Master Go 1.21+ with modern patterns, advanced concurrency,
>
|
Comprehensive guide for creating software diagrams using Mermaid syntax. Use when users need to create, visualize, or document software through diagrams including class diagrams (domain modeling,...
Comprehensive guide for creating software diagrams using Mermaid syntax. Use when users need to create, visualize, or document software through diagrams including class diagrams (domain modeling,...
Comprehensive guide for creating software diagrams using Mermaid syntax. Use when users need to create, visualize, or document software through diagrams including class diagrams (domain modeling,...
Build React components, implement responsive layouts, and handle
Build React components, implement responsive layouts, and handle
Build React components, implement responsive layouts, and handle
Build React components, implement responsive layouts, and handle
>
4-layer knowledge capture system for development sessions. Use when user says /mem (quick capture), /distill (extract patterns), /td (post-task retrospective with Before/After context), /improve...
Master Rust 1.75+ with modern async patterns, advanced type system
Master Rust 1.75+ with modern async patterns, advanced type system
Master Rust 1.75+ with modern async patterns, advanced type system
Rigorous planning through three phases - Discover (explore problem space), Decide (validate each decision via consensus + FPF), Design (compile validated output). Use for complex planning with...
Master Rust 1.75+ with modern async patterns, advanced type system
Guide for migrating Apache Airflow 2.x projects to Airflow 3.x. Use when the user mentions Airflow 3 migration, upgrade, compatibility issues, breaking changes, or wants to modernize their Airflow...
Best practices and guidelines for Turbopack, the Rust-powered incremental bundler for Next.js and modern web development
CVE vulnerability testing coordinator that identifies technology stacks, researches known vulnerabilities, and tests applications for exploitable CVEs using public exploits and proof-of-concept code.