frame-development-contract
Frame Development Contract
Read config/change-contract-policy.sh, then apply the shared development-contract workflow from development-contract-core.
Treat repo guidance as secondary to the policy file for contract mechanics; if they disagree, fix the mismatch instead of guessing.
Use this skill when
- work may touch a substantive path or top-level file listed in
config/change-contract-policy.sh - creating, updating, or verifying a non-template plan under the repo policy's plan directory
- deciding which validation profile this repo expects for a change
Do not use this skill alone for generic coding advice; pair it with a more specific implementation skill when needed.
Repo overlay workflow
- Read the touched files before editing.
- Read
config/change-contract-policy.shfor the plan directory, substantive path rules, required lanes, and validation profiles. - Apply
development-contract-corefor the generic workflow and decision rules. - If the change is substantive under repo policy, update a non-template plan in the lifecycle subdirectory under
feature_records/that matches the record'sState. Preferbash scripts/set-feature-record-lifecycle.shwhen changing an existing record's lifecycle. - Keep verifier notes concrete: record commands, observed results, and any contract mismatches explicitly.
- Run the smallest repo policy profile that proves the change, then extend when the surface justifies it.
- Before closing work, run the checker command declared in
config/change-contract-policy.sh.
Decision rules
- Treat
config/change-contract-policy.shas the source of truth for what is substantive in this repo. - Do not leave a substantive change without a non-template plan update.
- Use
bash scripts/set-feature-record-lifecycle.sh --superseded-by ...when superseding a record so the replacement link is updated with the move. - Keep the repo overlay thin: change policy data first, then only add prose when the repo needs extra human guidance that policy cannot express.
- If repo policy and docs disagree, fix the policy or the docs so the checker, template, and guidance converge again.
Repo validation profiles
Use the policy file's named profiles as the default command sets:
FRAME_CONTRACT_VALIDATION_PROFILE_DOCSFRAME_CONTRACT_VALIDATION_PROFILE_CODEFRAME_CONTRACT_VALIDATION_PROFILE_RELEASE
Output expectations
When this skill applies, the final work should leave behind:
- code or docs aligned with repo guidance and policy
- an updated non-template
feature_records/<state>/...plan when the change is substantive - explicit verifier evidence in the plan
- repo policy, docs, and checker behavior that still agree
- a concise report of what was validated and what could not be validated
Examples
Implement this feature in src/ and wire the tests: readconfig/change-contract-policy.sh, update the relevantfeature_records/active/*.mdplan, implement narrowly, run the code profile, and record verifier commands/results.Update the CI workflow to enforce a new repo rule: treat it as substantive workflow work under policy, update the plan, run the checker, and verify workflow/docs alignment.Finish a feature and accept it: update verification evidence, then runbash scripts/set-feature-record-lifecycle.sh feature_records/active/<record>.md done.Port this contract system into another repo: copy the core skill, checker, template, and policy file, then edit the policy file before changing any repo-specific prose.
More from n-n-code/n-n-code-skills
project-vendor-boundary
Overlay for app-owned versus vendored dependency boundaries. Portable across repos that vendor third-party code. Use when work touches vendored dependencies or their integration seam.
19coding-guidance-cpp
C++ implementation and review skill. Use when writing, modifying, refactoring, or reviewing C++ code, especially modern C++17/20/23 code that needs strong ownership, type safety, and testable design. Portable across C++ repos and build systems.
18project-platform-diagnose
Overlay for environment-sensitive diagnosis — service startup, install issues, platform integration, headless/container behavior, and runtime smoke checks. Portable across repos where build, install, or runtime behavior depends on the local platform.
18documenter
Baseline overlay for substantial documentation authoring or restructuring: README, specs, ADRs, tutorials, how-to guides, reference docs, explanations, API docs, code comments, changelogs, and agent-facing docs. Use when the agent should classify doc type, ground claims in repo truth, and validate examples before finishing.
18security
Security workflow skill for repo-grounded threat modeling, exploit-focused security review, and secure-by-default implementation guidance. Use when the user explicitly asks for security work, or when security properties are the primary concern in a high-risk change. Do not trigger for ordinary code review, routine endpoint work, or general backend implementation just because a repo contains APIs, auth, or secrets.
18project-release-maintainer
Overlay for release-facing docs, install layout, workflows, licenses, and hygiene scripts. Portable across repos with a release/packaging pipeline. Use for publication-facing changes.
17