lite-kits 0.1.0__py3-none-any.whl → 0.3.1__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (48) hide show
  1. lite_kits/__init__.py +61 -9
  2. lite_kits/cli.py +788 -262
  3. lite_kits/core/__init__.py +19 -0
  4. lite_kits/core/banner.py +160 -0
  5. lite_kits/core/conflict_checker.py +115 -0
  6. lite_kits/core/detector.py +140 -0
  7. lite_kits/core/installer.py +322 -0
  8. lite_kits/core/manifest.py +146 -0
  9. lite_kits/core/validator.py +146 -0
  10. lite_kits/kits/README.md +14 -15
  11. lite_kits/kits/dev/README.md +241 -0
  12. lite_kits/kits/dev/commands/.claude/audit.md +143 -0
  13. lite_kits/kits/{git/claude/commands → dev/commands/.claude}/cleanup.md +2 -2
  14. lite_kits/kits/{git/claude/commands → dev/commands/.claude}/commit.md +2 -2
  15. lite_kits/kits/{project/claude/commands → dev/commands/.claude}/orient.md +30 -48
  16. lite_kits/kits/{git/claude/commands → dev/commands/.claude}/pr.md +1 -1
  17. lite_kits/kits/dev/commands/.claude/review.md +202 -0
  18. lite_kits/kits/dev/commands/.claude/stats.md +162 -0
  19. lite_kits/kits/dev/commands/.github/audit.prompt.md +143 -0
  20. lite_kits/kits/{git/github/prompts → dev/commands/.github}/cleanup.prompt.md +2 -2
  21. lite_kits/kits/{git/github/prompts → dev/commands/.github}/commit.prompt.md +2 -2
  22. lite_kits/kits/{project/github/prompts → dev/commands/.github}/orient.prompt.md +34 -48
  23. lite_kits/kits/{git/github/prompts → dev/commands/.github}/pr.prompt.md +1 -1
  24. lite_kits/kits/dev/commands/.github/review.prompt.md +202 -0
  25. lite_kits/kits/dev/commands/.github/stats.prompt.md +163 -0
  26. lite_kits/kits/kits.yaml +497 -0
  27. lite_kits/kits/multiagent/README.md +28 -17
  28. lite_kits/kits/multiagent/{claude/commands → commands/.claude}/sync.md +331 -331
  29. lite_kits/kits/multiagent/{github/prompts → commands/.github}/sync.prompt.md +73 -69
  30. lite_kits/kits/multiagent/memory/git-worktrees-protocol.md +370 -370
  31. lite_kits/kits/multiagent/memory/parallel-work-protocol.md +536 -536
  32. lite_kits/kits/multiagent/memory/pr-workflow-guide.md +275 -281
  33. lite_kits/kits/multiagent/templates/collaboration-structure/README.md +166 -166
  34. lite_kits/kits/multiagent/templates/decision.md +79 -79
  35. lite_kits/kits/multiagent/templates/handoff.md +95 -95
  36. lite_kits/kits/multiagent/templates/session-log.md +68 -68
  37. lite_kits-0.3.1.dist-info/METADATA +259 -0
  38. lite_kits-0.3.1.dist-info/RECORD +41 -0
  39. {lite_kits-0.1.0.dist-info → lite_kits-0.3.1.dist-info}/licenses/LICENSE +21 -21
  40. lite_kits/installer.py +0 -417
  41. lite_kits/kits/git/README.md +0 -374
  42. lite_kits/kits/git/scripts/bash/get-git-context.sh +0 -208
  43. lite_kits/kits/git/scripts/powershell/Get-GitContext.ps1 +0 -242
  44. lite_kits/kits/project/README.md +0 -244
  45. lite_kits-0.1.0.dist-info/METADATA +0 -415
  46. lite_kits-0.1.0.dist-info/RECORD +0 -31
  47. {lite_kits-0.1.0.dist-info → lite_kits-0.3.1.dist-info}/WHEEL +0 -0
  48. {lite_kits-0.1.0.dist-info → lite_kits-0.3.1.dist-info}/entry_points.txt +0 -0
@@ -0,0 +1,202 @@
1
+ ---
2
+ description: Review staged changes against best practices
3
+ ---
4
+
5
+ # Code Review of Staged Changes
6
+
7
+ **Purpose**: Review staged git changes for quality, best practices, and potential issues before committing.
8
+
9
+ ## Execution Steps
10
+
11
+ Execute the following steps to review staged changes:
12
+
13
+ ### 1. Check Staged Files
14
+
15
+ ```bash
16
+ # Get list of staged files with status
17
+ git diff --staged --name-status
18
+ ```
19
+
20
+ **If no files are staged**:
21
+ - Inform user that nothing is staged
22
+ - Suggest running `git add` or `/commit` to stage and commit together
23
+ - Exit gracefully
24
+
25
+ ### 2. Analyze Staged Changes
26
+
27
+ ```bash
28
+ # Get the actual diff with context
29
+ git diff --staged
30
+ ```
31
+
32
+ ### 3. Review Changes
33
+
34
+ Analyze the diff output for:
35
+
36
+ **✅ Good Practices to Acknowledge**:
37
+ - Clear, descriptive function/variable names
38
+ - Appropriate comments where needed
39
+ - Consistent formatting
40
+ - Type hints (Python) or type annotations
41
+ - Test coverage for new code
42
+ - Error handling
43
+ - Input validation
44
+
45
+ **⚠️ Issues to Flag**:
46
+ - **Security**:
47
+ - Hardcoded credentials or API keys
48
+ - SQL injection vulnerabilities
49
+ - XSS vulnerabilities
50
+ - Unsafe deserialization
51
+ - Missing authentication/authorization checks
52
+
53
+ - **Code Quality**:
54
+ - TODOs or FIXMEs (should be tracked in issues)
55
+ - Commented-out code blocks
56
+ - Magic numbers without explanation
57
+ - Overly complex functions (>50 lines)
58
+ - Duplicate code patterns
59
+ - Inconsistent naming conventions
60
+
61
+ - **Best Practices**:
62
+ - Missing error handling
63
+ - No logging for important operations
64
+ - Hardcoded configuration values
65
+ - Missing input validation
66
+ - Unused imports or variables
67
+ - Missing docstrings for public APIs
68
+
69
+ ### 4. Present Review Results
70
+
71
+ Format output as follows:
72
+
73
+ ```
74
+ ## Code Review Results
75
+
76
+ **Staged files**: [count]
77
+ [list files with status: A=added, M=modified, D=deleted]
78
+
79
+ **Summary of changes**:
80
+ [brief description of what's being changed]
81
+
82
+ ===========================================================
83
+ **✅ Good Practices Found:**
84
+ ===========================================================
85
+
86
+ [List positive findings, grouped by file]
87
+ - [file]: [specific good practice observed]
88
+
89
+ ===========================================================
90
+ **⚠️ Suggestions for Improvement:**
91
+ ===========================================================
92
+
93
+ [List issues/suggestions, grouped by file with line numbers if possible]
94
+ - [file]:[line]: [specific issue and suggested fix]
95
+
96
+ ===========================================================
97
+ **🔒 Security Check:**
98
+ ===========================================================
99
+
100
+ [Report any security concerns or confirm none found]
101
+ - ✓ No hardcoded credentials detected
102
+ - ✓ No obvious security vulnerabilities
103
+ - ⚠ [Any security concerns]
104
+
105
+ ===========================================================
106
+ **📊 Overall Assessment:**
107
+ ===========================================================
108
+
109
+ [One of: "Ready to commit", "Ready with minor suggestions", "Needs changes"]
110
+
111
+ [Brief summary of overall code quality]
112
+
113
+ **Recommendation**: [Approve / Address suggestions / Do not commit]
114
+ ```
115
+
116
+ ### 5. Handle User Response
117
+
118
+ After presenting results, wait for user action. They may:
119
+ - Proceed with commit anyway
120
+ - Make changes and re-review
121
+ - Cancel the review
122
+
123
+ ## Example Output
124
+
125
+ ```
126
+ ## Code Review Results
127
+
128
+ **Staged files**: 3
129
+ - A src/auth.py (new file)
130
+ - M src/models.py (modified)
131
+ - A tests/test_auth.py (new file)
132
+
133
+ **Summary of changes**:
134
+ Adding user authentication system with bcrypt password hashing
135
+ and JWT token generation.
136
+
137
+ ===========================================================
138
+ **✅ Good Practices Found:**
139
+ ===========================================================
140
+
141
+ - src/auth.py: Clear function names (hash_password, verify_password)
142
+ - src/auth.py: Type hints used throughout
143
+ - src/auth.py: Comprehensive docstrings for all functions
144
+ - src/models.py: Proper SQLAlchemy relationship definitions
145
+ - tests/test_auth.py: Good test coverage with fixtures
146
+
147
+ ===========================================================
148
+ **⚠️ Suggestions for Improvement:**
149
+ ===========================================================
150
+
151
+ - src/auth.py:45: Consider extracting hash_password to utils module
152
+ Current: Function in auth.py
153
+ Suggest: Move to src/utils/crypto.py for reusability
154
+
155
+ - src/models.py:12: TODO comment present
156
+ Line: "# TODO: Add password reset functionality"
157
+ Suggest: Create GitHub issue and reference it in comment
158
+
159
+ - tests/test_auth.py:67: Missing edge case test
160
+ Suggest: Add test for empty password input
161
+
162
+ - src/auth.py:23: Magic number for token expiration
163
+ Current: expires_delta = timedelta(hours=24)
164
+ Suggest: Move to config file or environment variable
165
+
166
+ ===========================================================
167
+ **🔒 Security Check:**
168
+ ===========================================================
169
+
170
+ ✓ No hardcoded credentials detected
171
+ ✓ Using bcrypt for password hashing (good choice!)
172
+ ✓ JWT tokens generated securely
173
+ ⚠ Consider adding rate limiting to prevent brute force attacks
174
+
175
+ ===========================================================
176
+ **📊 Overall Assessment:**
177
+ ===========================================================
178
+
179
+ **Status**: Ready with minor suggestions
180
+
181
+ The code follows good practices with proper type hints, docstrings,
182
+ and test coverage. The suggestions above are minor improvements that
183
+ can be addressed now or in future iterations.
184
+
185
+ **Recommendation**: Approve and commit - suggestions are non-blocking
186
+ ```
187
+
188
+ ## Important Notes
189
+
190
+ - This command is **read-only** - it never modifies files
191
+ - Focus on **actionable feedback** - be specific about what to change
192
+ - Be **encouraging** - acknowledge good practices
193
+ - **Security first** - always check for security issues
194
+ - Keep review **concise** - don't overwhelm with minor issues
195
+ - **Respect the agent's work** - balance critique with acknowledgment
196
+
197
+ ## Integration with Other Commands
198
+
199
+ - Run `/review` before `/commit` to catch issues early
200
+ - Use after making changes and staging them with `git add`
201
+ - Combine with `/pr` workflow - review before creating PR
202
+ - Works great in multi-agent workflows (one agent reviews another's work)
@@ -0,0 +1,162 @@
1
+ ---
2
+ description: Generate concise project metrics for AI agent orientation
3
+ ---
4
+
5
+ # Project Statistics
6
+
7
+ **Purpose**: Provide quick project overview metrics for AI agents joining a project or assessing scope.
8
+
9
+ ## Execution Steps
10
+
11
+ Execute the following steps to gather project statistics:
12
+
13
+ ### 1. Count Lines of Code
14
+
15
+ **Preferred method** (if tokei installed):
16
+ ```bash
17
+ # Check if tokei is available
18
+ command -v tokei >/dev/null 2>&1
19
+
20
+ # If available, use tokei for fast, accurate counts
21
+ tokei --output json
22
+ ```
23
+
24
+ **Fallback method** (if tokei not available):
25
+ ```bash
26
+ # Python
27
+ find . -name "*.py" -type f | xargs wc -l 2>/dev/null | tail -1
28
+
29
+ # JavaScript/TypeScript
30
+ find . -name "*.js" -o -name "*.ts" | xargs wc -l 2>/dev/null | tail -1
31
+
32
+ # Markdown
33
+ find . -name "*.md" -type f | xargs wc -l 2>/dev/null | tail -1
34
+
35
+ # All files combined
36
+ find . -type f -not -path "*/\.*" | xargs wc -l 2>/dev/null | tail -1
37
+ ```
38
+
39
+ ### 2. Count Files and Directories
40
+
41
+ ```bash
42
+ # Count files (excluding hidden)
43
+ find . -type f -not -path "*/\.*" | wc -l
44
+
45
+ # Count directories (excluding hidden)
46
+ find . -type d -not -path "*/\.*" | wc -l
47
+ ```
48
+
49
+ ### 3. Get Git History Summary
50
+
51
+ ```bash
52
+ # Total commits
53
+ git log --oneline | wc -l
54
+
55
+ # Contributor count
56
+ git log --format='%aN' | sort -u | wc -l
57
+
58
+ # Recent activity
59
+ git log --oneline -5
60
+ ```
61
+
62
+ If not a git repository, skip this section.
63
+
64
+ ### 4. Check for Test Coverage
65
+
66
+ Look for common coverage report files:
67
+ ```bash
68
+ # Python coverage files
69
+ ls .coverage coverage.xml htmlcov/ 2>/dev/null
70
+
71
+ # JavaScript coverage
72
+ ls coverage/ .nyc_output/ 2>/dev/null
73
+
74
+ # If coverage files exist, try to extract percentage
75
+ # Python: coverage report | grep TOTAL
76
+ # JavaScript: cat coverage/coverage-summary.json
77
+ ```
78
+
79
+ ### 5. Generate Concise Table Output
80
+
81
+ Provide stats in this format (~20 lines max):
82
+
83
+ ```markdown
84
+ ## Project Statistics
85
+
86
+ **Code**:
87
+ - Language1: X,XXX LOC (NN%)
88
+ - Language2: XXX LOC (NN%)
89
+ - Language3: XX LOC (NN%)
90
+
91
+ **Structure**:
92
+ - NN files, NN directories
93
+ - NNN commits, N contributors
94
+
95
+ **Testing**:
96
+ - Coverage: NN% (or N/A)
97
+ - Tests: NN files (or N/A)
98
+
99
+ **Next Action**: [Explore src/ / Review tests / Check docs]
100
+ ```
101
+
102
+ ## Important Notes
103
+
104
+ - **Be concise**: Keep output under 20 lines
105
+ - **Use tables**: Well-formatted markdown tables or lists
106
+ - **Handle missing tools**:
107
+ - No tokei → Use find/wc fallback, note "Basic LOC count"
108
+ - Not a git repo → Skip git section, note "No git history"
109
+ - No coverage → Show "N/A" gracefully
110
+
111
+ - **Percentages**: Calculate language percentages from total LOC
112
+ - **Large repos**: If >100k LOC, note "Large project" and consider sampling
113
+ - **Speed**: Target <5 second execution time
114
+
115
+ ## Edge Cases
116
+
117
+ - **No git repository**: Skip git section, show file/LOC stats only
118
+ - **No test coverage reports**: Show "Coverage: N/A"
119
+ - **Tokei not installed**: Use find/wc fallback, note in output
120
+ - **Very large repo (1M+ LOC)**: Sample or provide high-level summary only
121
+ - **No code files**: "Appears to be a documentation-only or data project"
122
+
123
+ ## Example Output
124
+
125
+ ```markdown
126
+ ## Project Statistics
127
+
128
+ **Code**:
129
+ - Python: 2,453 LOC (87%)
130
+ - Markdown: 342 LOC (12%)
131
+ - YAML: 28 LOC (1%)
132
+ - Total: 2,823 LOC
133
+
134
+ **Structure**:
135
+ - 45 files, 12 directories
136
+ - 127 commits, 3 contributors
137
+
138
+ **Testing**:
139
+ - Coverage: 78% (via pytest-cov)
140
+ - Tests: 23 test files
141
+
142
+ **Next Action**: Explore src/ directory to understand core modules
143
+ ```
144
+
145
+ ```markdown
146
+ ## Project Statistics
147
+
148
+ **Code** (tokei not available, using basic count):
149
+ - Python: ~1,200 lines
150
+ - Markdown: ~400 lines
151
+ - Total: ~1,600 lines (approximate)
152
+
153
+ **Structure**:
154
+ - 32 files, 8 directories
155
+ - Not a git repository
156
+
157
+ **Testing**:
158
+ - Coverage: N/A
159
+ - Tests: N/A
160
+
161
+ **Next Action**: Check if this is a standalone library or tool
162
+ ```
@@ -0,0 +1,143 @@
1
+ ---
2
+ description: Perform security analysis on dependencies and code patterns
3
+ ---
4
+
5
+ # Security Audit Helper
6
+
7
+ **Purpose**: Quick security analysis for AI agents working on features involving authentication, data handling, or external dependencies.
8
+
9
+ ## Execution Steps
10
+
11
+ Execute the following steps to perform a security audit:
12
+
13
+ ### 1. Detect Project Type and Dependencies
14
+
15
+ ```powershell
16
+ # Check for Python dependencies
17
+ Get-ChildItem -Path . -Include requirements.txt,pyproject.toml,setup.py -Recurse -ErrorAction SilentlyContinue
18
+
19
+ # Check for Node.js dependencies
20
+ Get-ChildItem -Path . -Include package.json,package-lock.json -Recurse -ErrorAction SilentlyContinue
21
+
22
+ # Check for Rust dependencies
23
+ Get-ChildItem -Path . -Include Cargo.toml,Cargo.lock -Recurse -ErrorAction SilentlyContinue
24
+
25
+ # Check for Go dependencies
26
+ Get-ChildItem -Path . -Include go.mod,go.sum -Recurse -ErrorAction SilentlyContinue
27
+ ```
28
+
29
+ ### 2. Run Dependency Vulnerability Scan
30
+
31
+ **Python projects**:
32
+ ```powershell
33
+ # Check if pip-audit is available
34
+ Get-Command pip-audit -ErrorAction SilentlyContinue
35
+
36
+ # If available, run scan
37
+ pip-audit
38
+
39
+ # If not available, suggest installation
40
+ Write-Host "Install pip-audit: pip install pip-audit"
41
+ ```
42
+
43
+ **Node.js projects**:
44
+ ```powershell
45
+ # npm audit is built-in
46
+ npm audit
47
+
48
+ # Or use yarn
49
+ yarn audit
50
+ ```
51
+
52
+ **Other languages**: Suggest appropriate tools (cargo audit, go list, etc.)
53
+
54
+ ### 3. Scan for Common Security Anti-Patterns
55
+
56
+ Check source code for security issues:
57
+
58
+ ```powershell
59
+ # Look for potential hardcoded secrets
60
+ Select-String -Path src\* -Pattern "API_KEY\s*=\s*['""]" -Recurse | Select-Object -First 5
61
+ Select-String -Path src\* -Pattern "PASSWORD\s*=\s*['""]" -Recurse | Select-Object -First 5
62
+ Select-String -Path src\* -Pattern "SECRET\s*=\s*['""]" -Recurse | Select-Object -First 5
63
+
64
+ # Look for weak crypto patterns (Python)
65
+ Select-String -Path src\* -Pattern "md5|sha1" -Recurse | Select-Object -First 5
66
+
67
+ # Look for SQL injection risks
68
+ Select-String -Path src\* -Pattern "execute.*%|execute.*\+" -Recurse | Select-Object -First 5
69
+ ```
70
+
71
+ **Common patterns to flag**:
72
+ - Hardcoded API keys, passwords, tokens
73
+ - Weak cryptographic algorithms (MD5, SHA1)
74
+ - SQL string concatenation
75
+ - Eval/exec with user input
76
+ - Insecure file permissions
77
+
78
+ ### 4. Generate Concise Report
79
+
80
+ Provide analysis in this format (~150 words max):
81
+
82
+ ```markdown
83
+ ## Security Audit
84
+
85
+ **Dependencies**: N scanned, M vulnerabilities found
86
+
87
+ **Vulnerabilities** (if any):
88
+ - package-name==version: [SEVERITY] - Brief description
89
+ - Link to advisory for details
90
+
91
+ **Code Patterns** (if any):
92
+ - file.py:line: [PATTERN] - Recommendation
93
+
94
+ **Next Action**: [Fix CVE-XXXX / Update package / Review auth code]
95
+ ```
96
+
97
+ ## Important Notes
98
+
99
+ - **Graceful fallbacks**: If audit tools not installed, do basic pattern checks only
100
+ - **Be concise**: Target <150 words total output
101
+ - **Prioritize**: Show highest severity issues first
102
+ - **Avoid false positives**: Note that manual review may be needed
103
+ - **No dependencies**: Report "No dependencies to audit" gracefully
104
+ - **Cross-platform**: Use commands available on Windows, macOS, Linux
105
+
106
+ ## Edge Cases
107
+
108
+ - **No dependency files**: "No dependencies found. This appears to be a dependency-free project."
109
+ - **Tool not installed**: Provide installation command, run basic grep checks
110
+ - **No vulnerabilities**: "✅ No known vulnerabilities found! Consider reviewing auth/data handling patterns."
111
+ - **Too many issues**: Sample top 5, note total count
112
+
113
+ ## Example Output
114
+
115
+ ```markdown
116
+ ## Security Audit
117
+
118
+ **Dependencies**: 12 scanned, 2 vulnerabilities found
119
+
120
+ **Vulnerabilities**:
121
+ - requests==2.25.0: MEDIUM - CVE-2023-32681 (Proxy-Auth header leak)
122
+ Update to: requests>=2.31.0
123
+
124
+ **Code Patterns**:
125
+ - src/auth.py:42: Hardcoded API key detected
126
+ - src/db.py:103: SQL string concatenation (injection risk)
127
+
128
+ **Next Action**: Update requests package, move API key to environment variables, use parameterized queries
129
+ ```
130
+
131
+ ```markdown
132
+ ## Security Audit
133
+
134
+ **Dependencies**: pip-audit not installed
135
+
136
+ **Tool Not Available**:
137
+ Install pip-audit for vulnerability scanning:
138
+ `pip install pip-audit`
139
+
140
+ **Code Patterns**: Basic grep checks performed, no obvious issues found
141
+
142
+ **Next Action**: Install pip-audit and re-run for comprehensive dependency scan
143
+ ```
@@ -318,13 +318,13 @@ dev/004-cleanup-command
318
318
  > git branch --merged develop
319
319
  dev/001-starter-kits
320
320
  dev/002-installer-polish
321
- dev/003-git-kit-enhancements
321
+ dev/003-dev-kit-enhancements
322
322
 
323
323
  # Agent presents options
324
324
  Merged branches available for cleanup:
325
325
  1. dev/001-starter-kits (2 days ago)
326
326
  2. dev/002-installer-polish (1 day ago)
327
- 3. dev/003-git-kit-enhancements (2 hours ago)
327
+ 3. dev/003-dev-kit-enhancements (2 hours ago)
328
328
 
329
329
  Delete which branches? (y/n/e): e
330
330
 
@@ -240,7 +240,7 @@ Message:
240
240
  9. ?? docs/new-guide.md
241
241
 
242
242
  Message:
243
- docs(004): update documentation for git-kit
243
+ docs(004): update documentation for dev-kit
244
244
 
245
245
  Added git workflow documentation and updated README
246
246
  with new command examples.
@@ -254,7 +254,7 @@ Message:
254
254
  Message:
255
255
  chore(004): update implementation status tracking
256
256
 
257
- Marked git-kit as complete in status docs.
257
+ Marked dev-kit as complete in status docs.
258
258
 
259
259
  ---
260
260
 
@@ -15,19 +15,11 @@ Execute the following steps to gather orientation information:
15
15
  Check for kit marker files to determine what's installed:
16
16
 
17
17
  ```powershell
18
- # Initialize kit detection variables
19
- $PROJECT_KIT = $false
20
- $GIT_KIT = $false
21
- $MULTIAGENT_KIT = $false
22
-
23
- # Check for project-kit markers
24
- if (Test-Path .github/prompts/review.prompt.md) { $PROJECT_KIT = $true }
25
-
26
- # Check for git-kit markers
27
- if (Test-Path .github/prompts/commit.prompt.md) { $GIT_KIT = $true }
28
-
29
- # Check for multiagent-kit markers
30
- if (Test-Path .specify/memory/pr-workflow-guide.md) { $MULTIAGENT_KIT = $true }
18
+ # Check all kits in one efficient operation
19
+ $KITS_INSTALLED = @()
20
+ if (Test-Path .github/prompts/orient.prompt.md) { $KITS_INSTALLED += "dev" }
21
+ if (Test-Path .specify/memory/pr-workflow-guide.md) { $KITS_INSTALLED += "multiagent" }
22
+ $KITS_LIST = if ($KITS_INSTALLED.Count -gt 0) { $KITS_INSTALLED -join ", " } else { "vanilla only" }
31
23
  ```
32
24
 
33
25
  ### 2. Determine Agent Role
@@ -58,17 +50,12 @@ Extract:
58
50
  ### 4. Check Git State
59
51
 
60
52
  ```powershell
61
- # Current branch
62
- git branch --show-current
63
-
64
- # Recent commits (last 5)
65
- git log --oneline -5
66
-
67
- # Uncommitted changes
68
- git status --short
69
-
70
- # Untracked files count
71
- (git ls-files --others --exclude-standard).Count
53
+ # Efficient single-command git status check
54
+ # Get branch, recent commits, and changes in one go
55
+ $CURRENT_BRANCH = git branch --show-current 2>$null
56
+ if (-not $CURRENT_BRANCH) { $CURRENT_BRANCH = "not in git repo" }
57
+ $RECENT_COMMITS = (git log --oneline -3 2>$null | Select-Object -First 1)
58
+ $CHANGES = (git status --short 2>$null | Measure-Object).Count
72
59
  ```
73
60
 
74
61
  ### 5. Check Active Work
@@ -76,29 +63,28 @@ git status --short
76
63
  Look for active feature work:
77
64
 
78
65
  ```powershell
79
- # List specs directories
80
- Get-ChildItem -Path specs -Directory -ErrorAction SilentlyContinue | Select-Object -Last 3 -ExpandProperty Name
81
-
82
- # Check for current spec/plan/tasks
83
- $CURRENT_BRANCH = git branch --show-current
84
- if ($CURRENT_BRANCH -match '^\d+') {
85
- $SPEC_DIR = "specs/$CURRENT_BRANCH"
86
- if (Test-Path "$SPEC_DIR/spec.md") { Write-Host "✓ Spec exists" }
87
- if (Test-Path "$SPEC_DIR/plan.md") { Write-Host "✓ Plan exists" }
88
- if (Test-Path "$SPEC_DIR/tasks.md") { Write-Host "✓ Tasks exist" }
66
+ # Check if current branch matches a spec directory
67
+ if ($CURRENT_BRANCH -match '^\d+' -or $CURRENT_BRANCH -match '^dev/\d+') {
68
+ # Extract spec number from branch name
69
+ $SPEC_NUM = if ($CURRENT_BRANCH -match '\d+') { $Matches[0] } else { $null }
70
+ if ($SPEC_NUM) {
71
+ $SPEC_DIR = Get-ChildItem -Path "specs/$SPEC_NUM-*" -Directory -ErrorAction SilentlyContinue | Select-Object -First 1
72
+ if ($SPEC_DIR) {
73
+ $SPEC_FILES = @("spec.md", "plan.md", "tasks.md") | Where-Object { Test-Path "$($SPEC_DIR.FullName)/$_" }
74
+ }
75
+ }
89
76
  }
90
77
  ```
91
78
 
92
79
  ### 6. Check Multi-Agent Coordination (if multiagent-kit installed)
93
80
 
94
- If `$MULTIAGENT_KIT -eq $true`:
95
-
96
81
  ```powershell
97
- # Check for active sessions
98
- (Get-ChildItem -Path specs/*/collaboration/active/sessions/ -Filter *.md -Recurse -ErrorAction SilentlyContinue).Count
99
-
100
- # Check for pending handoffs
101
- Get-ChildItem -Path specs/*/collaboration/active/decisions/ -Filter handoff-*.md -Recurse -ErrorAction SilentlyContinue | Select-Object -First 1
82
+ # Only check if multiagent kit is installed
83
+ if ($KITS_INSTALLED -contains "multiagent") {
84
+ # Efficient check for collaboration activity
85
+ $ACTIVE_SESSIONS = (Get-ChildItem -Path specs/*/collaboration/active/sessions/ -Filter *.md -Recurse -ErrorAction SilentlyContinue).Count
86
+ $PENDING_HANDOFF = Get-ChildItem -Path specs/*/collaboration/active/decisions/ -Filter handoff-*.md -Recurse -ErrorAction SilentlyContinue | Select-Object -First 1
87
+ }
102
88
  ```
103
89
 
104
90
  ### 7. Generate Concise Output
@@ -108,15 +94,15 @@ Provide a **concise summary** (~150 words max) in this format:
108
94
  ```
109
95
  ## Orientation Complete
110
96
 
111
- **Installed Kits**: [list detected kits or "vanilla only"]
97
+ **Installed Kits**: [$KITS_LIST]
112
98
 
113
99
  **I am**: [$AGENT_ROLE from step 2]
114
100
  **Project**: [project name from docs]
115
101
  **Stack**: [main technologies]
116
- **Branch**: [current branch]
117
- **Recent work**: [summary of last 1-2 commits]
118
- **Uncommitted changes**: [count of modified files]
119
- **Active feature**: [current spec if on feature branch]
102
+ **Branch**: [$CURRENT_BRANCH]
103
+ **Recent work**: [$RECENT_COMMITS - just the message]
104
+ **Uncommitted changes**: [$CHANGES count]
105
+ **Active feature**: [current spec if $SPEC_FILES exists]
120
106
  **Coordination**: [solo work / handoff pending / etc]
121
107
 
122
108
  **Next suggested action**: [based on state analysis below]
@@ -133,7 +119,7 @@ Based on the state you discovered, suggest the next logical action:
133
119
  - **Plan exists, no tasks** → "Run `/tasks` to break down into tasks"
134
120
  - **Tasks exist** → "Run `/implement` to start coding"
135
121
  - **Handoff detected** (multiagent) → "Review handoff in `specs/[feature]/collaboration/active/decisions/`"
136
- - **Uncommitted changes** → "Review changes and consider running `/commit`" (if git-kit installed)
122
+ - **Uncommitted changes** → "Review changes and consider running `/commit`" (if dev-kit installed)
137
123
 
138
124
  ## Important Notes
139
125
 
@@ -148,7 +134,7 @@ Based on the state you discovered, suggest the next logical action:
148
134
  ```
149
135
  ## Orientation Complete
150
136
 
151
- **Installed Kits**: project, git
137
+ **Installed Kits**: dev
152
138
 
153
139
  **I am**: Grok Code Fast 1 @ GitHub Copilot (Specialist)
154
140
  **Project**: Blog Platform API (TypeScript/Node.js)
@@ -342,7 +342,7 @@ Implements Phase 1 MVP with `/orient` command and modular kit system for multi-a
342
342
  ## Changes
343
343
 
344
344
  ### Features
345
- - Add `/orient` command for agent orientation (project-kit)
345
+ - Add `/orient` command for agent orientation (dev-kit)
346
346
  - Implement kit-aware installer with --kit flag support
347
347
  - Add modular kit structure (project, git, multiagent)
348
348
  - Auto-dependency inclusion (multiagent → project + git)