slash-command-encoder
Design and route slash-command workflows with clear schemas, safety rails, and validated handoffs.
$ 安裝
git clone https://github.com/DNYoussef/context-cascade /tmp/context-cascade && cp -r /tmp/context-cascade/skills/orchestration/slash-command-encoder ~/.claude/skills/context-cascade// tip: Run this command in your terminal to install the skill
name: slash-command-encoder description: Design and route slash-command workflows with clear schemas, safety rails, and validated handoffs. allowed-tools: Read, Write, Edit, Bash, Glob, Grep, Task, TodoWrite model: sonnet x-version: 3.2.0 x-category: orchestration x-vcl-compliance: v3.2.0 x-cognitive-frames:
- HON
- MOR
- COM
- CLS
- EVD
- ASP
- SPC
STANDARD OPERATING PROCEDURE
Purpose
Create reliable slash-command experiences that encode intent, validate payloads, and orchestrate downstream actions with evidence-backed safety.
Trigger Conditions
- Positive: defining new commands, updating schemas, routing commands to agents, permissioning, or adding validation/telemetry.
- Negative: generic prompt tweaks (route to prompt-architect) or new skill weaving (route to skill-forge).
Guardrails
- Skill-Forge structure-first: maintain
SKILL.md,examples/,tests/; addresources/andreferences/or log remediation tasks. - Prompt-Architect hygiene: capture HARD/SOFT/INFERRED constraints (permissions, rate limits), keep English-only outputs, and state ceilings for confidence.
- Command safety: validate schemas, enforce authz/authn, rate limits, and idempotency; use registry-approved agents and honor hook latency budgets.
- Adversarial validation: fuzz inputs, test auth failures, and simulate replay attacks; capture evidence.
- MCP tagging: store command specs under WHO=
slash-command-encoder-{session}and WHY=skill-execution.
Execution Playbook
- Intent & scope: define command purpose, permissions, and constraints; confirm inferred rules.
- Schema design: draft payloads, defaults, validation rules, and error messages.
- Routing: map commands to agents/actions, set retries/backoff, and logging/telemetry paths.
- Safety nets: apply authz/authn, rate limits, idempotency keys, and rollback behavior.
- Validation loop: fuzz and negative tests, latency checks, and audit logging; store evidence.
- Delivery: share command spec, routing, risks, and confidence ceiling.
Output Format
- Command summary (intent, permissions, payload schema).
- Routing plan, telemetry, and safety measures.
- Validation evidence (fuzz, auth, replay) and risk register.
- Confidence:
X.XX (ceiling: TYPE Y.YY) - rationale.
Validation Checklist
- Structure-first assets present or ticketed; examples/tests aligned to schema and routing.
- Authz/rate limits/idempotency validated; registry and hooks healthy.
- Adversarial/COV runs logged with MCP tags; confidence ceiling declared; English-only output.
Completion Definition
Command is production-ready when schemas pass validation, routing is tested, risks are owned, and evidence is stored with MCP tags.
Confidence: 0.70 (ceiling: inference 0.70) - Slash-command SOP rewritten with skill-forge scaffolding and prompt-architect clarity plus explicit confidence ceilings.
Repository
