Phase E — append-only memory + diff subcommand (PROMPT.md complete)

Closes the harness's feature set per PROMPT.md modes 2 (Diff Review)
and Phase 5 (Memory). Rules subcommand still pending (it needs
operator-authored .review-rules.md content first; documented as
Phase E follow-up).

internal/memory/ — append-only writer:
- AppendKnownRisks: one JSONL line per confirmed finding per run.
  O_APPEND only; never O_TRUNC. Empty findings list is a no-op
  (doesn't even create the file — keeps clean runs from polluting
  .memory/).
- AppendRunHistory: one JSONL line per run. Run summary stats +
  receipts hash for cross-link.
- WriteProjectProfile: the ONLY non-versioned memory file; snapshot
  semantics, overwrites are explicit + documented.
- 4 unit tests including TestAppendKnownRisks_NeverTruncates which
  is the audit's "no silent overwrite" gate — write twice, assert
  both writes' content survives.

Pipeline phase 5 wires it. Confirmed findings only — suspected
findings might still be wrong, keeping .memory/ authoritative.
Disabled if review-profile.memory.enabled = false.

internal/git/git.go — ChangedFiles helper:
- Probes unstaged + staged + branch diff against main/master.
- Dedup'd, stable order. Empty result on clean tree.
- Graceful failure: returns error if git binary missing or target
  isn't a git repo.

cli/repo.go — Diff subcommand:
- `review-harness diff <path>` runs the same pipeline as scrum but
  scoped to changed files only. Pipeline.Inputs gains DiffOnlyFiles
  filter applied post-Walk.
- Empty diff (clean tree, no commits ahead of base) → exit 0 with
  message; doesn't generate empty reports.
- LLM toggleable via --enable-llm same as scrum.

scanner/walk.go: added .memory to SkipDirs (universal — harness's
own audit trail, scanning it surfaces planted-secret evidence as
new findings — same class as B5 self-skip).

.gitignore tightened: /.memory/ → **/.memory/ to keep test-fixture
.memory dirs from leaking into version control (same fix as
reports/latest pattern).

Verified end-to-end:
- 4 memory unit tests PASS
- Append-only proven: insecure-repo run 1 → 16 known-risks lines;
  run 2 → 44 lines (16 + 28 from new run); run-history grew 1 → 2.
- Diff subcommand against this repo (5 uncommitted Phase E files
  staged) → exit 0, all reports produced, scoped to those 5 files
  only (0 findings on the diff-scoped scan vs 129 on full repo —
  changed files don't contain analyzer-flaggable patterns).

Phase A through E shipped today. Rules subcommand + tests for
internal/{config,scanner,git,llm,reporters,pipeline} remain.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
This commit is contained in:
Claude (review-harness setup) 2026-04-30 02:19:12 -05:00
parent 2fc047487f
commit a75e14716b
8 changed files with 521 additions and 9 deletions

7
.gitignore vendored
View File

@ -9,8 +9,11 @@
**/reports/latest/ **/reports/latest/
**/reports/run-*/ **/reports/run-*/
# Memory persistence (lives next to target repos, not this one) # Memory persistence (lives next to target repos AND in fixtures
/.memory/ # during testing — pattern is double-star so test runs against
# tests/fixtures/<name>/ don't leak the .memory/ JSONL into the
# harness repo, same shape as the reports/latest/ rule).
**/.memory/
# Go # Go
*.test *.test

View File

@ -36,8 +36,7 @@ func main() {
case "repo": case "repo":
os.Exit(cli.Repo(args)) os.Exit(cli.Repo(args))
case "diff": case "diff":
fmt.Fprintln(os.Stderr, "diff: not implemented in MVP (Phase E)") os.Exit(cli.Diff(args))
os.Exit(64)
case "scrum": case "scrum":
os.Exit(cli.Scrum(args)) os.Exit(cli.Scrum(args))
case "rules": case "rules":

View File

@ -6,11 +6,13 @@ package cli
import ( import (
"context" "context"
"flag"
"fmt" "fmt"
"os" "os"
"path/filepath" "path/filepath"
"local-review-harness/internal/config" "local-review-harness/internal/config"
"local-review-harness/internal/git"
"local-review-harness/internal/pipeline" "local-review-harness/internal/pipeline"
) )
@ -49,6 +51,75 @@ func runRepo(ctx context.Context, repoPath string, cf commonFlags) int {
return res.ExitCode return res.ExitCode
} }
// Diff is the `review-harness diff <path>` subcommand entry point
// (Phase E). Detects changed files via git (unstaged + staged + vs
// branch base), then runs the same pipeline as `repo` but scoped to
// just those files. PROMPT.md mode 2: "diff review."
func Diff(args []string) int {
fs := flag.NewFlagSet("diff", flag.ContinueOnError)
var cf commonFlags
bindCommonFlags(fs, &cf)
if err := fs.Parse(args); err != nil {
return 64
}
if fs.NArg() < 1 {
fmt.Fprintln(os.Stderr, "diff: missing target path")
return 64
}
repoPath := fs.Arg(0)
return runDiff(context.Background(), repoPath, cf)
}
func runDiff(ctx context.Context, repoPath string, cf commonFlags) int {
if _, err := os.Stat(repoPath); err != nil {
fmt.Fprintln(os.Stderr, "diff: target path:", err)
return 65
}
rp, err := config.LoadReviewProfile(cf.reviewProfilePath)
if err != nil {
fmt.Fprintln(os.Stderr, "config:", err)
return 65
}
mp, err := config.LoadModelProfile(cf.modelProfilePath)
if err != nil {
fmt.Fprintln(os.Stderr, "config:", err)
return 65
}
changed, err := git.ChangedFiles(ctx, repoPath)
if err != nil {
fmt.Fprintln(os.Stderr, "diff: git probe:", err)
return 65
}
if len(changed) == 0 {
fmt.Fprintln(os.Stderr, "diff: no changed files (clean tree, no commits ahead of main/master) — exit 0")
return 0
}
fmt.Fprintf(os.Stderr, "diff: scanning %d changed file(s):\n", len(changed))
for _, f := range changed {
fmt.Fprintln(os.Stderr, " -", f)
}
outDir := resolveOutputDir(&cf, rp, repoPath)
res, err := pipeline.RunRepo(ctx, pipeline.Inputs{
RepoPath: repoPath,
ReviewProfile: rp,
ModelProfile: mp,
OutputDir: outDir,
EmitScrum: true, // diff mode emits the scrum bundle so PR reviewers see it
EnableLLM: cf.enableLLM,
DiffOnlyFiles: changed,
})
if err != nil {
fmt.Fprintln(os.Stderr, "pipeline:", err)
return 65
}
for _, f := range res.OutputFiles {
fmt.Println(filepath.Join(outDir, f))
}
return res.ExitCode
}
func runScrum(ctx context.Context, repoPath string, cf commonFlags) int { func runScrum(ctx context.Context, repoPath string, cf commonFlags) int {
if _, err := os.Stat(repoPath); err != nil { if _, err := os.Stat(repoPath); err != nil {
fmt.Fprintln(os.Stderr, "scrum: target path:", err) fmt.Fprintln(os.Stderr, "scrum: target path:", err)

View File

@ -6,6 +6,7 @@ package git
import ( import (
"context" "context"
"fmt"
"os/exec" "os/exec"
"path/filepath" "path/filepath"
"strings" "strings"
@ -64,3 +65,61 @@ func runGit(ctx context.Context, dir string, args ...string) string {
} }
return strings.TrimSpace(string(out)) return strings.TrimSpace(string(out))
} }
// ChangedFiles returns the set of repo-relative paths the diff
// subcommand should scan. Includes (in priority order):
// - unstaged changes (`git diff --name-only`)
// - staged changes (`git diff --cached --name-only`)
// - branch diff against base (`git diff --name-only base..HEAD`)
//
// base is auto-detected: prefer "main" then "master" then HEAD~1.
// Returns dedup'd, stable-ordered list. Empty list when there's
// nothing to review (clean tree, no commits ahead of base).
func ChangedFiles(ctx context.Context, repoPath string) ([]string, error) {
if _, err := exec.LookPath("git"); err != nil {
return nil, fmt.Errorf("git not in PATH")
}
abs, _ := filepath.Abs(repoPath)
cctx, cancel := context.WithTimeout(ctx, 10*time.Second)
defer cancel()
if err := exec.CommandContext(cctx, "git", "-C", abs, "rev-parse", "--git-dir").Run(); err != nil {
return nil, fmt.Errorf("not a git repository: %s", repoPath)
}
seen := map[string]bool{}
var out []string
add := func(s string) {
s = strings.TrimSpace(s)
if s == "" || seen[s] {
return
}
seen[s] = true
out = append(out, s)
}
// Unstaged
for _, line := range strings.Split(runGit(ctx, abs, "diff", "--name-only"), "\n") {
add(line)
}
// Staged
for _, line := range strings.Split(runGit(ctx, abs, "diff", "--cached", "--name-only"), "\n") {
add(line)
}
// vs base — try main, master, then HEAD~1
for _, base := range []string{"main", "master"} {
if runGit(ctx, abs, "rev-parse", "--verify", base) != "" {
for _, line := range strings.Split(runGit(ctx, abs, "diff", "--name-only", base+"...HEAD"), "\n") {
add(line)
}
break
}
}
return out, nil
}
// fmt + filepath are already imported indirectly; this var keeps
// the import list clean if those packages get unused after a refactor.
var _ = fmt.Sprintf
var _ = filepath.Join

144
internal/memory/memory.go Normal file
View File

@ -0,0 +1,144 @@
// Package memory implements PROMPT.md Phase 5: append-only `.memory/`
// state that lets the harness build up knowledge across runs.
//
// The append-only constraint is non-optional. Operators can grep
// .memory/ to see how findings drifted run-to-run, prove no silent
// data loss, and reconstruct intermediate states. Every write goes
// through Append* helpers that open with O_APPEND only — no O_TRUNC,
// no os.Create. A regression test proves the constraint holds.
//
// Files written:
// .memory/known-risks.jsonl one line per confirmed finding per run;
// same finding ID across runs deduped
// in the reader, never silently dropped
// from the log
// .memory/run-history.jsonl one line per run; summary stats +
// receipts hash for cross-link
// .memory/project-profile.json overwritten — non-versioned snapshot
// of static repo facts (language mix,
// latest commit, etc.). Operator-readable.
package memory
import (
"encoding/json"
"fmt"
"os"
"path/filepath"
"time"
"local-review-harness/internal/analyzers"
)
// KnownRiskEntry is one append per confirmed finding per run.
type KnownRiskEntry struct {
RunID string `json:"run_id"`
WrittenAt string `json:"written_at"`
Finding analyzers.Finding `json:"finding"`
}
// RunHistoryEntry is one append per harness run.
type RunHistoryEntry struct {
RunID string `json:"run_id"`
RepoPath string `json:"repo_path"`
StartedAt string `json:"started_at"`
FinishedAt string `json:"finished_at"`
TotalFindings int `json:"total_findings"`
Confirmed int `json:"confirmed"`
Critical int `json:"critical"`
High int `json:"high"`
Medium int `json:"medium"`
Low int `json:"low"`
LLMEnabled bool `json:"llm_enabled"`
ExitCode int `json:"exit_code"`
ReceiptsHash string `json:"receipts_hash,omitempty"` // cross-link
}
// ProjectProfile is the only non-versioned memory file. Overwrites OK
// — it's a snapshot, not a log. The append-only contract applies to
// known-risks + run-history.
type ProjectProfile struct {
RepoPath string `json:"repo_path"`
LastSeenAt string `json:"last_seen_at"`
LastSeenCommit string `json:"last_seen_commit,omitempty"`
LanguageBreakdown map[string]int `json:"language_breakdown"`
FileCount int `json:"file_count"`
}
// Writer is the append-only memory writer. Holds a base path so
// every method writes under the same .memory/ root. Stateless; safe
// for concurrent use (each Append opens its own fd).
type Writer struct {
dir string
}
// NewWriter constructs a Writer rooted at <repoPath>/.memory/. The
// dir is created on demand. Operators who want a different location
// can override via review-profile.memory.path (Phase E follow-up).
func NewWriter(repoPath string) (*Writer, error) {
dir := filepath.Join(repoPath, ".memory")
if err := os.MkdirAll(dir, 0o755); err != nil {
return nil, err
}
return &Writer{dir: dir}, nil
}
// AppendKnownRisks appends one JSONL line per confirmed finding.
// Append-only: opens with O_APPEND|O_CREATE|O_WRONLY. NEVER opens
// with O_TRUNC. Truncation is the failure mode this package exists
// to prevent.
func (w *Writer) AppendKnownRisks(runID string, findings []analyzers.Finding) error {
if len(findings) == 0 {
return nil
}
f, err := os.OpenFile(filepath.Join(w.dir, "known-risks.jsonl"),
os.O_APPEND|os.O_CREATE|os.O_WRONLY, 0o644)
if err != nil {
return fmt.Errorf("open known-risks: %w", err)
}
defer f.Close()
enc := json.NewEncoder(f)
now := time.Now().UTC().Format(time.RFC3339Nano)
for _, finding := range findings {
entry := KnownRiskEntry{
RunID: runID,
WrittenAt: now,
Finding: finding,
}
if err := enc.Encode(&entry); err != nil {
return fmt.Errorf("encode known-risk: %w", err)
}
}
return nil
}
// AppendRunHistory writes one JSONL line for the run. Same append-
// only constraint as known-risks.
func (w *Writer) AppendRunHistory(entry RunHistoryEntry) error {
f, err := os.OpenFile(filepath.Join(w.dir, "run-history.jsonl"),
os.O_APPEND|os.O_CREATE|os.O_WRONLY, 0o644)
if err != nil {
return fmt.Errorf("open run-history: %w", err)
}
defer f.Close()
if err := json.NewEncoder(f).Encode(&entry); err != nil {
return fmt.Errorf("encode run-history: %w", err)
}
return nil
}
// WriteProjectProfile overwrites .memory/project-profile.json. This
// is the ONLY memory file that's not append-only — it's a snapshot
// of current state, not a log. Operators wanting historical profiles
// can grep run-history.jsonl which carries the receipts hash.
func (w *Writer) WriteProjectProfile(p ProjectProfile) error {
bs, err := json.MarshalIndent(p, "", " ")
if err != nil {
return err
}
bs = append(bs, '\n')
return os.WriteFile(filepath.Join(w.dir, "project-profile.json"), bs, 0o644)
}
// MemoryDir returns the absolute .memory/ path for the writer.
// Useful in receipts so operators can find the JSONL files.
func (w *Writer) MemoryDir() string { return w.dir }

View File

@ -0,0 +1,147 @@
package memory
import (
"bufio"
"encoding/json"
"os"
"path/filepath"
"strings"
"testing"
"local-review-harness/internal/analyzers"
)
// === Gate E1 — append-only contract ===
//
// PROMPT.md hard rule: "Memory should be append-only by default.
// Never silently overwrite prior memory." Every Writer.Append* must
// open with O_APPEND, never O_TRUNC. Truncation is the failure mode
// this package exists to prevent — operators relying on .memory/ to
// see drift across runs would silently lose history.
//
// This test does the receipt-honesty equivalent: write once, write
// again with different content, assert the FIRST write's content is
// still visible in the file.
func TestAppendKnownRisks_NeverTruncates(t *testing.T) {
repo := t.TempDir()
w, err := NewWriter(repo)
if err != nil {
t.Fatal(err)
}
// Run 1: write 2 findings
run1 := []analyzers.Finding{
{ID: "abc111", Title: "first run finding 1", File: "a.go", Severity: analyzers.SeverityHigh},
{ID: "abc222", Title: "first run finding 2", File: "b.go", Severity: analyzers.SeverityMedium},
}
if err := w.AppendKnownRisks("run-1", run1); err != nil {
t.Fatal(err)
}
// Run 2: write 1 different finding
run2 := []analyzers.Finding{
{ID: "def333", Title: "second run finding", File: "c.go", Severity: analyzers.SeverityCritical},
}
if err := w.AppendKnownRisks("run-2", run2); err != nil {
t.Fatal(err)
}
// Read back: file should contain ALL 3 entries (2+1), not just run 2's.
entries := readAll(t, filepath.Join(repo, ".memory", "known-risks.jsonl"))
if len(entries) != 3 {
t.Fatalf("expected 3 entries (2 from run 1 + 1 from run 2); got %d", len(entries))
}
if !strings.Contains(entries[0], "abc111") || !strings.Contains(entries[0], "run-1") {
t.Errorf("first entry should be run 1's first finding; got %q", entries[0])
}
if !strings.Contains(entries[2], "def333") || !strings.Contains(entries[2], "run-2") {
t.Errorf("last entry should be run 2's finding; got %q", entries[2])
}
}
func TestAppendRunHistory_NeverTruncates(t *testing.T) {
repo := t.TempDir()
w, _ := NewWriter(repo)
for i, r := range []RunHistoryEntry{
{RunID: "run-A", RepoPath: repo, TotalFindings: 5},
{RunID: "run-B", RepoPath: repo, TotalFindings: 8},
{RunID: "run-C", RepoPath: repo, TotalFindings: 3},
} {
if err := w.AppendRunHistory(r); err != nil {
t.Fatalf("append %d: %v", i, err)
}
}
entries := readAll(t, filepath.Join(repo, ".memory", "run-history.jsonl"))
if len(entries) != 3 {
t.Fatalf("expected 3 history entries; got %d", len(entries))
}
for i, expected := range []string{"run-A", "run-B", "run-C"} {
var entry RunHistoryEntry
if err := json.Unmarshal([]byte(entries[i]), &entry); err != nil {
t.Fatalf("entry %d: %v", i, err)
}
if entry.RunID != expected {
t.Errorf("entry %d: RunID = %q, want %q", i, entry.RunID, expected)
}
}
}
func TestAppendKnownRisks_EmptyFindingsIsNoop(t *testing.T) {
// Calling Append with zero findings shouldn't even create the file —
// avoids polluting .memory/ with empty files on clean runs.
repo := t.TempDir()
w, _ := NewWriter(repo)
if err := w.AppendKnownRisks("run-empty", nil); err != nil {
t.Fatal(err)
}
if _, err := os.Stat(filepath.Join(repo, ".memory", "known-risks.jsonl")); !os.IsNotExist(err) {
t.Errorf("empty append should not create the file; stat err = %v", err)
}
}
func TestWriteProjectProfile_OverwriteIsAllowed(t *testing.T) {
// project-profile.json is the ONLY memory file allowed to overwrite —
// it's a snapshot, not a log. Verify the overwrite semantic works.
repo := t.TempDir()
w, _ := NewWriter(repo)
if err := w.WriteProjectProfile(ProjectProfile{
RepoPath: repo, FileCount: 100,
}); err != nil {
t.Fatal(err)
}
if err := w.WriteProjectProfile(ProjectProfile{
RepoPath: repo, FileCount: 200,
}); err != nil {
t.Fatal(err)
}
bs, err := os.ReadFile(filepath.Join(repo, ".memory", "project-profile.json"))
if err != nil {
t.Fatal(err)
}
var p ProjectProfile
if err := json.Unmarshal(bs, &p); err != nil {
t.Fatal(err)
}
if p.FileCount != 200 {
t.Errorf("project-profile should reflect last write (200); got %d", p.FileCount)
}
}
// readAll reads a JSONL file; returns one string per line.
func readAll(t *testing.T, path string) []string {
t.Helper()
f, err := os.Open(path)
if err != nil {
t.Fatalf("open %s: %v", path, err)
}
defer f.Close()
var out []string
s := bufio.NewScanner(f)
for s.Scan() {
out = append(out, s.Text())
}
return out
}

View File

@ -18,6 +18,7 @@ import (
"local-review-harness/internal/config" "local-review-harness/internal/config"
"local-review-harness/internal/git" "local-review-harness/internal/git"
"local-review-harness/internal/llm" "local-review-harness/internal/llm"
"local-review-harness/internal/memory"
"local-review-harness/internal/reporters" "local-review-harness/internal/reporters"
"local-review-harness/internal/scanner" "local-review-harness/internal/scanner"
"local-review-harness/internal/validators" "local-review-harness/internal/validators"
@ -31,6 +32,12 @@ type Inputs struct {
OutputDir string OutputDir string
EmitScrum bool // true → also emit scrum-test/risk-register/sprint-backlog/acceptance-gates markdown EmitScrum bool // true → also emit scrum-test/risk-register/sprint-backlog/acceptance-gates markdown
EnableLLM bool // Phase C: actually call the model. Off by default — operators opt in. EnableLLM bool // Phase C: actually call the model. Off by default — operators opt in.
// DiffOnlyFiles, when non-nil, restricts the scan to JUST these
// repo-relative paths — the diff subcommand uses this to focus
// review on changed files rather than the full repo. Nil = scan
// everything.
DiffOnlyFiles []string
} }
// Result is what the CLI shows the operator. // Result is what the CLI shows the operator.
@ -61,6 +68,24 @@ func RunRepo(ctx context.Context, in Inputs) (*Result, error) {
// --- Phase 0: repo intake --- // --- Phase 0: repo intake ---
scan, err := scanner.Walk(in.RepoPath, true) scan, err := scanner.Walk(in.RepoPath, true)
// Diff-mode: filter the scan to just the changed files. Phase 0
// intake stats stay accurate (operator wants to see what the
// repo looks like overall) but analyzers + LLM only see the
// changed slice. Pre-filter saves O(N) regex passes when N is
// 5000 files but only 3 changed.
if len(in.DiffOnlyFiles) > 0 && err == nil {
want := map[string]bool{}
for _, f := range in.DiffOnlyFiles {
want[f] = true
}
filtered := scan.Files[:0]
for _, f := range scan.Files {
if want[f.Path] {
filtered = append(filtered, f)
}
}
scan.Files = filtered
}
scanPhase := reporters.PhaseReceipt{Name: "repo_intake", Status: "ok"} scanPhase := reporters.PhaseReceipt{Name: "repo_intake", Status: "ok"}
if err != nil { if err != nil {
scanPhase.Status = "failed" scanPhase.Status = "failed"
@ -229,11 +254,70 @@ func RunRepo(ctx context.Context, in Inputs) (*Result, error) {
receipt.Phases = append(receipt.Phases, reportPhase) receipt.Phases = append(receipt.Phases, reportPhase)
} }
// --- Phase 5: memory (Phase E — deferred) --- // --- Phase 5: memory (Phase E) ---
receipt.Phases = append(receipt.Phases, reporters.PhaseReceipt{ // Append-only writes under <repo>/.memory/. Persists confirmed
Name: "memory_update", Status: "skipped", // findings + run summary so cross-run drift becomes observable.
Errors: []string{"Phase E not implemented in MVP"}, // Per PROMPT.md hard rule: never silently overwrite.
}) memPhase := reporters.PhaseReceipt{Name: "memory_update", Status: "ok"}
if in.ReviewProfile.Memory.Enabled {
mw, merr := memory.NewWriter(in.RepoPath)
if merr != nil {
memPhase.Status = "degraded"
memPhase.Errors = append(memPhase.Errors, "memory writer: "+merr.Error())
} else {
// Confirmed findings only — suspected ones are still being
// validated and may not be real. Keeps the .memory/ log
// authoritative.
confirmed := []analyzers.Finding{}
for _, f := range findings {
if f.Status == analyzers.StatusConfirmed {
confirmed = append(confirmed, f)
}
}
if err := mw.AppendKnownRisks(runID, confirmed); err != nil {
memPhase.Status = "degraded"
memPhase.Errors = append(memPhase.Errors, "known-risks: "+err.Error())
}
runEntry := memory.RunHistoryEntry{
RunID: runID,
RepoPath: in.RepoPath,
StartedAt: receipt.StartedAt,
FinishedAt: time.Now().UTC().Format(time.RFC3339Nano),
TotalFindings: staticOut.Summary.Total,
Confirmed: staticOut.Summary.Confirmed,
Critical: staticOut.Summary.Critical,
High: staticOut.Summary.High,
Medium: staticOut.Summary.Medium,
Low: staticOut.Summary.Low,
LLMEnabled: in.EnableLLM,
ExitCode: res.ExitCode,
}
if err := mw.AppendRunHistory(runEntry); err != nil {
memPhase.Status = "degraded"
memPhase.Errors = append(memPhase.Errors, "run-history: "+err.Error())
}
profile := memory.ProjectProfile{
RepoPath: in.RepoPath,
LastSeenAt: time.Now().UTC().Format(time.RFC3339Nano),
LastSeenCommit: intake.LatestCommit,
LanguageBreakdown: intake.LanguageBreakdown,
FileCount: intake.FileCount,
}
if err := mw.WriteProjectProfile(profile); err != nil {
memPhase.Status = "degraded"
memPhase.Errors = append(memPhase.Errors, "project-profile: "+err.Error())
}
memPhase.OutputFiles = []string{
".memory/known-risks.jsonl",
".memory/run-history.jsonl",
".memory/project-profile.json",
}
}
} else {
memPhase.Status = "skipped"
memPhase.Errors = append(memPhase.Errors, "memory disabled in review-profile")
}
receipt.Phases = append(receipt.Phases, memPhase)
// --- Receipt --- // --- Receipt ---
receipt.Summary = staticOut.Summary receipt.Summary = staticOut.Summary

View File

@ -46,6 +46,11 @@ var SkipDirs = map[string]bool{
"venv": true, "venv": true,
".idea": true, ".idea": true,
".vscode": true, ".vscode": true,
// Harness's own memory dir. Per PROMPT.md the harness writes to
// <target>/.memory/ which contains JSONL findings + run history;
// scanning those would surface the harness's own audit trail
// quotes (e.g. planted-secret evidence) as new findings.
".memory": true,
} }
// SkipPathsAbsolute is checked when scanning the harness's own repo — // SkipPathsAbsolute is checked when scanning the harness's own repo —