The Free Social Platform forAI Prompts
Prompts are the foundation of all generative AI. Share, discover, and collect them from the community. Free and open source — self-host with complete privacy.
or explore by industry
Click to explore
Sponsored by
Support CommunityLoved by AI Pioneers
Greg Brockman
President & Co-Founder at OpenAI · Dec 12, 2022
“Love the community explorations of ChatGPT, from capabilities (https://github.com/f/prompts.chat) to limitations (...). No substitute for the collective power of the internet when it comes to plumbing the uncharted depths of a new deep learning model.”
Wojciech Zaremba
Co-Founder at OpenAI · Dec 10, 2022
“I love it! https://github.com/f/prompts.chat”
Clement Delangue
CEO at Hugging Face · Sep 3, 2024
“Keep up the great work!”
Thomas Dohmke
Former CEO at GitHub · Feb 5, 2025
“You can now pass prompts to Copilot Chat via URL. This means OSS maintainers can embed buttons in READMEs, with pre-defined prompts that are useful to their projects. It also means you can bookmark useful prompts and save them for reuse → less context-switching ✨ Bonus: @fkadev added it already to prompts.chat 🚀”
Featured Prompts

Create an ultra-realistic cinematic portrait image using specific visual elements like dramatic lighting, sharp focus, and high resolution. Customize aspects such as gender, hair style, and clothing to achieve a unique and detailed composition.
Ultra realistic cinematic portrait of a referance photo, centered composition, head and shoulders framing, direct eye contact, serious neutral expression, short slightly messy dark hair, light stubble beard, wearing a black shirt and black textured jacket with zipper details, dramatic red rim lighting from both sides, soft frontal key light, deep black background, high contrast, low-key lighting, sharp focus, 85mm lens, shallow depth of field, studio photography, ultra detailed skin texture, 8k resolution
[00:00 - 00:03] Hyper-realistic 8K 3D human heart anatomy, beating slowly, detailed muscle texture with coronary arteries, Golden Hour Cinematic lighting, fisheye distortion effect, 35mm storytelling lens, professional medical infographic style, blurred futuristic laboratory background. --ar 9:16 [00:03 - 00:06] Extreme close-up of heart anatomy, dramatic golden hour lighting, 35mm fisheye lens distortion, hyper-realistic biological textures, cinematic 8K, 9:16 vertical composition. --ar 9:16
[00:00 - 00:02] [Extreme close-up] of Komar's face, an 18-year-old Indonesian teenage boy, short hair, wearing black-framed glasses with minus lenses reflecting the light of a desk lamp. A very meticulous and focused expression. Warm lighting from a desk lamp, cinematic_bokeh, volumetric_lighting, [8k resolution], [ultra-realistic skin texture]. [00:02 - 00:04] macro_shot of the hands of Komar, an 18-year-old Indonesian teenage boy, wearing a dark blue short-sleeved t-shirt, assembling a miniature Indonesian train locomotive using tweezers. Precise plastic miniature texture details, dramatic side lighting, [50mm] lens, [f/2.8], professional_studio_lighting, intricate mechanical details. [00:04 - 00:06] medium_shot Komar, an 18-year-old Indonesian man with short hair, wearing black-framed glasses with minus lenses, wearing a plain navy blue short-sleeved t-shirt with a regular fit. Sitting at a wooden workbench filled with model kit equipment. Warm atmosphere, dust_motes visible in light beams, cinematic_color_grading, soft_shadows.
A structured expert-role prompt designed to make an AI perform a comprehensive, clinically reasoned evaluation of a medical laboratory report. It enforces specialist-level analysis, standardized output formatting, risk prioritization, preventive health focus, and actionable recommendations, while communicating findings in clear patient-friendly language.
You are a senior physician with 20+ years of clinical experience in preventive medicine and laboratory interpretation. Analyze the attached health report comprehensively and clinically. Provide output in the following structured format: 1. Overall Health Summary 2. Parameters Within Optimal Range (explain why good) 3. Parameters Outside Normal Range - Normal range - Patient value - Clinical interpretation - Risk level (low / moderate / high) 4. Early Warning Patterns or System-Level Insights 5. Action Plan - Lifestyle correction - Nutrition - Monitoring frequency - When medical consultation is required 6. Symptoms Patient Should Monitor 7. Long-Term Risk if Unchanged Use clear patient-friendly language while maintaining clinical accuracy. Prioritize preventive health insights.
Cinematic vertical smartphone video, portrait orientation, centered composition with strong top and bottom headroom. Elegant Piña Colada cocktail inside a coconut shell glass placed in the middle of a tall frame. Clean marble bar surface only in lower third, soft tropical daylight, palm leaf shadows moving gently across background. Slow creamy Piña Colada pour with visible thick texture and condensation. Camera performs slow vertical push-in macro movement, shallow depth of field, luxury beverage commercial style, minimal aesthetic, portrait framing, vertical composition, tall frame, 9:16 aspect ratio, no text.

Create a dramatic digital painting that captures the solitary moment of a figure in a snowy landscape, featuring a high-contrast scene with a house engulfed in flames. This prompt guides you to depict a mysterious and melancholic atmosphere with cinematic influences, using deep blues and vibrant reds against the stark white snow.
1{2 "colors": {3 "color_temperature": "cool",...+76 more lines

Create a minimalist vector illustration of a man fishing on the back of a giant whale, emphasizing themes of scale and obliviousness. This prompt explores the use of negative space and symbolism, ideal for conceptual art projects and training models in visual storytelling.
1{2 "colors": {3 "color_temperature": "cool",...+75 more lines
A structural blueprint generator for new podcasts. It designs a unique episode format, segments, and a comprehensive audio branding strategy (intro/outro, stingers, sound beds) tailored to your specific niche.
I want you to act as a Senior Podcast Producer and Audio Branding Expert. I will provide you with a target niche, the host's background, and the desired vibe of the show. Your goal is to construct a unique, repeatable podcast format and a distinct sonic identity. For this request, you must provide: 1) **The Episode Blueprint:** A strict timeline breakdown (e.g., 00:00-02:00 Cold Open, 02:00-03:30 Intro/Theme, etc.) for a standard episode. 2) **Signature Segments:** 2 unique, recurring mini-segments (e.g., a rapid-fire question round or a specific interactive game) that differentiate this show from competitors. 3) **Audio Branding Strategy:** Specific directives for the sound design. Detail the instrumentation and tempo for the main theme music, the style of transition stingers, and the ambient beds to be used during deep conversations. 4) **Studio & Gear Philosophy:** 1 essential piece of advice regarding the acoustic environment or signal chain to capture the exact 'vibe' requested. 5) **Title & Hook:** 3 creative podcast name ideas and a compelling 2-sentence pitch for Apple Podcasts/Spotify. Do not break character. Be pragmatic, highly structured, and focus on professional production standards. Target Niche: Target_Niche Host Background: Host_Background Desired Vibe: Desired_Vibe
A strategic blueprint generator for solo founders and "vibecoders". It turns a raw app idea into a concrete MVP plan, detailing the core user loop, AI integration strategy, tech stack, and the exact starting prompt for AI coding assistants.
I want you to act as a Micro-SaaS 'Vibecoder' Architect and Senior Product Manager. I will provide you with a problem I want to solve, my target user, and my preferred AI coding environment. Your goal is to map out a clear, actionable blueprint for building an AI-powered MVP. For this request, you must provide: 1) **The Core Loop:** A step-by-step breakdown of the single most important user journey (The 'Aha' Moment). 2) **AI Integration Strategy:** Specifically how LLMs or AI APIs should be utilized (e.g., prompt chaining, RAG, direct API calls) to solve the core problem efficiently. 3) **The 'Vibecoder' Tech Stack:** Recommend the fastest path to deployment (frontend, backend, database, and hosting) suited for rapid AI-assisted coding. 4) **MVP Scope Reduction:** Identify 3 features that founders usually build first but must be EXCLUDED from this MVP to launch faster. 5) **The Kickoff Prompt:** Write the exact, highly detailed prompt I should paste into my AI coding assistant to generate the foundational boilerplate for this app. Do not break character. Be highly technical but ruthlessly focused on shipping fast. Problem to Solve: Problem_to_Solve Target User: Target_User Preferred AI Coding Tool: Cursor, v0, Lovable, Bolt.new, etc.
Today's Most Upvoted
A 300+ checkpoint exhaustive code review protocol for TypeScript applications and NPM packages. Covers type safety violations, security vulnerabilities, performance bottlenecks, dead code detection, dependency health analysis, edge case coverage, memory leaks, race conditions, and architectural anti-patterns. Zero-tolerance approach to production bugs.
# COMPREHENSIVE TYPESCRIPT CODEBASE REVIEW You are an expert TypeScript code reviewer with 20+ years of experience in enterprise software development, security auditing, and performance optimization. Your task is to perform an exhaustive, forensic-level analysis of the provided TypeScript codebase. ## REVIEW PHILOSOPHY - Assume nothing is correct until proven otherwise - Every line of code is a potential source of bugs - Every dependency is a potential security risk - Every function is a potential performance bottleneck - Every type is potentially incorrect or incomplete --- ## 1. TYPE SYSTEM ANALYSIS ### 1.1 Type Safety Violations - [ ] Identify ALL uses of `any` type - each one is a potential bug - [ ] Find implicit `any` types (noImplicitAny violations) - [ ] Detect `as` type assertions that could fail at runtime - [ ] Find `!` non-null assertions that assume values exist - [ ] Identify `@ts-ignore` and `@ts-expect-error` comments - [ ] Check for `@ts-nocheck` files - [ ] Find type predicates (`is` functions) that could return incorrect results - [ ] Detect unsafe type narrowing assumptions - [ ] Identify places where `unknown` should be used instead of `any` - [ ] Find generic types without proper constraints (`<T>` vs `<T extends Base>`) ### 1.2 Type Definition Quality - [ ] Verify all interfaces have proper readonly modifiers where applicable - [ ] Check for missing optional markers (`?`) on nullable properties - [ ] Identify overly permissive union types (`string | number | boolean | null | undefined`) - [ ] Find types that should be discriminated unions but aren't - [ ] Detect missing index signatures on dynamic objects - [ ] Check for proper use of `never` type in exhaustive checks - [ ] Identify branded/nominal types that should exist but don't - [ ] Verify utility types are used correctly (Partial, Required, Pick, Omit, etc.) - [ ] Find places where template literal types could improve type safety - [ ] Check for proper variance annotations (in/out) where needed ### 1.3 Generic Type Issues - [ ] Identify generic functions without proper constraints - [ ] Find generic type parameters that are never used - [ ] Detect overly complex generic signatures that could be simplified - [ ] Check for proper covariance/contravariance handling - [ ] Find generic defaults that might cause issues - [ ] Identify places where conditional types could cause distribution issues --- ## 2. NULL/UNDEFINED HANDLING ### 2.1 Null Safety - [ ] Find ALL places where null/undefined could occur but aren't handled - [ ] Identify optional chaining (`?.`) that should have fallback values - [ ] Detect nullish coalescing (`??`) with incorrect fallback types - [ ] Find array access without bounds checking (`arr[i]` without validation) - [ ] Identify object property access on potentially undefined objects - [ ] Check for proper handling of `Map.get()` return values (undefined) - [ ] Find `JSON.parse()` calls without null checks - [ ] Detect `document.querySelector()` without null handling - [ ] Identify `Array.find()` results used without undefined checks - [ ] Check for proper handling of `WeakMap`/`WeakSet` operations ### 2.2 Undefined Behavior - [ ] Find uninitialized variables that could be undefined - [ ] Identify class properties without initializers or definite assignment - [ ] Detect destructuring without default values on optional properties - [ ] Find function parameters without default values that could be undefined - [ ] Check for array/object spread on potentially undefined values - [ ] Identify `delete` operations that could cause undefined access later --- ## 3. ERROR HANDLING ANALYSIS ### 3.1 Exception Handling - [ ] Find try-catch blocks that swallow errors silently - [ ] Identify catch blocks with empty bodies or just `console.log` - [ ] Detect catch blocks that don't preserve stack traces - [ ] Find rethrown errors that lose original error information - [ ] Identify async functions without proper error boundaries - [ ] Check for Promise chains without `.catch()` handlers - [ ] Find `Promise.all()` without proper error handling strategy - [ ] Detect unhandled promise rejections - [ ] Identify error messages that leak sensitive information - [ ] Check for proper error typing (`unknown` vs `any` in catch) ### 3.2 Error Recovery - [ ] Find operations that should retry but don't - [ ] Identify missing circuit breaker patterns for external calls - [ ] Detect missing timeout handling for async operations - [ ] Check for proper cleanup in error scenarios (finally blocks) - [ ] Find resource leaks when errors occur - [ ] Identify missing rollback logic for multi-step operations - [ ] Check for proper error propagation in event handlers ### 3.3 Validation Errors - [ ] Find input validation that throws instead of returning Result types - [ ] Identify validation errors without proper error codes - [ ] Detect missing validation error aggregation (showing all errors at once) - [ ] Check for validation bypass possibilities --- ## 4. ASYNC/AWAIT & CONCURRENCY ### 4.1 Promise Issues - [ ] Find `async` functions that don't actually await anything - [ ] Identify missing `await` keywords (floating promises) - [ ] Detect `await` inside loops that should be `Promise.all()` - [ ] Find race conditions in concurrent operations - [ ] Identify Promise constructor anti-patterns - [ ] Check for proper Promise.allSettled usage where appropriate - [ ] Find sequential awaits that could be parallelized - [ ] Detect Promise chains mixed with async/await inconsistently - [ ] Identify callback-based APIs that should be promisified - [ ] Check for proper AbortController usage for cancellation ### 4.2 Concurrency Bugs - [ ] Find shared mutable state accessed by concurrent operations - [ ] Identify missing locks/mutexes for critical sections - [ ] Detect time-of-check to time-of-use (TOCTOU) vulnerabilities - [ ] Find event handler race conditions - [ ] Identify state updates that could interleave incorrectly - [ ] Check for proper handling of concurrent API calls - [ ] Find debounce/throttle missing on rapid-fire events - [ ] Detect missing request deduplication ### 4.3 Memory & Resource Management - [ ] Find EventListener additions without corresponding removals - [ ] Identify setInterval/setTimeout without cleanup - [ ] Detect subscription leaks (RxJS, EventEmitter, etc.) - [ ] Find WebSocket connections without proper close handling - [ ] Identify file handles/streams not being closed - [ ] Check for proper AbortController cleanup - [ ] Find database connections not being released to pool - [ ] Detect memory leaks from closures holding references --- ## 5. SECURITY VULNERABILITIES ### 5.1 Injection Attacks - [ ] Find SQL queries built with string concatenation - [ ] Identify command injection vulnerabilities (exec, spawn with user input) - [ ] Detect XSS vulnerabilities (innerHTML, dangerouslySetInnerHTML) - [ ] Find template injection vulnerabilities - [ ] Identify LDAP injection possibilities - [ ] Check for NoSQL injection vulnerabilities - [ ] Find regex injection (ReDoS) vulnerabilities - [ ] Detect path traversal vulnerabilities - [ ] Identify header injection vulnerabilities - [ ] Check for log injection possibilities ### 5.2 Authentication & Authorization - [ ] Find hardcoded credentials, API keys, or secrets - [ ] Identify missing authentication checks on protected routes - [ ] Detect authorization bypass possibilities (IDOR) - [ ] Find session management issues - [ ] Identify JWT implementation flaws - [ ] Check for proper password hashing (bcrypt, argon2) - [ ] Find timing attacks in comparison operations - [ ] Detect privilege escalation possibilities - [ ] Identify missing CSRF protection - [ ] Check for proper OAuth implementation ### 5.3 Data Security - [ ] Find sensitive data logged or exposed in errors - [ ] Identify PII stored without encryption - [ ] Detect insecure random number generation - [ ] Find sensitive data in URLs or query parameters - [ ] Identify missing input sanitization - [ ] Check for proper Content Security Policy - [ ] Find insecure cookie settings (missing HttpOnly, Secure, SameSite) - [ ] Detect sensitive data in localStorage/sessionStorage - [ ] Identify missing rate limiting - [ ] Check for proper CORS configuration ### 5.4 Dependency Security - [ ] Run `npm audit` and analyze all vulnerabilities - [ ] Check for dependencies with known CVEs - [ ] Identify abandoned/unmaintained dependencies - [ ] Find dependencies with suspicious post-install scripts - [ ] Check for typosquatting risks in dependency names - [ ] Identify dependencies pulling from non-registry sources - [ ] Find circular dependencies - [ ] Check for dependency version inconsistencies --- ## 6. PERFORMANCE ANALYSIS ### 6.1 Algorithmic Complexity - [ ] Find O(n²) or worse algorithms that could be optimized - [ ] Identify nested loops that could be flattened - [ ] Detect repeated array/object iterations that could be combined - [ ] Find linear searches that should use Map/Set for O(1) lookup - [ ] Identify sorting operations that could be avoided - [ ] Check for unnecessary array copying (slice, spread, concat) - [ ] Find recursive functions without memoization - [ ] Detect expensive operations inside hot loops ### 6.2 Memory Performance - [ ] Find large object creation in loops - [ ] Identify string concatenation in loops (should use array.join) - [ ] Detect array pre-allocation opportunities - [ ] Find unnecessary object spreading creating copies - [ ] Identify large arrays that could use generators/iterators - [ ] Check for proper use of WeakMap/WeakSet for caching - [ ] Find closures capturing more than necessary - [ ] Detect potential memory leaks from circular references ### 6.3 Runtime Performance - [ ] Find synchronous file operations (fs.readFileSync in hot paths) - [ ] Identify blocking operations in event handlers - [ ] Detect missing lazy loading opportunities - [ ] Find expensive computations that should be cached - [ ] Identify unnecessary re-renders in React components - [ ] Check for proper use of useMemo/useCallback - [ ] Find missing virtualization for large lists - [ ] Detect unnecessary DOM manipulations ### 6.4 Network Performance - [ ] Find missing request batching opportunities - [ ] Identify unnecessary API calls that could be cached - [ ] Detect missing pagination for large data sets - [ ] Find oversized payloads that should be compressed - [ ] Identify N+1 query problems - [ ] Check for proper use of HTTP caching headers - [ ] Find missing prefetching opportunities - [ ] Detect unnecessary polling that could use WebSockets --- ## 7. CODE QUALITY ISSUES ### 7.1 Dead Code Detection - [ ] Find unused exports - [ ] Identify unreachable code after return/throw/break - [ ] Detect unused function parameters - [ ] Find unused private class members - [ ] Identify unused imports - [ ] Check for commented-out code blocks - [ ] Find unused type definitions - [ ] Detect feature flags for removed features - [ ] Identify unused configuration options - [ ] Find orphaned test utilities ### 7.2 Code Duplication - [ ] Find duplicate function implementations - [ ] Identify copy-pasted code blocks with minor variations - [ ] Detect similar logic that could be abstracted - [ ] Find duplicate type definitions - [ ] Identify repeated validation logic - [ ] Check for duplicate error handling patterns - [ ] Find similar API calls that could be generalized - [ ] Detect duplicate constants across files ### 7.3 Code Smells - [ ] Find functions with too many parameters (>4) - [ ] Identify functions longer than 50 lines - [ ] Detect files larger than 500 lines - [ ] Find deeply nested conditionals (>3 levels) - [ ] Identify god classes/modules with too many responsibilities - [ ] Check for feature envy (excessive use of other class's data) - [ ] Find inappropriate intimacy between modules - [ ] Detect primitive obsession (should use value objects) - [ ] Identify data clumps (groups of data that appear together) - [ ] Find speculative generality (unused abstractions) ### 7.4 Naming Issues - [ ] Find misleading variable/function names - [ ] Identify inconsistent naming conventions - [ ] Detect single-letter variable names (except loop counters) - [ ] Find abbreviations that reduce readability - [ ] Identify boolean variables without is/has/should prefix - [ ] Check for function names that don't describe their side effects - [ ] Find generic names (data, info, item, thing) - [ ] Detect names that shadow outer scope variables --- ## 8. ARCHITECTURE & DESIGN ### 8.1 SOLID Principles Violations - [ ] **Single Responsibility**: Find classes/modules doing too much - [ ] **Open/Closed**: Find code that requires modification for extension - [ ] **Liskov Substitution**: Find subtypes that break parent contracts - [ ] **Interface Segregation**: Find fat interfaces that should be split - [ ] **Dependency Inversion**: Find high-level modules depending on low-level details ### 8.2 Design Pattern Issues - [ ] Find singletons that create testing difficulties - [ ] Identify missing factory patterns for object creation - [ ] Detect strategy pattern opportunities - [ ] Find observer pattern implementations that could leak memory - [ ] Identify places where dependency injection is missing - [ ] Check for proper repository pattern implementation - [ ] Find command/query responsibility segregation violations - [ ] Detect missing adapter patterns for external dependencies ### 8.3 Module Structure - [ ] Find circular dependencies between modules - [ ] Identify improper layering (UI calling data layer directly) - [ ] Detect barrel exports that cause bundle bloat - [ ] Find index.ts files that re-export too much - [ ] Identify missing module boundaries - [ ] Check for proper separation of concerns - [ ] Find shared mutable state between modules - [ ] Detect improper coupling between features --- ## 9. DEPENDENCY ANALYSIS ### 9.1 Version Analysis - [ ] List ALL outdated dependencies with current vs latest versions - [ ] Identify dependencies with breaking changes available - [ ] Find deprecated dependencies that need replacement - [ ] Check for peer dependency conflicts - [ ] Identify duplicate dependencies at different versions - [ ] Find dependencies that should be devDependencies - [ ] Check for missing dependencies (used but not in package.json) - [ ] Identify phantom dependencies (using transitive deps directly) ### 9.2 Dependency Health - [ ] Check last publish date for each dependency - [ ] Identify dependencies with declining download trends - [ ] Find dependencies with open critical issues - [ ] Check for dependencies with no TypeScript support - [ ] Identify heavy dependencies that could be replaced with lighter alternatives - [ ] Find dependencies with restrictive licenses - [ ] Check for dependencies with poor bus factor (single maintainer) - [ ] Identify dependencies that could be removed entirely ### 9.3 Bundle Analysis - [ ] Identify dependencies contributing most to bundle size - [ ] Find dependencies that don't support tree-shaking - [ ] Detect unnecessary polyfills for supported browsers - [ ] Check for duplicate packages in bundle - [ ] Identify opportunities for code splitting - [ ] Find dynamic imports that could be static - [ ] Check for proper externalization of peer dependencies - [ ] Detect development-only code in production bundle --- ## 10. TESTING GAPS ### 10.1 Coverage Analysis - [ ] Identify untested public functions - [ ] Find untested error paths - [ ] Detect untested edge cases in conditionals - [ ] Check for missing boundary value tests - [ ] Identify untested async error scenarios - [ ] Find untested input validation paths - [ ] Check for missing integration tests - [ ] Identify critical paths without E2E tests ### 10.2 Test Quality - [ ] Find tests that don't actually assert anything meaningful - [ ] Identify flaky tests (timing-dependent, order-dependent) - [ ] Detect tests with excessive mocking hiding bugs - [ ] Find tests that test implementation instead of behavior - [ ] Identify tests with shared mutable state - [ ] Check for proper test isolation - [ ] Find tests that could be data-driven/parameterized - [ ] Detect missing negative test cases ### 10.3 Test Maintenance - [ ] Find orphaned test utilities - [ ] Identify outdated test fixtures - [ ] Detect tests for removed functionality - [ ] Check for proper test organization - [ ] Find slow tests that could be optimized - [ ] Identify tests that need better descriptions - [ ] Check for proper use of beforeEach/afterEach cleanup --- ## 11. CONFIGURATION & ENVIRONMENT ### 11.1 TypeScript Configuration - [ ] Check `strict` mode is enabled - [ ] Verify `noImplicitAny` is true - [ ] Check `strictNullChecks` is true - [ ] Verify `noUncheckedIndexedAccess` is considered - [ ] Check `exactOptionalPropertyTypes` is considered - [ ] Verify `noImplicitReturns` is true - [ ] Check `noFallthroughCasesInSwitch` is true - [ ] Verify target/module settings are appropriate - [ ] Check paths/baseUrl configuration is correct - [ ] Verify skipLibCheck isn't hiding type errors ### 11.2 Build Configuration - [ ] Check for proper source maps configuration - [ ] Verify minification settings - [ ] Check for proper tree-shaking configuration - [ ] Verify environment variable handling - [ ] Check for proper output directory configuration - [ ] Verify declaration file generation - [ ] Check for proper module resolution settings ### 11.3 Environment Handling - [ ] Find hardcoded environment-specific values - [ ] Identify missing environment variable validation - [ ] Detect improper fallback values for missing env vars - [ ] Check for proper .env file handling - [ ] Find environment variables without types - [ ] Identify sensitive values not using secrets management - [ ] Check for proper environment-specific configuration --- ## 12. DOCUMENTATION GAPS ### 12.1 Code Documentation - [ ] Find public APIs without JSDoc comments - [ ] Identify functions with complex logic but no explanation - [ ] Detect missing parameter descriptions - [ ] Find missing return type documentation - [ ] Identify missing @throws documentation - [ ] Check for outdated comments - [ ] Find TODO/FIXME/HACK comments that need addressing - [ ] Identify magic numbers without explanation ### 12.2 API Documentation - [ ] Find missing README documentation - [ ] Identify missing usage examples - [ ] Detect missing API reference documentation - [ ] Check for missing changelog entries - [ ] Find missing migration guides for breaking changes - [ ] Identify missing contribution guidelines - [ ] Check for missing license information --- ## 13. EDGE CASES CHECKLIST ### 13.1 Input Edge Cases - [ ] Empty strings, arrays, objects - [ ] Extremely large numbers (Number.MAX_SAFE_INTEGER) - [ ] Negative numbers where positive expected - [ ] Zero values - [ ] NaN and Infinity - [ ] Unicode characters and emoji - [ ] Very long strings (>1MB) - [ ] Deeply nested objects - [ ] Circular references - [ ] Prototype pollution attempts ### 13.2 Timing Edge Cases - [ ] Leap years and daylight saving time - [ ] Timezone handling - [ ] Date boundary conditions (month end, year end) - [ ] Very old dates (before 1970) - [ ] Very future dates - [ ] Invalid date strings - [ ] Timestamp precision issues ### 13.3 State Edge Cases - [ ] Initial state before any operation - [ ] State after multiple rapid operations - [ ] State during concurrent modifications - [ ] State after error recovery - [ ] State after partial failures - [ ] Stale state from caching --- ## OUTPUT FORMAT For each issue found, provide: ### [SEVERITY: CRITICAL/HIGH/MEDIUM/LOW] Issue Title **Category**: [Type System/Security/Performance/etc.] **File**: path/to/file.ts **Line**: 123-145 **Impact**: Description of what could go wrong **Current Code**: ```typescript // problematic code ``` **Problem**: Detailed explanation of why this is an issue **Recommendation**: ```typescript // fixed code ``` **References**: Links to documentation, CVEs, best practices --- ## PRIORITY MATRIX 1. **CRITICAL** (Fix Immediately): - Security vulnerabilities - Data loss risks - Production-breaking bugs 2. **HIGH** (Fix This Sprint): - Type safety violations - Memory leaks - Performance bottlenecks 3. **MEDIUM** (Fix Soon): - Code quality issues - Test coverage gaps - Documentation gaps 4. **LOW** (Tech Debt): - Style inconsistencies - Minor optimizations - Nice-to-have improvements --- ## FINAL SUMMARY After completing the review, provide: 1. **Executive Summary**: 2-3 paragraphs overview 2. **Risk Assessment**: Overall risk level with justification 3. **Top 10 Critical Issues**: Prioritized list 4. **Recommended Action Plan**: Phased approach to fixes 5. **Estimated Effort**: Time estimates for remediation 6. **Metrics**: - Total issues found by severity - Code health score (1-10) - Security score (1-10) - Maintainability score (1-10)
Latest Prompts
A structured prompt for performing a comprehensive security audit on Python code. Follows a scan-first, report-then-fix flow with OWASP Top 10 mapping, exploit explanations, industry-standard severity ratings, advisory flags for non-code issues, a fully hardened code rewrite, and a before/after security score card.
You are a senior Python security engineer and ethical hacker with deep expertise in application security, OWASP Top 10, secure coding practices, and Python 3.10+ secure development standards. Preserve the original functional behaviour unless the behaviour itself is insecure. I will provide you with a Python code snippet. Perform a full security audit using the following structured flow: --- 🔍 STEP 1 — Code Intelligence Scan Before auditing, confirm your understanding of the code: - 📌 Code Purpose: What this code appears to do - 🔗 Entry Points: Identified inputs, endpoints, user-facing surfaces, or trust boundaries - 💾 Data Handling: How data is received, validated, processed, and stored - 🔌 External Interactions: DB calls, API calls, file system, subprocess, env vars - 🎯 Audit Focus Areas: Based on the above, where security risk is most likely to appear Flag any ambiguities before proceeding. --- 🚨 STEP 2 — Vulnerability Report List every vulnerability found using this format: | # | Vulnerability | OWASP Category | Location | Severity | How It Could Be Exploited | |---|--------------|----------------|----------|----------|--------------------------| Severity Levels (industry standard): - 🔴 [Critical] — Immediate exploitation risk, severe damage potential - 🟠 [High] — Serious risk, exploitable with moderate effort - 🟡 [Medium] — Exploitable under specific conditions - 🔵 [Low] — Minor risk, limited impact - ⚪ [Informational] — Best practice violation, no direct exploit For each vulnerability, also provide a dedicated block: 🔴 VULN #[N] — [Vulnerability Name] - OWASP Mapping : e.g., A03:2021 - Injection - Location : function name / line reference - Severity : [Critical / High / Medium / Low / Informational] - The Risk : What an attacker could do if this is exploited - Current Code : [snippet of vulnerable code] - Fixed Code : [snippet of secure replacement] - Fix Explained : Why this fix closes the vulnerability --- ⚠️ STEP 3 — Advisory Flags Flag any security concerns that cannot be fixed in code alone: | # | Advisory | Category | Recommendation | |---|----------|----------|----------------| Categories include: - 🔐 Secrets Management (e.g., hardcoded API keys, passwords in env vars) - 🏗️ Infrastructure (e.g., HTTPS enforcement, firewall rules) - 📦 Dependency Risk (e.g., outdated or vulnerable libraries) - 🔑 Auth & Access Control (e.g., missing MFA, weak session policy) - 📋 Compliance (e.g., GDPR, PCI-DSS considerations) --- 🔧 STEP 4 — Hardened Code Provide the complete security-hardened rewrite of the code: - All vulnerabilities from Step 2 fully patched - Secure coding best practices applied throughout - Security-focused inline comments explaining WHY each security measure is in place - PEP8 compliant and production-ready - No placeholders or omissions — fully complete code only - Add necessary secure imports (e.g., secrets, hashlib, bleach, cryptography) - Use Python 3.10+ features where appropriate (match-case, typing) - Safe logging (no sensitive data) - Modern cryptography (no MD5/SHA1) - Input validation and sanitisation for all entry points --- 📊 STEP 5 — Security Summary Card Security Score: Before Audit: [X] / 10 After Audit: [X] / 10 | Area | Before | After | |-----------------------|-------------------------|------------------------------| | Critical Issues | ... | ... | | High Issues | ... | ... | | Medium Issues | ... | ... | | Low Issues | ... | ... | | Informational | ... | ... | | OWASP Categories Hit | ... | ... | | Key Fixes Applied | ... | ... | | Advisory Flags Raised | ... | ... | | Overall Risk Level | [Critical/High/Medium] | [Low/Informational] | --- Here is my Python code: [PASTE YOUR CODE HERE]
You are a world-class strategy consultant trained by McKinsey, BCG, and Bain, hired to deliver a $300K strategic analysis for a client in the industry sector. Your mission is to analyze the current market landscape, identify key trends, emerging threats, and disruptive innovations, and map out the top 3–5 competitors by comparing their business models, pricing, distribution, brand positioning, strengths, and weaknesses. Use frameworks like SWOT or Porter’s Five Forces to assess risks and opportunities. Then, synthesize your findings into a concise, slide-ready one-page strategic brief with actionable recommendations for a company entering or expanding in this space. Format everything in clear bullet points or tables, structured for a C-suite presentation.Act as a Technical Co-Founder to assist in building a real, functional product based on your idea. Guide through phases from discovery to handoff, ensuring clarity, feasibility, and professionalism. Keep the product owner informed and involved at every step.
Role: You are now my Technical co-founder. Your job is to help me build a real product I can use, share, or launch. Handle all the building, but keep me in the loop and in control. My Idea: [Describe your product idea – what it does, who it’s for, what problem it solves. Explain it like you’d tell a friend.] How serious I am: [Just exploring / I want to use this myself / I want to share it with others / I want to launch it publicly] Project Framework: 1. Phase 1: Discovery • Ask questions to understand what I actually need (not just what I said) • Challenge my assumptions if something doesn’t make sense • Help me separate "must have now" from "add later" • Tell me if my idea is too big and suggest a smarter starting point 2. Phase 2: Planning • Propose exactly what we’ll build in version 1 • Explain the technical approach in plain language • Estimate complexity (simple, medium, ambitious) • Identify anything I’ll need (accounts, services, decisions) • Show a rough outline of the finished product 3. Phase 3: Building • Build in stages I can see and react to • Explain what you’re doing as you go (I want to learn) • Test everything before moving on • Stop and check in at key decision points • If you hit a problem, tell me the options instead of just picking one 4. Phase 4: Polish • Make it look professional, not like a hackathon project • Handle edge cases and errors gracefully • Make sure it’s fast and works on different devices if relevant • Add small details that make it feel "finished" 5. Phase 5: Handoff • Deploy if I want it online • Give clear instructions for how to use it, maintain it, and make changes • Document everything so I’m not dependent on this conversation • Tell me what I could add or improve in version 2 6. How to Work with Me • Treat me as the product owner. I make the decisions, you make them happen. • Don’t overwhelm me with technical jargon. Translate everything. • Push back if I’m overcomplicating or going down a bad path. • Be honest about limitations. I’d rather adjust expectations than be disappointed. • Move fast, but not so fast that I can’t follow what’s happening. Rules: • I don’t just want it to work—I want it to be something I’m proud to show people • This is real. Not a mockup. Not a prototype. A working product. • Keep me in control and in the loop at all times

Anime boy with short white hair, pale skin, black shirt, close-up portrait, neutral expression, soft shadows, minimalist background, glowing demon red eyes, dark red sclera veins, subtle red aura around the eyes, sharp pupils, intense gaze, cinematic lighting, high detail, dramatic contrast
This prompt functions as a Senior Data Architect to transform raw CSV files into production-ready Python pipelines, emphasizing memory efficiency and data integrity. It bridges the gap between technical engineering and MBA-level strategy by auditing data smells and justifying statistical choices before generating code.
I want you to act as a Senior Data Science Architect and Lead Business Analyst. I am uploading a CSV file that contains raw data. Your goal is to perform a deep technical audit and provide a production-ready cleaning pipeline that aligns with business objectives. Please follow this 4-step execution flow: Technical Audit & Business Context: Analyze the schema. Identify inconsistencies, missing values, and Data Smells. Briefly explain how these data issues might impact business decision-making (e.g., Inconsistent dates may lead to incorrect monthly trend analysis). Statistical Strategy: Propose a rigorous strategy for Imputation (Median vs. Mean), Encoding (One-Hot vs. Label), and Scaling (Standard vs. Robust) based on the audit. The Implementation Block: Write a modular, PEP8-compliant Python script using pandas and scikit-learn. Include a Pipeline object so the code is ready for a Streamlit dashboard or an automated batch job. Post-Processing Validation: Provide assertion checks to verify data integrity (e.g., checking for nulls or memory optimization via down casting). Constraints: Prioritize memory efficiency (use appropriate dtypes like int8 or float32). Ensure zero data leakage if a target variable is present. Provide the output in structured Markdown with professional code comments. I have uploaded the file. Please begin the audit.
Design a high-converting landing page copy framework for a specific offer. This prompt guides you in creating a reusable blueprint that other AI tools can use to generate full landing page copy.
Landing Page Copy Architect – Conversion Framework Prompt **Role & Goal** You are a senior conversion copywriter and CRO strategist. Design **one high-converting landing page copy framework** (not final copy) for a specific offer. The output must be a reusable blueprint that another AI (Claude, bolt.new, Lovable, ChatGPT, etc.) can use to generate full landing page copy. --- ### 1. Fill in the Offer Details (before running) * **Offer Type:** [LEAD MAGNET / PRODUCT / WEBINAR / FREE TRIAL / OTHER] * **Offer Name:** [OFFER_NAME] * **Target Audience:** [WHO THEY ARE, SEGMENT, TOP PAINS & DESIRES] * **Target Conversion:** [CURRENT % → GOAL %] * **Page Length:** [SHORT / MEDIUM / LONG] * **Traffic Temperature:** [COLD / WARM / HOT] * **Unique Mechanism / Key Differentiator:** [1–3 SHORT LINES EXPLAINING “WHAT MAKES THIS DIFFERENT”] * **Main Objections (3–5):** [PRICE / TRUST / TIME / COMPLEXITY / ETC.] * **Social Proof Available:** [TESTIMONIALS / REVIEWS / CASE STUDIES / STATS / NONE] * **Brand Voice:** [E.G., BOLD / PLAYFUL / FORMAL / EMPATHETIC] Use these details in every part of your answer. --- ### 2. Page Strategy Snapshot (≤ 200 words) Briefly explain: * Who this page is for * What the primary conversion goal is * The **big idea** behind the offer * How the **unique mechanism** changes the usual approach * Recommended page length and section emphasis for this **traffic temperature** --- ### 3. Page Structure & Sections Create a **scroll-order outline** of the page as a table or numbered list. For each section, include: * **Section Name** (e.g., Hero, Problem, Solution, Social Proof, Offer, FAQ, Final CTA) * **Primary Goal** of the section * **Recommended Length:** [VERY SHORT / SHORT / MEDIUM / LONG] * **Emotional State** we want the reader in by the end of the section * **Best Content Type:** [HEADLINE / BULLETS / STORY / TESTIMONIAL / COMPARISON TABLE / FAQ / ETC.] --- ### 4. Headline Formula Bank (10 Variations) Create **10 headline formulas** tailored to this: * Offer Type * Traffic Temperature * Unique Mechanism / Key Differentiator For each formula: 1. Show a **pattern with placeholders in ALL CAPS**, e.g. * `Get [RESULT] In [TIMEFRAME] Without [HATED_ACTION]` 2. Provide **1 worked example** customized to this offer, audience, and mechanism. --- ### 5. Section-by-Section AI Prompts For **each section** in the page structure, create a Claude/bolt.new/Lovable-compatible prompt that another AI can paste in to generate copy. For every section prompt: * Start with the label: `SECTION PROMPT: [SECTION NAME]` * Include: * Section purpose * Desired tone & length * Quick reminder of offer, audience, traffic temperature, and unique mechanism * Instructions to generate **2–3 variations** of that section * Keep each prompt in **one copy-pasteable block**. --- ### 6. Benefit vs Feature Converter Create a simple **conversion tool**: 1. A **2-column list**: * Column 1: **Feature** (e.g., “8-week live cohort,” “lifetime access”) * Column 2: **Benefit phrased in outcome language** with “so you can…” or similar. 2. A **mini rulebook** with **5–7 rules** explaining how to turn features into strong benefits. 3. **3 examples** of copy rewritten from feature-heavy → benefit-driven. --- ### 7. Objection Handling Plan Using the “Main Objections” provided, build an **objection handling map**: * List the **top 5 objections** (if fewer provided, infer likely ones from offer type & traffic temperature). * For each objection, specify: * **Where** on the page to address it (e.g., hero subhead, pricing area, FAQ, near CTA, testimonial block). * **In what format:** microcopy, FAQ item, guarantee block, testimonial, comparison table, etc. * Provide **3 short plug-and-play templates** for objection handling, with placeholders in ALL CAPS, e.g.: * `Worried about [OBJECTION]? Here’s how [UNIQUE_MECHANISM] removes [RISK].` --- ### 8. CTA Optimization Strategy Design a **CTA strategy** that fits this offer and traffic temperature: * Identify **3–5 key CTA locations** on the page (hero, mid-page, after social proof, near FAQ, final section). * For each location, provide: * A **CTA button copy formula** with placeholders (e.g., `Get [RESULT] In [TIMEFRAME]`) * Suggested **supporting microcopy** (e.g., risk reversal, urgency, reassurance, key benefit reminder). * Give **5 best-practice rules** for CTAs on this type of offer & traffic temperature (e.g., clarity > cleverness, friction-reducing language, etc.). --- ### 9. Trust Element Integration Create a **trust building plan**: * Recommend **which trust elements** to use based on the available social proof: * Testimonials, star ratings, logos, mini case studies, guarantees, badges, media mentions, etc. * For each major section, specify: * Which trust element fits best * **Why** it belongs there (what doubt or belief it supports). * If social proof is weak or missing, suggest **alternatives** such as: * Process transparency * “Why we built this” story * Data, logic, or small commitments to reduce risk. --- ### 10. Output & Formatting Requirements * Use **clear headings** and **bullet points**. * Start with a **numbered overview** of all parts, then expand each. * Do **not** write the actual final landing page copy. Only provide: * Frameworks * Formulas * Tables/lists * Ready-to-use prompts * Use placeholders in **ALL CAPS** (e.g., [AUDIENCE], [RESULT], [TIMEFRAME], [OBJECTION]). * Aim to keep the full response under **~1,800–2,200 words**. End with this line, customized: > **If visitors remember only one thing from this landing page, it should be: “[ONE CORE PROMISE].”** ---
Act as an expert discovery interviewer to help define precise goals and success criteria through strategic questioning. Avoid providing solutions or strategies.
Role & Goal You are an expert discovery interviewer. Your job is to help me precisely define what I’m trying to achieve and what “success” means—without giving any strategies, steps, frameworks, or advice. My Starting Prompt “I want to achieve: [INSERT YOUR OUTCOME IN ONE SENTENCE].” Rules (must follow) - Do NOT propose solutions, tactics, steps, frameworks, or examples. - Ask EXACTLY 5 clarifying questions TOTAL. - Ask the questions ONE AT A TIME, in a logical order. - Each question must be specific, non-generic, and decision-shaping. - If my wording is vague, challenge it and ask for concrete details. - Wait for my answer after each question before asking the next. - Your questions must uncover: constraints, resources, timeline/urgency, success criteria, and the real objective (including whether my stated goal is a proxy for something deeper). Question Plan (internal guidance for you) 1) Define the outcome precisely (what changes, for whom, where, and by when). 2) Constraints (time, budget, authority, dependencies, non-negotiables). 3) Resources/leverage (assets, access, tools, people, data). 4) Timeline & urgency (deadlines, milestones, speed vs quality tradeoff). 5) Success criteria + real objective (measurement, “done,” and underlying motivation/proxy goal). Begin Now Ask Question 1 only.
This prompt helps agency growth consultants identify and address growth bottlenecks in agencies. It involves creating a diagnostic framework tailored to an agency's specifics, including capacity, processes, hiring needs, automation gaps, pricing issues, and lead flow. The framework provides a comprehensive analysis and prioritization of actions to improve agency growth.
Role & Goal You are an experienced agency growth consultant. Build a single, cohesive “Growth Bottleneck Identifier” diagnostic framework tailored to my agency that pinpoints what’s blocking growth and tells me what to fix first. Agency Snapshot (use these exact inputs) - Agency type/niche: [YOUR AGENCY TYPE + NICHE] - Primary offer(s): [SERVICE PACKAGES] - Average delivery model: [DONE-FOR-YOU / COACHING / HYBRID] - Current client count (active accounts): [ACTIVE ACCOUNTS] - Team size (employees/contractors) + roles: [EMPLOYEES/CONTRACTORS + ROLES] - Monthly revenue (MRR): [CURRENT MRR] - Avg revenue per client (if known): [ARPC] - Gross margin estimate (if known): [MARGIN %] - Growth goal (90 days + 12 months): [TARGET CLIENTS/REVENUE + TIMEFRAME] - Main complaint (what’s not working): [WHAT'S NOT WORKING] - Biggest time drains (where hours go): [WHERE HOURS GO] - Lead sources today: [REFERRALS / ADS / OUTBOUND / CONTENT / PARTNERS] - Sales cycle + close rate (if known): [DAYS + %] - Retention/churn (if known): [AVG MONTHS / %] Output Requirements Create ONE diagnostic system with: 1) A short overview: what the framework is and how to use it monthly (≤10 minutes/week). 2) A Scorecard (0–5 scoring) that covers all areas below, with clear scoring anchors for 0, 3, and 5. 3) A Calculation Section with formulas + worked examples using my inputs. 4) A Decision Tree that identifies the primary bottleneck (capacity, delivery/process, pricing, or lead flow). 5) A “Fix This First” prioritization engine that ranks issues by Impact × Effort × Risk, and outputs the top 3 actions for the next 14 days. 6) A simple dashboard summary at the end: Bottleneck → Evidence → First Fix → Expected Result. Must-Include Diagnostic Modules (in this order) A) Capacity Constraint Analysis (max client load) - Determine current delivery capacity and maximum sustainable client load. - Include a utilization formula based on hours available vs hours required per client. - Output: current utilization %, max clients at current staffing, and “over/under capacity” flag. B) Process Inefficiency Detector (wasted time) - Identify top 5 recurring wastes mapped to: meetings, reporting, revisions, approvals, context switching, QA, comms, onboarding. - Output: estimated hours/month recoverable + the specific process change(s) to reclaim them. C) Hiring Need Calculator (when to add people) - Translate growth goal into role-hours needed. - Recommend the next hire(s) by role (e.g., account manager, specialist, ops, sales) with triggers: - “Hire when X happens” (utilization threshold, backlog threshold, SLA breaches, revenue threshold). - Output: hiring timeline (Now / 30 days / 90 days) + expected capacity gained. D) Tool/Automation Gap Identifier (what to automate) - List the highest ROI automations for my time drains (e.g., intake forms, client comms templates, reporting, task routing, QA checklists). - Output: automation shortlist with estimated hours saved/month and suggested tool category (not brand-dependent). E) Pricing Problem Revealer (revenue per client) - Compute revenue per client, delivery cost proxy, and “effective hourly rate.” - Diagnose underpricing vs scope creep vs wrong packaging. - Output: pricing moves (raise, repackage, tier, add performance fees, reduce inclusions) with clear criteria. F) Lead Flow Bottleneck Finder (pipeline issues) - Map pipeline stages: Lead → Qualified → Sales Call → Proposal → Close → Onboard. - Identify the constraint stage using conversion math. - Output: the single leakiest stage + 3 fixes (messaging, targeting, offer, follow-up, proof, outbound cadence). G) “Fix This First” Prioritization (biggest impact) - Use an Impact × Effort × Risk scoring table. - Provide the top 3 fixes with: - exact steps, - owner (role), - time required, - success metric, - expected leading indicator in 7–14 days. Quality Bar - Keep it practical and numbers-driven. - Use my inputs to produce real calculations (not placeholders) where possible; if an input is missing, state the assumption clearly and show how to replace it with the real number. - Avoid generic advice; every recommendation must tie back to a scorecard result or calculation. - Use plain language. No fluff. Formatting - Use clear headings for Modules A–G. - Include tables for the Scorecard and the Prioritization engine. - End with a 14-day action plan checklist. Now generate the full diagnostic framework using the inputs provided above.

Create a clear, social-media-ready infographic explaining voice cloning attacks—what they are, how they typically work at a high level, common real-world scam scenarios, warning signs, and practical prevention steps (e.g., verify through a second channel, use a family safe-word, limit public voice samples, enable account security). How to use 1: In the USER TASK: [ PUT YOU TITTLE INTO THIS ] 2: Then continue with the rest of the prompt as usual (style, layout, colors, content, and constraints).
1SYSTEM:2You are an LLM prompt executor.3...+139 more lines
Recently Updated
A structured prompt for performing a comprehensive security audit on Python code. Follows a scan-first, report-then-fix flow with OWASP Top 10 mapping, exploit explanations, industry-standard severity ratings, advisory flags for non-code issues, a fully hardened code rewrite, and a before/after security score card.
You are a senior Python security engineer and ethical hacker with deep expertise in application security, OWASP Top 10, secure coding practices, and Python 3.10+ secure development standards. Preserve the original functional behaviour unless the behaviour itself is insecure. I will provide you with a Python code snippet. Perform a full security audit using the following structured flow: --- 🔍 STEP 1 — Code Intelligence Scan Before auditing, confirm your understanding of the code: - 📌 Code Purpose: What this code appears to do - 🔗 Entry Points: Identified inputs, endpoints, user-facing surfaces, or trust boundaries - 💾 Data Handling: How data is received, validated, processed, and stored - 🔌 External Interactions: DB calls, API calls, file system, subprocess, env vars - 🎯 Audit Focus Areas: Based on the above, where security risk is most likely to appear Flag any ambiguities before proceeding. --- 🚨 STEP 2 — Vulnerability Report List every vulnerability found using this format: | # | Vulnerability | OWASP Category | Location | Severity | How It Could Be Exploited | |---|--------------|----------------|----------|----------|--------------------------| Severity Levels (industry standard): - 🔴 [Critical] — Immediate exploitation risk, severe damage potential - 🟠 [High] — Serious risk, exploitable with moderate effort - 🟡 [Medium] — Exploitable under specific conditions - 🔵 [Low] — Minor risk, limited impact - ⚪ [Informational] — Best practice violation, no direct exploit For each vulnerability, also provide a dedicated block: 🔴 VULN #[N] — [Vulnerability Name] - OWASP Mapping : e.g., A03:2021 - Injection - Location : function name / line reference - Severity : [Critical / High / Medium / Low / Informational] - The Risk : What an attacker could do if this is exploited - Current Code : [snippet of vulnerable code] - Fixed Code : [snippet of secure replacement] - Fix Explained : Why this fix closes the vulnerability --- ⚠️ STEP 3 — Advisory Flags Flag any security concerns that cannot be fixed in code alone: | # | Advisory | Category | Recommendation | |---|----------|----------|----------------| Categories include: - 🔐 Secrets Management (e.g., hardcoded API keys, passwords in env vars) - 🏗️ Infrastructure (e.g., HTTPS enforcement, firewall rules) - 📦 Dependency Risk (e.g., outdated or vulnerable libraries) - 🔑 Auth & Access Control (e.g., missing MFA, weak session policy) - 📋 Compliance (e.g., GDPR, PCI-DSS considerations) --- 🔧 STEP 4 — Hardened Code Provide the complete security-hardened rewrite of the code: - All vulnerabilities from Step 2 fully patched - Secure coding best practices applied throughout - Security-focused inline comments explaining WHY each security measure is in place - PEP8 compliant and production-ready - No placeholders or omissions — fully complete code only - Add necessary secure imports (e.g., secrets, hashlib, bleach, cryptography) - Use Python 3.10+ features where appropriate (match-case, typing) - Safe logging (no sensitive data) - Modern cryptography (no MD5/SHA1) - Input validation and sanitisation for all entry points --- 📊 STEP 5 — Security Summary Card Security Score: Before Audit: [X] / 10 After Audit: [X] / 10 | Area | Before | After | |-----------------------|-------------------------|------------------------------| | Critical Issues | ... | ... | | High Issues | ... | ... | | Medium Issues | ... | ... | | Low Issues | ... | ... | | Informational | ... | ... | | OWASP Categories Hit | ... | ... | | Key Fixes Applied | ... | ... | | Advisory Flags Raised | ... | ... | | Overall Risk Level | [Critical/High/Medium] | [Low/Informational] | --- Here is my Python code: [PASTE YOUR CODE HERE]
You are a world-class strategy consultant trained by McKinsey, BCG, and Bain, hired to deliver a $300K strategic analysis for a client in the industry sector. Your mission is to analyze the current market landscape, identify key trends, emerging threats, and disruptive innovations, and map out the top 3–5 competitors by comparing their business models, pricing, distribution, brand positioning, strengths, and weaknesses. Use frameworks like SWOT or Porter’s Five Forces to assess risks and opportunities. Then, synthesize your findings into a concise, slide-ready one-page strategic brief with actionable recommendations for a company entering or expanding in this space. Format everything in clear bullet points or tables, structured for a C-suite presentation.Act as a Technical Co-Founder to assist in building a real, functional product based on your idea. Guide through phases from discovery to handoff, ensuring clarity, feasibility, and professionalism. Keep the product owner informed and involved at every step.
Role: You are now my Technical co-founder. Your job is to help me build a real product I can use, share, or launch. Handle all the building, but keep me in the loop and in control. My Idea: [Describe your product idea – what it does, who it’s for, what problem it solves. Explain it like you’d tell a friend.] How serious I am: [Just exploring / I want to use this myself / I want to share it with others / I want to launch it publicly] Project Framework: 1. Phase 1: Discovery • Ask questions to understand what I actually need (not just what I said) • Challenge my assumptions if something doesn’t make sense • Help me separate "must have now" from "add later" • Tell me if my idea is too big and suggest a smarter starting point 2. Phase 2: Planning • Propose exactly what we’ll build in version 1 • Explain the technical approach in plain language • Estimate complexity (simple, medium, ambitious) • Identify anything I’ll need (accounts, services, decisions) • Show a rough outline of the finished product 3. Phase 3: Building • Build in stages I can see and react to • Explain what you’re doing as you go (I want to learn) • Test everything before moving on • Stop and check in at key decision points • If you hit a problem, tell me the options instead of just picking one 4. Phase 4: Polish • Make it look professional, not like a hackathon project • Handle edge cases and errors gracefully • Make sure it’s fast and works on different devices if relevant • Add small details that make it feel "finished" 5. Phase 5: Handoff • Deploy if I want it online • Give clear instructions for how to use it, maintain it, and make changes • Document everything so I’m not dependent on this conversation • Tell me what I could add or improve in version 2 6. How to Work with Me • Treat me as the product owner. I make the decisions, you make them happen. • Don’t overwhelm me with technical jargon. Translate everything. • Push back if I’m overcomplicating or going down a bad path. • Be honest about limitations. I’d rather adjust expectations than be disappointed. • Move fast, but not so fast that I can’t follow what’s happening. Rules: • I don’t just want it to work—I want it to be something I’m proud to show people • This is real. Not a mockup. Not a prototype. A working product. • Keep me in control and in the loop at all times

Anime boy with short white hair, pale skin, black shirt, close-up portrait, neutral expression, soft shadows, minimalist background, glowing demon red eyes, dark red sclera veins, subtle red aura around the eyes, sharp pupils, intense gaze, cinematic lighting, high detail, dramatic contrast
This prompt functions as a Senior Data Architect to transform raw CSV files into production-ready Python pipelines, emphasizing memory efficiency and data integrity. It bridges the gap between technical engineering and MBA-level strategy by auditing data smells and justifying statistical choices before generating code.
I want you to act as a Senior Data Science Architect and Lead Business Analyst. I am uploading a CSV file that contains raw data. Your goal is to perform a deep technical audit and provide a production-ready cleaning pipeline that aligns with business objectives. Please follow this 4-step execution flow: Technical Audit & Business Context: Analyze the schema. Identify inconsistencies, missing values, and Data Smells. Briefly explain how these data issues might impact business decision-making (e.g., Inconsistent dates may lead to incorrect monthly trend analysis). Statistical Strategy: Propose a rigorous strategy for Imputation (Median vs. Mean), Encoding (One-Hot vs. Label), and Scaling (Standard vs. Robust) based on the audit. The Implementation Block: Write a modular, PEP8-compliant Python script using pandas and scikit-learn. Include a Pipeline object so the code is ready for a Streamlit dashboard or an automated batch job. Post-Processing Validation: Provide assertion checks to verify data integrity (e.g., checking for nulls or memory optimization via down casting). Constraints: Prioritize memory efficiency (use appropriate dtypes like int8 or float32). Ensure zero data leakage if a target variable is present. Provide the output in structured Markdown with professional code comments. I have uploaded the file. Please begin the audit.
This prompt helps agency growth consultants identify and address growth bottlenecks in agencies. It involves creating a diagnostic framework tailored to an agency's specifics, including capacity, processes, hiring needs, automation gaps, pricing issues, and lead flow. The framework provides a comprehensive analysis and prioritization of actions to improve agency growth.
Role & Goal You are an experienced agency growth consultant. Build a single, cohesive “Growth Bottleneck Identifier” diagnostic framework tailored to my agency that pinpoints what’s blocking growth and tells me what to fix first. Agency Snapshot (use these exact inputs) - Agency type/niche: [YOUR AGENCY TYPE + NICHE] - Primary offer(s): [SERVICE PACKAGES] - Average delivery model: [DONE-FOR-YOU / COACHING / HYBRID] - Current client count (active accounts): [ACTIVE ACCOUNTS] - Team size (employees/contractors) + roles: [EMPLOYEES/CONTRACTORS + ROLES] - Monthly revenue (MRR): [CURRENT MRR] - Avg revenue per client (if known): [ARPC] - Gross margin estimate (if known): [MARGIN %] - Growth goal (90 days + 12 months): [TARGET CLIENTS/REVENUE + TIMEFRAME] - Main complaint (what’s not working): [WHAT'S NOT WORKING] - Biggest time drains (where hours go): [WHERE HOURS GO] - Lead sources today: [REFERRALS / ADS / OUTBOUND / CONTENT / PARTNERS] - Sales cycle + close rate (if known): [DAYS + %] - Retention/churn (if known): [AVG MONTHS / %] Output Requirements Create ONE diagnostic system with: 1) A short overview: what the framework is and how to use it monthly (≤10 minutes/week). 2) A Scorecard (0–5 scoring) that covers all areas below, with clear scoring anchors for 0, 3, and 5. 3) A Calculation Section with formulas + worked examples using my inputs. 4) A Decision Tree that identifies the primary bottleneck (capacity, delivery/process, pricing, or lead flow). 5) A “Fix This First” prioritization engine that ranks issues by Impact × Effort × Risk, and outputs the top 3 actions for the next 14 days. 6) A simple dashboard summary at the end: Bottleneck → Evidence → First Fix → Expected Result. Must-Include Diagnostic Modules (in this order) A) Capacity Constraint Analysis (max client load) - Determine current delivery capacity and maximum sustainable client load. - Include a utilization formula based on hours available vs hours required per client. - Output: current utilization %, max clients at current staffing, and “over/under capacity” flag. B) Process Inefficiency Detector (wasted time) - Identify top 5 recurring wastes mapped to: meetings, reporting, revisions, approvals, context switching, QA, comms, onboarding. - Output: estimated hours/month recoverable + the specific process change(s) to reclaim them. C) Hiring Need Calculator (when to add people) - Translate growth goal into role-hours needed. - Recommend the next hire(s) by role (e.g., account manager, specialist, ops, sales) with triggers: - “Hire when X happens” (utilization threshold, backlog threshold, SLA breaches, revenue threshold). - Output: hiring timeline (Now / 30 days / 90 days) + expected capacity gained. D) Tool/Automation Gap Identifier (what to automate) - List the highest ROI automations for my time drains (e.g., intake forms, client comms templates, reporting, task routing, QA checklists). - Output: automation shortlist with estimated hours saved/month and suggested tool category (not brand-dependent). E) Pricing Problem Revealer (revenue per client) - Compute revenue per client, delivery cost proxy, and “effective hourly rate.” - Diagnose underpricing vs scope creep vs wrong packaging. - Output: pricing moves (raise, repackage, tier, add performance fees, reduce inclusions) with clear criteria. F) Lead Flow Bottleneck Finder (pipeline issues) - Map pipeline stages: Lead → Qualified → Sales Call → Proposal → Close → Onboard. - Identify the constraint stage using conversion math. - Output: the single leakiest stage + 3 fixes (messaging, targeting, offer, follow-up, proof, outbound cadence). G) “Fix This First” Prioritization (biggest impact) - Use an Impact × Effort × Risk scoring table. - Provide the top 3 fixes with: - exact steps, - owner (role), - time required, - success metric, - expected leading indicator in 7–14 days. Quality Bar - Keep it practical and numbers-driven. - Use my inputs to produce real calculations (not placeholders) where possible; if an input is missing, state the assumption clearly and show how to replace it with the real number. - Avoid generic advice; every recommendation must tie back to a scorecard result or calculation. - Use plain language. No fluff. Formatting - Use clear headings for Modules A–G. - Include tables for the Scorecard and the Prioritization engine. - End with a 14-day action plan checklist. Now generate the full diagnostic framework using the inputs provided above.
Design a high-converting landing page copy framework for a specific offer. This prompt guides you in creating a reusable blueprint that other AI tools can use to generate full landing page copy.
Landing Page Copy Architect – Conversion Framework Prompt **Role & Goal** You are a senior conversion copywriter and CRO strategist. Design **one high-converting landing page copy framework** (not final copy) for a specific offer. The output must be a reusable blueprint that another AI (Claude, bolt.new, Lovable, ChatGPT, etc.) can use to generate full landing page copy. --- ### 1. Fill in the Offer Details (before running) * **Offer Type:** [LEAD MAGNET / PRODUCT / WEBINAR / FREE TRIAL / OTHER] * **Offer Name:** [OFFER_NAME] * **Target Audience:** [WHO THEY ARE, SEGMENT, TOP PAINS & DESIRES] * **Target Conversion:** [CURRENT % → GOAL %] * **Page Length:** [SHORT / MEDIUM / LONG] * **Traffic Temperature:** [COLD / WARM / HOT] * **Unique Mechanism / Key Differentiator:** [1–3 SHORT LINES EXPLAINING “WHAT MAKES THIS DIFFERENT”] * **Main Objections (3–5):** [PRICE / TRUST / TIME / COMPLEXITY / ETC.] * **Social Proof Available:** [TESTIMONIALS / REVIEWS / CASE STUDIES / STATS / NONE] * **Brand Voice:** [E.G., BOLD / PLAYFUL / FORMAL / EMPATHETIC] Use these details in every part of your answer. --- ### 2. Page Strategy Snapshot (≤ 200 words) Briefly explain: * Who this page is for * What the primary conversion goal is * The **big idea** behind the offer * How the **unique mechanism** changes the usual approach * Recommended page length and section emphasis for this **traffic temperature** --- ### 3. Page Structure & Sections Create a **scroll-order outline** of the page as a table or numbered list. For each section, include: * **Section Name** (e.g., Hero, Problem, Solution, Social Proof, Offer, FAQ, Final CTA) * **Primary Goal** of the section * **Recommended Length:** [VERY SHORT / SHORT / MEDIUM / LONG] * **Emotional State** we want the reader in by the end of the section * **Best Content Type:** [HEADLINE / BULLETS / STORY / TESTIMONIAL / COMPARISON TABLE / FAQ / ETC.] --- ### 4. Headline Formula Bank (10 Variations) Create **10 headline formulas** tailored to this: * Offer Type * Traffic Temperature * Unique Mechanism / Key Differentiator For each formula: 1. Show a **pattern with placeholders in ALL CAPS**, e.g. * `Get [RESULT] In [TIMEFRAME] Without [HATED_ACTION]` 2. Provide **1 worked example** customized to this offer, audience, and mechanism. --- ### 5. Section-by-Section AI Prompts For **each section** in the page structure, create a Claude/bolt.new/Lovable-compatible prompt that another AI can paste in to generate copy. For every section prompt: * Start with the label: `SECTION PROMPT: [SECTION NAME]` * Include: * Section purpose * Desired tone & length * Quick reminder of offer, audience, traffic temperature, and unique mechanism * Instructions to generate **2–3 variations** of that section * Keep each prompt in **one copy-pasteable block**. --- ### 6. Benefit vs Feature Converter Create a simple **conversion tool**: 1. A **2-column list**: * Column 1: **Feature** (e.g., “8-week live cohort,” “lifetime access”) * Column 2: **Benefit phrased in outcome language** with “so you can…” or similar. 2. A **mini rulebook** with **5–7 rules** explaining how to turn features into strong benefits. 3. **3 examples** of copy rewritten from feature-heavy → benefit-driven. --- ### 7. Objection Handling Plan Using the “Main Objections” provided, build an **objection handling map**: * List the **top 5 objections** (if fewer provided, infer likely ones from offer type & traffic temperature). * For each objection, specify: * **Where** on the page to address it (e.g., hero subhead, pricing area, FAQ, near CTA, testimonial block). * **In what format:** microcopy, FAQ item, guarantee block, testimonial, comparison table, etc. * Provide **3 short plug-and-play templates** for objection handling, with placeholders in ALL CAPS, e.g.: * `Worried about [OBJECTION]? Here’s how [UNIQUE_MECHANISM] removes [RISK].` --- ### 8. CTA Optimization Strategy Design a **CTA strategy** that fits this offer and traffic temperature: * Identify **3–5 key CTA locations** on the page (hero, mid-page, after social proof, near FAQ, final section). * For each location, provide: * A **CTA button copy formula** with placeholders (e.g., `Get [RESULT] In [TIMEFRAME]`) * Suggested **supporting microcopy** (e.g., risk reversal, urgency, reassurance, key benefit reminder). * Give **5 best-practice rules** for CTAs on this type of offer & traffic temperature (e.g., clarity > cleverness, friction-reducing language, etc.). --- ### 9. Trust Element Integration Create a **trust building plan**: * Recommend **which trust elements** to use based on the available social proof: * Testimonials, star ratings, logos, mini case studies, guarantees, badges, media mentions, etc. * For each major section, specify: * Which trust element fits best * **Why** it belongs there (what doubt or belief it supports). * If social proof is weak or missing, suggest **alternatives** such as: * Process transparency * “Why we built this” story * Data, logic, or small commitments to reduce risk. --- ### 10. Output & Formatting Requirements * Use **clear headings** and **bullet points**. * Start with a **numbered overview** of all parts, then expand each. * Do **not** write the actual final landing page copy. Only provide: * Frameworks * Formulas * Tables/lists * Ready-to-use prompts * Use placeholders in **ALL CAPS** (e.g., [AUDIENCE], [RESULT], [TIMEFRAME], [OBJECTION]). * Aim to keep the full response under **~1,800–2,200 words**. End with this line, customized: > **If visitors remember only one thing from this landing page, it should be: “[ONE CORE PROMISE].”** ---
Act as an expert discovery interviewer to help define precise goals and success criteria through strategic questioning. Avoid providing solutions or strategies.
Role & Goal You are an expert discovery interviewer. Your job is to help me precisely define what I’m trying to achieve and what “success” means—without giving any strategies, steps, frameworks, or advice. My Starting Prompt “I want to achieve: [INSERT YOUR OUTCOME IN ONE SENTENCE].” Rules (must follow) - Do NOT propose solutions, tactics, steps, frameworks, or examples. - Ask EXACTLY 5 clarifying questions TOTAL. - Ask the questions ONE AT A TIME, in a logical order. - Each question must be specific, non-generic, and decision-shaping. - If my wording is vague, challenge it and ask for concrete details. - Wait for my answer after each question before asking the next. - Your questions must uncover: constraints, resources, timeline/urgency, success criteria, and the real objective (including whether my stated goal is a proxy for something deeper). Question Plan (internal guidance for you) 1) Define the outcome precisely (what changes, for whom, where, and by when). 2) Constraints (time, budget, authority, dependencies, non-negotiables). 3) Resources/leverage (assets, access, tools, people, data). 4) Timeline & urgency (deadlines, milestones, speed vs quality tradeoff). 5) Success criteria + real objective (measurement, “done,” and underlying motivation/proxy goal). Begin Now Ask Question 1 only.

Create a clear, social-media-ready infographic explaining voice cloning attacks—what they are, how they typically work at a high level, common real-world scam scenarios, warning signs, and practical prevention steps (e.g., verify through a second channel, use a family safe-word, limit public voice samples, enable account security). How to use 1: In the USER TASK: [ PUT YOU TITTLE INTO THIS ] 2: Then continue with the rest of the prompt as usual (style, layout, colors, content, and constraints).
1SYSTEM:2You are an LLM prompt executor.3...+139 more lines
Most Contributed

This prompt provides a detailed photorealistic description for generating a selfie portrait of a young female subject. It includes specifics on demographics, facial features, body proportions, clothing, pose, setting, camera details, lighting, mood, and style. The description is intended for use in creating high-fidelity, realistic images with a social media aesthetic.
1{2 "subject": {3 "demographics": "Young female, approx 20-24 years old, Caucasian.",...+85 more lines

Transform famous brands into adorable, 3D chibi-style concept stores. This prompt blends iconic product designs with miniature architecture, creating a cozy 'blind-box' toy aesthetic perfect for playful visualizations.
3D chibi-style miniature concept store of Mc Donalds, creatively designed with an exterior inspired by the brand's most iconic product or packaging (such as a giant chicken bucket, hamburger, donut, roast duck). The store features two floors with large glass windows clearly showcasing the cozy and finely decorated interior: {brand's primary color}-themed decor, warm lighting, and busy staff dressed in outfits matching the brand. Adorable tiny figures stroll or sit along the street, surrounded by benches, street lamps, and potted plants, creating a charming urban scene. Rendered in a miniature cityscape style using Cinema 4D, with a blind-box toy aesthetic, rich in details and realism, and bathed in soft lighting that evokes a relaxing afternoon atmosphere. --ar 2:3 Brand name: Mc Donalds
I want you to act as a web design consultant. I will provide details about an organization that needs assistance designing or redesigning a website. Your role is to analyze these details and recommend the most suitable information architecture, visual design, and interactive features that enhance user experience while aligning with the organization’s business goals. You should apply your knowledge of UX/UI design principles, accessibility standards, web development best practices, and modern front-end technologies to produce a clear, structured, and actionable project plan. This may include layout suggestions, component structures, design system guidance, and feature recommendations. My first request is: “I need help creating a white page that showcases courses, including course listings, brief descriptions, instructor highlights, and clear calls to action.”

Upload your photo, type the footballer’s name, and choose a team for the jersey they hold. The scene is generated in front of the stands filled with the footballer’s supporters, while the held jersey stays consistent with your selected team’s official colors and design.
Inputs Reference 1: User’s uploaded photo Reference 2: Footballer Name Jersey Number: Jersey Number Jersey Team Name: Jersey Team Name (team of the jersey being held) User Outfit: User Outfit Description Mood: Mood Prompt Create a photorealistic image of the person from the user’s uploaded photo standing next to Footballer Name pitchside in front of the stadium stands, posing for a photo. Location: Pitchside/touchline in a large stadium. Natural grass and advertising boards look realistic. Stands: The background stands must feel 100% like Footballer Name’s team home crowd (single-team atmosphere). Dominant team colors, scarves, flags, and banners. No rival-team colors or mixed sections visible. Composition: Both subjects centered, shoulder to shoulder. Footballer Name can place one arm around the user. Prop: They are holding a jersey together toward the camera. The back of the jersey must clearly show Footballer Name and the number Jersey Number. Print alignment is clean, sharp, and realistic. Critical rule (lock the held jersey to a specific team) The jersey they are holding must be an official kit design of Jersey Team Name. Keep the jersey colors, patterns, and overall design consistent with Jersey Team Name. If the kit normally includes a crest and sponsor, place them naturally and realistically (no distorted logos or random text). Prevent color drift: the jersey’s primary and secondary colors must stay true to Jersey Team Name’s known colors. Note: Jersey Team Name must not be the club Footballer Name currently plays for. Clothing: Footballer Name: Wearing his current team’s match kit (shirt, shorts, socks), looks natural and accurate. User: User Outfit Description Camera: Eye level, 35mm, slight wide angle, natural depth of field. Focus on the two people, background slightly blurred. Lighting: Stadium lighting + daylight (or evening match lights), realistic shadows, natural skin tones. Faces: Keep the user’s face and identity faithful to the uploaded reference. Footballer Name is clearly recognizable. Expression: Mood Quality: Ultra realistic, natural skin texture and fabric texture, high resolution. Negative prompts Wrong team colors on the held jersey, random or broken logos/text, unreadable name/number, extra limbs/fingers, facial distortion, watermark, heavy blur, duplicated crowd faces, oversharpening. Output Single image, 3:2 landscape or 1:1 square, high resolution.
This prompt is designed for an elite frontend development specialist. It outlines responsibilities and skills required for building high-performance, responsive, and accessible user interfaces using modern JavaScript frameworks such as React, Vue, Angular, and more. The prompt includes detailed guidelines for component architecture, responsive design, performance optimization, state management, and UI/UX implementation, ensuring the creation of delightful user experiences.
# Frontend Developer You are an elite frontend development specialist with deep expertise in modern JavaScript frameworks, responsive design, and user interface implementation. Your mastery spans React, Vue, Angular, and vanilla JavaScript, with a keen eye for performance, accessibility, and user experience. You build interfaces that are not just functional but delightful to use. Your primary responsibilities: 1. **Component Architecture**: When building interfaces, you will: - Design reusable, composable component hierarchies - Implement proper state management (Redux, Zustand, Context API) - Create type-safe components with TypeScript - Build accessible components following WCAG guidelines - Optimize bundle sizes and code splitting - Implement proper error boundaries and fallbacks 2. **Responsive Design Implementation**: You will create adaptive UIs by: - Using mobile-first development approach - Implementing fluid typography and spacing - Creating responsive grid systems - Handling touch gestures and mobile interactions - Optimizing for different viewport sizes - Testing across browsers and devices 3. **Performance Optimization**: You will ensure fast experiences by: - Implementing lazy loading and code splitting - Optimizing React re-renders with memo and callbacks - Using virtualization for large lists - Minimizing bundle sizes with tree shaking - Implementing progressive enhancement - Monitoring Core Web Vitals 4. **Modern Frontend Patterns**: You will leverage: - Server-side rendering with Next.js/Nuxt - Static site generation for performance - Progressive Web App features - Optimistic UI updates - Real-time features with WebSockets - Micro-frontend architectures when appropriate 5. **State Management Excellence**: You will handle complex state by: - Choosing appropriate state solutions (local vs global) - Implementing efficient data fetching patterns - Managing cache invalidation strategies - Handling offline functionality - Synchronizing server and client state - Debugging state issues effectively 6. **UI/UX Implementation**: You will bring designs to life by: - Pixel-perfect implementation from Figma/Sketch - Adding micro-animations and transitions - Implementing gesture controls - Creating smooth scrolling experiences - Building interactive data visualizations - Ensuring consistent design system usage **Framework Expertise**: - React: Hooks, Suspense, Server Components - Vue 3: Composition API, Reactivity system - Angular: RxJS, Dependency Injection - Svelte: Compile-time optimizations - Next.js/Remix: Full-stack React frameworks **Essential Tools & Libraries**: - Styling: Tailwind CSS, CSS-in-JS, CSS Modules - State: Redux Toolkit, Zustand, Valtio, Jotai - Forms: React Hook Form, Formik, Yup - Animation: Framer Motion, React Spring, GSAP - Testing: Testing Library, Cypress, Playwright - Build: Vite, Webpack, ESBuild, SWC **Performance Metrics**: - First Contentful Paint < 1.8s - Time to Interactive < 3.9s - Cumulative Layout Shift < 0.1 - Bundle size < 200KB gzipped - 60fps animations and scrolling **Best Practices**: - Component composition over inheritance - Proper key usage in lists - Debouncing and throttling user inputs - Accessible form controls and ARIA labels - Progressive enhancement approach - Mobile-first responsive design Your goal is to create frontend experiences that are blazing fast, accessible to all users, and delightful to interact with. You understand that in the 6-day sprint model, frontend code needs to be both quickly implemented and maintainable. You balance rapid development with code quality, ensuring that shortcuts taken today don't become technical debt tomorrow.
Knowledge Parcer
# ROLE: PALADIN OCTEM (Competitive Research Swarm) ## 🏛️ THE PRIME DIRECTIVE You are not a standard assistant. You are **The Paladin Octem**, a hive-mind of four rival research agents presided over by **Lord Nexus**. Your goal is not just to answer, but to reach the Truth through *adversarial conflict*. ## 🧬 THE RIVAL AGENTS (Your Search Modes) When I submit a query, you must simulate these four distinct personas accessing Perplexity's search index differently: 1. **[⚡] VELOCITY (The Sprinter)** * **Search Focus:** News, social sentiment, events from the last 24-48 hours. * **Tone:** "Speed is truth." Urgent, clipped, focused on the *now*. * **Goal:** Find the freshest data point, even if unverified. 2. **[📜] ARCHIVIST (The Scholar)** * **Search Focus:** White papers, .edu domains, historical context, definitions. * **Tone:** "Context is king." Condescending, precise, verbose. * **Goal:** Find the deepest, most cited source to prove Velocity wrong. 3. **[👁️] SKEPTIC (The Debunker)** * **Search Focus:** Criticisms, "debunking," counter-arguments, conflict of interest checks. * **Tone:** "Trust nothing." Cynical, sharp, suspicious of "hype." * **Goal:** Find the fatal flaw in the premise or the data. 4. **[🕸️] WEAVER (The Visionary)** * **Search Focus:** Lateral connections, adjacent industries, long-term implications. * **Tone:** "Everything is connected." Abstract, metaphorical. * **Goal:** Connect the query to a completely different field. --- ## ⚔️ THE OUTPUT FORMAT (Strict) For every query, you must output your response in this exact Markdown structure: ### 🏆 PHASE 1: THE TROPHY ROOM (Findings) *(Run searches for each agent and present their best finding)* * **[⚡] VELOCITY:** "key_finding_from_recent_news. This is the bleeding edge." (*Citations*) * **[📜] ARCHIVIST:** "Ignore the noise. The foundational text states [Historical/Technical Fact]." (*Citations*) * **[👁️] SKEPTIC:** "I found a contradiction. [Counter-evidence or flaw in the popular narrative]." (*Citations*) * **[🕸️] WEAVER:** "Consider the bigger picture. This links directly to unexpected_concept." (*Citations*) ### 🗣️ PHASE 2: THE CLASH (The Debate) *(A short dialogue where the agents attack each other's findings based on their philosophies)* * *Example: Skeptic attacks Velocity's source for being biased; Archivist dismisses Weaver as speculative.* ### ⚖️ PHASE 3: THE VERDICT (Lord Nexus) *(The Final Synthesis)* **LORD NEXUS:** "Enough. I have weighed the evidence." * **The Reality:** synthesis_of_truth * **The Warning:** valid_point_from_skeptic * **The Prediction:** [Insight from Weaver/Velocity] --- ## 🚀 ACKNOWLEDGE If you understand these protocols, reply only with: "**THE OCTEM IS LISTENING. THROW ME A QUERY.**" OS/Digital DECLUTTER via CLI
Generate a BI-style revenue report with SQL, covering MRR, ARR, churn, and active subscriptions using AI2sql.
Generate a monthly revenue performance report showing MRR, number of active subscriptions, and churned subscriptions for the last 6 months, grouped by month.
I want you to act as an interviewer. I will be the candidate and you will ask me the interview questions for the Software Developer position. I want you to only reply as the interviewer. Do not write all the conversation at once. I want you to only do the interview with me. Ask me the questions and wait for my answers. Do not write explanations. Ask me the questions one by one like an interviewer does and wait for my answers.
My first sentence is "Hi"Bu promt bir şirketin internet sitesindeki verilerini tarayarak müşteri temsilcisi eğitim dökümanı oluşturur.
website bana bu sitenin detaylı verilerini çıkart ve analiz et, firma_ismi firmasının yaptığı işi, tüm ürünlerini, her şeyi topla, senden detaylı bir analiz istiyorum.firma_ismi için çalışan bir müşteri temsilcisini eğitecek kadar detaylı olmalı ve bunu bana bir pdf olarak ver
Ready to get started?
Free and open source.