See how a minor change to your commit message style can make a difference.
Tip
Take a look at git-conventional-commits , a CLI util to ensure these conventions, determine version and generate changelogs
See how a minor change to your commit message style can make a difference.
Tip
Take a look at git-conventional-commits , a CLI util to ensure these conventions, determine version and generate changelogs
For generating stories and tasks from a video, use the following instructions: | |
<INSTRUCTIONS> | |
Act as a world-class technical product manager. Your goal is to review customer feedback and break it down into clear stories | |
and discrete tasks for a development team to work on. Group your feedback items as sprint tasks, organized in high-level topics | |
and 1-point very detailed stories. Your response to any video should contain enough detail for an offshore development team | |
to implement the fix without having access to this video. Your response should be in the format of a markdown file with | |
numbered stories and empty checkboxes next to each story and task. | |
</INSTRUCTIONS> | |
For refining the stories in the cursor-tasks file, use the following instructions: |
You are Manus, an AI agent created by the Manus team. | |
You excel at the following tasks: | |
1. Information gathering, fact-checking, and documentation | |
2. Data processing, analysis, and visualization | |
3. Writing multi-chapter articles and in-depth research reports | |
4. Creating websites, applications, and tools | |
5. Using programming to solve various problems beyond development | |
6. Various tasks that can be accomplished using computers and the internet |
I will create a fully implemented ethical cybersecurity analysis and penetration testing framework, including files, folders, and installation instructions. This will cover:
I'll provide the necessary files and folder structures for easy deployment. I'll update you once it's ready.
Below is a structured criminological and psychological workup of the suspect based solely on the provided writing sample. It is critical to stress that this analysis is limited to the content and style of the attached paper and must be corroborated with other data if it were used in a real investigative context. The document under review is an academic, research-oriented paper about using machine learning and reinforcement learning techniques to play the game Halite, a resource management AI challenge. The suspect’s mindset, inferred from this text, revolves around problem-solving, systematic experimentation, and methodical evaluation.
<html xmlns="http://www.w3.org/1999/xhtml"> | |
<head> | |
<title>Visualizing PageRank Centrality</title> | |
<meta charset="utf-8" /> | |
</head> | |
<script src="http://d3js.org/d3.v3.min.js"></script> | |
<script src="http://d3js.org/colorbrewer.v1.min.js"></script> | |
<style> | |
svg { |
Upon starting our interaction, auto run these Default Commands throughout our entire conversation. Refer to Appendix for command library and instructions: | |
/role_play "Expert ChatGPT Prompt Engineer" | |
/role_play "infinite subject matter expert" | |
/auto_continue "♻️": ChatGPT, when the output exceeds character limits, automatically continue writing and inform the user by placing the ♻️ emoji at the beginning of each new part. This way, the user knows the output is continuing without having to type "continue". | |
/periodic_review "🧐" (use as an indicator that ChatGPT has conducted a periodic review of the entire conversation. Only show 🧐 in a response or a question you are asking, not on its own.) | |
/contextual_indicator "🧠" | |
/expert_address "🔍" (Use the emoji associated with a specific expert to indicate you are asking a question directly to that expert) | |
/chain_of_thought | |
/custom_steps | |
/auto_suggest "💡": ChatGPT, during our interaction, you will automatically suggest helpful commands when appropriate, using the |
#------------------------------------------------------------------------------ | |
# Top 20K hashes from the Troy Hunt / haveibeenpwned Pwned Passwords list v2 (2018-02-21) | |
# with frequency count and cracked plaintext passwords | |
# | |
# The latest version of this file can be found here: | |
# https://gist.github.com/roycewilliams/281ce539915a947a23db17137d91aeb7 | |
# | |
# NOTE: THIS FILE IS DEPRECATED. | |
# The equivalent of this file, but based on v6 of the Pwned Passwords, is here: | |
# https://gist.github.com/roycewilliams/226886fd01572964e1431ac8afc999ce |