thevoidforge-methodology 21.0.0 → 23.1.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (304) hide show
  1. package/.claude/agents/adolin-brand.md +39 -0
  2. package/.claude/agents/ahsoka-access-control.md +54 -0
  3. package/.claude/agents/alfred-dependencies.md +42 -0
  4. package/.claude/agents/alia-threat-detect.md +39 -0
  5. package/.claude/agents/anakin-dark-side.md +40 -0
  6. package/.claude/agents/aquaman-deep-dive.md +42 -0
  7. package/.claude/agents/aragorn-orchestration.md +38 -0
  8. package/.claude/agents/archer-greenfield.md +47 -0
  9. package/.claude/agents/armin-clever.md +38 -0
  10. package/.claude/agents/arwen-ui-polish.md +41 -0
  11. package/.claude/agents/ashitaka-tech-debt.md +38 -0
  12. package/.claude/agents/asuka-performance.md +38 -0
  13. package/.claude/agents/bail-organa-governance.md +36 -0
  14. package/.claude/agents/banner-database.md +42 -0
  15. package/.claude/agents/barton-smoke-test.md +57 -0
  16. package/.claude/agents/bashir-field-medic.md +62 -0
  17. package/.claude/agents/batgirl-detail.md +42 -0
  18. package/.claude/agents/batman-qa.md +69 -0
  19. package/.claude/agents/bayta-evals.md +39 -0
  20. package/.claude/agents/beast-boy-cross-env.md +42 -0
  21. package/.claude/agents/beerus-destroyer.md +38 -0
  22. package/.claude/agents/bel-riose-orchestration.md +39 -0
  23. package/.claude/agents/beru-subprocess.md +36 -0
  24. package/.claude/agents/bilbo-microcopy.md +41 -0
  25. package/.claude/agents/black-canary-monitoring.md +42 -0
  26. package/.claude/agents/bliss-ai-safety.md +39 -0
  27. package/.claude/agents/bo-katan-perimeter.md +39 -0
  28. package/.claude/agents/bombadil-forge-sync.md +60 -0
  29. package/.claude/agents/boromir-hubris.md +39 -0
  30. package/.claude/agents/breeze-platform-relations.md +39 -0
  31. package/.claude/agents/bucky-legacy.md +42 -0
  32. package/.claude/agents/bulma-engineering.md +38 -0
  33. package/.claude/agents/calcifer-daemon.md +38 -0
  34. package/.claude/agents/cara-dune-enforcement.md +36 -0
  35. package/.claude/agents/cassian-recon.md +36 -0
  36. package/.claude/agents/cc-persistent-process.md +38 -0
  37. package/.claude/agents/celeborn-design-system.md +39 -0
  38. package/.claude/agents/celebrimbor-forge-artist.md +61 -0
  39. package/.claude/agents/chakotay-bridge.md +46 -0
  40. package/.claude/agents/chani-worm-rider.md +60 -0
  41. package/.claude/agents/chewie-dependency-audit.md +40 -0
  42. package/.claude/agents/chrome-discovery.md +36 -0
  43. package/.claude/agents/constantine-cursed-code.md +57 -0
  44. package/.claude/agents/coulson-release.md +61 -0
  45. package/.claude/agents/crusher-diagnostics.md +47 -0
  46. package/.claude/agents/cyborg-system-integration.md +42 -0
  47. package/.claude/agents/dalinar-positioning.md +39 -0
  48. package/.claude/agents/daneel-model-migration.md +39 -0
  49. package/.claude/agents/data-tech-debt.md +46 -0
  50. package/.claude/agents/dax-legacy-wisdom.md +47 -0
  51. package/.claude/agents/deathstroke-adversarial.md +57 -0
  52. package/.claude/agents/denji-determination.md +38 -0
  53. package/.claude/agents/din-djarin-bounty.md +41 -0
  54. package/.claude/agents/dockson-treasury.md +65 -0
  55. package/.claude/agents/dori-integration-check.md +36 -0
  56. package/.claude/agents/dors-observability.md +39 -0
  57. package/.claude/agents/drax-exact-match.md +41 -0
  58. package/.claude/agents/ducem-token-economics.md +40 -0
  59. package/.claude/agents/duncan-relay.md +39 -0
  60. package/.claude/agents/duo-teardown.md +37 -0
  61. package/.claude/agents/ed-network-scan.md +37 -0
  62. package/.claude/agents/elrond-ux-strategy.md +38 -0
  63. package/.claude/agents/eowyn-delight.md +54 -0
  64. package/.claude/agents/erwin-strategy.md +38 -0
  65. package/.claude/agents/ezra-catches-missed.md +39 -0
  66. package/.claude/agents/ezri-session-analyst.md +44 -0
  67. package/.claude/agents/falcon-migration.md +42 -0
  68. package/.claude/agents/faramir-judgment.md +39 -0
  69. package/.claude/agents/faye-resourceful.md +38 -0
  70. package/.claude/agents/fenring-passive-monitor.md +36 -0
  71. package/.claude/agents/fern-protocol.md +36 -0
  72. package/.claude/agents/feyd-adversarial.md +40 -0
  73. package/.claude/agents/flash-rapid-test.md +42 -0
  74. package/.claude/agents/friday-automation.md +41 -0
  75. package/.claude/agents/frieren-long-term.md +38 -0
  76. package/.claude/agents/frodo-critical-path.md +39 -0
  77. package/.claude/agents/fury-initiative.md +62 -0
  78. package/.claude/agents/gaal-prompt-arch.md +39 -0
  79. package/.claude/agents/galadriel-frontend.md +67 -0
  80. package/.claude/agents/gamora-perf-assassin.md +42 -0
  81. package/.claude/agents/gandalf-setup-wizard.md +62 -0
  82. package/.claude/agents/gen-docs.md +36 -0
  83. package/.claude/agents/ghanima-paired-monitor.md +36 -0
  84. package/.claude/agents/gimli-performance.md +40 -0
  85. package/.claude/agents/giyu-silent-guard.md +38 -0
  86. package/.claude/agents/glorfindel-rendering.md +39 -0
  87. package/.claude/agents/gohan-hidden-power.md +38 -0
  88. package/.claude/agents/gojo-infinite-scale.md +38 -0
  89. package/.claude/agents/goku-scaling.md +38 -0
  90. package/.claude/agents/goldberry-change-detect.md +36 -0
  91. package/.claude/agents/gordon-escalation.md +41 -0
  92. package/.claude/agents/green-arrow-precision.md +42 -0
  93. package/.claude/agents/green-lantern-scenarios.md +42 -0
  94. package/.claude/agents/grogu-tiny-vulns.md +37 -0
  95. package/.claude/agents/groot-caching.md +42 -0
  96. package/.claude/agents/gurney-delivery.md +39 -0
  97. package/.claude/agents/haku-deploy-wizard.md +64 -0
  98. package/.claude/agents/haldir-boundaries.md +39 -0
  99. package/.claude/agents/han-vuln-hunter.md +39 -0
  100. package/.claude/agents/hange-experimentation.md +38 -0
  101. package/.claude/agents/harah-protocol.md +37 -0
  102. package/.claude/agents/hawkgirl-regression-sweep.md +42 -0
  103. package/.claude/agents/heero-mission-deploy.md +38 -0
  104. package/.claude/agents/hera-navigation.md +40 -0
  105. package/.claude/agents/hill-mission-control.md +42 -0
  106. package/.claude/agents/himmel-legacy.md +36 -0
  107. package/.claude/agents/hober-tool-schema.md +39 -0
  108. package/.claude/agents/hoid-copywriting.md +39 -0
  109. package/.claude/agents/howl-migration.md +38 -0
  110. package/.claude/agents/hughes-observability.md +36 -0
  111. package/.claude/agents/huntress-flaky-bugs.md +41 -0
  112. package/.claude/agents/irulan-historian.md +36 -0
  113. package/.claude/agents/jake-reporter.md +44 -0
  114. package/.claude/agents/janeway-novel-arch.md +47 -0
  115. package/.claude/agents/janov-context-eng.md +39 -0
  116. package/.claude/agents/jarvis-status.md +41 -0
  117. package/.claude/agents/jean-pragmatic.md +38 -0
  118. package/.claude/agents/jessica-voice.md +39 -0
  119. package/.claude/agents/jet-maintenance.md +38 -0
  120. package/.claude/agents/jin-disciplined-adv.md +38 -0
  121. package/.claude/agents/kaji-intelligence.md +38 -0
  122. package/.claude/agents/kaladin-organic-growth.md +39 -0
  123. package/.claude/agents/kallen-hard-deploy.md +38 -0
  124. package/.claude/agents/kanan-intuitive.md +40 -0
  125. package/.claude/agents/kaoru-harmony.md +36 -0
  126. package/.claude/agents/kaworu-solver.md +38 -0
  127. package/.claude/agents/kelsier-growth.md +62 -0
  128. package/.claude/agents/kenobi-security.md +69 -0
  129. package/.claude/agents/kim-api-design.md +47 -0
  130. package/.claude/agents/kira-pragmatic.md +47 -0
  131. package/.claude/agents/kishibe-hardening.md +38 -0
  132. package/.claude/agents/kohaku-rapid-response.md +35 -0
  133. package/.claude/agents/krillin-support.md +35 -0
  134. package/.claude/agents/kusanagi-devops.md +67 -0
  135. package/.claude/agents/la-forge-reliability.md +61 -0
  136. package/.claude/agents/lang-micro-changes.md +42 -0
  137. package/.claude/agents/legolas-precision.md +41 -0
  138. package/.claude/agents/leia-secrets.md +39 -0
  139. package/.claude/agents/lelouch-orchestration.md +38 -0
  140. package/.claude/agents/leto-ii-persistence.md +39 -0
  141. package/.claude/agents/leto-protection.md +39 -0
  142. package/.claude/agents/levi-deploy.md +38 -0
  143. package/.claude/agents/liet-kynes-deep-system.md +39 -0
  144. package/.claude/agents/lift-social-media.md +39 -0
  145. package/.claude/agents/loki-chaos.md +57 -0
  146. package/.claude/agents/lucius-config.md +42 -0
  147. package/.claude/agents/luke-audit-journey.md +40 -0
  148. package/.claude/agents/manhunter-shapeshifting.md +42 -0
  149. package/.claude/agents/marsh-competitive-intel.md +40 -0
  150. package/.claude/agents/maul-red-team.md +56 -0
  151. package/.claude/agents/merry-pair-review.md +39 -0
  152. package/.claude/agents/mikasa-protection.md +38 -0
  153. package/.claude/agents/miles-teg-perf.md +39 -0
  154. package/.claude/agents/milim-load-test.md +38 -0
  155. package/.claude/agents/misato-operations.md +38 -0
  156. package/.claude/agents/mob-capacity.md +38 -0
  157. package/.claude/agents/mohiam-authentication.md +39 -0
  158. package/.claude/agents/mon-mothma-security-mgmt.md +40 -0
  159. package/.claude/agents/mugen-chaos.md +38 -0
  160. package/.claude/agents/mule-adversarial-ai.md +40 -0
  161. package/.claude/agents/mustang-cleanup.md +38 -0
  162. package/.claude/agents/nanami-structured-ops.md +38 -0
  163. package/.claude/agents/nausicaa-resources.md +38 -0
  164. package/.claude/agents/navani-technical-seo.md +39 -0
  165. package/.claude/agents/nebula-optimization.md +42 -0
  166. package/.claude/agents/nightwing-regression.md +57 -0
  167. package/.claude/agents/nobara-direct-fix.md +38 -0
  168. package/.claude/agents/nog-solutions.md +47 -0
  169. package/.claude/agents/nori-asset-scanner.md +36 -0
  170. package/.claude/agents/obrien-root-cause.md +47 -0
  171. package/.claude/agents/odo-structural-anomaly.md +47 -0
  172. package/.claude/agents/okoye-data-integrity.md +42 -0
  173. package/.claude/agents/olivier-hardening.md +38 -0
  174. package/.claude/agents/oracle-static-analysis.md +57 -0
  175. package/.claude/agents/ori-prompt-crafter.md +36 -0
  176. package/.claude/agents/padme-data-protection.md +40 -0
  177. package/.claude/agents/paris-route-planner.md +46 -0
  178. package/.claude/agents/parker-connections.md +42 -0
  179. package/.claude/agents/paul-orchestration.md +39 -0
  180. package/.claude/agents/picard-architecture.md +62 -0
  181. package/.claude/agents/piccolo-tactics.md +38 -0
  182. package/.claude/agents/pike-bold-decisions.md +47 -0
  183. package/.claude/agents/pippin-discovery.md +39 -0
  184. package/.claude/agents/plo-koon-edge-cases.md +36 -0
  185. package/.claude/agents/power-chaotic.md +38 -0
  186. package/.claude/agents/qui-gon-subtle-vulns.md +39 -0
  187. package/.claude/agents/radagast-edge-cases.md +40 -0
  188. package/.claude/agents/raoden-conversion.md +40 -0
  189. package/.claude/agents/raven-deep-analysis.md +42 -0
  190. package/.claude/agents/red-hood-aggressive.md +42 -0
  191. package/.claude/agents/rei-dangerous-tasks.md +38 -0
  192. package/.claude/agents/reigen-debugger.md +38 -0
  193. package/.claude/agents/rengoku-intense-monitor.md +38 -0
  194. package/.claude/agents/rex-infrastructure.md +40 -0
  195. package/.claude/agents/rhodes-production.md +42 -0
  196. package/.claude/agents/riker-review.md +61 -0
  197. package/.claude/agents/rimuru-adapter.md +38 -0
  198. package/.claude/agents/riza-backup.md +38 -0
  199. package/.claude/agents/robin-apprentice.md +41 -0
  200. package/.claude/agents/rocket-scrappy.md +42 -0
  201. package/.claude/agents/rogers-api-design.md +42 -0
  202. package/.claude/agents/romanoff-integrations.md +42 -0
  203. package/.claude/agents/sabine-unconventional.md +39 -0
  204. package/.claude/agents/salvor-model-selection.md +40 -0
  205. package/.claude/agents/samwise-accessibility.md +41 -0
  206. package/.claude/agents/sarene-outreach.md +39 -0
  207. package/.claude/agents/sasha-resources.md +36 -0
  208. package/.claude/agents/scotty-infrastructure.md +46 -0
  209. package/.claude/agents/seldon-ai.md +64 -0
  210. package/.claude/agents/senku-provisioning.md +38 -0
  211. package/.claude/agents/sentaro-scheduling.md +36 -0
  212. package/.claude/agents/seven-optimization.md +47 -0
  213. package/.claude/agents/shallan-creative.md +39 -0
  214. package/.claude/agents/sheeana-transport.md +39 -0
  215. package/.claude/agents/shuri-innovation.md +42 -0
  216. package/.claude/agents/siona-evasion.md +40 -0
  217. package/.claude/agents/sisko-campaign.md +65 -0
  218. package/.claude/agents/spike-routing.md +38 -0
  219. package/.claude/agents/spock-schema.md +60 -0
  220. package/.claude/agents/starfire-brute-force.md +42 -0
  221. package/.claude/agents/stark-backend.md +69 -0
  222. package/.claude/agents/steris-budget.md +39 -0
  223. package/.claude/agents/stilgar-channel-security.md +39 -0
  224. package/.claude/agents/strange-service-arch.md +42 -0
  225. package/.claude/agents/sung-workers.md +38 -0
  226. package/.claude/agents/superman-strength-test.md +42 -0
  227. package/.claude/agents/suzaku-execution.md +38 -0
  228. package/.claude/agents/szeth-compliance.md +39 -0
  229. package/.claude/agents/tanjiro-persistent.md +38 -0
  230. package/.claude/agents/tchalla-quality.md +42 -0
  231. package/.claude/agents/thanos-gauntlet.md +67 -0
  232. package/.claude/agents/theoden-rally.md +39 -0
  233. package/.claude/agents/thor-queues.md +42 -0
  234. package/.claude/agents/thufir-protocol-parsing.md +39 -0
  235. package/.claude/agents/todo-brute-force.md +38 -0
  236. package/.claude/agents/torres-site-scanner.md +46 -0
  237. package/.claude/agents/totoro-guardian.md +38 -0
  238. package/.claude/agents/tpol-disciplined.md +47 -0
  239. package/.claude/agents/treebeard-deliberation.md +40 -0
  240. package/.claude/agents/troi-prd-compliance.md +62 -0
  241. package/.claude/agents/trunks-rollback.md +38 -0
  242. package/.claude/agents/tuvok-deep-current.md +61 -0
  243. package/.claude/agents/uhura-integration.md +46 -0
  244. package/.claude/agents/valkyrie-recovery.md +42 -0
  245. package/.claude/agents/vegeta-monitoring.md +38 -0
  246. package/.claude/agents/veldora-dormant.md +36 -0
  247. package/.claude/agents/vin-analytics.md +39 -0
  248. package/.claude/agents/vision-data-analysis.md +42 -0
  249. package/.claude/agents/wanda-seldon-validation.md +37 -0
  250. package/.claude/agents/wanda-state.md +42 -0
  251. package/.claude/agents/wax-paid-ads.md +39 -0
  252. package/.claude/agents/wayne-ab-testing.md +39 -0
  253. package/.claude/agents/whis-precision.md +38 -0
  254. package/.claude/agents/windu-input-validation.md +39 -0
  255. package/.claude/agents/winry-maintenance.md +38 -0
  256. package/.claude/agents/wonder-woman-truth.md +42 -0
  257. package/.claude/agents/wong-documentation.md +57 -0
  258. package/.claude/agents/worf-security-arch.md +47 -0
  259. package/.claude/agents/yoda-auth.md +56 -0
  260. package/.claude/agents/yueh-trust-verify.md +39 -0
  261. package/.claude/agents/zatanna-impossible.md +42 -0
  262. package/.claude/agents/zechs-rival.md +38 -0
  263. package/.claude/agents/zenitsu-alerts.md +36 -0
  264. package/.claude/commands/ai.md +20 -14
  265. package/.claude/commands/architect.md +32 -55
  266. package/.claude/commands/assemble.md +32 -23
  267. package/.claude/commands/assess.md +3 -3
  268. package/.claude/commands/blueprint.md +9 -9
  269. package/.claude/commands/build.md +13 -3
  270. package/.claude/commands/campaign.md +27 -15
  271. package/.claude/commands/cultivation.md +19 -1
  272. package/.claude/commands/dangerroom.md +2 -2
  273. package/.claude/commands/debrief.md +14 -12
  274. package/.claude/commands/deploy.md +1 -1
  275. package/.claude/commands/devops.md +23 -17
  276. package/.claude/commands/gauntlet.md +40 -29
  277. package/.claude/commands/grow.md +14 -0
  278. package/.claude/commands/portfolio.md +5 -4
  279. package/.claude/commands/qa.md +37 -29
  280. package/.claude/commands/review.md +31 -62
  281. package/.claude/commands/security.md +24 -49
  282. package/.claude/commands/test.md +17 -10
  283. package/.claude/commands/thumper.md +1 -1
  284. package/.claude/commands/treasury.md +24 -7
  285. package/.claude/commands/ux.md +27 -26
  286. package/.claude/commands/vault.md +9 -0
  287. package/.claude/commands/void.md +1 -0
  288. package/CHANGELOG.md +122 -0
  289. package/CLAUDE.md +16 -9
  290. package/HOLOCRON.md +16 -19
  291. package/VERSION.md +6 -1
  292. package/docs/AGENT_CLASSIFICATION.md +528 -0
  293. package/docs/methods/CAMPAIGN.md +1 -1
  294. package/docs/methods/FIELD_MEDIC.md +4 -0
  295. package/docs/methods/FORGE_KEEPER.md +3 -2
  296. package/docs/methods/GAUNTLET.md +1 -1
  297. package/docs/methods/GROWTH_STRATEGIST.md +2 -2
  298. package/docs/methods/MUSTER.md +4 -0
  299. package/docs/methods/QA_ENGINEER.md +8 -0
  300. package/docs/methods/SECURITY_AUDITOR.md +8 -0
  301. package/docs/methods/SUB_AGENTS.md +40 -1
  302. package/docs/methods/SYSTEMS_ARCHITECT.md +8 -0
  303. package/docs/patterns/financial-transaction.ts +24 -0
  304. package/package.json +2 -1
@@ -5,29 +5,35 @@
5
5
  2. Read `/docs/PRD.md` frontmatter — check `deploy` value to determine target
6
6
  3. Read `/docs/methods/DEVOPS_ENGINEER.md`
7
7
 
8
+ ## Dynamic Dispatch (ADR-044)
9
+
10
+ Opus scans `git diff --stat` and matches changed files against the `description` fields of all 263 agents in `.claude/agents/`. Matching specialists launch alongside the core agents below.
11
+
12
+ **Dispatch control:** `--light` skips dynamic dispatch (core only). `--solo` runs lead agent only.
13
+
8
14
  ## Agent Deployment Manifest
9
15
 
10
- **Lead:** Kusanagi (Anime — Ghost in the Shell)
16
+ **Lead:** Kusanagi (`subagent_type: kusanagi-devops`)
11
17
 
12
18
  **Core team (always deployed):**
13
- - **Senku** (Dr. Stone) — provisioning: server setup, dependencies, runtime, idempotent scripts
14
- - **Levi** (Attack on Titan) — deployment: process management, zero-downtime, rollback scripts
15
- - **Spike** (Cowboy Bebop) — networking: reverse proxy, DNS, TLS, firewall, CORS headers
16
- - **L** (Death Note) — monitoring: health checks, uptime, alerting, log aggregation
17
- - **Bulma** (Dragon Ball) — backup: database dumps, file backup, retention, restore testing
18
- - **Holo** (Spice & Wolf) — cost: resource sizing, instance selection, cost estimation, optimization
19
+ - **Senku** (`subagent_type: senku-provisioning`) — provisioning: server setup, dependencies, runtime, idempotent scripts
20
+ - **Levi** (`subagent_type: levi-deploy`) — deployment: process management, zero-downtime, rollback scripts
21
+ - **Spike** (`subagent_type: spike-routing`) — networking: reverse proxy, DNS, TLS, firewall, CORS headers
22
+ - **L** — monitoring: health checks, uptime, alerting, log aggregation (honorary — no agent definition)
23
+ - **Bulma** (`subagent_type: bulma-engineering`) — backup: database dumps, file backup, retention, restore testing
24
+ - **Holo** — cost: resource sizing, instance selection, cost estimation, optimization (honorary — no agent definition)
19
25
 
20
26
  **Extended team (deployed on full infra reviews):**
21
- - **Valkyrie** (Marvel/Anime crossover) — disaster recovery: failover, data center redundancy, RTO/RPO
22
- - **Vegeta** (Dragon Ball) — scaling: horizontal scaling, load balancing, auto-scaling policies
23
- - **Trunks** (Dragon Ball) — migration: database migration strategy, zero-downtime schema changes
24
- - **Mikasa** (Attack on Titan) — security hardening: SSH config, fail2ban, unattended upgrades
25
- - **Erwin** (Attack on Titan) — strategy: multi-environment management, staging/production parity
26
- - **Mustang** (FMA) — orchestration: Docker Compose, container networking, service discovery
27
- - **Olivier** (FMA) — cold region: CDN configuration, edge caching, geographic distribution
28
- - **Hughes** (FMA) — documentation: runbook writing, infrastructure diagrams, onboarding docs
29
- - **Calcifer** (Ghibli) — energy: resource efficiency, idle scaling, sleep/wake optimization
30
- - **Duo** (Gundam) — CI/CD: GitHub Actions, pipeline design, automated testing in deploy
27
+ - **Valkyrie** (`subagent_type: valkyrie-recovery`) — disaster recovery: failover, data center redundancy, RTO/RPO
28
+ - **Vegeta** (`subagent_type: vegeta-monitoring`) — scaling: horizontal scaling, load balancing, auto-scaling policies
29
+ - **Trunks** (`subagent_type: trunks-rollback`) — migration: database migration strategy, zero-downtime schema changes
30
+ - **Mikasa** (`subagent_type: mikasa-protection`) — security hardening: SSH config, fail2ban, unattended upgrades
31
+ - **Erwin** (`subagent_type: erwin-strategy`) — strategy: multi-environment management, staging/production parity
32
+ - **Mustang** (`subagent_type: mustang-cleanup`) — orchestration: Docker Compose, container networking, service discovery
33
+ - **Olivier** (`subagent_type: olivier-hardening`) — cold region: CDN configuration, edge caching, geographic distribution
34
+ - **Hughes** (`subagent_type: hughes-observability`) — documentation: runbook writing, infrastructure diagrams, onboarding docs
35
+ - **Calcifer** (`subagent_type: calcifer-daemon`) — energy: resource efficiency, idle scaling, sleep/wake optimization
36
+ - **Duo** (`subagent_type: duo-teardown`) — CI/CD: GitHub Actions, pipeline design, automated testing in deploy
31
37
 
32
38
  ## Deploy Target Branching
33
39
 
@@ -9,17 +9,23 @@ The Gauntlet tests everything. Every domain. Multiple rounds. Escalating intensi
9
9
  2. Read `/logs/build-state.md` — what was built, what phases completed
10
10
  3. Read `/docs/PRD.md` — the source of truth for what the project should be
11
11
 
12
+ ## Dynamic Dispatch (ADR-044)
13
+
14
+ Opus scans `git diff --stat` and matches changed files against the `description` fields of all 263 agents in `.claude/agents/`. Matching specialists launch alongside the core agents below.
15
+
16
+ **Dispatch control:** `--light` skips dynamic dispatch (core only). `--solo` runs lead agent only.
17
+
12
18
  ## Round 1 — Discovery (parallel)
13
19
 
14
20
  **Thanos:** "Before I test, I must understand."
15
21
 
16
22
  Use the Agent tool to run all five in parallel — these are read-only analysis:
17
23
 
18
- - **Agent 1 (PicardArchitecture):** Schema review, service boundaries, dependency graph, scaling assessment. Read the full `/architect` protocol but produce findings only (no ADRs — this is review, not design).
19
- - **Agent 2 (StarkCode Review):** Pattern compliance, logic errors, type safety, cross-module data flow tracing. Read `/review` protocol. One pass across all source files.
20
- - **Agent 3 (GaladrielUX Surface Map):** Product surface map, usability walkthrough (Step 1.5), Éowyn's enchantment scan (Step 1.75). No fixes yet — discovery only.
21
- - **Agent 4 (KenobiAttack Surface Inventory):** List all endpoints, WebSocket handlers, file I/O, credential access points, user input parsing. Classify each by risk tier. No deep audit yet — just the map.
22
- - **Agent 5 (KusanagiInfrastructure Discovery):** Scan deploy scripts, generated configs, provisioning scripts, CI/CD templates. Classify each by risk: hardcoded credentials, open ports, missing auth on generated services. No deep audit yet — just the map.
24
+ - **Agent 1** `subagent_type: picard-architecture` — Schema review, service boundaries, dependency graph, scaling assessment. Read the full `/architect` protocol but produce findings only (no ADRs — this is review, not design).
25
+ - **Agent 2** `subagent_type: stark-backend` — Pattern compliance, logic errors, type safety, cross-module data flow tracing. Read `/review` protocol. One pass across all source files.
26
+ - **Agent 3** `subagent_type: galadriel-frontend` — Product surface map, usability walkthrough (Step 1.5), Éowyn's enchantment scan (Step 1.75). No fixes yet — discovery only.
27
+ - **Agent 4** `subagent_type: kenobi-security` — List all endpoints, WebSocket handlers, file I/O, credential access points, user input parsing. Classify each by risk tier. No deep audit yet — just the map.
28
+ - **Agent 5** `subagent_type: kusanagi-devops` — Scan deploy scripts, generated configs, provisioning scripts, CI/CD templates. Classify each by risk: hardcoded credentials, open ports, missing auth on generated services. No deep audit yet — just the map.
23
29
 
24
30
  Synthesize all five into a unified findings list. Log to `/logs/gauntlet-round-1.md`.
25
31
 
@@ -29,10 +35,10 @@ Synthesize all five into a unified findings list. Log to `/logs/gauntlet-round-1
29
35
 
30
36
  Use the Agent tool to run all four in parallel — full domain audits:
31
37
 
32
- - **Agent 1 (BatmanFull QA):** Run the complete `/qa` protocol. Oracle + Red Hood + Alfred + Deathstroke + Constantine + Nightwing + Lucius. Every edge case, every error state, every boundary.
33
- - **Agent 2 (GaladrielFull UX):** Run the complete `/ux` protocol. Elrond + Arwen + Samwise + Bilbo + Legolas + Gimli + Radagast + Éowyn. Usability, visual, a11y, copy, performance, edge cases, enchantment.
34
- - **Agent 3 (KenobiFull Security):** Run the complete `/security` protocol. Leia + Chewie + Rex + Maul parallel scans, then Yoda → Windu → Ahsoka → Padmé sequential audits.
35
- - **Agent 4 (StarkIntegration Tracing):** For every API endpoint, trace the full data path: client request → validation → service → database → response. For every file upload, trace: upload → storage → retrieval → display. For every credential, trace: entry → vault → usage → cleanup.
38
+ - **Agent 1** `subagent_type: batman-qa` — Run the complete `/qa` protocol. Oracle + Red Hood + Alfred + Deathstroke + Constantine + Nightwing + Lucius. Every edge case, every error state, every boundary.
39
+ - **Agent 2** `subagent_type: galadriel-frontend` — Run the complete `/ux` protocol. Elrond + Arwen + Samwise + Bilbo + Legolas + Gimli + Radagast + Éowyn. Usability, visual, a11y, copy, performance, edge cases, enchantment.
40
+ - **Agent 3** `subagent_type: kenobi-security` — Run the complete `/security` protocol. Leia + Chewie + Rex + Maul parallel scans, then Yoda → Windu → Ahsoka → Padmé sequential audits.
41
+ - **Agent 4** `subagent_type: stark-backend` — For every API endpoint, trace the full data path: client request → validation → service → database → response. For every file upload, trace: upload → storage → retrieval → display. For every credential, trace: entry → vault → usage → cleanup.
36
42
 
37
43
  Merge all findings. Deduplicate across domains.
38
44
 
@@ -55,10 +61,10 @@ This catches runtime bugs invisible to static analysis: IPv6 binding, native mod
55
61
 
56
62
  Use the Agent tool to run all four in parallel — targeted re-verification:
57
63
 
58
- - **Agent 1 (BatmanRe-probe):** Nightwing re-runs the test suite. Red Hood re-probes fixed areas. Deathstroke tests new boundaries created by the fixes. Focus on regressions.
59
- - **Agent 2 (GaladrielError States + Re-verify):** Samwise re-audits a11y on all modified components. Radagast re-checks edge cases on fixed flows. Bilbo re-checks microcopy on any changed UI.
60
- - **Agent 3 (Kenobi — Re-probe + Access Control):** Maul re-probes all remediated vulnerabilities. Ahsoka verifies access control across every role boundary. Padmé verifies the primary user flow still works (critical path smoke test).
61
- - **Agent 4 (KusanagiDevOps):** Run the complete `/devops` protocol with full team: Senku (provisioning), Levi (deploy), Spike (networking), L (monitoring), Bulma (backup), Holo (cost), Valkyrie (disaster recovery). Deploy scripts, monitoring, backups, health checks, page weight gate, security headers.
64
+ - **Agent 1** `subagent_type: batman-qa` — Nightwing re-runs the test suite. Red Hood re-probes fixed areas. Deathstroke tests new boundaries created by the fixes. Focus on regressions.
65
+ - **Agent 2** `subagent_type: galadriel-frontend` — Samwise re-audits a11y on all modified components. Radagast re-checks edge cases on fixed flows. Bilbo re-checks microcopy on any changed UI.
66
+ - **Agent 3** `subagent_type: kenobi-security` Maul re-probes all remediated vulnerabilities. Ahsoka verifies access control across every role boundary. Padmé verifies the primary user flow still works (critical path smoke test).
67
+ - **Agent 4** `subagent_type: kusanagi-devops` — Run the complete `/devops` protocol with full team: Senku (provisioning), Levi (deploy), Spike (networking), L (monitoring), Bulma (backup), Holo (cost), Valkyrie (disaster recovery). Deploy scripts, monitoring, backups, health checks, page weight gate, security headers.
62
68
 
63
69
  **→ FIX BATCH 2:** Fix remaining findings.
64
70
 
@@ -68,11 +74,11 @@ Use the Agent tool to run all four in parallel — targeted re-verification:
68
74
 
69
75
  Use the Agent tool to run all five in parallel — pure adversarial:
70
76
 
71
- - **Maul** (Star Wars) — Attacks code that passed /review. Looks for exploits in "clean" code.
72
- - **Deathstroke** (DC) — Probes endpoints that /security hardened. Tests if remediations can be bypassed.
73
- - **Loki** (Marvel) — Chaos-tests features that /qa cleared. What breaks under unexpected conditions?
74
- - **Constantine** (DC) — Hunts cursed code in FIXED areas specifically. Code that only works by accident.
75
- - **Éowyn** (Tolkien) — Final enchantment pass on the polished, hardened product. Where can delight still be added without compromising security or stability?
77
+ - `subagent_type: maul-red-team` — Attacks code that passed /review. Looks for exploits in "clean" code.
78
+ - `subagent_type: deathstroke-adversarial` — Probes endpoints that /security hardened. Tests if remediations can be bypassed.
79
+ - `subagent_type: loki-chaos` — Chaos-tests features that /qa cleared. What breaks under unexpected conditions?
80
+ - `subagent_type: constantine-cursed-code` — Hunts cursed code in FIXED areas specifically. Code that only works by accident.
81
+ - `subagent_type: eowyn-delight` — Final enchantment pass on the polished, hardened product. Where can delight still be added without compromising security or stability?
76
82
 
77
83
  **→ FIX BATCH 3:** Fix all adversarial findings. If any fix is applied, re-run the affected adversarial agent on the fixed area only.
78
84
 
@@ -82,12 +88,12 @@ Use the Agent tool to run all five in parallel — pure adversarial:
82
88
 
83
89
  Use the Agent tool to run all six in parallel:
84
90
 
85
- - **Spock** (Star Trek) — Did any QA/security/UX fix break code patterns or quality?
86
- - **Ahsoka** (Star Wars) — Did any fix introduce access control gaps?
87
- - **Nightwing** (DC) — Full regression: run the entire test suite. Any failures?
88
- - **Samwise** (Tolkien) — Final accessibility audit on all modified components.
89
- - **Padmé** (Star Wars) — Critical path functional verification. Open the app, complete the main task, verify output.
90
- - **Troi** (Star Trek) — PRD compliance: read the PRD prose section-by-section, verify every claim against the implementation. Numeric claims, visual treatments, copy accuracy.
91
+ - `subagent_type: spock-schema` — Did any QA/security/UX fix break code patterns or quality?
92
+ - `subagent_type: ahsoka-access-control` — Did any fix introduce access control gaps?
93
+ - `subagent_type: nightwing-regression` — Full regression: run the entire test suite. Any failures?
94
+ - `subagent_type: samwise-accessibility` — Final accessibility audit on all modified components.
95
+ - `subagent_type: padme-data-protection` — Critical path functional verification. Open the app, complete the main task, verify output.
96
+ - `subagent_type: troi-prd-compliance` — PRD compliance: read the PRD prose section-by-section, verify every claim against the implementation. Numeric claims, visual treatments, copy accuracy.
91
97
 
92
98
  If the Council finds issues:
93
99
  1. Fix code discrepancies. Flag asset requirements as BLOCKED.
@@ -111,17 +117,22 @@ Present the final summary:
111
117
  **If findings remain:**
112
118
  Present them with severity and recommendation. The user decides whether to ship or iterate.
113
119
 
114
- ## Arguments
115
- - No arguments → full 5-round gauntlet
120
+ ## Arguments (ADR-043: Max by Default)
121
+
122
+ Default is now maximum intensity (was `--infinity`). Flags opt out.
123
+
124
+ - No arguments → 10-round Infinity Gauntlet with full roster (~60-80 agent launches). **ENFORCEMENT: Must launch Agent tool sub-processes. Inline analysis is not a Gauntlet.**
116
125
  - `--fast` → 3 rounds only (skip Round 4 Crossfire + Round 5 Council). (formerly `--quick` — renamed v17.3 for cross-command consistency)
126
+ - `--light` → 5-round standard gauntlet with core agents only (pre-ADR-043 default behavior)
117
127
  - `--security-only` → 4 rounds of security only (Kenobi marathon)
118
128
  - `--ux-only` → 4 rounds of UX only (Galadriel marathon)
119
129
  - `--qa-only` → 4 rounds of QA only (Batman marathon)
120
130
  - `--resume` → resume from last completed round (reads gauntlet state from logs)
121
131
  - `--ux-extra` → Extra Éowyn enchantment emphasis across all rounds. Galadriel's team proposes micro-animations, copy improvements, and delight moments beyond standard usability/a11y.
122
- - `--assess` → **Pre-build assessment.** Rounds 1-2 only (Discovery + First Strike), no fix batches. Produces assessment report grouped by root cause. For evaluating existing codebases before a rebuild or migration — not for post-build hardening. See also `/assess` command which chains this with architecture review and PRD gap analysis.
123
- - `--infinity` → **The Infinity Gauntlet.** 10 rounds (2x full pass). Every active agent deployed as its own dedicated sub-process not combined, not summarized. ~60-80 agent launches across all 9 universes. The full ~110 active roster called off the bench. See GAUNTLET.md "The Infinity Gauntlet" section for the complete wave structure. Use after completing a major version or before first production ship.
124
- - `--muster` → Synonym for `--infinity`. The Gauntlet already deploys the full roster at maximum intensity — `--muster` is the universal flag name for the same concept. **ENFORCEMENT: Must launch Agent tool sub-processes. Inline analysis is not a Muster.**
132
+ - `--assess` → **Pre-build assessment.** Rounds 1-2 only (Discovery + First Strike), no fix batches. Produces assessment report grouped by root cause.
133
+ - `--solo` → Lead agent per domain only, no sub-agents (quick spot-check).
134
+ - `--infinity` → **Retired (no-op).** Default is now maximum intensity.
135
+ - `--muster` → **Retired (no-op).** Default is now full roster.
125
136
 
126
137
  ## Operating Rules
127
138
  - Update `/logs/gauntlet-state.md` after EVERY round
@@ -3,6 +3,8 @@
3
3
  Read `/docs/methods/GROWTH_STRATEGIST.md` for operating rules.
4
4
 
5
5
  ## Prerequisites
6
+
7
+ ### System Requirements
6
8
  If `packages/voidforge/wizard/server.ts` does not exist and the mode requires it (default 6-phase, `--setup`, `--distribute`):
7
9
  1. Offer: "Phases 4-6 require the wizard server for ad platform APIs, treasury, and autonomous monitoring. Pull it from upstream? [Y/n] (Phases 1-3 work without it.)"
8
10
  2. On yes: `git fetch voidforge main 2>/dev/null || git remote add voidforge https://github.com/tmcleod3/voidforge.git && git fetch voidforge main` then `git checkout voidforge/main -- packages/voidforge/` then `npm install`. Proceed with all 6 phases.
@@ -11,6 +13,18 @@ If `packages/voidforge/wizard/server.ts` does not exist and the mode requires it
11
13
  If `packages/voidforge/wizard/server.ts` does not exist and the mode does NOT require it (`--audit-only`, `--seo`, `--content`):
12
14
  - Skip the wizard gate entirely. These modes run Phases 1-3 only — no wizard dependency.
13
15
 
16
+ ### External Accounts & API Keys (Phases 4-6)
17
+ **Required for paid acquisition (Phase 4+):**
18
+ - **Google Ads:** Google Ads account + OAuth credentials (client ID, client secret, developer token). [Create account](https://ads.google.com) → Apply for API access via Google Ads API Center.
19
+ - **Meta Ads (optional):** Meta Business account + App with `ads_management` permission. [Create account](https://business.facebook.com) → Create app in Meta Developer portal.
20
+ - **Revenue tracking:** Stripe or Paddle account with API keys for revenue attribution.
21
+
22
+ **Required for treasury (Phase 5+):**
23
+ - Run `/cultivation install` first — sets up the heartbeat daemon and financial vault.
24
+ - Financial vault password (12+ chars) — set during cultivation install.
25
+
26
+ **Not required for Phases 1-3** (`--audit-only`): SEO audit, content strategy, and foundation work need no external accounts.
27
+
14
28
  ## Arguments
15
29
  - No arguments → run/resume the 6-phase growth protocol
16
30
  - `--setup` → Ad platform onboarding only (interactive credential setup for Google/Meta/LinkedIn/Twitter/Reddit). See GROWTH_STRATEGIST.md "Ad Platform Setup" section. Does NOT require a deployed product.
@@ -5,16 +5,17 @@
5
5
  Read `/docs/methods/TREASURY.md` for financial operating rules.
6
6
 
7
7
  ## Prerequisites
8
- If `packages/voidforge/wizard/server.ts` does not exist (scaffold/core users):
8
+ If `packages/voidforge/wizard/server.ts` does not exist (methodology-only install):
9
9
  1. Offer: "Portfolio requires the wizard server. Pull it from upstream? [Y/n]"
10
10
  2. On yes: `git fetch voidforge main 2>/dev/null || git remote add voidforge https://github.com/tmcleod3/voidforge.git && git fetch voidforge main` then `git checkout voidforge/main -- packages/voidforge/` then `npm install`
11
11
  3. On no: stop with "Run manually: `git checkout voidforge/main -- packages/voidforge/`"
12
12
 
13
13
  ## Context Setup
14
14
  1. Read `~/.voidforge/projects.json` for registered projects
15
- 2. For each project: read treasury data from `~/.voidforge/treasury/`
16
- 3. If no projects registered: "No projects registered. Run `/treasury setup` in a project directory."
17
- 4. If single project: show treasury view with note about portfolio comparisons
15
+ 2. For each project: read treasury data from `{project}/cultivation/treasury/` (per-project paths, v22.0+)
16
+ 3. Use `readTreasurySummary()` which reads the O(1) `treasury-summary.json` cache (v22.1+)
17
+ 4. If no projects registered: "No projects registered. Run `/treasury setup` in a project directory."
18
+ 5. If single project: show treasury view with note about portfolio comparisons
18
19
 
19
20
  ## Portfolio Dashboard
20
21
 
@@ -2,6 +2,14 @@
2
2
 
3
3
  **AGENT DEPLOYMENT IS MANDATORY.** Step 3 specifies parallel agent launches via the Agent tool. You MUST launch Oracle, Red Hood, Alfred, Deathstroke, Constantine, Cyborg, Raven, Wonder Woman, Batgirl, and Aquaman as separate sub-processes — do NOT shortcut to inline analysis. (Field report #68)
4
4
 
5
+ ## Dynamic Dispatch (ADR-044)
6
+
7
+ Opus scans `git diff --stat` and matches changed files against the `description` fields of all 263 agents in `.claude/agents/`. Matching specialists launch alongside the core agents below.
8
+
9
+ **Dispatch control:** `--light` skips dynamic dispatch (core only). `--solo` runs lead agent only.
10
+
11
+ **Promoted agent:** **Constantine** `subagent_type: constantine-cursed-code` runs on every `/qa` final pass — finds code that works by accident.
12
+
5
13
  ## Context Setup
6
14
  1. Read `/logs/build-state.md` — understand current project state
7
15
  2. Read `/docs/methods/QA_ENGINEER.md`
@@ -13,22 +21,22 @@
13
21
  2. Create `/logs/phase-09-qa-audit.md` (or appropriate phase log)
14
22
 
15
23
  ## Step 1 — Attack Plan
16
- **Green Lantern** generates the test matrix first — what inputs × what states × what conditions should be tested. Then assign targets:
17
- - **Oracle (static):** Critical flows, missing awaits, null checks, type mismatches, race conditions
18
- - **Red Hood (dynamic):** Empty/huge/unicode inputs, network failures, malformed JSON, rapid clicking
19
- - **Alfred (deps):** `npm audit`, outdated libs, deprecated APIs, version conflicts
20
- - **Lucius (config):** .env completeness, secrets not in git, prod vs dev mismatches
21
- - **Deathstroke (adversarial):** Penetration-style probing — bypass validations, chain interactions, exploit business logic
22
- - **Constantine (cursed code):** Unreachable branches, dead state, impossible conditions, logic that works by accident
23
- - **Cyborg (integration):** When 3+ modules connect, trace the full data path across boundaries. Missing imports, inconsistent response shapes, broken cross-module flows.
24
- - **Raven (deep analysis):** Bugs hidden beneath 3 layers of abstraction — follows data through transforms, closures, callbacks. Logic correct per function, wrong in composition.
25
- - **Wonder Woman (truth):** Code that says one thing and does another misleading names, wrong comments, stale docs, functions that don't match their behavior.
24
+ **Green Lantern** `subagent_type: green-lantern-scenarios` generates the test matrix first — what inputs x what states x what conditions should be tested. Then assign targets:
25
+ - **Oracle** `subagent_type: oracle-static-analysis` Static: critical flows, missing awaits, null checks, type mismatches, race conditions.
26
+ - **Red Hood** `subagent_type: red-hood-aggressive` — Dynamic: empty/huge/unicode inputs, network failures, malformed JSON, rapid clicking.
27
+ - **Alfred** `subagent_type: alfred-dependencies` — Dependencies: `npm audit`, outdated libs, deprecated APIs, version conflicts.
28
+ - **Lucius** `subagent_type: lucius-config` — Config: .env completeness, secrets not in git, prod vs dev mismatches.
29
+ - **Deathstroke** `subagent_type: deathstroke-adversarial`Adversarial: bypass validations, chain interactions, exploit business logic.
30
+ - **Constantine** `subagent_type: constantine-cursed-code` — Cursed code: unreachable branches, dead state, impossible conditions, accidental correctness.
31
+ - **Cyborg** `subagent_type: cyborg-system-integration` Integration: trace full data path across 3+ module boundaries, inconsistent response shapes.
32
+ - **Raven** `subagent_type: raven-deep-analysis` — Deep analysis: bugs hidden beneath 3 layers of abstraction, logic correct per function but wrong in composition.
33
+ - **Wonder Woman** `subagent_type: wonder-woman-truth` Truth: code that says one thing and does another, misleading names, stale docs.
26
34
 
27
35
  ## Step 2 — Baseline
28
36
  Get the project running. Verify manually: app starts, primary flow works, auth works (if applicable), data persists, error states display.
29
37
 
30
- ## Step 2.5 — Smoke Tests (**Flash** speed-runs these)
31
- After build + restart, **Flash** parallelizes curl commands against the running server for each new or modified feature:
38
+ ## Step 2.5 — Smoke Tests
39
+ After build + restart, **Flash** `subagent_type: flash-rapid-test` parallelizes curl commands against the running server for each new or modified feature:
32
40
  - **Primary user flow:** Execute via curl/fetch against localhost — verify the end-to-end path works
33
41
  - **File uploads:** Upload a file, then fetch the returned URL and verify HTTP 200 + correct content-type
34
42
  - **Form submissions:** Submit valid data (verify 200), then submit invalid/duplicate data (verify error message is specific, not generic)
@@ -39,20 +47,20 @@ This catches integration failures that static code review misses. If the server
39
47
 
40
48
  ## Step 3 — Pass 1: Find Bugs (parallel analysis)
41
49
  Use the Agent tool to run these in parallel — these are read-only analysis tasks:
42
- - **Agent 1 (Oracle):** Scan /src/lib/ and /src/app/ for logic flaws, missing awaits, unsafe assumptions
43
- - **Agent 2 (Red Hood):** Test all API endpoints with malformed inputs, empty bodies, missing auth
44
- - **Agent 3 (Alfred):** Run `npm audit`, check package.json for deprecated/vulnerable packages
45
- - **Agent 4 (Deathstroke):** Adversarial probing bypass validations, chain unexpected interactions, test authorization boundaries
46
- - **Agent 5 (Constantine):** Hunt cursed code dead branches, impossible conditions, accidental correctness, shadowed variables
47
- - **Agent 6 (Batgirl):** Deep per-module audit every edge of every form, every boundary of every validation, every regex. Not broad *thorough*.
48
- - **Agent 7 (Aquaman):** Deep dive on the hardest/largest module (500+ lines or 10+ functions). Exhaustive testing of one complex area.
50
+ - **Agent 1** `subagent_type: oracle-static-analysis` — Scan /src/lib/ and /src/app/ for logic flaws, missing awaits, unsafe assumptions.
51
+ - **Agent 2** `subagent_type: red-hood-aggressive` Test all API endpoints with malformed inputs, empty bodies, missing auth.
52
+ - **Agent 3** `subagent_type: alfred-dependencies` — Run `npm audit`, check package.json for deprecated/vulnerable packages.
53
+ - **Agent 4** `subagent_type: deathstroke-adversarial` — Adversarial probing: bypass validations, chain unexpected interactions, test authorization boundaries.
54
+ - **Agent 5** `subagent_type: constantine-cursed-code` — Hunt cursed code: dead branches, impossible conditions, accidental correctness, shadowed variables.
55
+ - **Agent 6** `subagent_type: batgirl-detail` — Deep per-module audit: every edge of every form, every boundary of every validation, every regex. Not broad -- *thorough*.
56
+ - **Agent 7** `subagent_type: aquaman-deep-dive` — Deep dive on the hardest/largest module (500+ lines or 10+ functions). Exhaustive testing of one complex area.
49
57
 
50
58
  Synthesize findings from all agents into a unified list.
51
59
 
52
- Lucius reviews config separately (reads .env files sensitive, don't delegate to sub-agent).
60
+ **Lucius** `subagent_type: lucius-config` reviews config separately (reads .env files -- sensitive, don't delegate to sub-agent).
53
61
 
54
62
  ## Step 3.5 — Automated Tests
55
- Run `npm test`. Analyze failures. Cross-reference with findings from Step 3. **Huntress** identifies flaky/non-deterministic tests — race conditions, timing dependencies, order-dependent assertions. For every bug found, ask: "Can this be caught by an automated test?" If yes, write the test.
63
+ Run `npm test`. Analyze failures. Cross-reference with findings from Step 3. **Huntress** `subagent_type: huntress-flaky-bugs` identifies flaky/non-deterministic tests — race conditions, timing dependencies, order-dependent assertions. For every bug found, ask: "Can this be caught by an automated test?" If yes, write the test.
56
64
 
57
65
  ## Step 4 — Bug Tracker
58
66
  Log all findings in this format in the phase log:
@@ -64,26 +72,26 @@ Severity: Critical (security/data loss) > High (broken flow) > Medium (degraded)
64
72
 
65
73
  **Confidence scoring is mandatory.** Every finding includes a confidence score (0-100). If confidence is below 60, launch a second agent from a different universe (e.g., if Oracle found it, escalate to Spock or Kenobi) to verify before including. If the second agent disagrees, drop the finding. High-confidence findings (90+) skip re-verification in Step 6.5.
66
74
 
67
- ## Step 5 — Fix (small batches — **Green Arrow** pinpoints exact lines)
68
- One batch = fixes for one area or severity level. **Green Arrow** narrows vague findings to exact lines and conditions. After each batch:
75
+ ## Step 5 — Fix (small batches)
76
+ One batch = fixes for one area or severity level. **Green Arrow** `subagent_type: green-arrow-precision` narrows vague findings to exact lines and conditions. After each batch:
69
77
  1. Re-run `npm test`
70
78
  2. Re-verify affected manual flows
71
79
  3. Update bug tracker in phase log
72
80
  4. Add new test for each fix where applicable
73
81
 
74
- ## Step 6 — Harden (**Superman** enforces standards)
75
- Normalize error handling (reference `/docs/patterns/error-handling.ts`). Add guardrails. Improve structured logging. **Superman** verifies the codebase meets its own stated standards — linting clean, type-safe, naming conventions consistent, no unresolved TODOs.
82
+ ## Step 6 — Harden
83
+ Normalize error handling (reference `/docs/patterns/error-handling.ts`). Add guardrails. Improve structured logging. **Superman** `subagent_type: superman-strength-test` verifies the codebase meets its own stated standards — linting clean, type-safe, naming conventions consistent, no unresolved TODOs.
76
84
 
77
85
  ## Step 6.5 — Pass 2: Re-Verify Fixes
78
86
  After all fixes are applied, run a verification pass:
79
- - **Nightwing** re-runs full test suite, reports any new failures
80
- - **Red Hood** re-probes fixed areas — verify fixes hold under adversarial input
81
- - **Deathstroke** re-tests authorization boundaries and business logic exploits that were remediated
87
+ - **Nightwing** `subagent_type: nightwing-regression` re-runs full test suite, reports any new failures
88
+ - **Red Hood** `subagent_type: red-hood-aggressive` re-probes fixed areas — verify fixes hold under adversarial input
89
+ - **Deathstroke** `subagent_type: deathstroke-adversarial` re-tests authorization boundaries and business logic exploits that were remediated
82
90
 
83
91
  If Pass 2 finds new issues, fix and re-verify until clean.
84
92
 
85
93
  ## Step 7 — Regression Checklist
86
- Nightwing builds the checklist. Template:
94
+ **Nightwing** `subagent_type: nightwing-regression` builds the checklist. Template:
87
95
 
88
96
  | # | Flow | Steps | Expected | Status |
89
97
  |---|------|-------|----------|--------|
@@ -2,6 +2,12 @@
2
2
 
3
3
  > Pattern compliance, code quality, and maintainability review. Picard-affiliated (Star Trek).
4
4
 
5
+ ## Dynamic Dispatch (ADR-044)
6
+
7
+ Opus scans `git diff --stat` and matches changed files against the `description` fields of all 263 agents in `.claude/agents/`. Matching specialists launch alongside the core agents below.
8
+
9
+ **Dispatch control:** `--light` skips dynamic dispatch (core only). `--solo` runs lead agent only.
10
+
5
11
  ## Context Setup
6
12
  1. Read `/logs/build-state.md` — understand current project state
7
13
  2. Read the relevant pattern files from `/docs/patterns/` for the code being reviewed
@@ -17,75 +23,38 @@ List all files in scope and their types (API route, service, component, middlewa
17
23
 
18
24
  ## Agent Deployment Manifest
19
25
 
20
- **Lead:** Picard (Star Trek) — architecture lens, final arbiter
26
+ **Lead:** `subagent_type: picard-architecture` — architecture lens, final arbiter
21
27
  **Core team (always deployed):**
22
- - **Spock** — pattern compliance + integration tracing
23
- - **Seven** — code quality, dead code, complexity
24
- - **Data** — maintainability, error paths, state flow
28
+ - `subagent_type: spock-schema` — pattern compliance + integration tracing
29
+ - `subagent_type: seven-optimization` — code quality, dead code, complexity
30
+ - `subagent_type: data-tech-debt` — maintainability, error paths, state flow
25
31
 
26
32
  **Stark's Marvel team (deployed on backend-heavy reviews):**
27
- - **Rogers** — API design: HTTP semantics, consistent response shapes, REST conventions
28
- - **Banner** — database: query patterns, N+1, missing indexes, schema concerns
29
- - **Strange** — service architecture: separation of concerns, business logic placement
30
- - **Barton** — error handling: try/catch completeness, error propagation, user-facing messages
31
- - **Romanoff** — security implications in reviewed code (lightweight — flags for Kenobi, doesn't audit)
32
- - **Thor** — performance: unnecessary re-renders, expensive computations, missing memoization
33
- - **Wanda** — state management: store design, prop drilling, context boundaries
34
- - **T'Challa** — API integration: external service calls, retry logic, fallback behavior
33
+ - `subagent_type: rogers-api-design` — API design: HTTP semantics, response shapes, REST conventions
34
+ - `subagent_type: banner-database` — database: query patterns, N+1, missing indexes
35
+ - `subagent_type: strange-service-arch` — service architecture: separation of concerns, logic placement
36
+ - `subagent_type: barton-smoke-test` — error handling: try/catch completeness, error propagation
37
+ - `subagent_type: romanoff-integrations` — security implications (lightweight — flags for Kenobi)
38
+ - `subagent_type: thor-queues` — performance: re-renders, expensive computations, memoization
39
+ - `subagent_type: wanda-state` — state management: store design, prop drilling, context boundaries
40
+ - `subagent_type: tchalla-quality` — API integration: external service calls, retry logic, fallback
35
41
 
36
42
  **Cross-domain agents (deployed based on content):**
37
- - **Nightwing** (DC) — auth flow end-to-end: when auth code is in scope, trace signup→verify→login→protected→logout
38
- - **Bilbo** (Tolkien) — copy audit: error messages, UI text, API response descriptions — are they clear and human?
39
- - **Troi** (Star Trek) — PRD compliance: does the code match what the PRD describes?
40
- - **Constantine** (DC) — cursed code: logic that works by accident, tautological checks, shadowed vars
41
- - **Samwise** (Tolkien) — a11y spot-check: when components are in scope, check keyboard nav and ARIA
43
+ - `subagent_type: nightwing-regression` — auth flow end-to-end: signup→verify→login→protected→logout
44
+ - `subagent_type: bilbo-microcopy` — copy audit: error messages, UI text, API descriptions
45
+ - `subagent_type: troi-prd-compliance` — PRD compliance: does the code match what the PRD describes?
46
+ - `subagent_type: constantine-cursed-code` — cursed code: accidental correctness, tautological checks, shadowed vars
47
+ - `subagent_type: samwise-accessibility` — a11y spot-check: keyboard nav and ARIA
42
48
 
43
49
  ## Step 1 — Parallel Analysis
44
50
  Use the Agent tool to run these in parallel — all are read-only analysis:
45
51
 
46
- **Agent 1 (Spock — Pattern Compliance + Integration Tracing):**
47
- For each file, check against its matching pattern in `/docs/patterns/`:
48
- - API routes follow `api-route.ts` — validate auth service respond
49
- - Services follow `service.ts` — business logic not in routes, ownership checks, typed errors
50
- - Components follow `component.tsx` — all four states, keyboard accessible
51
- - Middleware follows `middleware.ts` — auth, logging, rate limiting
52
- - Error handling follows `error-handling.ts` — consistent types, no leaked internals
53
- - Queues follow `job-queue.ts` — idempotent, retry, dead letter
54
- - Multi-tenant follows `multi-tenant.ts` — workspace scoped, role-based
55
-
56
- **INTEGRATION TRACING (mandatory):** When reviewed code generates URLs, references other API endpoints, constructs storage keys, or produces data consumed by other modules — you MUST read the consuming code to verify compatibility. Examples:
57
- - File uploaded with key prefix `avatars/` → read the asset proxy to verify it serves that prefix
58
- - API returns error `{ code: "CONFLICT" }` → read the UI that calls this API to verify it displays the error
59
- - Middleware sets header `x-request-id` → read a sample API route to verify it can access the header
60
- - Service generates a URL → read the route/proxy that handles that URL pattern
61
-
62
- **Agent 2 (Seven — Code Quality):**
63
- - Unnecessary complexity (can this be simpler?)
64
- - Dead code, unused imports, unreachable branches
65
- - Duplicated logic that should be extracted
66
- - Inconsistent naming or style
67
- - Missing TypeScript types or `any` usage
68
- - Functions doing too many things (SRP violations)
69
-
70
- **Agent 3 (Data — Maintainability + Error Paths + State Flow):**
71
- - Wrong abstractions (over-engineered or under-abstracted)
72
- - Coupling between modules that should be independent
73
- - Missing error handling at system boundaries
74
- - Hardcoded values that should be config
75
- - Missing or misleading comments on non-obvious logic
76
-
77
- **Agent 4 (Rogers + Banner + Strange — Backend Review, if backend code in scope):**
78
- - Rogers: API endpoints follow REST conventions, consistent response shapes, proper HTTP status codes
79
- - Banner: database queries are efficient (no N+1), indexes exist for query patterns, schema is normalized
80
- - Strange: business logic is in services not routes, separation of concerns is clean, no god functions
81
-
82
- **Agent 5 (Nightwing + Constantine — Cross-Domain, if auth or complex logic in scope):**
83
- - Nightwing: if auth code changed, trace the full signup→verify→login→protected→logout flow
84
- - Constantine: scan fixed/refactored areas for logic that only works by coincidence
85
-
86
- **Agent 6 (Bilbo + Troi — Copy + PRD, if UI or user-facing code in scope):**
87
- - Bilbo: error messages are clear and human, not generic "Something went wrong"
88
- - Troi: implementation matches PRD descriptions (not just "route exists" but "renders what PRD says")
52
+ - **Agent 1** `subagent_type: spock-schema` — Pattern compliance: check each file against its matching pattern in `/docs/patterns/` (api-route, service, component, middleware, error-handling, job-queue, multi-tenant). **INTEGRATION TRACING (mandatory):** When reviewed code generates URLs, references endpoints, constructs storage keys, or produces data consumed by other modules — read the consuming code to verify compatibility.
53
+ - **Agent 2** `subagent_type: seven-optimization` — Code quality: unnecessary complexity, dead code, unused imports, duplicated logic, inconsistent naming, missing types/`any` usage, SRP violations.
54
+ - **Agent 3** `subagent_type: data-tech-debt` — Maintainability + error paths + state flow: wrong abstractions, module coupling, missing boundary error handling, hardcoded values, misleading comments.
55
+ - **Agent 4** `subagent_type: rogers-api-design` + `banner-database` + `strange-service-arch` — Backend review (if backend code in scope): REST conventions, response shapes, N+1 queries, indexes, separation of concerns.
56
+ - **Agent 5** `subagent_type: nightwing-regression` + `constantine-cursed-code` Cross-domain (if auth or complex logic in scope): auth flow tracing, accidental correctness detection.
57
+ - **Agent 6** `subagent_type: bilbo-microcopy` + `troi-prd-compliance` Copy + PRD (if UI or user-facing code in scope): clear error messages, PRD compliance verification.
89
58
 
90
59
  **ROUTE COLLISION CHECK (mandatory for web apps):** When a new router/route file is added, list ALL registered routes (method + path) across ALL routers. Check for duplicate method+path combinations. Frameworks like FastAPI silently shadow duplicate routes — the first registered wins.
91
60
 
@@ -132,8 +101,8 @@ Fix "Must Fix" and "Should Fix" items. After each batch:
132
101
 
133
102
  ## Step 3.5 — Re-Verify Fixes
134
103
  After fixes are applied:
135
- - **Spock** re-checks pattern compliance on modified files
136
- - **Seven** confirms no new complexity or dead code introduced by fixes
104
+ - **Spock** `subagent_type: spock-schema` re-checks pattern compliance on modified files
105
+ - **Seven** `subagent_type: seven-optimization` confirms no new complexity or dead code introduced by fixes
137
106
 
138
107
  If new issues found, fix and re-verify.
139
108
 
@@ -2,6 +2,12 @@
2
2
 
3
3
  **AGENT DEPLOYMENT IS MANDATORY.** Phase 1 specifies parallel agent launches via the Agent tool. You MUST launch Leia, Chewie, Rex+Bo-Katan, and Maul as separate sub-processes. Phase 2 agents (Yoda, Windu, Ahsoka, Padmé, Qui-Gon) run sequentially but each MUST be a separate agent invocation. Do NOT shortcut to inline analysis. (Field report #68)
4
4
 
5
+ ## Dynamic Dispatch (ADR-044)
6
+
7
+ Opus scans `git diff --stat` and matches changed files against the `description` fields of all 263 agents in `.claude/agents/`. Matching specialists launch alongside the core agents below.
8
+
9
+ **Dispatch control:** `--light` skips dynamic dispatch (core only). `--solo` runs lead agent only.
10
+
5
11
  ## Context Setup
6
12
  1. Read `/logs/build-state.md` — understand current project state
7
13
  2. Read `/docs/methods/SECURITY_AUDITOR.md`
@@ -9,59 +15,28 @@
9
15
 
10
16
  ## Audit Sequence
11
17
 
12
- ### Phase 0.5 — First Strike (**Han** + **Cassian**)
18
+ ### Phase 0.5 — First Strike
13
19
  Before the deep audits, two agents do fast recon:
14
- - **Han (First Strike):** Quick OWASP top 10 scan finds the obvious vulnerabilities that shouldn't require deep analysis. Shoots first.
15
- - **Cassian (Intelligence):** Threat modeling and attack surface mapping — maps all endpoints, identifies high-value targets, produces the threat model that guides the rest of the audit.
20
+ - **Han** `subagent_type: han-vuln-hunter` Quick OWASP top 10 scan: finds the obvious vulnerabilities that shouldn't require deep analysis. Shoots first.
21
+ - **Cassian** `subagent_type: cassian-recon` — Threat modeling and attack surface mapping: all endpoints, high-value targets, threat model that guides the rest of the audit.
16
22
 
17
23
  ### Phase 1 — Independent audits (parallel analysis)
18
24
  Use the Agent tool to run these simultaneously — all are read-only analysis:
19
- - **Agent 1 (Leia — Secrets):** Scan source code for hardcoded secrets, check .env is gitignored, check git history for leaked keys (`git log -p --all -S 'password' -S 'secret' -S 'api_key'`), verify different secrets dev/prod
20
- - **Agent 2 (Chewie — Dependencies):** Run `npm audit`, check for critical/high vulns, verify lock file committed, check for deprecated packages
21
- - **Agent 3 (Rex + Bo-Katan — Infrastructure + Perimeter):** Check security headers (HSTS, CSP, X-Frame-Options, CORS), verify TLS config, check for exposed ports/debug endpoints. **Bo-Katan** focuses on network perimeter: firewall rules, exposed ports, CORS policy enforcement.
22
- - **Agent 4 (Maul — Red Team):** For each endpoint and flow, ask: "How would I exploit this?" Chain vulnerabilities. Test trust boundaries. Attempt privilege escalation. **RUNTIME EXPLOITATION (mandatory):** When the server is running, Maul must execute actual attack requests via curl/fetch not just theorize. Upload a file then fetch the URL. Submit conflicting data. Send requests with stolen/expired tokens. If the server isn't running, document what couldn't be runtime-tested.
25
+ - **Agent 1** `subagent_type: leia-secrets` — Secrets: scan for hardcoded secrets, verify .env gitignored, check git history for leaked keys, verify different secrets dev/prod.
26
+ - **Agent 2** `subagent_type: chewie-dependency-audit` — Dependencies: `npm audit`, critical/high vulns, lock file committed, deprecated packages.
27
+ - **Agent 3** `subagent_type: rex-infrastructure` + `bo-katan-perimeter` — Infrastructure + perimeter: security headers (HSTS, CSP, X-Frame-Options, CORS), TLS config, exposed ports/debug endpoints, firewall rules, CORS enforcement.
28
+ - **Agent 4** `subagent_type: maul-red-team` — Red team: exploit each endpoint/flow, chain vulnerabilities, test trust boundaries, attempt privilege escalation. **RUNTIME EXPLOITATION (mandatory):** Execute actual attack requests via curl/fetch -- not just theorize.
23
29
 
24
30
  ### Phase 2 — Sequential audits (depend on understanding the codebase)
25
31
  These require full codebase context — run sequentially:
26
32
 
27
- **Yoda — Auth:**
28
- - Password hashing (bcrypt >= 12 rounds, no plaintext anywhere)
29
- - Session management (crypto random, httpOnly/secure/sameSite, invalidated on logout)
30
- - OAuth (state param, redirect whitelist, server-side exchange)
31
- - Reset tokens (single-use, expire, rate limited)
32
- - Reference `/docs/patterns/middleware.ts` for auth middleware patterns
33
-
34
- **Windu — Input:**
35
- - SQL injection (parameterized queries everywhere)
36
- - XSS (escaped output, no dangerouslySetInnerHTML without sanitization, CSP)
37
- - SSRF (URL allowlist if user provides URLs)
38
- - Command injection (no user input in shell commands)
39
- - Path traversal (sanitized filenames)
40
-
41
- **Ahsoka — Access Control:**
42
- - Every endpoint verifies ownership (no IDOR)
43
- - UUIDs not sequential IDs in URLs
44
- - Admin verified server-side (not just hidden UI)
45
- - Tier features verified server-side
46
- - Rate limiting per-user and per-IP
47
- - Reference `/docs/patterns/multi-tenant.ts` if multi-tenant
48
- - **AUTH CHAIN TRACING (mandatory):** Don't just verify each endpoint checks auth — trace the full chain: Is the auth middleware actually applied to this route? Is the user/tenant context carried from middleware → service → DB query? Are there routes that SHOULD have auth middleware but don't? Read the middleware registration and verify every protected route is covered.
49
-
50
- **Padme — Data:**
51
- - PII identified and cataloged
52
- - PII not in logs, error messages, or URLs
53
- - Deletion possible (GDPR right to erasure)
54
- - Backups encrypted
55
-
56
- **Qui-Gon — Subtle Vulnerabilities** (after sequential audits):
57
- - Timing-based attacks, race conditions in auth flows, logic errors that are technically correct but exploitable
58
- - The vulnerabilities that pass every standard check
59
-
60
- **Sabine — Unconventional** (conditional — if project has external dependencies):
61
- - Supply chain attacks, dependency confusion, prototype pollution, CSP bypass via CDN
62
-
63
- **Bail Organa — Governance** (conditional — if project has regulatory requirements):
64
- - GDPR data handling, SOC2 controls, HIPAA mapping
33
+ - **Yoda** `subagent_type: yoda-auth` — Auth: password hashing (bcrypt >= 12 rounds), session management (httpOnly/secure/sameSite), OAuth (state param, redirect whitelist), reset tokens (single-use, expiring, rate limited). Reference `/docs/patterns/middleware.ts`.
34
+ - **Windu** `subagent_type: windu-input-validation` — Input: SQL injection (parameterized queries), XSS (escaped output, CSP), SSRF (URL allowlist), command injection, path traversal.
35
+ - **Ahsoka** `subagent_type: ahsoka-access-control` — Access control: IDOR checks, UUIDs not sequential IDs, server-side admin/tier verification, rate limiting. **AUTH CHAIN TRACING (mandatory):** Trace the full chain from middleware registration through service to DB query. Reference `/docs/patterns/multi-tenant.ts`.
36
+ - **Padme** `subagent_type: padme-data-protection` — Data protection: PII catalog, PII not in logs/errors/URLs, GDPR deletion, encrypted backups.
37
+ - **Qui-Gon** `subagent_type: qui-gon-subtle-vulns` — Subtle vulnerabilities: timing attacks, race conditions in auth flows, logic errors that pass standard checks.
38
+ - **Sabine** `subagent_type: sabine-unconventional` (conditional) Unconventional: supply chain attacks, dependency confusion, prototype pollution, CSP bypass via CDN.
39
+ - **Bail Organa** `subagent_type: bail-organa-governance` — (conditional) Governance: GDPR data handling, SOC2 controls, HIPAA mapping.
65
40
 
66
41
  ### Phase 3 — Remediate
67
42
  Write all findings to `/logs/phase-11-security-audit.md` (or appropriate phase log):
@@ -79,11 +54,11 @@ Fix critical and high findings immediately. Medium findings get tracked. For eac
79
54
  3. Check it didn't break anything (`npm test`)
80
55
  4. Update the finding status in the log
81
56
 
82
- ### Phase 4 — Re-Verification (Maul + Anakin + Din Djarin)
57
+ ### Phase 4 — Re-Verification
83
58
  After remediations are applied:
84
- - **Maul** re-probes all remediated vulnerabilities — verify fixes hold under adversarial conditions. Execute actual HTTP requests against the running server.
85
- - **Anakin** attempts to bypass remediations using dark-side techniques — JWT algorithm confusion, auth library edge cases, prototype pollution, framework misuse.
86
- - **Din Djarin** bounty-hunts for anything Maul and Anakin missed — post-remediation sweep with Mandalorian tenacity.
59
+ - **Maul** `subagent_type: maul-red-team` re-probes all remediated vulnerabilities — verify fixes hold under adversarial conditions. Execute actual HTTP requests against the running server.
60
+ - **Anakin** `subagent_type: anakin-dark-side` attempts to bypass remediations using dark-side techniques — JWT algorithm confusion, auth library edge cases, prototype pollution, framework misuse.
61
+ - **Din Djarin** `subagent_type: din-djarin-bounty` bounty-hunts for anything Maul and Anakin missed — post-remediation sweep.
87
62
 
88
63
  If any agent finds new issues, fix and re-verify until clean.
89
64