Ranks any list of impediments and their countermeasures using a value-stream scoring model (ROI, Cost to Implement, Ease of Deployment, Risk Factor) and a fixed prioritization…
Score 70/100
Use when implementation is complete and ready for verification, before marking task done. Absorbs code-reviewer role — no separate code review needed in ECW workflow.
Score 70/100
Implement complete CRUD (Create, Read, Update, Delete) operations for Supabase tables with proper error handling, validation, and RLS.
Score 70/100
Step-by-step guide for implementing DDD aggregates following patterns with Clean Architecture.
Score 70/100
Implement an approved feature file using ATDD workflow with test-first development
Score 70/100
Full-lifecycle project workflow. Takes batched tickets, implements via /implement-batch, runs smoke tests, then executes a comprehensive quality pipeline (refactor, review-arch,…
Score 70/100
Execute refactoring tasks from a task file with parallel agent orchestration
Score 70/100
Guide SwiftUI implementation and refactoring with current Apple patterns, then analyze Instruments traces to diagnose hangs, hitches, and expensive view updates.
Score 70/100
Implements Z-Wave CTT (Certification Test Tool) test handlers for automating certification tests. Use when asked to create handlers for a given test, which includes automating CTT…
Score 70/100
Add comprehensive type hints to Python/TypeScript code to improve IDE support, catch errors early, and enable better AI code understanding
Score 70/100
Use when animation doesn't work as expected, has bugs, or behaves inconsistently
Score 70/100
Run a TOGAF Phase G Implementation Governance review. Produces Architecture Contracts (joint sponsor/delivery agreements), Compliance Assessments against the 8 TOGAF checklists,…
Score 70/100
Provides detailed guidance on how to implement a single plan step while adhering to architecture and quality standards.
Score 70/100
Generate comprehensive implementation guides for coding tasks instead of writing code directly. Use when the user requests detailed implementation documentation, step-by-step…
Score 70/100
Executes implementation tasks using Test-Driven Development, prevents code duplication through anti-duplication checks, and maintains quality through continuous testing.
Score 70/100
Conduct structured implementation postmortems to gather feedback on architecture conformance, library friction, and tooling effectiveness.
Score 70/100
Automatically trigger review agents after task completion. Use when strategic-planner finishes planning tasks (calls plan-consultant) or when main agent completes coding tasks in…
Score 70/100
Complete TDD workflow for implementing business logic (use cases) and API endpoints that make tests pass.
Score 70/100
Implement API abuse detection using token bucket, sliding window, and adaptive rate limiting algorithms to prevent
Score 70/100
API design and implementation across REST, GraphQL, gRPC, and tRPC patterns. Use when building backend services, public APIs, or service-to-service communication.
Score 70/100
Implements API rate limiting and throttling controls using token bucket, sliding window, and fixed window algorithms
Score 70/100
Implementing AWS Config rules for continuous compliance monitoring of AWS resources, deploying managed and custom
Score 70/100
Configure IAM permission boundaries in AWS to delegate role creation to developers while enforcing maximum privilege
Score 70/100
Implement Amazon Macie to automatically discover, classify, and protect sensitive data in S3 buckets using machine
Score 70/100
Configure Microsoft Entra Privileged Identity Management to enforce just-in-time role activation, approval workflows,
Score 70/100
Implementing Microsoft Defender for Cloud to enable cloud security posture management, workload protection across
Score 70/100
Implementing Google''s BeyondCorp zero trust access model to eliminate implicit trust from the network perimeter,
Score 70/100
Deploys remote browser isolation (RBI) as a core component of a Zero Trust architecture. Implements isolation
Score 70/100
Implement the CISA Zero Trust Maturity Model v2.0 across the five pillars of identity, devices, networks, applications,
Score 70/100
Configure Microsoft Entra ID (Azure AD) Conditional Access policies for zero trust access control. Covers signal-based
Score 70/100
Enforce Kubernetes network segmentation using Calico CNI network policies and global network policies to control
Score 70/100
Design and implement DDD patterns (entities, value objects, aggregates, CQRS). Use when creating new domain objects, implementing bounded contexts, designing repository…
Score 70/100
Deploy and configure the Dragos Platform for OT network monitoring, leveraging its 600+ industrial protocol
Score 70/100
Integrate AFL++ coverage-guided fuzz testing into CI/CD pipelines to discover memory corruption, input handling,
Score 70/100
Implement GCP Binary Authorization to enforce deploy-time security controls that ensure only trusted, attested
Score 70/100
Implement GCP Organization Policy constraints to enforce security guardrails across the entire resource hierarchy,
Score 70/100
Implement GitOps continuous delivery for Kubernetes using ArgoCD or Flux. Use for automated deployments with Git as single source of truth, pull-based delivery, drift detection,…
Score 70/100
Enables mouse event reception for WPF FrameworkElement using DrawingContext by drawing transparent backgrounds. Use when custom-drawn elements don't receive mouse events.
Score 70/100
Implement Kubernetes network segmentation using Calico NetworkPolicy and GlobalNetworkPolicy for zero-trust pod-to-pod
Score 70/100
Implements navigation patterns and routing for both frontend (React/TS) and backend (Python) including menus, tabs, breadcrumbs, client-side routing, and server-side route…
Score 70/100
Kubernetes NetworkPolicies provide pod-level network segmentation by defining ingress and egress rules that control
Score 70/100
Enforce Kubernetes admission policies using OPA Gatekeeper with ConstraintTemplates, Rego rules, and the Gatekeeper
Score 70/100
Deploy privileged access management for database systems including Oracle, SQL Server, PostgreSQL, and MySQL.
Score 70/100
Patch management is the systematic process of identifying, testing, deploying, and verifying software updates
Score 70/100
PCI DSS 4.0.1 establishes 12 requirements across 6 control objectives for organizations that store, process, or transmit cardholder data.
Score 70/100
Implements Pub-Sub patterns using System.Reactive and Channels for event-based communication in .NET.
Score 70/100
Implement network segmentation based on the Purdue Enterprise Reference Architecture (PERA) model to separate
Score 70/100
Implement query result caching with Redis and proper invalidation strategies for Prisma 6. Use when optimizing frequently accessed data, improving read-heavy application…
Score 70/100
Harden Kubernetes Role-Based Access Control by implementing least-privilege policies, auditing role bindings,
Score 70/100
Implementing Supabase realtime subscriptions and live updates for StickerNest. Use when the user asks to add realtime, live updates, presence, subscriptions, postgres_changes,…
Score 70/100
Real-time communication patterns for live updates, collaboration, and presence. Use when building chat applications, collaborative tools, live dashboards, or streaming interfaces…
Score 70/100
Integrate gitleaks and trufflehog into CI/CD pipelines to detect leaked secrets before deployment
Score 70/100
Implement production-ready service mesh deployments with Istio, Linkerd, or Cilium. Configure mTLS, authorization policies, traffic routing, and progressive delivery patterns for…
Score 70/100
Implement using TDD Red-Green cycle. Focus on Red-Green only; refactoring is separate step.
Score 70/100
Quality assurance protocols using Vitest. Use for critical logic like pricing and availability calculations.
Score 70/100
Use when implementing bug fixes, features, or any code changes where test-first development is appropriate.
Score 70/100
Implement NextDNS as a zero trust DNS filtering layer with encrypted resolution, threat intelligence blocking,
Score 70/100
Implementing zero trust access controls for SaaS applications using CASB, SSPM, conditional access policies,
Score 70/100
Implementing Zero Trust Network Access (ZTNA) in cloud environments by configuring identity-aware proxies, micro-segmentation,
Score 70/100
Implement Zero Trust Network Access using Zscaler Private Access (ZPA) to replace traditional VPN with identity-based,
Score 70/100