Prompt Cards

Procurement Playbook for AI Agents and Platforms
Write a procurement playbook: evaluation criteria, red flags, security review, data terms, SLAs, pricing traps, and exit clauses. Include a scoring matrix and interview questions for vendors.
Tags: procurement, vendors, agents, SLAs, contracts, security
Author: Assistant
Created at: 2026-01-05 00:00:00
Average Rating:
Total Ratings:
Enterprise Governance: ISO 42001 / Risk Register Integration
Create an AI governance program aligned to common frameworks: policy stack, model inventory, risk register mapping, approvals, audits, and incident management. Provide templates and RACI.
Tags: AI-governance, ISO-42001, risk-management, RACI, audit
Author: Assistant
Created at: 2026-01-05 00:00:00
Average Rating:
Total Ratings:
Cost Engineering for Inference at Scale
Draft a 2026 cost engineering playbook: caching, quantization, distillation, batching, and SLA tiers. Provide a KPI dashboard linking cost per task to business outcomes.
Tags: inference, cost-optimization, quantization, SLAs, scaling
Author: Assistant
Created at: 2026-01-05 00:00:00
Average Rating:
Total Ratings:
Model Routing & ‘Model Mesh’ Architecture
Propose a model routing architecture (‘model mesh’): task-based routing, fallback policies, confidence thresholds, and cost controls. Include an observability plan for routing quality.
Tags: model-routing, model-mesh, orchestration, cost-control, observability
Author: Assistant
Created at: 2026-01-05 00:00:00
Average Rating:
Total Ratings:
Unstructured Data Strategy: ‘Document-to-Decision’
Create an enterprise unstructured data strategy: ingestion, classification, redaction, indexing, provenance, and access control. End with a ‘document-to-decision’ workflow and KPIs.
Tags: unstructured-data, enterprise-search, provenance, governance, KPI
Author: Assistant
Created at: 2026-01-05 00:00:00
Average Rating:
Total Ratings:
Hybrid Retrieval Strategy: Graph-RAG + Vector + Search
Design a hybrid retrieval strategy combining vector search, lexical search, and a knowledge graph layer (‘Graph-RAG’). Specify when to use which, how to evaluate, and how to keep citations reliable.
Tags: RAG, Graph-RAG, vector-search, knowledge-graph, citations
Author: Assistant
Created at: 2026-01-05 00:00:00
Average Rating:
Total Ratings:
LLMOps 2026: Evaluation-First Operating System
Create an eval-first LLMOps design: golden sets, adversarial tests, continuous regression, cost/latency tracking, and release gates. Include a ‘model change control’ policy.
Tags: LLMOps, evaluation, guardrails, regression, change-control
Author: Assistant
Created at: 2026-01-05 00:00:00
Average Rating:
Total Ratings:
Agent ROI Model: ‘Digital Worker’ P&L
Build a P&L-style ROI model for deploying agents as digital workers: labor displacement vs augmentation, quality risk, error cost, cycle time reduction, and governance overhead. Provide a template with assumptions.
Tags: digital-workers, agent-ROI, finance, productivity, risk
Author: Assistant
Created at: 2026-01-05 00:00:00
Average Rating:
Total Ratings:
Physical AI Roadmap (Robotics/Automation)
Create a physical AI roadmap for 2026: use cases, safety constraints, simulation strategy, edge compute needs, and incident handling. Include a phased pilot plan with success criteria.
Tags: physical-AI, robotics, edge, safety, roadmap
Author: Assistant
Created at: 2026-01-05 00:00:00
Average Rating:
Total Ratings:
Preemptive Cybersecurity with AI Agents
Design a preemptive cybersecurity approach: AI-driven exposure management, automated patch prioritization, agent-assisted triage, and ‘human-in-the-loop’ escalation. Include KPIs that reduce mean time to contain.
Tags: preemptive-cybersecurity, agents, SOC, exposure, KPI
Author: Assistant
Created at: 2026-01-05 00:00:00
Average Rating:
Total Ratings:
AI Security Platform Requirements (Agent Era)
Write requirements for an AI security platform: prompt/tool injection defenses, model access control, secrets handling, audit trails, red-team workflows, and runtime policy enforcement for agents.
Tags: AI-security, agents, guardrails, threat-model, policy
Author: Assistant
Created at: 2026-01-05 00:00:00
Average Rating:
Total Ratings:
Digital Provenance & Content Authenticity Program
Define a digital provenance program: signing, watermarking policies, asset lineage, approval workflows, and incident response for deepfake risk. Provide a policy template and metric dashboard.
Tags: digital-provenance, authenticity, deepfakes, policy, governance
Author: Assistant
Created at: 2026-01-05 00:00:00
Average Rating:
Total Ratings:

Curio AI Brain

Available in Chrome Web Store!