Skip to content

Workflow Quick Reference

Quick reference for the Floe repository workflow with Specwright quality gates and automation.

Design: /sw-design -> approve design
Plan: /sw-plan -> work units with acceptance criteria
Build: /sw-build -> TDD implementation, commit per task
Verify: /sw-verify -> fix findings -> re-verify
Ship: /sw-ship -> PR with evidence
CommandPurpose
/sw-designResearch codebase, design solution
/sw-planBreak design into work units with specs
/sw-buildTDD implementation of next work unit
/sw-verifyRun quality gates (tests, security, wiring, spec)
/sw-shipCreate PR with gate evidence
/sw-statusCheck current work state and gate results
/sw-auditPeriodic codebase health check
AgentModelPurposeInvocation
test-requirement-mapperSonnet@requirement coverage, gap analysisPre-PR
test-design-reviewerOpusTest architecture, patterns, maintainabilityManual/Full review
test-debt-analyzerSonnetConsolidated test debt analysisPre-PR
AgentModelPurposeInvocation
code-pattern-reviewerSonnetModule anti-patterns, refactoringPre-PR
security-scannerSonnetOWASP, secrets, injectionPre-PR
dead-code-detectorSonnetUnused code, orphaned filesPre-PR
performance-debt-detectorSonnetN+1, O(n²), sync in asyncPre-PR
AgentModelPurposeInvocation
plugin-qualityOpus14 Floe plugin categories testingPre-PR
contract-stabilityOpusCompiledArtifacts contractPre-PR
criticOpusRuthless plan/implementation reviewerPre-PR (blocking)
docker-log-analyserSonnetContext-efficient container logsOn demand
helm-debuggerSonnetContext-efficient K8s debuggingOn demand

Gate results are tracked in .specwright/state/workflow.json:

GateWhat It Checks
gate-buildBuild and test commands pass
gate-testsTest quality, assertion strength, mock discipline
gate-securitySecrets, injection, sensitive data
gate-wiringUnused exports, orphaned files, layer violations
gate-specEvery acceptance criterion has evidence
Terminal window
# Run all gates
/sw-verify
# Check gate status
/sw-status
Terminal window
# Architecture drift detection (runs automatically via hook)
./scripts/check-architecture-drift [file]
# Pre-PR quality gate (runs automatically before gh pr create)
./scripts/pre-pr-gate
# Invoke specific agent
./scripts/invoke-agent test-requirement-mapper tests/unit/test_compiler.py
# Generate contract golden files
./scripts/generate-contract-golden [--force]

When you edit/write Python files, these run automatically:

  • Black formatting (100 char line length)
  • isort import sorting
  • Architecture drift detection

When you run gh pr create:

  • Pre-PR quality gate runs
  • Must have passing Specwright gates (/sw-verify)
  • Must have critic OKAY verdict
TierModelWhen Used
LOWHaikuFast, focused analysis (single file)
MEDIUMSonnetModule analysis, cross-file patterns
HIGHOpusArchitecture review, critic decisions

Run the quality gates:

Terminal window
/sw-verify

Check the violation, fix the code:

Terminal window
./scripts/check-architecture-drift path/to/file.py

Common violations:

  • SQL parsing outside dbt package
  • Layer 4 modifying Layer 2 configuration
  • Direct FloeSpec usage outside floe-core

Review the critic’s findings:

  1. Address all CRITICAL issues
  2. Verify claims in the plan
  3. Add missing edge cases
  4. Re-run critic
FilePurpose
.specwright/state/workflow.jsonWork unit state and gate results
.specwright/work/{id}/Design, spec, plan, evidence per work unit
tests/fixtures/golden/Contract baselines

Contributor agent configuration is internal to repository development and is not part of the Floe product interface.

  • Testing standards: TESTING.md
  • Architecture: docs/architecture/
  • Constitution: .specify/memory/constitution.md