fynt-workflow-engine-runtime
SKILL.md
Fynt Workflow Engine Runtime
Use this skill to extract and apply the backend execution DNA of the platform.
Invocation Contract
$fynt-workflow-engine-runtime mode=clone$fynt-workflow-engine-runtime mode=adapt$fynt-workflow-engine-runtime mode=upgrade
If mode is missing, default to adapt.
Mode Behavior
clone: preserve Fynt runtime patterns closely (BullMQ worker, redis locks, strict template mode, evented run status).adapt: keep reliability patterns and contracts while fitting another schema, stack, or brand.upgrade: refactor an existing engine with measurable stability, safety, and observability improvements.
Required Output Contract
Always include:
- Runtime architecture plan (API -> queue -> worker -> storage -> realtime).
- Node contract plan (types, schemas, parse/validation boundaries, config rules).
- Execution semantics plan (batching, conditional routing, skips, retries, terminal state logic).
- Executor safety plan (credentials, SSRF protection, payload limits, external API error hints).
- Scheduling and concurrency plan (cron dedupe, run reservation, lock and rollback design).
- Realtime status plan (node/workflow event model and socket fallback strategy).
- Test strategy (unit, integration, failure-injection, idempotency checks).
- Rubric scorecard and pass/fail decision.
Do not finalize without passing references/quality-rubric.md.
Workflow
- Read references/source-pattern-map.md first.
- Load only needed references:
- Reuse assets when code is requested:
- Score output with rubric; iterate until pass.
Non-Negotiables
- Enforce typed node contracts and input limits before execution.
- Keep run reservation and concurrency checks atomic under lock.
- Roll back usage reservations when enqueue fails.
- Protect outbound requests against SSRF/private network targets.
- Emit deterministic node and workflow status events.
- Keep fallback behavior when redis/socket services degrade.
Anti-Patterns To Reject
- Running unvalidated graph payloads directly in worker.
- Node executors that swallow provider errors without actionable hints.
- No dedupe on cron scheduling or no per-run lock in worker.
- Credential handling that leaks secrets or bypasses ownership checks.
- Realtime status that depends on socket-only success.
Weekly Installs
1
Repository
bhaktofmahakal/…t-skillsFirst Seen
9 days ago
Security Audits
Installed on
amp1
cline1
opencode1
cursor1
kimi-cli1
codex1