synaptiai

checkpoint

1
0
# Install this skill:
npx skills add synaptiai/agent-capability-standard --skill "checkpoint"

Install specific skill from multi-skill repository

# Description

Create a safety checkpoint marker before mutation or execution steps. Use when about to modify files, execute plans, or perform any irreversible action. Essential for the CAVR pattern.

# SKILL.md


name: checkpoint
description: Create a safety checkpoint marker before mutation or execution steps. Use when about to modify files, execute plans, or perform any irreversible action. Essential for the CAVR pattern.
argument-hint: "[scope] [reason] [checkpoint_type]"
disable-model-invocation: false
user-invocable: true
allowed-tools: Read, Bash, Edit
context: fork
agent: general-purpose
hooks:
PreToolUse:
- matcher: "Bash"
hooks:
- type: prompt
prompt: |
CHECKPOINT CREATION VALIDATION

        Checkpoint command: {{tool_input.command}}

        Verify checkpoint creation is appropriate:
        1. Scope includes all files that will be mutated
        2. No sensitive files (.env, credentials) being checkpointed
        3. Checkpoint reason is documented
        4. Checkpoint type matches the operation (git_stash, file_backup, etc.)

        Reply ALLOW to create checkpoint.
        Reply BLOCK if:
        - Scope is incomplete (missing files)
        - Sensitive data would be captured
        - Checkpoint storage location is invalid
      once: false

PostToolUse:
- matcher: "Bash"
hooks:
- type: command
command: |
# Log checkpoint creation for audit trail
mkdir -p .checkpoints .audit 2>/dev/null || true
echo "[CHECKPOINT] $(date -u +%Y-%m-%dT%H:%M:%SZ) | Command: {{tool_input.command}} | Exit: {{tool_output.exit_code}}" >> .audit/checkpoint-operations.log
# Record checkpoint metadata
if [ "{{tool_output.exit_code}}" = "0" ]; then
echo "$(date -u +%Y-%m-%dT%H:%M:%SZ): Checkpoint created successfully" >> .checkpoints/checkpoint-manifest.log
fi
- matcher: "Edit"
hooks:
- type: command
command: |
echo "[CHECKPOINT] $(date -u +%Y-%m-%dT%H:%M:%SZ) | Manifest updated: {{tool_input.file_path}}" >> .audit/checkpoint-operations.log 2>/dev/null || true


Intent

Execute checkpoint to create a restorable state marker before any mutating operation. This is the foundation of safe agentic execution - enabling rollback if subsequent actions fail.

Success criteria:
- Checkpoint successfully created with unique identifier
- All files/state in scope are captured
- Restore command is documented and tested
- Expiry policy set if applicable

Compatible schemas:
- docs/schemas/checkpoint.yaml
- docs/schemas/state_snapshot.yaml

Inputs

Parameter Required Type Description
scope Yes string|array Files, directories, or state keys to checkpoint
reason No string Why this checkpoint is being created (for audit trail)
checkpoint_type No enum Type: git_stash, file_backup, state_snapshot, database_savepoint
expiry No string When checkpoint can be garbage collected (e.g., "24h", "never")

Procedure

1) Identify scope: Determine exactly what needs to be checkpointed
- List all files that will be modified by upcoming mutation
- Include related configuration or state files
- Check for uncommitted git changes in scope

2) Select checkpoint type: Choose appropriate mechanism
- git_stash: For git-tracked files (preferred for code changes)
- file_backup: For non-git files, copy to .checkpoints/
- state_snapshot: For in-memory or runtime state
- database_savepoint: For database transactions

3) Capture pre-mutation state: Execute the checkpoint
- For git: git stash push -m "checkpoint:<id>:<reason>"
- For files: Copy to .checkpoints/<id>/ with manifest
- Record hashes of all captured content
- Verify checkpoint integrity immediately after creation

4) Generate restore command: Document how to rollback
- Exact command(s) to restore state
- Any prerequisites for restoration
- Order of operations if multiple systems involved

5) Ground claims: Attach evidence of checkpoint creation
- Format: tool:bash:<command>, file:<checkpoint_path>
- Include hash verification output

6) Format output: Return checkpoint metadata per contract

Output Contract

Return a structured object:

checkpoint_created: boolean
checkpoint:
  id: string  # Unique identifier (e.g., "chk_20240115_143022_abc123")
  type: git_stash | file_backup | state_snapshot | database_savepoint
  created_at: string  # ISO timestamp
  scope:
    files: array[string]  # File paths included
    state_keys: array[string]  # State keys included (if applicable)
  restore_command: string  # Exact command to restore
  expiry: string | null  # When checkpoint expires
pre_mutation_state:
  hash: string | null  # Combined hash of all checkpointed content
  summary: string  # Human-readable state summary
next_safe_actions: array[string]  # What can now safely proceed
confidence: number  # 0.0-1.0
evidence_anchors: ["tool:bash:...", "file:..."]
assumptions: []

Field Definitions

Field Type Description
checkpoint_created boolean Whether checkpoint was successfully created
checkpoint.id string Unique identifier for this checkpoint
checkpoint.type enum Mechanism used for checkpointing
checkpoint.scope object What was included in the checkpoint
checkpoint.restore_command string Exact command to restore state
pre_mutation_state.hash string Integrity hash of captured state
next_safe_actions array Actions that can now safely proceed
confidence number 0.0-1.0 based on checkpoint integrity verification
evidence_anchors array Proof of checkpoint creation
assumptions array Explicit assumptions (e.g., "git available")

Examples

Example 1: Git Stash Checkpoint

Input:

scope:
  - "src/api/handlers/*.py"
  - "tests/test_handlers.py"
reason: "Before refactoring API handlers"
checkpoint_type: git_stash

Output:

checkpoint_created: true
checkpoint:
  id: "chk_20240115_143022_a7b3c9"
  type: git_stash
  created_at: "2024-01-15T14:30:22Z"
  scope:
    files:
      - "src/api/handlers/user.py"
      - "src/api/handlers/auth.py"
      - "tests/test_handlers.py"
    state_keys: []
  restore_command: "git stash pop stash@{0}"
  expiry: null
pre_mutation_state:
  hash: "sha256:e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855"
  summary: "3 files, 342 lines total, last modified 2024-01-15"
next_safe_actions:
  - "act-plan: Proceed with handler refactoring"
  - "edit: Modify files in scope"
confidence: 1.0
evidence_anchors:
  - "tool:bash:git stash push -m 'checkpoint:chk_20240115_143022_a7b3c9:Before refactoring API handlers'"
  - "tool:bash:git stash list | head -1"
assumptions:
  - "Git repository is initialized and clean"
  - "No merge conflicts in working tree"

Evidence pattern: Git stash creation command output, stash list verification.


Example 2: File Backup Checkpoint

Input:

scope: "config/production.yaml"
reason: "Before config migration"
checkpoint_type: file_backup
expiry: "24h"

Output:

checkpoint_created: true
checkpoint:
  id: "chk_20240115_150000_config"
  type: file_backup
  created_at: "2024-01-15T15:00:00Z"
  scope:
    files:
      - "config/production.yaml"
    state_keys: []
  restore_command: "cp .checkpoints/chk_20240115_150000_config/production.yaml config/production.yaml"
  expiry: "2024-01-16T15:00:00Z"
pre_mutation_state:
  hash: "sha256:abc123..."
  summary: "1 file, 89 lines, production database config"
next_safe_actions:
  - "act-plan: Apply config migration"
confidence: 0.95
evidence_anchors:
  - "file:.checkpoints/chk_20240115_150000_config/manifest.json"
  - "tool:bash:sha256sum config/production.yaml"
assumptions:
  - ".checkpoints directory exists and is writable"

Verification

Apply the following verification patterns:

  • [ ] State Assertion: pre_mutation_state.hash can be recomputed and matches
  • [ ] Restore Command Valid: restore_command executes without error (dry-run if possible)
  • [ ] Scope Complete: All files in scope are captured in checkpoint
  • [ ] Evidence Grounding: checkpoint.id appears in evidence_anchors

Verification tools: Bash (for hash verification), Read (for manifest)

Safety Constraints

  • mutation: true (creates checkpoint artifacts)
  • requires_checkpoint: false (this IS the checkpoint operation)
  • requires_approval: false
  • risk: medium

Capability-specific rules:
- NEVER skip checkpoint before act-plan (CRITICAL)
- NEVER delete checkpoints until explicitly requested
- ALWAYS verify checkpoint integrity immediately after creation
- Do not checkpoint sensitive files (.env, credentials) - warn and exclude
- Store checkpoint metadata in .checkpoints/ within workspace
- Include reason in checkpoint for audit trail

Composition Patterns

Commonly follows:
- plan - After creating a plan, checkpoint before execution
- critique - After reviewing risks, checkpoint before proceeding
- constrain - After policy check passes, checkpoint before mutation

Commonly precedes:
- act-plan - REQUIRED: Never act-plan without prior checkpoint (CAVR pattern)
- improve - Checkpoint before iterative improvement cycles
- send - Checkpoint before external communications

Anti-patterns:
- CRITICAL: Never call act-plan without prior checkpoint
- CRITICAL: Never call rollback without valid checkpoint reference
- Never checkpoint after mutation has started
- Never delete checkpoint before verify confirms success

Workflow references:
- See composition_patterns.md#checkpoint-act-verify-rollback for CAVR pattern
- See composition_patterns.md#debug-code-change for checkpoint placement
- See composition_patterns.md#digital-twin-sync-loop for checkpoint in loops

# Supported AI Coding Agents

This skill is compatible with the SKILL.md standard and works with all major AI coding agents:

Learn more about the SKILL.md standard and how to use these skills with your preferred AI coding agent.