/tsh-engineer-prompt
info
Not invoked directly by users. To trigger prompt engineering, use /tsh-implement — the Engineering Manager will automatically delegate to the Prompt Engineer.
Agent: Prompt Engineer
File: .github/internal-prompts/tsh-engineer-prompt.prompt.md
Designs, optimizes, audits, or reviews LLM application prompts for quality, security, and consistency.
How It's Triggered
/tsh-implement <JIRA_ID or task description>
The Engineering Manager identifies LLM prompt tasks in the plan and delegates them to the Prompt Engineer automatically.
What It Does
1. Context Gathering
- Reads the provided prompt(s) or requirements.
- Identifies the LLM provider, model, and use case.
- Discovers existing prompt patterns and conventions in the project via
tsh-technical-context-discovering.
2. Analysis
- Identifies issues — vague instructions, missing output format, injection vulnerabilities, no delimiter separation.
- Checks against anti-patterns from the
tsh-engineering-promptsskill.
3. Optimization or Creation
- Applies prompt structure patterns from
tsh-engineering-prompts. - Adds constraints, output format specification, and security layers.
- Uses delimiter separation between system instructions and user input.
4. Security Check
- Verifies prompt injection defenses — delimiter separation, input sanitization guidance, output validation.
- Flags any missing security layers.
Skills Loaded
tsh-engineering-prompts— Prompt structure patterns, optimization techniques, security patterns, templates, evaluation approaches, and anti-patterns.tsh-technical-context-discovering— Project conventions and existing prompt patterns.
Output
Each deliverable includes (sections omitted when not applicable):
- Tech Stack — LLM provider, model, temperature, relevant framework.
- Prompt Template — Complete prompt with system prompt, context/input sections, and output format specification.
- Integration Example — Non-production example showing how to use the prompt (LangChain, OpenAI SDK, Anthropic SDK, etc.). Focuses on integration guidance — full application logic is left to the Software Engineer.
- Security Assessment — For audits: vulnerability table with severity, CWE, location, impact, and fix. For creation/optimization: summary of security measures applied (three-layer defense).