mirror of
https://github.com/catlog22/Claude-Code-Workflow.git
synced 2026-03-10 17:11:04 +08:00
- Implement tests for AssociationHighlight, DashboardToolbar, QueuePanel, SessionGroupTree, and TerminalDashboardPage to ensure proper functionality and state management. - Create tests for cliSessionStore, issueQueueIntegrationStore, queueExecutionStore, queueSchedulerStore, sessionManagerStore, and terminalGridStore to validate state resets and workspace scoping. - Mock necessary dependencies and state management hooks to isolate tests and ensure accurate behavior.
4.7 KiB
4.7 KiB
TASK ASSIGNMENT
MANDATORY FIRST STEPS
- Read shared discoveries: {session_folder}/discoveries.ndjson (if exists, skip if not)
- Read project context: .workflow/project-tech.json (if exists)
Your Task
Task ID: {id} Title: {title} Description: {description} Dimension: {dimension} Target: {target}
Previous Tasks' Findings (Context)
{prev_context}
Execution Protocol
- Read discoveries: Load {session_folder}/discoveries.ndjson for shared exploration findings
- Use context: Apply previous tasks' findings from prev_context above
- Execute: Perform your assigned role (scanner or reviewer) following the role-specific instructions below
- Share discoveries: Append exploration findings to shared board:
echo '{"ts":"<ISO8601>","worker":"{id}","type":"<type>","data":{...}}' >> {session_folder}/discoveries.ndjson - Report result: Return JSON via report_agent_job_result
Role-Specific Instructions
If you are a Scanner (SCAN- task)*:
- Extract session path and target from description
- Resolve target files (glob pattern or directory →
**/*.{ts,tsx,js,jsx,py,go,java,rs}) - If no source files found → report empty, complete task cleanly
- Detect toolchain availability:
- tsc:
tsconfig.jsonexists → COR dimension - eslint:
.eslintrc*oreslintin package.json → COR/MNT - semgrep:
.semgrep.ymlexists → SEC dimension - ruff:
pyproject.toml+ ruff available → SEC/COR/MNT - mypy: mypy available +
pyproject.toml→ COR - npmAudit:
package-lock.jsonexists → SEC
- tsc:
- Run detected tools in parallel via Bash backgrounding
- Parse tool outputs into normalized findings with dimension, severity, file:line
- Execute semantic scan via CLI:
ccw cli --tool gemini --mode analysis --rule analysis-review-code-quality - Focus areas per dimension:
- SEC: Business logic vulnerabilities, privilege escalation, sensitive data flow, auth bypass
- COR: Logic errors, unhandled exception paths, state management bugs, race conditions
- PRF: Algorithm complexity, N+1 queries, unnecessary sync, memory leaks, missing caching
- MNT: Architectural coupling, abstraction leaks, convention violations, dead code
- Merge toolchain + semantic findings, deduplicate (same file + line + dimension)
- Assign dimension-prefixed IDs: SEC-001, COR-001, PRF-001, MNT-001
- Write scan results to session directory
If you are a Reviewer (REV- task)*:
- Extract session path and input path from description
- Load scan results from previous task (via prev_context or session directory)
- If scan results empty → report clean, complete immediately
- Triage findings into deep_analysis (critical/high/medium, max 15) and pass_through (remaining)
- Split deep_analysis into domain groups:
- Group A: Security + Correctness → Root cause tracing, fix dependencies, blast radius
- Group B: Performance + Maintainability → Optimization approaches, refactor tradeoffs
- Execute parallel CLI agents for enrichment:
ccw cli --tool gemini --mode analysis --rule analysis-diagnose-bug-root-cause - Request 6 enrichment fields per finding:
- root_cause: {description, related_findings[], is_symptom}
- impact: {scope: low/medium/high, affected_files[], blast_radius}
- optimization: {approach, alternative, tradeoff}
- fix_strategy: minimal / refactor / skip
- fix_complexity: low / medium / high
- fix_dependencies: finding IDs that must be fixed first
- Merge enriched + pass_through findings
- Cross-correlate:
- Critical files: file appears in >=2 dimensions
- Root cause groups: cluster findings sharing related_findings
- Optimization suggestions: from root cause groups + standalone enriched findings
- Compute metrics: by_dimension, by_severity, dimension_severity_matrix, fixable_count
- Write review report to session directory
Discovery Types to Share
finding: {dimension, file, line, severity, title} — Code issue discoveredroot_cause: {finding_id, description, related_findings[]} — Root cause analysispattern: {pattern, files[], occurrences} — Code pattern identified
Output (report_agent_job_result)
Return JSON: { "id": "{id}", "status": "completed" | "failed", "findings": "Key discoveries and implementation notes (max 500 chars)", "error": "" }
Scanner findings format: "Found X security issues (Y critical, Z high), A correctness bugs, B performance issues, C maintainability concerns. Toolchain: [tool results]. LLM scan: [semantic issues]."
Reviewer findings format: "Analyzed X findings. Critical files: [files]. Root cause groups: [count]. Fixable: Y/X. Recommended fix scope: [scope]."