cp-toolkit 2.2.3 → 2.2.4
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/package.json +1 -1
- package/src/commands/add.js +23 -16
- package/src/commands/doctor.js +15 -10
- package/src/commands/init.js +55 -16
- package/templates/AGENTS.md +47 -0
- package/templates/ARCHITECTURE.md +42 -0
- package/templates/agents/backend-specialist.md +1 -0
- package/templates/agents/code-archaeologist.md +116 -106
- package/templates/agents/database-architect.md +1 -0
- package/templates/agents/debugger.md +1 -0
- package/templates/agents/devops-engineer.md +1 -0
- package/templates/agents/documentation-writer.md +1 -0
- package/templates/agents/explorer-agent.md +83 -73
- package/templates/agents/frontend-specialist.md +1 -0
- package/templates/agents/game-developer.md +1 -0
- package/templates/agents/mobile-developer.md +1 -0
- package/templates/agents/orchestrator.md +426 -416
- package/templates/agents/penetration-tester.md +1 -0
- package/templates/agents/performance-optimizer.md +1 -0
- package/templates/agents/product-manager.md +122 -112
- package/templates/agents/product-owner.md +105 -95
- package/templates/agents/project-planner.md +416 -406
- package/templates/agents/qa-automation-engineer.md +113 -103
- package/templates/agents/security-auditor.md +1 -0
- package/templates/agents/seo-specialist.md +1 -0
- package/templates/agents/test-engineer.md +1 -0
- package/templates/skills/core/behavioral-modes/SKILL.md +244 -242
- package/templates/skills/core/brainstorming/SKILL.md +166 -163
- package/templates/skills/core/mcp-builder/SKILL.md +178 -176
- package/templates/skills/core/parallel-agents/SKILL.md +187 -175
- package/templates/skills/core/plan-writing/SKILL.md +154 -152
- package/templates/skills/optional/api-patterns/SKILL.md +83 -81
- package/templates/skills/optional/app-builder/SKILL.md +78 -75
- package/templates/skills/optional/app-builder/templates/SKILL.md +41 -39
- package/templates/skills/optional/architecture/SKILL.md +58 -55
- package/templates/skills/optional/bash-linux/SKILL.md +201 -199
- package/templates/skills/optional/code-review-checklist/SKILL.md +110 -109
- package/templates/skills/optional/database-design/SKILL.md +54 -52
- package/templates/skills/optional/deployment-procedures/SKILL.md +243 -241
- package/templates/skills/optional/documentation-templates/SKILL.md +196 -194
- package/templates/skills/optional/frontend-design/SKILL.md +421 -418
- package/templates/skills/optional/game-development/2d-games/SKILL.md +120 -119
- package/templates/skills/optional/game-development/3d-games/SKILL.md +136 -135
- package/templates/skills/optional/game-development/SKILL.md +169 -167
- package/templates/skills/optional/game-development/game-art/SKILL.md +187 -185
- package/templates/skills/optional/game-development/game-audio/SKILL.md +192 -190
- package/templates/skills/optional/game-development/game-design/SKILL.md +131 -129
- package/templates/skills/optional/game-development/mobile-games/SKILL.md +110 -108
- package/templates/skills/optional/game-development/multiplayer/SKILL.md +133 -132
- package/templates/skills/optional/game-development/pc-games/SKILL.md +146 -144
- package/templates/skills/optional/game-development/vr-ar/SKILL.md +124 -123
- package/templates/skills/optional/game-development/web-games/SKILL.md +152 -150
- package/templates/skills/optional/geo-fundamentals/SKILL.md +158 -156
- package/templates/skills/optional/i18n-localization/SKILL.md +156 -154
- package/templates/skills/optional/lint-and-validate/SKILL.md +48 -45
- package/templates/skills/optional/mobile-design/SKILL.md +397 -394
- package/templates/skills/optional/nextjs-react-expert/SKILL.md +271 -267
- package/templates/skills/optional/nodejs-best-practices/SKILL.md +335 -333
- package/templates/skills/optional/performance-profiling/SKILL.md +145 -143
- package/templates/skills/optional/powershell-windows/SKILL.md +169 -167
- package/templates/skills/optional/python-patterns/SKILL.md +443 -441
- package/templates/skills/optional/red-team-tactics/SKILL.md +201 -199
- package/templates/skills/optional/seo-fundamentals/SKILL.md +130 -129
- package/templates/skills/optional/server-management/SKILL.md +163 -161
- package/templates/skills/optional/systematic-debugging/SKILL.md +111 -109
- package/templates/skills/optional/tailwind-patterns/SKILL.md +271 -269
- package/templates/skills/optional/tdd-workflow/SKILL.md +150 -149
- package/templates/skills/optional/testing-patterns/SKILL.md +179 -178
- package/templates/skills/optional/vulnerability-scanner/SKILL.md +278 -276
- package/templates/skills/optional/web-design-guidelines/SKILL.md +60 -57
- package/templates/skills/optional/webapp-testing/SKILL.md +188 -187
|
@@ -1,199 +1,201 @@
|
|
|
1
|
-
---
|
|
2
|
-
name: red-team-tactics
|
|
3
|
-
description: Red team tactics principles based on MITRE ATT&CK. Attack phases, detection
|
|
4
|
-
|
|
5
|
-
|
|
6
|
-
|
|
7
|
-
|
|
8
|
-
|
|
9
|
-
|
|
10
|
-
|
|
11
|
-
|
|
12
|
-
|
|
13
|
-
|
|
14
|
-
|
|
15
|
-
|
|
16
|
-
|
|
17
|
-
|
|
18
|
-
|
|
19
|
-
|
|
20
|
-
|
|
21
|
-
↓ ↓ ↓ ↓
|
|
22
|
-
|
|
23
|
-
|
|
24
|
-
|
|
25
|
-
|
|
26
|
-
|
|
27
|
-
|
|
28
|
-
|
|
29
|
-
|
|
|
30
|
-
|
|
31
|
-
| **
|
|
32
|
-
| **
|
|
33
|
-
| **
|
|
34
|
-
| **
|
|
35
|
-
| **
|
|
36
|
-
| **
|
|
37
|
-
| **
|
|
38
|
-
| **
|
|
39
|
-
| **
|
|
40
|
-
| **
|
|
41
|
-
|
|
42
|
-
|
|
43
|
-
|
|
44
|
-
|
|
45
|
-
|
|
46
|
-
|
|
47
|
-
|
|
48
|
-
|
|
49
|
-
|
|
50
|
-
|
|
|
51
|
-
|
|
52
|
-
|
|
53
|
-
|
|
54
|
-
|
|
55
|
-
|
|
56
|
-
|
|
57
|
-
|
|
|
58
|
-
|
|
59
|
-
|
|
|
60
|
-
|
|
|
61
|
-
|
|
62
|
-
|
|
63
|
-
|
|
64
|
-
|
|
65
|
-
|
|
66
|
-
|
|
67
|
-
|
|
68
|
-
|
|
69
|
-
|
|
70
|
-
|
|
|
71
|
-
|
|
72
|
-
| **
|
|
73
|
-
| **
|
|
74
|
-
|
|
75
|
-
|
|
76
|
-
|
|
77
|
-
|
|
78
|
-
|
|
79
|
-
|
|
80
|
-
|
|
81
|
-
|
|
82
|
-
|
|
83
|
-
|
|
|
84
|
-
|
|
85
|
-
|
|
|
86
|
-
|
|
|
87
|
-
|
|
88
|
-
|
|
89
|
-
|
|
90
|
-
|
|
91
|
-
|
|
92
|
-
|
|
|
93
|
-
|
|
94
|
-
|
|
|
95
|
-
|
|
|
96
|
-
|
|
97
|
-
|
|
98
|
-
|
|
99
|
-
|
|
100
|
-
|
|
101
|
-
|
|
102
|
-
|
|
103
|
-
|
|
104
|
-
|
|
105
|
-
|
|
|
106
|
-
|
|
107
|
-
|
|
|
108
|
-
|
|
|
109
|
-
|
|
110
|
-
|
|
111
|
-
|
|
112
|
-
|
|
113
|
-
|
|
114
|
-
-
|
|
115
|
-
-
|
|
116
|
-
|
|
117
|
-
|
|
118
|
-
|
|
119
|
-
|
|
120
|
-
|
|
121
|
-
|
|
122
|
-
|
|
123
|
-
|
|
124
|
-
|
|
125
|
-
|
|
|
126
|
-
|
|
127
|
-
|
|
|
128
|
-
|
|
|
129
|
-
|
|
130
|
-
|
|
131
|
-
|
|
132
|
-
|
|
133
|
-
|
|
134
|
-
-
|
|
135
|
-
|
|
136
|
-
|
|
137
|
-
|
|
138
|
-
|
|
139
|
-
|
|
140
|
-
|
|
141
|
-
|
|
142
|
-
|
|
143
|
-
|
|
144
|
-
|
|
|
145
|
-
|
|
146
|
-
|
|
|
147
|
-
|
|
|
148
|
-
|
|
149
|
-
|
|
150
|
-
|
|
151
|
-
|
|
152
|
-
|
|
153
|
-
|
|
154
|
-
|
|
155
|
-
|
|
156
|
-
|
|
157
|
-
|
|
158
|
-
|
|
159
|
-
|
|
160
|
-
|
|
161
|
-
|
|
162
|
-
|
|
163
|
-
|
|
164
|
-
|
|
165
|
-
|
|
166
|
-
-
|
|
167
|
-
|
|
168
|
-
|
|
169
|
-
|
|
170
|
-
|
|
171
|
-
|
|
172
|
-
|
|
173
|
-
|
|
174
|
-
|
|
175
|
-
|
|
176
|
-
-
|
|
177
|
-
-
|
|
178
|
-
|
|
179
|
-
|
|
180
|
-
|
|
181
|
-
|
|
182
|
-
|
|
183
|
-
-
|
|
184
|
-
-
|
|
185
|
-
|
|
186
|
-
|
|
187
|
-
|
|
188
|
-
|
|
189
|
-
|
|
190
|
-
|
|
191
|
-
|
|
192
|
-
|
|
|
193
|
-
|
|
194
|
-
|
|
|
195
|
-
|
|
|
196
|
-
|
|
197
|
-
|
|
198
|
-
|
|
199
|
-
|
|
1
|
+
---
|
|
2
|
+
name: red-team-tactics
|
|
3
|
+
description: Red team tactics principles based on MITRE ATT&CK. Attack phases, detection
|
|
4
|
+
evasion, reporting.
|
|
5
|
+
allowed-tools: Read, Glob, Grep
|
|
6
|
+
version: '1.0'
|
|
7
|
+
---
|
|
8
|
+
|
|
9
|
+
# Red Team Tactics
|
|
10
|
+
|
|
11
|
+
> Adversary simulation principles based on MITRE ATT&CK framework.
|
|
12
|
+
|
|
13
|
+
---
|
|
14
|
+
|
|
15
|
+
## 1. MITRE ATT&CK Phases
|
|
16
|
+
|
|
17
|
+
### Attack Lifecycle
|
|
18
|
+
|
|
19
|
+
```
|
|
20
|
+
RECONNAISSANCE → INITIAL ACCESS → EXECUTION → PERSISTENCE
|
|
21
|
+
↓ ↓ ↓ ↓
|
|
22
|
+
PRIVILEGE ESC → DEFENSE EVASION → CRED ACCESS → DISCOVERY
|
|
23
|
+
↓ ↓ ↓ ↓
|
|
24
|
+
LATERAL MOVEMENT → COLLECTION → C2 → EXFILTRATION → IMPACT
|
|
25
|
+
```
|
|
26
|
+
|
|
27
|
+
### Phase Objectives
|
|
28
|
+
|
|
29
|
+
| Phase | Objective |
|
|
30
|
+
|-------|-----------|
|
|
31
|
+
| **Recon** | Map attack surface |
|
|
32
|
+
| **Initial Access** | Get first foothold |
|
|
33
|
+
| **Execution** | Run code on target |
|
|
34
|
+
| **Persistence** | Survive reboots |
|
|
35
|
+
| **Privilege Escalation** | Get admin/root |
|
|
36
|
+
| **Defense Evasion** | Avoid detection |
|
|
37
|
+
| **Credential Access** | Harvest credentials |
|
|
38
|
+
| **Discovery** | Map internal network |
|
|
39
|
+
| **Lateral Movement** | Spread to other systems |
|
|
40
|
+
| **Collection** | Gather target data |
|
|
41
|
+
| **C2** | Maintain command channel |
|
|
42
|
+
| **Exfiltration** | Extract data |
|
|
43
|
+
|
|
44
|
+
---
|
|
45
|
+
|
|
46
|
+
## 2. Reconnaissance Principles
|
|
47
|
+
|
|
48
|
+
### Passive vs Active
|
|
49
|
+
|
|
50
|
+
| Type | Trade-off |
|
|
51
|
+
|------|-----------|
|
|
52
|
+
| **Passive** | No target contact, limited info |
|
|
53
|
+
| **Active** | Direct contact, more detection risk |
|
|
54
|
+
|
|
55
|
+
### Information Targets
|
|
56
|
+
|
|
57
|
+
| Category | Value |
|
|
58
|
+
|----------|-------|
|
|
59
|
+
| Technology stack | Attack vector selection |
|
|
60
|
+
| Employee info | Social engineering |
|
|
61
|
+
| Network ranges | Scanning scope |
|
|
62
|
+
| Third parties | Supply chain attack |
|
|
63
|
+
|
|
64
|
+
---
|
|
65
|
+
|
|
66
|
+
## 3. Initial Access Vectors
|
|
67
|
+
|
|
68
|
+
### Selection Criteria
|
|
69
|
+
|
|
70
|
+
| Vector | When to Use |
|
|
71
|
+
|--------|-------------|
|
|
72
|
+
| **Phishing** | Human target, email access |
|
|
73
|
+
| **Public exploits** | Vulnerable services exposed |
|
|
74
|
+
| **Valid credentials** | Leaked or cracked |
|
|
75
|
+
| **Supply chain** | Third-party access |
|
|
76
|
+
|
|
77
|
+
---
|
|
78
|
+
|
|
79
|
+
## 4. Privilege Escalation Principles
|
|
80
|
+
|
|
81
|
+
### Windows Targets
|
|
82
|
+
|
|
83
|
+
| Check | Opportunity |
|
|
84
|
+
|-------|-------------|
|
|
85
|
+
| Unquoted service paths | Write to path |
|
|
86
|
+
| Weak service permissions | Modify service |
|
|
87
|
+
| Token privileges | Abuse SeDebug, etc. |
|
|
88
|
+
| Stored credentials | Harvest |
|
|
89
|
+
|
|
90
|
+
### Linux Targets
|
|
91
|
+
|
|
92
|
+
| Check | Opportunity |
|
|
93
|
+
|-------|-------------|
|
|
94
|
+
| SUID binaries | Execute as owner |
|
|
95
|
+
| Sudo misconfiguration | Command execution |
|
|
96
|
+
| Kernel vulnerabilities | Kernel exploits |
|
|
97
|
+
| Cron jobs | Writable scripts |
|
|
98
|
+
|
|
99
|
+
---
|
|
100
|
+
|
|
101
|
+
## 5. Defense Evasion Principles
|
|
102
|
+
|
|
103
|
+
### Key Techniques
|
|
104
|
+
|
|
105
|
+
| Technique | Purpose |
|
|
106
|
+
|-----------|---------|
|
|
107
|
+
| LOLBins | Use legitimate tools |
|
|
108
|
+
| Obfuscation | Hide malicious code |
|
|
109
|
+
| Timestomping | Hide file modifications |
|
|
110
|
+
| Log clearing | Remove evidence |
|
|
111
|
+
|
|
112
|
+
### Operational Security
|
|
113
|
+
|
|
114
|
+
- Work during business hours
|
|
115
|
+
- Mimic legitimate traffic patterns
|
|
116
|
+
- Use encrypted channels
|
|
117
|
+
- Blend with normal behavior
|
|
118
|
+
|
|
119
|
+
---
|
|
120
|
+
|
|
121
|
+
## 6. Lateral Movement Principles
|
|
122
|
+
|
|
123
|
+
### Credential Types
|
|
124
|
+
|
|
125
|
+
| Type | Use |
|
|
126
|
+
|------|-----|
|
|
127
|
+
| Password | Standard auth |
|
|
128
|
+
| Hash | Pass-the-hash |
|
|
129
|
+
| Ticket | Pass-the-ticket |
|
|
130
|
+
| Certificate | Certificate auth |
|
|
131
|
+
|
|
132
|
+
### Movement Paths
|
|
133
|
+
|
|
134
|
+
- Admin shares
|
|
135
|
+
- Remote services (RDP, SSH, WinRM)
|
|
136
|
+
- Exploitation of internal services
|
|
137
|
+
|
|
138
|
+
---
|
|
139
|
+
|
|
140
|
+
## 7. Active Directory Attacks
|
|
141
|
+
|
|
142
|
+
### Attack Categories
|
|
143
|
+
|
|
144
|
+
| Attack | Target |
|
|
145
|
+
|--------|--------|
|
|
146
|
+
| Kerberoasting | Service account passwords |
|
|
147
|
+
| AS-REP Roasting | Accounts without pre-auth |
|
|
148
|
+
| DCSync | Domain credentials |
|
|
149
|
+
| Golden Ticket | Persistent domain access |
|
|
150
|
+
|
|
151
|
+
---
|
|
152
|
+
|
|
153
|
+
## 8. Reporting Principles
|
|
154
|
+
|
|
155
|
+
### Attack Narrative
|
|
156
|
+
|
|
157
|
+
Document the full attack chain:
|
|
158
|
+
1. How initial access was gained
|
|
159
|
+
2. What techniques were used
|
|
160
|
+
3. What objectives were achieved
|
|
161
|
+
4. Where detection failed
|
|
162
|
+
|
|
163
|
+
### Detection Gaps
|
|
164
|
+
|
|
165
|
+
For each successful technique:
|
|
166
|
+
- What should have detected it?
|
|
167
|
+
- Why didn't detection work?
|
|
168
|
+
- How to improve detection
|
|
169
|
+
|
|
170
|
+
---
|
|
171
|
+
|
|
172
|
+
## 9. Ethical Boundaries
|
|
173
|
+
|
|
174
|
+
### Always
|
|
175
|
+
|
|
176
|
+
- Stay within scope
|
|
177
|
+
- Minimize impact
|
|
178
|
+
- Report immediately if real threat found
|
|
179
|
+
- Document all actions
|
|
180
|
+
|
|
181
|
+
### Never
|
|
182
|
+
|
|
183
|
+
- Destroy production data
|
|
184
|
+
- Cause denial of service (unless scoped)
|
|
185
|
+
- Access beyond proof of concept
|
|
186
|
+
- Retain sensitive data
|
|
187
|
+
|
|
188
|
+
---
|
|
189
|
+
|
|
190
|
+
## 10. Anti-Patterns
|
|
191
|
+
|
|
192
|
+
| ❌ Don't | ✅ Do |
|
|
193
|
+
|----------|-------|
|
|
194
|
+
| Rush to exploitation | Follow methodology |
|
|
195
|
+
| Cause damage | Minimize impact |
|
|
196
|
+
| Skip reporting | Document everything |
|
|
197
|
+
| Ignore scope | Stay within boundaries |
|
|
198
|
+
|
|
199
|
+
---
|
|
200
|
+
|
|
201
|
+
> **Remember:** Red team simulates attackers to improve defenses, not to cause harm.
|
|
@@ -1,129 +1,130 @@
|
|
|
1
|
-
---
|
|
2
|
-
name: seo-fundamentals
|
|
3
|
-
description: SEO fundamentals, E-E-A-T, Core Web Vitals, and Google algorithm principles.
|
|
4
|
-
allowed-tools: Read, Glob, Grep
|
|
5
|
-
|
|
6
|
-
|
|
7
|
-
|
|
8
|
-
|
|
9
|
-
|
|
10
|
-
|
|
11
|
-
|
|
12
|
-
|
|
13
|
-
|
|
14
|
-
|
|
15
|
-
|
|
16
|
-
|
|
17
|
-
|
|
18
|
-
| **
|
|
19
|
-
| **
|
|
20
|
-
| **
|
|
21
|
-
|
|
22
|
-
|
|
23
|
-
|
|
24
|
-
|
|
25
|
-
|
|
26
|
-
|
|
27
|
-
|
|
28
|
-
|
|
29
|
-
| **
|
|
30
|
-
| **
|
|
31
|
-
|
|
32
|
-
|
|
33
|
-
|
|
34
|
-
|
|
35
|
-
|
|
36
|
-
|
|
37
|
-
|
|
38
|
-
|
|
39
|
-
|
|
40
|
-
|
|
41
|
-
|
|
|
42
|
-
|
|
|
43
|
-
|
|
|
44
|
-
|
|
45
|
-
|
|
46
|
-
|
|
47
|
-
|
|
48
|
-
|
|
49
|
-
|
|
50
|
-
|
|
|
51
|
-
|
|
|
52
|
-
|
|
53
|
-
|
|
54
|
-
|
|
55
|
-
|
|
56
|
-
|
|
57
|
-
|
|
58
|
-
|
|
59
|
-
|
|
60
|
-
|
|
61
|
-
|
|
62
|
-
|
|
|
63
|
-
|
|
|
64
|
-
|
|
|
65
|
-
|
|
|
66
|
-
|
|
67
|
-
|
|
68
|
-
|
|
69
|
-
|
|
70
|
-
|
|
71
|
-
|
|
72
|
-
|
|
|
73
|
-
|
|
|
74
|
-
|
|
|
75
|
-
|
|
76
|
-
|
|
77
|
-
|
|
78
|
-
|
|
79
|
-
|
|
80
|
-
|
|
81
|
-
|
|
82
|
-
|
|
83
|
-
|
|
|
84
|
-
|
|
|
85
|
-
|
|
|
86
|
-
|
|
|
87
|
-
|
|
|
88
|
-
|
|
|
89
|
-
|
|
90
|
-
|
|
91
|
-
|
|
92
|
-
|
|
93
|
-
|
|
94
|
-
|
|
95
|
-
|
|
96
|
-
|
|
97
|
-
|
|
98
|
-
|
|
99
|
-
|
|
|
100
|
-
|
|
|
101
|
-
|
|
|
102
|
-
|
|
103
|
-
|
|
104
|
-
|
|
105
|
-
|
|
106
|
-
|
|
107
|
-
|
|
108
|
-
|
|
109
|
-
|
|
110
|
-
|
|
|
111
|
-
|
|
|
112
|
-
|
|
|
113
|
-
|
|
|
114
|
-
|
|
115
|
-
|
|
116
|
-
|
|
117
|
-
|
|
118
|
-
|
|
119
|
-
|
|
120
|
-
|
|
121
|
-
|
|
122
|
-
|
|
|
123
|
-
|
|
|
124
|
-
|
|
|
125
|
-
|
|
|
126
|
-
|
|
127
|
-
|
|
128
|
-
|
|
129
|
-
|
|
1
|
+
---
|
|
2
|
+
name: seo-fundamentals
|
|
3
|
+
description: SEO fundamentals, E-E-A-T, Core Web Vitals, and Google algorithm principles.
|
|
4
|
+
allowed-tools: Read, Glob, Grep
|
|
5
|
+
version: '1.0'
|
|
6
|
+
---
|
|
7
|
+
|
|
8
|
+
# SEO Fundamentals
|
|
9
|
+
|
|
10
|
+
> Principles for search engine visibility.
|
|
11
|
+
|
|
12
|
+
---
|
|
13
|
+
|
|
14
|
+
## 1. E-E-A-T Framework
|
|
15
|
+
|
|
16
|
+
| Principle | Signals |
|
|
17
|
+
|-----------|---------|
|
|
18
|
+
| **Experience** | First-hand knowledge, real examples |
|
|
19
|
+
| **Expertise** | Credentials, depth of knowledge |
|
|
20
|
+
| **Authoritativeness** | Backlinks, mentions, industry recognition |
|
|
21
|
+
| **Trustworthiness** | HTTPS, transparency, accurate info |
|
|
22
|
+
|
|
23
|
+
---
|
|
24
|
+
|
|
25
|
+
## 2. Core Web Vitals
|
|
26
|
+
|
|
27
|
+
| Metric | Target | Measures |
|
|
28
|
+
|--------|--------|----------|
|
|
29
|
+
| **LCP** | < 2.5s | Loading performance |
|
|
30
|
+
| **INP** | < 200ms | Interactivity |
|
|
31
|
+
| **CLS** | < 0.1 | Visual stability |
|
|
32
|
+
|
|
33
|
+
---
|
|
34
|
+
|
|
35
|
+
## 3. Technical SEO Principles
|
|
36
|
+
|
|
37
|
+
### Site Structure
|
|
38
|
+
|
|
39
|
+
| Element | Purpose |
|
|
40
|
+
|---------|---------|
|
|
41
|
+
| XML sitemap | Help crawling |
|
|
42
|
+
| robots.txt | Control access |
|
|
43
|
+
| Canonical tags | Prevent duplicates |
|
|
44
|
+
| HTTPS | Security signal |
|
|
45
|
+
|
|
46
|
+
### Performance
|
|
47
|
+
|
|
48
|
+
| Factor | Impact |
|
|
49
|
+
|--------|--------|
|
|
50
|
+
| Page speed | Core Web Vital |
|
|
51
|
+
| Mobile-friendly | Ranking factor |
|
|
52
|
+
| Clean URLs | Crawlability |
|
|
53
|
+
|
|
54
|
+
---
|
|
55
|
+
|
|
56
|
+
## 4. Content SEO Principles
|
|
57
|
+
|
|
58
|
+
### Page Elements
|
|
59
|
+
|
|
60
|
+
| Element | Best Practice |
|
|
61
|
+
|---------|---------------|
|
|
62
|
+
| Title tag | 50-60 chars, keyword front |
|
|
63
|
+
| Meta description | 150-160 chars, compelling |
|
|
64
|
+
| H1 | One per page, main keyword |
|
|
65
|
+
| H2-H6 | Logical hierarchy |
|
|
66
|
+
| Alt text | Descriptive, not stuffed |
|
|
67
|
+
|
|
68
|
+
### Content Quality
|
|
69
|
+
|
|
70
|
+
| Factor | Importance |
|
|
71
|
+
|--------|------------|
|
|
72
|
+
| Depth | Comprehensive coverage |
|
|
73
|
+
| Freshness | Regular updates |
|
|
74
|
+
| Uniqueness | Original value |
|
|
75
|
+
| Readability | Clear writing |
|
|
76
|
+
|
|
77
|
+
---
|
|
78
|
+
|
|
79
|
+
## 5. Schema Markup Types
|
|
80
|
+
|
|
81
|
+
| Type | Use |
|
|
82
|
+
|------|-----|
|
|
83
|
+
| Article | Blog posts, news |
|
|
84
|
+
| Organization | Company info |
|
|
85
|
+
| Person | Author profiles |
|
|
86
|
+
| FAQPage | Q&A content |
|
|
87
|
+
| Product | E-commerce |
|
|
88
|
+
| Review | Ratings |
|
|
89
|
+
| BreadcrumbList | Navigation |
|
|
90
|
+
|
|
91
|
+
---
|
|
92
|
+
|
|
93
|
+
## 6. AI Content Guidelines
|
|
94
|
+
|
|
95
|
+
### What Google Looks For
|
|
96
|
+
|
|
97
|
+
| ✅ Do | ❌ Don't |
|
|
98
|
+
|-------|----------|
|
|
99
|
+
| AI draft + human edit | Publish raw AI content |
|
|
100
|
+
| Add original insights | Copy without value |
|
|
101
|
+
| Expert review | Skip fact-checking |
|
|
102
|
+
| Follow E-E-A-T | Keyword stuffing |
|
|
103
|
+
|
|
104
|
+
---
|
|
105
|
+
|
|
106
|
+
## 7. Ranking Factors (Prioritized)
|
|
107
|
+
|
|
108
|
+
| Priority | Factor |
|
|
109
|
+
|----------|--------|
|
|
110
|
+
| 1 | Quality, relevant content |
|
|
111
|
+
| 2 | Backlinks from authority sites |
|
|
112
|
+
| 3 | Page experience (Core Web Vitals) |
|
|
113
|
+
| 4 | Mobile optimization |
|
|
114
|
+
| 5 | Technical SEO fundamentals |
|
|
115
|
+
|
|
116
|
+
---
|
|
117
|
+
|
|
118
|
+
## 8. Measurement
|
|
119
|
+
|
|
120
|
+
| Metric | Tool |
|
|
121
|
+
|--------|------|
|
|
122
|
+
| Rankings | Search Console, Ahrefs |
|
|
123
|
+
| Traffic | Analytics |
|
|
124
|
+
| Core Web Vitals | PageSpeed Insights |
|
|
125
|
+
| Indexing | Search Console |
|
|
126
|
+
| Backlinks | Ahrefs, Semrush |
|
|
127
|
+
|
|
128
|
+
---
|
|
129
|
+
|
|
130
|
+
> **Remember:** SEO is a long-term game. Quality content + technical excellence + patience = results.
|