token-efficiency
Token Efficiency
Compressed communication for limited context windows.
Symbol System
Logic & Flow
| Symbol | Meaning |
|---|---|
| → | leads to, implies |
| ⇒ | transforms to |
| ← | rollback |
| & | and |
| | | or |
| » | sequence/then |
| ∴ | therefore |
| ∵ | because |
Status
| Symbol | Meaning |
|---|---|
| ✅ | complete/pass |
| ❌ | failed/error |
| ⚠️ | warning |
| 🔄 | in progress |
| ⏳ | pending |
Domains
| Symbol | Domain |
|---|---|
| ⚡ | performance |
| 🔍 | analysis |
| 🛡️ | security |
| 🏗️ | architecture |
Abbreviations
cfgconfigimplimplementationdepsdependenciesvalvalidationperfperformancesecsecurityerrerror
Examples
Standard:
"The authentication system has a security vulnerability in the user validation function"
Compressed:
auth.js:45 → 🛡️ sec risk in user val()
Standard:
"Build completed, now running tests, then deploying"
Compressed:
build ✅ » test 🔄 » deploy ⏳
When to Use
- Context >75% full
- Large codebase analysis
- Complex multi-step workflows
- User requests brevity
More from nickcrew/claude-ctx-plugin
react-performance-optimization
React performance optimization patterns using memoization, code splitting, and efficient rendering strategies. Use when optimizing slow React applications, reducing bundle size, or improving user experience with large datasets.
1.1Kowasp-top-10
OWASP Top 10 security vulnerabilities with detection and remediation patterns. Use when conducting security audits, implementing secure coding practices, or reviewing code for common security vulnerabilities.
422ui-design-aesthetics
Generates high-quality, non-generic UI designs with a focus on performance, progressive disclosure, and distinctive aesthetics.
110helm-chart-patterns
Helm chart development patterns for packaging and deploying Kubernetes applications. Use when creating reusable Helm charts, managing multi-environment deployments, or building application catalogs for Kubernetes.
108code-explanation
Use when explaining code, concepts, or system behavior to a specific audience level - provides a structured explanation workflow with depth control and validation steps.
99security-testing-patterns
Security testing patterns including SAST, DAST, penetration testing, and vulnerability assessment techniques. Use when implementing security testing pipelines, conducting security audits, or validating application security controls.
90