commit
Commit Changes
Create one focused commit for the work that is ready now.
Workflow
- Inspect the working tree with
git status --short. - Identify the files and hunks that belong to the requested unit of work.
- Leave unrelated, pre-existing, or uncertain changes unstaged. If the scope is ambiguous, ask before committing.
- Stage only the relevant files or hunks.
- Review the staged diff with
git diff --cached --statandgit diff --cached. - Write a concise imperative subject line that describes the change.
- Create a single commit with no body unless the user explicitly asks for one.
Guardrails
- Prefer the user's requested commit message when they provide one.
- Do not create empty commits.
- Do not use
--no-verify, amend an existing commit, or bundle unrelated changes unless the user explicitly asks. - If hooks or commit validation fail, surface the failure instead of bypassing it.
More from sebkay/skills
generate-agent-instructions
Generate or update AGENTS.md for AI coding agents by extracting project-specific architecture, workflows, conventions, and integration details from the repository. Use when the user asks to create, refresh, or improve AGENTS.md or agent instructions for a codebase.
23audit-dead-code
Find dead code and cleanup candidates such as unused exports, unreachable branches, orphaned files, stale feature flags, dead registrations, and compatibility layers with no live callers. Use when auditing refactors, bundle-size cleanup, architecture simplification, pre-release cleanup, reviewing requests to find unused code or decide what can be deleted, or when deciding whether code can be safely removed or auto-fixed.
20add-plan-todos
Create and maintain granular todos in the active execution plan to reduce omissions, sequencing errors, and misunderstandings. Use when drafting a plan, updating scope, starting implementation, or recovering from uncertainty/blockers.
12audit-security
Audit code for security vulnerabilities such as broken access control, missing authorization, injection risks, secret exposure, unsafe file or process handling, SSRF, open redirects, cross-tenant data leaks, and insecure defaults. Use when reviewing routes, controllers, services, jobs, API handlers, admin tools, background workflows, infrastructure code, or any change that could affect trust boundaries, data exposure, or attacker-controlled input.
2responsive-design
Ensure that web applications and websites are usable and visually appealing across a wide range of devices and screen sizes. Focus on techniques such as flexible layouts, media queries, and responsive images.
2init
Initialize a coding session by extracting the highest-value facts about how to work in this codebase. Create or update `AGENTS.md` with compact, actionable guidance that helps future sessions avoid mistakes and ramp up quickly.
1