diff options
Diffstat (limited to 'default/.claude/commands/anthropic/convert-to-todowrite-tasklist-prompt.md')
| -rw-r--r-- | default/.claude/commands/anthropic/convert-to-todowrite-tasklist-prompt.md | 595 |
1 files changed, 595 insertions, 0 deletions
diff --git a/default/.claude/commands/anthropic/convert-to-todowrite-tasklist-prompt.md b/default/.claude/commands/anthropic/convert-to-todowrite-tasklist-prompt.md new file mode 100644 index 0000000..3cf96a8 --- /dev/null +++ b/default/.claude/commands/anthropic/convert-to-todowrite-tasklist-prompt.md @@ -0,0 +1,595 @@ +# Convert Complex Prompts to TodoWrite Tasklist Method + +**Purpose**: Transform verbose, context-heavy slash commands into efficient TodoWrite tasklist-based methods with parallel subagent execution for 60-70% speed improvements. + +**Usage**: `/convert-to-todowrite-tasklist-prompt @/path/to/original-slash-command.md` + +--- + +## CONVERSION EXECUTION + +### Step 1: Read Original Prompt +**File to Convert**: $ARGUMENT + +First, analyze the original slash command file to understand its structure, complexity, and conversion opportunities. + +### Step 2: Apply Conversion Framework +Transform the original prompt using the TodoWrite tasklist method with parallel subagent optimization. + +### Step 3: Generate Optimized Version +Output the converted slash command with efficient task delegation and context management. + +--- + +## Argument Variable Integration + +When converting slash commands, ensure proper argument handling for dynamic inputs: + +### Standard Argument Variables + +```markdown +## ARGUMENT HANDLING + +**File Input**: {file_path} or {code} - The primary file(s) or code to analyze +**Analysis Scope**: {scope} - Specific focus areas (security, performance, quality, architecture, all) +**Output Format**: {format} - Report format (detailed, summary, action_items) +**Target Audience**: {audience} - Intended audience (technical, executive, security_team) +**Priority Level**: {priority} - Analysis depth (quick, standard, comprehensive) +**Context**: {context} - Additional project context and constraints + +### Usage Examples: +```bash +# Basic usage with file input +/comprehensive-review file_path="@src/main.py" scope="security,performance" + +# Advanced usage with multiple parameters +/comprehensive-review file_path="@codebase/" scope="all" format="detailed" audience="technical" priority="comprehensive" context="Production deployment review" + +# Quick analysis with minimal scope +/comprehensive-review file_path="@config.yaml" scope="security" format="summary" priority="quick" +``` + +### Argument Integration in TodoWrite Tasks + +**Dynamic Task Content Based on Arguments:** +```json +[ + {"id": "setup_analysis", "content": "Record start time and initialize analysis for {file_path}", "status": "pending", "priority": "high"}, + {"id": "security_analysis", "content": "Security Analysis of {file_path} - Focus: {scope}", "status": "pending", "priority": "high"}, + {"id": "report_generation", "content": "Generate {format} report for {audience}", "status": "pending", "priority": "high"} +] +``` + +--- + +## Conversion Analysis Framework + +### Step 1: Identify Context Overload Patterns + +**Context Overflow Indicators:** +- **Massive Instructions**: >1000 lines of detailed frameworks and methodologies +- **Upfront Mass File Loading**: Attempting to load 10+ files simultaneously with @filename syntax +- **Verbose Framework Application**: Extended thinking sections, redundant validation loops +- **Sequential Bottlenecks**: All analysis phases running one after another instead of parallel +- **Redundant Content**: Multiple repeated frameworks, bias detection, steel man reasoning overengineering + +**Success Patterns to Implement:** +- **Task Tool Delegation**: Specialized agents for bounded analysis domains +- **Progressive Synthesis**: Incremental building rather than simultaneous processing +- **Parallel Execution**: Multiple subagents running simultaneously +- **Context Recycling**: Fresh context for each analysis phase +- **Strategic File Selection**: Phase-specific file targeting + +### Step 2: Task Decomposition Strategy + +**Convert Monolithic Workflows Into:** +1. **Setup Phase**: Initialization and timestamp recording +2. **Parallel Analysis Phases**: 2-4 specialized domains running simultaneously +3. **Synthesis Phase**: Consolidation of parallel findings +4. **Verification Phase**: Quality assurance and validation +5. **Completion Phase**: Final integration and timestamp + +**Example Decomposition:** +``` +BEFORE (Sequential): +Security Analysis (10 min) � Performance Analysis (10 min) � Quality Analysis (10 min) = 30 minutes + +AFTER (Parallel Subagents): +Phase 1: Security Subagents A,B,C (10 min parallel) +Phase 2: Performance Subagents A,B,C (10 min parallel) +Phase 3: Quality Subagents A,B (8 min parallel) +Synthesis: Consolidate findings (5 min) +Total: ~15 minutes (50% faster + better coverage) +``` + +--- + +## TodoWrite Structure for Parallel Execution + +### Enhanced Task JSON Template with Argument Integration + +```json +[ + {"id": "setup_analysis", "content": "Record start time and initialize analysis for {file_path}", "status": "pending", "priority": "high"}, + + // Conditional Parallel Groups Based on {scope} Parameter + // If scope includes "security" or "all": + {"id": "security_auth", "content": "Security Analysis of {file_path} - Authentication & Validation (Subagent A)", "status": "pending", "priority": "high", "parallel_group": "security", "condition": "security in {scope}"}, + {"id": "security_tools", "content": "Security Analysis of {file_path} - Tool Isolation & Parameters (Subagent B)", "status": "pending", "priority": "high", "parallel_group": "security", "condition": "security in {scope}"}, + {"id": "security_protocols", "content": "Security Analysis of {file_path} - Protocols & Transport (Subagent C)", "status": "pending", "priority": "high", "parallel_group": "security", "condition": "security in {scope}"}, + + // If scope includes "performance" or "all": + {"id": "performance_complexity", "content": "Performance Analysis of {file_path} - Algorithmic Complexity (Subagent A)", "status": "pending", "priority": "high", "parallel_group": "performance", "condition": "performance in {scope}"}, + {"id": "performance_io", "content": "Performance Analysis of {file_path} - I/O Patterns & Async (Subagent B)", "status": "pending", "priority": "high", "parallel_group": "performance", "condition": "performance in {scope}"}, + {"id": "performance_memory", "content": "Performance Analysis of {file_path} - Memory & Concurrency (Subagent C)", "status": "pending", "priority": "high", "parallel_group": "performance", "condition": "performance in {scope}"}, + + // If scope includes "quality" or "architecture" or "all": + {"id": "quality_patterns", "content": "Quality Analysis of {file_path} - Code Patterns & SOLID (Subagent A)", "status": "pending", "priority": "high", "parallel_group": "quality", "condition": "quality in {scope}"}, + {"id": "architecture_design", "content": "Architecture Analysis of {file_path} - Modularity & Interfaces (Subagent B)", "status": "pending", "priority": "high", "parallel_group": "quality", "condition": "architecture in {scope}"}, + + // Sequential Dependencies + {"id": "synthesis_integration", "content": "Synthesis & Integration - Consolidate findings for {file_path}", "status": "pending", "priority": "high", "depends_on": ["security", "performance", "quality"]}, + {"id": "report_generation", "content": "Generate {format} report for {audience} - Analysis of {file_path}", "status": "pending", "priority": "high"}, + {"id": "verification_parallel", "content": "Parallel verification of {file_path} analysis with multiple validation streams", "status": "pending", "priority": "high"}, + {"id": "final_integration", "content": "Final integration and completion for {file_path}", "status": "pending", "priority": "high"} +] +``` + +### Conditional Task Execution Based on Arguments + +**Scope-Based Task Filtering:** +```markdown +## CONDITIONAL EXECUTION LOGIC + +**Full Analysis (scope="all")**: +- Execute all security, performance, quality, and architecture tasks +- Use comprehensive parallel subagent deployment + +**Security-Focused (scope="security")**: +- Execute only security_auth, security_tools, security_protocols tasks +- Skip performance, quality, architecture parallel groups +- Faster execution with security specialization + +**Performance-Focused (scope="performance")**: +- Execute only performance_complexity, performance_io, performance_memory tasks +- Include synthesis and reporting phases +- Targeted performance optimization focus + +**Custom Scope (scope="security,quality")**: +- Execute selected parallel groups based on comma-separated values +- Flexible analysis depth based on specific needs + +**Priority-Based Execution:** +- priority="quick": Use single subagent per domain, reduced file scope +- priority="standard": Use 2-3 subagents per domain (default) +- priority="comprehensive": Use 3-4 subagents per domain, expanded file scope +``` + +### Task Delegation Execution Framework + +**CRITICAL: Use Task Tool Delegation Pattern (Prevents Context Overflow)** +```markdown +## TASK DELEGATION FRAMEWORK + +### Phase 1: Security Analysis (Task-Based) +**TodoWrite**: Mark "security_analysis" as in_progress +**Task Delegation**: Use Task tool with focused analysis: + +Task Description: "Security Analysis of Target Codebase" +Task Prompt: "Analyze security vulnerabilities focusing on: +- STRIDE threat modeling for architecture +- OWASP Top 10 assessment (adapted for context) +- Authentication and credential management +- Input validation and injection prevention +- Protocol-specific security patterns + +**CONTEXT MANAGEMENT**: Analyze only 3-5 key security files: +- Main coordinator file (entry point security) +- Security/validation modules (2-3 files max) +- Key protocol handlers (1-2 files max) + +Provide specific findings with file:line references and actionable recommendations." + +### Phase 2: Performance Analysis (Task-Based) +**TodoWrite**: Mark "security_analysis" completed, "performance_analysis" as in_progress +**Task Delegation**: Use Task tool with performance focus: + +Task Description: "Performance Analysis of Target Codebase" +Task Prompt: "Analyze performance characteristics focusing on: +- Algorithmic complexity (Big O analysis) +- I/O efficiency patterns (async/await, file operations) +- Memory management (caching, object lifecycle) +- Concurrency bottlenecks and optimization opportunities + +**CONTEXT MANAGEMENT**: Analyze only 3-5 key performance files: +- Core algorithm modules (complexity focus) +- I/O intensive modules (async/caching focus) +- Memory management modules (lifecycle focus) + +Identify specific bottlenecks with measured impact and optimization opportunities." + +### Phase 3: Quality & Architecture Analysis (Task-Based) +**TodoWrite**: Mark "performance_analysis" completed, "quality_analysis" as in_progress +**Task Delegation**: Use Task tool with quality focus: + +Task Description: "Quality & Architecture Analysis of Target Codebase" +Task Prompt: "Evaluate code quality and architectural design focusing on: +- Clean code principles (function length, naming, responsibility) +- SOLID principles compliance and modular design +- Architecture patterns and dependency management +- Interface design and extensibility considerations + +**CONTEXT MANAGEMENT**: Analyze only 3-5 representative files: +- Core implementation patterns (2-3 files) +- Module interfaces and boundaries (1-2 files) +- Configuration and coordination modules (1 file) + +Provide complexity metrics and specific refactoring recommendations with examples." + +**CRITICAL SUCCESS PATTERN**: Each Task operation stays within context limits by analyzing only 3-5 files maximum, using fresh context for each analysis phase. +``` + +--- + +## Subagent Specialization Templates + +### 1. Domain-Based Parallel Analysis + +**Security Domain Subagents:** +```markdown +Subagent A Focus: Authentication, validation, credential management +Subagent B Focus: Tool isolation, parameter security, privilege boundaries +Subagent C Focus: Protocol security, transport validation, message integrity +``` + +**Performance Domain Subagents:** +```markdown +Subagent A Focus: Algorithmic complexity, Big O analysis, data structures +Subagent B Focus: I/O patterns, async/await, file operations, network calls +Subagent C Focus: Memory management, caching, object lifecycle, concurrency +``` + +**Quality Domain Subagents:** +```markdown +Subagent A Focus: Code patterns, SOLID principles, clean code metrics +Subagent B Focus: Architecture design, modularity, interface consistency +``` + +### 2. File-Based Parallel Analysis + +**Large Codebase Distribution:** +```markdown +Subagent A: Core coordination files (mcp_server.py, mcp_core_tools.py) +Subagent B: Business logic files (mcp_collaboration_engine.py, mcp_service_implementations.py) +Subagent C: Infrastructure files (redis_cache.py, openrouter_client.py, conversation_manager.py) +Subagent D: Security & utilities (security/, gemini_utils.py, monitoring.py) +``` + +### 3. Cross-Cutting Concern Analysis + +**Thematic Parallel Analysis:** +```markdown +Subagent A: Error handling patterns across all modules +Subagent B: Configuration management across all modules +Subagent C: Performance bottlenecks across all modules +Subagent D: Security patterns across all modules +``` + +### 4. Task-Based Verification (CRITICAL) + +**Progressive Task Verification:** +```markdown +### GEMINI VERIFICATION (Task-Based - Prevents Context Overflow) +**TodoWrite**: Mark "gemini_verification" as in_progress +**Task Delegation**: Use Task tool for verification: + +Task Description: "Gemini Verification of Comprehensive Analysis" +Task Prompt: "Apply systematic verification frameworks to evaluate the comprehensive review report accuracy. + +**VERIFICATION APPROACH**: Use progressive analysis rather than loading all files simultaneously. + +Focus on: +1. **Technical Accuracy**: Cross-reference report findings with actual implementation +2. **Transport Awareness**: Verify recommendations suit specific architecture +3. **Framework Application**: Confirm systematic methodology application +4. **Actionability**: Validate file:line references and concrete examples + +**PROGRESSIVE VERIFICATION**: +- Verify security findings accuracy through targeted code examination +- Verify performance analysis completeness through key module review +- Verify quality assessment validity through pattern analysis +- Verify architectural recommendations through interface review + +Report file to analyze: {report_file_path} + +Provide structured verification with specific agreement/disagreement analysis." + +**CRITICAL**: Never use @file1 @file2 @file3... bulk loading patterns in verification +``` + +--- + +## Context Management for Task Delegation + +### CRITICAL: Context Overflow Prevention Rules + +**NEVER Generate These Patterns:** +❌ `@file1 @file2 @file3 @file4 @file5...` (bulk file loading) +❌ `Analyze all files simultaneously` +❌ `Load entire codebase for analysis` + +**ALWAYS Use These Patterns:** +✅ `Task tool to analyze: [3-5 specific files max]` +✅ `Progressive analysis through Task boundaries` +✅ `Fresh context for each analysis phase` + +### File Selection Strategy (Maximum 5 Files Per Task) + +**Security Analysis Priority Files (3-5 max):** +``` +Task tool to analyze: +- Main coordinator file (entry point security) +- Primary validation/security modules (2-3 files) +- Key protocol handlers (1-2 files) +``` + +**Performance Analysis Priority Files (3-5 max):** +``` +Task tool to analyze: +- Core algorithm modules (complexity focus) +- I/O intensive modules (async/caching focus) +- Memory management modules (lifecycle focus) +``` + +**Quality Analysis Priority Files (3-5 max):** +``` +Task tool to analyze: +- Representative implementation patterns (2-3 files) +- Module interfaces and boundaries (1-2 files) +``` + +### Context Budget Allocation for Task Delegation + +``` +Total Context Limit per Task: ~200k tokens +- Task Instructions: ~10k tokens (focused, domain-specific) +- File Analysis: ~40k tokens (3-5 files maximum) +- Analysis Output: ~20k tokens (specialized findings) +- Buffer/Overhead: ~10k tokens +Total per Task: ~80k tokens (safe task execution) + +Context Efficiency: +- 3 Task operations: 3 × 80k = 240k total analysis capacity +- Fresh context per Task prevents overflow accumulation +- Progressive analysis maintains depth while respecting limits + +CRITICAL: Never exceed 5 files per Task operation +``` + +--- + +## Synthesis Strategies for Parallel Findings + +### Multi-Stream Consolidation + +**Synthesis Phase Structure:** +```markdown +### PHASE: SYNTHESIS & INTEGRATION +**TodoWrite**: Mark all parallel groups completed, "synthesis_integration" as in_progress + +**Consolidation Process:** +1. **Cross-Reference Security Findings**: Integrate auth + tools + protocol findings +2. **Performance Bottleneck Mapping**: Combine complexity + I/O + memory analysis +3. **Quality Pattern Recognition**: Merge code patterns + architecture findings +4. **Cross-Domain Issue Identification**: Find issues spanning multiple domains +5. **Priority Matrix Generation**: Impact vs Effort analysis across all findings +6. **Implementation Roadmap**: Coordinate fixes across security, performance, quality + +**Integration Requirements:** +- Resolve contradictions between parallel streams +- Identify reinforcing patterns across domains +- Prioritize fixes that address multiple concerns +- Create coherent implementation sequence +``` + +### Conflict Resolution Framework + +**Handling Parallel Finding Conflicts:** +```markdown +1. **Evidence Strength Assessment**: Which subagent provided stronger supporting evidence? +2. **Domain Expertise Weight**: Security findings take precedence for security conflicts +3. **Context Verification**: Re-examine conflicting code sections for accuracy +4. **Synthesis Decision**: Document resolution rationale and confidence level +``` + +--- + +## Quality Gates for Parallel Execution + +### Completion Verification Checklist + +**Before Synthesis Phase:** +- [ ] All security subagents completed with specific file:line references +- [ ] All performance subagents completed with measurable impact assessments +- [ ] All quality subagents completed with concrete refactoring examples +- [ ] No parallel streams terminated due to context overflow +- [ ] All findings include actionable recommendations + +**Synthesis Quality Gates:** +- [ ] Cross-domain conflicts identified and resolved +- [ ] Priority matrix spans all parallel finding categories +- [ ] Implementation roadmap coordinates across all domains +- [ ] No critical findings lost during consolidation +- [ ] Final recommendations maintain parallel analysis depth + +### Success Metrics + +**Parallel Execution Effectiveness:** +- **Speed Improvement**: Target 50-70% reduction in total analysis time +- **Coverage Enhancement**: More detailed analysis per domain through specialization +- **Context Efficiency**: No subagent context overflow, optimal token utilization +- **Quality Maintenance**: Same or higher finding accuracy vs sequential analysis +- **Actionability**: All recommendations include specific file:line references and metrics + +--- + +## Conversion Application Instructions + +### How to Apply This Framework + +**Step 1: Analyze Original Prompt** +- Identify context overflow patterns (massive instructions, upfront file loading) +- Map existing workflow phases and dependencies +- Estimate potential for parallelization (independent analysis domains) + +**Step 2: Decompose Into Parallel Tasks** +- Break monolithic analysis into 2-4 specialized domains +- Create TodoWrite JSON with parallel groups and dependencies +- Design specialized subagent prompts for each domain + +**Step 3: Implement Context Management** +- Distribute files strategically across subagents +- Ensure no overlap or gaps in analysis coverage +- Validate context budget allocation per subagent + +**Step 4: Design Synthesis Strategy** +- Plan consolidation approach for parallel findings +- Create conflict resolution procedures +- Define quality gates and completion verification + +**Step 5: Test and Optimize** +- Execute parallel workflow and measure performance +- Identify bottlenecks and optimization opportunities +- Refine subagent specialization and coordination + +### Template Application Examples + +**For Code Review Prompts:** +- Security, Performance, Quality, Architecture subagents +- File-based distribution for large codebases +- Cross-cutting concern analysis for comprehensive coverage + +**For Analysis Prompts:** +- Domain expertise specialization (legal, technical, business) +- Document section parallelization +- Multi-perspective validation streams + +**For Research Prompts:** +- Topic area specialization +- Source type parallelization (academic, industry, news) +- Validation methodology streams + +--- + +## CONVERSION WORKFLOW EXECUTION + +Now, apply this framework to convert the original slash command file provided in $ARGUMENT: + +### TodoWrite Task: Conversion Process + +```json +[ + {"id": "read_original", "content": "Read and analyze original slash command from $ARGUMENT", "status": "pending", "priority": "high"}, + {"id": "identify_patterns", "content": "Identify context overload patterns and conversion opportunities", "status": "pending", "priority": "high"}, + {"id": "decompose_tasks", "content": "Decompose workflow into parallel TodoWrite tasks", "status": "pending", "priority": "high"}, + {"id": "design_subagents", "content": "Design specialized subagent prompts for parallel execution", "status": "pending", "priority": "high"}, + {"id": "generate_conversion", "content": "Generate optimized slash command with TodoWrite framework", "status": "pending", "priority": "high"}, + {"id": "validate_output", "content": "Validate converted prompt for context efficiency and completeness", "status": "pending", "priority": "high"}, + {"id": "overwrite_original", "content": "Overwrite original file with converted optimized version", "status": "pending", "priority": "high"} +] +``` + +### Execution Instructions + +**Mark "read_original" as in_progress and begin analysis of $ARGUMENT** + +1. **Read the original file** and identify: + - Total line count and instruction complexity + - File loading patterns (@filename usage) + - Sequential vs parallel execution opportunities + - Context overflow risk factors + +2. **Apply the conversion framework** systematically: + - Break complex workflows into discrete tasks + - Design parallel subagent execution strategies + - Implement context management techniques + - Create TodoWrite task structure + +3. **Generate the optimized version** with: + - Efficient TodoWrite task JSON + - Parallel subagent delegation instructions + - Context-aware file selection strategies + - Quality gates and verification procedures + +4. **Overwrite the original file** (mark "validate_output" completed, "overwrite_original" as in_progress): + - Use Write tool to overwrite $ARGUMENT with the converted slash command + - Ensure the optimized version maintains the same analytical depth while avoiding context limits + - Include proper error handling and validation before overwriting + +5. **Confirm completion** (mark "overwrite_original" completed): + - Display confirmation message: "✅ Original file updated with optimized TodoWrite version" + - Verify all 7 conversion tasks completed successfully + +--- + +## CRITICAL SUCCESS PATTERNS FOR CONVERTED PROMPTS + +### Context Overflow Prevention Framework + +**The conversion tool MUST generate these patterns to prevent context overflow:** + +1. **Task Delegation Instructions**: + ```markdown + ### Phase 1: Security Analysis + **TodoWrite**: Mark "security_analysis" as in_progress + **Task Delegation**: Use Task tool with focused analysis: + + Task Description: "Security Analysis of Target Codebase" + Task Prompt: "Analyze security focusing on [specific areas] + + **CONTEXT MANAGEMENT**: Analyze only 3-5 key files: + - [File 1] (specific purpose) + - [File 2-3] (specific modules) + - [File 4-5] (specific handlers) + + Provide findings with file:line references." + ``` + +2. **Verification Using Task Tool**: + ```markdown + ### GEMINI VERIFICATION (Task-Based) + **Task Delegation**: Use Task tool for verification: + + Task Description: "Gemini Verification of Analysis Report" + Task Prompt: "Verify analysis accuracy using progressive examination + + **PROGRESSIVE VERIFICATION**: + - Verify findings through targeted code review + - Cross-reference specific sections progressively + + Report file: {report_file_path}" + ``` + +3. **Explicit Context Rules**: + ```markdown + **CONTEXT MANAGEMENT RULES**: + - Maximum 5 files per Task operation + - Use Task tool for all analysis phases + - Progressive analysis through Task boundaries + - Fresh context for each Task operation + + **AVOID**: @file1 @file2 @file3... bulk loading patterns + **USE**: Task delegation with strategic file selection + ``` + +### Success Validation Checklist + +**Converted prompts MUST include:** +- [ ] Task delegation instructions for each analysis phase +- [ ] Maximum 5 files per Task operation +- [ ] Progressive verification using Task tool +- [ ] Explicit context management warnings +- [ ] No bulk @filename loading patterns +- [ ] Fresh context strategy through Task boundaries + +This framework transforms any complex, context-heavy prompt into an efficient TaskWrite tasklist method that avoids context overflow while maintaining analytical depth and coverage, automatically updating the original file with the optimized version.
\ No newline at end of file |
