
18 results

Classify engineering changes by approval tier and identify which actions must stop for explicit human approval. Use when a change may touch destructive, privileged, production-affecting, or policy-sensitive surfaces and the system must distinguish what can proceed automatically from what cannot.

Execute complex product-development changes with strong scope control, explicit verification, test updates, and documentation sync. Use when implementing multi-file fixes or features where shallow solutions, unrelated edits, and missing regression coverage are major risks.

Perform a focused security review on auth, permission, data exposure, secret handling, auditability, and trust-boundary changes. Use when a code change touches security-sensitive surfaces and a separate security lane should evaluate exploitability rather than general code quality alone.

Build narrow, high-signal context packs for complex engineering tasks by selecting only the relevant code, tests, recent changes, docs, and risks. Use when a task spans multiple files or subsystems and the execution agent would otherwise be harmed by too much or too little context.

Apply stricter decision rules for hotfixes and incidents, including freeze handling, required communications, approval compression, and rollback obligations. Use when production impact or degraded service requires a temporary mode switch without losing auditability.

Build a narrow context pack that includes owner team, service criticality, runbooks, recent incidents, and approval hints. Use when a change touches services where review, release, and escalation quality depend on ownership-aware context rather than code context alone.

Select and run deterministic quality gates for complex engineering tasks, including tests, lint, typecheck, security checks, docs sync, and task-specific gates such as migration, retry, or performance checks. Use when a task must be judged by repeatable verification rather than narrative confidence.

Decide whether a complex engineering change is truly ready to release by combining gate results, review findings, approval state, rollback readiness, and operator guidance. Use when passing tests is not enough and a deployment decision requires explicit blocker handling.

Use primary sources to de-risk complex implementation choices involving external SDKs, platform rules, protocols, or policies. Use when a coding decision cannot be made safely from local repository context alone and unsupported assumptions would create costly rework.

Perform an independent review pass focused on regressions, missing requirements, test gaps, security risks, and operational hazards. Use after complex implementations where a separate reviewer must report concrete findings instead of re-implementing the change.

Turn ambiguous or broad product-development requests into strict complex-case task briefs with explicit goal, done conditions, non-goals, risks, approvals, and verification scope. Use when a coding task is multi-file, regression-prone, policy-constrained, or likely to sprawl without a tight execution contract.