You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: .github/copilot-instructions.md
+11-2Lines changed: 11 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -238,9 +238,18 @@ Diese Regeln gelten für alle Repositories in diesem Workspace. Projektspezifisc
238
238
239
239
*Every Level-2 project MUST maintain security documents based on templates in `.specify/templates/`: threat model (STRIDE+CAPEC), S-ADRs, arc42 Section 8 security concepts, security checklist, dependency audit, security quality scenarios (SHOULD), ASVS verification (web/API MUST), supply-chain evidence (release-capable MUST), Zero Trust applicability note (distributed systems SHOULD), and SAMM assessment (long-lived projects SHOULD). Project-specific instances live in `docs/security/`; S-ADRs in `docs/security/adr/`. See `constitution.md`, Principles XII–XVIII for authoritative requirements.*
240
240
241
+
## Allgemeine Architekturdokumentation / General Architecture Documentation
242
+
243
+
- Bei architekturrelevanten Änderungen MUSS iSAQB/arc42-Evidenz geprüft werden: Architekturziele, Kontextsicht, Bausteinsicht, Laufzeitsicht, Deployment-Sicht, Qualitätszenarien, ADRs, Architekturrisiken und technische Schulden.
244
+
- Standardpfad: `docs/architecture/`; ADRs als einzelne Dateien in `docs/architecture/adr/`.
245
+
- Verwende die installierten Templates `architecture-vision-template.md`, `context-view-template.md`, `building-block-view-template.md`, `runtime-view-template.md`, `deployment-view-template.md`, `quality-scenarios-template.md`, `architecture-decision-template.md` und `architecture-risks-template.md`, sofern anwendbar.
246
+
- Nichtanwendbarkeit immer als `N/A` mit kurzer Begründung dokumentieren; keine stillschweigende Auslassung.
247
+
248
+
*Architecture-relevant changes MUST check iSAQB/arc42 evidence: architecture goals, context view, building-block view, runtime view, deployment view, quality scenarios, ADRs, architecture risks, and technical debt. Default path: `docs/architecture/`; ADRs live in `docs/architecture/adr/`. Use the installed architecture templates where applicable. Record non-applicability as `N/A` with justification rather than omitting it silently.*
- Vor jeder Level-2-Aufgabe die anwendbaren Sicherheitsstandards aus `constitution.md`, Prinzipien XIV-XVIII bestimmen und explizit benennen.
252
+
- Vor jeder Level-2-Aufgabe die anwendbaren Sicherheitsstandards aus `constitution.md`, Prinzipien XIV-XX bestimmen und explizit benennen.
244
253
-`NIST SSDF` und `CWE Top 25` gelten immer für Level-2-Arbeit.
245
254
-`OWASP ASVS` gilt für Web-, API-, HTTP- und authentifizierte Dienste; der gewählte ASVS-Level muss benannt werden.
246
255
-`SBOM` gilt für releasefähige oder verteilbare Artefakte; `VEX`, wenn bekannte Schwachstellen in ausgelieferten oder geprüften Komponenten bewertet werden müssen.
@@ -249,7 +258,7 @@ Diese Regeln gelten für alle Repositories in diesem Workspace. Projektspezifisc
249
258
-`OWASP Cheat Sheet Series`, `OWASP Proactive Controls` und bei öffentlichen OSS-Repositories oder kritischen Abhängigkeiten `OpenSSF Scorecard` sind als ergänzende Referenzen zu berücksichtigen.
250
259
- Nichtanwendbarkeit immer als `N/A` mit kurzer Begründung dokumentieren; keine stillschweigende Auslassung.
251
260
252
-
*At the start of every Level-2 task, determine and name the applicable security standards from `constitution.md`, Principles XIV-XVIII. `NIST SSDF` and `CWE Top 25` always apply. `OWASP ASVS` applies to web/API/HTTP/auth-bearing services; `SBOM` applies to releasable or distributable artefacts; `VEX` applies when known vulnerabilities in shipped/evaluated components need a disposition statement. `SLSA` is the target model for CI/CD and published artefacts; `Zero Trust` must be explicitly evaluated for distributed, service-based, cloud, or remotely managed systems. `CAPEC`, `OWASP SAMM`, `OWASP Cheat Sheet Series`, `OWASP Proactive Controls`, and `OpenSSF Scorecard` are supporting references where relevant. Record non-applicability as `N/A` with justification rather than omitting it silently.*
261
+
*At the start of every Level-2 task, determine and name the applicable security standards from `constitution.md`, Principles XIV-XX. `NIST SSDF` and `CWE Top 25` always apply. `OWASP ASVS` applies to web/API/HTTP/auth-bearing services; `SBOM` applies to releasable or distributable artefacts; `VEX` applies when known vulnerabilities in shipped/evaluated components need a disposition statement. `SLSA` is the target model for CI/CD and published artefacts; `Zero Trust` must be explicitly evaluated for distributed, service-based, cloud, or remotely managed systems. `CAPEC`, `OWASP SAMM`, `OWASP Cheat Sheet Series`, `OWASP Proactive Controls`, and `OpenSSF Scorecard` are supporting references where relevant. Record non-applicability as `N/A` with justification rather than omitting it silently.*
Copy file name to clipboardExpand all lines: .specify/memory/constitution.md
+100-5Lines changed: 100 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,16 +1,38 @@
1
1
<!--
2
2
Sync Impact Report
3
-
Version change: 1.11.0 -> 1.12.0
3
+
Version change: 1.12.0 -> 1.13.0
4
4
Modified principles:
5
-
- None (purely additive)
5
+
- II. Cross-Platform Parity & Documentation (evidence templates and Bash/PowerShell discipline clarified)
6
+
- VII. Programmierung #include<everyone> — Inclusion & Accessibility By Default (preset evidence paths, German orthography, and code-fence tagging clarified)
7
+
- IX. Four-Agent Guidance Parity & Template Synchronization (generic preset surface model and checklist evidence clarified)
8
+
- XIV. Secure Development Standards & Applicability Matrix (CRA applicability and general architecture evidence included)
6
9
Added sections:
7
-
- None
10
+
- XX. General Software Architecture Governance (iSAQB/arc42)
@@ -94,6 +116,19 @@ A new script is not considered complete until:
94
116
95
117
All files MUST be committed together in the same commit.
96
118
119
+
Additional script-shaped tooling evidence:
120
+
- Script parity checklists SHOULD use `script-parity-checklist-template.md`.
121
+
- Bash man-page skeletons SHOULD use `man-page-template.md` and live under
122
+
`docs/man/`.
123
+
- PowerShell help skeletons SHOULD use `powershell-help-template.md`.
124
+
- Bash scripts SHOULD use `set -euo pipefail` unless the script documents a
125
+
compatibility reason. PowerShell scripts MUST use
126
+
`Set-StrictMode -Version Latest`.
127
+
- Bash scripts MUST NOT rely on Bash 4+ features unless the project documents
128
+
that requirement, because macOS still ships Bash 3.2 by default.
129
+
- PowerShell scripts MUST handle an empty `$env:HOME` on Windows by falling
130
+
back to `$env:USERPROFILE` where a home directory is needed.
131
+
97
132
**Rationale**: The workspace is used on macOS and Windows. Bash-only or PowerShell-only scripts create a second-class experience. Professional documentation ensures maintainability and ease of use across platforms.
98
133
99
134
### III. Bootstrap Automation
@@ -212,6 +247,16 @@ Mandatory rules:
212
247
- User-facing artefacts MUST remain usable with keyboard-only interaction, screen readers, Braille displays, and text browsers.
213
248
- Text-first fallbacks MUST be preferred for status reporting, diagrams, and operational guidance.
214
249
- Accessibility review is part of completion, not post-processing.
250
+
- German learner-facing text MUST keep full orthographic correctness, including
251
+
umlauts (`ä`, `ö`, `ü`, `Ä`, `Ö`, `Ü`) and `ß`; ASCII fallbacks such as
252
+
`fuer` or `loeschen` are not acceptable in user-facing prose unless a file
253
+
format or legacy interface cannot encode Unicode.
254
+
- Every Markdown code block in user-facing documentation MUST carry a language
255
+
tag such as `bash`, `powershell`, `csharp`, or `text`.
256
+
- Accessibility evidence SHOULD live in `docs/accessibility/` and use the
257
+
installed templates `a11y-checklist-template.md`,
258
+
`bilingual-content-check-template.md`, `cli-a11y-review-template.md`, and
259
+
`a11y-evidence-template.md` where applicable.
215
260
216
261
**Rationale**: Inclusive delivery improves quality for everyone, reduces retrofit work, and makes the repositories usable in real assistive-technology workflows from the start.
217
262
@@ -241,6 +286,12 @@ Mandatory rules:
241
286
- Any intentional deviation MUST be documented explicitly in the same change.
242
287
- The corresponding project templates and `.specify/memory/constitution.md` MUST be updated in the same change whenever a shared principle changes.
243
288
- Runtime guidance references in governance text MUST name all four maintained agent surfaces.
289
+
- Projects MAY declare additional maintained agent surfaces, such as
290
+
`.cursorrules`, `.windsurfrules`, `JUNIE.md`, `.github/agents/*`, or
291
+
repository-specific prompt/rule files. Once declared, those surfaces become
292
+
part of the same parity requirement.
293
+
- Changes touching shared agent guidance SHOULD complete an
294
+
`agent-parity-checklist-template.md` record or equivalent review note.
244
295
245
296
**Rationale**: Divergent agent instructions create silent process drift. Atomic parity keeps different AI tools aligned and makes future project bootstraps inherit the same governance baseline.
246
297
@@ -505,6 +556,8 @@ MUST use this matrix to determine which standards apply.
505
556
| NIST Zero Trust (SP 800-207) | Project-type-dependent | Distributed, service-based, cloud, remote-managed, or multi-device systems | Explicit applicability decision with controls or justified N/A |
506
557
| OWASP Cheat Sheet Series / Proactive Controls | SHOULD | All developer-facing projects | Use as day-to-day implementation guidance below the constitution |
507
558
| OpenSSF Scorecard | Project-type-dependent | Public OSS repositories or high-impact external dependencies | Review repository/dependency security posture before adoption or release |
559
+
| EU Cyber Resilience Act (CRA) applicability | MUST | All projects; full controls for CRA-scoped products with digital elements | Record applicability or `N/A`; CRA-scoped projects maintain vulnerability handling, SBOM, and conformity evidence |
560
+
| iSAQB/arc42 general architecture | SHOULD | Architecturally significant changes or long-lived Level-2 systems | Record architecture goals, context, views, decisions, quality scenarios, risks, or justified `N/A`|
508
561
509
562
Mandatory rules:
510
563
- Every Level-2 feature specification, plan, task list, PR, and release note
@@ -524,6 +577,11 @@ Mandatory rules:
524
577
- Level-1 workspaces SHOULD also prefer `docs/security/` for security-governance
525
578
evidence. If a workspace uses another governance document or directory, the
526
579
chosen location MUST be stated in its local security index.
580
+
- General architecture evidence SHOULD live in `docs/architecture/`, with ADRs
581
+
in `docs/architecture/adr/`, whenever a feature materially affects system
582
+
structure, interfaces, deployment, quality attributes, or maintainability.
583
+
- CRA applicability evidence SHOULD use `cra-applicability-template.md` or an
584
+
equivalent note in `docs/security/` or release governance documentation.
527
585
528
586
**Rationale**: Secure-development standards are often partially remembered and
529
587
selectively applied. A binding applicability matrix keeps teams, agents, and
@@ -722,6 +780,43 @@ software placed on the EU market. Recording CRA applicability and aligning
722
780
practices proactively reduces legal and reputational risk and builds on the
723
781
security work already required by Principles XII–XVIII.
724
782
783
+
### XX. General Software Architecture Governance (iSAQB/arc42)
784
+
785
+
Software architecture MUST be treated as an explicit design artefact whenever
0 commit comments