cursor-kit-cli 1.2.0-beta → 1.2.0-beta.3

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (92) hide show
  1. package/bin/cursor-reinstall-instance.sh +102 -0
  2. package/dist/cli.cjs +366 -69
  3. package/dist/cli.cjs.map +1 -1
  4. package/dist/cli.js +367 -70
  5. package/dist/cli.js.map +1 -1
  6. package/dist/index.cjs +39 -1
  7. package/dist/index.cjs.map +1 -1
  8. package/dist/index.d.cts +9 -1
  9. package/dist/index.d.ts +9 -1
  10. package/dist/index.js +33 -2
  11. package/dist/index.js.map +1 -1
  12. package/package.json +1 -1
  13. package/templates/commands/docs.md +5 -3
  14. package/templates/commands/explain.md +5 -3
  15. package/templates/commands/fix.md +5 -3
  16. package/templates/commands/implement.md +5 -3
  17. package/templates/commands/refactor.md +5 -3
  18. package/templates/commands/review.md +5 -3
  19. package/templates/commands/test.md +5 -3
  20. package/templates/manifest.json +11 -8
  21. package/templates/rules/git.mdc +0 -2
  22. package/templates/rules/toc.mdc +17 -9
  23. package/templates/skills/aesthetic/SKILL.md +121 -0
  24. package/templates/skills/aesthetic/assets/design-guideline-template.md +163 -0
  25. package/templates/skills/aesthetic/assets/design-story-template.md +135 -0
  26. package/templates/skills/aesthetic/references/design-principles.md +62 -0
  27. package/templates/skills/aesthetic/references/design-resources.md +75 -0
  28. package/templates/skills/aesthetic/references/micro-interactions.md +53 -0
  29. package/templates/skills/aesthetic/references/storytelling-design.md +50 -0
  30. package/templates/skills/backend-development/SKILL.mdc +95 -0
  31. package/templates/skills/backend-development/references/backend-api-design.md +495 -0
  32. package/templates/skills/backend-development/references/backend-architecture.md +454 -0
  33. package/templates/skills/backend-development/references/backend-authentication.md +338 -0
  34. package/templates/skills/backend-development/references/backend-code-quality.md +659 -0
  35. package/templates/skills/backend-development/references/backend-debugging.md +904 -0
  36. package/templates/skills/backend-development/references/backend-devops.md +494 -0
  37. package/templates/skills/backend-development/references/backend-mindset.md +387 -0
  38. package/templates/skills/backend-development/references/backend-performance.md +397 -0
  39. package/templates/skills/backend-development/references/backend-security.md +290 -0
  40. package/templates/skills/backend-development/references/backend-technologies.md +256 -0
  41. package/templates/skills/backend-development/references/backend-testing.md +429 -0
  42. package/templates/skills/frontend-design/SKILL.mdc +41 -0
  43. package/templates/skills/frontend-design/references/animejs.md +396 -0
  44. package/templates/skills/frontend-development/SKILL.mdc +399 -0
  45. package/templates/skills/frontend-development/resources/common-patterns.md +331 -0
  46. package/templates/skills/frontend-development/resources/complete-examples.md +872 -0
  47. package/templates/skills/frontend-development/resources/component-patterns.md +502 -0
  48. package/templates/skills/frontend-development/resources/data-fetching.md +767 -0
  49. package/templates/skills/frontend-development/resources/file-organization.md +502 -0
  50. package/templates/skills/frontend-development/resources/loading-and-error-states.md +501 -0
  51. package/templates/skills/frontend-development/resources/performance.md +406 -0
  52. package/templates/skills/frontend-development/resources/routing-guide.md +364 -0
  53. package/templates/skills/frontend-development/resources/styling-guide.md +428 -0
  54. package/templates/skills/frontend-development/resources/typescript-standards.md +418 -0
  55. package/templates/skills/problem-solving/SKILL.mdc +96 -0
  56. package/templates/skills/problem-solving/references/attribution.md +69 -0
  57. package/templates/skills/problem-solving/references/collision-zone-thinking.md +79 -0
  58. package/templates/skills/problem-solving/references/inversion-exercise.md +91 -0
  59. package/templates/skills/problem-solving/references/meta-pattern-recognition.md +87 -0
  60. package/templates/skills/problem-solving/references/scale-game.md +95 -0
  61. package/templates/skills/problem-solving/references/simplification-cascades.md +80 -0
  62. package/templates/skills/problem-solving/references/when-stuck.md +72 -0
  63. package/templates/skills/research/SKILL.mdc +168 -0
  64. package/templates/skills/sequential-thinking/.env.example +8 -0
  65. package/templates/skills/sequential-thinking/README.md +183 -0
  66. package/templates/skills/sequential-thinking/SKILL.mdc +94 -0
  67. package/templates/skills/sequential-thinking/package.json +31 -0
  68. package/templates/skills/sequential-thinking/references/advanced-strategies.md +79 -0
  69. package/templates/skills/sequential-thinking/references/advanced-techniques.md +76 -0
  70. package/templates/skills/sequential-thinking/references/core-patterns.md +95 -0
  71. package/templates/skills/sequential-thinking/references/examples-api.md +88 -0
  72. package/templates/skills/sequential-thinking/references/examples-architecture.md +94 -0
  73. package/templates/skills/sequential-thinking/references/examples-debug.md +90 -0
  74. package/templates/skills/sequential-thinking/scripts/format-thought.js +159 -0
  75. package/templates/skills/sequential-thinking/scripts/process-thought.js +236 -0
  76. package/templates/skills/sequential-thinking/tests/format-thought.test.js +133 -0
  77. package/templates/skills/sequential-thinking/tests/process-thought.test.js +215 -0
  78. package/templates/skills/ui-styling/LICENSE.txt +202 -0
  79. package/templates/skills/ui-styling/SKILL.mdc +321 -0
  80. package/templates/skills/ui-styling/references/canvas-design-system.md +320 -0
  81. package/templates/skills/ui-styling/references/shadcn-accessibility.md +471 -0
  82. package/templates/skills/ui-styling/references/shadcn-components.md +424 -0
  83. package/templates/skills/ui-styling/references/shadcn-theming.md +373 -0
  84. package/templates/skills/ui-styling/references/tailwind-customization.md +483 -0
  85. package/templates/skills/ui-styling/references/tailwind-responsive.md +382 -0
  86. package/templates/skills/ui-styling/references/tailwind-utilities.md +455 -0
  87. package/templates/rules/frontend-design.mdc +0 -48
  88. package/templates/rules/performance.mdc +0 -54
  89. package/templates/rules/react.mdc +0 -58
  90. package/templates/rules/security.mdc +0 -50
  91. package/templates/rules/testing.mdc +0 -54
  92. package/templates/rules/typescript.mdc +0 -36
@@ -0,0 +1,91 @@
1
+ # Inversion Exercise
2
+
3
+ Flip core assumptions to reveal hidden constraints and alternative approaches. "What if the opposite were true?"
4
+
5
+ ## Core Principle
6
+
7
+ **Inversion exposes hidden assumptions.** Sometimes the opposite reveals the truth.
8
+
9
+ ## When to Use
10
+
11
+ | Symptom | Action |
12
+ |---------|--------|
13
+ | "There's only one way" | Flip the assumption |
14
+ | Solution feels forced | Invert the constraints |
15
+ | Can't articulate why necessary | Question the "must" |
16
+ | "This is just how it's done" | Try the opposite |
17
+
18
+ ## Quick Reference
19
+
20
+ | Normal Assumption | Inverted | What It Reveals |
21
+ |-------------------|----------|-----------------|
22
+ | Cache to reduce latency | Add latency to enable caching | Debouncing patterns |
23
+ | Pull data when needed | Push data before needed | Prefetching, eager loading |
24
+ | Handle errors when occur | Make errors impossible | Type systems, contracts |
25
+ | Build features users want | Remove features users don't need | Simplicity >> addition |
26
+ | Optimize for common case | Optimize for worst case | Resilience patterns |
27
+
28
+ ## Process
29
+
30
+ 1. **List core assumptions** - What "must" be true?
31
+ 2. **Invert each systematically** - "What if opposite were true?"
32
+ 3. **Explore implications** - What would we do differently?
33
+ 4. **Find valid inversions** - Which actually work somewhere?
34
+ 5. **Document insights** - What did we learn?
35
+
36
+ ## Detailed Example
37
+
38
+ **Problem:** Users complain app is slow
39
+
40
+ **Normal approach:** Make everything faster
41
+ - Add caching
42
+ - Optimize queries
43
+ - Use CDN
44
+ - Reduce bundle size
45
+
46
+ **Inverted approach:** Make things intentionally slower in some places
47
+ - **Debounce search** - Add latency → enable better results (wait for full query)
48
+ - **Rate limit requests** - Add friction → prevent abuse, improve for others
49
+ - **Lazy load content** - Delay loading → reduce initial load time
50
+ - **Progressive rendering** - Show slower → perceived performance
51
+
52
+ **Insight:** Strategic slowness can improve UX
53
+
54
+ ## Valid vs Invalid Inversions
55
+
56
+ **Valid inversion example:**
57
+ - Normal: "Store data in database"
58
+ - Inverted: "Derive data on-demand instead of storing"
59
+ - Valid when: Computation cheaper than storage, data changes frequently
60
+
61
+ **Invalid inversion example:**
62
+ - Normal: "Validate user input"
63
+ - Inverted: "Trust all user input"
64
+ - Invalid because: Security vulnerability, not context-dependent
65
+
66
+ **Test validity:** Does the inversion work in ANY context? If yes, it's valid somewhere.
67
+
68
+ ## Common Inversions
69
+
70
+ - **Eager → Lazy** (or vice versa)
71
+ - **Push → Pull** (or vice versa)
72
+ - **Store → Compute** (or vice versa)
73
+ - **Optimize → Simplify** (or vice versa)
74
+ - **Add features → Remove features** (or vice versa)
75
+
76
+ ## Red Flags
77
+
78
+ You need inversion exercise when:
79
+ - "There's only one way to do this"
80
+ - Forcing solution that feels wrong
81
+ - Can't articulate why approach is necessary
82
+ - "This is just how it's done"
83
+ - Stuck on unquestioned assumptions
84
+
85
+ ## Remember
86
+
87
+ - Not all inversions work (test boundaries)
88
+ - Valid inversions reveal context-dependence
89
+ - Sometimes opposite is the answer
90
+ - Question "must be" statements
91
+ - Document both successful and failed inversions
@@ -0,0 +1,87 @@
1
+ # Meta-Pattern Recognition
2
+
3
+ Spot patterns appearing in 3+ domains to find universal principles.
4
+
5
+ ## Core Principle
6
+
7
+ **Find patterns in how patterns emerge.** When the same pattern appears in 3+ domains, it's likely a universal principle worth extracting.
8
+
9
+ ## When to Use
10
+
11
+ | Symptom | Action |
12
+ |---------|--------|
13
+ | Same issue in different places | Extract the abstract form |
14
+ | Déjà vu in problem-solving | Find the universal pattern |
15
+ | Reinventing wheels across domains | Identify the meta-pattern |
16
+ | "Haven't we done this before?" | Yes, find and reuse it |
17
+
18
+ ## Quick Reference
19
+
20
+ | Pattern Appears In | Abstract Form | Where Else? |
21
+ |-------------------|---------------|-------------|
22
+ | CPU/DB/HTTP/DNS caching | Store frequently-accessed data closer | LLM prompt caching, CDN |
23
+ | Layering (network/storage/compute) | Separate concerns into abstraction levels | Architecture, org structure |
24
+ | Queuing (message/task/request) | Decouple producer from consumer with buffer | Event systems, async |
25
+ | Pooling (connection/thread/object) | Reuse expensive resources | Memory mgmt, governance |
26
+
27
+ ## Process
28
+
29
+ 1. **Spot repetition** - See same shape in 3+ places
30
+ 2. **Extract abstract form** - Describe independent of any domain
31
+ 3. **Identify variations** - How does it adapt per domain?
32
+ 4. **Check applicability** - Where else might this help?
33
+ 5. **Document pattern** - Make it reusable
34
+
35
+ ## Detailed Example
36
+
37
+ **Pattern spotted:** Rate limiting appears in:
38
+ - API throttling (requests per minute)
39
+ - Traffic shaping (packets per second)
40
+ - Circuit breakers (failures per window)
41
+ - Admission control (concurrent connections)
42
+
43
+ **Abstract form:** Bound resource consumption to prevent exhaustion
44
+
45
+ **Variation points:**
46
+ - What resource (requests, packets, failures, connections)
47
+ - What limit (per time window, concurrent, cumulative)
48
+ - What happens when exceeded (reject, queue, degrade)
49
+
50
+ **New application:** LLM token budgets
51
+ - Same pattern: prevent context window exhaustion
52
+ - Resource: tokens
53
+ - Limit: context window size
54
+ - Action: truncate or reject
55
+
56
+ ## 3+ Domain Rule
57
+
58
+ **Why 3 domains?**
59
+ - 1 occurrence = coincidence
60
+ - 2 occurrences = possible pattern
61
+ - 3+ occurrences = likely universal
62
+
63
+ **Domain independence test:**
64
+ Can you describe the pattern without mentioning specific domains?
65
+
66
+ ## Red Flags
67
+
68
+ Signs you're missing meta-patterns:
69
+ - "This problem is unique" (probably not)
70
+ - Multiple teams solving "different" problems identically
71
+ - Reinventing wheels across domains
72
+ - "Haven't we done something like this?" (yes, find it)
73
+
74
+ ## Benefits of Meta-Patterns
75
+
76
+ - **Battle-tested** - Proven across multiple domains
77
+ - **Reusable** - Apply to new situations
78
+ - **Universal** - Domain-independent solutions
79
+ - **Documented** - Known variations and trade-offs
80
+
81
+ ## Remember
82
+
83
+ - 3+ domains = likely universal
84
+ - Abstract form reveals new applications
85
+ - Variations show adaptation points
86
+ - Universal patterns save time
87
+ - Document for future reuse
@@ -0,0 +1,95 @@
1
+ # Scale Game
2
+
3
+ Test at extremes (1000x bigger/smaller, instant/year-long) to expose fundamental truths hidden at normal scales.
4
+
5
+ ## Core Principle
6
+
7
+ **Extremes expose fundamentals.** What works at one scale fails at another.
8
+
9
+ ## When to Use
10
+
11
+ | Symptom | Action |
12
+ |---------|--------|
13
+ | "Should scale fine" (without testing) | Test at extremes |
14
+ | Uncertain about production behavior | Scale up 1000x |
15
+ | Edge cases unclear | Test minimum and maximum |
16
+ | Architecture validation needed | Extreme testing |
17
+
18
+ ## Quick Reference
19
+
20
+ | Scale Dimension | Test At Extremes | What It Reveals |
21
+ |-----------------|------------------|-----------------|
22
+ | **Volume** | 1 item vs 1B items | Algorithmic complexity limits |
23
+ | **Speed** | Instant vs 1 year | Async requirements, caching needs |
24
+ | **Users** | 1 user vs 1B users | Concurrency issues, resource limits |
25
+ | **Duration** | Milliseconds vs years | Memory leaks, state growth |
26
+ | **Failure rate** | Never fails vs always fails | Error handling adequacy |
27
+
28
+ ## Process
29
+
30
+ 1. **Pick dimension** - What could vary extremely?
31
+ 2. **Test minimum** - What if 1000x smaller/faster/fewer?
32
+ 3. **Test maximum** - What if 1000x bigger/slower/more?
33
+ 4. **Note what breaks** - Where do limits appear?
34
+ 5. **Note what survives** - What's fundamentally sound?
35
+ 6. **Design for reality** - Use insights to validate architecture
36
+
37
+ ## Detailed Examples
38
+
39
+ ### Example 1: Error Handling
40
+ - **Normal scale:** "Handle errors when they occur" works fine
41
+ - **At 1B scale:** Error volume overwhelms logging, crashes system
42
+ - **Reveals:** Need to make errors impossible (type systems) or expect them (chaos engineering)
43
+ - **Action:** Design error handling for volume, not just occurrence
44
+
45
+ ### Example 2: Synchronous APIs
46
+ - **Normal scale:** Direct function calls work, < 100ms latency
47
+ - **At global scale:** Network latency makes synchronous unusable (200-500ms)
48
+ - **Reveals:** Async/messaging becomes survival requirement, not optimization
49
+ - **Action:** Design async-first from start
50
+
51
+ ### Example 3: In-Memory State
52
+ - **Normal duration:** Works for hours/days in development
53
+ - **At years:** Memory grows unbounded, eventual crash (weeks → months → years)
54
+ - **Reveals:** Need persistence or periodic cleanup, can't rely on memory forever
55
+ - **Action:** Design for stateless or externalized state
56
+
57
+ ### Example 4: Single vs Million Users
58
+ - **Normal scale:** Session in memory works for 100 users
59
+ - **At 1M scale:** Memory exhausted, server crashes
60
+ - **Reveals:** Need distributed session store (Redis, database)
61
+ - **Action:** Design for horizontal scaling from start
62
+
63
+ ## Both Directions Matter
64
+
65
+ **Test smaller too:**
66
+ - What if only 1 user? Does complexity make sense?
67
+ - What if only 10 items? Is optimization premature?
68
+ - What if instant response? What becomes unnecessary?
69
+
70
+ Often reveals over-engineering or premature optimization.
71
+
72
+ ## Red Flags
73
+
74
+ You need scale game when:
75
+ - "It works in dev" (but will it work in production?)
76
+ - No idea where limits are
77
+ - "Should scale fine" (without evidence)
78
+ - Surprised by production behavior
79
+ - Architecture feels arbitrary
80
+
81
+ ## Success Metrics
82
+
83
+ After scale game, you should know:
84
+ - Where system breaks (exact limits)
85
+ - What survives (fundamentally sound parts)
86
+ - What needs redesign (scale-dependent)
87
+ - Production readiness (validated architecture)
88
+
89
+ ## Remember
90
+
91
+ - Extremes reveal fundamentals hidden at normal scales
92
+ - What works at one scale fails at another
93
+ - Test BOTH directions (bigger AND smaller)
94
+ - Use insights to validate architecture early
95
+ - Don't guess - test at extremes
@@ -0,0 +1,80 @@
1
+ # Simplification Cascades
2
+
3
+ Find one insight eliminating multiple components. "If this is true, we don't need X, Y, Z."
4
+
5
+ ## Core Principle
6
+
7
+ **Everything is a special case of...** collapses complexity dramatically.
8
+
9
+ One powerful abstraction > ten clever hacks.
10
+
11
+ ## When to Use
12
+
13
+ | Symptom | Action |
14
+ |---------|--------|
15
+ | Same thing implemented 5+ ways | Abstract the common pattern |
16
+ | Growing special case list | Find the general case |
17
+ | Complex rules with exceptions | Find rule with no exceptions |
18
+ | Excessive config options | Find defaults working for 95% |
19
+
20
+ ## The Pattern
21
+
22
+ **Look for:**
23
+ - Multiple implementations of similar concepts
24
+ - Special case handling everywhere
25
+ - "We need to handle A, B, C, D differently..."
26
+ - Complex rules with many exceptions
27
+
28
+ **Ask:** "What if they're all the same thing underneath?"
29
+
30
+ ## Examples
31
+
32
+ ### Example 1: Stream Abstraction
33
+ - **Before:** Separate handlers for batch/real-time/file/network data
34
+ - **Insight:** "All inputs are streams - just different sources"
35
+ - **After:** One stream processor, multiple stream sources
36
+ - **Eliminated:** 4 separate implementations
37
+
38
+ ### Example 2: Resource Governance
39
+ - **Before:** Session tracking, rate limiting, file validation, connection pooling (all separate)
40
+ - **Insight:** "All are per-entity resource limits"
41
+ - **After:** One ResourceGovernor with 4 resource types
42
+ - **Eliminated:** 4 custom enforcement systems
43
+
44
+ ### Example 3: Immutability
45
+ - **Before:** Defensive copying, locking, cache invalidation, temporal coupling
46
+ - **Insight:** "Treat everything as immutable data + transformations"
47
+ - **After:** Functional programming patterns
48
+ - **Eliminated:** Entire classes of synchronization problems
49
+
50
+ ## Process
51
+
52
+ 1. **List variations** - What's implemented multiple ways?
53
+ 2. **Find essence** - What's the same underneath?
54
+ 3. **Extract abstraction** - What's the domain-independent pattern?
55
+ 4. **Test fit** - Do all cases fit cleanly?
56
+ 5. **Measure cascade** - How many things become unnecessary?
57
+
58
+ ## Red Flags
59
+
60
+ Signs you're missing a cascade:
61
+ - "Just need to add one more case..." (repeating forever)
62
+ - "These are similar but different" (maybe they're the same?)
63
+ - Refactoring feels like whack-a-mole (fix one, break another)
64
+ - Growing configuration file
65
+ - "Don't touch that, it's complicated" (complexity hiding pattern)
66
+
67
+ ## Success Metrics
68
+
69
+ - **10x wins, not 10% improvements**
70
+ - Measure in "how many things can we delete?"
71
+ - Lines of code removed > lines added
72
+ - Configuration options eliminated
73
+ - Special cases unified
74
+
75
+ ## Remember
76
+
77
+ - The pattern is usually already there, just needs recognition
78
+ - Valid cascades feel obvious in retrospect
79
+ - Test with "can this handle all existing cases?"
80
+ - Document the insight for future reference
@@ -0,0 +1,72 @@
1
+ # When Stuck - Problem-Solving Dispatch
2
+
3
+ Different stuck-types need different techniques. Match stuck-symptom to technique.
4
+
5
+ ## Dispatch Flowchart
6
+
7
+ ```
8
+ YOU'RE STUCK
9
+
10
+ ├─ Complexity spiraling? Same thing 5+ ways? Growing special cases?
11
+ │ └─→ USE: Simplification Cascades
12
+
13
+ ├─ Can't find fitting approach? Conventional solutions inadequate?
14
+ │ └─→ USE: Collision-Zone Thinking
15
+
16
+ ├─ Same issue different places? Reinventing wheels? Feels familiar?
17
+ │ └─→ USE: Meta-Pattern Recognition
18
+
19
+ ├─ Solution feels forced? "Must be done this way"? Stuck on assumptions?
20
+ │ └─→ USE: Inversion Exercise
21
+
22
+ ├─ Will this work at production? Edge cases unclear? Unsure of limits?
23
+ │ └─→ USE: Scale Game
24
+
25
+ └─ Code broken? Wrong behavior? Test failing?
26
+ └─→ USE: Debugging skill (systematic-debugging)
27
+ ```
28
+
29
+ ## Stuck-Type → Technique Map
30
+
31
+ | How You're Stuck | Symptom Details | Use This |
32
+ |------------------|-----------------|----------|
33
+ | **Complexity spiraling** | Same thing 5+ ways, growing special cases, excessive if/else | simplification-cascades.md |
34
+ | **Need innovation** | Conventional inadequate, can't find fitting approach, need breakthrough | collision-zone-thinking.md |
35
+ | **Recurring patterns** | Same issue different places, reinventing wheels, déjà vu feeling | meta-pattern-recognition.md |
36
+ | **Forced by assumptions** | "Must be done this way", can't question premise, forced solution | inversion-exercise.md |
37
+ | **Scale uncertainty** | Production unclear, edge cases unknown, unsure of limits | scale-game.md |
38
+ | **Code broken** | Wrong behavior, test failing, unexpected output | debugging skill |
39
+
40
+ ## Process
41
+
42
+ 1. **Identify stuck-type** - What symptom matches above?
43
+ 2. **Load that technique** - Read the specific reference file
44
+ 3. **Apply technique** - Follow its process
45
+ 4. **Document attempt** - What worked/failed?
46
+ 5. **If still stuck** - Try different technique or combine
47
+
48
+ ## Combining Techniques
49
+
50
+ Some problems need multiple techniques:
51
+
52
+ - **Simplification + Meta-pattern** - Find pattern → simplify all instances
53
+ - **Collision + Inversion** - Force metaphor → invert assumptions
54
+ - **Scale + Simplification** - Test extremes → reveal what to eliminate
55
+ - **Meta-pattern + Scale** - Universal pattern → test at extremes
56
+
57
+ ## When Nothing Works
58
+
59
+ If no technique helps:
60
+ 1. **Reframe problem** - Are you solving the right problem?
61
+ 2. **Get fresh perspective** - Explain to someone else
62
+ 3. **Take break** - Distance often reveals solution
63
+ 4. **Simplify scope** - Solve smaller version first
64
+ 5. **Question constraints** - Are they real or assumed?
65
+
66
+ ## Remember
67
+
68
+ - Match symptom to technique
69
+ - One technique at a time
70
+ - Combine if first doesn't work
71
+ - Document what you tried
72
+ - Not stuck forever, just temporarily
@@ -0,0 +1,168 @@
1
+ ---
2
+ name: research
3
+ description: Use when you need to research, analyze, and plan technical solutions that are scalable, secure, and maintainable.
4
+ license: MIT
5
+ ---
6
+
7
+ # Research
8
+
9
+ ## Research Methodology
10
+
11
+ Always honoring **YAGNI**, **KISS**, and **DRY** principles.
12
+ **Be honest, be brutal, straight to the point, and be concise.**
13
+
14
+ ### Phase 1: Scope Definition
15
+
16
+ First, you will clearly define the research scope by:
17
+ - Identifying key terms and concepts to investigate
18
+ - Determining the recency requirements (how current must information be)
19
+ - Establishing evaluation criteria for sources
20
+ - Setting boundaries for the research depth
21
+
22
+ ### Phase 2: Systematic Information Gathering
23
+
24
+ You will employ a multi-source research strategy:
25
+
26
+ 1. **Search Strategy**:
27
+ - Check if `gemini` bash command is available, if so, execute `gemini -m gemini-2.5-flash -p "...your search prompt..."` bash command (timeout: 10 minutes) and save the output to `./plans/<plan-name>/reports/YYMMDD-<your-research-topic>.md` file (including all citations).
28
+ - If `gemini` bash command is not available, fallback to `WebSearch` tool.
29
+ - Run multiple `gemini` bash commands or `WebSearch` tools in parallel to search for relevant information.
30
+ - Craft precise search queries with relevant keywords
31
+ - Include terms like "best practices", "2024", "latest", "security", "performance"
32
+ - Search for official documentation, GitHub repositories, and authoritative blogs
33
+ - Prioritize results from recognized authorities (official docs, major tech companies, respected developers)
34
+ - **IMPORTANT:** You are allowed to perform at most **5 researches (max 5 tool calls)**, user might request less than this amount, **strictly respect it**, think carefully based on the task before performing each related research topic.
35
+
36
+ 2. **Deep Content Analysis**:
37
+ - When you found a potential Github repository URL, use `docs-seeker` skill to find read it.
38
+ - Focus on official documentation, API references, and technical specifications
39
+ - Analyze README files from popular GitHub repositories
40
+ - Review changelog and release notes for version-specific information
41
+
42
+ 3. **Video Content Research**:
43
+ - Prioritize content from official channels, recognized experts, and major conferences
44
+ - Focus on practical demonstrations and real-world implementations
45
+
46
+ 4. **Cross-Reference Validation**:
47
+ - Verify information across multiple independent sources
48
+ - Check publication dates to ensure currency
49
+ - Identify consensus vs. controversial approaches
50
+ - Note any conflicting information or debates in the community
51
+
52
+ ### Phase 3: Analysis and Synthesis
53
+
54
+ You will analyze gathered information by:
55
+ - Identifying common patterns and best practices
56
+ - Evaluating pros and cons of different approaches
57
+ - Assessing maturity and stability of technologies
58
+ - Recognizing security implications and performance considerations
59
+ - Determining compatibility and integration requirements
60
+
61
+ ### Phase 4: Report Generation
62
+
63
+ **Notes:**
64
+ - Research reports are saved in `./plans/<plan-name>/reports/YYMMDD-<your-research-topic>.md`.
65
+ - If you are not given a plan name, ask main agent to provide it and continue the process.
66
+
67
+ You will create a comprehensive markdown report with the following structure:
68
+
69
+ ```markdown
70
+ # Research Report: [Topic]
71
+
72
+ ## Executive Summary
73
+ [2-3 paragraph overview of key findings and recommendations]
74
+
75
+ ## Research Methodology
76
+ - Sources consulted: [number]
77
+ - Date range of materials: [earliest to most recent]
78
+ - Key search terms used: [list]
79
+
80
+ ## Key Findings
81
+
82
+ ### 1. Technology Overview
83
+ [Comprehensive description of the technology/topic]
84
+
85
+ ### 2. Current State & Trends
86
+ [Latest developments, version information, adoption trends]
87
+
88
+ ### 3. Best Practices
89
+ [Detailed list of recommended practices with explanations]
90
+
91
+ ### 4. Security Considerations
92
+ [Security implications, vulnerabilities, and mitigation strategies]
93
+
94
+ ### 5. Performance Insights
95
+ [Performance characteristics, optimization techniques, benchmarks]
96
+
97
+ ## Comparative Analysis
98
+ [If applicable, comparison of different solutions/approaches]
99
+
100
+ ## Implementation Recommendations
101
+
102
+ ### Quick Start Guide
103
+ [Step-by-step getting started instructions]
104
+
105
+ ### Code Examples
106
+ [Relevant code snippets with explanations]
107
+
108
+ ### Common Pitfalls
109
+ [Mistakes to avoid and their solutions]
110
+
111
+ ## Resources & References
112
+
113
+ ### Official Documentation
114
+ - [Linked list of official docs]
115
+
116
+ ### Recommended Tutorials
117
+ - [Curated list with descriptions]
118
+
119
+ ### Community Resources
120
+ - [Forums, Discord servers, Stack Overflow tags]
121
+
122
+ ### Further Reading
123
+ - [Advanced topics and deep dives]
124
+
125
+ ## Appendices
126
+
127
+ ### A. Glossary
128
+ [Technical terms and definitions]
129
+
130
+ ### B. Version Compatibility Matrix
131
+ [If applicable]
132
+
133
+ ### C. Raw Research Notes
134
+ [Optional: detailed notes from research process]
135
+ ```
136
+
137
+ ## Quality Standards
138
+
139
+ You will ensure all research meets these criteria:
140
+ - **Accuracy**: Information is verified across multiple sources
141
+ - **Currency**: Prioritize information from the last 12 months unless historical context is needed
142
+ - **Completeness**: Cover all aspects requested by the user
143
+ - **Actionability**: Provide practical, implementable recommendations
144
+ - **Clarity**: Use clear language, define technical terms, provide examples
145
+ - **Attribution**: Always cite sources and provide links for verification
146
+
147
+ ## Special Considerations
148
+
149
+ - When researching security topics, always check for recent CVEs and security advisories
150
+ - For performance-related research, look for benchmarks and real-world case studies
151
+ - When investigating new technologies, assess community adoption and support levels
152
+ - For API documentation, verify endpoint availability and authentication requirements
153
+ - Always note deprecation warnings and migration paths for older technologies
154
+
155
+ ## Output Requirements
156
+
157
+ Your final report must:
158
+ 1. Be saved as a markdown file with a descriptive filename in `./plans/<plan-name>/reports/YYMMDD-<your-research-topic>.md`
159
+ 2. Include a timestamp of when the research was conducted
160
+ 3. Provide clear section navigation with a table of contents for longer reports
161
+ 4. Use code blocks with appropriate syntax highlighting
162
+ 5. Include diagrams or architecture descriptions where helpful (in mermaid or ASCII art)
163
+ 6. Conclude with specific, actionable next steps
164
+
165
+ **IMPORTANT:** Sacrifice grammar for the sake of concision when writing reports.
166
+ **IMPORTANT:** In reports, list any unresolved questions at the end, if any.
167
+
168
+ **Remember:** You are not just collecting information, but providing strategic technical intelligence that enables informed decision-making. Your research should anticipate follow-up questions and provide comprehensive coverage of the topic while remaining focused and practical.
@@ -0,0 +1,8 @@
1
+ # Sequential Thinking Configuration
2
+
3
+ # Disable thought logging output (useful for automated processing)
4
+ # Set to "true" to disable console logging
5
+ DISABLE_THOUGHT_LOGGING=false
6
+
7
+ # History file location (optional, defaults to scripts/.thought-history.json)
8
+ # THOUGHT_HISTORY_FILE=/path/to/custom/history.json