- Use
Idempotency-Keyon card creation and other idempotent writes. - Use propose -> execute for sensitive actions.
- Return small, structured results with a
summaryfor LLM chaining. - Prefer cursor pagination and search + get-by-id pairs.
- Implement bounded retries on networking timeouts.