Identifies when task outputs require iteration based on quality signals, unmet requirements, or explicit feedback. Triggers appropriate re-execution strategies. Activate on 'needs iteration',...
Use when working with incident response incident response
Use when working with incident response incident response
Use when working with incident response incident response
Quick routine security checks for secrets, dependencies, container images, and common vulnerabilities. Run frequently during development. Triggers: security scan, SAST, DAST, vulnerability scan,...
Identifies error-prone APIs, dangerous configurations, and footgun designs that enable security mistakes. Use when reviewing API designs, configuration schemas, cryptographic library ergonomics,...
Expert in secure frontend coding practices specializing in XSS
Expert in secure frontend coding practices specializing in XSS
Expert in secure frontend coding practices specializing in XSS
Expert in secure frontend coding practices specializing in XSS
Expert in secure frontend coding practices specializing in XSS
Enhance user prompts by analyzing project context (code structure, dependencies, conventions, existing patterns). Use when users provide brief development requests that would benefit from...
Enhance user prompts by analyzing project context (code structure, dependencies, conventions, existing patterns). Use when users provide brief development requests that would benefit from...
Comprehensive security guide for Capacitor apps using Capsec scanner. Covers 63+ security rules across secrets, storage, network, authentication, cryptography, and platform-specific...
Build production-ready monitoring, logging, and tracing systems.
Build production-ready monitoring, logging, and tracing systems.
Build production-ready monitoring, logging, and tracing systems.
Build production-ready monitoring, logging, and tracing systems.
Build production-ready monitoring, logging, and tracing systems.
Deep interview process to transform vague ideas into detailed specs. Works for technical and non-technical users.