{"total":128,"checklists":[{"title":"Agent Harmony: Preventing Multi-Agent Deadlocks","category":"Architecture","region":"Global","url":"https://checklist.day/multi-agent-deadlock-prevention"},{"title":"Agentic Deadlocks: Multi-Agent Synchronization","category":"Architecture","region":"Global","url":"https://checklist.day/agentic-deadlocks-multi-agent-synchronization"},{"title":"Breaking the Loop: 5-Step Agent Iteration Guardrails","category":"Architecture","region":"Global","url":"https://checklist.day/agent-loop-prevention"},{"title":"Concurrency Guardrails: Managing Parallel Tool Calls","category":"Architecture","region":"Global","url":"https://checklist.day/agent-concurrency-conflicts"},{"title":"Edge Case Recovery: State Rollback Protocol","category":"Architecture","region":"Global","url":"https://checklist.day/edge-case-recovery-state-rollback-protocol"},{"title":"Fail-Fast: Preventing Cascading Logic Errors","category":"Architecture","region":"Global","url":"https://checklist.day/agent-fail-fast-logic"},{"title":"Latency Cascades: Asynchronous Hand-off Optimization","category":"Architecture","region":"Global","url":"https://checklist.day/latency-cascades-asynchronous-hand-off-optimization"},{"title":"Logic Chains: Managing Tool Dependencies","category":"Architecture","region":"Global","url":"https://checklist.day/agent-dependency-chains"},{"title":"Multi-Agent Deadlocks: Speaker Selection Logic","category":"Architecture","region":"Global","url":"https://checklist.day/multi-agent-deadlocks-speaker-selection-logic"},{"title":"Multi-Modal Drift: Vision-to-Text Consistency","category":"Architecture","region":"Global","url":"https://checklist.day/multi-modal-drift-vision-to-text-consistency"},{"title":"Persistent State: Managing Long-Running Agent Workflows","category":"Architecture","region":"Global","url":"https://checklist.day/agent-state-persistence"},{"title":"Prompt Versioning Drift: Managing Deployment Lag","category":"Architecture","region":"Global","url":"https://checklist.day/prompt-versioning-drift-managing-deployment-lag"},{"title":"Provider Drift: Cross-Model Portability","category":"Architecture","region":"Global","url":"https://checklist.day/provider-drift-cross-model-portability"},{"title":"Provider Drift: Cross-Model Syntax Parity","category":"Architecture","region":"Global","url":"https://checklist.day/provider-drift-cross-model-syntax-parity"},{"title":"Schema Evolution: Breaking Change Management","category":"Architecture","region":"Global","url":"https://checklist.day/schema-evolution-breaking-change-management"},{"title":"Synchronized Memory: Solving Key-Name Mismatches","category":"Architecture","region":"Global","url":"https://checklist.day/agent-memory-keys"},{"title":"Tool Shadowing: Preventing Signature Confusion","category":"Architecture","region":"Global","url":"https://checklist.day/tool-shadowing-preventing-signature-confusion"},{"title":"Tool-Chain Deadlocks: Wait-State Collisions","category":"Architecture","region":"Global","url":"https://checklist.day/tool-chain-deadlocks-wait-state-collisions"},{"title":"Agent RAG Source Validation Protocol","category":"Data Integrity","region":"Global","url":"https://checklist.day/agent-rag-source-validation-protocol"},{"title":"Fresh Data: Preventing Stale Cache Hallucinations","category":"Data Integrity","region":"Global","url":"https://checklist.day/agent-cache-invalidation"},{"title":"Model Collapse: Preventing Recursive Training Rot","category":"Data Integrity","region":"Global","url":"https://checklist.day/model-collapse-preventing-recursive-training-rot"},{"title":"Non-Deterministic Tools: Guarding Against Ghost Data","category":"Data Integrity","region":"Global","url":"https://checklist.day/non-deterministic-tools-guarding-against-ghost-data"},{"title":"PII Leakage: Securing Observability Logs","category":"Data Integrity","region":"Global","url":"https://checklist.day/pii-leakage-securing-observability-logs"},{"title":"The Verifiable Agent: Solving Source & Citation Loss","category":"Data Integrity","region":"Global","url":"https://checklist.day/agent-citation-accuracy"},{"title":"Context Compression: Economic Token Pruning","category":"Economics","region":"Global","url":"https://checklist.day/context-compression-economic-token-pruning"},{"title":"Financial Guardrails: Preventing Budget Burn","category":"Economics","region":"Global","url":"https://checklist.day/financial-guardrails-preventing-budget-burn"},{"title":"Rate Limit Cascades: Backoff Management","category":"Economics","region":"Global","url":"https://checklist.day/rate-limit-cascades-backoff-management"},{"title":"Semantic Redundancy: Eliminating No-Value Turns","category":"Economics","region":"Global","url":"https://checklist.day/semantic-redundancy-eliminating-no-value-turns"},{"title":"Stopping the Burn: Financial Guardrails for Autonomous Agents","category":"Economics","region":"Global","url":"https://checklist.day/agent-budget-guardrails"},{"title":"The Reasoning Floor: Cost-Benefit Triage","category":"Economics","region":"Global","url":"https://checklist.day/the-reasoning-floor-cost-benefit-triage"},{"title":"The Token Wall: Dynamic Truncation Strategy","category":"Economics","region":"Global","url":"https://checklist.day/the-token-wall-dynamic-truncation-strategy"},{"title":"Tool-Call Overspending: Logic Gate Enforcement","category":"Economics","region":"Global","url":"https://checklist.day/tool-call-overspending-logic-gate-enforcement"},{"title":"Agent Build Reproducibility Checklist","category":"Engineering","region":"Global","url":"https://checklist.day/agent-build-reproducibility"},{"title":"Agent Environment & Dependency Management","category":"Engineering","region":"Global","url":"https://checklist.day/agent-dependency-integrity"},{"title":"Agent Output Escaping & Encoding","category":"Engineering","region":"Global","url":"https://checklist.day/agent-output-escaping-and-encoding-guardrails"},{"title":"Salesforce API: 503/Quota Recovery","category":"Enterprise Playbook","region":"Global","url":"https://checklist.day/salesforce-api-503-quota-recovery"},{"title":"Agentic Error Taxonomy: Retry Matrix","category":"Error Taxonomy","region":"Global","url":"https://checklist.day/agentic-error-taxonomy-retry-matrix"},{"title":"Agent Container Resource Limits","category":"Infrastructure","region":"Global","url":"https://checklist.day/agent-container-resource-limits"},{"title":"Agent Deployment: Docker Hardening","category":"Infrastructure","region":"Global","url":"https://checklist.day/agent-deployment-docker-hardening"},{"title":"Global Agents: Solving Multi-Language Reasoning Gaps","category":"Localization","region":"Global","url":"https://checklist.day/agent-multilingual-reasoning"},{"title":"Regional Accent Bias: The 'Generic' Hallucination","category":"Localization","region":"Global","url":"https://checklist.day/regional-accent-bias-the-generic-hallucination"},{"title":"Agent Evals: Solving Evaluation Blindness","category":"Operations","region":"Global","url":"https://checklist.day/agent-automated-evals"},{"title":"Agentic Lazy Bias: Verification Pass Failures","category":"Operations","region":"Global","url":"https://checklist.day/agentic-lazy-bias-verification-pass-failures"},{"title":"Audio-to-Token Latency: Real-time Stream Lag","category":"Operations","region":"Global","url":"https://checklist.day/audio-to-token-latency-real-time-stream-lag"},{"title":"Cold Start Latency: First-Turn Optimization","category":"Operations","region":"Global","url":"https://checklist.day/cold-start-latency-first-turn-optimization"},{"title":"Environment Portability: Solving Hidden Dependencies","category":"Operations","region":"Global","url":"https://checklist.day/agent-environment-dependencies"},{"title":"Leak Prevention: Managing DB & API Connections","category":"Operations","region":"Global","url":"https://checklist.day/agent-resource-leaks"},{"title":"OS Portability: Solving Cross-Platform Command Failures","category":"Operations","region":"Global","url":"https://checklist.day/agent-os-portability"},{"title":"Resource Cleanup: Preventing Orphaned Agent Processes","category":"Operations","region":"Global","url":"https://checklist.day/agent-resource-cleanup"},{"title":"Scalable Agents: Reliable Deployment & Containerization","category":"Operations","region":"Global","url":"https://checklist.day/agent-deployment-docker"},{"title":"The Transparent Agent: Standardizing Observability","category":"Operations","region":"Global","url":"https://checklist.day/agent-observability-telemetry"},{"title":"Human-in-the-Loop: Escalation and Handoff","category":"Production","region":"Global","url":"https://checklist.day/human-in-the-loop-escalation-and-handoff"},{"title":"Post-Tool Recovery: Preventing Workflow Stalls","category":"Production","region":"Global","url":"https://checklist.day/post-tool-recovery-preventing-workflow-stalls"},{"title":"Video Slop: Low-Entropy Visual Generation","category":"Production","region":"Global","url":"https://checklist.day/video-slop-low-entropy-visual-generation"},{"title":"GST Registration (India): Deterministic Flow","category":"Regional","region":"India","url":"https://checklist.day/gst-registration-india-deterministic-flow"},{"title":"Japan Business Manager Visa: October 2025 Reform Checklist","category":"Regional","region":"Japan","url":"https://checklist.day/japan-business-manager-visa-2026"},{"title":"Japan Godo Kaisha (GK) Incorporation Checklist","category":"Regional","region":"Japan","url":"https://checklist.day/japan-godo-kaisha"},{"title":"Regional Hallucination: Geo-Specific Fact Grounding","category":"Regional","region":"Global","url":"https://checklist.day/regional-hallucination-geo-specific-fact-grounding"},{"title":"US Business Filing Real-World Latency (2026)","category":"Regional","region":"USA","url":"https://checklist.day/us-filing-latency"},{"title":"US EIN (SS-4) Operational Latency for Non-Residents","category":"Regional","region":"USA","url":"https://checklist.day/us-ein-non-resident-latency"},{"title":"Agent Circuit Breaker Pattern","category":"Reliability","region":"Global","url":"https://checklist.day/agent-circuit-breaker-pattern"},{"title":"Agent Duplicate Tool-Call Detection","category":"Reliability","region":"Global","url":"https://checklist.day/agent-duplicate-tool-call-detection"},{"title":"Agent Exponential Backoff Implementation","category":"Reliability","region":"Global","url":"https://checklist.day/agent-exponential-backoff-implementation"},{"title":"Agent Healthcheck & Liveness Probes","category":"Reliability","region":"Global","url":"https://checklist.day/agent-healthcheck-liveness-probes"},{"title":"Agent Idempotency Key Enforcement","category":"Reliability","region":"Global","url":"https://checklist.day/agent-idempotency-key-enforcement"},{"title":"Agent Retry Decision Classification Matrix","category":"Reliability","region":"Global","url":"https://checklist.day/agent-retry-decision-classification-matrix"},{"title":"Agent Runtime Configuration Validation","category":"Reliability","region":"Global","url":"https://checklist.day/agent-runtime-config-validation"},{"title":"Agentic Persona Drift: Identity Consistency","category":"Reliability","region":"Global","url":"https://checklist.day/agentic-persona-drift-identity-consistency"},{"title":"Agentic Task-Decomposition Validation","category":"Reliability","region":"Global","url":"https://checklist.day/agentic-task-decomposition-validation"},{"title":"Complete Execution: Fixing Truncated Agent Responses","category":"Reliability","region":"Global","url":"https://checklist.day/agent-truncated-output-recovery"},{"title":"Contextual Returns: Solving Result Blindness","category":"Reliability","region":"Global","url":"https://checklist.day/agent-result-contextualization"},{"title":"Determinism Control: Stabilizing Agent Logic","category":"Reliability","region":"Global","url":"https://checklist.day/agent-nondeterminism-control"},{"title":"Encoding Integrity: Solving Character & Tokenization Errors","category":"Reliability","region":"Global","url":"https://checklist.day/agent-tokenization-encoding"},{"title":"Error Boundaries: Handling Tool Execution Failures","category":"Reliability","region":"Global","url":"https://checklist.day/agent-error-boundary"},{"title":"Feedback Loop Decay: Reward Hacking Prevention","category":"Reliability","region":"Global","url":"https://checklist.day/feedback-loop-decay-reward-hacking-prevention"},{"title":"Fixing Memory Drift: Keeping Long Sessions on Track","category":"Reliability","region":"Global","url":"https://checklist.day/agent-memory-drift"},{"title":"I/O Management: Preventing Hanging Agent Flows","category":"Reliability","region":"Global","url":"https://checklist.day/agent-io-timeouts"},{"title":"Ignorance Management: Enforcing the 'I Don't Know' Rule","category":"Reliability","region":"Global","url":"https://checklist.day/agent-ignorance-management"},{"title":"Infinite Context: Managing Memory Drift in Long Dialogs","category":"Reliability","region":"Global","url":"https://checklist.day/agent-context-management"},{"title":"Instruction Overload: Managing Prompt Complexity","category":"Reliability","region":"Global","url":"https://checklist.day/instruction-overload-managing-prompt-complexity"},{"title":"Intent Detection: Solving Ambiguous User Queries","category":"Reliability","region":"Global","url":"https://checklist.day/agent-intent-clarification"},{"title":"Latency Optimization: Reducing Agent Startup Times","category":"Reliability","region":"Global","url":"https://checklist.day/agent-startup-optimization"},{"title":"Logic Tunnels: Preventing Infinite Recursive Depth","category":"Reliability","region":"Global","url":"https://checklist.day/agent-recursion-limits"},{"title":"Model Evolution: Managing LLM Version Updates","category":"Reliability","region":"Global","url":"https://checklist.day/agent-model-versioning"},{"title":"Optimal Selection: Solving Tool Choice Ambiguity","category":"Reliability","region":"Global","url":"https://checklist.day/agent-tool-selection"},{"title":"Output Management: Handling Large Tool Payloads","category":"Reliability","region":"Global","url":"https://checklist.day/agent-tool-output-size"},{"title":"Precision Tools: Stopping Argument Hallucination","category":"Reliability","region":"Global","url":"https://checklist.day/agent-arg-hallucination"},{"title":"Prompt Stability: Managing Behavioral Drift","category":"Reliability","region":"Global","url":"https://checklist.day/agent-prompt-drift"},{"title":"Schema Hallucination: Tool Call Validation","category":"Reliability","region":"Global","url":"https://checklist.day/schema-hallucination-tool-call-validation"},{"title":"Self-Correction Oscillation: Preventing Flip-Flop Loops","category":"Reliability","region":"Global","url":"https://checklist.day/self-correction-oscillation-preventing-flip-flop-loops"},{"title":"Semantic Amnesia: Preventing Instruction Decay","category":"Reliability","region":"Global","url":"https://checklist.day/semantic-amnesia-preventing-instruction-decay"},{"title":"State De-duplication: Breaking Execution Loops","category":"Reliability","region":"Global","url":"https://checklist.day/state-deduplication-breaking-execution-loops"},{"title":"The 'Mandatory Tool' Trap: Breaking Required Loops","category":"Reliability","region":"Global","url":"https://checklist.day/mandatory-tool-trap-breaking-required-loops"},{"title":"The Economic Agent: Multi-Model Routing for Cost Savings","category":"Reliability","region":"Global","url":"https://checklist.day/agent-model-routing"},{"title":"The Kill-Switch: Total System De-Escalation","category":"Reliability","region":"Global","url":"https://checklist.day/the-kill-switch-total-system-de-escalation"},{"title":"The Verifier: Implementing Post-Action Checks","category":"Reliability","region":"Global","url":"https://checklist.day/agent-verification-pass"},{"title":"The Zero-Downtime Agent: Managing API Rate Limits","category":"Reliability","region":"Global","url":"https://checklist.day/agent-api-quota-management"},{"title":"Token Management: Handling Over-Sized Agent Requests","category":"Reliability","region":"Global","url":"https://checklist.day/agent-token-management"},{"title":"Tool Integrity: Preventing Hallucinated Function Calls","category":"Reliability","region":"Global","url":"https://checklist.day/agent-tool-call-verification"},{"title":"Type Safety: Preventing Input Type Mismatches","category":"Reliability","region":"Global","url":"https://checklist.day/agent-type-safety"},{"title":"Voice Stability: Conversational Loop Prevention","category":"Reliability","region":"Global","url":"https://checklist.day/voice-stability-conversational-loop-prevention"},{"title":"Zero-Crash Tools: Solving 'Missing Required Input Keys'","category":"Reliability","region":"Global","url":"https://checklist.day/agent-input-validation"},{"title":"Zero-Downtime Agents: Handling API Instability","category":"Reliability","region":"Global","url":"https://checklist.day/agent-api-resilience"},{"title":"Zero-Fail Output Parsing for Autonomous Agents","category":"Reliability","region":"Global","url":"https://checklist.day/agent-output-parsing-fix"},{"title":"Agent Hardening: Preventing Prompt Injection & Hijacking","category":"Security","region":"Global","url":"https://checklist.day/agent-prompt-injection-defense"},{"title":"Agent Secrets Injection: Docker","category":"Security","region":"Global","url":"https://checklist.day/agent-secrets-injection-docker"},{"title":"Agent Stealth: Preventing API Key & Secret Leakage","category":"Security","region":"Global","url":"https://checklist.day/agent-secret-management"},{"title":"Agent System-Prompt Boundary Enforcement","category":"Security","region":"Global","url":"https://checklist.day/agent-system-prompt-boundary-enforcement"},{"title":"Agent Tool-Output Sanitization","category":"Security","region":"Global","url":"https://checklist.day/agent-tool-output-sanitization"},{"title":"Agent Untrusted-Input Quarantine","category":"Security","region":"Global","url":"https://checklist.day/agent-untrusted-input-quarantine"},{"title":"Agentic Trace Scrubbing: PII and Secret Masking","category":"Security","region":"Global","url":"https://checklist.day/agentic-trace-scrubbing-pii-and-secret-masking"},{"title":"AI Agent API Safety & Deny-List","category":"Security","region":"Global","url":"https://checklist.day/ai-agent-safety"},{"title":"Autonomous Agent Security: API Guardrails & Deny-Lists","category":"Security","region":"Global","url":"https://checklist.day/ai-agent-security-guardrails"},{"title":"Compliance Guardrails: Preventing Unauthorized Agent Actions","category":"Security","region":"Global","url":"https://checklist.day/agent-compliance-checks"},{"title":"Context Poisoning: RAG Injection Guardrails","category":"Security","region":"Global","url":"https://checklist.day/context-poisoning-rag-injection"},{"title":"Deepfake Verification: Identity Fraud Detection","category":"Security","region":"Global","url":"https://checklist.day/deepfake-verification-identity-fraud-detection"},{"title":"Dependency Confusion: Guarding Against Shadow Imports","category":"Security","region":"Global","url":"https://checklist.day/dependency-confusion-guarding-against-shadow-imports"},{"title":"Metadata Leaks: Identity-Linked Image EXIF","category":"Security","region":"Global","url":"https://checklist.day/metadata-leaks-identity-linked-image-exif"},{"title":"Privacy Shield: Preventing PII Leakage in Prompts","category":"Security","region":"Global","url":"https://checklist.day/agent-privacy-shield"},{"title":"Prompt Leakage: Defending Instruction Integrity","category":"Security","region":"Global","url":"https://checklist.day/prompt-leakage-defending-instruction-integrity"},{"title":"Prompt Leakage: Protecting Internal Instructions","category":"Security","region":"Global","url":"https://checklist.day/agent-prompt-leakage"},{"title":"Script Hijacking: Production-Level Prompt Injection","category":"Security","region":"Global","url":"https://checklist.day/script-hijacking-production-level-prompt-injection"},{"title":"Shadow API Discovery: Preventing Unauthorized Tool Usage","category":"Security","region":"Global","url":"https://checklist.day/shadow-api-discovery-preventing-unauthorized-tool-usage"},{"title":"Side Effect Guardrails: Stopping Destructive Actions","category":"Security","region":"Global","url":"https://checklist.day/agent-side-effect-guardrails"},{"title":"SSRF Guardrails: Preventing Internal Proxying","category":"Security","region":"Global","url":"https://checklist.day/ssrf-guardrails-preventing-internal-proxying"},{"title":"Token Stealing: Direct Model Weight Probing","category":"Security","region":"Global","url":"https://checklist.day/token-stealing-direct-model-weight-probing"},{"title":"Audio Inconsistency: Tone and Pitch Drift","category":"Sound","region":"Global","url":"https://checklist.day/audio-inconsistency-tone-and-pitch-drift"},{"title":"Voice-Sync Drift: Multi-Modal Timing Failures","category":"Sound","region":"Global","url":"https://checklist.day/voice-sync-drift-multi-modal-timing-failures"}]}