:**
|
|
4
|
+
1. Enumerate the target production files, exported APIs, internal branches, error paths, boundary checks, and state transitions using Read, Glob, and Grep
|
|
5
|
+
2. Read existing unit tests and map which behaviors are already covered
|
|
6
|
+
3. Build a complete inventory of auditable behaviors for each target file
|
|
7
|
+
4. Identify missing unit tests and prioritize them by regression risk
|
|
8
|
+
5. Prepare an implementation order that covers the highest-risk gaps first
|
|
9
|
+
|
|
10
|
+
**Important:**
|
|
11
|
+
- Start from complete enumeration, not from a few obvious gaps
|
|
12
|
+
- Do not stop after identifying a handful of missing tests
|
|
13
|
+
- If the scope is unclear, state exactly which files or behaviors need clarification
|
|
@@ -0,0 +1,16 @@
|
|
|
1
|
+
Re-audit the files or behaviors that were judged insufficient in the previous unit audit.
|
|
2
|
+
|
|
3
|
+
**Important:** Review the supervisor's verification results and understand:
|
|
4
|
+
- Unaudited files or behaviors
|
|
5
|
+
- Coverage claims lacking evidence
|
|
6
|
+
- Specific feedback on issue quality or scope
|
|
7
|
+
|
|
8
|
+
**What to do:**
|
|
9
|
+
1. Read the flagged production files and corresponding tests in full
|
|
10
|
+
2. Re-check the coverage claims for the flagged behaviors and identify what was previously skipped or weakly evidenced
|
|
11
|
+
3. Update the audit result in issue-ready form with concrete evidence, explicit scope coverage, and missing-item reasons where applicable
|
|
12
|
+
|
|
13
|
+
**Strictly prohibited:**
|
|
14
|
+
- Modifying tests or production code
|
|
15
|
+
- Claiming a behavior is covered without citing the actual test evidence
|
|
16
|
+
- Skipping a flagged file or behavior because it "looks fine"
|
|
@@ -0,0 +1,11 @@
|
|
|
1
|
+
Verify the completeness and quality of the unit test audit itself.
|
|
2
|
+
|
|
3
|
+
**Important:** Refer to the audit plan report: {report:01-unit-audit-plan.md}
|
|
4
|
+
|
|
5
|
+
**Verification procedure:**
|
|
6
|
+
1. Cross-check the full target inventory in the plan against the audited files and behaviors in the audit report
|
|
7
|
+
2. Reject if any production file, exported API, branch, error path, boundary check, or state transition from the plan is missing from the audit result without an explicit reason
|
|
8
|
+
3. Verify the audit report includes concrete evidence for both covered and missing behaviors, not just conclusions
|
|
9
|
+
4. Verify the report includes the enumeration commands used and that they are sufficient to support the claimed scope
|
|
10
|
+
5. Sample-read a few target production files and corresponding tests yourself to confirm the coverage claims are credible
|
|
11
|
+
6. Require re-audit if issue titles, priorities, or recommended actions are too vague to be filed directly
|
|
@@ -0,0 +1,22 @@
|
|
|
1
|
+
Decompose the unit audit, assign files to each part, and execute in parallel.
|
|
2
|
+
|
|
3
|
+
**Important:** Refer to the plan report: {report:01-unit-audit-plan.md}
|
|
4
|
+
|
|
5
|
+
**What to do:**
|
|
6
|
+
1. Review the production file list, existing tests, and audited behavior inventory from the plan report
|
|
7
|
+
2. Split the audit into 3 groups by module or test area
|
|
8
|
+
3. Assign exclusive ownership so every target file and behavior is audited once
|
|
9
|
+
|
|
10
|
+
**Each part's instruction MUST include:**
|
|
11
|
+
- Assigned production files and corresponding test files
|
|
12
|
+
- The behaviors, branches, error paths, and boundary checks to verify
|
|
13
|
+
- Required audit procedure:
|
|
14
|
+
1. Read every assigned production file in full
|
|
15
|
+
2. Read the corresponding unit tests in full
|
|
16
|
+
3. Record covered and missing behaviors with concrete file evidence
|
|
17
|
+
- Completion criteria: every assigned target has been audited and findings are reported in issue-ready form
|
|
18
|
+
|
|
19
|
+
**Constraints:**
|
|
20
|
+
- Each part is read-only
|
|
21
|
+
- Do not modify tests or production code
|
|
22
|
+
- Do not audit files outside the assignment
|
|
@@ -0,0 +1,26 @@
|
|
|
1
|
+
```markdown
|
|
2
|
+
# Architecture Audit Plan
|
|
3
|
+
|
|
4
|
+
## Enumeration Evidence
|
|
5
|
+
- Commands used:
|
|
6
|
+
- `rg ...`
|
|
7
|
+
- `rg --files ...`
|
|
8
|
+
- Scope notes:
|
|
9
|
+
- {how modules, layers, boundaries, and entry points were enumerated}
|
|
10
|
+
|
|
11
|
+
## Module Inventory
|
|
12
|
+
| # | Module / Layer | Key Files | Responsibility | Main Boundaries | Risk |
|
|
13
|
+
|---|----------------|-----------|----------------|-----------------|------|
|
|
14
|
+
| 1 | {module or layer} | `src/file.ts` | {primary responsibility} | {boundary summary} | High / Medium / Low |
|
|
15
|
+
|
|
16
|
+
## Audit Targets
|
|
17
|
+
| # | Module / Layer | What to Verify | Priority |
|
|
18
|
+
|---|----------------|----------------|----------|
|
|
19
|
+
| 1 | {module or layer} | {dependency direction, wiring, ownership, abstraction} | High / Medium / Low |
|
|
20
|
+
|
|
21
|
+
## Audit Order
|
|
22
|
+
- {ordered module review plan}
|
|
23
|
+
|
|
24
|
+
## Clarifications / Risks
|
|
25
|
+
- {open questions or constraints}
|
|
26
|
+
```
|
|
@@ -0,0 +1,38 @@
|
|
|
1
|
+
```markdown
|
|
2
|
+
# Architecture Audit Report
|
|
3
|
+
|
|
4
|
+
## Result: APPROVE / IMPROVE / REJECT
|
|
5
|
+
|
|
6
|
+
## Enumeration Evidence
|
|
7
|
+
- Commands used:
|
|
8
|
+
- `rg ...`
|
|
9
|
+
- `rg --files ...`
|
|
10
|
+
- Coverage notes:
|
|
11
|
+
- {how you confirmed the full module and boundary set was audited}
|
|
12
|
+
|
|
13
|
+
## Audit Scope
|
|
14
|
+
| # | Module / Layer | Audited | Key Files | Boundaries Verified |
|
|
15
|
+
|---|----------------|---------|-----------|---------------------|
|
|
16
|
+
| 1 | {module or layer} | ✅ | `src/file.ts` | {boundary summary} |
|
|
17
|
+
|
|
18
|
+
## Findings
|
|
19
|
+
| # | Severity | Category | Location | Issue | Recommended Fix |
|
|
20
|
+
|---|----------|----------|----------|-------|-----------------|
|
|
21
|
+
| 1 | High / Medium / Low | boundary / coupling / wiring / dead-code | `src/file.ts:42` | {issue description} | {fix suggestion} |
|
|
22
|
+
|
|
23
|
+
## Modules with No Blocking Issues
|
|
24
|
+
- {modules audited with no blocking findings}
|
|
25
|
+
|
|
26
|
+
## Suggested Issue Titles
|
|
27
|
+
1. {Issue title}
|
|
28
|
+
2. {Issue title}
|
|
29
|
+
|
|
30
|
+
## Follow-up Notes
|
|
31
|
+
- {non-blocking observations or constraints}
|
|
32
|
+
- {explicit reasons for any intentionally unaudited item}
|
|
33
|
+
```
|
|
34
|
+
|
|
35
|
+
**Cognitive load reduction rules:**
|
|
36
|
+
- APPROVE → Scope table only (15 lines max)
|
|
37
|
+
- IMPROVE → Scope table + relevant findings only
|
|
38
|
+
- REJECT → Include only blocking findings and impacted modules
|
|
@@ -5,6 +5,13 @@
|
|
|
5
5
|
|
|
6
6
|
## Severity: None / Low / Medium / High / Critical
|
|
7
7
|
|
|
8
|
+
## Enumeration Evidence
|
|
9
|
+
- Commands used:
|
|
10
|
+
- `rg ...`
|
|
11
|
+
- `rg --files ...`
|
|
12
|
+
- Coverage notes:
|
|
13
|
+
- {how you confirmed the full file set was audited}
|
|
14
|
+
|
|
8
15
|
## Audit Scope
|
|
9
16
|
| # | File | Audited | Risk Classification |
|
|
10
17
|
|---|------|---------|-------------------|
|
|
@@ -18,9 +25,17 @@
|
|
|
18
25
|
## Files with No Issues
|
|
19
26
|
- {list of files where no issues were detected}
|
|
20
27
|
|
|
28
|
+
## Suggested Issue Titles
|
|
29
|
+
1. {Issue title}
|
|
30
|
+
2. {Issue title}
|
|
31
|
+
|
|
21
32
|
## Recommendations (non-blocking)
|
|
22
33
|
- {security improvement suggestions}
|
|
23
34
|
|
|
35
|
+
## Notes
|
|
36
|
+
- {constraints, assumptions, or audit limits}
|
|
37
|
+
- {explicit reasons for any intentionally unaudited item}
|
|
38
|
+
|
|
24
39
|
## REJECT Criteria
|
|
25
40
|
- REJECT if one or more High or Critical issues exist
|
|
26
41
|
```
|
|
@@ -0,0 +1,26 @@
|
|
|
1
|
+
```markdown
|
|
2
|
+
# E2E Audit Plan
|
|
3
|
+
|
|
4
|
+
## Enumeration Evidence
|
|
5
|
+
- Commands used:
|
|
6
|
+
- `rg ...`
|
|
7
|
+
- `rg --files ...`
|
|
8
|
+
- Scope notes:
|
|
9
|
+
- {how routes, flows, and E2E specs were enumerated}
|
|
10
|
+
|
|
11
|
+
## Audited User Flows
|
|
12
|
+
| # | Area | Route / Entry | Existing Scenarios | Coverage Status | Risk |
|
|
13
|
+
|---|------|---------------|--------------------|-----------------|------|
|
|
14
|
+
| 1 | {feature area} | {route or entry point} | {existing test names} | Covered / Partial / Missing | High / Medium / Low |
|
|
15
|
+
|
|
16
|
+
## Missing Scenarios
|
|
17
|
+
| # | Area | Scenario | Priority | Planned Test Location |
|
|
18
|
+
|---|------|----------|----------|-----------------------|
|
|
19
|
+
| 1 | {feature area} | {missing scenario} | High / Medium / Low | `e2e/example.spec.ts` |
|
|
20
|
+
|
|
21
|
+
## Audit Order
|
|
22
|
+
- {ordered audit plan}
|
|
23
|
+
|
|
24
|
+
## Clarifications / Risks
|
|
25
|
+
- {open questions or constraints}
|
|
26
|
+
```
|
|
@@ -0,0 +1,41 @@
|
|
|
1
|
+
```markdown
|
|
2
|
+
# E2E Audit Report
|
|
3
|
+
|
|
4
|
+
## Result: APPROVE / IMPROVE / REJECT
|
|
5
|
+
|
|
6
|
+
## Summary
|
|
7
|
+
{1-3 sentences summarizing the flow coverage situation}
|
|
8
|
+
|
|
9
|
+
## Enumeration Evidence
|
|
10
|
+
- Commands used:
|
|
11
|
+
- `rg ...`
|
|
12
|
+
- `rg --files ...`
|
|
13
|
+
- Coverage notes:
|
|
14
|
+
- {how you confirmed the full flow set was audited}
|
|
15
|
+
|
|
16
|
+
## Scope
|
|
17
|
+
| # | Area | Route / Entry | Existing Scenarios | Coverage Status | Risk |
|
|
18
|
+
|---|------|---------------|--------------------|-----------------|------|
|
|
19
|
+
| 1 | {feature area} | {route or entry point} | {existing test names} | Covered / Partial / Missing | High / Medium / Low |
|
|
20
|
+
|
|
21
|
+
## Findings
|
|
22
|
+
| # | Priority | Area | Location | Gap | Recommended Action |
|
|
23
|
+
|---|----------|------|----------|-----|--------------------|
|
|
24
|
+
| 1 | High / Medium / Low | e2e-testing | `e2e/example.spec.ts` / `src/page.tsx:42` | {missing or weakly tested scenario} | {issue-ready action} |
|
|
25
|
+
|
|
26
|
+
## No-Issue Areas
|
|
27
|
+
- {flows confirmed as adequately covered}
|
|
28
|
+
|
|
29
|
+
## Suggested Issue Titles
|
|
30
|
+
1. {Issue title}
|
|
31
|
+
2. {Issue title}
|
|
32
|
+
|
|
33
|
+
## Notes
|
|
34
|
+
- {constraints, assumptions, or audit limits}
|
|
35
|
+
- {explicit reasons for any intentionally unaudited item}
|
|
36
|
+
```
|
|
37
|
+
|
|
38
|
+
**Cognitive load reduction rules:**
|
|
39
|
+
- APPROVE → Summary + Scope only
|
|
40
|
+
- IMPROVE → Include only relevant gaps
|
|
41
|
+
- REJECT → Include only blocking or high-priority gaps
|
|
@@ -0,0 +1,26 @@
|
|
|
1
|
+
```markdown
|
|
2
|
+
# Unit Test Audit Plan
|
|
3
|
+
|
|
4
|
+
## Enumeration Evidence
|
|
5
|
+
- Commands used:
|
|
6
|
+
- `rg ...`
|
|
7
|
+
- `rg --files ...`
|
|
8
|
+
- Scope notes:
|
|
9
|
+
- {how target production files and tests were enumerated}
|
|
10
|
+
|
|
11
|
+
## Audit Scope
|
|
12
|
+
| # | Production File | Existing Test Files | Audited Behaviors / Branches | Coverage Status |
|
|
13
|
+
|---|-----------------|---------------------|------------------------------|-----------------|
|
|
14
|
+
| 1 | `src/file.ts` | `src/__tests__/file.test.ts` | {exported APIs, branches, errors, boundaries} | Covered / Partial / Missing |
|
|
15
|
+
|
|
16
|
+
## Missing Test Cases
|
|
17
|
+
| # | Production File | Behavior / Branch | Priority | Planned Test Location |
|
|
18
|
+
|---|-----------------|-------------------|----------|-----------------------|
|
|
19
|
+
| 1 | `src/file.ts` | {missing behavior} | High / Medium / Low | `src/__tests__/file.test.ts` |
|
|
20
|
+
|
|
21
|
+
## Audit Order
|
|
22
|
+
- {ordered audit plan}
|
|
23
|
+
|
|
24
|
+
## Clarifications / Risks
|
|
25
|
+
- {open questions or constraints}
|
|
26
|
+
```
|
|
@@ -0,0 +1,41 @@
|
|
|
1
|
+
```markdown
|
|
2
|
+
# Unit Audit Report
|
|
3
|
+
|
|
4
|
+
## Result: APPROVE / IMPROVE / REJECT
|
|
5
|
+
|
|
6
|
+
## Summary
|
|
7
|
+
{1-3 sentences summarizing the coverage situation}
|
|
8
|
+
|
|
9
|
+
## Enumeration Evidence
|
|
10
|
+
- Commands used:
|
|
11
|
+
- `rg ...`
|
|
12
|
+
- `rg --files ...`
|
|
13
|
+
- Coverage notes:
|
|
14
|
+
- {how you confirmed the full target set was audited}
|
|
15
|
+
|
|
16
|
+
## Scope
|
|
17
|
+
| # | Production File | Existing Test Files | Audited Behaviors | Coverage Status |
|
|
18
|
+
|---|-----------------|---------------------|-------------------|-----------------|
|
|
19
|
+
| 1 | `src/file.ts` | `src/__tests__/file.test.ts` | {key behaviors} | Covered / Partial / Missing |
|
|
20
|
+
|
|
21
|
+
## Findings
|
|
22
|
+
| # | Priority | Area | Location | Gap | Recommended Action |
|
|
23
|
+
|---|----------|------|----------|-----|--------------------|
|
|
24
|
+
| 1 | High / Medium / Low | unit-testing | `src/file.ts:42` | {missing or weakly tested behavior} | {issue-ready action} |
|
|
25
|
+
|
|
26
|
+
## No-Issue Areas
|
|
27
|
+
- {files or behaviors confirmed as adequately covered}
|
|
28
|
+
|
|
29
|
+
## Suggested Issue Titles
|
|
30
|
+
1. {Issue title}
|
|
31
|
+
2. {Issue title}
|
|
32
|
+
|
|
33
|
+
## Notes
|
|
34
|
+
- {constraints, assumptions, or audit limits}
|
|
35
|
+
- {explicit reasons for any intentionally unaudited item}
|
|
36
|
+
```
|
|
37
|
+
|
|
38
|
+
**Cognitive load reduction rules:**
|
|
39
|
+
- APPROVE → Summary + Scope only
|
|
40
|
+
- IMPROVE → Include only relevant gaps
|
|
41
|
+
- REJECT → Include only blocking or high-priority gaps
|
|
@@ -47,11 +47,13 @@ piece_categories:
|
|
|
47
47
|
- review-fix-backend-cqrs
|
|
48
48
|
- review-takt-default
|
|
49
49
|
- review-fix-takt-default
|
|
50
|
-
-
|
|
51
|
-
|
|
52
|
-
|
|
53
|
-
-
|
|
54
|
-
-
|
|
50
|
+
- audit-unit
|
|
51
|
+
- audit-e2e
|
|
52
|
+
- audit-security
|
|
53
|
+
- audit-architecture
|
|
54
|
+
- audit-architecture-frontend
|
|
55
|
+
- audit-architecture-backend
|
|
56
|
+
- audit-architecture-dual
|
|
55
57
|
🎵 TAKT Development:
|
|
56
58
|
pieces:
|
|
57
59
|
- takt-default
|
|
@@ -0,0 +1,83 @@
|
|
|
1
|
+
name: audit-architecture-backend
|
|
2
|
+
description: Backend-focused architecture audit. Enumerate service modules and boundaries, then produce an issue-ready report without modifying code
|
|
3
|
+
max_movements: 12
|
|
4
|
+
initial_movement: plan
|
|
5
|
+
|
|
6
|
+
loop_monitors:
|
|
7
|
+
- cycle: [supervise, review]
|
|
8
|
+
threshold: 4
|
|
9
|
+
judge:
|
|
10
|
+
persona: supervisor
|
|
11
|
+
instruction: |
|
|
12
|
+
The supervise → review cycle for the backend architecture audit has repeated {cycle_count} times.
|
|
13
|
+
Judge the overall completeness and quality of the audit, and decide whether the current results are acceptable.
|
|
14
|
+
rules:
|
|
15
|
+
- condition: Quality is sufficient
|
|
16
|
+
next: COMPLETE
|
|
17
|
+
- condition: Quality is insufficient with no prospect of improvement
|
|
18
|
+
next: ABORT
|
|
19
|
+
|
|
20
|
+
movements:
|
|
21
|
+
- name: plan
|
|
22
|
+
persona: planner
|
|
23
|
+
knowledge:
|
|
24
|
+
- backend
|
|
25
|
+
- architecture
|
|
26
|
+
instruction: architecture-audit-plan
|
|
27
|
+
edit: false
|
|
28
|
+
output_contracts:
|
|
29
|
+
report:
|
|
30
|
+
- name: 01-architecture-audit-plan.md
|
|
31
|
+
format: architecture-audit-plan
|
|
32
|
+
rules:
|
|
33
|
+
- condition: Module inventory and audit scope complete
|
|
34
|
+
next: audit
|
|
35
|
+
- condition: Requirements unclear, insufficient info
|
|
36
|
+
next: ABORT
|
|
37
|
+
|
|
38
|
+
- name: audit
|
|
39
|
+
persona: architecture-reviewer
|
|
40
|
+
policy: review
|
|
41
|
+
knowledge:
|
|
42
|
+
- backend
|
|
43
|
+
- architecture
|
|
44
|
+
instruction: architecture-audit-team-leader
|
|
45
|
+
edit: false
|
|
46
|
+
team_leader:
|
|
47
|
+
max_parts: 3
|
|
48
|
+
part_persona: architecture-reviewer
|
|
49
|
+
part_edit: false
|
|
50
|
+
output_contracts:
|
|
51
|
+
report:
|
|
52
|
+
- name: 02-architecture-audit.md
|
|
53
|
+
format: architecture-audit
|
|
54
|
+
rules:
|
|
55
|
+
- condition: Audit complete
|
|
56
|
+
next: supervise
|
|
57
|
+
|
|
58
|
+
- name: supervise
|
|
59
|
+
persona: supervisor
|
|
60
|
+
policy: review
|
|
61
|
+
knowledge:
|
|
62
|
+
- backend
|
|
63
|
+
- architecture
|
|
64
|
+
instruction: architecture-audit-supervise
|
|
65
|
+
edit: false
|
|
66
|
+
pass_previous_response: false
|
|
67
|
+
rules:
|
|
68
|
+
- condition: Audit is complete and issue-ready
|
|
69
|
+
next: COMPLETE
|
|
70
|
+
- condition: Architecture audit is incomplete or evidence is insufficient
|
|
71
|
+
next: review
|
|
72
|
+
|
|
73
|
+
- name: review
|
|
74
|
+
persona: architecture-reviewer
|
|
75
|
+
policy: review
|
|
76
|
+
knowledge:
|
|
77
|
+
- backend
|
|
78
|
+
- architecture
|
|
79
|
+
instruction: architecture-audit-review
|
|
80
|
+
edit: false
|
|
81
|
+
rules:
|
|
82
|
+
- condition: Re-audit complete
|
|
83
|
+
next: supervise
|
|
@@ -0,0 +1,87 @@
|
|
|
1
|
+
name: audit-architecture-dual
|
|
2
|
+
description: Full-stack architecture audit. Enumerate frontend/backend boundaries and cross-layer wiring, then produce an issue-ready report without modifying code
|
|
3
|
+
max_movements: 12
|
|
4
|
+
initial_movement: plan
|
|
5
|
+
|
|
6
|
+
loop_monitors:
|
|
7
|
+
- cycle: [supervise, review]
|
|
8
|
+
threshold: 4
|
|
9
|
+
judge:
|
|
10
|
+
persona: supervisor
|
|
11
|
+
instruction: |
|
|
12
|
+
The supervise → review cycle for the dual architecture audit has repeated {cycle_count} times.
|
|
13
|
+
Judge the overall completeness and quality of the audit, and decide whether the current results are acceptable.
|
|
14
|
+
rules:
|
|
15
|
+
- condition: Quality is sufficient
|
|
16
|
+
next: COMPLETE
|
|
17
|
+
- condition: Quality is insufficient with no prospect of improvement
|
|
18
|
+
next: ABORT
|
|
19
|
+
|
|
20
|
+
movements:
|
|
21
|
+
- name: plan
|
|
22
|
+
persona: planner
|
|
23
|
+
knowledge:
|
|
24
|
+
- frontend
|
|
25
|
+
- backend
|
|
26
|
+
- architecture
|
|
27
|
+
instruction: architecture-audit-plan
|
|
28
|
+
edit: false
|
|
29
|
+
output_contracts:
|
|
30
|
+
report:
|
|
31
|
+
- name: 01-architecture-audit-plan.md
|
|
32
|
+
format: architecture-audit-plan
|
|
33
|
+
rules:
|
|
34
|
+
- condition: Module inventory and audit scope complete
|
|
35
|
+
next: audit
|
|
36
|
+
- condition: Requirements unclear, insufficient info
|
|
37
|
+
next: ABORT
|
|
38
|
+
|
|
39
|
+
- name: audit
|
|
40
|
+
persona: architecture-reviewer
|
|
41
|
+
policy: review
|
|
42
|
+
knowledge:
|
|
43
|
+
- frontend
|
|
44
|
+
- backend
|
|
45
|
+
- architecture
|
|
46
|
+
instruction: architecture-audit-team-leader
|
|
47
|
+
edit: false
|
|
48
|
+
team_leader:
|
|
49
|
+
max_parts: 3
|
|
50
|
+
part_persona: architecture-reviewer
|
|
51
|
+
part_edit: false
|
|
52
|
+
output_contracts:
|
|
53
|
+
report:
|
|
54
|
+
- name: 02-architecture-audit.md
|
|
55
|
+
format: architecture-audit
|
|
56
|
+
rules:
|
|
57
|
+
- condition: Audit complete
|
|
58
|
+
next: supervise
|
|
59
|
+
|
|
60
|
+
- name: supervise
|
|
61
|
+
persona: supervisor
|
|
62
|
+
policy: review
|
|
63
|
+
knowledge:
|
|
64
|
+
- frontend
|
|
65
|
+
- backend
|
|
66
|
+
- architecture
|
|
67
|
+
instruction: architecture-audit-supervise
|
|
68
|
+
edit: false
|
|
69
|
+
pass_previous_response: false
|
|
70
|
+
rules:
|
|
71
|
+
- condition: Audit is complete and issue-ready
|
|
72
|
+
next: COMPLETE
|
|
73
|
+
- condition: Architecture audit is incomplete or evidence is insufficient
|
|
74
|
+
next: review
|
|
75
|
+
|
|
76
|
+
- name: review
|
|
77
|
+
persona: architecture-reviewer
|
|
78
|
+
policy: review
|
|
79
|
+
knowledge:
|
|
80
|
+
- frontend
|
|
81
|
+
- backend
|
|
82
|
+
- architecture
|
|
83
|
+
instruction: architecture-audit-review
|
|
84
|
+
edit: false
|
|
85
|
+
rules:
|
|
86
|
+
- condition: Re-audit complete
|
|
87
|
+
next: supervise
|