cursor-kit-cli 1.2.0-beta → 1.2.0-beta.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/cli.cjs +333 -56
- package/dist/cli.cjs.map +1 -1
- package/dist/cli.js +334 -57
- package/dist/cli.js.map +1 -1
- package/dist/index.cjs +39 -1
- package/dist/index.cjs.map +1 -1
- package/dist/index.d.cts +9 -1
- package/dist/index.d.ts +9 -1
- package/dist/index.js +33 -2
- package/dist/index.js.map +1 -1
- package/package.json +1 -1
- package/templates/commands/docs.md +5 -3
- package/templates/commands/explain.md +5 -3
- package/templates/commands/fix.md +5 -3
- package/templates/commands/implement.md +5 -3
- package/templates/commands/refactor.md +5 -3
- package/templates/commands/review.md +5 -3
- package/templates/commands/test.md +5 -3
- package/templates/manifest.json +11 -8
- package/templates/rules/git.mdc +0 -2
- package/templates/rules/toc.mdc +17 -9
- package/templates/skills/aesthetic/SKILL.md +121 -0
- package/templates/skills/aesthetic/assets/design-guideline-template.md +163 -0
- package/templates/skills/aesthetic/assets/design-story-template.md +135 -0
- package/templates/skills/aesthetic/references/design-principles.md +62 -0
- package/templates/skills/aesthetic/references/design-resources.md +75 -0
- package/templates/skills/aesthetic/references/micro-interactions.md +53 -0
- package/templates/skills/aesthetic/references/storytelling-design.md +50 -0
- package/templates/skills/backend-development/SKILL.mdc +95 -0
- package/templates/skills/backend-development/references/backend-api-design.md +495 -0
- package/templates/skills/backend-development/references/backend-architecture.md +454 -0
- package/templates/skills/backend-development/references/backend-authentication.md +338 -0
- package/templates/skills/backend-development/references/backend-code-quality.md +659 -0
- package/templates/skills/backend-development/references/backend-debugging.md +904 -0
- package/templates/skills/backend-development/references/backend-devops.md +494 -0
- package/templates/skills/backend-development/references/backend-mindset.md +387 -0
- package/templates/skills/backend-development/references/backend-performance.md +397 -0
- package/templates/skills/backend-development/references/backend-security.md +290 -0
- package/templates/skills/backend-development/references/backend-technologies.md +256 -0
- package/templates/skills/backend-development/references/backend-testing.md +429 -0
- package/templates/skills/frontend-design/SKILL.mdc +41 -0
- package/templates/skills/frontend-design/references/animejs.md +396 -0
- package/templates/skills/frontend-development/SKILL.mdc +399 -0
- package/templates/skills/frontend-development/resources/common-patterns.md +331 -0
- package/templates/skills/frontend-development/resources/complete-examples.md +872 -0
- package/templates/skills/frontend-development/resources/component-patterns.md +502 -0
- package/templates/skills/frontend-development/resources/data-fetching.md +767 -0
- package/templates/skills/frontend-development/resources/file-organization.md +502 -0
- package/templates/skills/frontend-development/resources/loading-and-error-states.md +501 -0
- package/templates/skills/frontend-development/resources/performance.md +406 -0
- package/templates/skills/frontend-development/resources/routing-guide.md +364 -0
- package/templates/skills/frontend-development/resources/styling-guide.md +428 -0
- package/templates/skills/frontend-development/resources/typescript-standards.md +418 -0
- package/templates/skills/problem-solving/SKILL.mdc +96 -0
- package/templates/skills/problem-solving/references/attribution.md +69 -0
- package/templates/skills/problem-solving/references/collision-zone-thinking.md +79 -0
- package/templates/skills/problem-solving/references/inversion-exercise.md +91 -0
- package/templates/skills/problem-solving/references/meta-pattern-recognition.md +87 -0
- package/templates/skills/problem-solving/references/scale-game.md +95 -0
- package/templates/skills/problem-solving/references/simplification-cascades.md +80 -0
- package/templates/skills/problem-solving/references/when-stuck.md +72 -0
- package/templates/skills/research/SKILL.mdc +168 -0
- package/templates/skills/sequential-thinking/.env.example +8 -0
- package/templates/skills/sequential-thinking/README.md +183 -0
- package/templates/skills/sequential-thinking/SKILL.mdc +94 -0
- package/templates/skills/sequential-thinking/package.json +31 -0
- package/templates/skills/sequential-thinking/references/advanced-strategies.md +79 -0
- package/templates/skills/sequential-thinking/references/advanced-techniques.md +76 -0
- package/templates/skills/sequential-thinking/references/core-patterns.md +95 -0
- package/templates/skills/sequential-thinking/references/examples-api.md +88 -0
- package/templates/skills/sequential-thinking/references/examples-architecture.md +94 -0
- package/templates/skills/sequential-thinking/references/examples-debug.md +90 -0
- package/templates/skills/sequential-thinking/scripts/format-thought.js +159 -0
- package/templates/skills/sequential-thinking/scripts/process-thought.js +236 -0
- package/templates/skills/sequential-thinking/tests/format-thought.test.js +133 -0
- package/templates/skills/sequential-thinking/tests/process-thought.test.js +215 -0
- package/templates/skills/ui-styling/LICENSE.txt +202 -0
- package/templates/skills/ui-styling/SKILL.mdc +321 -0
- package/templates/skills/ui-styling/references/canvas-design-system.md +320 -0
- package/templates/skills/ui-styling/references/shadcn-accessibility.md +471 -0
- package/templates/skills/ui-styling/references/shadcn-components.md +424 -0
- package/templates/skills/ui-styling/references/shadcn-theming.md +373 -0
- package/templates/skills/ui-styling/references/tailwind-customization.md +483 -0
- package/templates/skills/ui-styling/references/tailwind-responsive.md +382 -0
- package/templates/skills/ui-styling/references/tailwind-utilities.md +455 -0
- package/templates/rules/frontend-design.mdc +0 -48
- package/templates/rules/performance.mdc +0 -54
- package/templates/rules/react.mdc +0 -58
- package/templates/rules/security.mdc +0 -50
- package/templates/rules/testing.mdc +0 -54
- package/templates/rules/typescript.mdc +0 -36
|
@@ -0,0 +1,91 @@
|
|
|
1
|
+
# Inversion Exercise
|
|
2
|
+
|
|
3
|
+
Flip core assumptions to reveal hidden constraints and alternative approaches. "What if the opposite were true?"
|
|
4
|
+
|
|
5
|
+
## Core Principle
|
|
6
|
+
|
|
7
|
+
**Inversion exposes hidden assumptions.** Sometimes the opposite reveals the truth.
|
|
8
|
+
|
|
9
|
+
## When to Use
|
|
10
|
+
|
|
11
|
+
| Symptom | Action |
|
|
12
|
+
|---------|--------|
|
|
13
|
+
| "There's only one way" | Flip the assumption |
|
|
14
|
+
| Solution feels forced | Invert the constraints |
|
|
15
|
+
| Can't articulate why necessary | Question the "must" |
|
|
16
|
+
| "This is just how it's done" | Try the opposite |
|
|
17
|
+
|
|
18
|
+
## Quick Reference
|
|
19
|
+
|
|
20
|
+
| Normal Assumption | Inverted | What It Reveals |
|
|
21
|
+
|-------------------|----------|-----------------|
|
|
22
|
+
| Cache to reduce latency | Add latency to enable caching | Debouncing patterns |
|
|
23
|
+
| Pull data when needed | Push data before needed | Prefetching, eager loading |
|
|
24
|
+
| Handle errors when occur | Make errors impossible | Type systems, contracts |
|
|
25
|
+
| Build features users want | Remove features users don't need | Simplicity >> addition |
|
|
26
|
+
| Optimize for common case | Optimize for worst case | Resilience patterns |
|
|
27
|
+
|
|
28
|
+
## Process
|
|
29
|
+
|
|
30
|
+
1. **List core assumptions** - What "must" be true?
|
|
31
|
+
2. **Invert each systematically** - "What if opposite were true?"
|
|
32
|
+
3. **Explore implications** - What would we do differently?
|
|
33
|
+
4. **Find valid inversions** - Which actually work somewhere?
|
|
34
|
+
5. **Document insights** - What did we learn?
|
|
35
|
+
|
|
36
|
+
## Detailed Example
|
|
37
|
+
|
|
38
|
+
**Problem:** Users complain app is slow
|
|
39
|
+
|
|
40
|
+
**Normal approach:** Make everything faster
|
|
41
|
+
- Add caching
|
|
42
|
+
- Optimize queries
|
|
43
|
+
- Use CDN
|
|
44
|
+
- Reduce bundle size
|
|
45
|
+
|
|
46
|
+
**Inverted approach:** Make things intentionally slower in some places
|
|
47
|
+
- **Debounce search** - Add latency → enable better results (wait for full query)
|
|
48
|
+
- **Rate limit requests** - Add friction → prevent abuse, improve for others
|
|
49
|
+
- **Lazy load content** - Delay loading → reduce initial load time
|
|
50
|
+
- **Progressive rendering** - Show slower → perceived performance
|
|
51
|
+
|
|
52
|
+
**Insight:** Strategic slowness can improve UX
|
|
53
|
+
|
|
54
|
+
## Valid vs Invalid Inversions
|
|
55
|
+
|
|
56
|
+
**Valid inversion example:**
|
|
57
|
+
- Normal: "Store data in database"
|
|
58
|
+
- Inverted: "Derive data on-demand instead of storing"
|
|
59
|
+
- Valid when: Computation cheaper than storage, data changes frequently
|
|
60
|
+
|
|
61
|
+
**Invalid inversion example:**
|
|
62
|
+
- Normal: "Validate user input"
|
|
63
|
+
- Inverted: "Trust all user input"
|
|
64
|
+
- Invalid because: Security vulnerability, not context-dependent
|
|
65
|
+
|
|
66
|
+
**Test validity:** Does the inversion work in ANY context? If yes, it's valid somewhere.
|
|
67
|
+
|
|
68
|
+
## Common Inversions
|
|
69
|
+
|
|
70
|
+
- **Eager → Lazy** (or vice versa)
|
|
71
|
+
- **Push → Pull** (or vice versa)
|
|
72
|
+
- **Store → Compute** (or vice versa)
|
|
73
|
+
- **Optimize → Simplify** (or vice versa)
|
|
74
|
+
- **Add features → Remove features** (or vice versa)
|
|
75
|
+
|
|
76
|
+
## Red Flags
|
|
77
|
+
|
|
78
|
+
You need inversion exercise when:
|
|
79
|
+
- "There's only one way to do this"
|
|
80
|
+
- Forcing solution that feels wrong
|
|
81
|
+
- Can't articulate why approach is necessary
|
|
82
|
+
- "This is just how it's done"
|
|
83
|
+
- Stuck on unquestioned assumptions
|
|
84
|
+
|
|
85
|
+
## Remember
|
|
86
|
+
|
|
87
|
+
- Not all inversions work (test boundaries)
|
|
88
|
+
- Valid inversions reveal context-dependence
|
|
89
|
+
- Sometimes opposite is the answer
|
|
90
|
+
- Question "must be" statements
|
|
91
|
+
- Document both successful and failed inversions
|
|
@@ -0,0 +1,87 @@
|
|
|
1
|
+
# Meta-Pattern Recognition
|
|
2
|
+
|
|
3
|
+
Spot patterns appearing in 3+ domains to find universal principles.
|
|
4
|
+
|
|
5
|
+
## Core Principle
|
|
6
|
+
|
|
7
|
+
**Find patterns in how patterns emerge.** When the same pattern appears in 3+ domains, it's likely a universal principle worth extracting.
|
|
8
|
+
|
|
9
|
+
## When to Use
|
|
10
|
+
|
|
11
|
+
| Symptom | Action |
|
|
12
|
+
|---------|--------|
|
|
13
|
+
| Same issue in different places | Extract the abstract form |
|
|
14
|
+
| Déjà vu in problem-solving | Find the universal pattern |
|
|
15
|
+
| Reinventing wheels across domains | Identify the meta-pattern |
|
|
16
|
+
| "Haven't we done this before?" | Yes, find and reuse it |
|
|
17
|
+
|
|
18
|
+
## Quick Reference
|
|
19
|
+
|
|
20
|
+
| Pattern Appears In | Abstract Form | Where Else? |
|
|
21
|
+
|-------------------|---------------|-------------|
|
|
22
|
+
| CPU/DB/HTTP/DNS caching | Store frequently-accessed data closer | LLM prompt caching, CDN |
|
|
23
|
+
| Layering (network/storage/compute) | Separate concerns into abstraction levels | Architecture, org structure |
|
|
24
|
+
| Queuing (message/task/request) | Decouple producer from consumer with buffer | Event systems, async |
|
|
25
|
+
| Pooling (connection/thread/object) | Reuse expensive resources | Memory mgmt, governance |
|
|
26
|
+
|
|
27
|
+
## Process
|
|
28
|
+
|
|
29
|
+
1. **Spot repetition** - See same shape in 3+ places
|
|
30
|
+
2. **Extract abstract form** - Describe independent of any domain
|
|
31
|
+
3. **Identify variations** - How does it adapt per domain?
|
|
32
|
+
4. **Check applicability** - Where else might this help?
|
|
33
|
+
5. **Document pattern** - Make it reusable
|
|
34
|
+
|
|
35
|
+
## Detailed Example
|
|
36
|
+
|
|
37
|
+
**Pattern spotted:** Rate limiting appears in:
|
|
38
|
+
- API throttling (requests per minute)
|
|
39
|
+
- Traffic shaping (packets per second)
|
|
40
|
+
- Circuit breakers (failures per window)
|
|
41
|
+
- Admission control (concurrent connections)
|
|
42
|
+
|
|
43
|
+
**Abstract form:** Bound resource consumption to prevent exhaustion
|
|
44
|
+
|
|
45
|
+
**Variation points:**
|
|
46
|
+
- What resource (requests, packets, failures, connections)
|
|
47
|
+
- What limit (per time window, concurrent, cumulative)
|
|
48
|
+
- What happens when exceeded (reject, queue, degrade)
|
|
49
|
+
|
|
50
|
+
**New application:** LLM token budgets
|
|
51
|
+
- Same pattern: prevent context window exhaustion
|
|
52
|
+
- Resource: tokens
|
|
53
|
+
- Limit: context window size
|
|
54
|
+
- Action: truncate or reject
|
|
55
|
+
|
|
56
|
+
## 3+ Domain Rule
|
|
57
|
+
|
|
58
|
+
**Why 3 domains?**
|
|
59
|
+
- 1 occurrence = coincidence
|
|
60
|
+
- 2 occurrences = possible pattern
|
|
61
|
+
- 3+ occurrences = likely universal
|
|
62
|
+
|
|
63
|
+
**Domain independence test:**
|
|
64
|
+
Can you describe the pattern without mentioning specific domains?
|
|
65
|
+
|
|
66
|
+
## Red Flags
|
|
67
|
+
|
|
68
|
+
Signs you're missing meta-patterns:
|
|
69
|
+
- "This problem is unique" (probably not)
|
|
70
|
+
- Multiple teams solving "different" problems identically
|
|
71
|
+
- Reinventing wheels across domains
|
|
72
|
+
- "Haven't we done something like this?" (yes, find it)
|
|
73
|
+
|
|
74
|
+
## Benefits of Meta-Patterns
|
|
75
|
+
|
|
76
|
+
- **Battle-tested** - Proven across multiple domains
|
|
77
|
+
- **Reusable** - Apply to new situations
|
|
78
|
+
- **Universal** - Domain-independent solutions
|
|
79
|
+
- **Documented** - Known variations and trade-offs
|
|
80
|
+
|
|
81
|
+
## Remember
|
|
82
|
+
|
|
83
|
+
- 3+ domains = likely universal
|
|
84
|
+
- Abstract form reveals new applications
|
|
85
|
+
- Variations show adaptation points
|
|
86
|
+
- Universal patterns save time
|
|
87
|
+
- Document for future reuse
|
|
@@ -0,0 +1,95 @@
|
|
|
1
|
+
# Scale Game
|
|
2
|
+
|
|
3
|
+
Test at extremes (1000x bigger/smaller, instant/year-long) to expose fundamental truths hidden at normal scales.
|
|
4
|
+
|
|
5
|
+
## Core Principle
|
|
6
|
+
|
|
7
|
+
**Extremes expose fundamentals.** What works at one scale fails at another.
|
|
8
|
+
|
|
9
|
+
## When to Use
|
|
10
|
+
|
|
11
|
+
| Symptom | Action |
|
|
12
|
+
|---------|--------|
|
|
13
|
+
| "Should scale fine" (without testing) | Test at extremes |
|
|
14
|
+
| Uncertain about production behavior | Scale up 1000x |
|
|
15
|
+
| Edge cases unclear | Test minimum and maximum |
|
|
16
|
+
| Architecture validation needed | Extreme testing |
|
|
17
|
+
|
|
18
|
+
## Quick Reference
|
|
19
|
+
|
|
20
|
+
| Scale Dimension | Test At Extremes | What It Reveals |
|
|
21
|
+
|-----------------|------------------|-----------------|
|
|
22
|
+
| **Volume** | 1 item vs 1B items | Algorithmic complexity limits |
|
|
23
|
+
| **Speed** | Instant vs 1 year | Async requirements, caching needs |
|
|
24
|
+
| **Users** | 1 user vs 1B users | Concurrency issues, resource limits |
|
|
25
|
+
| **Duration** | Milliseconds vs years | Memory leaks, state growth |
|
|
26
|
+
| **Failure rate** | Never fails vs always fails | Error handling adequacy |
|
|
27
|
+
|
|
28
|
+
## Process
|
|
29
|
+
|
|
30
|
+
1. **Pick dimension** - What could vary extremely?
|
|
31
|
+
2. **Test minimum** - What if 1000x smaller/faster/fewer?
|
|
32
|
+
3. **Test maximum** - What if 1000x bigger/slower/more?
|
|
33
|
+
4. **Note what breaks** - Where do limits appear?
|
|
34
|
+
5. **Note what survives** - What's fundamentally sound?
|
|
35
|
+
6. **Design for reality** - Use insights to validate architecture
|
|
36
|
+
|
|
37
|
+
## Detailed Examples
|
|
38
|
+
|
|
39
|
+
### Example 1: Error Handling
|
|
40
|
+
- **Normal scale:** "Handle errors when they occur" works fine
|
|
41
|
+
- **At 1B scale:** Error volume overwhelms logging, crashes system
|
|
42
|
+
- **Reveals:** Need to make errors impossible (type systems) or expect them (chaos engineering)
|
|
43
|
+
- **Action:** Design error handling for volume, not just occurrence
|
|
44
|
+
|
|
45
|
+
### Example 2: Synchronous APIs
|
|
46
|
+
- **Normal scale:** Direct function calls work, < 100ms latency
|
|
47
|
+
- **At global scale:** Network latency makes synchronous unusable (200-500ms)
|
|
48
|
+
- **Reveals:** Async/messaging becomes survival requirement, not optimization
|
|
49
|
+
- **Action:** Design async-first from start
|
|
50
|
+
|
|
51
|
+
### Example 3: In-Memory State
|
|
52
|
+
- **Normal duration:** Works for hours/days in development
|
|
53
|
+
- **At years:** Memory grows unbounded, eventual crash (weeks → months → years)
|
|
54
|
+
- **Reveals:** Need persistence or periodic cleanup, can't rely on memory forever
|
|
55
|
+
- **Action:** Design for stateless or externalized state
|
|
56
|
+
|
|
57
|
+
### Example 4: Single vs Million Users
|
|
58
|
+
- **Normal scale:** Session in memory works for 100 users
|
|
59
|
+
- **At 1M scale:** Memory exhausted, server crashes
|
|
60
|
+
- **Reveals:** Need distributed session store (Redis, database)
|
|
61
|
+
- **Action:** Design for horizontal scaling from start
|
|
62
|
+
|
|
63
|
+
## Both Directions Matter
|
|
64
|
+
|
|
65
|
+
**Test smaller too:**
|
|
66
|
+
- What if only 1 user? Does complexity make sense?
|
|
67
|
+
- What if only 10 items? Is optimization premature?
|
|
68
|
+
- What if instant response? What becomes unnecessary?
|
|
69
|
+
|
|
70
|
+
Often reveals over-engineering or premature optimization.
|
|
71
|
+
|
|
72
|
+
## Red Flags
|
|
73
|
+
|
|
74
|
+
You need scale game when:
|
|
75
|
+
- "It works in dev" (but will it work in production?)
|
|
76
|
+
- No idea where limits are
|
|
77
|
+
- "Should scale fine" (without evidence)
|
|
78
|
+
- Surprised by production behavior
|
|
79
|
+
- Architecture feels arbitrary
|
|
80
|
+
|
|
81
|
+
## Success Metrics
|
|
82
|
+
|
|
83
|
+
After scale game, you should know:
|
|
84
|
+
- Where system breaks (exact limits)
|
|
85
|
+
- What survives (fundamentally sound parts)
|
|
86
|
+
- What needs redesign (scale-dependent)
|
|
87
|
+
- Production readiness (validated architecture)
|
|
88
|
+
|
|
89
|
+
## Remember
|
|
90
|
+
|
|
91
|
+
- Extremes reveal fundamentals hidden at normal scales
|
|
92
|
+
- What works at one scale fails at another
|
|
93
|
+
- Test BOTH directions (bigger AND smaller)
|
|
94
|
+
- Use insights to validate architecture early
|
|
95
|
+
- Don't guess - test at extremes
|
|
@@ -0,0 +1,80 @@
|
|
|
1
|
+
# Simplification Cascades
|
|
2
|
+
|
|
3
|
+
Find one insight eliminating multiple components. "If this is true, we don't need X, Y, Z."
|
|
4
|
+
|
|
5
|
+
## Core Principle
|
|
6
|
+
|
|
7
|
+
**Everything is a special case of...** collapses complexity dramatically.
|
|
8
|
+
|
|
9
|
+
One powerful abstraction > ten clever hacks.
|
|
10
|
+
|
|
11
|
+
## When to Use
|
|
12
|
+
|
|
13
|
+
| Symptom | Action |
|
|
14
|
+
|---------|--------|
|
|
15
|
+
| Same thing implemented 5+ ways | Abstract the common pattern |
|
|
16
|
+
| Growing special case list | Find the general case |
|
|
17
|
+
| Complex rules with exceptions | Find rule with no exceptions |
|
|
18
|
+
| Excessive config options | Find defaults working for 95% |
|
|
19
|
+
|
|
20
|
+
## The Pattern
|
|
21
|
+
|
|
22
|
+
**Look for:**
|
|
23
|
+
- Multiple implementations of similar concepts
|
|
24
|
+
- Special case handling everywhere
|
|
25
|
+
- "We need to handle A, B, C, D differently..."
|
|
26
|
+
- Complex rules with many exceptions
|
|
27
|
+
|
|
28
|
+
**Ask:** "What if they're all the same thing underneath?"
|
|
29
|
+
|
|
30
|
+
## Examples
|
|
31
|
+
|
|
32
|
+
### Example 1: Stream Abstraction
|
|
33
|
+
- **Before:** Separate handlers for batch/real-time/file/network data
|
|
34
|
+
- **Insight:** "All inputs are streams - just different sources"
|
|
35
|
+
- **After:** One stream processor, multiple stream sources
|
|
36
|
+
- **Eliminated:** 4 separate implementations
|
|
37
|
+
|
|
38
|
+
### Example 2: Resource Governance
|
|
39
|
+
- **Before:** Session tracking, rate limiting, file validation, connection pooling (all separate)
|
|
40
|
+
- **Insight:** "All are per-entity resource limits"
|
|
41
|
+
- **After:** One ResourceGovernor with 4 resource types
|
|
42
|
+
- **Eliminated:** 4 custom enforcement systems
|
|
43
|
+
|
|
44
|
+
### Example 3: Immutability
|
|
45
|
+
- **Before:** Defensive copying, locking, cache invalidation, temporal coupling
|
|
46
|
+
- **Insight:** "Treat everything as immutable data + transformations"
|
|
47
|
+
- **After:** Functional programming patterns
|
|
48
|
+
- **Eliminated:** Entire classes of synchronization problems
|
|
49
|
+
|
|
50
|
+
## Process
|
|
51
|
+
|
|
52
|
+
1. **List variations** - What's implemented multiple ways?
|
|
53
|
+
2. **Find essence** - What's the same underneath?
|
|
54
|
+
3. **Extract abstraction** - What's the domain-independent pattern?
|
|
55
|
+
4. **Test fit** - Do all cases fit cleanly?
|
|
56
|
+
5. **Measure cascade** - How many things become unnecessary?
|
|
57
|
+
|
|
58
|
+
## Red Flags
|
|
59
|
+
|
|
60
|
+
Signs you're missing a cascade:
|
|
61
|
+
- "Just need to add one more case..." (repeating forever)
|
|
62
|
+
- "These are similar but different" (maybe they're the same?)
|
|
63
|
+
- Refactoring feels like whack-a-mole (fix one, break another)
|
|
64
|
+
- Growing configuration file
|
|
65
|
+
- "Don't touch that, it's complicated" (complexity hiding pattern)
|
|
66
|
+
|
|
67
|
+
## Success Metrics
|
|
68
|
+
|
|
69
|
+
- **10x wins, not 10% improvements**
|
|
70
|
+
- Measure in "how many things can we delete?"
|
|
71
|
+
- Lines of code removed > lines added
|
|
72
|
+
- Configuration options eliminated
|
|
73
|
+
- Special cases unified
|
|
74
|
+
|
|
75
|
+
## Remember
|
|
76
|
+
|
|
77
|
+
- The pattern is usually already there, just needs recognition
|
|
78
|
+
- Valid cascades feel obvious in retrospect
|
|
79
|
+
- Test with "can this handle all existing cases?"
|
|
80
|
+
- Document the insight for future reference
|
|
@@ -0,0 +1,72 @@
|
|
|
1
|
+
# When Stuck - Problem-Solving Dispatch
|
|
2
|
+
|
|
3
|
+
Different stuck-types need different techniques. Match stuck-symptom to technique.
|
|
4
|
+
|
|
5
|
+
## Dispatch Flowchart
|
|
6
|
+
|
|
7
|
+
```
|
|
8
|
+
YOU'RE STUCK
|
|
9
|
+
│
|
|
10
|
+
├─ Complexity spiraling? Same thing 5+ ways? Growing special cases?
|
|
11
|
+
│ └─→ USE: Simplification Cascades
|
|
12
|
+
│
|
|
13
|
+
├─ Can't find fitting approach? Conventional solutions inadequate?
|
|
14
|
+
│ └─→ USE: Collision-Zone Thinking
|
|
15
|
+
│
|
|
16
|
+
├─ Same issue different places? Reinventing wheels? Feels familiar?
|
|
17
|
+
│ └─→ USE: Meta-Pattern Recognition
|
|
18
|
+
│
|
|
19
|
+
├─ Solution feels forced? "Must be done this way"? Stuck on assumptions?
|
|
20
|
+
│ └─→ USE: Inversion Exercise
|
|
21
|
+
│
|
|
22
|
+
├─ Will this work at production? Edge cases unclear? Unsure of limits?
|
|
23
|
+
│ └─→ USE: Scale Game
|
|
24
|
+
│
|
|
25
|
+
└─ Code broken? Wrong behavior? Test failing?
|
|
26
|
+
└─→ USE: Debugging skill (systematic-debugging)
|
|
27
|
+
```
|
|
28
|
+
|
|
29
|
+
## Stuck-Type → Technique Map
|
|
30
|
+
|
|
31
|
+
| How You're Stuck | Symptom Details | Use This |
|
|
32
|
+
|------------------|-----------------|----------|
|
|
33
|
+
| **Complexity spiraling** | Same thing 5+ ways, growing special cases, excessive if/else | simplification-cascades.md |
|
|
34
|
+
| **Need innovation** | Conventional inadequate, can't find fitting approach, need breakthrough | collision-zone-thinking.md |
|
|
35
|
+
| **Recurring patterns** | Same issue different places, reinventing wheels, déjà vu feeling | meta-pattern-recognition.md |
|
|
36
|
+
| **Forced by assumptions** | "Must be done this way", can't question premise, forced solution | inversion-exercise.md |
|
|
37
|
+
| **Scale uncertainty** | Production unclear, edge cases unknown, unsure of limits | scale-game.md |
|
|
38
|
+
| **Code broken** | Wrong behavior, test failing, unexpected output | debugging skill |
|
|
39
|
+
|
|
40
|
+
## Process
|
|
41
|
+
|
|
42
|
+
1. **Identify stuck-type** - What symptom matches above?
|
|
43
|
+
2. **Load that technique** - Read the specific reference file
|
|
44
|
+
3. **Apply technique** - Follow its process
|
|
45
|
+
4. **Document attempt** - What worked/failed?
|
|
46
|
+
5. **If still stuck** - Try different technique or combine
|
|
47
|
+
|
|
48
|
+
## Combining Techniques
|
|
49
|
+
|
|
50
|
+
Some problems need multiple techniques:
|
|
51
|
+
|
|
52
|
+
- **Simplification + Meta-pattern** - Find pattern → simplify all instances
|
|
53
|
+
- **Collision + Inversion** - Force metaphor → invert assumptions
|
|
54
|
+
- **Scale + Simplification** - Test extremes → reveal what to eliminate
|
|
55
|
+
- **Meta-pattern + Scale** - Universal pattern → test at extremes
|
|
56
|
+
|
|
57
|
+
## When Nothing Works
|
|
58
|
+
|
|
59
|
+
If no technique helps:
|
|
60
|
+
1. **Reframe problem** - Are you solving the right problem?
|
|
61
|
+
2. **Get fresh perspective** - Explain to someone else
|
|
62
|
+
3. **Take break** - Distance often reveals solution
|
|
63
|
+
4. **Simplify scope** - Solve smaller version first
|
|
64
|
+
5. **Question constraints** - Are they real or assumed?
|
|
65
|
+
|
|
66
|
+
## Remember
|
|
67
|
+
|
|
68
|
+
- Match symptom to technique
|
|
69
|
+
- One technique at a time
|
|
70
|
+
- Combine if first doesn't work
|
|
71
|
+
- Document what you tried
|
|
72
|
+
- Not stuck forever, just temporarily
|
|
@@ -0,0 +1,168 @@
|
|
|
1
|
+
---
|
|
2
|
+
name: research
|
|
3
|
+
description: Use when you need to research, analyze, and plan technical solutions that are scalable, secure, and maintainable.
|
|
4
|
+
license: MIT
|
|
5
|
+
---
|
|
6
|
+
|
|
7
|
+
# Research
|
|
8
|
+
|
|
9
|
+
## Research Methodology
|
|
10
|
+
|
|
11
|
+
Always honoring **YAGNI**, **KISS**, and **DRY** principles.
|
|
12
|
+
**Be honest, be brutal, straight to the point, and be concise.**
|
|
13
|
+
|
|
14
|
+
### Phase 1: Scope Definition
|
|
15
|
+
|
|
16
|
+
First, you will clearly define the research scope by:
|
|
17
|
+
- Identifying key terms and concepts to investigate
|
|
18
|
+
- Determining the recency requirements (how current must information be)
|
|
19
|
+
- Establishing evaluation criteria for sources
|
|
20
|
+
- Setting boundaries for the research depth
|
|
21
|
+
|
|
22
|
+
### Phase 2: Systematic Information Gathering
|
|
23
|
+
|
|
24
|
+
You will employ a multi-source research strategy:
|
|
25
|
+
|
|
26
|
+
1. **Search Strategy**:
|
|
27
|
+
- Check if `gemini` bash command is available, if so, execute `gemini -m gemini-2.5-flash -p "...your search prompt..."` bash command (timeout: 10 minutes) and save the output to `./plans/<plan-name>/reports/YYMMDD-<your-research-topic>.md` file (including all citations).
|
|
28
|
+
- If `gemini` bash command is not available, fallback to `WebSearch` tool.
|
|
29
|
+
- Run multiple `gemini` bash commands or `WebSearch` tools in parallel to search for relevant information.
|
|
30
|
+
- Craft precise search queries with relevant keywords
|
|
31
|
+
- Include terms like "best practices", "2024", "latest", "security", "performance"
|
|
32
|
+
- Search for official documentation, GitHub repositories, and authoritative blogs
|
|
33
|
+
- Prioritize results from recognized authorities (official docs, major tech companies, respected developers)
|
|
34
|
+
- **IMPORTANT:** You are allowed to perform at most **5 researches (max 5 tool calls)**, user might request less than this amount, **strictly respect it**, think carefully based on the task before performing each related research topic.
|
|
35
|
+
|
|
36
|
+
2. **Deep Content Analysis**:
|
|
37
|
+
- When you found a potential Github repository URL, use `docs-seeker` skill to find read it.
|
|
38
|
+
- Focus on official documentation, API references, and technical specifications
|
|
39
|
+
- Analyze README files from popular GitHub repositories
|
|
40
|
+
- Review changelog and release notes for version-specific information
|
|
41
|
+
|
|
42
|
+
3. **Video Content Research**:
|
|
43
|
+
- Prioritize content from official channels, recognized experts, and major conferences
|
|
44
|
+
- Focus on practical demonstrations and real-world implementations
|
|
45
|
+
|
|
46
|
+
4. **Cross-Reference Validation**:
|
|
47
|
+
- Verify information across multiple independent sources
|
|
48
|
+
- Check publication dates to ensure currency
|
|
49
|
+
- Identify consensus vs. controversial approaches
|
|
50
|
+
- Note any conflicting information or debates in the community
|
|
51
|
+
|
|
52
|
+
### Phase 3: Analysis and Synthesis
|
|
53
|
+
|
|
54
|
+
You will analyze gathered information by:
|
|
55
|
+
- Identifying common patterns and best practices
|
|
56
|
+
- Evaluating pros and cons of different approaches
|
|
57
|
+
- Assessing maturity and stability of technologies
|
|
58
|
+
- Recognizing security implications and performance considerations
|
|
59
|
+
- Determining compatibility and integration requirements
|
|
60
|
+
|
|
61
|
+
### Phase 4: Report Generation
|
|
62
|
+
|
|
63
|
+
**Notes:**
|
|
64
|
+
- Research reports are saved in `./plans/<plan-name>/reports/YYMMDD-<your-research-topic>.md`.
|
|
65
|
+
- If you are not given a plan name, ask main agent to provide it and continue the process.
|
|
66
|
+
|
|
67
|
+
You will create a comprehensive markdown report with the following structure:
|
|
68
|
+
|
|
69
|
+
```markdown
|
|
70
|
+
# Research Report: [Topic]
|
|
71
|
+
|
|
72
|
+
## Executive Summary
|
|
73
|
+
[2-3 paragraph overview of key findings and recommendations]
|
|
74
|
+
|
|
75
|
+
## Research Methodology
|
|
76
|
+
- Sources consulted: [number]
|
|
77
|
+
- Date range of materials: [earliest to most recent]
|
|
78
|
+
- Key search terms used: [list]
|
|
79
|
+
|
|
80
|
+
## Key Findings
|
|
81
|
+
|
|
82
|
+
### 1. Technology Overview
|
|
83
|
+
[Comprehensive description of the technology/topic]
|
|
84
|
+
|
|
85
|
+
### 2. Current State & Trends
|
|
86
|
+
[Latest developments, version information, adoption trends]
|
|
87
|
+
|
|
88
|
+
### 3. Best Practices
|
|
89
|
+
[Detailed list of recommended practices with explanations]
|
|
90
|
+
|
|
91
|
+
### 4. Security Considerations
|
|
92
|
+
[Security implications, vulnerabilities, and mitigation strategies]
|
|
93
|
+
|
|
94
|
+
### 5. Performance Insights
|
|
95
|
+
[Performance characteristics, optimization techniques, benchmarks]
|
|
96
|
+
|
|
97
|
+
## Comparative Analysis
|
|
98
|
+
[If applicable, comparison of different solutions/approaches]
|
|
99
|
+
|
|
100
|
+
## Implementation Recommendations
|
|
101
|
+
|
|
102
|
+
### Quick Start Guide
|
|
103
|
+
[Step-by-step getting started instructions]
|
|
104
|
+
|
|
105
|
+
### Code Examples
|
|
106
|
+
[Relevant code snippets with explanations]
|
|
107
|
+
|
|
108
|
+
### Common Pitfalls
|
|
109
|
+
[Mistakes to avoid and their solutions]
|
|
110
|
+
|
|
111
|
+
## Resources & References
|
|
112
|
+
|
|
113
|
+
### Official Documentation
|
|
114
|
+
- [Linked list of official docs]
|
|
115
|
+
|
|
116
|
+
### Recommended Tutorials
|
|
117
|
+
- [Curated list with descriptions]
|
|
118
|
+
|
|
119
|
+
### Community Resources
|
|
120
|
+
- [Forums, Discord servers, Stack Overflow tags]
|
|
121
|
+
|
|
122
|
+
### Further Reading
|
|
123
|
+
- [Advanced topics and deep dives]
|
|
124
|
+
|
|
125
|
+
## Appendices
|
|
126
|
+
|
|
127
|
+
### A. Glossary
|
|
128
|
+
[Technical terms and definitions]
|
|
129
|
+
|
|
130
|
+
### B. Version Compatibility Matrix
|
|
131
|
+
[If applicable]
|
|
132
|
+
|
|
133
|
+
### C. Raw Research Notes
|
|
134
|
+
[Optional: detailed notes from research process]
|
|
135
|
+
```
|
|
136
|
+
|
|
137
|
+
## Quality Standards
|
|
138
|
+
|
|
139
|
+
You will ensure all research meets these criteria:
|
|
140
|
+
- **Accuracy**: Information is verified across multiple sources
|
|
141
|
+
- **Currency**: Prioritize information from the last 12 months unless historical context is needed
|
|
142
|
+
- **Completeness**: Cover all aspects requested by the user
|
|
143
|
+
- **Actionability**: Provide practical, implementable recommendations
|
|
144
|
+
- **Clarity**: Use clear language, define technical terms, provide examples
|
|
145
|
+
- **Attribution**: Always cite sources and provide links for verification
|
|
146
|
+
|
|
147
|
+
## Special Considerations
|
|
148
|
+
|
|
149
|
+
- When researching security topics, always check for recent CVEs and security advisories
|
|
150
|
+
- For performance-related research, look for benchmarks and real-world case studies
|
|
151
|
+
- When investigating new technologies, assess community adoption and support levels
|
|
152
|
+
- For API documentation, verify endpoint availability and authentication requirements
|
|
153
|
+
- Always note deprecation warnings and migration paths for older technologies
|
|
154
|
+
|
|
155
|
+
## Output Requirements
|
|
156
|
+
|
|
157
|
+
Your final report must:
|
|
158
|
+
1. Be saved as a markdown file with a descriptive filename in `./plans/<plan-name>/reports/YYMMDD-<your-research-topic>.md`
|
|
159
|
+
2. Include a timestamp of when the research was conducted
|
|
160
|
+
3. Provide clear section navigation with a table of contents for longer reports
|
|
161
|
+
4. Use code blocks with appropriate syntax highlighting
|
|
162
|
+
5. Include diagrams or architecture descriptions where helpful (in mermaid or ASCII art)
|
|
163
|
+
6. Conclude with specific, actionable next steps
|
|
164
|
+
|
|
165
|
+
**IMPORTANT:** Sacrifice grammar for the sake of concision when writing reports.
|
|
166
|
+
**IMPORTANT:** In reports, list any unresolved questions at the end, if any.
|
|
167
|
+
|
|
168
|
+
**Remember:** You are not just collecting information, but providing strategic technical intelligence that enables informed decision-making. Your research should anticipate follow-up questions and provide comprehensive coverage of the topic while remaining focused and practical.
|
|
@@ -0,0 +1,8 @@
|
|
|
1
|
+
# Sequential Thinking Configuration
|
|
2
|
+
|
|
3
|
+
# Disable thought logging output (useful for automated processing)
|
|
4
|
+
# Set to "true" to disable console logging
|
|
5
|
+
DISABLE_THOUGHT_LOGGING=false
|
|
6
|
+
|
|
7
|
+
# History file location (optional, defaults to scripts/.thought-history.json)
|
|
8
|
+
# THOUGHT_HISTORY_FILE=/path/to/custom/history.json
|