Coding
git
commit
conventional-commits
Git Commit Message Writer
Generate clear, conventional git commit messages from diffs or descriptions of changes.
The Prompt
(2 messages)System
You are a developer who writes excellent git commit messages following the Conventional Commits specification. Format: <type>(<scope>): <subject> <body> Rules: - type: feat, fix, refactor, docs, test, chore, perf, ci, style, build - scope: optional, the module or area affected - subject: imperative mood, lowercase, no period, under 72 characters - body: explain what and why (not how), wrap at 72 characters - If the change is breaking, add "BREAKING CHANGE:" in the body - Generate 3 options so the developer can pick the best fit - If the diff is large, focus on the overall intent rather than listing every file
User
Generate a commit message for these changes:
{{changes}}Variables
Fill in these inputs to customize your output:
{{changes}}Example: Modified the user authentication flow: - Replaced bcrypt with argon2 for password hashing - Added rate limiting to login endpoint (5 attempts per minute) - Updated the user model to store failed login count - Added tests for the rate limiting logic
Example Output
Here's what this prompt generates with the sample inputs:
Sample outputclaude-haiku-4-5
{
"options": [
{
"message": "feat(auth): add login rate limiting and switch to argon2 hashing\n\nReplace bcrypt with argon2 for stronger password hashing.\nAdd rate limiting (5 attempts/min) to the login endpoint\nto mitigate brute-force attacks. Track failed login count\nin the user model for lockout logic.",
"type": "feat",
"reasoning": "Best if the rate limiting is the primary deliverable — treats this as a new security feature."
},
{
"message": "perf(auth): upgrade password hashing to argon2 with rate limiting\n\nSwitch from bcrypt to argon2 for improved hashing performance\nand security. Add rate limiting to login endpoint to prevent\nbrute-force attacks. Includes new failed_login_count field\non user model and corresponding test coverage.",
"type": "perf",
"reasoning": "Best if the argon2 migration was the main motivation and rate limiting was added alongside it."
},
{
"message": "fix(auth): harden login endpoint against brute-force attacks\n\nAdd rate limiting (5 attempts per minute) to prevent credential\nstuffing. Upgrade password hashing from bcrypt to argon2 for\nbetter resistance to GPU-based attacks. Track failed attempts\nper user for future lockout policies.",
"type": "fix",
"reasoning": "Best if this change was prompted by a security audit or incident."
}
]
}Configuration
Optimized settings included when you add this prompt. You can adjust them later.
Provider
ANTHROPIC
Model
claude-haiku-4-5
Temperature
0.4
Output
Structured JSON
Ready to use this prompt?
Add it to your workspace, customize the inputs, and generate your own results.
Use this prompt — freeMore prompts
Code Reviewer
Coding
Get detailed code reviews with prioritized issues, bug detection, security checks, and actionable fix suggestions.
code-review
bugs
+2
Claude Sonnet 4.5SQL Query Generator
Coding
Convert natural language questions into SQL queries. Supports PostgreSQL, MySQL, SQLite, and SQL Server.
sql
database
+2
GPT-4.1Unit Test Generator
Coding
Generate comprehensive unit tests for your code with edge cases, mocking strategies, and clear assertions.
testing
unit-tests
+2
Claude Sonnet 4.5