validate_parameter_access
Checks strategy code for hardcoded threshold literals and missing defensive parameter access, returning actionable findings to enforce framework contracts.
Instructions
AST-check for hardcoded threshold literals (PRM-003) and defensive
self.params.get() calls (PRM-004) across the 4 component files.
Highest FP-risk of the B1 validators — PRM-003 findings include
``context["severity"] = "warning"`` so callers can treat them as
non-blocking while the allowlist is tuned. PRM-004 findings are
always bugs (framework contract violation).
Allowlist covers: range() args, index slicing, keyword args, default
args, None comparisons, small integer constants ``{-1, 0, 1, -1.0, 0.0, 1.0}``,
and string-literal comparisons (framework-defined regime / signal enums).
Returns ``{"any_errors": bool, "findings": [...]}``.
Input Schema
| Name | Required | Description | Default |
|---|---|---|---|
| strategy_dir | Yes |