Commit graph

5 commits

Author SHA1 Message Date
Florian BRUNIAUX
1c27aa293d docs: add ShipTypes resource evaluation (score 2/5 - marginal) 2026-02-04 12:14:12 +01:00
Florian BRUNIAUX
09eb141976 docs: v3.9.6 - Trust Calibration, Vibe Coding Trap, reference.yaml sync
Added:
- ultimate-guide.md: Trust Calibration section (1.7) with research-backed verification strategies
- ultimate-guide.md: Infrastructure as Code Skills (Anton Babenko's terraform-skill)
- learning-with-ai.md: "The Vibe Coding Trap" anti-pattern (Karpathy, Feb 2025)
- learning-with-ai.md: "Reality of AI Productivity" section with research
- learning-with-ai.md: External resource link to leerob.com/ai (AI fundamentals)
- IDEAS.md: "Vibe Coding Discourse" watching entry

Changed:
- reference.yaml: Complete line number synchronization (~55 entries)
  Guide grew from ~9900 to 11154 lines; all deep_dive references updated
- Version bump: 3.9.5 → 3.9.6

Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
2026-01-20 08:36:35 +01:00
Florian BRUNIAUX
9c2ce7ccce docs: add IDEAS.md Watching section + README restructure (v3.9.5)
- Add "Watching (Waiting for Demand)" section to IDEAS.md
  - Track Multi-LLM Consultation Patterns research
  - Criteria: implement if 3+ requests
- Restructure README.md (~40% cognitive load reduction)
  - Collapsible ToC with 4 learning paths
  - Remove duplicate "5 Rules" section
- Version bump to 3.9.5

Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
2026-01-19 16:43:20 +01:00
Florian BRUNIAUX
34b2ca7200 feat(security): add security hardening guide and hooks v3.6.0
- Add guide/security-hardening.md (~10K) covering:
  - MCP vetting workflow with CVE-2025-53109/53110, 54135, 54136
  - Prompt injection evasion techniques (Unicode, ANSI, null bytes)
  - Secret detection tool comparison (Gitleaks, TruffleHog, GitGuardian)
  - Incident response procedures

- Add 3 new security hooks:
  - unicode-injection-scanner.sh: zero-width, RTL, ANSI escape detection
  - repo-integrity-scanner.sh: scan README/package.json for injection
  - mcp-config-integrity.sh: verify MCP config hash

- Update existing hooks:
  - prompt-injection-detector.sh: +ANSI, +null bytes, +nested cmd
  - output-secrets-scanner.sh: +env leakage, +generic tokens

- Update cross-references in ultimate-guide.md (§7.4, §8.6)
- Move MCP Security Hardening to Done in IDEAS.md

Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
2026-01-15 07:39:53 +01:00
Florian BRUNIAUX
fb49152ee5 chore: consolidate IDEAS.md and bump version to 3.3.1
- IDEAS.md: Reduce from 12 to 4 actionable research topics
- Unified "MCP Security Hardening" (merged 3 overlapping topics)
- Expanded Discarded section (3 → 16 entries with justifications)
- Technical writer agent validation against reference.yaml
- Version bump: 3.3.0 → 3.3.1 across all docs

Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
2026-01-14 21:12:04 +01:00