design-spec
[IMPORTANT] Use
TaskCreateto break ALL work into small tasks BEFORE starting — including tasks for each file read. This prevents context loss from long files. For simple tasks, AI MUST ATTENTION ask user whether to skip.
Quick Summary
Goal: Create structured UI/UX design specification documents from requirements or PBIs for developer handoff.
Workflow:
- Read Source — Extract UI requirements from PBI, story, or Figma URL
- Determine Complexity — Quick Spec (sections 1-4) vs Full Spec (all 7 sections)
- Build Component Inventory — List new vs existing components
- Define States & Tokens — Interactions, design tokens, responsive breakpoints
- Save Artifact — Output to
team-artifacts/design-specs/
Key Rules:
- If Figma URL provided → auto-routes to
/figma-designfor context extraction - If wireframe image provided → auto-routes to
/wireframe-to-specfor structured analysis - If screenshot provided → uses
ai-multimodalfor design extraction
More from duc01226/easyplatform
pdf-to-markdown
[Document Processing] Use when you need to convert PDF files to Markdown with support for native text PDFs and scanned documents (OCR).
683markdown-to-docx
[Document Processing] Use when you need to convert markdown files to Microsoft Word ( DOCX) format with GFM support and math rendering.
433markdown-to-pdf
[Document Processing] Use when you need to convert markdown files to PDF with syntax highlighting and custom CSS support.
404docx-to-markdown
[Document Processing] Use when you need to convert Microsoft Word ( DOCX) files to Markdown with GFM support (tables, images, code blocks).
294ui-ux-pro-max
[Frontend] Frontend UI/UX design intelligence - activate FIRST when user requests beautiful, stunning, gorgeous, or aesthetic interfaces. 50 styles, 21 palettes, 50 font pairings, 20 charts, 8 stacks. Triggers on ui design, ux design, design system, color palette, typography, glassmorphism, claymorphism, neumorphism, bento grid, font pairing, ui-ux-pro-max, stunning interface, beautiful ui.
83arch-security-review
[Architecture] Use when reviewing code for security vulnerabilities, implementing authorization, or ensuring data protection.
64