From context-firewall
This skill should be used when the user asks to "analyze a large log", "summarize a big file", "read the whole repository", "process long tool output", "avoid context window overflow", "use sub-agents for preprocessing", "add evidence with line numbers", "verify claims with locators", or mentions "TaskSpec", "SubResult", "Evidence Contract", "Context Firewall", "Map-Reduce", "FileWorker", "Aggregator", "Critic".
npx claudepluginhub lollipopkit/cc-plugins --plugin context-firewallThis skill uses the workspace's default tool permissions.
Implement a **Context Firewall** workflow to prevent the master context from being flooded by large inputs.
Guides Next.js Cache Components and Partial Prerendering (PPR) with cacheComponents enabled. Implements 'use cache', cacheLife(), cacheTag(), revalidateTag(), static/dynamic optimization, and cache debugging.
Guides building MCP servers enabling LLMs to interact with external services via tools. Covers best practices, TypeScript/Node (MCP SDK), Python (FastMCP).
Generates original PNG/PDF visual art via design philosophy manifestos for posters, graphics, and static designs on user request.
Implement a Context Firewall workflow to prevent the master context from being flooded by large inputs.
Route large inputs (big files, logs, PDFs/images, long MCP/tool outputs) through sub-agents that produce compressed, auditable results. Only pass back:
Prefer this workflow when any of the following is true:
For every meaningful claim:
evidence item.Locator preference order:
line_range (default)symbol_range (functions/classes)tool_call (tool-derived facts; include args hash and rerun hint when safe)byte_range/json_path/stack_signature (define, but treat as harder to verify in v1)Keep quotes short:
quote_max_chars constraint.Create a TaskSpec.v1 that is explicit about:
Prefer using the command:
/cf-spec to generate a schema-valid template.Use /cf-run to:
cf-fileworker on each shard in parallelcf-aggregator into a final SubResult.v1Hard requirements for sub-agents:
Use /cf-verify to sample-check claims:
risk_level.VerifyReport.v1.If verification fails:
must_cover.cf-critic to independently review.Always include a coverage section that declares:
Never:
Default thresholds are configurable in:
.claude/context-firewall.local.mdDefaults:
read_warn_bytes: 524288tool_output_warn_chars: 20000sample_rate: {low:0.05, medium:0.15, high:0.30}plugins/context-firewall/commands/cf-spec.mdplugins/context-firewall/commands/cf-run.mdplugins/context-firewall/commands/cf-verify.mdplugins/context-firewall/agents/cf-fileworker.mdplugins/context-firewall/agents/cf-aggregator.mdplugins/context-firewall/agents/cf-critic.mdplugins/context-firewall/schemas/task-spec.v1.schema.jsonplugins/context-firewall/schemas/sub-result.v1.schema.jsonplugins/context-firewall/schemas/verify-report.v1.schema.jsonplugins/context-firewall/schemas/settings.v1.schema.jsonplugins/context-firewall/scripts/settings-frontmatter.md