# CLI Tools Execution Specification ## Table of Contents 1. [Configuration Reference](#configuration-reference) 2. [Tool Selection](#tool-selection) 3. [Prompt Template](#prompt-template) 4. [CLI Execution](#cli-execution) 5. [Auto-Invoke Triggers](#auto-invoke-triggers) 6. [Best Practices](#best-practices) --- ## Configuration Reference ### Configuration File **Path**: `~/.claude/cli-tools.json` All tool availability, model selection, and routing are defined in this configuration file. ### Configuration Fields | Field | Description | |-------|-------------| | `enabled` | Tool availability status | | `primaryModel` | Default model for the tool | | `secondaryModel` | Fallback model | | `tags` | Capability tags for routing | ### Tool Types | Type | Usage | Capabilities | |------|-------|--------------| | `builtin` | `--tool gemini` | Full (analysis + write tools) | | `cli-wrapper` | `--tool doubao` | Full (analysis + write tools) | | `api-endpoint` | `--tool g25` | **Analysis only** (no file write tools) | > **Note**: `api-endpoint` tools only support analysis and code generation responses. They cannot create, modify, or delete files. --- ## Tool Selection ### Tag-Based Routing Tools are selected based on **tags** defined in the configuration. Use tags to match task requirements to tool capabilities. #### Common Tags | Tag | Use Case | |-----|----------| | `analysis` | Code review, architecture analysis, exploration | | `implementation` | Feature development, bug fixes | | `documentation` | Doc generation, comments | | `testing` | Test creation, coverage analysis | | `refactoring` | Code restructuring | | `security` | Security audits, vulnerability scanning | ### Selection Algorithm ``` 1. Parse task intent → extract required capabilities 2. Load cli-tools.json → get enabled tools with tags 3. Match tags → filter tools supporting required capabilities 4. Select tool → choose by priority (explicit > tag-match > default) 5. Select model → use primaryModel, fallback to secondaryModel ``` ### Selection Decision Tree ``` ┌─ Explicit --tool specified? │ └─→ YES: Use specified tool (validate enabled) │ └─ NO: Tag-based selection ├─ Task requires tags? │ └─→ Match tools with matching tags │ └─→ Multiple matches? Use first enabled │ └─ No tag match? └─→ Use default tool (first enabled in config) ``` ### Command Structure ```bash # Explicit tool selection ccw cli -p "" --tool --mode # Model override ccw cli -p "" --tool --model --mode # Code review (codex only) ccw cli -p "" --tool codex --mode review # Tag-based auto-selection (future) ccw cli -p "" --tags --mode ``` ### Tool Fallback Chain When primary tool fails or is unavailable: 1. Check `secondaryModel` for same tool 2. Try next enabled tool with matching tags 3. Fall back to default enabled tool --- ## Prompt Template ### Universal Prompt Template ```bash ccw cli -p "PURPOSE: [what] + [why] + [success criteria] + [constraints/scope] TASK: • [step 1: specific action] • [step 2: specific action] • [step 3: specific action] MODE: [analysis|write] CONTEXT: @[file patterns] | Memory: [session/tech/module context] EXPECTED: [deliverable format] + [quality criteria] + [structure requirements] CONSTRAINTS: [domain constraints]" --tool --mode --rule ``` ### Intent Capture Checklist (Before CLI Execution) **⚠️ CRITICAL**: Before executing any CLI command, verify these intent dimensions: **Intent Validation Questions**: - [ ] Is the objective specific and measurable? - [ ] Are success criteria defined? - [ ] Is the scope clearly bounded? - [ ] Are constraints and limitations stated? - [ ] Is the expected output format clear? - [ ] Is the action level (read/write) explicit? ### Template Structure Every command MUST include these fields: - **PURPOSE** - Purpose: Goal + motivation + success - Components: What + Why + Success Criteria + Constraints - Bad Example: "Analyze code" - Good Example: "Identify security vulnerabilities in auth module to pass compliance audit; success = all OWASP Top 10 addressed; scope = src/auth/** only" - **TASK** - Purpose: Actionable steps - Components: Specific verbs + targets - Bad Example: "• Review code • Find issues" - Good Example: "• Scan for SQL injection in query builders • Check XSS in template rendering • Verify CSRF token validation" - **MODE** - Purpose: Permission level - Components: analysis / write / auto - Bad Example: (missing) - Good Example: "analysis" or "write" - **CONTEXT** - Purpose: File scope + history - Components: File patterns + Memory - Bad Example: "@**/*" - Good Example: "@src/auth/**/*.ts @shared/utils/security.ts \| Memory: Previous auth refactoring (WFS-001)" - **EXPECTED** - Purpose: Output specification - Components: Format + Quality + Structure - Bad Example: "Report" - Good Example: "Markdown report with: severity levels (Critical/High/Medium/Low), file:line references, remediation code snippets, priority ranking" - **CONSTRAINTS** - Purpose: Domain-specific constraints - Components: Scope limits, special requirements, focus areas - Bad Example: (missing or too vague) - Good Example: "Focus on authentication | Ignore test files | No breaking changes" ### CONTEXT Configuration **Format**: `CONTEXT: [file patterns] | Memory: [memory context]` #### File Patterns - **`@**/*`**: All files (default) - **`@src/**/*.ts`**: TypeScript in src - **`@../shared/**/*`**: Sibling directory (requires `--includeDirs`) - **`@CLAUDE.md`**: Specific file #### Memory Context Include when building on previous work: ```bash # Cross-task reference Memory: Building on auth refactoring (commit abc123), implementing refresh tokens # Cross-module integration Memory: Integration with auth module, using shared error patterns from @shared/utils/errors.ts ``` **Memory Sources**: - **Related Tasks**: Previous refactoring, extensions, conflict resolution - **Tech Stack Patterns**: Framework conventions, security guidelines - **Cross-Module References**: Integration points, shared utilities, type dependencies #### Pattern Discovery Workflow For complex requirements, discover files BEFORE CLI execution: ```bash # Step 1: Discover files (choose one method) # Method A: ACE semantic search (recommended) mcp__ace-tool__search_context(project_root_path="/path", query="React components with export") # Method B: Ripgrep pattern search rg "export.*Component" --files-with-matches --type ts # Step 2: Build CONTEXT CONTEXT: @components/Auth.tsx @types/auth.d.ts | Memory: Previous type refactoring # Step 3: Execute CLI ccw cli -p "..." --tool --mode analysis --cd src ``` ### --rule Configuration **Use `--rule` option to auto-load templates**: ```bash ccw cli -p "..." --tool gemini --mode analysis --rule analysis-review-architecture ``` ### Mode Protocol References **`--rule` auto-loads Protocol based on mode**: - `--mode analysis` → analysis-protocol.md - `--mode write` → write-protocol.md **Protocol Mapping**: - **`analysis`** mode - Permission: Read-only - Constraint: No file create/modify/delete - **`write`** mode - Permission: Create/Modify/Delete files - Constraint: Full workflow execution ### Template System **Available `--rule` template names**: **Universal**: - `universal-rigorous-style` - Precise tasks - `universal-creative-style` - Exploratory tasks **Analysis**: - `analysis-trace-code-execution` - Execution tracing - `analysis-diagnose-bug-root-cause` - Bug diagnosis - `analysis-analyze-code-patterns` - Code patterns - `analysis-analyze-technical-document` - Document analysis - `analysis-review-architecture` - Architecture review - `analysis-review-code-quality` - Code review - `analysis-analyze-performance` - Performance analysis - `analysis-assess-security-risks` - Security assessment **Planning**: - `planning-plan-architecture-design` - Architecture design - `planning-breakdown-task-steps` - Task breakdown - `planning-design-component-spec` - Component design - `planning-plan-migration-strategy` - Migration strategy **Development**: - `development-implement-feature` - Feature implementation - `development-refactor-codebase` - Code refactoring - `development-generate-tests` - Test generation - `development-implement-component-ui` - UI component - `development-debug-runtime-issues` - Runtime debugging --- ## CLI Execution ### MODE Options - **`analysis`** - Permission: Read-only - Use For: Code review, architecture analysis, pattern discovery, exploration - Specification: Safe for all tools - **`write`** - Permission: Create/Modify/Delete - Use For: Feature implementation, bug fixes, documentation, code creation, file modifications - Specification: Requires explicit `--mode write` - **`review`** - Permission: Read-only (code review output) - Use For: Git-aware code review of uncommitted changes, branch diffs, specific commits - Specification: **codex only** - uses `codex review` subcommand - Tool Behavior: - `codex`: Executes `codex review` for structured code review - Other tools (gemini/qwen/claude): Accept mode but no operation change (treated as analysis) - **Constraint**: Target flags (`--uncommitted`, `--base`, `--commit`) and prompt are mutually exclusive - With prompt only: `ccw cli -p "Focus on security" --tool codex --mode review` (reviews uncommitted by default) - With target flag only: `ccw cli --tool codex --mode review --commit abc123` (no prompt allowed) ### Command Options - **`--tool `** - Description: Tool from config (e.g., gemini, qwen, codex) - Default: First enabled tool in config - **`--mode `** - Description: **REQUIRED**: analysis, write, review - Default: **NONE** (must specify) - Note: `review` mode triggers `codex review` subcommand for codex tool only - **`--model `** - Description: Model override - Default: Tool's primaryModel from config - **`--cd `** - Description: Working directory - Default: current - **`--includeDirs `** - Description: Additional directories (comma-separated) - Default: none - **`--resume [id]`** - Description: Resume previous session - Default: - - **`--rule