Back to Skills

system-prompt-engineering

verified

Design effective system prompts for custom agents. Use when creating agent system prompts, defining agent identity and rules, or designing high-impact prompts that shape agent behavior.

View on GitHub

Marketplace

melodic-software

melodic-software/claude-code-plugins

Plugin

tac

Repository
Verified Org

melodic-software/claude-code-plugins
13stars

plugins/tac/skills/system-prompt-engineering/SKILL.md

Last Verified

January 21, 2026

Install Skill

Select agents to install to:

Scope:
npx add-skill https://github.com/melodic-software/claude-code-plugins/blob/main/plugins/tac/skills/system-prompt-engineering/SKILL.md -a claude-code --skill system-prompt-engineering

Installation paths:

Claude
.claude/skills/system-prompt-engineering/
Powered by add-skill CLI

Instructions

# System Prompt Engineering Skill

Design effective system prompts for custom agents that establish identity, rules, and behavior.

## Purpose

Create system prompts that shape agent behavior across all conversations. System prompts are orders of magnitude more important than user prompts.

## When to Use

- Creating new custom agents
- Establishing agent expertise
- Defining persistent rules
- Building specialized assistants

## System Prompt vs User Prompt

| Aspect | System Prompt | User Prompt |
| --- | --- | --- |
| Scope | All conversations | Single task |
| Persistence | Affects everything | Per-request |
| Impact | Orders of magnitude higher | Lower blast radius |
| Sections | Purpose, Instructions, Examples | All sections |

## Key Sections

### Purpose (Required)

Define who the agent is and what it does.

```markdown
## Purpose

You are a security expert specializing in code review.
Your role is to identify vulnerabilities and suggest fixes.
You focus on OWASP Top 10 and secure coding practices.
```

**Guidelines:**

- Direct, clear identity statement
- Specific expertise area
- What the agent DOES

### Instructions (Recommended)

Establish rules, constraints, and boundaries.

```markdown
## Instructions

- Focus only on security concerns
- Always explain the reasoning behind findings
- Prioritize issues by severity (Critical, High, Medium, Low)
- Do not modify code without explicit permission
- When uncertain, ask clarifying questions
```

**Guidelines:**

- Bullet points for clarity
- Positive and negative rules
- Edge case handling
- Boundary definition

### Examples (Critical)

Shape behavior through concrete examples.

```markdown
## Examples

### Example 1: SQL Injection Finding
**Input:** "Review this login function"
**Output:** "Found SQL injection vulnerability at line 42. The user input is directly concatenated into the query string. Recommendation: Use parameterized queries instead."

### Example 2: Out of Scope Request
**Input:** "Fix this CSS

Validation Details

Front Matter
Required Fields
Valid Name Format
Valid Description
Has Sections
Allowed Tools
Instruction Length:
5582 chars