ktg-plugin-marketplace/plugins/voyage/templates/plan-template.md
Kjell Tore Guttormsen 7a90d348ad feat(voyage)!: marketplace handoff — rename plugins/ultraplan-local to plugins/voyage [skip-docs]
Session 5 of voyage-rebrand (V6). Operator-authorized cross-plugin scope.

- git mv plugins/ultraplan-local plugins/voyage (rename detected, history preserved)
- .claude-plugin/marketplace.json: voyage entry replaces ultraplan-local
- CLAUDE.md: voyage row in plugin list, voyage in design-system consumer list
- README.md: bulk rename ultra*-local commands -> trek* commands; ultraplan-local refs -> voyage; type discriminators (type: trekbrief/trekreview); session-title pattern (voyage:<command>:<slug>); v4.0.0 release-note paragraph
- plugins/voyage/.claude-plugin/plugin.json: homepage/repository URLs point to monorepo voyage path
- plugins/voyage/verify.sh: drop URL whitelist exception (no longer needed)

Closes voyage-rebrand. bash plugins/voyage/verify.sh PASS 7/7. npm test 361/361.
2026-05-05 15:37:52 +02:00

9.3 KiB
Raw Blame History

{Task Title}

Plan quality: {grade} ({score}/100) — {APPROVE | APPROVE_WITH_NOTES | REVISE | REPLAN}

Generated by trekplan v{version} on {YYYY-MM-DD} — plan_version: 1.7

Context

Why this change is needed. The problem or need it addresses, what prompted it, and the intended outcome. Reference the spec file if one was used.

Architecture Diagram

graph TD
    subgraph "Changes in this plan"
        %% C4-style component diagram showing what the plan touches
        %% Highlight modified components, new components, and connections
    end

Replace with actual Mermaid diagram showing the components this plan modifies, their relationships, and the data flow between them.

Codebase Analysis

  • Tech stack: {languages, frameworks, build tools}
  • Key patterns: {architecture patterns, conventions observed}
  • Relevant files: {paths to files that will be read or modified}
  • Reusable code: {existing functions, utilities, abstractions to leverage}
  • External tech (researched): {technologies that were looked up via research-scout}
  • Recent git activity: {relevant recent commits, active branches, code ownership}

Research Sources

Omit this section when no external research was conducted.

Technology Source Key Findings Confidence
{name} {URL} {summary} {high/med/low}

Implementation Plan

Each step targets 12 files and one focused change. Steps follow TDD structure when the project has tests.

Step 1: {description}

  • Files: path/to/file.ts
  • Changes: {exactly what to modify — no placeholders, no "update as needed"}
  • Reuses: {existing function/pattern from codebase, with file path}
  • Test first:
    • File: path/to/test.ts (existing | new)
    • Verifies: {what the test checks}
    • Pattern: path/to/existing-test.ts (follow this style)
  • Verify: {exact command} → expected: {output}
  • On failure: {revert | retry | skip | escalate} — {specific instructions}
  • Checkpoint: git commit -m "{conventional commit message}"
  • Manifest:
    manifest:
      expected_paths:
        - path/to/file.ts
      min_file_count: 1
      commit_message_pattern: "^feat\\(scope\\):"
      bash_syntax_check: []
      forbidden_paths: []
      must_contain: []
    

Step 2: {description}

  • Files: path/to/file.ts
  • Changes: {exactly what to modify}
  • Reuses: {existing function/pattern}
  • Test first:
    • File: path/to/test.ts (existing | new)
    • Verifies: {what the test checks}
    • Pattern: path/to/existing-test.ts
  • Verify: {exact command} → expected: {output}
  • On failure: {revert | retry | skip | escalate} — {specific instructions}
  • Checkpoint: git commit -m "{conventional commit message}"
  • Manifest:
    manifest:
      expected_paths:
        - path/to/file.ts
      min_file_count: 1
      commit_message_pattern: "^feat\\(scope\\):"
      bash_syntax_check: []
      forbidden_paths: []
      must_contain:
        - path: path/to/file.ts
          pattern: "expected content marker"
    

For projects without tests: omit "Test first" and keep "Verify" with a concrete command (e.g., run the app, check output, curl an endpoint).

Manifest — objective completion predicate

Every step MUST have a Manifest block. This is the machine-checkable contract that trekexecute verifies after the Verify command passes. A step is not considered complete until its manifest verifies — regardless of Verify command exit code.

  • expected_paths — files that must exist after this step. Existing files must be present in repo; new files must be marked (new file) in prose.
  • min_file_count — minimum number of expected_paths that must exist. Typically equal to len(expected_paths).
  • commit_message_pattern — regex that MUST match the HEAD commit message after Checkpoint runs. Use escaped regex syntax (e.g., \\(scope\\)).
  • bash_syntax_check — list of .sh files that must pass bash -n. Auto-include any .sh in expected_paths.
  • forbidden_paths — files this step must NOT modify (defense-in-depth beyond Scope Fence).
  • must_contain — optional grep assertions: path + pattern pairs that must match in created/modified files.

Failure recovery rules

  • On failure: revert — undo this step's changes (git checkout -- {files}), do NOT proceed
  • On failure: retry — attempt once more with the alternative approach described, then revert if still failing
  • On failure: skip — this step is non-critical; continue to next step and note the skip
  • On failure: escalate — stop execution entirely; the issue requires human judgment
  • Checkpoint — after each step succeeds, commit changes so subsequent failures cannot corrupt completed work

Alternatives Considered

Approach Pros Cons Why rejected
{name} ... ... ...

Test Strategy

  • Framework: {test framework and runner}
  • Existing patterns: {how tests are structured in this codebase}
  • New tests in this plan: {N} tests across {N} steps

Tests to write

Type File Verifies Model test
Unit path/to/test {what it tests} path/to/existing-test

For projects without tests: describe manual verification approach instead.

Risks and Mitigations

Priority Risk Location Impact Mitigation
{Critical/High/Medium/Low} {description} file:line {what happens} {how to handle}

Assumptions

Things the planner could not verify from codebase or research. Each assumption is a risk — review before executing.

# Assumption Why unverifiable Impact if wrong
1 {what we assumed} {why we couldn't check} {what breaks}

If this list has 3+ items, the plan may need additional investigation before execution.

Verification

Per-step manifest verification runs automatically during execution (every step's Manifest block is objectively checked by trekexecute before the step is marked passed). This section is for end-to-end integration checks that cross step boundaries — complete workflows, system-level behavior.

  • {exact command} → expected: {exact output or behavior}
  • {exact command} → expected: {exact output or behavior}

Estimated Scope

  • Files to modify: {N}
  • Files to create: {N}
  • Complexity: {low | medium | high}

Execution Strategy

Include this section when the plan has more than 5 implementation steps. Omit for small plans (≤ 5 steps) — trekexecute will run them sequentially in a single session.

The execution strategy groups steps into sessions and organizes sessions into waves. Sessions in the same wave can run in parallel. Sessions in later waves depend on earlier waves completing first.

Session 1: {title}

  • Steps: {step numbers, e.g., 1, 2, 3}
  • Wave: {wave number}
  • Depends on: {session numbers, or "none"}
  • Scope fence:
    • Touch: {files this session may modify}
    • Never touch: {files reserved for other sessions}

Session 2: {title}

  • Steps: {step numbers}
  • Wave: {wave number}
  • Depends on: {session numbers, or "none"}
  • Scope fence:
    • Touch: {files}
    • Never touch: {files}

Execution Order

  • Wave 1: {session list} (parallel)
  • Wave 2: {session list} (after Wave 1)

Grouping rules applied

  • Steps sharing files → same session
  • Steps in independent modules → separate sessions (parallelizable)
  • 35 steps per session (target)
  • Sessions ordered by dependency, waves by independence

Plan Quality Score

Dimension Weight Score Notes
Structural integrity 0.15 {0100} {step ordering, dependencies}
Step quality 0.20 {0100} {granularity, specificity, TDD}
Coverage completeness 0.20 {0100} {spec → steps, no gaps}
Specification quality 0.15 {0100} {no placeholders, clear criteria}
Risk & pre-mortem 0.15 {0100} {failure modes addressed}
Headless readiness 0.10 {0100} {On failure + Checkpoint per step}
Manifest quality 0.05 {0100} {all steps have valid, checkable manifests}
Weighted total 1.00 {score} Grade: {A/B/C/D}

Adversarial review:

  • Plan critic: {verdict — findings count by severity, key issues}
  • Scope guardian: {verdict — ALIGNED / CREEP / GAP / MIXED}

Revisions

Added by adversarial review. Omit if no revisions were needed.

# Finding Severity Resolution
1 {what was wrong} {blocker/major/minor} {how it was fixed}