lite-kits 0.1.1__py3-none-any.whl → 0.3.1__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (63) hide show
  1. lite_kits/__init__.py +56 -4
  2. lite_kits/cli.py +696 -185
  3. lite_kits/core/__init__.py +6 -0
  4. lite_kits/core/banner.py +1 -1
  5. lite_kits/core/conflict_checker.py +115 -0
  6. lite_kits/core/detector.py +140 -0
  7. lite_kits/core/installer.py +236 -351
  8. lite_kits/core/manifest.py +146 -146
  9. lite_kits/core/validator.py +146 -0
  10. lite_kits/kits/README.md +6 -6
  11. lite_kits/kits/dev/README.md +241 -241
  12. lite_kits/kits/dev/{claude/commands → commands/.claude}/audit.md +143 -143
  13. lite_kits/kits/dev/{claude/commands → commands/.claude}/cleanup.md +2 -2
  14. lite_kits/kits/{git/claude/commands → dev/commands/.claude}/commit.md +2 -2
  15. lite_kits/kits/{project/claude/commands → dev/commands/.claude}/orient.md +3 -4
  16. lite_kits/kits/{git/claude/commands → dev/commands/.claude}/pr.md +1 -1
  17. lite_kits/kits/{git/claude/commands → dev/commands/.claude}/review.md +202 -202
  18. lite_kits/kits/{project/claude/commands → dev/commands/.claude}/stats.md +162 -162
  19. lite_kits/kits/{project/github/prompts → dev/commands/.github}/audit.prompt.md +143 -143
  20. lite_kits/kits/{git/github/prompts → dev/commands/.github}/cleanup.prompt.md +2 -2
  21. lite_kits/kits/{git/github/prompts → dev/commands/.github}/commit.prompt.md +2 -2
  22. lite_kits/kits/dev/{github/prompts → commands/.github}/orient.prompt.md +3 -4
  23. lite_kits/kits/{git/github/prompts → dev/commands/.github}/pr.prompt.md +1 -1
  24. lite_kits/kits/{git/github/prompts → dev/commands/.github}/review.prompt.md +202 -202
  25. lite_kits/kits/dev/{github/prompts → commands/.github}/stats.prompt.md +163 -163
  26. lite_kits/kits/kits.yaml +497 -180
  27. lite_kits/kits/multiagent/README.md +6 -6
  28. lite_kits/kits/multiagent/{claude/commands → commands/.claude}/sync.md +331 -331
  29. lite_kits/kits/multiagent/{github/prompts → commands/.github}/sync.prompt.md +73 -69
  30. lite_kits/kits/multiagent/memory/git-worktrees-protocol.md +370 -370
  31. lite_kits/kits/multiagent/memory/parallel-work-protocol.md +536 -536
  32. lite_kits/kits/multiagent/memory/pr-workflow-guide.md +275 -275
  33. lite_kits/kits/multiagent/templates/collaboration-structure/README.md +166 -166
  34. lite_kits/kits/multiagent/templates/decision.md +79 -79
  35. lite_kits/kits/multiagent/templates/handoff.md +95 -95
  36. lite_kits/kits/multiagent/templates/session-log.md +68 -68
  37. lite_kits-0.3.1.dist-info/METADATA +259 -0
  38. lite_kits-0.3.1.dist-info/RECORD +41 -0
  39. {lite_kits-0.1.1.dist-info → lite_kits-0.3.1.dist-info}/licenses/LICENSE +21 -21
  40. lite_kits/kits/dev/claude/commands/commit.md +0 -612
  41. lite_kits/kits/dev/claude/commands/orient.md +0 -146
  42. lite_kits/kits/dev/claude/commands/pr.md +0 -593
  43. lite_kits/kits/dev/claude/commands/review.md +0 -202
  44. lite_kits/kits/dev/claude/commands/stats.md +0 -162
  45. lite_kits/kits/dev/github/prompts/audit.prompt.md +0 -143
  46. lite_kits/kits/dev/github/prompts/cleanup.prompt.md +0 -382
  47. lite_kits/kits/dev/github/prompts/commit.prompt.md +0 -591
  48. lite_kits/kits/dev/github/prompts/pr.prompt.md +0 -603
  49. lite_kits/kits/dev/github/prompts/review.prompt.md +0 -202
  50. lite_kits/kits/git/README.md +0 -365
  51. lite_kits/kits/git/claude/commands/cleanup.md +0 -361
  52. lite_kits/kits/git/scripts/bash/get-git-context.sh +0 -208
  53. lite_kits/kits/git/scripts/powershell/Get-GitContext.ps1 +0 -242
  54. lite_kits/kits/project/README.md +0 -228
  55. lite_kits/kits/project/claude/commands/audit.md +0 -143
  56. lite_kits/kits/project/claude/commands/review.md +0 -112
  57. lite_kits/kits/project/github/prompts/orient.prompt.md +0 -150
  58. lite_kits/kits/project/github/prompts/review.prompt.md +0 -112
  59. lite_kits/kits/project/github/prompts/stats.prompt.md +0 -163
  60. lite_kits-0.1.1.dist-info/METADATA +0 -447
  61. lite_kits-0.1.1.dist-info/RECORD +0 -58
  62. {lite_kits-0.1.1.dist-info → lite_kits-0.3.1.dist-info}/WHEEL +0 -0
  63. {lite_kits-0.1.1.dist-info → lite_kits-0.3.1.dist-info}/entry_points.txt +0 -0
@@ -1,202 +0,0 @@
1
- ---
2
- description: Review staged changes against best practices
3
- ---
4
-
5
- # Code Review of Staged Changes
6
-
7
- **Purpose**: Review staged git changes for quality, best practices, and potential issues before committing.
8
-
9
- ## Execution Steps
10
-
11
- Execute the following steps to review staged changes:
12
-
13
- ### 1. Check Staged Files
14
-
15
- ```bash
16
- # Get list of staged files with status
17
- git diff --staged --name-status
18
- ```
19
-
20
- **If no files are staged**:
21
- - Inform user that nothing is staged
22
- - Suggest running `git add` or `/commit` to stage and commit together
23
- - Exit gracefully
24
-
25
- ### 2. Analyze Staged Changes
26
-
27
- ```bash
28
- # Get the actual diff with context
29
- git diff --staged
30
- ```
31
-
32
- ### 3. Review Changes
33
-
34
- Analyze the diff output for:
35
-
36
- **✅ Good Practices to Acknowledge**:
37
- - Clear, descriptive function/variable names
38
- - Appropriate comments where needed
39
- - Consistent formatting
40
- - Type hints (Python) or type annotations
41
- - Test coverage for new code
42
- - Error handling
43
- - Input validation
44
-
45
- **⚠️ Issues to Flag**:
46
- - **Security**:
47
- - Hardcoded credentials or API keys
48
- - SQL injection vulnerabilities
49
- - XSS vulnerabilities
50
- - Unsafe deserialization
51
- - Missing authentication/authorization checks
52
-
53
- - **Code Quality**:
54
- - TODOs or FIXMEs (should be tracked in issues)
55
- - Commented-out code blocks
56
- - Magic numbers without explanation
57
- - Overly complex functions (>50 lines)
58
- - Duplicate code patterns
59
- - Inconsistent naming conventions
60
-
61
- - **Best Practices**:
62
- - Missing error handling
63
- - No logging for important operations
64
- - Hardcoded configuration values
65
- - Missing input validation
66
- - Unused imports or variables
67
- - Missing docstrings for public APIs
68
-
69
- ### 4. Present Review Results
70
-
71
- Format output as follows:
72
-
73
- ```
74
- ## Code Review Results
75
-
76
- **Staged files**: [count]
77
- [list files with status: A=added, M=modified, D=deleted]
78
-
79
- **Summary of changes**:
80
- [brief description of what's being changed]
81
-
82
- ===========================================================
83
- **✅ Good Practices Found:**
84
- ===========================================================
85
-
86
- [List positive findings, grouped by file]
87
- - [file]: [specific good practice observed]
88
-
89
- ===========================================================
90
- **⚠️ Suggestions for Improvement:**
91
- ===========================================================
92
-
93
- [List issues/suggestions, grouped by file with line numbers if possible]
94
- - [file]:[line]: [specific issue and suggested fix]
95
-
96
- ===========================================================
97
- **🔒 Security Check:**
98
- ===========================================================
99
-
100
- [Report any security concerns or confirm none found]
101
- - ✓ No hardcoded credentials detected
102
- - ✓ No obvious security vulnerabilities
103
- - ⚠ [Any security concerns]
104
-
105
- ===========================================================
106
- **📊 Overall Assessment:**
107
- ===========================================================
108
-
109
- [One of: "Ready to commit", "Ready with minor suggestions", "Needs changes"]
110
-
111
- [Brief summary of overall code quality]
112
-
113
- **Recommendation**: [Approve / Address suggestions / Do not commit]
114
- ```
115
-
116
- ### 5. Handle User Response
117
-
118
- After presenting results, wait for user action. They may:
119
- - Proceed with commit anyway
120
- - Make changes and re-review
121
- - Cancel the review
122
-
123
- ## Example Output
124
-
125
- ```
126
- ## Code Review Results
127
-
128
- **Staged files**: 3
129
- - A src/auth.py (new file)
130
- - M src/models.py (modified)
131
- - A tests/test_auth.py (new file)
132
-
133
- **Summary of changes**:
134
- Adding user authentication system with bcrypt password hashing
135
- and JWT token generation.
136
-
137
- ===========================================================
138
- **✅ Good Practices Found:**
139
- ===========================================================
140
-
141
- - src/auth.py: Clear function names (hash_password, verify_password)
142
- - src/auth.py: Type hints used throughout
143
- - src/auth.py: Comprehensive docstrings for all functions
144
- - src/models.py: Proper SQLAlchemy relationship definitions
145
- - tests/test_auth.py: Good test coverage with fixtures
146
-
147
- ===========================================================
148
- **⚠️ Suggestions for Improvement:**
149
- ===========================================================
150
-
151
- - src/auth.py:45: Consider extracting hash_password to utils module
152
- Current: Function in auth.py
153
- Suggest: Move to src/utils/crypto.py for reusability
154
-
155
- - src/models.py:12: TODO comment present
156
- Line: "# TODO: Add password reset functionality"
157
- Suggest: Create GitHub issue and reference it in comment
158
-
159
- - tests/test_auth.py:67: Missing edge case test
160
- Suggest: Add test for empty password input
161
-
162
- - src/auth.py:23: Magic number for token expiration
163
- Current: expires_delta = timedelta(hours=24)
164
- Suggest: Move to config file or environment variable
165
-
166
- ===========================================================
167
- **🔒 Security Check:**
168
- ===========================================================
169
-
170
- ✓ No hardcoded credentials detected
171
- ✓ Using bcrypt for password hashing (good choice!)
172
- ✓ JWT tokens generated securely
173
- ⚠ Consider adding rate limiting to prevent brute force attacks
174
-
175
- ===========================================================
176
- **📊 Overall Assessment:**
177
- ===========================================================
178
-
179
- **Status**: Ready with minor suggestions
180
-
181
- The code follows good practices with proper type hints, docstrings,
182
- and test coverage. The suggestions above are minor improvements that
183
- can be addressed now or in future iterations.
184
-
185
- **Recommendation**: Approve and commit - suggestions are non-blocking
186
- ```
187
-
188
- ## Important Notes
189
-
190
- - This command is **read-only** - it never modifies files
191
- - Focus on **actionable feedback** - be specific about what to change
192
- - Be **encouraging** - acknowledge good practices
193
- - **Security first** - always check for security issues
194
- - Keep review **concise** - don't overwhelm with minor issues
195
- - **Respect the agent's work** - balance critique with acknowledgment
196
-
197
- ## Integration with Other Commands
198
-
199
- - Run `/review` before `/commit` to catch issues early
200
- - Use after making changes and staging them with `git add`
201
- - Combine with `/pr` workflow - review before creating PR
202
- - Works great in multi-agent workflows (one agent reviews another's work)
@@ -1,162 +0,0 @@
1
- ---
2
- description: Generate concise project metrics for AI agent orientation
3
- ---
4
-
5
- # Project Statistics
6
-
7
- **Purpose**: Provide quick project overview metrics for AI agents joining a project or assessing scope.
8
-
9
- ## Execution Steps
10
-
11
- Execute the following steps to gather project statistics:
12
-
13
- ### 1. Count Lines of Code
14
-
15
- **Preferred method** (if tokei installed):
16
- ```bash
17
- # Check if tokei is available
18
- command -v tokei >/dev/null 2>&1
19
-
20
- # If available, use tokei for fast, accurate counts
21
- tokei --output json
22
- ```
23
-
24
- **Fallback method** (if tokei not available):
25
- ```bash
26
- # Python
27
- find . -name "*.py" -type f | xargs wc -l 2>/dev/null | tail -1
28
-
29
- # JavaScript/TypeScript
30
- find . -name "*.js" -o -name "*.ts" | xargs wc -l 2>/dev/null | tail -1
31
-
32
- # Markdown
33
- find . -name "*.md" -type f | xargs wc -l 2>/dev/null | tail -1
34
-
35
- # All files combined
36
- find . -type f -not -path "*/\.*" | xargs wc -l 2>/dev/null | tail -1
37
- ```
38
-
39
- ### 2. Count Files and Directories
40
-
41
- ```bash
42
- # Count files (excluding hidden)
43
- find . -type f -not -path "*/\.*" | wc -l
44
-
45
- # Count directories (excluding hidden)
46
- find . -type d -not -path "*/\.*" | wc -l
47
- ```
48
-
49
- ### 3. Get Git History Summary
50
-
51
- ```bash
52
- # Total commits
53
- git log --oneline | wc -l
54
-
55
- # Contributor count
56
- git log --format='%aN' | sort -u | wc -l
57
-
58
- # Recent activity
59
- git log --oneline -5
60
- ```
61
-
62
- If not a git repository, skip this section.
63
-
64
- ### 4. Check for Test Coverage
65
-
66
- Look for common coverage report files:
67
- ```bash
68
- # Python coverage files
69
- ls .coverage coverage.xml htmlcov/ 2>/dev/null
70
-
71
- # JavaScript coverage
72
- ls coverage/ .nyc_output/ 2>/dev/null
73
-
74
- # If coverage files exist, try to extract percentage
75
- # Python: coverage report | grep TOTAL
76
- # JavaScript: cat coverage/coverage-summary.json
77
- ```
78
-
79
- ### 5. Generate Concise Table Output
80
-
81
- Provide stats in this format (~20 lines max):
82
-
83
- ```markdown
84
- ## Project Statistics
85
-
86
- **Code**:
87
- - Language1: X,XXX LOC (NN%)
88
- - Language2: XXX LOC (NN%)
89
- - Language3: XX LOC (NN%)
90
-
91
- **Structure**:
92
- - NN files, NN directories
93
- - NNN commits, N contributors
94
-
95
- **Testing**:
96
- - Coverage: NN% (or N/A)
97
- - Tests: NN files (or N/A)
98
-
99
- **Next Action**: [Explore src/ / Review tests / Check docs]
100
- ```
101
-
102
- ## Important Notes
103
-
104
- - **Be concise**: Keep output under 20 lines
105
- - **Use tables**: Well-formatted markdown tables or lists
106
- - **Handle missing tools**:
107
- - No tokei → Use find/wc fallback, note "Basic LOC count"
108
- - Not a git repo → Skip git section, note "No git history"
109
- - No coverage → Show "N/A" gracefully
110
-
111
- - **Percentages**: Calculate language percentages from total LOC
112
- - **Large repos**: If >100k LOC, note "Large project" and consider sampling
113
- - **Speed**: Target <5 second execution time
114
-
115
- ## Edge Cases
116
-
117
- - **No git repository**: Skip git section, show file/LOC stats only
118
- - **No test coverage reports**: Show "Coverage: N/A"
119
- - **Tokei not installed**: Use find/wc fallback, note in output
120
- - **Very large repo (1M+ LOC)**: Sample or provide high-level summary only
121
- - **No code files**: "Appears to be a documentation-only or data project"
122
-
123
- ## Example Output
124
-
125
- ```markdown
126
- ## Project Statistics
127
-
128
- **Code**:
129
- - Python: 2,453 LOC (87%)
130
- - Markdown: 342 LOC (12%)
131
- - YAML: 28 LOC (1%)
132
- - Total: 2,823 LOC
133
-
134
- **Structure**:
135
- - 45 files, 12 directories
136
- - 127 commits, 3 contributors
137
-
138
- **Testing**:
139
- - Coverage: 78% (via pytest-cov)
140
- - Tests: 23 test files
141
-
142
- **Next Action**: Explore src/ directory to understand core modules
143
- ```
144
-
145
- ```markdown
146
- ## Project Statistics
147
-
148
- **Code** (tokei not available, using basic count):
149
- - Python: ~1,200 lines
150
- - Markdown: ~400 lines
151
- - Total: ~1,600 lines (approximate)
152
-
153
- **Structure**:
154
- - 32 files, 8 directories
155
- - Not a git repository
156
-
157
- **Testing**:
158
- - Coverage: N/A
159
- - Tests: N/A
160
-
161
- **Next Action**: Check if this is a standalone library or tool
162
- ```
@@ -1,143 +0,0 @@
1
- ---
2
- description: Perform security analysis on dependencies and code patterns
3
- ---
4
-
5
- # Security Audit Helper
6
-
7
- **Purpose**: Quick security analysis for AI agents working on features involving authentication, data handling, or external dependencies.
8
-
9
- ## Execution Steps
10
-
11
- Execute the following steps to perform a security audit:
12
-
13
- ### 1. Detect Project Type and Dependencies
14
-
15
- ```powershell
16
- # Check for Python dependencies
17
- Get-ChildItem -Path . -Include requirements.txt,pyproject.toml,setup.py -Recurse -ErrorAction SilentlyContinue
18
-
19
- # Check for Node.js dependencies
20
- Get-ChildItem -Path . -Include package.json,package-lock.json -Recurse -ErrorAction SilentlyContinue
21
-
22
- # Check for Rust dependencies
23
- Get-ChildItem -Path . -Include Cargo.toml,Cargo.lock -Recurse -ErrorAction SilentlyContinue
24
-
25
- # Check for Go dependencies
26
- Get-ChildItem -Path . -Include go.mod,go.sum -Recurse -ErrorAction SilentlyContinue
27
- ```
28
-
29
- ### 2. Run Dependency Vulnerability Scan
30
-
31
- **Python projects**:
32
- ```powershell
33
- # Check if pip-audit is available
34
- Get-Command pip-audit -ErrorAction SilentlyContinue
35
-
36
- # If available, run scan
37
- pip-audit
38
-
39
- # If not available, suggest installation
40
- Write-Host "Install pip-audit: pip install pip-audit"
41
- ```
42
-
43
- **Node.js projects**:
44
- ```powershell
45
- # npm audit is built-in
46
- npm audit
47
-
48
- # Or use yarn
49
- yarn audit
50
- ```
51
-
52
- **Other languages**: Suggest appropriate tools (cargo audit, go list, etc.)
53
-
54
- ### 3. Scan for Common Security Anti-Patterns
55
-
56
- Check source code for security issues:
57
-
58
- ```powershell
59
- # Look for potential hardcoded secrets
60
- Select-String -Path src\* -Pattern "API_KEY\s*=\s*['""]" -Recurse | Select-Object -First 5
61
- Select-String -Path src\* -Pattern "PASSWORD\s*=\s*['""]" -Recurse | Select-Object -First 5
62
- Select-String -Path src\* -Pattern "SECRET\s*=\s*['""]" -Recurse | Select-Object -First 5
63
-
64
- # Look for weak crypto patterns (Python)
65
- Select-String -Path src\* -Pattern "md5|sha1" -Recurse | Select-Object -First 5
66
-
67
- # Look for SQL injection risks
68
- Select-String -Path src\* -Pattern "execute.*%|execute.*\+" -Recurse | Select-Object -First 5
69
- ```
70
-
71
- **Common patterns to flag**:
72
- - Hardcoded API keys, passwords, tokens
73
- - Weak cryptographic algorithms (MD5, SHA1)
74
- - SQL string concatenation
75
- - Eval/exec with user input
76
- - Insecure file permissions
77
-
78
- ### 4. Generate Concise Report
79
-
80
- Provide analysis in this format (~150 words max):
81
-
82
- ```markdown
83
- ## Security Audit
84
-
85
- **Dependencies**: N scanned, M vulnerabilities found
86
-
87
- **Vulnerabilities** (if any):
88
- - package-name==version: [SEVERITY] - Brief description
89
- - Link to advisory for details
90
-
91
- **Code Patterns** (if any):
92
- - file.py:line: [PATTERN] - Recommendation
93
-
94
- **Next Action**: [Fix CVE-XXXX / Update package / Review auth code]
95
- ```
96
-
97
- ## Important Notes
98
-
99
- - **Graceful fallbacks**: If audit tools not installed, do basic pattern checks only
100
- - **Be concise**: Target <150 words total output
101
- - **Prioritize**: Show highest severity issues first
102
- - **Avoid false positives**: Note that manual review may be needed
103
- - **No dependencies**: Report "No dependencies to audit" gracefully
104
- - **Cross-platform**: Use commands available on Windows, macOS, Linux
105
-
106
- ## Edge Cases
107
-
108
- - **No dependency files**: "No dependencies found. This appears to be a dependency-free project."
109
- - **Tool not installed**: Provide installation command, run basic grep checks
110
- - **No vulnerabilities**: "✅ No known vulnerabilities found! Consider reviewing auth/data handling patterns."
111
- - **Too many issues**: Sample top 5, note total count
112
-
113
- ## Example Output
114
-
115
- ```markdown
116
- ## Security Audit
117
-
118
- **Dependencies**: 12 scanned, 2 vulnerabilities found
119
-
120
- **Vulnerabilities**:
121
- - requests==2.25.0: MEDIUM - CVE-2023-32681 (Proxy-Auth header leak)
122
- Update to: requests>=2.31.0
123
-
124
- **Code Patterns**:
125
- - src/auth.py:42: Hardcoded API key detected
126
- - src/db.py:103: SQL string concatenation (injection risk)
127
-
128
- **Next Action**: Update requests package, move API key to environment variables, use parameterized queries
129
- ```
130
-
131
- ```markdown
132
- ## Security Audit
133
-
134
- **Dependencies**: pip-audit not installed
135
-
136
- **Tool Not Available**:
137
- Install pip-audit for vulnerability scanning:
138
- `pip install pip-audit`
139
-
140
- **Code Patterns**: Basic grep checks performed, no obvious issues found
141
-
142
- **Next Action**: Install pip-audit and re-run for comprehensive dependency scan
143
- ```