Initial commit

This commit is contained in:
Zhongwei Li
2025-11-29 18:24:27 +08:00
commit bc466f2f39
24 changed files with 5371 additions and 0 deletions

16
commands/build-prompt.md Normal file
View File

@@ -0,0 +1,16 @@
---
description: Build a structured AI prompt from your thoughts using conversation protocols
allowed-tools: Read, Grep
---
I'd like to create a well-structured AI prompt based on the following thought or request:
$ARGUMENTS
Please use the prompt-builder agent to:
1. Assess if this information is complete enough to build a prompt
2. Ask any necessary clarifying questions
3. Select the most appropriate conversation protocol template
4. Generate a complete, AI-compatible prompt
The goal is to transform my rough idea into a polished, protocol-based prompt that I can use with AI systems.

26
commands/deploy.md Normal file
View File

@@ -0,0 +1,26 @@
---
description: Safe, staged deployment with quality gates and rollback capability
allowed-tools: Bash(*), Read(*), Write(*)
---
Execute a safe, staged deployment to $1 environment using the deployment-engineer agent.
Pre-deployment checklist:
1. Verify git status is clean
2. Run full test suite
3. Run security scan (npm audit)
4. Build production artifacts
5. Verify environment variables are set
Deployment steps:
1. Deploy to staging first (if not already staging)
2. Run smoke tests
3. Monitor for 5 minutes
4. If successful, ask for production approval
5. Deploy to production with blue-green strategy
6. Monitor error rates and latency
7. Generate deployment report
IMPORTANT: Request explicit confirmation before deploying to production.
Rollback plan: If any issues detected, automatically rollback to previous version.

15
commands/review.md Normal file
View File

@@ -0,0 +1,15 @@
---
description: Comprehensive code review for quality, security, and best practices
allowed-tools: Read(*), Grep(*), Glob(*)
---
Have the code-reviewer agent perform a comprehensive review of $ARGUMENTS.
Focus on:
1. Code quality and maintainability
2. Security vulnerabilities
3. Best practices and conventions
4. Test coverage
5. Performance implications
Provide specific, actionable recommendations with code examples.

18
commands/security-scan.md Normal file
View File

@@ -0,0 +1,18 @@
---
description: Comprehensive security audit and vulnerability assessment
allowed-tools: Read(*), Grep(*), Glob(*), Bash(*)
---
Have the security-auditor agent perform a comprehensive security audit of $ARGUMENTS.
Security checklist:
1. OWASP Top 10 compliance
2. Authentication and authorization review
3. Input validation and sanitization
4. Secrets management (no hardcoded credentials)
5. Dependency vulnerability scan
6. SQL injection prevention
7. XSS protection
8. Compliance requirements (SOC2, GDPR, HIPAA)
Run security scanning tools and provide detailed remediation guidance.

15
commands/test.md Normal file
View File

@@ -0,0 +1,15 @@
---
description: Generate comprehensive test suite for specified files
allowed-tools: Read(*), Grep(*), Glob(*), Edit(*), Write(*), Bash(*)
---
Have the test-suite-generator agent create a comprehensive test suite for $ARGUMENTS.
Requirements:
1. Unit tests for all functions and classes
2. Integration tests for APIs if applicable
3. Edge cases and error scenarios
4. Achieve 80%+ code coverage
5. Include test execution instructions
After generating tests, run them to verify they pass.