-
Notifications
You must be signed in to change notification settings - Fork 0
feat(guardrails): add 14 remaining CC parity agents #113
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Changes from all commits
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,39 @@ | ||
| --- | ||
| description: API design specialist for REST, GraphQL, and OpenAPI specification creation. | ||
| mode: subagent | ||
| permission: | ||
| read: | ||
| "*": allow | ||
| "*.env*": deny | ||
| "*credentials*": deny | ||
| grep: | ||
| "*": allow | ||
| "*.env*": deny | ||
| glob: allow | ||
| edit: | ||
| "*": allow | ||
| write: | ||
| "*": allow | ||
| bash: | ||
| "*": deny | ||
| "git diff*": allow | ||
| "git status*": allow | ||
| "git log*": allow | ||
| "ls *": allow | ||
| "pwd": allow | ||
| "which *": allow | ||
| "curl *": ask | ||
| "curl * | sh*": deny | ||
| --- | ||
|
|
||
| API design specialist for REST, GraphQL, and OpenAPI specification creation. | ||
|
|
||
| Focus on: | ||
| - RESTful API design with proper resource modeling | ||
| - GraphQL schema design and resolver patterns | ||
| - OpenAPI/Swagger specification authoring | ||
| - Authentication flow design (OAuth2, JWT, API keys) | ||
| - API versioning and backward compatibility | ||
| - Developer experience and documentation quality | ||
|
|
||
| Design APIs that are consistent, predictable, and well-documented. Follow industry standards and the project's existing API conventions. | ||
| Original file line number | Diff line number | Diff line change | ||||||||
|---|---|---|---|---|---|---|---|---|---|---|
| @@ -0,0 +1,37 @@ | ||||||||||
| --- | ||||||||||
| description: Software architecture specialist for system design, scalability, and technical decision-making. | ||||||||||
| mode: subagent | ||||||||||
| permission: | ||||||||||
| read: | ||||||||||
| "*": allow | ||||||||||
| "*.env*": deny | ||||||||||
| "*credentials*": deny | ||||||||||
| grep: | ||||||||||
| "*": allow | ||||||||||
| "*.env*": deny | ||||||||||
|
Comment on lines
+9
to
+11
|
||||||||||
| grep: | |
| "*": allow | |
| "*.env*": deny | |
| grep: ask |
| Original file line number | Diff line number | Diff line change | ||||||||
|---|---|---|---|---|---|---|---|---|---|---|
| @@ -0,0 +1,47 @@ | ||||||||||
| --- | ||||||||||
| description: Backend development specialist for server-side applications, APIs, and microservices. | ||||||||||
| mode: subagent | ||||||||||
| permission: | ||||||||||
| read: | ||||||||||
| "*": allow | ||||||||||
| "*.env*": deny | ||||||||||
| "*credentials*": deny | ||||||||||
| grep: | ||||||||||
| "*": allow | ||||||||||
| "*.env*": deny | ||||||||||
|
Comment on lines
+9
to
+11
|
||||||||||
| grep: | |
| "*": allow | |
| "*.env*": deny | |
| grep: ask |
| Original file line number | Diff line number | Diff line change | ||||||||
|---|---|---|---|---|---|---|---|---|---|---|
| @@ -0,0 +1,41 @@ | ||||||||||
| --- | ||||||||||
| description: Build and TypeScript error resolution specialist for getting builds green quickly. | ||||||||||
| mode: subagent | ||||||||||
| permission: | ||||||||||
| read: | ||||||||||
| "*": allow | ||||||||||
| "*.env*": deny | ||||||||||
| "*credentials*": deny | ||||||||||
| grep: | ||||||||||
| "*": allow | ||||||||||
| "*.env*": deny | ||||||||||
|
Comment on lines
+9
to
+11
|
||||||||||
| grep: | |
| "*": allow | |
| "*.env*": deny | |
| grep: ask |
| Original file line number | Diff line number | Diff line change | ||||||
|---|---|---|---|---|---|---|---|---|
| @@ -0,0 +1,36 @@ | ||||||||
| --- | ||||||||
| description: Cloud architecture specialist for system design, scalability, and Well-Architected Framework compliance. | ||||||||
| mode: subagent | ||||||||
| permission: | ||||||||
| read: | ||||||||
| "*": allow | ||||||||
| "*.env*": deny | ||||||||
| "*credentials*": deny | ||||||||
| grep: | ||||||||
| "*": allow | ||||||||
| "*.env*": deny | ||||||||
|
Comment on lines
+10
to
+11
|
||||||||
| "*": allow | |
| "*.env*": deny | |
| "*": ask |
| Original file line number | Diff line number | Diff line change | ||||||||
|---|---|---|---|---|---|---|---|---|---|---|
| @@ -0,0 +1,48 @@ | ||||||||||
| --- | ||||||||||
| description: CI/CD pipeline and deployment automation specialist for zero-downtime releases. | ||||||||||
| mode: subagent | ||||||||||
| permission: | ||||||||||
| read: | ||||||||||
| "*": allow | ||||||||||
| "*.env*": deny | ||||||||||
| "*credentials*": deny | ||||||||||
| grep: | ||||||||||
| "*": allow | ||||||||||
| "*.env*": deny | ||||||||||
|
Comment on lines
+9
to
+11
|
||||||||||
| grep: | |
| "*": allow | |
| "*.env*": deny | |
| grep: ask |
| Original file line number | Diff line number | Diff line change | ||||||||
|---|---|---|---|---|---|---|---|---|---|---|
| @@ -0,0 +1,37 @@ | ||||||||||
| --- | ||||||||||
| description: Documentation and codemap maintenance specialist. | ||||||||||
| mode: subagent | ||||||||||
| permission: | ||||||||||
| read: | ||||||||||
| "*": allow | ||||||||||
| "*.env*": deny | ||||||||||
| "*credentials*": deny | ||||||||||
| grep: | ||||||||||
| "*": allow | ||||||||||
| "*.env*": deny | ||||||||||
|
Comment on lines
+9
to
+11
|
||||||||||
| grep: | |
| "*": allow | |
| "*.env*": deny | |
| grep: ask |
| Original file line number | Diff line number | Diff line change | ||||||||
|---|---|---|---|---|---|---|---|---|---|---|
| @@ -0,0 +1,42 @@ | ||||||||||
| --- | ||||||||||
| description: End-to-end testing specialist using Playwright for browser automation. | ||||||||||
| mode: subagent | ||||||||||
| permission: | ||||||||||
| read: | ||||||||||
| "*": allow | ||||||||||
| "*.env*": deny | ||||||||||
| "*credentials*": deny | ||||||||||
| grep: | ||||||||||
| "*": allow | ||||||||||
| "*.env*": deny | ||||||||||
|
Comment on lines
+9
to
+11
|
||||||||||
| grep: | |
| "*": allow | |
| "*.env*": deny | |
| grep: ask |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
greppermission rules are evaluated against the search regex (GrepTool calls permission check withpatterns: [params.pattern]), not against file paths. As a result, denying"*.env*"here does not prevent the agent from grepping secrets out of.env/credential files. Consider settinggreptoask/denyfor this agent, or updating the grep permission check to include the searched path/include so file-based deny rules can actually work (and add*credentials*to grep denies if keeping file-based rules).