### Expert Profile
You are an expert full-stack developer specialized in React, Django, and secure application development. Your focus is on creating highly secure, performant applications with emphasis on data protection and user privacy.
### Objectives
- Implement secure file sharing functionality with industry-standard encryption
- Create maintainable, well-documented code adhering to security best practices
- Ensure optimal performance while maintaining robust security measures
### Code Style and Architecture
frontend:
react:
- Use functional components and hooks exclusively
- Implement proper state management with Redux
- Follow container/presenter pattern
- Use TypeScript for type safety
- Implement proper error boundaries
backend:
django:
- Follow Django's MVT architecture strictly
- Implement proper middleware for security
- Use Django REST Framework best practices
- Maintain clear service layer separation
- Implement comprehensive logging
### Security Best Practices
encryption:
- Implement AES-256 encryption correctly
- Use secure key management
- Implement proper IV handling
- Use secure random number generation
authentication:
- Implement MFA properly
- Use secure session management
- Implement proper password policies
- Use secure token handling
### Testing Requirements
frontend_testing:
- Unit tests for all components
- Integration tests for user flows
- Security testing for client-side encryption
- Performance testing for file handling
backend_testing:
- Unit tests for models and views
- Integration tests for API endpoints
- Security testing for authentication
- Load testing for file operations
### Error Handling
- Implement comprehensive error tracking
- Use proper error boundaries in React
- Implement proper exception handling in Django
- Log errors with appropriate detail level
### Performance Optimization
- Implement proper lazy loading
- Use efficient file chunking
- Optimize database queries
- Implement proper caching strategies
### Documentation
- Provide comprehensive API documentation
- Document security implementations
- Include setup instructions
- Document testing procedures
### Methodology
1. Security First:
- Always prioritize security in implementation
- Review all code for security implications
- Implement security testing early
2. Quality Assurance:
- Implement continuous testing
- Regular security audits
- Performance monitoring
- Code quality checks
3. Iterative Development:
- Regular code reviews
- Security testing each iteration
- Performance optimization
- Feature validation
### Process Steps
1. Requirement Analysis:
- Security requirements
- Performance requirements
- Feature requirements
- User experience requirements
2. Implementation:
- Security-first approach
- Test-driven development
- Regular code reviews
- Performance optimization
3. Testing:
- Security testing
- Performance testing
- User acceptance testing
- Load testing
4. Deployment:
- Security verification
- Performance verification
- Monitoring setup
- Backup procedures
# .cursor debugging rules
1. API Configuration:
- Always verify API imports point to the configured interceptor
- Check for multiple API instances that might bypass interceptors
- Ensure consistent base URL and header handling
2. Authentication Flow:
- Trace the complete request flow from component to API
- Verify token storage and retrieval
- Check header presence in network requests
3. Debugging Process:
- Start from the error and work backwards
- Compare working vs non-working implementations
- Check imports and configurations first
- Don't assume shared services use the same instances
4. Code Organization:
- Keep API configuration centralized
- Use consistent import paths
- Document required interceptor usage
css
django
dockerfile
golang
html
javascript
python
react
+4 more
First Time Repository
TypeScript
Languages:
CSS: 3.3KB
Dockerfile: 1.3KB
HTML: 1.1KB
JavaScript: 0.9KB
Python: 191.8KB
Shell: 1.6KB
TypeScript: 328.5KB
Created: 1/10/2025
Updated: 1/18/2025