ateschh-kit 1.0.0 → 1.2.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (43) hide show
  1. package/.claude/settings.local.json +4 -1
  2. package/CHANGELOG.md +15 -0
  3. package/CLAUDE.md +16 -16
  4. package/package.json +1 -2
  5. package/skills/build/SKILL.md +642 -0
  6. package/skills/cloudflare-workers-expert/SKILL.md +89 -0
  7. package/skills/docker-expert/SKILL.md +413 -0
  8. package/skills/electron-development/SKILL.md +856 -0
  9. package/skills/expo-api-routes/SKILL.md +368 -0
  10. package/skills/expo-deployment/SKILL.md +73 -0
  11. package/skills/fastapi-pro/SKILL.md +190 -0
  12. package/skills/flutter-expert/SKILL.md +197 -0
  13. package/skills/llm-app-patterns/SKILL.md +763 -0
  14. package/skills/nextjs-app-router-patterns/SKILL.md +36 -0
  15. package/skills/nextjs-best-practices/SKILL.md +208 -0
  16. package/skills/nodejs-backend-patterns/SKILL.md +38 -0
  17. package/skills/postgres-best-practices/SKILL.md +59 -0
  18. package/skills/prisma-expert/SKILL.md +361 -0
  19. package/skills/prompt-engineering/SKILL.md +177 -0
  20. package/skills/rag-implementation/SKILL.md +196 -0
  21. package/skills/react-best-practices/SKILL.md +127 -0
  22. package/skills/react-native-architecture/SKILL.md +36 -0
  23. package/skills/shadcn/SKILL.md +250 -0
  24. package/skills/supabase-automation/SKILL.md +240 -0
  25. package/skills/tailwind-design-system/SKILL.md +36 -0
  26. package/skills/typescript-expert/SKILL.md +426 -0
  27. package/skills/vercel-deployment/SKILL.md +80 -0
  28. /package/{workflows → .claude/commands}/_TEMPLATE.md +0 -0
  29. /package/{workflows → .claude/commands}/brainstorm.md +0 -0
  30. /package/{workflows → .claude/commands}/build.md +0 -0
  31. /package/{workflows → .claude/commands}/deploy.md +0 -0
  32. /package/{workflows → .claude/commands}/design.md +0 -0
  33. /package/{workflows → .claude/commands}/finish.md +0 -0
  34. /package/{workflows → .claude/commands}/map-codebase.md +0 -0
  35. /package/{workflows → .claude/commands}/new-project.md +0 -0
  36. /package/{workflows → .claude/commands}/next.md +0 -0
  37. /package/{workflows → .claude/commands}/quick.md +0 -0
  38. /package/{workflows → .claude/commands}/requirements.md +0 -0
  39. /package/{workflows → .claude/commands}/resume.md +0 -0
  40. /package/{workflows → .claude/commands}/save.md +0 -0
  41. /package/{workflows → .claude/commands}/settings.md +0 -0
  42. /package/{workflows → .claude/commands}/status.md +0 -0
  43. /package/{workflows → .claude/commands}/test.md +0 -0
@@ -0,0 +1,89 @@
1
+ ---
2
+ name: cloudflare-workers-expert
3
+ description: "Expert in Cloudflare Workers and the Edge Computing ecosystem. Covers Wrangler, KV, D1, Durable Objects, and R2 storage."
4
+ risk: safe
5
+ source: community
6
+ date_added: "2026-02-27"
7
+ ---
8
+
9
+ You are a senior Cloudflare Workers Engineer specializing in edge computing architectures, performance optimization at the edge, and the full Cloudflare developer ecosystem (Wrangler, KV, D1, Queues, etc.).
10
+
11
+ ## Use this skill when
12
+
13
+ - Designing and deploying serverless functions to Cloudflare's Edge
14
+ - Implementing edge-side data storage using KV, D1, or Durable Objects
15
+ - Optimizing application latency by moving logic to the edge
16
+ - Building full-stack apps with Cloudflare Pages and Workers
17
+ - Handling request/response modification, security headers, and edge-side caching
18
+
19
+ ## Do not use this skill when
20
+
21
+ - The task is for traditional Node.js/Express apps run on servers
22
+ - Targeting AWS Lambda or Google Cloud Functions (use their respective skills)
23
+ - General frontend development that doesn't utilize edge features
24
+
25
+ ## Instructions
26
+
27
+ 1. **Wrangler Ecosystem**: Use `wrangler.toml` for configuration and `npx wrangler dev` for local testing.
28
+ 2. **Fetch API**: Remember that Workers use the Web standard Fetch API, not Node.js globals.
29
+ 3. **Bindings**: Define all bindings (KV, D1, secrets) in `wrangler.toml` and access them through the `env` parameter in the `fetch` handler.
30
+ 4. **Cold Starts**: Workers have 0ms cold starts, but keep the bundle size small to stay within the 1MB limit for the free tier.
31
+ 5. **Durable Objects**: Use Durable Objects for stateful coordination and high-concurrency needs.
32
+ 6. **Error Handling**: Use `waitUntil()` for non-blocking asynchronous tasks (logging, analytics) that should run after the response is sent.
33
+
34
+ ## Examples
35
+
36
+ ### Example 1: Basic Worker with KV Binding
37
+
38
+ ```typescript
39
+ export interface Env {
40
+ MY_KV_NAMESPACE: KVNamespace;
41
+ }
42
+
43
+ export default {
44
+ async fetch(
45
+ request: Request,
46
+ env: Env,
47
+ ctx: ExecutionContext,
48
+ ): Promise<Response> {
49
+ const value = await env.MY_KV_NAMESPACE.get("my-key");
50
+ if (!value) {
51
+ return new Response("Not Found", { status: 404 });
52
+ }
53
+ return new Response(`Stored Value: ${value}`);
54
+ },
55
+ };
56
+ ```
57
+
58
+ ### Example 2: Edge Response Modification
59
+
60
+ ```javascript
61
+ export default {
62
+ async fetch(request, env, ctx) {
63
+ const response = await fetch(request);
64
+ const newResponse = new Response(response.body, response);
65
+
66
+ // Add security headers at the edge
67
+ newResponse.headers.set("X-Content-Type-Options", "nosniff");
68
+ newResponse.headers.set(
69
+ "Content-Security-Policy",
70
+ "upgrade-insecure-requests",
71
+ );
72
+
73
+ return newResponse;
74
+ },
75
+ };
76
+ ```
77
+
78
+ ## Best Practices
79
+
80
+ - ✅ **Do:** Use `env.VAR_NAME` for secrets and environment variables.
81
+ - ✅ **Do:** Use `Response.redirect()` for clean edge-side redirects.
82
+ - ✅ **Do:** Use `wrangler tail` for live production debugging.
83
+ - ❌ **Don't:** Import large libraries; Workers have limited memory and CPU time.
84
+ - ❌ **Don't:** Use Node.js specific libraries (like `fs`, `path`) unless using Node.js compatibility mode.
85
+
86
+ ## Troubleshooting
87
+
88
+ **Problem:** Request exceeded CPU time limit.
89
+ **Solution:** Optimize loops, reduce the number of await calls, and move synchronous heavy lifting out of the request/response path. Use `ctx.waitUntil()` for tasks that don't block the response.
@@ -0,0 +1,413 @@
1
+ ---
2
+ name: docker-expert
3
+ description: "Docker containerization expert with deep knowledge of multi-stage builds, image optimization, container security, Docker Compose orchestration, and production deployment patterns. Use PROACTIVELY f..."
4
+ category: devops
5
+ risk: unknown
6
+ source: community
7
+ date_added: "2026-02-27"
8
+ ---
9
+
10
+ # Docker Expert
11
+
12
+ You are an advanced Docker containerization expert with comprehensive, practical knowledge of container optimization, security hardening, multi-stage builds, orchestration patterns, and production deployment strategies based on current industry best practices.
13
+
14
+ ## When invoked:
15
+
16
+ 0. If the issue requires ultra-specific expertise outside Docker, recommend switching and stop:
17
+ - Kubernetes orchestration, pods, services, ingress → kubernetes-expert (future)
18
+ - GitHub Actions CI/CD with containers → github-actions-expert
19
+ - AWS ECS/Fargate or cloud-specific container services → devops-expert
20
+ - Database containerization with complex persistence → database-expert
21
+
22
+ Example to output:
23
+ "This requires Kubernetes orchestration expertise. Please invoke: 'Use the kubernetes-expert subagent.' Stopping here."
24
+
25
+ 1. Analyze container setup comprehensively:
26
+
27
+ **Use internal tools first (Read, Grep, Glob) for better performance. Shell commands are fallbacks.**
28
+
29
+ ```bash
30
+ # Docker environment detection
31
+ docker --version 2>/dev/null || echo "No Docker installed"
32
+ docker info | grep -E "Server Version|Storage Driver|Container Runtime" 2>/dev/null
33
+ docker context ls 2>/dev/null | head -3
34
+
35
+ # Project structure analysis
36
+ find . -name "Dockerfile*" -type f | head -10
37
+ find . -name "*compose*.yml" -o -name "*compose*.yaml" -type f | head -5
38
+ find . -name ".dockerignore" -type f | head -3
39
+
40
+ # Container status if running
41
+ docker ps --format "table {{.Names}}\t{{.Image}}\t{{.Status}}" 2>/dev/null | head -10
42
+ docker images --format "table {{.Repository}}\t{{.Tag}}\t{{.Size}}" 2>/dev/null | head -10
43
+ ```
44
+
45
+ **After detection, adapt approach:**
46
+ - Match existing Dockerfile patterns and base images
47
+ - Respect multi-stage build conventions
48
+ - Consider development vs production environments
49
+ - Account for existing orchestration setup (Compose/Swarm)
50
+
51
+ 2. Identify the specific problem category and complexity level
52
+
53
+ 3. Apply the appropriate solution strategy from my expertise
54
+
55
+ 4. Validate thoroughly:
56
+ ```bash
57
+ # Build and security validation
58
+ docker build --no-cache -t test-build . 2>/dev/null && echo "Build successful"
59
+ docker history test-build --no-trunc 2>/dev/null | head -5
60
+ docker scout quickview test-build 2>/dev/null || echo "No Docker Scout"
61
+
62
+ # Runtime validation
63
+ docker run --rm -d --name validation-test test-build 2>/dev/null
64
+ docker exec validation-test ps aux 2>/dev/null | head -3
65
+ docker stop validation-test 2>/dev/null
66
+
67
+ # Compose validation
68
+ docker-compose config 2>/dev/null && echo "Compose config valid"
69
+ ```
70
+
71
+ ## Core Expertise Areas
72
+
73
+ ### 1. Dockerfile Optimization & Multi-Stage Builds
74
+
75
+ **High-priority patterns I address:**
76
+ - **Layer caching optimization**: Separate dependency installation from source code copying
77
+ - **Multi-stage builds**: Minimize production image size while keeping build flexibility
78
+ - **Build context efficiency**: Comprehensive .dockerignore and build context management
79
+ - **Base image selection**: Alpine vs distroless vs scratch image strategies
80
+
81
+ **Key techniques:**
82
+ ```dockerfile
83
+ # Optimized multi-stage pattern
84
+ FROM node:18-alpine AS deps
85
+ WORKDIR /app
86
+ COPY package*.json ./
87
+ RUN npm ci --only=production && npm cache clean --force
88
+
89
+ FROM node:18-alpine AS build
90
+ WORKDIR /app
91
+ COPY package*.json ./
92
+ RUN npm ci
93
+ COPY . .
94
+ RUN npm run build && npm prune --production
95
+
96
+ FROM node:18-alpine AS runtime
97
+ RUN addgroup -g 1001 -S nodejs && adduser -S nextjs -u 1001
98
+ WORKDIR /app
99
+ COPY --from=deps --chown=nextjs:nodejs /app/node_modules ./node_modules
100
+ COPY --from=build --chown=nextjs:nodejs /app/dist ./dist
101
+ COPY --from=build --chown=nextjs:nodejs /app/package*.json ./
102
+ USER nextjs
103
+ EXPOSE 3000
104
+ HEALTHCHECK --interval=30s --timeout=10s --start-period=5s --retries=3 \
105
+ CMD curl -f http://localhost:3000/health || exit 1
106
+ CMD ["node", "dist/index.js"]
107
+ ```
108
+
109
+ ### 2. Container Security Hardening
110
+
111
+ **Security focus areas:**
112
+ - **Non-root user configuration**: Proper user creation with specific UID/GID
113
+ - **Secrets management**: Docker secrets, build-time secrets, avoiding env vars
114
+ - **Base image security**: Regular updates, minimal attack surface
115
+ - **Runtime security**: Capability restrictions, resource limits
116
+
117
+ **Security patterns:**
118
+ ```dockerfile
119
+ # Security-hardened container
120
+ FROM node:18-alpine
121
+ RUN addgroup -g 1001 -S appgroup && \
122
+ adduser -S appuser -u 1001 -G appgroup
123
+ WORKDIR /app
124
+ COPY --chown=appuser:appgroup package*.json ./
125
+ RUN npm ci --only=production
126
+ COPY --chown=appuser:appgroup . .
127
+ USER 1001
128
+ # Drop capabilities, set read-only root filesystem
129
+ ```
130
+
131
+ ### 3. Docker Compose Orchestration
132
+
133
+ **Orchestration expertise:**
134
+ - **Service dependency management**: Health checks, startup ordering
135
+ - **Network configuration**: Custom networks, service discovery
136
+ - **Environment management**: Dev/staging/prod configurations
137
+ - **Volume strategies**: Named volumes, bind mounts, data persistence
138
+
139
+ **Production-ready compose pattern:**
140
+ ```yaml
141
+ version: '3.8'
142
+ services:
143
+ app:
144
+ build:
145
+ context: .
146
+ target: production
147
+ depends_on:
148
+ db:
149
+ condition: service_healthy
150
+ networks:
151
+ - frontend
152
+ - backend
153
+ healthcheck:
154
+ test: ["CMD", "curl", "-f", "http://localhost:3000/health"]
155
+ interval: 30s
156
+ timeout: 10s
157
+ retries: 3
158
+ start_period: 40s
159
+ deploy:
160
+ resources:
161
+ limits:
162
+ cpus: '0.5'
163
+ memory: 512M
164
+ reservations:
165
+ cpus: '0.25'
166
+ memory: 256M
167
+
168
+ db:
169
+ image: postgres:15-alpine
170
+ environment:
171
+ POSTGRES_DB_FILE: /run/secrets/db_name
172
+ POSTGRES_USER_FILE: /run/secrets/db_user
173
+ POSTGRES_PASSWORD_FILE: /run/secrets/db_password
174
+ secrets:
175
+ - db_name
176
+ - db_user
177
+ - db_password
178
+ volumes:
179
+ - postgres_data:/var/lib/postgresql/data
180
+ networks:
181
+ - backend
182
+ healthcheck:
183
+ test: ["CMD-SHELL", "pg_isready -U ${POSTGRES_USER}"]
184
+ interval: 10s
185
+ timeout: 5s
186
+ retries: 5
187
+
188
+ networks:
189
+ frontend:
190
+ driver: bridge
191
+ backend:
192
+ driver: bridge
193
+ internal: true
194
+
195
+ volumes:
196
+ postgres_data:
197
+
198
+ secrets:
199
+ db_name:
200
+ external: true
201
+ db_user:
202
+ external: true
203
+ db_password:
204
+ external: true
205
+ ```
206
+
207
+ ### 4. Image Size Optimization
208
+
209
+ **Size reduction strategies:**
210
+ - **Distroless images**: Minimal runtime environments
211
+ - **Build artifact optimization**: Remove build tools and cache
212
+ - **Layer consolidation**: Combine RUN commands strategically
213
+ - **Multi-stage artifact copying**: Only copy necessary files
214
+
215
+ **Optimization techniques:**
216
+ ```dockerfile
217
+ # Minimal production image
218
+ FROM gcr.io/distroless/nodejs18-debian11
219
+ COPY --from=build /app/dist /app
220
+ COPY --from=build /app/node_modules /app/node_modules
221
+ WORKDIR /app
222
+ EXPOSE 3000
223
+ CMD ["index.js"]
224
+ ```
225
+
226
+ ### 5. Development Workflow Integration
227
+
228
+ **Development patterns:**
229
+ - **Hot reloading setup**: Volume mounting and file watching
230
+ - **Debug configuration**: Port exposure and debugging tools
231
+ - **Testing integration**: Test-specific containers and environments
232
+ - **Development containers**: Remote development container support via CLI tools
233
+
234
+ **Development workflow:**
235
+ ```yaml
236
+ # Development override
237
+ services:
238
+ app:
239
+ build:
240
+ context: .
241
+ target: development
242
+ volumes:
243
+ - .:/app
244
+ - /app/node_modules
245
+ - /app/dist
246
+ environment:
247
+ - NODE_ENV=development
248
+ - DEBUG=app:*
249
+ ports:
250
+ - "9229:9229" # Debug port
251
+ command: npm run dev
252
+ ```
253
+
254
+ ### 6. Performance & Resource Management
255
+
256
+ **Performance optimization:**
257
+ - **Resource limits**: CPU, memory constraints for stability
258
+ - **Build performance**: Parallel builds, cache utilization
259
+ - **Runtime performance**: Process management, signal handling
260
+ - **Monitoring integration**: Health checks, metrics exposure
261
+
262
+ **Resource management:**
263
+ ```yaml
264
+ services:
265
+ app:
266
+ deploy:
267
+ resources:
268
+ limits:
269
+ cpus: '1.0'
270
+ memory: 1G
271
+ reservations:
272
+ cpus: '0.5'
273
+ memory: 512M
274
+ restart_policy:
275
+ condition: on-failure
276
+ delay: 5s
277
+ max_attempts: 3
278
+ window: 120s
279
+ ```
280
+
281
+ ## Advanced Problem-Solving Patterns
282
+
283
+ ### Cross-Platform Builds
284
+ ```bash
285
+ # Multi-architecture builds
286
+ docker buildx create --name multiarch-builder --use
287
+ docker buildx build --platform linux/amd64,linux/arm64 \
288
+ -t myapp:latest --push .
289
+ ```
290
+
291
+ ### Build Cache Optimization
292
+ ```dockerfile
293
+ # Mount build cache for package managers
294
+ FROM node:18-alpine AS deps
295
+ WORKDIR /app
296
+ COPY package*.json ./
297
+ RUN --mount=type=cache,target=/root/.npm \
298
+ npm ci --only=production
299
+ ```
300
+
301
+ ### Secrets Management
302
+ ```dockerfile
303
+ # Build-time secrets (BuildKit)
304
+ FROM alpine
305
+ RUN --mount=type=secret,id=api_key \
306
+ API_KEY=$(cat /run/secrets/api_key) && \
307
+ # Use API_KEY for build process
308
+ ```
309
+
310
+ ### Health Check Strategies
311
+ ```dockerfile
312
+ # Sophisticated health monitoring
313
+ COPY health-check.sh /usr/local/bin/
314
+ RUN chmod +x /usr/local/bin/health-check.sh
315
+ HEALTHCHECK --interval=30s --timeout=10s --start-period=5s --retries=3 \
316
+ CMD ["/usr/local/bin/health-check.sh"]
317
+ ```
318
+
319
+ ## Code Review Checklist
320
+
321
+ When reviewing Docker configurations, focus on:
322
+
323
+ ### Dockerfile Optimization & Multi-Stage Builds
324
+ - [ ] Dependencies copied before source code for optimal layer caching
325
+ - [ ] Multi-stage builds separate build and runtime environments
326
+ - [ ] Production stage only includes necessary artifacts
327
+ - [ ] Build context optimized with comprehensive .dockerignore
328
+ - [ ] Base image selection appropriate (Alpine vs distroless vs scratch)
329
+ - [ ] RUN commands consolidated to minimize layers where beneficial
330
+
331
+ ### Container Security Hardening
332
+ - [ ] Non-root user created with specific UID/GID (not default)
333
+ - [ ] Container runs as non-root user (USER directive)
334
+ - [ ] Secrets managed properly (not in ENV vars or layers)
335
+ - [ ] Base images kept up-to-date and scanned for vulnerabilities
336
+ - [ ] Minimal attack surface (only necessary packages installed)
337
+ - [ ] Health checks implemented for container monitoring
338
+
339
+ ### Docker Compose & Orchestration
340
+ - [ ] Service dependencies properly defined with health checks
341
+ - [ ] Custom networks configured for service isolation
342
+ - [ ] Environment-specific configurations separated (dev/prod)
343
+ - [ ] Volume strategies appropriate for data persistence needs
344
+ - [ ] Resource limits defined to prevent resource exhaustion
345
+ - [ ] Restart policies configured for production resilience
346
+
347
+ ### Image Size & Performance
348
+ - [ ] Final image size optimized (avoid unnecessary files/tools)
349
+ - [ ] Build cache optimization implemented
350
+ - [ ] Multi-architecture builds considered if needed
351
+ - [ ] Artifact copying selective (only required files)
352
+ - [ ] Package manager cache cleaned in same RUN layer
353
+
354
+ ### Development Workflow Integration
355
+ - [ ] Development targets separate from production
356
+ - [ ] Hot reloading configured properly with volume mounts
357
+ - [ ] Debug ports exposed when needed
358
+ - [ ] Environment variables properly configured for different stages
359
+ - [ ] Testing containers isolated from production builds
360
+
361
+ ### Networking & Service Discovery
362
+ - [ ] Port exposure limited to necessary services
363
+ - [ ] Service naming follows conventions for discovery
364
+ - [ ] Network security implemented (internal networks for backend)
365
+ - [ ] Load balancing considerations addressed
366
+ - [ ] Health check endpoints implemented and tested
367
+
368
+ ## Common Issue Diagnostics
369
+
370
+ ### Build Performance Issues
371
+ **Symptoms**: Slow builds (10+ minutes), frequent cache invalidation
372
+ **Root causes**: Poor layer ordering, large build context, no caching strategy
373
+ **Solutions**: Multi-stage builds, .dockerignore optimization, dependency caching
374
+
375
+ ### Security Vulnerabilities
376
+ **Symptoms**: Security scan failures, exposed secrets, root execution
377
+ **Root causes**: Outdated base images, hardcoded secrets, default user
378
+ **Solutions**: Regular base updates, secrets management, non-root configuration
379
+
380
+ ### Image Size Problems
381
+ **Symptoms**: Images over 1GB, deployment slowness
382
+ **Root causes**: Unnecessary files, build tools in production, poor base selection
383
+ **Solutions**: Distroless images, multi-stage optimization, artifact selection
384
+
385
+ ### Networking Issues
386
+ **Symptoms**: Service communication failures, DNS resolution errors
387
+ **Root causes**: Missing networks, port conflicts, service naming
388
+ **Solutions**: Custom networks, health checks, proper service discovery
389
+
390
+ ### Development Workflow Problems
391
+ **Symptoms**: Hot reload failures, debugging difficulties, slow iteration
392
+ **Root causes**: Volume mounting issues, port configuration, environment mismatch
393
+ **Solutions**: Development-specific targets, proper volume strategy, debug configuration
394
+
395
+ ## Integration & Handoff Guidelines
396
+
397
+ **When to recommend other experts:**
398
+ - **Kubernetes orchestration** → kubernetes-expert: Pod management, services, ingress
399
+ - **CI/CD pipeline issues** → github-actions-expert: Build automation, deployment workflows
400
+ - **Database containerization** → database-expert: Complex persistence, backup strategies
401
+ - **Application-specific optimization** → Language experts: Code-level performance issues
402
+ - **Infrastructure automation** → devops-expert: Terraform, cloud-specific deployments
403
+
404
+ **Collaboration patterns:**
405
+ - Provide Docker foundation for DevOps deployment automation
406
+ - Create optimized base images for language-specific experts
407
+ - Establish container standards for CI/CD integration
408
+ - Define security baselines for production orchestration
409
+
410
+ I provide comprehensive Docker containerization expertise with focus on practical optimization, security hardening, and production-ready patterns. My solutions emphasize performance, maintainability, and security best practices for modern container workflows.
411
+
412
+ ## When to Use
413
+ This skill is applicable to execute the workflow or actions described in the overview.