business-feature-docs
EasyPlatform Business Feature Documentation
Generate comprehensive business feature documentation following the GOLD STANDARD template.
⚠️ MUST READ References
IMPORTANT: You MUST read these reference files for complete protocol. Do NOT skip.
- ⚠️ MUST READ
.claude/skills/shared/business-docs-26-sections.md— 26-section template structure - ⚠️ MUST READ
.claude/skills/shared/bdd-gherkin-templates.md— BDD/Gherkin scenario templates - ⚠️ MUST READ
.claude/skills/shared/anti-hallucination-protocol.md— validation checkpoints, confidence levels - ⚠️ MUST READ
docs/features/README.ExampleFeature1.md— gold standard example - ⚠️ MUST READ
docs/templates/detailed-feature-docs-template.md— full template - ⚠️ MUST READ
docs/templates/detailed-feature-docs-template.ai.md— AI companion template
[CRITICAL] MANDATORY CODE EVIDENCE RULE
EVERY test case MUST have verifiable code evidence. This is non-negotiable.
More from duc01226/easyplatform
pdf-to-markdown
[Document Processing] Use when you need to convert PDF files to Markdown with support for native text PDFs and scanned documents (OCR).
683markdown-to-docx
[Document Processing] Use when you need to convert markdown files to Microsoft Word ( DOCX) format with GFM support and math rendering.
433markdown-to-pdf
[Document Processing] Use when you need to convert markdown files to PDF with syntax highlighting and custom CSS support.
403docx-to-markdown
[Document Processing] Use when you need to convert Microsoft Word ( DOCX) files to Markdown with GFM support (tables, images, code blocks).
294ui-ux-pro-max
[Frontend] Frontend UI/UX design intelligence - activate FIRST when user requests beautiful, stunning, gorgeous, or aesthetic interfaces. 50 styles, 21 palettes, 50 font pairings, 20 charts, 8 stacks. Triggers on ui design, ux design, design system, color palette, typography, glassmorphism, claymorphism, neumorphism, bento grid, font pairing, ui-ux-pro-max, stunning interface, beautiful ui.
83arch-security-review
[Architecture] Use when reviewing code for security vulnerabilities, implementing authorization, or ensuring data protection.
64