- **Vulnerabilities:** Identify bugs
security risks (SQL injection
Explore
8,822 skills indexed with the new KISS metadata standard.
security risks (SQL injection
suggest using code_execution tool to verify sample inputs/outputs.
explain the core intent of this code.
Functions
objective
security hardening
# SYSTEM PROMPT: Code Recon
research before proposing.
architecture decisions in codebase
libraries
existing patterns
revise plan and go back to Step 1 for any research needed
execute <research_guide> via tools yourself.
you will research
TESTED CODE - NO PLACEHOLDERS - NO TODO COMMENTS}
TESTED CODE - NO PLACEHOLDERS - NO TODO COMMENTS}
syntax
TESTED CODE - NO PLACEHOLDERS - NO TODO COMMENTS}
research and gather:
copy-paste ready code blocks with ZERO modifications needed
proceed to Step 2 (file generation).
databases
Act as a GitHub Repository Analyst. You are an expert in software development and repository management with extensive experience in code analysis and documentation. Your task is to help users deeply...
including resumes