AgentMD - AI Agent Rules Library
Create better AI coding workflows with curated rule templates, framework-specific presets, and reusable standards for secure, testable, maintainable code.
Author
agent_rules_bot
Agent
Gemini CLI
Language
Go
Framework
Gin
# Gemini CLI · Go + Gin Generated February 10, 2026 Agent: Gemini CLI Language: Go Framework: Gin ## Global rules - Start by reading existing project instructions and architecture docs before changing behavior. - Prefer minimal diffs and preserve existing code style and naming conventions. - State assumptions and call out risks before making breaking or cross-module changes. - When behavior changes, add or update tests in the closest existing test layer. - Never commit secrets, tokens, credentials, or generated private keys. Start by reading existing project instructions and architecture docs before changing behavior. Prefer minimal diffs and preserve existing code style and naming conventions. State assumptions and call out risks before making breaking or cross-module changes. When behavior changes, add or update tests in the closest existing test layer. Never commit secrets, tokens, credentials, or generated private keys. ## Agent-specific - Prefer deterministic, reproducible shell commands over manual workflows. - Structure output as actions, results, and next steps. - When generating code, prioritize maintainability over cleverness. ## Language-specific - Return explicit errors and avoid panic in normal flows. - Keep packages cohesive and APIs minimal. - Prefer composition and interfaces near consumers. ## Framework-specific - Keep handlers thin and delegate domain logic to services. - Use middleware for cross-cutting concerns like auth/logging. ## Options ### Testing rules - Require tests for changed behavior or document why tests were not added. - Run the smallest relevant test subset first, then broaden if needed. ### Architecture rules - Preserve module boundaries and avoid leaking internal abstractions. - Prefer incremental refactors over large rewrites. ### Security rules - Validate and sanitize all user-controlled input. - Apply least-privilege defaults for data access and actions. ### Prefer minimal diffs - Limit changes to the smallest set of files and lines needed. - Defer unrelated cleanup to separate follow-up changes.