fynt-platform-production-hardening
SKILL.md
Fynt Platform Production Hardening
Use this skill to make workflow products safe and reliable under real-world production load.
Invocation Contract
$fynt-platform-production-hardening mode=clone$fynt-platform-production-hardening mode=adapt$fynt-platform-production-hardening mode=upgrade
If mode is missing, default to adapt.
Mode Behavior
clone: stay close to Fynt production DNA (runtime mode kill switch, strict ownership checks, locked run reservation, websocket token gating, redis fallback behavior).adapt: preserve reliability and security patterns while mapping to another stack, schema, and branding.upgrade: harden an existing platform with measurable risk reduction and operational improvements.
Required Output Contract
Always include all items before finalizing:
- Trust-boundary map (public endpoints, auth boundary, worker boundary, realtime boundary, data boundary).
- Auth/session resilience plan (fail modes, retries, degraded behavior).
- Ownership and tenancy enforcement plan (resource-level checks and scope rules).
- Runtime mode and deployment topology plan (
web-onlyvsfull, production automation switches). - Input and webhook security plan (secret verification, rate limits, payload/header/query sanitation).
- Execution reliability plan (plan limits, lock strategy, enqueue rollback, scheduler dedupe, worker lock lifecycle).
- Realtime reliability and token security plan (token TTL, route auth, reconnect/degraded strategy).
- Operability plan (health checks, logs/alerts, incident runbooks, safe fallback behavior).
- Rubric scorecard with pass/fail.
Do not finalize without a pass from references/quality-rubric.md.
Workflow
- Read references/source-pattern-map.md first.
- Load only needed references:
- Reuse starter scaffolds when code is requested:
- Score with rubric and iterate until pass.
Non-Negotiables
- Enforce runtime mode gates on both server and client behavior.
- Fail closed on auth and ownership checks for workflow and run resources.
- Use constant-time secret comparison for webhook/shared secret checks.
- Apply rate limits plus payload/header/query bounds on public ingress.
- Reserve run budget atomically under lock before enqueueing.
- Roll back run/usage reservations when enqueue fails.
- Verify websocket stream tokens and close stale or expired connections deterministically.
- Provide degraded behavior when Redis/realtime layers are unavailable.
Anti-Patterns To Reject
- Trusting frontend route guards as the only authorization control.
- Webhook handlers that accept raw headers/query/body without limits or sanitation.
- Enqueue-first execution flows with no run reservation lock or usage rollback.
- Socket-only status architecture with no fallback/degradation path.
- Full production execution enabled implicitly without an explicit automation flag.
- Secrets stored or returned in plaintext.
Weekly Installs
1
Repository
bhaktofmahakal/…t-skillsFirst Seen
9 days ago
Security Audits
Installed on
amp1
cline1
opencode1
cursor1
kimi-cli1
codex1