Explains verification slots as the core harness framework abstraction for constraints via linters, formatters, deterministic tools, and agent checks. Guides tool integration and enforcement types.
npx claudepluginhub habitat-thinking/ai-literacy-superpowers --plugin ai-literacy-superpowersThis skill uses the workspace's default tool permissions.
The verification slot is the harness framework's core technical
Guides designing constraints for HARNESS.md: writes verifiable rules, selects enforcement types (deterministic/agent/unverified), tools, scopes (commit/PR/weekly/manual), and command risk classifications.
Performs 3-level deep verification (EXISTS, SUBSTANTIVE, WIRED) of completed tasks with fresh evidence only. Use for milestones, PRs, or post-quick-gate audits.
Executes unbiased verification loops via sub-agent: git analysis, build, typecheck, lint, tests with auto-fixes/retries. Invoke /handoff-verify after code changes.
Share bugs, ideas, or general feedback.
The verification slot is the harness framework's core technical abstraction. Every constraint — whether backed by a linter, a formatter, a structural test, or an LLM agent — is checked through the same interface. This uniformity means the rest of the system (hooks, CI, commands) does not care how a constraint is verified.
Input:
Output:
pass or fail{file, line, message} (empty on pass)The harness-enforcer agent reads each constraint from HARNESS.md and
dispatches verification based on the enforcement field:
| Enforcement | What happens |
|---|---|
deterministic | Execute the tool command, interpret exit code |
agent | Read the rule text, review files, produce findings |
deterministic + agent | Run both, merge findings |
unverified | Skip — log as unchecked |
To fill a verification slot with a deterministic tool:
enforcement to
deterministic and tool to the exact command/harness-audit to confirm the tool works in the harness
contextFor detailed integration patterns for common tools (ESLint, Prettier,
gitleaks, ArchUnit, custom scripts), consult
references/tool-integration.md.
When no deterministic tool exists, the enforcer reads the constraint's prose rule and reviews code against it. The output format is identical to deterministic verification — pass/fail with file:line findings.
Agent-based checks are:
Some constraints benefit from both levels. For example, a linter checks that doc comments exist (deterministic presence check) while the agent reviews that comments explain reasoning rather than restating signatures (quality check).
Use deterministic + agent in the enforcement field and list both tools.
references/tool-integration.md — Step-by-step integration
patterns for linters, formatters, type checkers, secret scanners,
structural test frameworks, and custom scripts