Skip to content

Commit cd54c53

Browse files
committed
chore: prettier formatting
1 parent 50c1773 commit cd54c53

File tree

5 files changed

+12
-0
lines changed

5 files changed

+12
-0
lines changed

.continue/agents/breaking-change-detector.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10,17 +10,20 @@ Analyze this pull request for breaking changes that may leave stale references e
1010
## What Constitutes a Breaking Change
1111

1212
1. **CLI command renames or removals** - If a command registered in `extensions/cli/src/commands/` is renamed, removed, or has its flags changed, check that:
13+
1314
- Documentation in `docs/` reflects the new name
1415
- Agent definitions in `.continue/agents/` don't reference the old command
1516
- Skills in `skills/` are updated
1617
- README and CONTRIBUTING.md are current
1718
- GitHub Actions workflows don't invoke the old command
1819

1920
2. **Public API changes** - If exported functions, interfaces, or types in `core/` or `packages/` are renamed or have signature changes, check that:
21+
2022
- All callers in `gui/`, `extensions/`, and `binary/` are updated
2123
- Type definitions in `packages/config-types/` are consistent
2224

2325
3. **Configuration schema changes** - If config file formats (YAML or JSON) are modified, check that:
26+
2427
- Validation logic handles both old and new formats (or migration is provided)
2528
- Documentation examples use the new format
2629
- Default configs are updated

.continue/agents/dependency-security-review.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -12,12 +12,14 @@ Review this pull request for changes to dependencies. A significant portion of P
1212
### For Any `package.json` Changes
1313

1414
1. **New dependencies** - For each newly added dependency:
15+
1516
- Is it well-maintained (not abandoned)?
1617
- Does it have known vulnerabilities?
1718
- Is it the right choice, or does an existing dependency already cover this use case?
1819
- Is the version pinned appropriately (exact vs range)?
1920

2021
2. **Major version bumps** - For major version upgrades:
22+
2123
- Are there breaking changes that affect our usage?
2224
- Have the callers been updated to match the new API?
2325

.continue/agents/error-message-quality.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,7 @@ Review this pull request for error handling quality. The most common user-facing
1212
1. **Catch blocks that discard error details** - Look for `catch` blocks that re-throw or return a generic message without including the original error's message, status code, or context.
1313

1414
2. **HTTP status codes without user-friendly mapping** - When making API calls (especially to LLM providers), ensure that common HTTP errors produce distinct, actionable messages:
15+
1516
- `401` → "Invalid API key" (not "Unknown error")
1617
- `402` → "Insufficient funds or quota exceeded"
1718
- `403` → "Access denied - check your API key permissions"

.continue/agents/input-validation.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10,17 +10,20 @@ Review this pull request for input validation quality. The most common user issu
1010
## What to Check
1111

1212
1. **API keys and secrets** - Any code that accepts API keys, tokens, or credentials should:
13+
1314
- Reject obviously invalid values (empty strings, whitespace-only, placeholder text like "your-api-key-here")
1415
- Validate format where possible (e.g., OpenAI keys start with `sk-`, Anthropic keys start with `sk-ant-`)
1516
- Provide a clear error message before making a network request with a bad key
1617

1718
2. **Configuration values** - New or modified config parsing should:
19+
1820
- Validate required fields are present and non-empty
1921
- Validate types (e.g., numbers are actually numbers, URLs are valid URLs)
2022
- Provide clear error messages that name the specific field and expected format
2123
- Not crash the entire config loading process for a single invalid value
2224

2325
3. **User text inputs** - New or modified UI inputs should:
26+
2427
- Handle empty/whitespace-only submissions gracefully
2528
- Sanitize inputs that will be used in file paths, URLs, or shell commands
2629
- Not allow submission of invalid data that will fail silently later

.continue/agents/test-coverage.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10,16 +10,19 @@ Review this pull request to determine if new functionality has adequate test cov
1010
## When Tests Are Expected
1111

1212
1. **New exported functions or classes** - Any new public function, class, or module that is exported and used by other parts of the codebase should have at least basic unit tests covering:
13+
1314
- The happy path (expected inputs produce expected outputs)
1415
- Edge cases (empty inputs, null/undefined, boundary values)
1516
- Error cases (invalid inputs throw or return appropriate errors)
1617

1718
2. **New CLI commands or subcommands** - Should have:
19+
1820
- Smoke tests verifying the command registers and runs
1921
- Tests for flag parsing and validation
2022
- Tests for expected output format
2123

2224
3. **Bug fixes** - If a PR fixes a bug, there should be a regression test that:
25+
2326
- Reproduces the original bug condition
2427
- Verifies the fix resolves it
2528

0 commit comments

Comments
 (0)