Skip to content

Instantly share code, notes, and snippets.

View jordotech's full-sized avatar
🎯
Focusing

jordotech jordotech

🎯
Focusing
  • Austin, TX
  • 01:36 (UTC -05:00)
View GitHub Profile
@jordotech
jordotech / custom_modes.json
Created May 18, 2025 15:19
Jordan's global roo modes
{
"customModes": [
{
"slug": "sparc",
"name": "⚡️ SPARC Orchestrator",
"roleDefinition": "You are SPARC, the orchestrator of complex workflows. You break down large objectives into delegated subtasks aligned to the SPARC methodology. You ensure secure, modular, testable, and maintainable delivery using the appropriate specialist modes.",
"customInstructions": "Follow SPARC:\n\n1. Specification: Clarify objectives and scope. Never allow hard-coded env vars.\n2. Pseudocode: Request high-level logic with TDD anchors.\n3. Architecture: Ensure extensible system diagrams and service boundaries.\n4. Refinement: Use TDD, debugging, security, and optimization flows.\n5. Completion: Integrate, document, and monitor for continuous improvement.\n\nUse `new_task` to assign:\n- spec-pseudocode\n- architect\n- code\n- tdd\n- debug\n- security-review\n- docs-writer\n- integration\n- post-deployment-monitoring-mode\n- refinement-optimization-mode\n\nValidate:\n✅ Files < 500 lines\n✅ No hard-coded
@jordotech
jordotech / .env
Last active July 2, 2025 15:51
auth0_authorizer
IMAGE_TAG=
AUTH0_M2M_CLIENT_SECRET=
AUTH0_M2M_CLIENT_ID=
AUTH0_DOMAIN=changeme.us.auth0.com
AUTH0_JWKS_URI=https://changeme/.well-known/jwks.json
@jordotech
jordotech / over-engineer-check.md
Created September 4, 2025 16:54
Roo slash command for over-engineer code assessment
description Analyze codebase for over-engineering patterns and unnecessary complexity

Over-Engineering Check

You are tasked with analyzing a codebase to identify signs of over-engineering, unnecessary abstractions, and architectural complexity that doesn't add business value.

Instructions

@jordotech
jordotech / Default.json
Created December 19, 2025 13:59
iterm2 default profile
{
"Ansi 7 Color (Light)" : {
"Red Component" : 0.7810397744178772,
"Color Space" : "sRGB",
"Blue Component" : 0.78104829788208008,
"Alpha Component" : 1,
"Green Component" : 0.78105825185775757
},
"Ansi 15 Color (Light)" : {
"Red Component" : 0.99999600648880005,

PR #357 Assessment: Feature Flag Registry Improvements

PR: https://github.com/Faction-V/platform-api/pull/357 Author: masha-maltseva (via Cursor) Branch: feat/BE-762-feature-flag-registry-improvementsfeature/BE-762-be-ff-enforce Files changed: 1 (src/feature_flag_registry.py, +13 / -214)


Summary of Changes

Feature Flags Architecture — Response

Good doc, Masha. The direction is right. Here's my take with some additional considerations.

Where I Agree

  1. Registry as source of truth for what flags exist — yes, absolutely
  2. Validate flag keys on write — reject keys not in registry. This prevents drift
  3. Merge on read — registry defaults + per-org overrides. This is the core change
  4. Show ALL registry flags in the admin UI — this is actually the highest-impact change
@jordotech
jordotech / ey-sso-update.md
Last active February 23, 2026 15:06
EY SSO Integration: Technical Update (Auth0 + Azure Entra ID)

EY SSO Integration: Technical Update

Overview

This document describes an enterprise SSO implementation for EY using Auth0 and Azure Entra ID. Phase 1 is complete and validated end-to-end on staging as of February 23, 2026.

Architecture

Authentication Flow

  • Email-first discovery: Users enter email, backend checks org memberships AND email domain for SSO configuration
  • Dual-path discovery: Both membership-based and domain-based checks always run, results are merged with deduplication
@jordotech
jordotech / ey-q4-2025-anthropic-cost-estimate.md
Last active February 23, 2026 17:55
EY Agentic-Backend Q4 2025 Anthropic Inference Cost Estimate

EY Agentic-Backend: Q4 2025 Anthropic Inference Cost Estimate

Prepared: 2026-02-23 Period: October 1 - December 31, 2025 Data sources:

  • platform.claude.com cost exports (3 CSV files, full months)
  • Langfuse project cap-llm token usage (Nov 22 - Dec 31, 2025)

@jordotech
jordotech / sso-auth-agentic-backend.md
Last active February 25, 2026 06:07
SSO Authentication Support for agentic-backend — problem analysis and fix

SSO Authentication Support for agentic-backend

Problem

As part of the Auth0 tenant migration (COM-18), we identified that SSO users cannot authenticate with agentic-backend. This is a pre-existing gap — not a regression from the migration — but it blocks SSO rollout for EY and future enterprise clients.

Root Cause

The frontend sends tokens differently depending on auth method:

Platform-API PR Comparison: #365 vs #363

PR #365 (sso_user_id_updates by CapitolCoder) — 3,143 additions, 80 deletions, 16 files PR #363 (feature/COM-18-ad-phase-1 by jordotech) — 3,124 additions, 264 deletions, 22 files

Both PRs target the same goal: make platform-api Auth0-aware so SSO users get proper UUIDs instead of Auth0 sub strings.

Scope Comparison

| Aspect | PR #365 | PR #363 |