chore: add Claude personas, skills, memory, and project docs
Co-Authored-By: Claude Sonnet 4.6 <noreply@anthropic.com>
This commit is contained in:
@@ -0,0 +1,11 @@
|
||||
# Memory Index
|
||||
|
||||
- [Shell environment setup](./feedback_shell_env.md) — source SDKMAN and nvm before running java/mvn/node/npm
|
||||
- [Gitea instance](./reference_gitea.md) — self-hosted Gitea at 192.168.178.71:3005, MCP server configured as "gitea"
|
||||
- [Issue workflow](./feedback_issue_workflow.md) — create Gitea issues not todo files; feature/bug/devops labels with title formats
|
||||
- [Branch and PR workflow](./feedback_branch_pr.md) — always branch + PR, never commit directly to main
|
||||
- [Docker commands one line](./feedback_docker_commands.md) — always write docker commands on a single line for easy copy-paste
|
||||
- [Red/Green TDD](./feedback_tdd.md) — always write failing test first before any production code
|
||||
- [TDD red/green flow](./feedback_tdd_flow.md) — write failing test then immediately go green, no pausing between phases
|
||||
- [Atomic commits](./feedback_atomic_commits.md) — one logical change per commit, never bundle multiple things
|
||||
- [Single-family access model](./project_single_family_access.md) — no multi-tenancy, no ownership, no row-level security; role-based access is sufficient
|
||||
@@ -0,0 +1,10 @@
|
||||
---
|
||||
name: Single-family access model
|
||||
description: Familienarchiv is used by one family — no multi-tenancy, no document ownership, no row-level security needed
|
||||
type: project
|
||||
---
|
||||
|
||||
The archive serves a single family. There is no multi-tenant isolation, no document ownership, and no row-level access control. Everyone with the correct role (READ_ALL / WRITE_ALL) can read and edit all documents. Do not suggest row-level security, per-user document ownership, or tenant filtering.
|
||||
|
||||
**Why:** Single-family use case — all authenticated users with the right role are trusted equally.
|
||||
**How to apply:** Skip IDOR / ownership-check recommendations. Role-based access via `@RequirePermission` is the correct and sufficient access control model for this app.
|
||||
Reference in New Issue
Block a user