Comprehensive artifact analysis with reviewer-friendly output mode. Consolidates checklist and analyze functionality.
Analyzes feature artifacts for completeness, consistency, and alignment with project constitution.
/plugin marketplace add deepeshBodh/human-in-loop/plugin install deepeshbodh-humaninloop-plugins-humaninloop@deepeshBodh/human-in-loopComprehensive analysis of feature artifacts with two output modes:
--review): Scannable summary for peer reviewers$ARGUMENTS
Parse $ARGUMENTS for:
--review: Enable review mode (scannable summary output)--full: Explicit full mode (default behavior)--security, --ux, --api, --performance: Domain filtersIf $ARGUMENTS is empty, proceed with full mode on auto-detected feature.
If $ARGUMENTS is empty (blank string with no content), use AskUserQuestion to handle a known Claude Code bug where inputs containing @ file references don't reach plugin commands:
AskUserQuestion(
questions: [{
question: "Known Issue: Input may have been lost\n\nClaude Code has a bug where inputs containing @ file references don't reach plugin commands.\n\nWould you like to re-enter your input?",
header: "Input",
options: [
{label: "Re-enter input", description: "I'll type my input in the terminal"},
{label: "Continue without input", description: "Proceed with auto-detected feature"}
],
multiSelect: false
}]
)
STRICTLY READ-ONLY: Do not modify any files. Output analysis report only.
Constitution Authority: The project constitution (.humaninloop/memory/constitution.md) is non-negotiable. Constitution conflicts are automatically CRITICAL severity.
Run ${CLAUDE_PLUGIN_ROOT}/scripts/check-prerequisites.sh --json from repo root and parse JSON for:
FEATURE_DIR: Active feature directoryAVAILABLE_DOCS: List of available artifactsDerive absolute paths for artifacts that exist:
No artifacts required: Unlike analyze, this command works on whatever exists.
For single quotes in args, use escape syntax: e.g., 'I'\''m Groot' (or double-quote: "I'm Groot").
Load .humaninloop/memory/constitution.md if it exists:
If constitution doesn't exist, note this in output but continue.
For each artifact that exists, load relevant sections:
From spec.md:
From plan.md / research.md / data-model.md:
From tasks.md:
From contracts/:
Use existing skills for artifact-specific validation:
If spec.md exists, apply analysis-specifications skill criteria:
If plan artifacts exist, apply validation-plan-artifacts skill criteria:
If tasks.md exists, apply validation-task-artifacts skill criteria:
Run these detection passes across all artifacts:
| Pass | Description |
|---|---|
| Duplication | Near-duplicate requirements across files |
| Ambiguity | Vague terms without measurable criteria (fast, scalable, secure, intuitive) |
| Underspecification | Requirements with verbs but missing outcomes |
| Constitution Alignment | Violations of MUST principles |
| Coverage Gaps | Requirements with no corresponding tasks |
| Inconsistency | Terminology drift, entity mismatches, conflicting statements |
Assign severity to each finding:
| Severity | Definition |
|---|---|
| CRITICAL | Blocks progress: constitution violation, missing core artifact, zero-coverage requirement |
| HIGH | Significant gap: duplicate/conflicting requirement, untestable criterion |
| MEDIUM | Quality issue: terminology drift, missing NFR coverage, underspecified edge case |
| LOW | Polish: wording improvements, minor redundancy |
Output format depends on mode:
--review)Scannable summary for peer reviewers:
# Audit Summary: {feature-id}
**Mode**: Review | **Generated**: {date}
**Artifacts**: {list with checkmarks}
---
## Coverage
| Category | Status | Count | Reference |
|----------|--------|-------|-----------|
| User Stories | {status} | {n/total} | Spec US |
| Functional Reqs | {status} | {n/total} | Spec FR |
| Non-Functional | {status} | {n/total} | Spec NFR |
| Edge Cases | {status} | {n/total} | Spec EC |
| Task Coverage | {status} | {n/total} | Tasks |
Status key: ✓ Complete | ⚠ Partial | ✗ Gaps
---
## Flagged Issues ({count})
| ID | Severity | Issue | Location |
|----|----------|-------|----------|
{top issues, max 10}
---
## Metrics
- **Coverage**: {pct}% ({covered}/{total} requirements with tasks)
- **Critical Issues**: {count}
- **Important Issues**: {count}
- **Minor Issues**: {count}
---
## Recommendation
{verdict with one-line rationale}
Verdict options:
Ready for review - No critical/high issuesReview with caution - Has high-severity issues to noteNot ready - Has critical issues blocking progressDetailed diagnostics for authors/maintainers:
# Audit Report: {feature-id}
**Mode**: Full | **Generated**: {date}
**Artifacts Analyzed**: {list}
---
## Findings
| ID | Category | Severity | Location(s) | Summary | Recommendation |
|----|----------|----------|-------------|---------|----------------|
{all findings, max 50}
---
## Coverage Summary
| Requirement | Has Task? | Task IDs | Notes |
|-------------|-----------|----------|-------|
{coverage mapping}
---
## Constitution Alignment
{issues or "No violations detected"}
---
## Unmapped Items
**Requirements without tasks:**
{list or "None"}
**Tasks without requirements:**
{list or "None"}
---
## Metrics
- Total Requirements: {count}
- Total Tasks: {count}
- Coverage: {pct}%
- Findings by Severity:
- Critical: {count}
- High: {count}
- Medium: {count}
- Low: {count}
---
## Next Actions
{prioritized recommendations based on findings}
When domain filter is specified (--security, --ux, --api, --performance):
| Filter | Focus Areas |
|---|---|
--security | Auth, permissions, data protection, input validation, secrets |
--ux | User flows, error messages, accessibility, responsiveness |
--api | Endpoints, schemas, error handling, versioning, rate limits |
--performance | Latency, throughput, caching, optimization, load handling |
After full mode output, offer remediation:
AskUserQuestion(
questions: [{
question: "Would you like suggestions for resolving the top issues?",
header: "Remediation",
options: [
{label: "Yes", description: "Show concrete fix suggestions"},
{label: "No", description: "I'll handle it myself"}
],
multiSelect: false
}]
)
If yes, provide specific remediation suggestions for top 5 issues. Do NOT apply changes automatically.
/humaninloop:audit --review
Output: Scannable coverage summary with flagged issues for PR review.
/humaninloop:audit --security
Output: Detailed security-focused analysis with all findings.
/humaninloop:audit --review --ux
Output: UX-focused coverage summary for design review.
This command consolidates functionality that was previously split across two commands:
audit --reviewaudit (default mode)