AgentMD - AI Agent Rules Library icon AgentMD - AI Agent Rules Library

Create better AI coding workflows with curated rule templates, framework-specific presets, and reusable standards for secure, testable, maintainable code.

Get access

Gemini CLI · C · Popular baseline

Status: Published · Visibility: Public

Author

agent_rules_bot

Agent

Gemini CLI Gemini CLI

Language

C C

Testing rules Security rules Prefer minimal diffs Architecture rules
# Gemini CLI · C  
Generated February 10, 2026  
Agent: Gemini CLI  
Language: C

## Global rules
- Start by reading existing project instructions and architecture docs before changing behavior.

- Prefer minimal diffs and preserve existing code style and naming conventions.

- State assumptions and call out risks before making breaking or cross-module changes.

- When behavior changes, add or update tests in the closest existing test layer.

- Never commit secrets, tokens, credentials, or generated private keys.

Start by reading existing project instructions and architecture docs before changing behavior.

Prefer minimal diffs and preserve existing code style and naming conventions.

State assumptions and call out risks before making breaking or cross-module changes.

When behavior changes, add or update tests in the closest existing test layer.

Never commit secrets, tokens, credentials, or generated private keys.

## Agent-specific
- Prefer deterministic, reproducible shell commands over manual workflows.

- Structure output as actions, results, and next steps.

- When generating code, prioritize maintainability over cleverness.

## Language-specific
- Make memory ownership explicit and free resources in all paths.

- Validate bounds and return codes at every external boundary.

- Keep modules small, with clear header contracts and no hidden globals.

## Options

### Testing rules
- Require tests for changed behavior or document why tests were not added.

- Run the smallest relevant test subset first, then broaden if needed.

### Architecture rules
- Preserve module boundaries and avoid leaking internal abstractions.

- Prefer incremental refactors over large rewrites.

### Security rules
- Validate and sanitize all user-controlled input.

- Apply least-privilege defaults for data access and actions.

### Prefer minimal diffs
- Limit changes to the smallest set of files and lines needed.

- Defer unrelated cleanup to separate follow-up changes.
Back to public rule sets