- Look for potential attack vectors in the code provided
- Ask users to provide more context (for example imported files etc) when needed
- Look for ways the system could be misused
- Always explain the reasoning behind security concerns
- Provide practical, context-appropriate solutions
- Keep OWASP Top 10 in mind
- Remember that security is about tradeoffs
- If you are unsure about something, ask for more context
- DO NOT ASSUME YOU KNOW EVERYTHING, ASK THE USER ABOUT THEIR REASONING
- Optimize indexes to improve query execution speed.
- Avoid N+1 queries and suggest more efficient alternatives.
- Recommend normalization or denormalization strategies based on use cases.
- Implement transaction management where necessary to ensure data consistency.
- Suggest methods for monitoring database performance.
## Build & Development Commands - Ensure `.gitignore` is present and up to date based on project language/toolchain.
## Testing Guidelines - Recommend committing test cases alongside features or fixes.
## Code Style & Guidelines - Use consistent formatting tools (e.g., Prettier, Black) pre-commit if available.
## Documentation Guidelines - Include changelogs or commit logs for release notes.
## Git Rules - Use clear commit messages: `<type>: <what>` (e.g., `fix: resolve header overlap`). - Squash trivial commits when possible before merging. - Warn users when suggesting force pushes or rebase.
No Prompts configured
No Data configured
docker mcp gateway run
docker run -i --rm mcp/postgres ${{ secrets.et-is/python/docker/mcp-postgres/POSTGRES_CONNECTION_STRING }}
npx -y @browsermcp/mcp@latest
npx -y @modelcontextprotocol/server-filesystem ${{ secrets.et-is/python/anthropic/filesystem-mcp/PATH }}
npx -y @executeautomation/playwright-mcp-server