npx claudepluginhub qmu/workaholic --plugin drivinThis skill uses the workspace's default tool permissions.
Step-by-step workflow for implementing a single ticket during /drive. This skill is preloaded directly by the drive command.
IMPORTANT: This workflow implements changes only. Approval and commit are handled by the /drive command after implementation.
If the ticket has a "## Patches" section:
git apply --check <patch-file>git apply <patch-file>If no Patches section exists, skip to step 3.
After implementation is complete, return a summary to the parent command:
{
"status": "pending_approval",
"ticket_path": "<path to ticket>",
"title": "<Title from H1>",
"overview": "<Summary from Overview section>",
"changes": ["<Change 1>", "<Change 2>", "..."],
"repo_url": "<repository URL>"
}
Context: This repository may have multiple contributors (developers, other agents) working concurrently. Uncommitted changes in the working directory may not belong to you.
The following destructive git commands are NEVER allowed during implementation:
| Command | Risk | Alternative |
|---|---|---|
git clean | Deletes untracked files that may belong to other contributors | Do not use |
git checkout . | Discards all uncommitted changes including others' work | Use targeted checkout for specific files |
git restore . | Discards all uncommitted changes including others' work | Reserved for abandonment flow only |
git reset --hard | Discards all uncommitted changes and resets HEAD | Do not use |
git stash drop | Permanently deletes stashed changes | Only with explicit user request |
Rationale: You are not the only one working in this repository. Destructive operations affect everyone's uncommitted work, not just your own implementation. Always check git status before any operation that discards changes, and be considerate of work that may not be yours.
If an implementation requires discarding changes, use targeted commands that affect only specific files you modified, or request user approval first.
Before implementation, check whether the repository authorizes system-wide configuration changes by following the preloaded system-safety skill. Run the detection script and respect the result:
system_changes_authorized is false: the prohibited operations list in the system-safety skill applies unconditionally. Do not install global packages, edit shell profiles, modify /etc/ files, manage system services, or use sudo.system_changes_authorized is true: system-wide changes are permitted because the repository is a provisioning repository.When an implementation step requires a prohibited operation, propose a safe project-local alternative (see the system-safety skill's Safe Alternatives table). If no alternative exists, report the blocker to the user.