
Reverse-Engineer a Proprietary Hardware Protocol with AI
Use an advanced AI model to analyze raw packet sniffer logs and research notes to deduce an unknown, proprietary Bluetooth protocol and create a tool to interact with the hardware.
Boost your AI coding assistant's performance by preloading your application's architecture using text-based Mermaid diagrams. This gives the AI deep context, resulting in faster, more accurate code-related answers.

with Claire Vo

Create text-based Mermaid diagrams representing your application flows, database schemas, or user interactions. You can generate these from your existing codebase using an AI prompt or as part of your development lifecycle.
Store the Mermaid diagrams as markdown (.md) files in a dedicated directory within your project repository, for example: memory/ai/diagrams/.
Use a terminal command to find all diagram files, concatenate them, and append them to your AI's system prompt. This loads the entire context at the start of your session.
claude append-system-prompt "$(cat memory/ai/diagrams/**/*.md)"Ask the AI complex questions about your codebase. The AI can now answer instantly without searching files, as the information is in its preloaded context.
please explain the authentication flow
Use an advanced AI model to analyze raw packet sniffer logs and research notes to deduce an unknown, proprietary Bluetooth protocol and create a tool to interact with the hardware.

Delegate a complex, multi-format data migration to an AI agent. The model will build the migration script, create a scalable testing system to validate its own work, and repair issues in a self-sustaining loop.

Use an advanced AI model like GPT-5.5 Pro in Codex to automatically analyze a CSV list of security vulnerabilities, group them thematically, propose architectural changes, and implement the necessary code fixes.
Join 100,000+ product managers who use ChatPRD to write better docs, align teams faster, and build products users love.