lite-kits 0.1.0__py3-none-any.whl → 0.1.1__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- lite_kits/__init__.py +9 -9
- lite_kits/cli.py +170 -155
- lite_kits/core/__init__.py +13 -0
- lite_kits/core/banner.py +160 -0
- lite_kits/{installer.py → core/installer.py} +47 -27
- lite_kits/core/manifest.py +146 -0
- lite_kits/kits/README.md +9 -10
- lite_kits/kits/dev/README.md +241 -0
- lite_kits/kits/dev/claude/commands/audit.md +143 -0
- lite_kits/kits/dev/claude/commands/cleanup.md +361 -0
- lite_kits/kits/dev/claude/commands/commit.md +612 -0
- lite_kits/kits/dev/claude/commands/orient.md +146 -0
- lite_kits/kits/dev/claude/commands/pr.md +593 -0
- lite_kits/kits/dev/claude/commands/review.md +202 -0
- lite_kits/kits/dev/claude/commands/stats.md +162 -0
- lite_kits/kits/dev/github/prompts/audit.prompt.md +143 -0
- lite_kits/kits/dev/github/prompts/cleanup.prompt.md +382 -0
- lite_kits/kits/dev/github/prompts/commit.prompt.md +591 -0
- lite_kits/kits/dev/github/prompts/orient.prompt.md +150 -0
- lite_kits/kits/dev/github/prompts/pr.prompt.md +603 -0
- lite_kits/kits/dev/github/prompts/review.prompt.md +202 -0
- lite_kits/kits/dev/github/prompts/stats.prompt.md +163 -0
- lite_kits/kits/git/README.md +59 -68
- lite_kits/kits/git/claude/commands/review.md +202 -0
- lite_kits/kits/git/github/prompts/review.prompt.md +202 -0
- lite_kits/kits/kits.yaml +180 -0
- lite_kits/kits/multiagent/README.md +26 -15
- lite_kits/kits/multiagent/memory/pr-workflow-guide.md +1 -7
- lite_kits/kits/project/README.md +6 -22
- lite_kits/kits/project/claude/commands/audit.md +143 -0
- lite_kits/kits/project/claude/commands/orient.md +29 -46
- lite_kits/kits/project/claude/commands/review.md +112 -0
- lite_kits/kits/project/claude/commands/stats.md +162 -0
- lite_kits/kits/project/github/prompts/audit.prompt.md +143 -0
- lite_kits/kits/project/github/prompts/orient.prompt.md +33 -46
- lite_kits/kits/project/github/prompts/review.prompt.md +112 -0
- lite_kits/kits/project/github/prompts/stats.prompt.md +163 -0
- {lite_kits-0.1.0.dist-info → lite_kits-0.1.1.dist-info}/METADATA +98 -66
- lite_kits-0.1.1.dist-info/RECORD +58 -0
- lite_kits-0.1.0.dist-info/RECORD +0 -31
- {lite_kits-0.1.0.dist-info → lite_kits-0.1.1.dist-info}/WHEEL +0 -0
- {lite_kits-0.1.0.dist-info → lite_kits-0.1.1.dist-info}/entry_points.txt +0 -0
- {lite_kits-0.1.0.dist-info → lite_kits-0.1.1.dist-info}/licenses/LICENSE +0 -0
@@ -0,0 +1,241 @@
|
|
1
|
+
# Dev Kit
|
2
|
+
|
3
|
+
**Status**: ✅ Recommended (Default)
|
4
|
+
|
5
|
+
Essential development utilities for solo developers using spec-kit. Combines project management commands with git workflow automation.
|
6
|
+
|
7
|
+
## What It Adds
|
8
|
+
|
9
|
+
### Commands (AI Agents)
|
10
|
+
|
11
|
+
| Command | Claude Code | GitHub Copilot | Description |
|
12
|
+
|---------|-------------|----------------|-------------|
|
13
|
+
| `/orient` | ✅ | ✅ | Agent orientation protocol (most essential!) |
|
14
|
+
| `/commit` | ✅ | ✅ | Smart commit with staging and message generation |
|
15
|
+
| `/pr` | ✅ | ✅ | Pull request creation with auto-push |
|
16
|
+
| `/review` | ✅ | ✅ | Code review helper for staged changes |
|
17
|
+
| `/cleanup` | ✅ | ✅ | Safe branch cleanup (delete merged branches) |
|
18
|
+
| `/audit` | 🚧 | 🚧 | Security & quality audit (coming soon) |
|
19
|
+
| `/stats` | 🚧 | 🚧 | Project statistics (coming soon) |
|
20
|
+
|
21
|
+
✅ = Implemented | 🚧 = Coming Soon
|
22
|
+
|
23
|
+
## Installation
|
24
|
+
|
25
|
+
### As recommended kit (default):
|
26
|
+
```bash
|
27
|
+
lite-kits add --recommended # Installs dev-kit
|
28
|
+
```
|
29
|
+
|
30
|
+
### Individually:
|
31
|
+
```bash
|
32
|
+
lite-kits add --kit dev
|
33
|
+
```
|
34
|
+
|
35
|
+
## What Gets Installed
|
36
|
+
|
37
|
+
```
|
38
|
+
your-project/
|
39
|
+
├── .claude/commands/ # If Claude Code detected
|
40
|
+
│ ├── orient.md # ✅ Essential!
|
41
|
+
│ ├── commit.md # ✅ Smart commits
|
42
|
+
│ ├── pr.md # ✅ PR creation
|
43
|
+
│ ├── review.md # ✅ Code review
|
44
|
+
│ ├── cleanup.md # ✅ Branch cleanup
|
45
|
+
│ ├── audit.md # 🚧 Coming Soon
|
46
|
+
│ └── stats.md # 🚧 Coming Soon
|
47
|
+
└── .github/prompts/ # If GitHub Copilot detected
|
48
|
+
├── orient.prompt.md # ✅ Essential!
|
49
|
+
├── commit.prompt.md # ✅ Smart commits
|
50
|
+
├── pr.prompt.md # ✅ PR creation
|
51
|
+
├── review.prompt.md # ✅ Code review
|
52
|
+
├── cleanup.prompt.md # ✅ Branch cleanup
|
53
|
+
├── audit.prompt.md # 🚧 Coming Soon
|
54
|
+
└── stats.prompt.md # 🚧 Coming Soon
|
55
|
+
```
|
56
|
+
|
57
|
+
**Note**: Vanilla spec-kit files are **never modified** - only new files are added.
|
58
|
+
|
59
|
+
## Commands
|
60
|
+
|
61
|
+
### `/orient` - Agent Orientation ⭐ ESSENTIAL
|
62
|
+
|
63
|
+
**Purpose**: Help AI agents quickly understand project context before starting work.
|
64
|
+
|
65
|
+
**What it does**:
|
66
|
+
1. Detects installed kits
|
67
|
+
2. Determines agent role
|
68
|
+
3. Reads project documentation (`.github/copilot-instructions.md`, `.specify/memory/constitution.md`)
|
69
|
+
4. Checks current git state (branch, recent commits, changes)
|
70
|
+
5. Reviews active spec work
|
71
|
+
6. Outputs concise summary (~150 words max)
|
72
|
+
|
73
|
+
**Example usage**:
|
74
|
+
```
|
75
|
+
/orient
|
76
|
+
|
77
|
+
## Orientation Complete
|
78
|
+
|
79
|
+
**Installed Kits**: dev
|
80
|
+
|
81
|
+
**I am**: claude-sonnet-4.5 @ Claude Code (Primary)
|
82
|
+
**Project**: Lite-kits - Lightweight enhancement kits for spec-driven development
|
83
|
+
**Stack**: Python 3.11+, typer, rich
|
84
|
+
**Branch**: develop
|
85
|
+
**Recent work**: Merged PR #16 (kit refactor)
|
86
|
+
**Uncommitted changes**: 12 files
|
87
|
+
**Active feature**: None
|
88
|
+
**Coordination**: Solo work
|
89
|
+
|
90
|
+
**Next suggested action**: Review uncommitted changes with /review
|
91
|
+
```
|
92
|
+
|
93
|
+
**Why this is essential**: Every AI agent should run `/orient` at the start of each session to get up to speed quickly without wasting tokens.
|
94
|
+
|
95
|
+
---
|
96
|
+
|
97
|
+
### `/commit` - Smart Commit
|
98
|
+
|
99
|
+
**Purpose**: Intelligent commit workflow with staging proposals and message generation.
|
100
|
+
|
101
|
+
**What it does**:
|
102
|
+
- Analyzes unstaged changes
|
103
|
+
- Proposes files to stage
|
104
|
+
- Generates conventional commit message
|
105
|
+
- Shows combined staging + message for approval
|
106
|
+
- Supports multi-commit suggestions for large changesets
|
107
|
+
|
108
|
+
---
|
109
|
+
|
110
|
+
### `/pr` - Pull Request Creation
|
111
|
+
|
112
|
+
**Purpose**: Create pull request with automatic branch push.
|
113
|
+
|
114
|
+
**What it does**:
|
115
|
+
- Checks for existing PR (prevents duplicates)
|
116
|
+
- Pushes current branch to remote
|
117
|
+
- Generates PR description from commits
|
118
|
+
- Creates PR via `gh pr create`
|
119
|
+
- Shows PR URL when complete
|
120
|
+
|
121
|
+
---
|
122
|
+
|
123
|
+
### `/review` - Code Review
|
124
|
+
|
125
|
+
**Purpose**: Review staged changes against project conventions and best practices.
|
126
|
+
|
127
|
+
**What it does**:
|
128
|
+
- Analyzes staged changes (`git diff --staged`)
|
129
|
+
- Checks against constitution principles
|
130
|
+
- Identifies common code smells
|
131
|
+
- Suggests improvements
|
132
|
+
- Verifies test coverage
|
133
|
+
|
134
|
+
---
|
135
|
+
|
136
|
+
### `/cleanup` - Branch Cleanup
|
137
|
+
|
138
|
+
**Purpose**: Safely delete merged branches.
|
139
|
+
|
140
|
+
**What it does**:
|
141
|
+
- Lists merged branches
|
142
|
+
- Excludes current branch, base branches (main/develop)
|
143
|
+
- Confirms before deletion
|
144
|
+
- Optional remote deletion (`--remote` flag)
|
145
|
+
- Protected branch safety
|
146
|
+
|
147
|
+
---
|
148
|
+
|
149
|
+
### `/audit` - Security & Quality Audit (Coming Soon)
|
150
|
+
|
151
|
+
**Purpose**: Scan for security issues and quality problems.
|
152
|
+
|
153
|
+
**Planned features**:
|
154
|
+
- Scan for hardcoded secrets/credentials
|
155
|
+
- Check for common vulnerabilities (SQL injection, XSS, CSRF)
|
156
|
+
- Analyze dependencies for known CVEs
|
157
|
+
- Verify input validation
|
158
|
+
- Check file permissions
|
159
|
+
|
160
|
+
---
|
161
|
+
|
162
|
+
### `/stats` - Project Statistics (Coming Soon)
|
163
|
+
|
164
|
+
**Purpose**: Show project health metrics.
|
165
|
+
|
166
|
+
**Planned features**:
|
167
|
+
- Lines of code by language
|
168
|
+
- Test coverage percentage
|
169
|
+
- Git activity with agent attribution
|
170
|
+
- Complexity metrics
|
171
|
+
- Dependency count
|
172
|
+
- Health score
|
173
|
+
|
174
|
+
---
|
175
|
+
|
176
|
+
## Use Cases
|
177
|
+
|
178
|
+
### Solo Developer with AI Agent
|
179
|
+
**Install**: `lite-kits add --recommended` (includes dev-kit)
|
180
|
+
**Use**: `/orient` at start of every session, `/commit` and `/pr` for git workflow
|
181
|
+
|
182
|
+
### Pair Programming with Claude Code
|
183
|
+
**Install**: `lite-kits add --recommended`
|
184
|
+
**Use**: `/orient` → `/review` → `/commit` → `/pr` workflow
|
185
|
+
|
186
|
+
### Security-Focused Project
|
187
|
+
**Install**: `lite-kits add --kit dev`
|
188
|
+
**Use**: `/audit` regularly for security scans (when implemented)
|
189
|
+
|
190
|
+
---
|
191
|
+
|
192
|
+
## Configuration
|
193
|
+
|
194
|
+
No configuration needed - works out of the box.
|
195
|
+
|
196
|
+
**Optional customization**:
|
197
|
+
- Edit `.github/copilot-instructions.md` - Affects `/orient` output
|
198
|
+
- Edit `.specify/memory/constitution.md` - Project principles for `/review`
|
199
|
+
|
200
|
+
---
|
201
|
+
|
202
|
+
## Dependencies
|
203
|
+
|
204
|
+
**None** - dev-kit is standalone.
|
205
|
+
|
206
|
+
**Optional pairing**: Works great with multiagent-kit for team coordination.
|
207
|
+
|
208
|
+
---
|
209
|
+
|
210
|
+
## Compatibility
|
211
|
+
|
212
|
+
- ✅ **Agents**: Claude Code, GitHub Copilot
|
213
|
+
- ✅ **Platforms**: Linux, macOS, Windows
|
214
|
+
- ✅ **Shells**: Bash, PowerShell
|
215
|
+
- ✅ **Vanilla safe**: Only adds new files, never modifies existing
|
216
|
+
|
217
|
+
---
|
218
|
+
|
219
|
+
## Uninstall
|
220
|
+
|
221
|
+
```bash
|
222
|
+
lite-kits remove --kit dev
|
223
|
+
```
|
224
|
+
|
225
|
+
Removes:
|
226
|
+
- `.claude/commands/{orient,commit,pr,review,cleanup,audit,stats}.md`
|
227
|
+
- `.github/prompts/{orient,commit,pr,review,cleanup,audit,stats}.prompt.md`
|
228
|
+
|
229
|
+
---
|
230
|
+
|
231
|
+
## Future Enhancements
|
232
|
+
|
233
|
+
Considering for dev-kit:
|
234
|
+
- `/docs` - Generate/update documentation
|
235
|
+
- `/history` - Show project timeline
|
236
|
+
- `/dependencies` - Dependency analysis
|
237
|
+
- `/performance` - Performance profiling
|
238
|
+
- `/status` - Optimized git status command
|
239
|
+
- Template library (api, cli, library, frontend feature templates)
|
240
|
+
|
241
|
+
Suggest more in [GitHub Discussions](https://github.com/tmorgan181/lite-kits/discussions).
|
@@ -0,0 +1,143 @@
|
|
1
|
+
---
|
2
|
+
description: Perform security analysis on dependencies and code patterns
|
3
|
+
---
|
4
|
+
|
5
|
+
# Security Audit Helper
|
6
|
+
|
7
|
+
**Purpose**: Quick security analysis for AI agents working on features involving authentication, data handling, or external dependencies.
|
8
|
+
|
9
|
+
## Execution Steps
|
10
|
+
|
11
|
+
Execute the following steps to perform a security audit:
|
12
|
+
|
13
|
+
### 1. Detect Project Type and Dependencies
|
14
|
+
|
15
|
+
```bash
|
16
|
+
# Check for Python dependencies
|
17
|
+
ls requirements.txt pyproject.toml setup.py 2>/dev/null
|
18
|
+
|
19
|
+
# Check for Node.js dependencies
|
20
|
+
ls package.json package-lock.json 2>/dev/null
|
21
|
+
|
22
|
+
# Check for Rust dependencies
|
23
|
+
ls Cargo.toml Cargo.lock 2>/dev/null
|
24
|
+
|
25
|
+
# Check for Go dependencies
|
26
|
+
ls go.mod go.sum 2>/dev/null
|
27
|
+
```
|
28
|
+
|
29
|
+
### 2. Run Dependency Vulnerability Scan
|
30
|
+
|
31
|
+
**Python projects**:
|
32
|
+
```bash
|
33
|
+
# Check if pip-audit is available
|
34
|
+
command -v pip-audit >/dev/null 2>&1
|
35
|
+
|
36
|
+
# If available, run scan
|
37
|
+
pip-audit
|
38
|
+
|
39
|
+
# If not available, suggest installation
|
40
|
+
echo "Install pip-audit: pip install pip-audit"
|
41
|
+
```
|
42
|
+
|
43
|
+
**Node.js projects**:
|
44
|
+
```bash
|
45
|
+
# npm audit is built-in
|
46
|
+
npm audit
|
47
|
+
|
48
|
+
# Or use yarn
|
49
|
+
yarn audit
|
50
|
+
```
|
51
|
+
|
52
|
+
**Other languages**: Suggest appropriate tools (cargo audit, go list, etc.)
|
53
|
+
|
54
|
+
### 3. Scan for Common Security Anti-Patterns
|
55
|
+
|
56
|
+
Check source code for security issues:
|
57
|
+
|
58
|
+
```bash
|
59
|
+
# Look for potential hardcoded secrets
|
60
|
+
grep -r "API_KEY\s*=\s*['\"]" src/ 2>/dev/null | head -5
|
61
|
+
grep -r "PASSWORD\s*=\s*['\"]" src/ 2>/dev/null | head -5
|
62
|
+
grep -r "SECRET\s*=\s*['\"]" src/ 2>/dev/null | head -5
|
63
|
+
|
64
|
+
# Look for weak crypto patterns (Python)
|
65
|
+
grep -r "md5\|sha1" src/ 2>/dev/null | head -5
|
66
|
+
|
67
|
+
# Look for SQL injection risks
|
68
|
+
grep -r "execute.*%\|execute.*+" src/ 2>/dev/null | head -5
|
69
|
+
```
|
70
|
+
|
71
|
+
**Common patterns to flag**:
|
72
|
+
- Hardcoded API keys, passwords, tokens
|
73
|
+
- Weak cryptographic algorithms (MD5, SHA1)
|
74
|
+
- SQL string concatenation
|
75
|
+
- Eval/exec with user input
|
76
|
+
- Insecure file permissions
|
77
|
+
|
78
|
+
### 4. Generate Concise Report
|
79
|
+
|
80
|
+
Provide analysis in this format (~150 words max):
|
81
|
+
|
82
|
+
```markdown
|
83
|
+
## Security Audit
|
84
|
+
|
85
|
+
**Dependencies**: N scanned, M vulnerabilities found
|
86
|
+
|
87
|
+
**Vulnerabilities** (if any):
|
88
|
+
- package-name==version: [SEVERITY] - Brief description
|
89
|
+
- Link to advisory for details
|
90
|
+
|
91
|
+
**Code Patterns** (if any):
|
92
|
+
- file.py:line: [PATTERN] - Recommendation
|
93
|
+
|
94
|
+
**Next Action**: [Fix CVE-XXXX / Update package / Review auth code]
|
95
|
+
```
|
96
|
+
|
97
|
+
## Important Notes
|
98
|
+
|
99
|
+
- **Graceful fallbacks**: If audit tools not installed, do basic pattern checks only
|
100
|
+
- **Be concise**: Target <150 words total output
|
101
|
+
- **Prioritize**: Show highest severity issues first
|
102
|
+
- **Avoid false positives**: Note that manual review may be needed
|
103
|
+
- **No dependencies**: Report "No dependencies to audit" gracefully
|
104
|
+
- **Cross-platform**: Use commands available on Windows, macOS, Linux
|
105
|
+
|
106
|
+
## Edge Cases
|
107
|
+
|
108
|
+
- **No dependency files**: "No dependencies found. This appears to be a dependency-free project."
|
109
|
+
- **Tool not installed**: Provide installation command, run basic grep checks
|
110
|
+
- **No vulnerabilities**: "✅ No known vulnerabilities found! Consider reviewing auth/data handling patterns."
|
111
|
+
- **Too many issues**: Sample top 5, note total count
|
112
|
+
|
113
|
+
## Example Output
|
114
|
+
|
115
|
+
```markdown
|
116
|
+
## Security Audit
|
117
|
+
|
118
|
+
**Dependencies**: 12 scanned, 2 vulnerabilities found
|
119
|
+
|
120
|
+
**Vulnerabilities**:
|
121
|
+
- requests==2.25.0: MEDIUM - CVE-2023-32681 (Proxy-Auth header leak)
|
122
|
+
Update to: requests>=2.31.0
|
123
|
+
|
124
|
+
**Code Patterns**:
|
125
|
+
- src/auth.py:42: Hardcoded API key detected
|
126
|
+
- src/db.py:103: SQL string concatenation (injection risk)
|
127
|
+
|
128
|
+
**Next Action**: Update requests package, move API key to environment variables, use parameterized queries
|
129
|
+
```
|
130
|
+
|
131
|
+
```markdown
|
132
|
+
## Security Audit
|
133
|
+
|
134
|
+
**Dependencies**: pip-audit not installed
|
135
|
+
|
136
|
+
**Tool Not Available**:
|
137
|
+
Install pip-audit for vulnerability scanning:
|
138
|
+
`pip install pip-audit`
|
139
|
+
|
140
|
+
**Code Patterns**: Basic grep checks performed, no obvious issues found
|
141
|
+
|
142
|
+
**Next Action**: Install pip-audit and re-run for comprehensive dependency scan
|
143
|
+
```
|