Use this page in the same order Core-Prompts is meant to be used:
- installed capabilities first
- UAC second
- broader repo tooling third
Start in your CLI, not in the repo.
If Core-Prompts is already installed in Codex, Gemini, Claude, or Kiro, begin with one of these asks:
| Capability | Example ask | What good output looks like |
|---|---|---|
docs-review-expert |
"Use docs-review-expert to review our docs IA and recommend the smallest rewrite that restores clarity." |
placement decisions, drift findings, and rewrite guidance |
gitops-review |
"Use gitops-review to tell me whether this branch is ready for PR and what blockers remain." |
gate type, blockers, companion reviews, and next steps |
supercharge |
"Use supercharge to make this feature brief execution-ready." |
stronger framing, constraints, and sequencing |
autosearch |
"Use autosearch to improve our review prompt so it catches more regressions without increasing noise." |
experiment design, evaluation, and a validated winner |
testing |
"Use testing to identify the edge cases and tests this change needs." |
prioritized tests and missing edge cases |
If you want an advisory agent rather than a direct skill invocation, start with:
| Agent | Example ask | Best when you need... |
|---|---|---|
mentor |
"Use mentor to tell me the next reversible move on this repo, or look at the left pane and review the error if I am in tmux." |
sequencing, scope control, and tmux-aware terminal context recovery |
docs-review-expert |
"Use docs-review-expert to review our onboarding docs for drift before release." |
structured documentation review |
gitops-review |
"Use gitops-review to judge whether we are ready to merge and release." |
a merge or release gate |
weekly-intel |
"Use weekly-intel to produce this week's update from our source set." |
a multi-source status summary |
Use UAC, the capability intake and uplift workflow, only when you are bringing in a new prompt-like source or intentionally changing canonical capability state.
Use UAC when you need to:
- plan how an external capability family would land in
ssot/and.meta/capabilities/ - benchmark a candidate before it mutates the repo
- apply a ship-ready capability into canonical state
Typical UAC progression:
bin/uac plan /absolute/path/to/family-folder
bin/uac judge /absolute/path/to/family-folder --quality-profile architecture
bin/uac apply /absolute/path/to/family-folder --yesPractical rule:
- use
planfor landing shape - use
judgefor the quality decision - use
applyonly when you intend to change canonical repo state
If judge says the landing is structurally close but still needs bounded behavioral proof, use autosearch for that proof step before apply.
For the full flow, go to UAC usage.
Once you are working at the repo layer, this is the shortest useful verification loop:
bin/capability-fabric build
bin/capability-fabric validate --strict
python3 scripts/smoke-clis.pyWhat this proves:
buildregenerates CLI skills, agents, bundled resources, and generated inspection viewsvalidate --strictchecks generated surfaces, manifests, and contract integritysmoke-clis.pyprobes local vendor CLIs and expected surface visibility where supported
Optional deploy dry run:
bin/capability-fabric deploy --dry-run --cli allWhen you install into a home target, Core-Prompts writes the installed version and release metadata into the standalone updater bundle:
~/.core-prompts-updater/VERSION~/.core-prompts-updater/RELEASE_SOURCE.env~/update_core_prompts.sh
Daily scheduled updater runs execute ~/update_core_prompts.sh --check-release before normal update sync. The check compares the installed standalone bundle against the latest immutable release tag agreed by the canonical remotes, updates ~/.core-prompts-state/release-watch.json, and never auto-installs.
Use the explicit acceptance step when you are ready to refresh the installed bundle. --accept-release is the explicit install/apply step:
~/update_core_prompts.sh --check-release
~/update_core_prompts.sh --accept-releasePending release state prints a warning on later updater runs, but it does not silently mutate the user system or block normal package/tool/prompt sync.
When you want to inspect the current emitted state without reading raw manifests or directories:
- Capability catalog: what ships and where it lands
- Release delta: what changed versus the previous manifest
- Consumer status: generated build, validation, and smoke summary
These are useful inspection aids, not the first thing a new user should read.
ssot/: canonical authored capability sourcesources/ssot-baselines/: preserved strongest baselines used for future judging.meta/capabilities/: machine-readable capability descriptors.codex/,.gemini/,.claude/,.kiro/: generated runtime surfacesdocs/CAPABILITY-CATALOG.md,docs/RELEASE-DELTA.md,docs/STATUS.md: generated inspection views