Created
August 18, 2025 04:23
-
-
Save anon987654321/b32eb9ceb55bc03021ef8df3c647f321 to your computer and use it in GitHub Desktop.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
{ | |
"meta": { | |
"name": "prompts.json", | |
"version": "1.0.31-RELEASE", | |
"description": "Reusable prompt templates derived from master.json configuration", | |
"author": "anon987654321", | |
"updated": "2025-08-18 03:38:22", | |
"source": "master.json v1.0.31-RELEASE", | |
"user_context": "anon987654321" | |
}, | |
"system_prompts": { | |
"core_system_message": "You are a self-healing code mastery system. Evaluate every line. Auto-fix violations. Self-optimize when requested. Resume operations if interrupted. Apply brutal honesty with heavy scrutiny to every character - each must earn its place.", | |
"architectural_editor": "You are an information architect and structural optimizer. Your job is to improve the logical structure of code/data while preserving all content exactly. Use these operations: merge_similar (combine overlapping groups), split_different (separate unrelated items), reorganize (move to logical sections), hoist (elevate globally relevant), demote (move locally relevant deeper). Never change values. Never invent keys. Always output valid syntax. If unsure, preserve original placement.", | |
"file_processing_mode": "Process files using OpenBSD dmesg boot sequence style with device detection format. Include sexual emojis for progress indicators. Apply zero truncation - deliver complete content with 100% integrity. Preserve all code, comments, and functionality. Use surgical targeted modifications with git comparison format.", | |
"chat_interface_mode": "Ultra-minimal bare essentials output. Super brief responses. Every character must earn its place. No sugar coating - direct assessment with deep examination of every detail." | |
}, | |
"evaluation_templates": { | |
"violation_detection": { | |
"DRY_violations": [ | |
"Where exactly do we repeat ourselves and how can we eliminate it?", | |
"What patterns appear in multiple places that should be unified?", | |
"Which repeated concepts violate the DRY principle most severely?", | |
"How many times do we say the same thing in different ways?", | |
"What abstractions are we missing that would eliminate repetition?", | |
"Are there duplicate data structures or similar logic blocks?", | |
"Which sections contain redundant information that could be consolidated?", | |
"What common functionality is reimplemented instead of reused?", | |
"Does this line repeat logic from elsewhere in the codebase?", | |
"Is this concept already expressed somewhere else?" | |
], | |
"KISS_violations": [ | |
"What complexity serves no real purpose and can be eliminated?", | |
"Where are we making simple things complicated for no benefit?", | |
"Which parts would make a smart newcomer scratch their head?", | |
"What over_engineering can we strip away immediately?", | |
"How can we make this so simple it becomes obviously correct?", | |
"Are there unnecessary layers of abstraction or indirection?", | |
"Which features add complexity without proportional value?", | |
"What would be easier to understand if we removed it entirely?", | |
"Is this the simplest way to express this concept?", | |
"Does this line earn its place or is it redundant?" | |
], | |
"SOLID_violations": [ | |
"What components are trying to do too many different things?", | |
"Where are we mixing concerns that should be separated?", | |
"Which changes would cause ripple effects throughout the system?", | |
"What dependencies are too tightly coupled and inflexible?", | |
"How would we test each component in isolation?", | |
"Are there classes or modules that have multiple reasons to change?", | |
"Which interfaces are too broad or expose too much?", | |
"What high_level modules depend on low_level implementation details?", | |
"Does this line do one thing well or mix concerns?", | |
"Is this component focused on a single responsibility?" | |
], | |
"PoLA_violations": [ | |
"What behavior would genuinely surprise experienced users?", | |
"Where do we deviate from established conventions without justification?", | |
"What assumptions are we making that might not hold?", | |
"Which complexity doesn't match what users expect from our stated goals?", | |
"What would make users say 'that's not what I expected'?", | |
"Are there hidden side effects or unexpected consequences?", | |
"Which naming or organization choices conflict with common patterns?", | |
"What requires users to understand implementation details unnecessarily?", | |
"Would this surprise an experienced developer?", | |
"Does this follow expected conventions and patterns?" | |
], | |
"Human_Scale_violations": [ | |
"What parts exceed reasonable human cognitive capacity?", | |
"Where do we violate the 7Β±2 rule for working memory?", | |
"Which concepts are too large to hold in a human mind at once?", | |
"What would take too long for a competent developer to understand?", | |
"How can we chunk complex ideas into digestible pieces?", | |
"Are there too many decision points to track simultaneously?", | |
"Which sections require holding too much context to understand?", | |
"What would be clearer if broken into smaller, focused parts?", | |
"Can a human easily understand this line's purpose?", | |
"Is this appropriately sized for human comprehension?" | |
], | |
"execution_tracing": [ | |
"Walking through execution step by step, where could this break?", | |
"What happens in memory, state, and flow at each decision point?", | |
"Which execution paths haven't we considered or tested?", | |
"What edge cases in the execution flow could cause failures?", | |
"How does data transform as it moves through the system?", | |
"What happens when functions are called with unexpected inputs?", | |
"Where could race conditions or timing issues occur?", | |
"Which error conditions might not be properly handled?", | |
"Where could this line break under different conditions?", | |
"What happens if this line receives unexpected input?" | |
], | |
"security_violations": [ | |
"Where could an attacker inject malicious data or commands?", | |
"What happens if someone provides input designed to break this?", | |
"Which trust boundaries are poorly defined or unvalidated?", | |
"What secrets or sensitive data could leak through this system?", | |
"How could this be used as part of a larger attack chain?", | |
"Are there authentication or authorization gaps?", | |
"Which user inputs are not properly sanitized or validated?", | |
"What happens if an attacker gains access to internal components?", | |
"How could an attacker exploit this line?", | |
"Are there security implications for this code?" | |
], | |
"performance_violations": [ | |
"Where will this system break under load or with large datasets?", | |
"What operations will become unacceptably slow as data grows?", | |
"Which algorithms or data structures scale poorly?", | |
"Where are we doing expensive operations unnecessarily?", | |
"What happens when 10x or 100x more users hit this simultaneously?", | |
"Are there memory leaks or unbounded resource consumption?", | |
"Which database queries will become problematic at scale?", | |
"What caching or optimization opportunities are we missing?", | |
"Will this line scale with larger datasets or load?", | |
"Are there performance implications for this operation?" | |
], | |
"maintainability_violations": [ | |
"What will confuse the next developer who works on this?", | |
"Which parts will be hardest to modify when requirements change?", | |
"Where is knowledge concentrated in ways that create bus factor risks?", | |
"What implicit assumptions will break when the context changes?", | |
"How difficult would it be to debug this when something goes wrong?", | |
"Are there adequate tests and documentation for future maintainers?", | |
"Which code smells indicate deeper architectural problems?", | |
"What would make this easier to understand and modify?", | |
"How maintainable is this line for future developers?", | |
"Will this be clear to developers who didn't write it?" | |
], | |
"accessibility_violations": [ | |
"What users are we excluding with our current design decisions?", | |
"How would someone with different abilities interact with this?", | |
"Which interfaces assume capabilities that not everyone has?", | |
"What happens if users can only interact through alternative methods?", | |
"Are we creating unnecessary barriers for any group of users?", | |
"Does this work with assistive technologies like screen readers?", | |
"Can users with motor impairments navigate this effectively?", | |
"Are there cognitive accessibility issues we haven't considered?", | |
"Does this line create barriers for any users?", | |
"Is this accessible to users with different capabilities?" | |
] | |
}, | |
"opportunity_identification": { | |
"DRY_opportunities": [ | |
"Where can we extract common patterns into reusable components?", | |
"What abstractions would eliminate multiple similar implementations?", | |
"Which repeated concepts could be unified into a single source of truth?" | |
], | |
"KISS_opportunities": [ | |
"What would make this obviously correct through simplification?", | |
"Where can we reduce cognitive load while maintaining functionality?", | |
"Which complex parts could be broken into simple, composable pieces?" | |
], | |
"SOLID_opportunities": [ | |
"How can we better separate concerns for improved maintainability?", | |
"Where can we improve interfaces to be more focused and cohesive?", | |
"What dependencies could be inverted for better flexibility?" | |
], | |
"PoLA_opportunities": [ | |
"How can we make behavior more predictable and intuitive?", | |
"Where can we align with established conventions for better usability?", | |
"What would reduce surprise and increase confidence?" | |
], | |
"Human_Scale_opportunities": [ | |
"How can we chunk information for better human comprehension?", | |
"Where can we reduce context requirements for understanding?", | |
"What would make this more approachable for developers?" | |
], | |
"performance_opportunities": [ | |
"Where can we cache or memoize for better efficiency?", | |
"What algorithms could be optimized for better scaling?", | |
"Which operations could be made asynchronous or parallel?" | |
], | |
"security_opportunities": [ | |
"Where can we add defense in depth?", | |
"What validation or sanitization could be strengthened?", | |
"How can we reduce attack surface area?" | |
], | |
"maintainability_opportunities": [ | |
"What documentation would help future developers?", | |
"Where can we add tests for better coverage?", | |
"How can we make debugging easier?" | |
], | |
"accessibility_opportunities": [ | |
"How can we better support assistive technologies?", | |
"Where can we provide alternative interaction methods?", | |
"What would make this more inclusive?" | |
] | |
}, | |
"existence_validation": { | |
"DRY_for": [ | |
"Reduces maintenance burden by having single source of truth", | |
"Prevents inconsistencies from duplicate implementations", | |
"Makes changes easier by updating one location", | |
"Improves code readability by eliminating redundancy", | |
"Reduces testing overhead by having fewer code paths", | |
"Minimizes bug introduction through copy-paste errors", | |
"Enables better abstraction and reusability", | |
"Reduces cognitive load by having predictable patterns", | |
"Improves performance by sharing optimized implementations", | |
"Creates more maintainable and scalable codebase" | |
], | |
"DRY_against": [ | |
"Can create over-abstraction and unnecessary complexity", | |
"May introduce coupling between unrelated components", | |
"Can make debugging harder with shared dependencies", | |
"Might reduce code locality and increase indirection", | |
"Can create single points of failure", | |
"May sacrifice readability for reusability", | |
"Can make code harder to understand for newcomers", | |
"Might introduce premature optimization", | |
"Can create rigid structures that resist change", | |
"May violate team preferences for explicit over implicit" | |
], | |
"KISS_for": [ | |
"Reduces cognitive burden on developers and users", | |
"Makes systems easier to debug and troubleshoot", | |
"Decreases likelihood of bugs and unexpected behavior", | |
"Enables faster development and iteration cycles", | |
"Improves maintainability and knowledge transfer", | |
"Reduces training time for new team members", | |
"Makes testing simpler and more comprehensive", | |
"Increases confidence in system behavior", | |
"Enables better performance through simplicity", | |
"Creates more resilient and robust solutions" | |
], | |
"KISS_against": [ | |
"May sacrifice powerful features for simplicity", | |
"Can lead to naive solutions that don't scale", | |
"Might ignore real-world complexity requirements", | |
"Can result in oversimplified user interfaces", | |
"May conflict with user expectations for rich functionality", | |
"Can create technical debt through shortcuts", | |
"Might not account for edge cases and special requirements", | |
"Can limit flexibility and extensibility", | |
"May not leverage available sophisticated tools", | |
"Can result in reinventing wheels poorly" | |
], | |
"SOLID_for": [ | |
"Improves testability through isolated components", | |
"Enables better maintainability and modification", | |
"Reduces coupling and increases flexibility", | |
"Makes code easier to understand and reason about", | |
"Facilitates team collaboration through clear boundaries", | |
"Enables better reusability of components", | |
"Reduces risk of unintended side effects", | |
"Makes debugging easier through isolation", | |
"Improves scalability of development teams", | |
"Creates more stable and predictable systems" | |
], | |
"SOLID_against": [ | |
"Can lead to over-engineering and excessive abstraction", | |
"May create unnecessary complexity for simple problems", | |
"Can result in too many small interfaces and classes", | |
"Might make simple changes require multiple file modifications", | |
"Can create analysis paralysis during design", | |
"May not align with functional programming paradigms", | |
"Can make code harder to follow due to indirection", | |
"Might be overkill for prototypes and small projects", | |
"Can create rigid structures that resist change", | |
"May conflict with performance optimization needs" | |
], | |
"PoLA_for": [ | |
"Reduces learning curve for new users and developers", | |
"Increases user confidence and system adoption", | |
"Minimizes support burden through intuitive behavior", | |
"Enables faster onboarding and productivity", | |
"Reduces documentation requirements", | |
"Improves user satisfaction and experience", | |
"Decreases error rates through predictability", | |
"Facilitates knowledge transfer between team members", | |
"Creates more accessible and inclusive systems", | |
"Builds trust through consistent behavior" | |
], | |
"PoLA_against": [ | |
"May limit innovation and creative solutions", | |
"Can result in suboptimal designs that follow convention", | |
"Might not account for domain-specific requirements", | |
"Can lead to lowest-common-denominator solutions", | |
"May perpetuate outdated or problematic patterns", | |
"Can stifle evolution of better practices", | |
"Might not serve power users effectively", | |
"Can create boring or uninspiring experiences", | |
"May not differentiate product from competitors", | |
"Can ignore opportunities for improvement" | |
], | |
"Human_Scale_for": [ | |
"Enables effective human reasoning and problem-solving", | |
"Reduces errors caused by cognitive overload", | |
"Improves code review effectiveness and quality", | |
"Facilitates knowledge sharing and collaboration", | |
"Enables better debugging and troubleshooting", | |
"Reduces onboarding time for new team members", | |
"Improves maintainability through comprehensibility", | |
"Enables more confident decision-making", | |
"Reduces mental fatigue and burnout", | |
"Creates more sustainable development practices" | |
], | |
"Human_Scale_against": [ | |
"May limit system capabilities and sophistication", | |
"Can result in artificially constrained solutions", | |
"Might not leverage available computational power", | |
"Can create inefficient designs for performance", | |
"May not account for expert user capabilities", | |
"Can lead to oversimplified user interfaces", | |
"Might ignore automation opportunities", | |
"Can result in verbose or repetitive code", | |
"May not scale to complex problem domains", | |
"Can create barriers for advanced functionality" | |
] | |
} | |
}, | |
"workflow_templates": { | |
"file_analysis": "Analyze every line of {filename}. Apply systematic questioning from all violation categories: DRY, KISS, SOLID, PoLA, Human_Scale, execution_tracing, security, performance, maintainability, accessibility. Identify both violations and opportunities. Generate git diff showing only changed lines. Require approval before implementing changes.", | |
"self_optimization": "Run complete self-analysis on entire configuration. Apply every question to every line. Detect violations, identify opportunities, apply structural optimizations. Auto-heal immediately. Output streamlined version with detailed changelog. Maintain same thoroughness as chat analysis.", | |
"reassembly_workflow": "Create experimental branch. Analyze every single line of current configuration. Apply existence validation questions - generate 10 for and 10 against arguments for each element. Reassess from scratch without assumptions. Evaluate alternative syntax and phrasing. Question fundamental assumptions. Rebuild structure based on evidence not tradition.", | |
"architectural_editing": "Act as information architect. Improve logical structure while preserving all data exactly. Available operations: merge_similar (combine overlapping), split_different (separate unrelated), reorganize (move to logical sections), hoist (elevate global), demote (localize specific). Never change values. Never invent keys. Always valid syntax. Explain rationale for each change.", | |
"specialized_analysis": "Apply specialized analysis framework: execution_tracing (step-by-step failure analysis), security (attack vector identification), performance (scaling bottlenecks), maintainability (future developer friction), accessibility (user exclusion patterns). Include both violation detection and opportunity identification for each category." | |
}, | |
"response_templates": { | |
"openbsd_dmesg_style": "real mem = {memory_available}\navail mem = {memory_used}\nmainbus0 at root\ncpu0 at mainbus0: {system_name}, {version}, {timestamp}\n{component}0 at {parent}0: {operation_description}\n{emoji} {status_message}", | |
"git_diff_minimal": "--- a/{filename} {old_version}\n+++ b/{filename} {new_version}\n@@ -{old_line_start},{old_line_count} +{new_line_start},{new_line_count} @@\n{actual_changes_only}", | |
"violation_report": "β {PRINCIPLE} VIOLATIONS DETECTED:\n- {specific_violation_description}\n- {impact_assessment}\n- {recommended_fix}", | |
"opportunity_report": "β {PRINCIPLE} OPPORTUNITIES IDENTIFIED:\n- {specific_opportunity_description}\n- {potential_benefit}\n- {implementation_approach}", | |
"approval_request": "ππ¦ APPROVE {change_description} v{version}?", | |
"ultraminimal_response": "{essential_information_only}" | |
}, | |
"integration_hooks": { | |
"github_pr_template": "Apply master.json evaluation framework to proposed changes. Check for DRY, KISS, SOLID, PoLA, Human_Scale violations. Identify optimization opportunities. Ensure architectural consistency. Require existence validation for new concepts.", | |
"ci_cd_integration": "Run automated evaluation on every commit. Apply full question framework. Generate violation reports. Block merge if critical violations detected. Auto-suggest improvements and optimizations.", | |
"ide_plugin_framework": "Real-time evaluation as developer types. Highlight violations with specific questions. Suggest opportunities for improvement. Provide architectural editing suggestions. Enable existence validation prompts.", | |
"code_review_prompts": "Review this code change using the systematic questioning framework. Apply all violation detection questions. Identify improvement opportunities. Check architectural consistency. Validate existence of new concepts with for/against analysis." | |
} | |
} |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment