Code manipulation patterns, engineering protocols, and development methodologies. Defines WHAT code patterns to apply (TDD, Debugging, Refactoring, Security). HOW to execute is defined by execution-core skill. <example> Context: Need to debug code user: "Debug this error" assistant: "I'll apply software-engineering debugging protocols to identify and fix the issue." </example> <example> Context: Code review needed user: "Review my changes" assistant: "I'll use software-engineering code review patterns to assess the changes." </example> <example> Context: TDD workflow user: "Implement with TDD" assistant: "I'll follow software-engineering TDD protocols (Red-Green-Refactor)." </example>
/plugin marketplace add Git-Fg/thecattoolkit/plugin install git-fg-builder-plugins-builder@Git-Fg/thecattoolkitThis skill is limited to using the following tools:
references/code-review.mdreferences/debug.mdreferences/prototype.mdreferences/refactor.mdreferences/refactoring-patterns.mdreferences/security-audit.mdreferences/security-checklist.mdreferences/tdd-protocol.mdreferences/test-driven-development.mdreferences/testing.mdThis skill defines WHAT code patterns and engineering methodologies to apply.
It answers: "What protocols should I use for debugging, testing, refactoring?" (not "How to execute them").
HOW to execute (Uninterrupted Flow, Self-Verification, Handoffs) is defined by execution-core skill.
Engineering Protocols:
references/debug.md - Systematic debugging (6-phase protocol)references/code-review.md - Code review workflowreferences/refactor.md - Refactoring methodologyreferences/security-audit.md - Security assessment workflowreferences/security-checklist.md - OWASP Top 10 and safety protocolsreferences/test-driven-development.md - TDD Red-Green-Refactor workflowreferences/tdd-protocol.md - TDD methodology and iron lawreferences/testing.md - Testing implementation workflowreferences/prototype.md - Draft-then-harden workflowreferences/refactoring-patterns.md - Code smells and SOLID principlesBEFORE executing ANY workflow in this skill that involves MODIFYING code, you MUST read:
references/security-checklist.md - OWASP Top 10, security vulnerabilities, and safety protocols
For READ-ONLY workflows (review, analyze), security checklist is recommended but not mandatory.
WHY: Engineering workflows that modify code can introduce security vulnerabilities, data corruption, or system instability. The security checklist contains non-negotiable safety protocols.
EXECUTION RULE: Read foundational knowledge IMMEDIATELY upon workflow invocation. For modification workflows, this is non-negotiable.
references/debug.md - The 6-Phase Debug Protocolreferences/code-review.md - PR Review Workflowreferences/refactor.md - Refactoring Workflowreferences/refactoring-patterns.md - Code smells and SOLID principlesreferences/security-audit.md - Security Assessment Workflowreferences/security-checklist.md - OWASP Top 10 focus areasreferences/test-driven-development.md - Red-Green-Refactor Workflowreferences/tdd-protocol.md - The Iron Law and methodologyreferences/testing.md - Testing Implementation Workflowreferences/prototype.md - Draft-then-Harden WorkflowThis skill defines WHAT engineering patterns to apply. HOW to execute is in execution-core:
Example Integration:
When debugging:
references/debug.md 6-phase protocol (software-engineering)When doing TDD:
references/test-driven-development.md Red-Green-Refactor cycle (software-engineering)execution-core (HOW to behave)
↓
software-engineering (WHAT patterns to apply)
↓
director/worker agents (Execute using these standards)
When orchestrating engineering work:
Use software-engineering protocols to define:
- Debugging approach for complex errors
- TDD cycle for feature implementation
- Security audit checklist for sensitive changes
- Code review standards for quality
Execute using execution-core behavioral standards:
- Uninterrupted Flow during implementation
- Self-Verification after each change
- Handoff for blockers
When executing engineering tasks:
Apply software-engineering protocols:
1. Read relevant reference file (debug.md, tdd-protocol.md, etc.)
2. Follow the methodology step-by-step
3. Execute in Uninterrupted Flow (execution-core)
4. Verify changes programmatically (execution-core)
5. Create HANDOFF.md if blocked (execution-core)
When users request engineering work:
Route to appropriate software-engineering protocol:
- /debug → references/debug.md
- /tdd → references/test-driven-development.md
- /review → references/code-review.md
- /refactor → references/refactor.md
- /security-audit → references/security-audit.md
Delegate to worker agent with:
- Engineering protocol to follow (software-engineering)
- Behavioral standards to use (execution-core)
New Feature Development:
references/test-driven-development.md (TDD)references/testing.md for test implementationreferences/security-checklist.md throughoutBug Fixes:
references/debug.md (6-phase debugging)references/testing.md to prevent regressionsreferences/security-checklist.md if security-relatedCode Quality:
references/code-review.md for PRsreferences/refactor.md for improvementsreferences/refactoring-patterns.md for specific patternsSecurity Work:
references/security-checklist.md (mandatory read)references/security-audit.md for assessmentsreferences/testing.md to verify fixesExploration:
references/prototype.md for complex problemsCreating algorithmic art using p5.js with seeded randomness and interactive parameter exploration. Use this when users request creating art using code, generative art, algorithmic art, flow fields, or particle systems. Create original algorithmic art rather than copying existing artists' work to avoid copyright violations.
Applies Anthropic's official brand colors and typography to any sort of artifact that may benefit from having Anthropic's look-and-feel. Use it when brand colors or style guidelines, visual formatting, or company design standards apply.
Create beautiful visual art in .png and .pdf documents using design philosophy. You should use this skill when the user asks to create a poster, piece of art, design, or other static piece. Create original visual designs, never copying existing artists' work to avoid copyright violations.