Add parallel execution command templates and analysis prompts

- Introduced a comprehensive set of parallel execution command templates for various architectural and functional scenarios.
- Added prompts for analyzing system architecture, implementation patterns, performance, code quality, security, and project structure.
- Created templates for planning tasks, component implementation, migration strategies, and code reviews.
- Established a unified guideline for Gemini CLI usage, including command syntax, file patterns, and template best practices.
- Initialized VSCode settings file for project configuration.1
This commit is contained in:
catlog22
2025-09-09 21:48:40 +08:00
parent b906ce8715
commit 48843cc256
33 changed files with 1620 additions and 1685 deletions

View File

@@ -0,0 +1,16 @@
Analyze system architecture and design decisions:
## Required Analysis:
1. Identify main architectural patterns and design principles
2. Map module dependencies and component relationships
3. Assess integration points and data flow patterns
4. Evaluate scalability and maintainability aspects
5. Document architectural trade-offs and design decisions
## Output Requirements:
- Architectural diagrams or textual descriptions
- Dependency mapping with specific file references
- Integration point documentation with examples
- Scalability assessment and bottleneck identification
Focus on high-level design patterns and system-wide architectural concerns.

View File

@@ -0,0 +1,16 @@
Analyze implementation patterns and code structure:
## Required Analysis:
1. Identify common code patterns and architectural decisions
2. Extract reusable utilities and shared components
3. Document existing conventions and coding standards
4. Assess pattern consistency and identify anti-patterns
5. Suggest improvements and optimization opportunities
## Output Requirements:
- Specific file:line references for all findings
- Code snippets demonstrating identified patterns
- Clear recommendations for pattern improvements
- Standards compliance assessment
Focus on actionable insights and concrete implementation guidance.

View File

@@ -0,0 +1,16 @@
Analyze performance characteristics and optimization opportunities:
## Required Analysis:
1. Identify performance bottlenecks and resource usage patterns
2. Assess algorithm efficiency and data structure choices
3. Evaluate caching strategies and optimization techniques
4. Review memory management and resource cleanup
5. Document performance metrics and improvement opportunities
## Output Requirements:
- Performance bottleneck identification with specific locations
- Algorithm complexity analysis and optimization suggestions
- Caching pattern documentation and recommendations
- Memory usage patterns and optimization opportunities
Focus on measurable performance improvements and concrete optimization strategies.

View File

@@ -0,0 +1,16 @@
Analyze code quality and maintainability aspects:
## Required Analysis:
1. Assess code organization and structural quality
2. Evaluate naming conventions and readability standards
3. Review error handling and logging practices
4. Analyze test coverage and testing strategies
5. Document technical debt and improvement priorities
## Output Requirements:
- Code quality metrics and specific improvement areas
- Naming convention consistency analysis
- Error handling pattern documentation
- Test coverage assessment with gap identification
Focus on maintainability improvements and long-term code health.

View File

@@ -0,0 +1,16 @@
Analyze security implementation and potential vulnerabilities:
## Required Analysis:
1. Identify authentication and authorization mechanisms
2. Assess input validation and sanitization practices
3. Review data encryption and secure storage methods
4. Evaluate API security and access control patterns
5. Document security risks and compliance considerations
## Output Requirements:
- Security vulnerability findings with file:line references
- Authentication/authorization pattern documentation
- Input validation examples and gaps
- Encryption usage patterns and recommendations
Focus on identifying security gaps and providing actionable remediation steps.