prompt-enhance
[IMPORTANT] Use
TaskCreateto break ALL work into small tasks BEFORE starting.
Quick Summary
Goal: Refactor any markdown prompt file (skill, doc, protocol, agent definition) to follow AI attention anchoring best practices — ensuring AI actually reads and follows all instructions.
Workflow:
- Read — Read the target file completely
- Analyze — Identify READ references, missing summaries, weak top/bottom anchoring
- Refactor — Apply the 3 transformations below
- Verify — Check formatting, no content loss, correct structure
Key Rules:
- AI attention is strongest at TOP and BOTTOM of prompt, weakest in middle (Stanford "lost-in-the-middle" research)
- Every READ instruction MUST ATTENTION include an inline summary of the referenced file's key rules
- Top section = concise summary + key rules. Bottom section = closing reminders echoing top rules
- Middle section = detailed steps. Accept intentional duplication between top and bottom
More from duc01226/easyplatform
pdf-to-markdown
[Document Processing] Use when you need to convert PDF files to Markdown with support for native text PDFs and scanned documents (OCR).
688markdown-to-docx
[Document Processing] Use when you need to convert markdown files to Microsoft Word ( DOCX) format with GFM support and math rendering.
437markdown-to-pdf
[Document Processing] Use when you need to convert markdown files to PDF with syntax highlighting and custom CSS support.
406docx-to-markdown
[Document Processing] Use when you need to convert Microsoft Word ( DOCX) files to Markdown with GFM support (tables, images, code blocks).
294ui-ux-pro-max
[Frontend] Frontend UI/UX design intelligence - activate FIRST when user requests beautiful, stunning, gorgeous, or aesthetic interfaces. 50 styles, 21 palettes, 50 font pairings, 20 charts, 8 stacks. Triggers on ui design, ux design, design system, color palette, typography, glassmorphism, claymorphism, neumorphism, bento grid, font pairing, ui-ux-pro-max, stunning interface, beautiful ui.
83arch-security-review
[Architecture] Use when reviewing code for security vulnerabilities, implementing authorization, or ensuring data protection.
64