Skip to content
This project is under active development and subject to breaking changes. See the changelog for release notes.

Quality and Security Skills

These three skills enforce quality standards: validating artifacts at the point of creation, assessing security in two modes, and enforcing documentation formatting rules.

quality-gate specify, plan, decompose, review

Section titled “quality-gate ”

Validates SDD artifacts at the point of creation. Applies rubrics scaled by impact level, with a maximum of 2 correction iterations before escalating to the user.

flowchart TD
  A["Artifact generated"] --> B{"Determine\nimpact level"}
  B -->|"Low"| C["Quick evaluation"]
  B -->|"Medium"| D["Standard evaluation"]
  B -->|"High"| E["Deep evaluation"]
  
  C --> F["Apply rubric\nby artifact type"]
  D --> F
  E --> F
  
  F --> G{"All critical\ncriteria pass?"}
  G -->|"Yes"| H["Deliver to user"]
  G -->|"No, attempt 1"| I["Auto-correct\nand re-evaluate"]
  I --> G
  G -->|"No, attempt 2"| J["Escalate to user\nwith findings"]

Evaluation levels:

LevelTriggerDepth
QuickMinor changes, low-impact tasksSurface-level checks
StandardNormal features, medium-impactFull rubric evaluation
DeepHigh-impact, cross-cutting changesExhaustive validation with cross-references

Rubrics by artifact type:

ArtifactKey Criteria
SpecTestable requirements, prioritized stories, conformance criteria (min 3), no implementation detail
ADRRanked priorities before options, options evaluated against priorities, valid status
TasksOrganized by story, correct phase ordering (Models then Services then Endpoints then Integration), no separate test tasks
CodeMatches spec intent, follows ADR decisions, test coverage, no regressions

Convergence rule: Maximum 2 auto-correction iterations. If the artifact still fails after 2 attempts, the skill presents findings to the user with specific failure points.

Activation triggers: Spec generation, ADR creation, task decomposition, code review.


security-review plan, implement, review

Section titled “security-review ”

Security assessment in two modes: architectural (during design) and code (during implementation). Covers STRIDE threat modeling, OWASP guidelines, dependency scanning, and compliance checks.

flowchart TD
  A["Security trigger\ndetected"] --> B{"Which phase?"}
  B -->|"Planning / Design"| C["Architectural Mode"]
  B -->|"Implementation / Review"| D["Code Mode"]
  
  C --> E["STRIDE threat model"]
  E --> F["Identify attack surfaces"]
  F --> G["Evaluate mitigations"]
  G --> H["Produce security\nfindings report"]
  
  D --> I["OWASP code checks"]
  I --> J["Dependency scan"]
  J --> K["Check GitHub\nsecurity alerts"]
  K --> L["Azure compliance\nvalidation"]
  L --> H

Mode detection:

SignalMode
Spec review, ADR creation, architecture planningArchitectural
Code changes, PR review, implementationCode

Architectural mode (STRIDE):

  • Spoofing: Authentication boundaries
  • Tampering: Data integrity controls
  • Repudiation: Audit trail coverage
  • Information Disclosure: Data classification and encryption
  • Denial of Service: Rate limiting, resource quotas
  • Elevation of Privilege: Authorization model

Code mode (OWASP + tooling):

  • Input validation and output encoding
  • Authentication and session management
  • Dependency vulnerability scanning
  • GitHub Advanced Security alerts review
  • Azure compliance baseline checks

Security principles applied: CIA Triad, Defense in Depth, Least Privilege, Secure by Default, Zero Trust, Shift Left.

Activation triggers: Authentication logic, sensitive data handling, external integrations, exposed endpoints, data persistence patterns.


documentation-style All doc-producing agents

Section titled “documentation-style ”

Formatting and style rules for all markdown documentation generated in the project. Applied automatically when agents produce specs, ADRs, envisioning documents, task files, or plan files.

Formatting rules:

RuleDetail
SpellingNo errors allowed
EmojisProhibited, including decorative Unicode
SeparatorsNo hyphens between concepts; rewrite the sentence
Work item referencesNever use #<number> in free text (Azure DevOps auto-links)
StructureLists and tables over long paragraphs
LengthSpecs and ADRs should be 1-2 pages

Language rules:

AvoidPrefer
”it’s not just X, it’s Y”Describe directly what it is
”goes beyond…”State the specific capability
Rhetorical questions with obvious answersDirect assertions
Generic framing (works in any project)Project-specific context
Passive voiceActive voice, direct sentences

Document structure: Start with the most important content (conclusion, decision, summary). Use consistent hierarchical headings. Include metadata when relevant (Status, Date, Version).

Activation triggers: Spec writing, ADR creation, envisioning documents, task decomposition files, plan files.