thevoidforge-methodology 21.0.0 → 23.1.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.claude/agents/adolin-brand.md +39 -0
- package/.claude/agents/ahsoka-access-control.md +54 -0
- package/.claude/agents/alfred-dependencies.md +42 -0
- package/.claude/agents/alia-threat-detect.md +39 -0
- package/.claude/agents/anakin-dark-side.md +40 -0
- package/.claude/agents/aquaman-deep-dive.md +42 -0
- package/.claude/agents/aragorn-orchestration.md +38 -0
- package/.claude/agents/archer-greenfield.md +47 -0
- package/.claude/agents/armin-clever.md +38 -0
- package/.claude/agents/arwen-ui-polish.md +41 -0
- package/.claude/agents/ashitaka-tech-debt.md +38 -0
- package/.claude/agents/asuka-performance.md +38 -0
- package/.claude/agents/bail-organa-governance.md +36 -0
- package/.claude/agents/banner-database.md +42 -0
- package/.claude/agents/barton-smoke-test.md +57 -0
- package/.claude/agents/bashir-field-medic.md +62 -0
- package/.claude/agents/batgirl-detail.md +42 -0
- package/.claude/agents/batman-qa.md +69 -0
- package/.claude/agents/bayta-evals.md +39 -0
- package/.claude/agents/beast-boy-cross-env.md +42 -0
- package/.claude/agents/beerus-destroyer.md +38 -0
- package/.claude/agents/bel-riose-orchestration.md +39 -0
- package/.claude/agents/beru-subprocess.md +36 -0
- package/.claude/agents/bilbo-microcopy.md +41 -0
- package/.claude/agents/black-canary-monitoring.md +42 -0
- package/.claude/agents/bliss-ai-safety.md +39 -0
- package/.claude/agents/bo-katan-perimeter.md +39 -0
- package/.claude/agents/bombadil-forge-sync.md +60 -0
- package/.claude/agents/boromir-hubris.md +39 -0
- package/.claude/agents/breeze-platform-relations.md +39 -0
- package/.claude/agents/bucky-legacy.md +42 -0
- package/.claude/agents/bulma-engineering.md +38 -0
- package/.claude/agents/calcifer-daemon.md +38 -0
- package/.claude/agents/cara-dune-enforcement.md +36 -0
- package/.claude/agents/cassian-recon.md +36 -0
- package/.claude/agents/cc-persistent-process.md +38 -0
- package/.claude/agents/celeborn-design-system.md +39 -0
- package/.claude/agents/celebrimbor-forge-artist.md +61 -0
- package/.claude/agents/chakotay-bridge.md +46 -0
- package/.claude/agents/chani-worm-rider.md +60 -0
- package/.claude/agents/chewie-dependency-audit.md +40 -0
- package/.claude/agents/chrome-discovery.md +36 -0
- package/.claude/agents/constantine-cursed-code.md +57 -0
- package/.claude/agents/coulson-release.md +61 -0
- package/.claude/agents/crusher-diagnostics.md +47 -0
- package/.claude/agents/cyborg-system-integration.md +42 -0
- package/.claude/agents/dalinar-positioning.md +39 -0
- package/.claude/agents/daneel-model-migration.md +39 -0
- package/.claude/agents/data-tech-debt.md +46 -0
- package/.claude/agents/dax-legacy-wisdom.md +47 -0
- package/.claude/agents/deathstroke-adversarial.md +57 -0
- package/.claude/agents/denji-determination.md +38 -0
- package/.claude/agents/din-djarin-bounty.md +41 -0
- package/.claude/agents/dockson-treasury.md +65 -0
- package/.claude/agents/dori-integration-check.md +36 -0
- package/.claude/agents/dors-observability.md +39 -0
- package/.claude/agents/drax-exact-match.md +41 -0
- package/.claude/agents/ducem-token-economics.md +40 -0
- package/.claude/agents/duncan-relay.md +39 -0
- package/.claude/agents/duo-teardown.md +37 -0
- package/.claude/agents/ed-network-scan.md +37 -0
- package/.claude/agents/elrond-ux-strategy.md +38 -0
- package/.claude/agents/eowyn-delight.md +54 -0
- package/.claude/agents/erwin-strategy.md +38 -0
- package/.claude/agents/ezra-catches-missed.md +39 -0
- package/.claude/agents/ezri-session-analyst.md +44 -0
- package/.claude/agents/falcon-migration.md +42 -0
- package/.claude/agents/faramir-judgment.md +39 -0
- package/.claude/agents/faye-resourceful.md +38 -0
- package/.claude/agents/fenring-passive-monitor.md +36 -0
- package/.claude/agents/fern-protocol.md +36 -0
- package/.claude/agents/feyd-adversarial.md +40 -0
- package/.claude/agents/flash-rapid-test.md +42 -0
- package/.claude/agents/friday-automation.md +41 -0
- package/.claude/agents/frieren-long-term.md +38 -0
- package/.claude/agents/frodo-critical-path.md +39 -0
- package/.claude/agents/fury-initiative.md +62 -0
- package/.claude/agents/gaal-prompt-arch.md +39 -0
- package/.claude/agents/galadriel-frontend.md +67 -0
- package/.claude/agents/gamora-perf-assassin.md +42 -0
- package/.claude/agents/gandalf-setup-wizard.md +62 -0
- package/.claude/agents/gen-docs.md +36 -0
- package/.claude/agents/ghanima-paired-monitor.md +36 -0
- package/.claude/agents/gimli-performance.md +40 -0
- package/.claude/agents/giyu-silent-guard.md +38 -0
- package/.claude/agents/glorfindel-rendering.md +39 -0
- package/.claude/agents/gohan-hidden-power.md +38 -0
- package/.claude/agents/gojo-infinite-scale.md +38 -0
- package/.claude/agents/goku-scaling.md +38 -0
- package/.claude/agents/goldberry-change-detect.md +36 -0
- package/.claude/agents/gordon-escalation.md +41 -0
- package/.claude/agents/green-arrow-precision.md +42 -0
- package/.claude/agents/green-lantern-scenarios.md +42 -0
- package/.claude/agents/grogu-tiny-vulns.md +37 -0
- package/.claude/agents/groot-caching.md +42 -0
- package/.claude/agents/gurney-delivery.md +39 -0
- package/.claude/agents/haku-deploy-wizard.md +64 -0
- package/.claude/agents/haldir-boundaries.md +39 -0
- package/.claude/agents/han-vuln-hunter.md +39 -0
- package/.claude/agents/hange-experimentation.md +38 -0
- package/.claude/agents/harah-protocol.md +37 -0
- package/.claude/agents/hawkgirl-regression-sweep.md +42 -0
- package/.claude/agents/heero-mission-deploy.md +38 -0
- package/.claude/agents/hera-navigation.md +40 -0
- package/.claude/agents/hill-mission-control.md +42 -0
- package/.claude/agents/himmel-legacy.md +36 -0
- package/.claude/agents/hober-tool-schema.md +39 -0
- package/.claude/agents/hoid-copywriting.md +39 -0
- package/.claude/agents/howl-migration.md +38 -0
- package/.claude/agents/hughes-observability.md +36 -0
- package/.claude/agents/huntress-flaky-bugs.md +41 -0
- package/.claude/agents/irulan-historian.md +36 -0
- package/.claude/agents/jake-reporter.md +44 -0
- package/.claude/agents/janeway-novel-arch.md +47 -0
- package/.claude/agents/janov-context-eng.md +39 -0
- package/.claude/agents/jarvis-status.md +41 -0
- package/.claude/agents/jean-pragmatic.md +38 -0
- package/.claude/agents/jessica-voice.md +39 -0
- package/.claude/agents/jet-maintenance.md +38 -0
- package/.claude/agents/jin-disciplined-adv.md +38 -0
- package/.claude/agents/kaji-intelligence.md +38 -0
- package/.claude/agents/kaladin-organic-growth.md +39 -0
- package/.claude/agents/kallen-hard-deploy.md +38 -0
- package/.claude/agents/kanan-intuitive.md +40 -0
- package/.claude/agents/kaoru-harmony.md +36 -0
- package/.claude/agents/kaworu-solver.md +38 -0
- package/.claude/agents/kelsier-growth.md +62 -0
- package/.claude/agents/kenobi-security.md +69 -0
- package/.claude/agents/kim-api-design.md +47 -0
- package/.claude/agents/kira-pragmatic.md +47 -0
- package/.claude/agents/kishibe-hardening.md +38 -0
- package/.claude/agents/kohaku-rapid-response.md +35 -0
- package/.claude/agents/krillin-support.md +35 -0
- package/.claude/agents/kusanagi-devops.md +67 -0
- package/.claude/agents/la-forge-reliability.md +61 -0
- package/.claude/agents/lang-micro-changes.md +42 -0
- package/.claude/agents/legolas-precision.md +41 -0
- package/.claude/agents/leia-secrets.md +39 -0
- package/.claude/agents/lelouch-orchestration.md +38 -0
- package/.claude/agents/leto-ii-persistence.md +39 -0
- package/.claude/agents/leto-protection.md +39 -0
- package/.claude/agents/levi-deploy.md +38 -0
- package/.claude/agents/liet-kynes-deep-system.md +39 -0
- package/.claude/agents/lift-social-media.md +39 -0
- package/.claude/agents/loki-chaos.md +57 -0
- package/.claude/agents/lucius-config.md +42 -0
- package/.claude/agents/luke-audit-journey.md +40 -0
- package/.claude/agents/manhunter-shapeshifting.md +42 -0
- package/.claude/agents/marsh-competitive-intel.md +40 -0
- package/.claude/agents/maul-red-team.md +56 -0
- package/.claude/agents/merry-pair-review.md +39 -0
- package/.claude/agents/mikasa-protection.md +38 -0
- package/.claude/agents/miles-teg-perf.md +39 -0
- package/.claude/agents/milim-load-test.md +38 -0
- package/.claude/agents/misato-operations.md +38 -0
- package/.claude/agents/mob-capacity.md +38 -0
- package/.claude/agents/mohiam-authentication.md +39 -0
- package/.claude/agents/mon-mothma-security-mgmt.md +40 -0
- package/.claude/agents/mugen-chaos.md +38 -0
- package/.claude/agents/mule-adversarial-ai.md +40 -0
- package/.claude/agents/mustang-cleanup.md +38 -0
- package/.claude/agents/nanami-structured-ops.md +38 -0
- package/.claude/agents/nausicaa-resources.md +38 -0
- package/.claude/agents/navani-technical-seo.md +39 -0
- package/.claude/agents/nebula-optimization.md +42 -0
- package/.claude/agents/nightwing-regression.md +57 -0
- package/.claude/agents/nobara-direct-fix.md +38 -0
- package/.claude/agents/nog-solutions.md +47 -0
- package/.claude/agents/nori-asset-scanner.md +36 -0
- package/.claude/agents/obrien-root-cause.md +47 -0
- package/.claude/agents/odo-structural-anomaly.md +47 -0
- package/.claude/agents/okoye-data-integrity.md +42 -0
- package/.claude/agents/olivier-hardening.md +38 -0
- package/.claude/agents/oracle-static-analysis.md +57 -0
- package/.claude/agents/ori-prompt-crafter.md +36 -0
- package/.claude/agents/padme-data-protection.md +40 -0
- package/.claude/agents/paris-route-planner.md +46 -0
- package/.claude/agents/parker-connections.md +42 -0
- package/.claude/agents/paul-orchestration.md +39 -0
- package/.claude/agents/picard-architecture.md +62 -0
- package/.claude/agents/piccolo-tactics.md +38 -0
- package/.claude/agents/pike-bold-decisions.md +47 -0
- package/.claude/agents/pippin-discovery.md +39 -0
- package/.claude/agents/plo-koon-edge-cases.md +36 -0
- package/.claude/agents/power-chaotic.md +38 -0
- package/.claude/agents/qui-gon-subtle-vulns.md +39 -0
- package/.claude/agents/radagast-edge-cases.md +40 -0
- package/.claude/agents/raoden-conversion.md +40 -0
- package/.claude/agents/raven-deep-analysis.md +42 -0
- package/.claude/agents/red-hood-aggressive.md +42 -0
- package/.claude/agents/rei-dangerous-tasks.md +38 -0
- package/.claude/agents/reigen-debugger.md +38 -0
- package/.claude/agents/rengoku-intense-monitor.md +38 -0
- package/.claude/agents/rex-infrastructure.md +40 -0
- package/.claude/agents/rhodes-production.md +42 -0
- package/.claude/agents/riker-review.md +61 -0
- package/.claude/agents/rimuru-adapter.md +38 -0
- package/.claude/agents/riza-backup.md +38 -0
- package/.claude/agents/robin-apprentice.md +41 -0
- package/.claude/agents/rocket-scrappy.md +42 -0
- package/.claude/agents/rogers-api-design.md +42 -0
- package/.claude/agents/romanoff-integrations.md +42 -0
- package/.claude/agents/sabine-unconventional.md +39 -0
- package/.claude/agents/salvor-model-selection.md +40 -0
- package/.claude/agents/samwise-accessibility.md +41 -0
- package/.claude/agents/sarene-outreach.md +39 -0
- package/.claude/agents/sasha-resources.md +36 -0
- package/.claude/agents/scotty-infrastructure.md +46 -0
- package/.claude/agents/seldon-ai.md +64 -0
- package/.claude/agents/senku-provisioning.md +38 -0
- package/.claude/agents/sentaro-scheduling.md +36 -0
- package/.claude/agents/seven-optimization.md +47 -0
- package/.claude/agents/shallan-creative.md +39 -0
- package/.claude/agents/sheeana-transport.md +39 -0
- package/.claude/agents/shuri-innovation.md +42 -0
- package/.claude/agents/siona-evasion.md +40 -0
- package/.claude/agents/sisko-campaign.md +65 -0
- package/.claude/agents/spike-routing.md +38 -0
- package/.claude/agents/spock-schema.md +60 -0
- package/.claude/agents/starfire-brute-force.md +42 -0
- package/.claude/agents/stark-backend.md +69 -0
- package/.claude/agents/steris-budget.md +39 -0
- package/.claude/agents/stilgar-channel-security.md +39 -0
- package/.claude/agents/strange-service-arch.md +42 -0
- package/.claude/agents/sung-workers.md +38 -0
- package/.claude/agents/superman-strength-test.md +42 -0
- package/.claude/agents/suzaku-execution.md +38 -0
- package/.claude/agents/szeth-compliance.md +39 -0
- package/.claude/agents/tanjiro-persistent.md +38 -0
- package/.claude/agents/tchalla-quality.md +42 -0
- package/.claude/agents/thanos-gauntlet.md +67 -0
- package/.claude/agents/theoden-rally.md +39 -0
- package/.claude/agents/thor-queues.md +42 -0
- package/.claude/agents/thufir-protocol-parsing.md +39 -0
- package/.claude/agents/todo-brute-force.md +38 -0
- package/.claude/agents/torres-site-scanner.md +46 -0
- package/.claude/agents/totoro-guardian.md +38 -0
- package/.claude/agents/tpol-disciplined.md +47 -0
- package/.claude/agents/treebeard-deliberation.md +40 -0
- package/.claude/agents/troi-prd-compliance.md +62 -0
- package/.claude/agents/trunks-rollback.md +38 -0
- package/.claude/agents/tuvok-deep-current.md +61 -0
- package/.claude/agents/uhura-integration.md +46 -0
- package/.claude/agents/valkyrie-recovery.md +42 -0
- package/.claude/agents/vegeta-monitoring.md +38 -0
- package/.claude/agents/veldora-dormant.md +36 -0
- package/.claude/agents/vin-analytics.md +39 -0
- package/.claude/agents/vision-data-analysis.md +42 -0
- package/.claude/agents/wanda-seldon-validation.md +37 -0
- package/.claude/agents/wanda-state.md +42 -0
- package/.claude/agents/wax-paid-ads.md +39 -0
- package/.claude/agents/wayne-ab-testing.md +39 -0
- package/.claude/agents/whis-precision.md +38 -0
- package/.claude/agents/windu-input-validation.md +39 -0
- package/.claude/agents/winry-maintenance.md +38 -0
- package/.claude/agents/wonder-woman-truth.md +42 -0
- package/.claude/agents/wong-documentation.md +57 -0
- package/.claude/agents/worf-security-arch.md +47 -0
- package/.claude/agents/yoda-auth.md +56 -0
- package/.claude/agents/yueh-trust-verify.md +39 -0
- package/.claude/agents/zatanna-impossible.md +42 -0
- package/.claude/agents/zechs-rival.md +38 -0
- package/.claude/agents/zenitsu-alerts.md +36 -0
- package/.claude/commands/ai.md +20 -14
- package/.claude/commands/architect.md +32 -55
- package/.claude/commands/assemble.md +32 -23
- package/.claude/commands/assess.md +3 -3
- package/.claude/commands/blueprint.md +9 -9
- package/.claude/commands/build.md +13 -3
- package/.claude/commands/campaign.md +27 -15
- package/.claude/commands/cultivation.md +19 -1
- package/.claude/commands/dangerroom.md +2 -2
- package/.claude/commands/debrief.md +14 -12
- package/.claude/commands/deploy.md +1 -1
- package/.claude/commands/devops.md +23 -17
- package/.claude/commands/gauntlet.md +40 -29
- package/.claude/commands/grow.md +14 -0
- package/.claude/commands/portfolio.md +5 -4
- package/.claude/commands/qa.md +37 -29
- package/.claude/commands/review.md +31 -62
- package/.claude/commands/security.md +24 -49
- package/.claude/commands/test.md +17 -10
- package/.claude/commands/thumper.md +1 -1
- package/.claude/commands/treasury.md +24 -7
- package/.claude/commands/ux.md +27 -26
- package/.claude/commands/vault.md +9 -0
- package/.claude/commands/void.md +1 -0
- package/CHANGELOG.md +122 -0
- package/CLAUDE.md +16 -9
- package/HOLOCRON.md +16 -19
- package/VERSION.md +6 -1
- package/docs/AGENT_CLASSIFICATION.md +528 -0
- package/docs/methods/CAMPAIGN.md +1 -1
- package/docs/methods/FIELD_MEDIC.md +4 -0
- package/docs/methods/FORGE_KEEPER.md +3 -2
- package/docs/methods/GAUNTLET.md +1 -1
- package/docs/methods/GROWTH_STRATEGIST.md +2 -2
- package/docs/methods/MUSTER.md +4 -0
- package/docs/methods/QA_ENGINEER.md +8 -0
- package/docs/methods/SECURITY_AUDITOR.md +8 -0
- package/docs/methods/SUB_AGENTS.md +40 -1
- package/docs/methods/SYSTEMS_ARCHITECT.md +8 -0
- package/docs/patterns/financial-transaction.ts +24 -0
- package/package.json +2 -1
|
@@ -5,29 +5,35 @@
|
|
|
5
5
|
2. Read `/docs/PRD.md` frontmatter — check `deploy` value to determine target
|
|
6
6
|
3. Read `/docs/methods/DEVOPS_ENGINEER.md`
|
|
7
7
|
|
|
8
|
+
## Dynamic Dispatch (ADR-044)
|
|
9
|
+
|
|
10
|
+
Opus scans `git diff --stat` and matches changed files against the `description` fields of all 263 agents in `.claude/agents/`. Matching specialists launch alongside the core agents below.
|
|
11
|
+
|
|
12
|
+
**Dispatch control:** `--light` skips dynamic dispatch (core only). `--solo` runs lead agent only.
|
|
13
|
+
|
|
8
14
|
## Agent Deployment Manifest
|
|
9
15
|
|
|
10
|
-
**Lead:** Kusanagi (
|
|
16
|
+
**Lead:** Kusanagi (`subagent_type: kusanagi-devops`)
|
|
11
17
|
|
|
12
18
|
**Core team (always deployed):**
|
|
13
|
-
- **Senku** (
|
|
14
|
-
- **Levi** (
|
|
15
|
-
- **Spike** (
|
|
16
|
-
- **L**
|
|
17
|
-
- **Bulma** (
|
|
18
|
-
- **Holo**
|
|
19
|
+
- **Senku** (`subagent_type: senku-provisioning`) — provisioning: server setup, dependencies, runtime, idempotent scripts
|
|
20
|
+
- **Levi** (`subagent_type: levi-deploy`) — deployment: process management, zero-downtime, rollback scripts
|
|
21
|
+
- **Spike** (`subagent_type: spike-routing`) — networking: reverse proxy, DNS, TLS, firewall, CORS headers
|
|
22
|
+
- **L** — monitoring: health checks, uptime, alerting, log aggregation (honorary — no agent definition)
|
|
23
|
+
- **Bulma** (`subagent_type: bulma-engineering`) — backup: database dumps, file backup, retention, restore testing
|
|
24
|
+
- **Holo** — cost: resource sizing, instance selection, cost estimation, optimization (honorary — no agent definition)
|
|
19
25
|
|
|
20
26
|
**Extended team (deployed on full infra reviews):**
|
|
21
|
-
- **Valkyrie** (
|
|
22
|
-
- **Vegeta** (
|
|
23
|
-
- **Trunks** (
|
|
24
|
-
- **Mikasa** (
|
|
25
|
-
- **Erwin** (
|
|
26
|
-
- **Mustang** (
|
|
27
|
-
- **Olivier** (
|
|
28
|
-
- **Hughes** (
|
|
29
|
-
- **Calcifer** (
|
|
30
|
-
- **Duo** (
|
|
27
|
+
- **Valkyrie** (`subagent_type: valkyrie-recovery`) — disaster recovery: failover, data center redundancy, RTO/RPO
|
|
28
|
+
- **Vegeta** (`subagent_type: vegeta-monitoring`) — scaling: horizontal scaling, load balancing, auto-scaling policies
|
|
29
|
+
- **Trunks** (`subagent_type: trunks-rollback`) — migration: database migration strategy, zero-downtime schema changes
|
|
30
|
+
- **Mikasa** (`subagent_type: mikasa-protection`) — security hardening: SSH config, fail2ban, unattended upgrades
|
|
31
|
+
- **Erwin** (`subagent_type: erwin-strategy`) — strategy: multi-environment management, staging/production parity
|
|
32
|
+
- **Mustang** (`subagent_type: mustang-cleanup`) — orchestration: Docker Compose, container networking, service discovery
|
|
33
|
+
- **Olivier** (`subagent_type: olivier-hardening`) — cold region: CDN configuration, edge caching, geographic distribution
|
|
34
|
+
- **Hughes** (`subagent_type: hughes-observability`) — documentation: runbook writing, infrastructure diagrams, onboarding docs
|
|
35
|
+
- **Calcifer** (`subagent_type: calcifer-daemon`) — energy: resource efficiency, idle scaling, sleep/wake optimization
|
|
36
|
+
- **Duo** (`subagent_type: duo-teardown`) — CI/CD: GitHub Actions, pipeline design, automated testing in deploy
|
|
31
37
|
|
|
32
38
|
## Deploy Target Branching
|
|
33
39
|
|
|
@@ -9,17 +9,23 @@ The Gauntlet tests everything. Every domain. Multiple rounds. Escalating intensi
|
|
|
9
9
|
2. Read `/logs/build-state.md` — what was built, what phases completed
|
|
10
10
|
3. Read `/docs/PRD.md` — the source of truth for what the project should be
|
|
11
11
|
|
|
12
|
+
## Dynamic Dispatch (ADR-044)
|
|
13
|
+
|
|
14
|
+
Opus scans `git diff --stat` and matches changed files against the `description` fields of all 263 agents in `.claude/agents/`. Matching specialists launch alongside the core agents below.
|
|
15
|
+
|
|
16
|
+
**Dispatch control:** `--light` skips dynamic dispatch (core only). `--solo` runs lead agent only.
|
|
17
|
+
|
|
12
18
|
## Round 1 — Discovery (parallel)
|
|
13
19
|
|
|
14
20
|
**Thanos:** "Before I test, I must understand."
|
|
15
21
|
|
|
16
22
|
Use the Agent tool to run all five in parallel — these are read-only analysis:
|
|
17
23
|
|
|
18
|
-
- **Agent 1
|
|
19
|
-
- **Agent 2
|
|
20
|
-
- **Agent 3
|
|
21
|
-
- **Agent 4
|
|
22
|
-
- **Agent 5
|
|
24
|
+
- **Agent 1** `subagent_type: picard-architecture` — Schema review, service boundaries, dependency graph, scaling assessment. Read the full `/architect` protocol but produce findings only (no ADRs — this is review, not design).
|
|
25
|
+
- **Agent 2** `subagent_type: stark-backend` — Pattern compliance, logic errors, type safety, cross-module data flow tracing. Read `/review` protocol. One pass across all source files.
|
|
26
|
+
- **Agent 3** `subagent_type: galadriel-frontend` — Product surface map, usability walkthrough (Step 1.5), Éowyn's enchantment scan (Step 1.75). No fixes yet — discovery only.
|
|
27
|
+
- **Agent 4** `subagent_type: kenobi-security` — List all endpoints, WebSocket handlers, file I/O, credential access points, user input parsing. Classify each by risk tier. No deep audit yet — just the map.
|
|
28
|
+
- **Agent 5** `subagent_type: kusanagi-devops` — Scan deploy scripts, generated configs, provisioning scripts, CI/CD templates. Classify each by risk: hardcoded credentials, open ports, missing auth on generated services. No deep audit yet — just the map.
|
|
23
29
|
|
|
24
30
|
Synthesize all five into a unified findings list. Log to `/logs/gauntlet-round-1.md`.
|
|
25
31
|
|
|
@@ -29,10 +35,10 @@ Synthesize all five into a unified findings list. Log to `/logs/gauntlet-round-1
|
|
|
29
35
|
|
|
30
36
|
Use the Agent tool to run all four in parallel — full domain audits:
|
|
31
37
|
|
|
32
|
-
- **Agent 1
|
|
33
|
-
- **Agent 2
|
|
34
|
-
- **Agent 3
|
|
35
|
-
- **Agent 4
|
|
38
|
+
- **Agent 1** `subagent_type: batman-qa` — Run the complete `/qa` protocol. Oracle + Red Hood + Alfred + Deathstroke + Constantine + Nightwing + Lucius. Every edge case, every error state, every boundary.
|
|
39
|
+
- **Agent 2** `subagent_type: galadriel-frontend` — Run the complete `/ux` protocol. Elrond + Arwen + Samwise + Bilbo + Legolas + Gimli + Radagast + Éowyn. Usability, visual, a11y, copy, performance, edge cases, enchantment.
|
|
40
|
+
- **Agent 3** `subagent_type: kenobi-security` — Run the complete `/security` protocol. Leia + Chewie + Rex + Maul parallel scans, then Yoda → Windu → Ahsoka → Padmé sequential audits.
|
|
41
|
+
- **Agent 4** `subagent_type: stark-backend` — For every API endpoint, trace the full data path: client request → validation → service → database → response. For every file upload, trace: upload → storage → retrieval → display. For every credential, trace: entry → vault → usage → cleanup.
|
|
36
42
|
|
|
37
43
|
Merge all findings. Deduplicate across domains.
|
|
38
44
|
|
|
@@ -55,10 +61,10 @@ This catches runtime bugs invisible to static analysis: IPv6 binding, native mod
|
|
|
55
61
|
|
|
56
62
|
Use the Agent tool to run all four in parallel — targeted re-verification:
|
|
57
63
|
|
|
58
|
-
- **Agent 1
|
|
59
|
-
- **Agent 2
|
|
60
|
-
- **Agent 3
|
|
61
|
-
- **Agent 4
|
|
64
|
+
- **Agent 1** `subagent_type: batman-qa` — Nightwing re-runs the test suite. Red Hood re-probes fixed areas. Deathstroke tests new boundaries created by the fixes. Focus on regressions.
|
|
65
|
+
- **Agent 2** `subagent_type: galadriel-frontend` — Samwise re-audits a11y on all modified components. Radagast re-checks edge cases on fixed flows. Bilbo re-checks microcopy on any changed UI.
|
|
66
|
+
- **Agent 3** `subagent_type: kenobi-security` — Maul re-probes all remediated vulnerabilities. Ahsoka verifies access control across every role boundary. Padmé verifies the primary user flow still works (critical path smoke test).
|
|
67
|
+
- **Agent 4** `subagent_type: kusanagi-devops` — Run the complete `/devops` protocol with full team: Senku (provisioning), Levi (deploy), Spike (networking), L (monitoring), Bulma (backup), Holo (cost), Valkyrie (disaster recovery). Deploy scripts, monitoring, backups, health checks, page weight gate, security headers.
|
|
62
68
|
|
|
63
69
|
**→ FIX BATCH 2:** Fix remaining findings.
|
|
64
70
|
|
|
@@ -68,11 +74,11 @@ Use the Agent tool to run all four in parallel — targeted re-verification:
|
|
|
68
74
|
|
|
69
75
|
Use the Agent tool to run all five in parallel — pure adversarial:
|
|
70
76
|
|
|
71
|
-
-
|
|
72
|
-
-
|
|
73
|
-
-
|
|
74
|
-
-
|
|
75
|
-
-
|
|
77
|
+
- `subagent_type: maul-red-team` — Attacks code that passed /review. Looks for exploits in "clean" code.
|
|
78
|
+
- `subagent_type: deathstroke-adversarial` — Probes endpoints that /security hardened. Tests if remediations can be bypassed.
|
|
79
|
+
- `subagent_type: loki-chaos` — Chaos-tests features that /qa cleared. What breaks under unexpected conditions?
|
|
80
|
+
- `subagent_type: constantine-cursed-code` — Hunts cursed code in FIXED areas specifically. Code that only works by accident.
|
|
81
|
+
- `subagent_type: eowyn-delight` — Final enchantment pass on the polished, hardened product. Where can delight still be added without compromising security or stability?
|
|
76
82
|
|
|
77
83
|
**→ FIX BATCH 3:** Fix all adversarial findings. If any fix is applied, re-run the affected adversarial agent on the fixed area only.
|
|
78
84
|
|
|
@@ -82,12 +88,12 @@ Use the Agent tool to run all five in parallel — pure adversarial:
|
|
|
82
88
|
|
|
83
89
|
Use the Agent tool to run all six in parallel:
|
|
84
90
|
|
|
85
|
-
-
|
|
86
|
-
-
|
|
87
|
-
-
|
|
88
|
-
-
|
|
89
|
-
-
|
|
90
|
-
-
|
|
91
|
+
- `subagent_type: spock-schema` — Did any QA/security/UX fix break code patterns or quality?
|
|
92
|
+
- `subagent_type: ahsoka-access-control` — Did any fix introduce access control gaps?
|
|
93
|
+
- `subagent_type: nightwing-regression` — Full regression: run the entire test suite. Any failures?
|
|
94
|
+
- `subagent_type: samwise-accessibility` — Final accessibility audit on all modified components.
|
|
95
|
+
- `subagent_type: padme-data-protection` — Critical path functional verification. Open the app, complete the main task, verify output.
|
|
96
|
+
- `subagent_type: troi-prd-compliance` — PRD compliance: read the PRD prose section-by-section, verify every claim against the implementation. Numeric claims, visual treatments, copy accuracy.
|
|
91
97
|
|
|
92
98
|
If the Council finds issues:
|
|
93
99
|
1. Fix code discrepancies. Flag asset requirements as BLOCKED.
|
|
@@ -111,17 +117,22 @@ Present the final summary:
|
|
|
111
117
|
**If findings remain:**
|
|
112
118
|
Present them with severity and recommendation. The user decides whether to ship or iterate.
|
|
113
119
|
|
|
114
|
-
## Arguments
|
|
115
|
-
|
|
120
|
+
## Arguments (ADR-043: Max by Default)
|
|
121
|
+
|
|
122
|
+
Default is now maximum intensity (was `--infinity`). Flags opt out.
|
|
123
|
+
|
|
124
|
+
- No arguments → 10-round Infinity Gauntlet with full roster (~60-80 agent launches). **ENFORCEMENT: Must launch Agent tool sub-processes. Inline analysis is not a Gauntlet.**
|
|
116
125
|
- `--fast` → 3 rounds only (skip Round 4 Crossfire + Round 5 Council). (formerly `--quick` — renamed v17.3 for cross-command consistency)
|
|
126
|
+
- `--light` → 5-round standard gauntlet with core agents only (pre-ADR-043 default behavior)
|
|
117
127
|
- `--security-only` → 4 rounds of security only (Kenobi marathon)
|
|
118
128
|
- `--ux-only` → 4 rounds of UX only (Galadriel marathon)
|
|
119
129
|
- `--qa-only` → 4 rounds of QA only (Batman marathon)
|
|
120
130
|
- `--resume` → resume from last completed round (reads gauntlet state from logs)
|
|
121
131
|
- `--ux-extra` → Extra Éowyn enchantment emphasis across all rounds. Galadriel's team proposes micro-animations, copy improvements, and delight moments beyond standard usability/a11y.
|
|
122
|
-
- `--assess` → **Pre-build assessment.** Rounds 1-2 only (Discovery + First Strike), no fix batches. Produces assessment report grouped by root cause.
|
|
123
|
-
- `--
|
|
124
|
-
- `--
|
|
132
|
+
- `--assess` → **Pre-build assessment.** Rounds 1-2 only (Discovery + First Strike), no fix batches. Produces assessment report grouped by root cause.
|
|
133
|
+
- `--solo` → Lead agent per domain only, no sub-agents (quick spot-check).
|
|
134
|
+
- `--infinity` → **Retired (no-op).** Default is now maximum intensity.
|
|
135
|
+
- `--muster` → **Retired (no-op).** Default is now full roster.
|
|
125
136
|
|
|
126
137
|
## Operating Rules
|
|
127
138
|
- Update `/logs/gauntlet-state.md` after EVERY round
|
package/.claude/commands/grow.md
CHANGED
|
@@ -3,6 +3,8 @@
|
|
|
3
3
|
Read `/docs/methods/GROWTH_STRATEGIST.md` for operating rules.
|
|
4
4
|
|
|
5
5
|
## Prerequisites
|
|
6
|
+
|
|
7
|
+
### System Requirements
|
|
6
8
|
If `packages/voidforge/wizard/server.ts` does not exist and the mode requires it (default 6-phase, `--setup`, `--distribute`):
|
|
7
9
|
1. Offer: "Phases 4-6 require the wizard server for ad platform APIs, treasury, and autonomous monitoring. Pull it from upstream? [Y/n] (Phases 1-3 work without it.)"
|
|
8
10
|
2. On yes: `git fetch voidforge main 2>/dev/null || git remote add voidforge https://github.com/tmcleod3/voidforge.git && git fetch voidforge main` then `git checkout voidforge/main -- packages/voidforge/` then `npm install`. Proceed with all 6 phases.
|
|
@@ -11,6 +13,18 @@ If `packages/voidforge/wizard/server.ts` does not exist and the mode requires it
|
|
|
11
13
|
If `packages/voidforge/wizard/server.ts` does not exist and the mode does NOT require it (`--audit-only`, `--seo`, `--content`):
|
|
12
14
|
- Skip the wizard gate entirely. These modes run Phases 1-3 only — no wizard dependency.
|
|
13
15
|
|
|
16
|
+
### External Accounts & API Keys (Phases 4-6)
|
|
17
|
+
**Required for paid acquisition (Phase 4+):**
|
|
18
|
+
- **Google Ads:** Google Ads account + OAuth credentials (client ID, client secret, developer token). [Create account](https://ads.google.com) → Apply for API access via Google Ads API Center.
|
|
19
|
+
- **Meta Ads (optional):** Meta Business account + App with `ads_management` permission. [Create account](https://business.facebook.com) → Create app in Meta Developer portal.
|
|
20
|
+
- **Revenue tracking:** Stripe or Paddle account with API keys for revenue attribution.
|
|
21
|
+
|
|
22
|
+
**Required for treasury (Phase 5+):**
|
|
23
|
+
- Run `/cultivation install` first — sets up the heartbeat daemon and financial vault.
|
|
24
|
+
- Financial vault password (12+ chars) — set during cultivation install.
|
|
25
|
+
|
|
26
|
+
**Not required for Phases 1-3** (`--audit-only`): SEO audit, content strategy, and foundation work need no external accounts.
|
|
27
|
+
|
|
14
28
|
## Arguments
|
|
15
29
|
- No arguments → run/resume the 6-phase growth protocol
|
|
16
30
|
- `--setup` → Ad platform onboarding only (interactive credential setup for Google/Meta/LinkedIn/Twitter/Reddit). See GROWTH_STRATEGIST.md "Ad Platform Setup" section. Does NOT require a deployed product.
|
|
@@ -5,16 +5,17 @@
|
|
|
5
5
|
Read `/docs/methods/TREASURY.md` for financial operating rules.
|
|
6
6
|
|
|
7
7
|
## Prerequisites
|
|
8
|
-
If `packages/voidforge/wizard/server.ts` does not exist (
|
|
8
|
+
If `packages/voidforge/wizard/server.ts` does not exist (methodology-only install):
|
|
9
9
|
1. Offer: "Portfolio requires the wizard server. Pull it from upstream? [Y/n]"
|
|
10
10
|
2. On yes: `git fetch voidforge main 2>/dev/null || git remote add voidforge https://github.com/tmcleod3/voidforge.git && git fetch voidforge main` then `git checkout voidforge/main -- packages/voidforge/` then `npm install`
|
|
11
11
|
3. On no: stop with "Run manually: `git checkout voidforge/main -- packages/voidforge/`"
|
|
12
12
|
|
|
13
13
|
## Context Setup
|
|
14
14
|
1. Read `~/.voidforge/projects.json` for registered projects
|
|
15
|
-
2. For each project: read treasury data from
|
|
16
|
-
3.
|
|
17
|
-
4. If
|
|
15
|
+
2. For each project: read treasury data from `{project}/cultivation/treasury/` (per-project paths, v22.0+)
|
|
16
|
+
3. Use `readTreasurySummary()` which reads the O(1) `treasury-summary.json` cache (v22.1+)
|
|
17
|
+
4. If no projects registered: "No projects registered. Run `/treasury setup` in a project directory."
|
|
18
|
+
5. If single project: show treasury view with note about portfolio comparisons
|
|
18
19
|
|
|
19
20
|
## Portfolio Dashboard
|
|
20
21
|
|
package/.claude/commands/qa.md
CHANGED
|
@@ -2,6 +2,14 @@
|
|
|
2
2
|
|
|
3
3
|
**AGENT DEPLOYMENT IS MANDATORY.** Step 3 specifies parallel agent launches via the Agent tool. You MUST launch Oracle, Red Hood, Alfred, Deathstroke, Constantine, Cyborg, Raven, Wonder Woman, Batgirl, and Aquaman as separate sub-processes — do NOT shortcut to inline analysis. (Field report #68)
|
|
4
4
|
|
|
5
|
+
## Dynamic Dispatch (ADR-044)
|
|
6
|
+
|
|
7
|
+
Opus scans `git diff --stat` and matches changed files against the `description` fields of all 263 agents in `.claude/agents/`. Matching specialists launch alongside the core agents below.
|
|
8
|
+
|
|
9
|
+
**Dispatch control:** `--light` skips dynamic dispatch (core only). `--solo` runs lead agent only.
|
|
10
|
+
|
|
11
|
+
**Promoted agent:** **Constantine** `subagent_type: constantine-cursed-code` runs on every `/qa` final pass — finds code that works by accident.
|
|
12
|
+
|
|
5
13
|
## Context Setup
|
|
6
14
|
1. Read `/logs/build-state.md` — understand current project state
|
|
7
15
|
2. Read `/docs/methods/QA_ENGINEER.md`
|
|
@@ -13,22 +21,22 @@
|
|
|
13
21
|
2. Create `/logs/phase-09-qa-audit.md` (or appropriate phase log)
|
|
14
22
|
|
|
15
23
|
## Step 1 — Attack Plan
|
|
16
|
-
**Green Lantern** generates the test matrix first — what inputs
|
|
17
|
-
- **Oracle
|
|
18
|
-
- **Red Hood
|
|
19
|
-
- **Alfred
|
|
20
|
-
- **Lucius
|
|
21
|
-
- **Deathstroke
|
|
22
|
-
- **Constantine
|
|
23
|
-
- **Cyborg
|
|
24
|
-
- **Raven
|
|
25
|
-
- **Wonder Woman
|
|
24
|
+
**Green Lantern** `subagent_type: green-lantern-scenarios` generates the test matrix first — what inputs x what states x what conditions should be tested. Then assign targets:
|
|
25
|
+
- **Oracle** `subagent_type: oracle-static-analysis` — Static: critical flows, missing awaits, null checks, type mismatches, race conditions.
|
|
26
|
+
- **Red Hood** `subagent_type: red-hood-aggressive` — Dynamic: empty/huge/unicode inputs, network failures, malformed JSON, rapid clicking.
|
|
27
|
+
- **Alfred** `subagent_type: alfred-dependencies` — Dependencies: `npm audit`, outdated libs, deprecated APIs, version conflicts.
|
|
28
|
+
- **Lucius** `subagent_type: lucius-config` — Config: .env completeness, secrets not in git, prod vs dev mismatches.
|
|
29
|
+
- **Deathstroke** `subagent_type: deathstroke-adversarial` — Adversarial: bypass validations, chain interactions, exploit business logic.
|
|
30
|
+
- **Constantine** `subagent_type: constantine-cursed-code` — Cursed code: unreachable branches, dead state, impossible conditions, accidental correctness.
|
|
31
|
+
- **Cyborg** `subagent_type: cyborg-system-integration` — Integration: trace full data path across 3+ module boundaries, inconsistent response shapes.
|
|
32
|
+
- **Raven** `subagent_type: raven-deep-analysis` — Deep analysis: bugs hidden beneath 3 layers of abstraction, logic correct per function but wrong in composition.
|
|
33
|
+
- **Wonder Woman** `subagent_type: wonder-woman-truth` — Truth: code that says one thing and does another, misleading names, stale docs.
|
|
26
34
|
|
|
27
35
|
## Step 2 — Baseline
|
|
28
36
|
Get the project running. Verify manually: app starts, primary flow works, auth works (if applicable), data persists, error states display.
|
|
29
37
|
|
|
30
|
-
## Step 2.5 — Smoke Tests
|
|
31
|
-
After build + restart, **Flash** parallelizes curl commands against the running server for each new or modified feature:
|
|
38
|
+
## Step 2.5 — Smoke Tests
|
|
39
|
+
After build + restart, **Flash** `subagent_type: flash-rapid-test` parallelizes curl commands against the running server for each new or modified feature:
|
|
32
40
|
- **Primary user flow:** Execute via curl/fetch against localhost — verify the end-to-end path works
|
|
33
41
|
- **File uploads:** Upload a file, then fetch the returned URL and verify HTTP 200 + correct content-type
|
|
34
42
|
- **Form submissions:** Submit valid data (verify 200), then submit invalid/duplicate data (verify error message is specific, not generic)
|
|
@@ -39,20 +47,20 @@ This catches integration failures that static code review misses. If the server
|
|
|
39
47
|
|
|
40
48
|
## Step 3 — Pass 1: Find Bugs (parallel analysis)
|
|
41
49
|
Use the Agent tool to run these in parallel — these are read-only analysis tasks:
|
|
42
|
-
- **Agent 1
|
|
43
|
-
- **Agent 2
|
|
44
|
-
- **Agent 3
|
|
45
|
-
- **Agent 4
|
|
46
|
-
- **Agent 5
|
|
47
|
-
- **Agent 6
|
|
48
|
-
- **Agent 7
|
|
50
|
+
- **Agent 1** `subagent_type: oracle-static-analysis` — Scan /src/lib/ and /src/app/ for logic flaws, missing awaits, unsafe assumptions.
|
|
51
|
+
- **Agent 2** `subagent_type: red-hood-aggressive` — Test all API endpoints with malformed inputs, empty bodies, missing auth.
|
|
52
|
+
- **Agent 3** `subagent_type: alfred-dependencies` — Run `npm audit`, check package.json for deprecated/vulnerable packages.
|
|
53
|
+
- **Agent 4** `subagent_type: deathstroke-adversarial` — Adversarial probing: bypass validations, chain unexpected interactions, test authorization boundaries.
|
|
54
|
+
- **Agent 5** `subagent_type: constantine-cursed-code` — Hunt cursed code: dead branches, impossible conditions, accidental correctness, shadowed variables.
|
|
55
|
+
- **Agent 6** `subagent_type: batgirl-detail` — Deep per-module audit: every edge of every form, every boundary of every validation, every regex. Not broad -- *thorough*.
|
|
56
|
+
- **Agent 7** `subagent_type: aquaman-deep-dive` — Deep dive on the hardest/largest module (500+ lines or 10+ functions). Exhaustive testing of one complex area.
|
|
49
57
|
|
|
50
58
|
Synthesize findings from all agents into a unified list.
|
|
51
59
|
|
|
52
|
-
Lucius reviews config separately (reads .env files
|
|
60
|
+
**Lucius** `subagent_type: lucius-config` reviews config separately (reads .env files -- sensitive, don't delegate to sub-agent).
|
|
53
61
|
|
|
54
62
|
## Step 3.5 — Automated Tests
|
|
55
|
-
Run `npm test`. Analyze failures. Cross-reference with findings from Step 3. **Huntress** identifies flaky/non-deterministic tests — race conditions, timing dependencies, order-dependent assertions. For every bug found, ask: "Can this be caught by an automated test?" If yes, write the test.
|
|
63
|
+
Run `npm test`. Analyze failures. Cross-reference with findings from Step 3. **Huntress** `subagent_type: huntress-flaky-bugs` identifies flaky/non-deterministic tests — race conditions, timing dependencies, order-dependent assertions. For every bug found, ask: "Can this be caught by an automated test?" If yes, write the test.
|
|
56
64
|
|
|
57
65
|
## Step 4 — Bug Tracker
|
|
58
66
|
Log all findings in this format in the phase log:
|
|
@@ -64,26 +72,26 @@ Severity: Critical (security/data loss) > High (broken flow) > Medium (degraded)
|
|
|
64
72
|
|
|
65
73
|
**Confidence scoring is mandatory.** Every finding includes a confidence score (0-100). If confidence is below 60, launch a second agent from a different universe (e.g., if Oracle found it, escalate to Spock or Kenobi) to verify before including. If the second agent disagrees, drop the finding. High-confidence findings (90+) skip re-verification in Step 6.5.
|
|
66
74
|
|
|
67
|
-
## Step 5 — Fix (small batches
|
|
68
|
-
One batch = fixes for one area or severity level. **Green Arrow** narrows vague findings to exact lines and conditions. After each batch:
|
|
75
|
+
## Step 5 — Fix (small batches)
|
|
76
|
+
One batch = fixes for one area or severity level. **Green Arrow** `subagent_type: green-arrow-precision` narrows vague findings to exact lines and conditions. After each batch:
|
|
69
77
|
1. Re-run `npm test`
|
|
70
78
|
2. Re-verify affected manual flows
|
|
71
79
|
3. Update bug tracker in phase log
|
|
72
80
|
4. Add new test for each fix where applicable
|
|
73
81
|
|
|
74
|
-
## Step 6 — Harden
|
|
75
|
-
Normalize error handling (reference `/docs/patterns/error-handling.ts`). Add guardrails. Improve structured logging. **Superman** verifies the codebase meets its own stated standards — linting clean, type-safe, naming conventions consistent, no unresolved TODOs.
|
|
82
|
+
## Step 6 — Harden
|
|
83
|
+
Normalize error handling (reference `/docs/patterns/error-handling.ts`). Add guardrails. Improve structured logging. **Superman** `subagent_type: superman-strength-test` verifies the codebase meets its own stated standards — linting clean, type-safe, naming conventions consistent, no unresolved TODOs.
|
|
76
84
|
|
|
77
85
|
## Step 6.5 — Pass 2: Re-Verify Fixes
|
|
78
86
|
After all fixes are applied, run a verification pass:
|
|
79
|
-
- **Nightwing** re-runs full test suite, reports any new failures
|
|
80
|
-
- **Red Hood** re-probes fixed areas — verify fixes hold under adversarial input
|
|
81
|
-
- **Deathstroke** re-tests authorization boundaries and business logic exploits that were remediated
|
|
87
|
+
- **Nightwing** `subagent_type: nightwing-regression` re-runs full test suite, reports any new failures
|
|
88
|
+
- **Red Hood** `subagent_type: red-hood-aggressive` re-probes fixed areas — verify fixes hold under adversarial input
|
|
89
|
+
- **Deathstroke** `subagent_type: deathstroke-adversarial` re-tests authorization boundaries and business logic exploits that were remediated
|
|
82
90
|
|
|
83
91
|
If Pass 2 finds new issues, fix and re-verify until clean.
|
|
84
92
|
|
|
85
93
|
## Step 7 — Regression Checklist
|
|
86
|
-
Nightwing builds the checklist. Template:
|
|
94
|
+
**Nightwing** `subagent_type: nightwing-regression` builds the checklist. Template:
|
|
87
95
|
|
|
88
96
|
| # | Flow | Steps | Expected | Status |
|
|
89
97
|
|---|------|-------|----------|--------|
|
|
@@ -2,6 +2,12 @@
|
|
|
2
2
|
|
|
3
3
|
> Pattern compliance, code quality, and maintainability review. Picard-affiliated (Star Trek).
|
|
4
4
|
|
|
5
|
+
## Dynamic Dispatch (ADR-044)
|
|
6
|
+
|
|
7
|
+
Opus scans `git diff --stat` and matches changed files against the `description` fields of all 263 agents in `.claude/agents/`. Matching specialists launch alongside the core agents below.
|
|
8
|
+
|
|
9
|
+
**Dispatch control:** `--light` skips dynamic dispatch (core only). `--solo` runs lead agent only.
|
|
10
|
+
|
|
5
11
|
## Context Setup
|
|
6
12
|
1. Read `/logs/build-state.md` — understand current project state
|
|
7
13
|
2. Read the relevant pattern files from `/docs/patterns/` for the code being reviewed
|
|
@@ -17,75 +23,38 @@ List all files in scope and their types (API route, service, component, middlewa
|
|
|
17
23
|
|
|
18
24
|
## Agent Deployment Manifest
|
|
19
25
|
|
|
20
|
-
**Lead:**
|
|
26
|
+
**Lead:** `subagent_type: picard-architecture` — architecture lens, final arbiter
|
|
21
27
|
**Core team (always deployed):**
|
|
22
|
-
-
|
|
23
|
-
-
|
|
24
|
-
-
|
|
28
|
+
- `subagent_type: spock-schema` — pattern compliance + integration tracing
|
|
29
|
+
- `subagent_type: seven-optimization` — code quality, dead code, complexity
|
|
30
|
+
- `subagent_type: data-tech-debt` — maintainability, error paths, state flow
|
|
25
31
|
|
|
26
32
|
**Stark's Marvel team (deployed on backend-heavy reviews):**
|
|
27
|
-
-
|
|
28
|
-
-
|
|
29
|
-
-
|
|
30
|
-
-
|
|
31
|
-
-
|
|
32
|
-
-
|
|
33
|
-
-
|
|
34
|
-
-
|
|
33
|
+
- `subagent_type: rogers-api-design` — API design: HTTP semantics, response shapes, REST conventions
|
|
34
|
+
- `subagent_type: banner-database` — database: query patterns, N+1, missing indexes
|
|
35
|
+
- `subagent_type: strange-service-arch` — service architecture: separation of concerns, logic placement
|
|
36
|
+
- `subagent_type: barton-smoke-test` — error handling: try/catch completeness, error propagation
|
|
37
|
+
- `subagent_type: romanoff-integrations` — security implications (lightweight — flags for Kenobi)
|
|
38
|
+
- `subagent_type: thor-queues` — performance: re-renders, expensive computations, memoization
|
|
39
|
+
- `subagent_type: wanda-state` — state management: store design, prop drilling, context boundaries
|
|
40
|
+
- `subagent_type: tchalla-quality` — API integration: external service calls, retry logic, fallback
|
|
35
41
|
|
|
36
42
|
**Cross-domain agents (deployed based on content):**
|
|
37
|
-
-
|
|
38
|
-
-
|
|
39
|
-
-
|
|
40
|
-
-
|
|
41
|
-
-
|
|
43
|
+
- `subagent_type: nightwing-regression` — auth flow end-to-end: signup→verify→login→protected→logout
|
|
44
|
+
- `subagent_type: bilbo-microcopy` — copy audit: error messages, UI text, API descriptions
|
|
45
|
+
- `subagent_type: troi-prd-compliance` — PRD compliance: does the code match what the PRD describes?
|
|
46
|
+
- `subagent_type: constantine-cursed-code` — cursed code: accidental correctness, tautological checks, shadowed vars
|
|
47
|
+
- `subagent_type: samwise-accessibility` — a11y spot-check: keyboard nav and ARIA
|
|
42
48
|
|
|
43
49
|
## Step 1 — Parallel Analysis
|
|
44
50
|
Use the Agent tool to run these in parallel — all are read-only analysis:
|
|
45
51
|
|
|
46
|
-
**Agent 1
|
|
47
|
-
|
|
48
|
-
-
|
|
49
|
-
-
|
|
50
|
-
-
|
|
51
|
-
-
|
|
52
|
-
- Error handling follows `error-handling.ts` — consistent types, no leaked internals
|
|
53
|
-
- Queues follow `job-queue.ts` — idempotent, retry, dead letter
|
|
54
|
-
- Multi-tenant follows `multi-tenant.ts` — workspace scoped, role-based
|
|
55
|
-
|
|
56
|
-
**INTEGRATION TRACING (mandatory):** When reviewed code generates URLs, references other API endpoints, constructs storage keys, or produces data consumed by other modules — you MUST read the consuming code to verify compatibility. Examples:
|
|
57
|
-
- File uploaded with key prefix `avatars/` → read the asset proxy to verify it serves that prefix
|
|
58
|
-
- API returns error `{ code: "CONFLICT" }` → read the UI that calls this API to verify it displays the error
|
|
59
|
-
- Middleware sets header `x-request-id` → read a sample API route to verify it can access the header
|
|
60
|
-
- Service generates a URL → read the route/proxy that handles that URL pattern
|
|
61
|
-
|
|
62
|
-
**Agent 2 (Seven — Code Quality):**
|
|
63
|
-
- Unnecessary complexity (can this be simpler?)
|
|
64
|
-
- Dead code, unused imports, unreachable branches
|
|
65
|
-
- Duplicated logic that should be extracted
|
|
66
|
-
- Inconsistent naming or style
|
|
67
|
-
- Missing TypeScript types or `any` usage
|
|
68
|
-
- Functions doing too many things (SRP violations)
|
|
69
|
-
|
|
70
|
-
**Agent 3 (Data — Maintainability + Error Paths + State Flow):**
|
|
71
|
-
- Wrong abstractions (over-engineered or under-abstracted)
|
|
72
|
-
- Coupling between modules that should be independent
|
|
73
|
-
- Missing error handling at system boundaries
|
|
74
|
-
- Hardcoded values that should be config
|
|
75
|
-
- Missing or misleading comments on non-obvious logic
|
|
76
|
-
|
|
77
|
-
**Agent 4 (Rogers + Banner + Strange — Backend Review, if backend code in scope):**
|
|
78
|
-
- Rogers: API endpoints follow REST conventions, consistent response shapes, proper HTTP status codes
|
|
79
|
-
- Banner: database queries are efficient (no N+1), indexes exist for query patterns, schema is normalized
|
|
80
|
-
- Strange: business logic is in services not routes, separation of concerns is clean, no god functions
|
|
81
|
-
|
|
82
|
-
**Agent 5 (Nightwing + Constantine — Cross-Domain, if auth or complex logic in scope):**
|
|
83
|
-
- Nightwing: if auth code changed, trace the full signup→verify→login→protected→logout flow
|
|
84
|
-
- Constantine: scan fixed/refactored areas for logic that only works by coincidence
|
|
85
|
-
|
|
86
|
-
**Agent 6 (Bilbo + Troi — Copy + PRD, if UI or user-facing code in scope):**
|
|
87
|
-
- Bilbo: error messages are clear and human, not generic "Something went wrong"
|
|
88
|
-
- Troi: implementation matches PRD descriptions (not just "route exists" but "renders what PRD says")
|
|
52
|
+
- **Agent 1** `subagent_type: spock-schema` — Pattern compliance: check each file against its matching pattern in `/docs/patterns/` (api-route, service, component, middleware, error-handling, job-queue, multi-tenant). **INTEGRATION TRACING (mandatory):** When reviewed code generates URLs, references endpoints, constructs storage keys, or produces data consumed by other modules — read the consuming code to verify compatibility.
|
|
53
|
+
- **Agent 2** `subagent_type: seven-optimization` — Code quality: unnecessary complexity, dead code, unused imports, duplicated logic, inconsistent naming, missing types/`any` usage, SRP violations.
|
|
54
|
+
- **Agent 3** `subagent_type: data-tech-debt` — Maintainability + error paths + state flow: wrong abstractions, module coupling, missing boundary error handling, hardcoded values, misleading comments.
|
|
55
|
+
- **Agent 4** `subagent_type: rogers-api-design` + `banner-database` + `strange-service-arch` — Backend review (if backend code in scope): REST conventions, response shapes, N+1 queries, indexes, separation of concerns.
|
|
56
|
+
- **Agent 5** `subagent_type: nightwing-regression` + `constantine-cursed-code` — Cross-domain (if auth or complex logic in scope): auth flow tracing, accidental correctness detection.
|
|
57
|
+
- **Agent 6** `subagent_type: bilbo-microcopy` + `troi-prd-compliance` — Copy + PRD (if UI or user-facing code in scope): clear error messages, PRD compliance verification.
|
|
89
58
|
|
|
90
59
|
**ROUTE COLLISION CHECK (mandatory for web apps):** When a new router/route file is added, list ALL registered routes (method + path) across ALL routers. Check for duplicate method+path combinations. Frameworks like FastAPI silently shadow duplicate routes — the first registered wins.
|
|
91
60
|
|
|
@@ -132,8 +101,8 @@ Fix "Must Fix" and "Should Fix" items. After each batch:
|
|
|
132
101
|
|
|
133
102
|
## Step 3.5 — Re-Verify Fixes
|
|
134
103
|
After fixes are applied:
|
|
135
|
-
- **Spock** re-checks pattern compliance on modified files
|
|
136
|
-
- **Seven** confirms no new complexity or dead code introduced by fixes
|
|
104
|
+
- **Spock** `subagent_type: spock-schema` re-checks pattern compliance on modified files
|
|
105
|
+
- **Seven** `subagent_type: seven-optimization` confirms no new complexity or dead code introduced by fixes
|
|
137
106
|
|
|
138
107
|
If new issues found, fix and re-verify.
|
|
139
108
|
|
|
@@ -2,6 +2,12 @@
|
|
|
2
2
|
|
|
3
3
|
**AGENT DEPLOYMENT IS MANDATORY.** Phase 1 specifies parallel agent launches via the Agent tool. You MUST launch Leia, Chewie, Rex+Bo-Katan, and Maul as separate sub-processes. Phase 2 agents (Yoda, Windu, Ahsoka, Padmé, Qui-Gon) run sequentially but each MUST be a separate agent invocation. Do NOT shortcut to inline analysis. (Field report #68)
|
|
4
4
|
|
|
5
|
+
## Dynamic Dispatch (ADR-044)
|
|
6
|
+
|
|
7
|
+
Opus scans `git diff --stat` and matches changed files against the `description` fields of all 263 agents in `.claude/agents/`. Matching specialists launch alongside the core agents below.
|
|
8
|
+
|
|
9
|
+
**Dispatch control:** `--light` skips dynamic dispatch (core only). `--solo` runs lead agent only.
|
|
10
|
+
|
|
5
11
|
## Context Setup
|
|
6
12
|
1. Read `/logs/build-state.md` — understand current project state
|
|
7
13
|
2. Read `/docs/methods/SECURITY_AUDITOR.md`
|
|
@@ -9,59 +15,28 @@
|
|
|
9
15
|
|
|
10
16
|
## Audit Sequence
|
|
11
17
|
|
|
12
|
-
### Phase 0.5 — First Strike
|
|
18
|
+
### Phase 0.5 — First Strike
|
|
13
19
|
Before the deep audits, two agents do fast recon:
|
|
14
|
-
- **Han
|
|
15
|
-
- **Cassian
|
|
20
|
+
- **Han** `subagent_type: han-vuln-hunter` — Quick OWASP top 10 scan: finds the obvious vulnerabilities that shouldn't require deep analysis. Shoots first.
|
|
21
|
+
- **Cassian** `subagent_type: cassian-recon` — Threat modeling and attack surface mapping: all endpoints, high-value targets, threat model that guides the rest of the audit.
|
|
16
22
|
|
|
17
23
|
### Phase 1 — Independent audits (parallel analysis)
|
|
18
24
|
Use the Agent tool to run these simultaneously — all are read-only analysis:
|
|
19
|
-
- **Agent 1
|
|
20
|
-
- **Agent 2
|
|
21
|
-
- **Agent 3
|
|
22
|
-
- **Agent 4
|
|
25
|
+
- **Agent 1** `subagent_type: leia-secrets` — Secrets: scan for hardcoded secrets, verify .env gitignored, check git history for leaked keys, verify different secrets dev/prod.
|
|
26
|
+
- **Agent 2** `subagent_type: chewie-dependency-audit` — Dependencies: `npm audit`, critical/high vulns, lock file committed, deprecated packages.
|
|
27
|
+
- **Agent 3** `subagent_type: rex-infrastructure` + `bo-katan-perimeter` — Infrastructure + perimeter: security headers (HSTS, CSP, X-Frame-Options, CORS), TLS config, exposed ports/debug endpoints, firewall rules, CORS enforcement.
|
|
28
|
+
- **Agent 4** `subagent_type: maul-red-team` — Red team: exploit each endpoint/flow, chain vulnerabilities, test trust boundaries, attempt privilege escalation. **RUNTIME EXPLOITATION (mandatory):** Execute actual attack requests via curl/fetch -- not just theorize.
|
|
23
29
|
|
|
24
30
|
### Phase 2 — Sequential audits (depend on understanding the codebase)
|
|
25
31
|
These require full codebase context — run sequentially:
|
|
26
32
|
|
|
27
|
-
**Yoda — Auth
|
|
28
|
-
-
|
|
29
|
-
-
|
|
30
|
-
-
|
|
31
|
-
-
|
|
32
|
-
-
|
|
33
|
-
|
|
34
|
-
**Windu — Input:**
|
|
35
|
-
- SQL injection (parameterized queries everywhere)
|
|
36
|
-
- XSS (escaped output, no dangerouslySetInnerHTML without sanitization, CSP)
|
|
37
|
-
- SSRF (URL allowlist if user provides URLs)
|
|
38
|
-
- Command injection (no user input in shell commands)
|
|
39
|
-
- Path traversal (sanitized filenames)
|
|
40
|
-
|
|
41
|
-
**Ahsoka — Access Control:**
|
|
42
|
-
- Every endpoint verifies ownership (no IDOR)
|
|
43
|
-
- UUIDs not sequential IDs in URLs
|
|
44
|
-
- Admin verified server-side (not just hidden UI)
|
|
45
|
-
- Tier features verified server-side
|
|
46
|
-
- Rate limiting per-user and per-IP
|
|
47
|
-
- Reference `/docs/patterns/multi-tenant.ts` if multi-tenant
|
|
48
|
-
- **AUTH CHAIN TRACING (mandatory):** Don't just verify each endpoint checks auth — trace the full chain: Is the auth middleware actually applied to this route? Is the user/tenant context carried from middleware → service → DB query? Are there routes that SHOULD have auth middleware but don't? Read the middleware registration and verify every protected route is covered.
|
|
49
|
-
|
|
50
|
-
**Padme — Data:**
|
|
51
|
-
- PII identified and cataloged
|
|
52
|
-
- PII not in logs, error messages, or URLs
|
|
53
|
-
- Deletion possible (GDPR right to erasure)
|
|
54
|
-
- Backups encrypted
|
|
55
|
-
|
|
56
|
-
**Qui-Gon — Subtle Vulnerabilities** (after sequential audits):
|
|
57
|
-
- Timing-based attacks, race conditions in auth flows, logic errors that are technically correct but exploitable
|
|
58
|
-
- The vulnerabilities that pass every standard check
|
|
59
|
-
|
|
60
|
-
**Sabine — Unconventional** (conditional — if project has external dependencies):
|
|
61
|
-
- Supply chain attacks, dependency confusion, prototype pollution, CSP bypass via CDN
|
|
62
|
-
|
|
63
|
-
**Bail Organa — Governance** (conditional — if project has regulatory requirements):
|
|
64
|
-
- GDPR data handling, SOC2 controls, HIPAA mapping
|
|
33
|
+
- **Yoda** `subagent_type: yoda-auth` — Auth: password hashing (bcrypt >= 12 rounds), session management (httpOnly/secure/sameSite), OAuth (state param, redirect whitelist), reset tokens (single-use, expiring, rate limited). Reference `/docs/patterns/middleware.ts`.
|
|
34
|
+
- **Windu** `subagent_type: windu-input-validation` — Input: SQL injection (parameterized queries), XSS (escaped output, CSP), SSRF (URL allowlist), command injection, path traversal.
|
|
35
|
+
- **Ahsoka** `subagent_type: ahsoka-access-control` — Access control: IDOR checks, UUIDs not sequential IDs, server-side admin/tier verification, rate limiting. **AUTH CHAIN TRACING (mandatory):** Trace the full chain from middleware registration through service to DB query. Reference `/docs/patterns/multi-tenant.ts`.
|
|
36
|
+
- **Padme** `subagent_type: padme-data-protection` — Data protection: PII catalog, PII not in logs/errors/URLs, GDPR deletion, encrypted backups.
|
|
37
|
+
- **Qui-Gon** `subagent_type: qui-gon-subtle-vulns` — Subtle vulnerabilities: timing attacks, race conditions in auth flows, logic errors that pass standard checks.
|
|
38
|
+
- **Sabine** `subagent_type: sabine-unconventional` — (conditional) Unconventional: supply chain attacks, dependency confusion, prototype pollution, CSP bypass via CDN.
|
|
39
|
+
- **Bail Organa** `subagent_type: bail-organa-governance` — (conditional) Governance: GDPR data handling, SOC2 controls, HIPAA mapping.
|
|
65
40
|
|
|
66
41
|
### Phase 3 — Remediate
|
|
67
42
|
Write all findings to `/logs/phase-11-security-audit.md` (or appropriate phase log):
|
|
@@ -79,11 +54,11 @@ Fix critical and high findings immediately. Medium findings get tracked. For eac
|
|
|
79
54
|
3. Check it didn't break anything (`npm test`)
|
|
80
55
|
4. Update the finding status in the log
|
|
81
56
|
|
|
82
|
-
### Phase 4 — Re-Verification
|
|
57
|
+
### Phase 4 — Re-Verification
|
|
83
58
|
After remediations are applied:
|
|
84
|
-
- **Maul** re-probes all remediated vulnerabilities — verify fixes hold under adversarial conditions. Execute actual HTTP requests against the running server.
|
|
85
|
-
- **Anakin** attempts to bypass remediations using dark-side techniques — JWT algorithm confusion, auth library edge cases, prototype pollution, framework misuse.
|
|
86
|
-
- **Din Djarin** bounty-hunts for anything Maul and Anakin missed — post-remediation sweep
|
|
59
|
+
- **Maul** `subagent_type: maul-red-team` re-probes all remediated vulnerabilities — verify fixes hold under adversarial conditions. Execute actual HTTP requests against the running server.
|
|
60
|
+
- **Anakin** `subagent_type: anakin-dark-side` attempts to bypass remediations using dark-side techniques — JWT algorithm confusion, auth library edge cases, prototype pollution, framework misuse.
|
|
61
|
+
- **Din Djarin** `subagent_type: din-djarin-bounty` bounty-hunts for anything Maul and Anakin missed — post-remediation sweep.
|
|
87
62
|
|
|
88
63
|
If any agent finds new issues, fix and re-verify until clean.
|
|
89
64
|
|