Use when you have a spec or requirements for a multi-step task, before touching code
Use when you have a spec or requirements for a multi-step task, before touching code
Use when you have a spec or requirements for a multi-step task, before touching code
Use when you have a spec or requirements for a multi-step task, before touching code
Use when you have a spec or requirements for a multi-step task, before touching code
Use when you have a spec or requirements for a multi-step task, before touching code
Use when you have a spec or requirements for a multi-step task, before touching code
Use when you have a spec or requirements for a multi-step task, before touching code
Use when you have a spec or requirements for a multi-step task, before touching code
Document and communicate plans clearly. Structures implementation plans with tasks, decisions, and success criteria.
Structured implementation planning for multi-step development tasks. Use when you have a spec or requirements and need to break work into executable steps.
Use when design is complete and you need detailed implementation tasks
Use when design is complete and you need detailed implementation tasks for engineers with zero codebase context - creates comprehensive implementation plans with exact file paths, complete code...
Use when design is complete and you need detailed implementation tasks for engineers with zero codebase context - creates comprehensive implementation plans with exact file paths, complete code...
Activate maximum performance mode with parallel agent orchestration for high-throughput task completion
Token-efficient parallel execution mode using Haiku and Sonnet agents
Domain reconnaissance coordinator that orchestrates subdomain discovery and port scanning to build comprehensive domain attack surface inventory
Application security testing coordinator for common vulnerability patterns including XSS, injection flaws, and client-side security issues. Orchestrates specialized testing agents to identify and...
CVE vulnerability testing coordinator that identifies technology stacks, researches known vulnerabilities, and tests applications for exploitable CVEs using public exploits and proof-of-concept code.
SOC II triage workflow for creating Linear tickets, branches, OpenSpec proposals, commits, and PRs. Use when asked to triage an issue, create a triage ticket, or start SOC II workflow.