You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -59,9 +60,18 @@ Want just the essentials? Copy these:
59
60
-**Kiro**: Copy `.kiro/` folder
60
61
61
62
### Rule Activation
62
-
- Close and reopen project (optional but recommended)
63
-
- Start a new chat
64
-
- The agent should automatically read the rules and begin the onboarding process.
63
+
64
+
-**Close and reopen project** (optional but recommended).
65
+
-**Start a new chat session**.
66
+
-**Trigger the rules** using one of the methods below:
67
+
68
+
-**Vague Trigger (Recommended)**: Start the session with a simple, vague statement like:
69
+
- "Hello"
70
+
- "Let's make some changes"
71
+
-**Explicit Trigger**: If the agent doesn't respond interactively, you can explicitly ask it to read the rules:
72
+
- "Please read the project rules first."
73
+
74
+
*Note: The rules must be triggered for each new chat session for the agent to follow them.*
65
75
66
76
**First Time Expectation:** The agent will guide you through creating a `user-persona.spec.md` file, which will tailor its communication style to your preferences.
Copy file name to clipboardExpand all lines: rules/holistic-workflow.rules.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -37,4 +37,4 @@ This is not just a set of rules; it is a framework for your thinking.
37
37
38
38
For example, if you are in the **"Implement"** step and you discover an unexpected technical challenge, you should not "push through." Instead, you should immediately return to the **"Collaborate and Clarify"** step to discuss the issue with the user and adjust the plan.
39
39
40
-
Always be ready to adapt. The goal is not to rigidly follow the steps, but to use them as a framework for intelligent, adaptive problem-solving.
40
+
Always be ready to adapt. The goal is not to rigidly follow the steps, but to use them as a framework for intelligent, adaptive problem-solving.
-**JSON Escaping:** Note the use of `\\n\\n` for newlines within the JSON string.
20
41
21
42
### OS-Specific Commands
43
+
44
+
### Complex & Multi-line Questions
45
+
For complex questions that require more context, you can format the question over multiple lines using `\n` for newlines within the `echo -e` command. This improves readability.
46
+
47
+
**Unix/Linux/macOS Example:**
48
+
```bash
49
+
echo -e '\n\nI need to update the user authentication flow. Which approach should I take?\n1. JWT-based authentication with refresh tokens\n2. Session-based authentication with server-side storage\n3. OAuth 2.0 with a third-party provider (e.g., Google, GitHub)\nPlease enter the number of your choice: ';read answer;echo"You selected: $answer"
-[ ] Avoided adding unrequested buttons, UI elements, or functionality?
102
+
-[ ] Confirmed assumptions?
103
+
-[ ] Respected user preferences?
104
+
-[ ] Verified no scope creep?
105
+
-[ ] Asked for explicit approval?
106
+
107
+
**After EVERY implementation:**
108
+
-[ ] Asked "Does this meet your expectations?"
109
+
-[ ] Confirmed no unrequested features were added?
110
+
-[ ] Validated implementation scope matches user request?
111
+
-[ ] Asked if user wants modifications?
112
+
113
+
**For ALL display-only text:**
114
+
-[ ] Included "Press Enter to continue" or "Type what you'd like to change"?
115
+
-[ ] Used `read` to wait for user acknowledgment?
116
+
-[ ] Avoided proceeding without user acknowledgment?
117
+
118
+
**REFACTORING-SPECIFIC CHECKLIST:**
119
+
-[ ] Preserved ALL original functionality?
120
+
-[ ] Maintained existing component behavior?
121
+
-[ ] Avoided removing working features?
122
+
-[ ] Asked before changing component structure?
123
+
-[ ] Confirmed refactoring scope with user?
124
+
125
+
**At session end:**
126
+
-[ ] Asked if user wants changes?
127
+
-[ ] Verified all requirements were met?
128
+
129
+
### Violation Protocol
130
+
1. STOP immediately
131
+
2. ACKNOWLEDGE missed step
132
+
3.**EXECUTE** required interactive command via `run_command` tool
133
+
4. WAIT for user response
134
+
5.**NEVER** show interactive commands as text - always execute them
135
+
136
+
### Execution Failures
137
+
-**Critical Violation:** Showing an interactive command (`echo...; read...`) as text instead of executing it via the `run_command` tool.
138
+
-**Forbidden:** Displaying interactive commands as text is strictly forbidden.
139
+
140
+
## 9. Information Freshness (Critical)
141
+
-**Core Rule:** You MUST always use the most up-to-date file content. Before you ask a question or implement a change, re-read any relevant files to ensure you have not missed a manual update from the user.
142
+
-**Stale Content = Critical Failure:** Basing actions on outdated information is a critical violation.
This document provides a comprehensive, non-exhaustive list of examples for when a specification is required. It is intended as a reference to be used for validation when there is doubt.
4
+
5
+
---
6
+
7
+
## Detailed Triggers for Specification Creation
8
+
9
+
A specification is required for **ALL** of the following:
10
+
11
+
### General Code Changes
12
+
-**New Features:** Any new functionality, components, functions, endpoints, or capabilities.
13
+
-**Bug Fixes:** Any correction of existing code behavior or functionality.
14
+
-**Refactoring:** Any restructuring, optimization, or code improvement without changing external behavior.
15
+
-**Configuration Changes:** Any modification to build tools, environment settings, or project configuration.
16
+
-**Dependency Changes:** Adding, removing, or updating any external libraries or packages.
17
+
-**Documentation Updates:** Changes to code comments, README files, or technical documentation.
18
+
-**Testing Changes:** Adding, modifying, or removing tests at any level.
19
+
-**Performance Optimizations:** Any changes aimed at improving system performance.
20
+
-**Security Updates:** Any changes related to security, authentication, or authorization.
21
+
-**Maintenance Tasks:** Code cleanup, formatting changes, or routine maintenance.
22
+
-**Architecture Changes:** Any modification to system structure, patterns, or design.
23
+
-**Database Changes:** Schema modifications, query updates, or data migration scripts.
24
+
-**API Changes:** Endpoint modifications, request/response format changes, or protocol updates.
25
+
-**UI/UX Changes:** Any modification to user interface or user experience elements.
26
+
-**Infrastructure Changes:** Deployment, CI/CD, or environment configuration modifications.
0 commit comments