Writing quality validation and AI pattern detection. Identify AI-generated patterns, enhance authenticity, and enforce writing standards. Includes writing-validator agent and ai-pattern-detection skill.
A cognitive architecture for AI-augmented software development, providing structured memory, ensemble validation, and closed-loop self-correction for reliable, auditable workflows.
Why this plugin
Turns unpredictable AI assistance into reproducible, governed workflows with audit trails, quality gates, and persistent context, reducing risk and ensuring standards compliance.
Prerequisites
Node.js/npm for global CLI installation. No specific API keys mentioned, but likely integrates with existing AI coding assistants.
/plugin marketplace add jmagly/aiwg/plugin install writing@aiwgComplete collection of battle-tested Claude Code configs from an Anthropic hackathon winner - agents, skills, hooks, and rules evolved over 10+ months of intensive daily use
Upstash Context7 MCP server for up-to-date documentation lookup. Pull version-specific documentation and code examples directly from source repositories into your LLM context.
UI/UX design intelligence. 50 styles, 21 palettes, 50 font pairings, 20 charts, 9 stacks (React, Next.js, Vue, Svelte, SwiftUI, React Native, Flutter, Tailwind, shadcn/ui). Actions: plan, build, create, design, implement, review, fix, improve, optimize, enhance, refactor, check UI/UX code. Projects: website, landing page, dashboard, admin panel, e-commerce, SaaS, portfolio, blog, mobile app, .html, .tsx, .vue, .svelte. Elements: button, modal, navbar, sidebar, card, table, form, chart. Styles: glassmorphism, claymorphism, minimalism, brutalism, neumorphism, bento grid, dark mode, responsive, skeuomorphism, flat design. Topics: color palette, accessibility, animation, layout, typography, font pairing, spacing, hover, shadow, gradient. Integrations: shadcn/ui MCP for component search and examples.
Binary reverse engineering, malware analysis, firmware security, and software protection research for authorized security research, CTF competitions, and defensive security