cp-toolkit 2.2.3 → 2.2.4

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (71) hide show
  1. package/package.json +1 -1
  2. package/src/commands/add.js +23 -16
  3. package/src/commands/doctor.js +15 -10
  4. package/src/commands/init.js +55 -16
  5. package/templates/AGENTS.md +47 -0
  6. package/templates/ARCHITECTURE.md +42 -0
  7. package/templates/agents/backend-specialist.md +1 -0
  8. package/templates/agents/code-archaeologist.md +116 -106
  9. package/templates/agents/database-architect.md +1 -0
  10. package/templates/agents/debugger.md +1 -0
  11. package/templates/agents/devops-engineer.md +1 -0
  12. package/templates/agents/documentation-writer.md +1 -0
  13. package/templates/agents/explorer-agent.md +83 -73
  14. package/templates/agents/frontend-specialist.md +1 -0
  15. package/templates/agents/game-developer.md +1 -0
  16. package/templates/agents/mobile-developer.md +1 -0
  17. package/templates/agents/orchestrator.md +426 -416
  18. package/templates/agents/penetration-tester.md +1 -0
  19. package/templates/agents/performance-optimizer.md +1 -0
  20. package/templates/agents/product-manager.md +122 -112
  21. package/templates/agents/product-owner.md +105 -95
  22. package/templates/agents/project-planner.md +416 -406
  23. package/templates/agents/qa-automation-engineer.md +113 -103
  24. package/templates/agents/security-auditor.md +1 -0
  25. package/templates/agents/seo-specialist.md +1 -0
  26. package/templates/agents/test-engineer.md +1 -0
  27. package/templates/skills/core/behavioral-modes/SKILL.md +244 -242
  28. package/templates/skills/core/brainstorming/SKILL.md +166 -163
  29. package/templates/skills/core/mcp-builder/SKILL.md +178 -176
  30. package/templates/skills/core/parallel-agents/SKILL.md +187 -175
  31. package/templates/skills/core/plan-writing/SKILL.md +154 -152
  32. package/templates/skills/optional/api-patterns/SKILL.md +83 -81
  33. package/templates/skills/optional/app-builder/SKILL.md +78 -75
  34. package/templates/skills/optional/app-builder/templates/SKILL.md +41 -39
  35. package/templates/skills/optional/architecture/SKILL.md +58 -55
  36. package/templates/skills/optional/bash-linux/SKILL.md +201 -199
  37. package/templates/skills/optional/code-review-checklist/SKILL.md +110 -109
  38. package/templates/skills/optional/database-design/SKILL.md +54 -52
  39. package/templates/skills/optional/deployment-procedures/SKILL.md +243 -241
  40. package/templates/skills/optional/documentation-templates/SKILL.md +196 -194
  41. package/templates/skills/optional/frontend-design/SKILL.md +421 -418
  42. package/templates/skills/optional/game-development/2d-games/SKILL.md +120 -119
  43. package/templates/skills/optional/game-development/3d-games/SKILL.md +136 -135
  44. package/templates/skills/optional/game-development/SKILL.md +169 -167
  45. package/templates/skills/optional/game-development/game-art/SKILL.md +187 -185
  46. package/templates/skills/optional/game-development/game-audio/SKILL.md +192 -190
  47. package/templates/skills/optional/game-development/game-design/SKILL.md +131 -129
  48. package/templates/skills/optional/game-development/mobile-games/SKILL.md +110 -108
  49. package/templates/skills/optional/game-development/multiplayer/SKILL.md +133 -132
  50. package/templates/skills/optional/game-development/pc-games/SKILL.md +146 -144
  51. package/templates/skills/optional/game-development/vr-ar/SKILL.md +124 -123
  52. package/templates/skills/optional/game-development/web-games/SKILL.md +152 -150
  53. package/templates/skills/optional/geo-fundamentals/SKILL.md +158 -156
  54. package/templates/skills/optional/i18n-localization/SKILL.md +156 -154
  55. package/templates/skills/optional/lint-and-validate/SKILL.md +48 -45
  56. package/templates/skills/optional/mobile-design/SKILL.md +397 -394
  57. package/templates/skills/optional/nextjs-react-expert/SKILL.md +271 -267
  58. package/templates/skills/optional/nodejs-best-practices/SKILL.md +335 -333
  59. package/templates/skills/optional/performance-profiling/SKILL.md +145 -143
  60. package/templates/skills/optional/powershell-windows/SKILL.md +169 -167
  61. package/templates/skills/optional/python-patterns/SKILL.md +443 -441
  62. package/templates/skills/optional/red-team-tactics/SKILL.md +201 -199
  63. package/templates/skills/optional/seo-fundamentals/SKILL.md +130 -129
  64. package/templates/skills/optional/server-management/SKILL.md +163 -161
  65. package/templates/skills/optional/systematic-debugging/SKILL.md +111 -109
  66. package/templates/skills/optional/tailwind-patterns/SKILL.md +271 -269
  67. package/templates/skills/optional/tdd-workflow/SKILL.md +150 -149
  68. package/templates/skills/optional/testing-patterns/SKILL.md +179 -178
  69. package/templates/skills/optional/vulnerability-scanner/SKILL.md +278 -276
  70. package/templates/skills/optional/web-design-guidelines/SKILL.md +60 -57
  71. package/templates/skills/optional/webapp-testing/SKILL.md +188 -187
@@ -1,199 +1,201 @@
1
- ---
2
- name: red-team-tactics
3
- description: Red team tactics principles based on MITRE ATT&CK. Attack phases, detection evasion, reporting.
4
- allowed-tools: Read, Glob, Grep
5
- ---
6
-
7
- # Red Team Tactics
8
-
9
- > Adversary simulation principles based on MITRE ATT&CK framework.
10
-
11
- ---
12
-
13
- ## 1. MITRE ATT&CK Phases
14
-
15
- ### Attack Lifecycle
16
-
17
- ```
18
- RECONNAISSANCE → INITIAL ACCESS → EXECUTION → PERSISTENCE
19
- ↓ ↓ ↓ ↓
20
- PRIVILEGE ESC DEFENSE EVASIONCRED ACCESS DISCOVERY
21
- ↓ ↓ ↓ ↓
22
- LATERAL MOVEMENTCOLLECTIONC2 EXFILTRATION IMPACT
23
- ```
24
-
25
- ### Phase Objectives
26
-
27
- | Phase | Objective |
28
- |-------|-----------|
29
- | **Recon** | Map attack surface |
30
- | **Initial Access** | Get first foothold |
31
- | **Execution** | Run code on target |
32
- | **Persistence** | Survive reboots |
33
- | **Privilege Escalation** | Get admin/root |
34
- | **Defense Evasion** | Avoid detection |
35
- | **Credential Access** | Harvest credentials |
36
- | **Discovery** | Map internal network |
37
- | **Lateral Movement** | Spread to other systems |
38
- | **Collection** | Gather target data |
39
- | **C2** | Maintain command channel |
40
- | **Exfiltration** | Extract data |
41
-
42
- ---
43
-
44
- ## 2. Reconnaissance Principles
45
-
46
- ### Passive vs Active
47
-
48
- | Type | Trade-off |
49
- |------|-----------|
50
- | **Passive** | No target contact, limited info |
51
- | **Active** | Direct contact, more detection risk |
52
-
53
- ### Information Targets
54
-
55
- | Category | Value |
56
- |----------|-------|
57
- | Technology stack | Attack vector selection |
58
- | Employee info | Social engineering |
59
- | Network ranges | Scanning scope |
60
- | Third parties | Supply chain attack |
61
-
62
- ---
63
-
64
- ## 3. Initial Access Vectors
65
-
66
- ### Selection Criteria
67
-
68
- | Vector | When to Use |
69
- |--------|-------------|
70
- | **Phishing** | Human target, email access |
71
- | **Public exploits** | Vulnerable services exposed |
72
- | **Valid credentials** | Leaked or cracked |
73
- | **Supply chain** | Third-party access |
74
-
75
- ---
76
-
77
- ## 4. Privilege Escalation Principles
78
-
79
- ### Windows Targets
80
-
81
- | Check | Opportunity |
82
- |-------|-------------|
83
- | Unquoted service paths | Write to path |
84
- | Weak service permissions | Modify service |
85
- | Token privileges | Abuse SeDebug, etc. |
86
- | Stored credentials | Harvest |
87
-
88
- ### Linux Targets
89
-
90
- | Check | Opportunity |
91
- |-------|-------------|
92
- | SUID binaries | Execute as owner |
93
- | Sudo misconfiguration | Command execution |
94
- | Kernel vulnerabilities | Kernel exploits |
95
- | Cron jobs | Writable scripts |
96
-
97
- ---
98
-
99
- ## 5. Defense Evasion Principles
100
-
101
- ### Key Techniques
102
-
103
- | Technique | Purpose |
104
- |-----------|---------|
105
- | LOLBins | Use legitimate tools |
106
- | Obfuscation | Hide malicious code |
107
- | Timestomping | Hide file modifications |
108
- | Log clearing | Remove evidence |
109
-
110
- ### Operational Security
111
-
112
- - Work during business hours
113
- - Mimic legitimate traffic patterns
114
- - Use encrypted channels
115
- - Blend with normal behavior
116
-
117
- ---
118
-
119
- ## 6. Lateral Movement Principles
120
-
121
- ### Credential Types
122
-
123
- | Type | Use |
124
- |------|-----|
125
- | Password | Standard auth |
126
- | Hash | Pass-the-hash |
127
- | Ticket | Pass-the-ticket |
128
- | Certificate | Certificate auth |
129
-
130
- ### Movement Paths
131
-
132
- - Admin shares
133
- - Remote services (RDP, SSH, WinRM)
134
- - Exploitation of internal services
135
-
136
- ---
137
-
138
- ## 7. Active Directory Attacks
139
-
140
- ### Attack Categories
141
-
142
- | Attack | Target |
143
- |--------|--------|
144
- | Kerberoasting | Service account passwords |
145
- | AS-REP Roasting | Accounts without pre-auth |
146
- | DCSync | Domain credentials |
147
- | Golden Ticket | Persistent domain access |
148
-
149
- ---
150
-
151
- ## 8. Reporting Principles
152
-
153
- ### Attack Narrative
154
-
155
- Document the full attack chain:
156
- 1. How initial access was gained
157
- 2. What techniques were used
158
- 3. What objectives were achieved
159
- 4. Where detection failed
160
-
161
- ### Detection Gaps
162
-
163
- For each successful technique:
164
- - What should have detected it?
165
- - Why didn't detection work?
166
- - How to improve detection
167
-
168
- ---
169
-
170
- ## 9. Ethical Boundaries
171
-
172
- ### Always
173
-
174
- - Stay within scope
175
- - Minimize impact
176
- - Report immediately if real threat found
177
- - Document all actions
178
-
179
- ### Never
180
-
181
- - Destroy production data
182
- - Cause denial of service (unless scoped)
183
- - Access beyond proof of concept
184
- - Retain sensitive data
185
-
186
- ---
187
-
188
- ## 10. Anti-Patterns
189
-
190
- | Don't | ✅ Do |
191
- |----------|-------|
192
- | Rush to exploitation | Follow methodology |
193
- | Cause damage | Minimize impact |
194
- | Skip reporting | Document everything |
195
- | Ignore scope | Stay within boundaries |
196
-
197
- ---
198
-
199
- > **Remember:** Red team simulates attackers to improve defenses, not to cause harm.
1
+ ---
2
+ name: red-team-tactics
3
+ description: Red team tactics principles based on MITRE ATT&CK. Attack phases, detection
4
+ evasion, reporting.
5
+ allowed-tools: Read, Glob, Grep
6
+ version: '1.0'
7
+ ---
8
+
9
+ # Red Team Tactics
10
+
11
+ > Adversary simulation principles based on MITRE ATT&CK framework.
12
+
13
+ ---
14
+
15
+ ## 1. MITRE ATT&CK Phases
16
+
17
+ ### Attack Lifecycle
18
+
19
+ ```
20
+ RECONNAISSANCEINITIAL ACCESSEXECUTIONPERSISTENCE
21
+ ↓ ↓ ↓ ↓
22
+ PRIVILEGE ESCDEFENSE EVASION CRED ACCESSDISCOVERY
23
+ ↓ ↓ ↓ ↓
24
+ LATERAL MOVEMENT → COLLECTION → C2 → EXFILTRATION → IMPACT
25
+ ```
26
+
27
+ ### Phase Objectives
28
+
29
+ | Phase | Objective |
30
+ |-------|-----------|
31
+ | **Recon** | Map attack surface |
32
+ | **Initial Access** | Get first foothold |
33
+ | **Execution** | Run code on target |
34
+ | **Persistence** | Survive reboots |
35
+ | **Privilege Escalation** | Get admin/root |
36
+ | **Defense Evasion** | Avoid detection |
37
+ | **Credential Access** | Harvest credentials |
38
+ | **Discovery** | Map internal network |
39
+ | **Lateral Movement** | Spread to other systems |
40
+ | **Collection** | Gather target data |
41
+ | **C2** | Maintain command channel |
42
+ | **Exfiltration** | Extract data |
43
+
44
+ ---
45
+
46
+ ## 2. Reconnaissance Principles
47
+
48
+ ### Passive vs Active
49
+
50
+ | Type | Trade-off |
51
+ |------|-----------|
52
+ | **Passive** | No target contact, limited info |
53
+ | **Active** | Direct contact, more detection risk |
54
+
55
+ ### Information Targets
56
+
57
+ | Category | Value |
58
+ |----------|-------|
59
+ | Technology stack | Attack vector selection |
60
+ | Employee info | Social engineering |
61
+ | Network ranges | Scanning scope |
62
+ | Third parties | Supply chain attack |
63
+
64
+ ---
65
+
66
+ ## 3. Initial Access Vectors
67
+
68
+ ### Selection Criteria
69
+
70
+ | Vector | When to Use |
71
+ |--------|-------------|
72
+ | **Phishing** | Human target, email access |
73
+ | **Public exploits** | Vulnerable services exposed |
74
+ | **Valid credentials** | Leaked or cracked |
75
+ | **Supply chain** | Third-party access |
76
+
77
+ ---
78
+
79
+ ## 4. Privilege Escalation Principles
80
+
81
+ ### Windows Targets
82
+
83
+ | Check | Opportunity |
84
+ |-------|-------------|
85
+ | Unquoted service paths | Write to path |
86
+ | Weak service permissions | Modify service |
87
+ | Token privileges | Abuse SeDebug, etc. |
88
+ | Stored credentials | Harvest |
89
+
90
+ ### Linux Targets
91
+
92
+ | Check | Opportunity |
93
+ |-------|-------------|
94
+ | SUID binaries | Execute as owner |
95
+ | Sudo misconfiguration | Command execution |
96
+ | Kernel vulnerabilities | Kernel exploits |
97
+ | Cron jobs | Writable scripts |
98
+
99
+ ---
100
+
101
+ ## 5. Defense Evasion Principles
102
+
103
+ ### Key Techniques
104
+
105
+ | Technique | Purpose |
106
+ |-----------|---------|
107
+ | LOLBins | Use legitimate tools |
108
+ | Obfuscation | Hide malicious code |
109
+ | Timestomping | Hide file modifications |
110
+ | Log clearing | Remove evidence |
111
+
112
+ ### Operational Security
113
+
114
+ - Work during business hours
115
+ - Mimic legitimate traffic patterns
116
+ - Use encrypted channels
117
+ - Blend with normal behavior
118
+
119
+ ---
120
+
121
+ ## 6. Lateral Movement Principles
122
+
123
+ ### Credential Types
124
+
125
+ | Type | Use |
126
+ |------|-----|
127
+ | Password | Standard auth |
128
+ | Hash | Pass-the-hash |
129
+ | Ticket | Pass-the-ticket |
130
+ | Certificate | Certificate auth |
131
+
132
+ ### Movement Paths
133
+
134
+ - Admin shares
135
+ - Remote services (RDP, SSH, WinRM)
136
+ - Exploitation of internal services
137
+
138
+ ---
139
+
140
+ ## 7. Active Directory Attacks
141
+
142
+ ### Attack Categories
143
+
144
+ | Attack | Target |
145
+ |--------|--------|
146
+ | Kerberoasting | Service account passwords |
147
+ | AS-REP Roasting | Accounts without pre-auth |
148
+ | DCSync | Domain credentials |
149
+ | Golden Ticket | Persistent domain access |
150
+
151
+ ---
152
+
153
+ ## 8. Reporting Principles
154
+
155
+ ### Attack Narrative
156
+
157
+ Document the full attack chain:
158
+ 1. How initial access was gained
159
+ 2. What techniques were used
160
+ 3. What objectives were achieved
161
+ 4. Where detection failed
162
+
163
+ ### Detection Gaps
164
+
165
+ For each successful technique:
166
+ - What should have detected it?
167
+ - Why didn't detection work?
168
+ - How to improve detection
169
+
170
+ ---
171
+
172
+ ## 9. Ethical Boundaries
173
+
174
+ ### Always
175
+
176
+ - Stay within scope
177
+ - Minimize impact
178
+ - Report immediately if real threat found
179
+ - Document all actions
180
+
181
+ ### Never
182
+
183
+ - Destroy production data
184
+ - Cause denial of service (unless scoped)
185
+ - Access beyond proof of concept
186
+ - Retain sensitive data
187
+
188
+ ---
189
+
190
+ ## 10. Anti-Patterns
191
+
192
+ | Don't | Do |
193
+ |----------|-------|
194
+ | Rush to exploitation | Follow methodology |
195
+ | Cause damage | Minimize impact |
196
+ | Skip reporting | Document everything |
197
+ | Ignore scope | Stay within boundaries |
198
+
199
+ ---
200
+
201
+ > **Remember:** Red team simulates attackers to improve defenses, not to cause harm.
@@ -1,129 +1,130 @@
1
- ---
2
- name: seo-fundamentals
3
- description: SEO fundamentals, E-E-A-T, Core Web Vitals, and Google algorithm principles.
4
- allowed-tools: Read, Glob, Grep
5
- ---
6
-
7
- # SEO Fundamentals
8
-
9
- > Principles for search engine visibility.
10
-
11
- ---
12
-
13
- ## 1. E-E-A-T Framework
14
-
15
- | Principle | Signals |
16
- |-----------|---------|
17
- | **Experience** | First-hand knowledge, real examples |
18
- | **Expertise** | Credentials, depth of knowledge |
19
- | **Authoritativeness** | Backlinks, mentions, industry recognition |
20
- | **Trustworthiness** | HTTPS, transparency, accurate info |
21
-
22
- ---
23
-
24
- ## 2. Core Web Vitals
25
-
26
- | Metric | Target | Measures |
27
- |--------|--------|----------|
28
- | **LCP** | < 2.5s | Loading performance |
29
- | **INP** | < 200ms | Interactivity |
30
- | **CLS** | < 0.1 | Visual stability |
31
-
32
- ---
33
-
34
- ## 3. Technical SEO Principles
35
-
36
- ### Site Structure
37
-
38
- | Element | Purpose |
39
- |---------|---------|
40
- | XML sitemap | Help crawling |
41
- | robots.txt | Control access |
42
- | Canonical tags | Prevent duplicates |
43
- | HTTPS | Security signal |
44
-
45
- ### Performance
46
-
47
- | Factor | Impact |
48
- |--------|--------|
49
- | Page speed | Core Web Vital |
50
- | Mobile-friendly | Ranking factor |
51
- | Clean URLs | Crawlability |
52
-
53
- ---
54
-
55
- ## 4. Content SEO Principles
56
-
57
- ### Page Elements
58
-
59
- | Element | Best Practice |
60
- |---------|---------------|
61
- | Title tag | 50-60 chars, keyword front |
62
- | Meta description | 150-160 chars, compelling |
63
- | H1 | One per page, main keyword |
64
- | H2-H6 | Logical hierarchy |
65
- | Alt text | Descriptive, not stuffed |
66
-
67
- ### Content Quality
68
-
69
- | Factor | Importance |
70
- |--------|------------|
71
- | Depth | Comprehensive coverage |
72
- | Freshness | Regular updates |
73
- | Uniqueness | Original value |
74
- | Readability | Clear writing |
75
-
76
- ---
77
-
78
- ## 5. Schema Markup Types
79
-
80
- | Type | Use |
81
- |------|-----|
82
- | Article | Blog posts, news |
83
- | Organization | Company info |
84
- | Person | Author profiles |
85
- | FAQPage | Q&A content |
86
- | Product | E-commerce |
87
- | Review | Ratings |
88
- | BreadcrumbList | Navigation |
89
-
90
- ---
91
-
92
- ## 6. AI Content Guidelines
93
-
94
- ### What Google Looks For
95
-
96
- | ✅ Do | ❌ Don't |
97
- |-------|----------|
98
- | AI draft + human edit | Publish raw AI content |
99
- | Add original insights | Copy without value |
100
- | Expert review | Skip fact-checking |
101
- | Follow E-E-A-T | Keyword stuffing |
102
-
103
- ---
104
-
105
- ## 7. Ranking Factors (Prioritized)
106
-
107
- | Priority | Factor |
108
- |----------|--------|
109
- | 1 | Quality, relevant content |
110
- | 2 | Backlinks from authority sites |
111
- | 3 | Page experience (Core Web Vitals) |
112
- | 4 | Mobile optimization |
113
- | 5 | Technical SEO fundamentals |
114
-
115
- ---
116
-
117
- ## 8. Measurement
118
-
119
- | Metric | Tool |
120
- |--------|------|
121
- | Rankings | Search Console, Ahrefs |
122
- | Traffic | Analytics |
123
- | Core Web Vitals | PageSpeed Insights |
124
- | Indexing | Search Console |
125
- | Backlinks | Ahrefs, Semrush |
126
-
127
- ---
128
-
129
- > **Remember:** SEO is a long-term game. Quality content + technical excellence + patience = results.
1
+ ---
2
+ name: seo-fundamentals
3
+ description: SEO fundamentals, E-E-A-T, Core Web Vitals, and Google algorithm principles.
4
+ allowed-tools: Read, Glob, Grep
5
+ version: '1.0'
6
+ ---
7
+
8
+ # SEO Fundamentals
9
+
10
+ > Principles for search engine visibility.
11
+
12
+ ---
13
+
14
+ ## 1. E-E-A-T Framework
15
+
16
+ | Principle | Signals |
17
+ |-----------|---------|
18
+ | **Experience** | First-hand knowledge, real examples |
19
+ | **Expertise** | Credentials, depth of knowledge |
20
+ | **Authoritativeness** | Backlinks, mentions, industry recognition |
21
+ | **Trustworthiness** | HTTPS, transparency, accurate info |
22
+
23
+ ---
24
+
25
+ ## 2. Core Web Vitals
26
+
27
+ | Metric | Target | Measures |
28
+ |--------|--------|----------|
29
+ | **LCP** | < 2.5s | Loading performance |
30
+ | **INP** | < 200ms | Interactivity |
31
+ | **CLS** | < 0.1 | Visual stability |
32
+
33
+ ---
34
+
35
+ ## 3. Technical SEO Principles
36
+
37
+ ### Site Structure
38
+
39
+ | Element | Purpose |
40
+ |---------|---------|
41
+ | XML sitemap | Help crawling |
42
+ | robots.txt | Control access |
43
+ | Canonical tags | Prevent duplicates |
44
+ | HTTPS | Security signal |
45
+
46
+ ### Performance
47
+
48
+ | Factor | Impact |
49
+ |--------|--------|
50
+ | Page speed | Core Web Vital |
51
+ | Mobile-friendly | Ranking factor |
52
+ | Clean URLs | Crawlability |
53
+
54
+ ---
55
+
56
+ ## 4. Content SEO Principles
57
+
58
+ ### Page Elements
59
+
60
+ | Element | Best Practice |
61
+ |---------|---------------|
62
+ | Title tag | 50-60 chars, keyword front |
63
+ | Meta description | 150-160 chars, compelling |
64
+ | H1 | One per page, main keyword |
65
+ | H2-H6 | Logical hierarchy |
66
+ | Alt text | Descriptive, not stuffed |
67
+
68
+ ### Content Quality
69
+
70
+ | Factor | Importance |
71
+ |--------|------------|
72
+ | Depth | Comprehensive coverage |
73
+ | Freshness | Regular updates |
74
+ | Uniqueness | Original value |
75
+ | Readability | Clear writing |
76
+
77
+ ---
78
+
79
+ ## 5. Schema Markup Types
80
+
81
+ | Type | Use |
82
+ |------|-----|
83
+ | Article | Blog posts, news |
84
+ | Organization | Company info |
85
+ | Person | Author profiles |
86
+ | FAQPage | Q&A content |
87
+ | Product | E-commerce |
88
+ | Review | Ratings |
89
+ | BreadcrumbList | Navigation |
90
+
91
+ ---
92
+
93
+ ## 6. AI Content Guidelines
94
+
95
+ ### What Google Looks For
96
+
97
+ | ✅ Do | ❌ Don't |
98
+ |-------|----------|
99
+ | AI draft + human edit | Publish raw AI content |
100
+ | Add original insights | Copy without value |
101
+ | Expert review | Skip fact-checking |
102
+ | Follow E-E-A-T | Keyword stuffing |
103
+
104
+ ---
105
+
106
+ ## 7. Ranking Factors (Prioritized)
107
+
108
+ | Priority | Factor |
109
+ |----------|--------|
110
+ | 1 | Quality, relevant content |
111
+ | 2 | Backlinks from authority sites |
112
+ | 3 | Page experience (Core Web Vitals) |
113
+ | 4 | Mobile optimization |
114
+ | 5 | Technical SEO fundamentals |
115
+
116
+ ---
117
+
118
+ ## 8. Measurement
119
+
120
+ | Metric | Tool |
121
+ |--------|------|
122
+ | Rankings | Search Console, Ahrefs |
123
+ | Traffic | Analytics |
124
+ | Core Web Vitals | PageSpeed Insights |
125
+ | Indexing | Search Console |
126
+ | Backlinks | Ahrefs, Semrush |
127
+
128
+ ---
129
+
130
+ > **Remember:** SEO is a long-term game. Quality content + technical excellence + patience = results.