Deep interview process to transform vague ideas into detailed specs. Works for technical and non-technical users.
Skill Development Rules
Router-First Architecture
Never Use TaskOutput
Formal theorem proving with research, testing, and verification phases
Validation agent that validates plan tech choices against current best practices
Implement technical plans from thoughts/shared/plans with verification
Idempotent Redundancy
Environment Triage
Guide to the math cognitive stack - what tools exist and when to use each
Graceful Degradation with Helpful Messages
Agent Context Isolation
Agentic Workflow Pattern
Planning agent that creates implementation plans and handoffs from conversation context
Query the memory system for relevant learnings from past sessions
Deterministic router for math cognitive stack - maps user intent to exact CLI commands
Conducts comprehensive security code reviews including vulnerability detection (OWASP Top 10, CWE), authentication/authorization flaws, injection attacks, cryptography issues, sensitive data...
Use when completing tasks, implementing major features, or before merging to verify work meets requirements
Use when completing tasks, implementing major features, or before merging to verify work meets requirements
Autonomously deep-scan entire codebase line-by-line, understand architecture and patterns, then systematically transform it to production-grade, corporate-level professional quality with optimizations