Search Mathlib for lemmas by type signature pattern
Unit-aware computation with Pint - convert units, dimensional analysis, unit arithmetic
Search past reasoning for relevant decisions and approaches
Index at Creation Time
Create or update continuity ledger for state preservation across clears
Validation agent that validates plan tech choices against current best practices
Query the memory system for relevant learnings from past sessions
Planning agent that creates implementation plans and handoffs from conversation context
Show full session token usage, costs, TLDR savings, and hook activity
Deep interview process to transform vague ideas into detailed specs. Works for technical and non-technical users.
Agent Context Isolation
Scrape web pages and extract content via Firecrawl MCP
Upgrade any skill to v5 Hybrid format using decision theory + modal logic
Parallel Agent Orchestration
Conducts comprehensive security code reviews including vulnerability detection (OWASP Top 10, CWE), authentication/authorization flaws, injection attacks, cryptography issues, sensitive data...
Use when completing tasks, implementing major features, or before merging to verify work meets requirements
Use when completing tasks, implementing major features, or before merging to verify work meets requirements
Use when completing tasks, implementing major features, or before merging to verify work meets requirements
Use when implementing authentication/authorization, securing user input, or preventing OWASP Top 10 vulnerabilities. Invoke for authentication, authorization, input validation, encryption, OWASP...
Autonomously deep-scan entire codebase line-by-line, understand architecture and patterns, then systematically transform it to production-grade, corporate-level professional quality with optimizations