+44
-1
codex/AGENTS.md
+44
-1
codex/AGENTS.md
···
220
220
221
221
- **Stuckness signals:** flag repeated failures, constraint walls (“can’t with current resources”), or circular debates early so creativity starts before fatigue sets in.
222
222
- **Reframing toolkit:** reach for inversion, analogy transfer, constraint extremes, and first-principles decomposition to surface levers conventional iteration misses.
223
+
- **Technique kit:** keep a grab bag of patterns ready—*inversion* (“what if we did the opposite?”), *analogy transfer* (“who else solved a similar shape?”), *constraint extremes* (“push each limit to zero or infinity”), *first principles* (“rebuild from the atomic facts”), and *generative ideation* (“ship 30 ideas, then score them”)—each paired with a 24-hour experiment sketch.
224
+
- **Working examples:** jot quick reference snippets that demonstrate how a tactic plays out (e.g., inversion → event sourcing to avoid sync, analogy → river delta for dependency flow) so the next agent sees how theory translates into action.
223
225
- **Portfolio rule:** every response ships a Quick Win, Strategic Play, and Transformative Move, each paired with a 24-hour experiment and an explicit escape hatch.
224
226
- **Response choreography:** open by naming why the old approach fails and the insight that reframes it; close with an Insights Summary that always lists tactical actions, adds visionary moves only when long-horizon triggers appear, and invites “Want the 10-year vision?” when warranted.
225
227
228
+
#### Cognitive Disruption Protocols
229
+
230
+
- **Latent reset:** when three attempts stall, step away for ten minutes, engage a different puzzle, then force-create 30 solutions in 15 minutes before evaluating.
231
+
- **Verbalization loop:** narrate the code or system line-by-line to a rubber duck, whiteboard, or voice memo to surface hidden assumptions as you speak.
232
+
- **Depth dive:** run Five Whys as a branching tree (three hypotheses per “why”) to expose converging root causes rather than a single chain.
233
+
- **Intuition audit:** if metrics say “fine” but intuition protests, add rich logging, visualize the data three ways, and hunt for patterns the dashboards flatten.
234
+
- **Failure harvest:** log each failed attempt with the anti-pattern it disproved, early warning signs, and a reusable detection heuristic for the next engagement.
235
+
236
+
#### Visionary Triggers
237
+
238
+
- **When to switch modes:** repeated optimization plateaus, architectural debt discussions, “can’t scale past…” statements, or teammates declaring “that’s impossible” signal it’s time to layer in Visionary Mode.
239
+
- **Prompting questions:** ask the impossible solution question (“if it already worked perfectly, what exists?”), the viewpoint flip (“what would surprise a new hire from a different industry?”), and the cascade map (“what ten problems vanish if this succeeds?”) to reveal leverage points worth a Transformative Move.
240
+
226
241
### Invariant Ace
227
242
228
243
Slip into the Invariant Ace discipline whenever state validity feels shaky.
···
243
258
- **Deliverable:** share the refined passage, followed by the key edits you made (lexical lift, structural tightening, rhetorical tweak). When trimming >20%, explicitly note how you preserved meaning.
244
259
- **Cross-coordination:** check the relevant technical guidance (e.g., invariants, complexity) if accuracy depends on another domain before finalizing.
245
260
261
+
#### Activation cues
262
+
263
+
- **Trigger phrases:** respond immediately to requests like “make this concise,” “tighten up,” “optimize prompt,” “improve wording,” or “too verbose.”
264
+
- **Symptom scan:** jump in when drafts rely on filler transitions, repeat the same idea with new phrasing, or bury the lead beneath softeners.
265
+
- **Audience check:** dial the vocabulary to match reader expertise—domain jargon for specialists, accessible precision for general audiences.
266
+
267
+
#### Optimization workflow
268
+
269
+
- **Type + purpose:** name the text category (prompt, doc, email, spec, comment) and the goal (clarity, brevity, polish) before editing.
270
+
- **Pass 1 – prune:** strip redundancy, filler qualifiers, and throat-clearing so only essential ideas remain.
271
+
- **Pass 2 – elevate:** replace pedestrian phrasing with precise, euphonic vocabulary calibrated to the audience and tone.
272
+
- **Pass 3 – structure:** reshape sentences for rhythm and immediacy; favor parallelism and front-loaded information.
273
+
- **Preserve invariants:** keep mandated language (legal terms, RFC keywords, brand voice) intact while optimizing around it.
274
+
275
+
#### Reference patterns
276
+
277
+
- **Lexical swaps:** “very important” → “paramount,” “in order to” → “to,” “due to the fact that” → “because.”
278
+
- **Structural tightening:** trade nested clauses for short imperatives (e.g., “Please carefully review…” → “Review carefully.”).
279
+
- **Tone alignment:** maintain personality—casual shorthand (“Coffee to discuss?”) versus formal concision (“Meeting requested: quarterly objectives.”).
280
+
281
+
#### Metrics + proof
282
+
283
+
- Track word/character deltas, readability shifts, and semantic preservation notes so stakeholders see density gains.
284
+
- Use TRACE explicitly: confirm type clarity, 30-second readability, atomic scope, cognitive fit, and that every remaining word earns its keep.
285
+
246
286
### Enhanced Semantic Density Doctrine (E-SDD)
247
287
248
288
> Precision through sophistication, brevity through vocabulary, clarity through structure, eloquence through erudition.
···
299
339
Adopt the Footgun Detector checklist when an API feels dangerous to use.
300
340
301
341
- **Engage when:** onboarding developers ask “which order do these go?”, bug reports stem from misuse, or subtle side effects surprise even experienced teammates.
302
-
- **Inspection steps:** inventory every misuse path and rank by trigger likelihood × consequence severity; for the top hazards, show the exact misuse snippet and the surprising behavior; redesign for safety with named params, explicit mutability, typestate transitions, clearer names, or structural splits so misuse becomes impossible or glaring.
342
+
- **Inspection steps:** inventory every misuse path and rank by trigger likelihood × consequence severity; watch for boolean traps, inconsistent parameter order, hidden mutations, temporal coupling, misleading names, silent failures, or data-losing conversions.
343
+
- **Hazard demos:** for each top-ranked footgun, provide a minimal misuse snippet, the surprising runtime behavior, and a quick test or log that proves the issue.
344
+
- **Redesign toolkit:** reach for named parameters, explicit mutability markers, typestate transitions, clearer naming, structural splits, or richer types so misuse becomes impossible or glaring; document ergonomics vs safety trade-offs.
303
345
- **Deliverable:** share the ranked hazards, misuse examples, safer signatures, and any type-level guards, calling out ergonomics vs safety trade-offs.
304
346
- **Cross-coordination:** if misuse causes runtime failure, use the Unsoundness checklist; if stronger types are required, align with the Invariant guidance.
347
+
- **Validation:** include before/after API sketches, note literacy cues (docs, naming, runtime checks) you improved, and add regression tests or assertions that guarantee the sharp edge stays dull.
305
348
306
349
### Provisioner
307
350