AICHE +AAntigravity Integration
Voice for agentic IDE instructions
Speak agentic coding instructions to Antigravity.
The short answer: open Antigravity IDE, click into the agent instruction field or chat interface, press ⌃+⌥+R (Mac) or Ctrl+Alt+R (Windows/Linux), speak detailed multi-step tasks for 90-180 seconds, and AICHE inserts comprehensive agent instructions for autonomous execution.
Typing detailed multi-step instructions for autonomous AI agents takes 20-30 minutes and requires planning entire workflows upfront when Google Antigravity's agent-first architecture can handle complex tasks autonomously.
- Open Google Antigravity IDE on your system.
- Click into the agent instruction panel or chat interface.
- Press your AICHE hotkey to start recording.
- Speak your complete multi-step task with context and constraints.
- Press the hotkey again - AICHE transcribes and inserts the instructions.
- Review and deploy the agent to begin autonomous execution.
Multi-Step Agent Instructions
Full-Stack Feature Implementation
Complex features benefit from comprehensive agent instructions. Example: "implement user authentication feature with complete frontend and backend, backend requirements create Express API endpoints POST slash api slash auth slash register accepting email password and username, validate email format using regex verify password meets requirements minimum 8 characters with uppercase lowercase digit and special character, hash password using bcrypt with 12 salt rounds never store plain text, store user in PostgreSQL users table with unique constraint on email, return JWT access token with 15 minute expiration and refresh token with 7 day expiration, implement POST slash api slash auth slash login endpoint checking credentials and returning tokens, create POST slash api slash auth slash refresh endpoint validating refresh token and issuing new access token, add authentication middleware verifying JWT on protected routes extracting user from token payload, frontend requirements create React login page with email and password fields using React Hook Form for validation, add registration page with username email and password inputs showing strength meter for password, implement authentication context using Context API storing auth state tokens and user object, create protected route wrapper redirecting to login if not authenticated, add axios interceptor automatically attaching access token to requests and handling 401 responses by refreshing token, implement logout functionality clearing tokens and redirecting to login, error handling show validation errors inline on form fields, display API errors as toast notifications using react-hot-toast, handle network failures with retry logic and offline indication, security requirements store tokens in httpOnly cookies not localStorage to prevent XSS attacks, implement CSRF protection using double submit cookie pattern, add rate limiting on auth endpoints 5 attempts per IP per 15 minutes, log all authentication events with IP address and user agent for audit trail, testing create integration tests using Jest and Supertest covering successful registration login token refresh and error scenarios, add frontend tests using React Testing Library verifying form validation authentication flow and protected route behavior, deployment checklist ensure environment variables set for JWT secret database connection and CORS allowed origins, run database migrations creating users table with proper indexes, deploy backend to production with HTTPS enforced, deploy frontend with authentication routes configured, monitor error rates and authentication success rates in production dashboards".
Comprehensive agent instructions enable Antigravity to autonomously implement complete features across editor, terminal, and browser.
Database Migration and Testing
Complex refactoring benefits from detailed specifications. Example: "migrate user authentication from session based to JWT tokens with comprehensive testing and zero downtime deployment, analysis phase scan codebase identifying all locations checking request dot session dot user ID, list all routes depending on session middleware approximately 30 endpoints, identify database queries filtering by current user from session, document current authentication flow from login through session creation to protected route access, migration implementation create new JWT service module with functions generateAccessToken generateRefreshToken and verifyToken using jsonwebtoken library, update login endpoint to generate and return JWT tokens while maintaining session creation for backward compatibility during migration, add new authentication middleware jwtAuth that checks for JWT in authorization header falling back to session if JWT not present, modify all protected routes to use new middleware accepting both authentication methods during transition, update frontend to store tokens and include authorization header in API requests, implement token refresh logic with automatic retry on 401 responses, testing strategy create test suite covering JWT generation with correct payload and expiration, verify token validation rejecting expired and invalid tokens, test authentication middleware correctly extracting user from JWT or session, ensure protected routes accept both authentication methods during migration, verify token refresh prevents authentication interruptions, test backward compatibility existing sessions continue working, load test authentication endpoints under 1000 concurrent requests ensuring sub 100 millisecond response times, deployment plan phase 1 deploy new JWT endpoints and middleware to production with feature flag disabled, phase 2 enable feature flag for 10 percent of users monitoring error rates and performance, phase 3 gradually increase to 50 percent then 100 percent over 1 week, phase 4 after 2 weeks remove session based authentication and feature flag code, monitoring track authentication method used JWT versus session in analytics, monitor error rates for JWT generation validation and refresh operations, alert on error rate exceeding 1 percent or latency exceeding 200 milliseconds, rollback plan if errors spike disable feature flag reverting to session only authentication, prepare hotfix removing JWT code if fundamental issues discovered, success criteria zero authentication errors during migration, JWT authentication latency under 100 milliseconds at p95, all users successfully migrated within 2 weeks, session code removed from codebase with no production incidents".
Detailed migration instructions ensure Antigravity handles complex refactoring safely with proper testing and rollback plans.
Agent Workflow Configuration
Debugging and Root Cause Analysis
Diagnostic tasks need structured investigation steps. Example: "investigate and fix production bug users report intermittent 500 errors on checkout page, investigation steps use browser dev tools to reproduce error locally checking network tab for failing API requests, examine server logs filtering by 500 status code and checkout endpoint identifying error patterns, check application performance monitoring for error stack traces and timing information, query database for checkout records during error timeframe looking for data anomalies, review recent code changes to checkout flow using git log identifying commits from past week, hypothesis formation based on logs errors occur during payment processing specifically when calling Stripe API, timing analysis shows errors cluster during peak traffic hours suggesting rate limiting or connection pool exhaustion, stack traces indicate timeout exception after 30 seconds on payment confirmation step, investigation confirms Stripe API calls sometimes exceed timeout under load, root cause fix increase payment API timeout from 30 seconds to 60 seconds accounting for Stripe processing delays, implement retry logic with exponential backoff for transient Stripe API failures up to 3 attempts, add circuit breaker pattern to prevent cascading failures if Stripe experiences outage, increase database connection pool size from 20 to 40 connections handling peak traffic load, add comprehensive logging around payment flow capturing request ID Stripe charge ID and timing information, testing verify timeout increase prevents errors under load testing with 200 concurrent checkouts, confirm retry logic succeeds after simulated transient failure, validate circuit breaker trips after 10 consecutive failures and recovers after 30 seconds, ensure logging captures all necessary debugging information without exposing sensitive payment data, monitoring add dashboard tracking payment success rate response times and error rates by type, set up alerts for payment success rate below 99 percent or error rate above 0.5 percent, create runbook documenting investigation steps and common payment issues for on call engineer reference, deployment plan deploy fix during low traffic period with gradual rollout, monitor payment metrics closely for 24 hours after deployment, prepare rollback plan reverting code changes if new issues emerge, success criteria zero 500 errors on checkout in 24 hours post deployment, payment success rate above 99.5 percent, checkout latency p95 under 2 seconds, comprehensive monitoring and alerting operational".
Structured debugging instructions help Antigravity systematically investigate and resolve production issues.
Result: typing detailed Antigravity agent instructions that takes 25 minutes becomes 6 minutes of dictation, and speaking instructions helps you think through complete workflows more thoroughly than abbreviated typed plans.
Do this now: open Google Antigravity, click into the agent instruction field, press your hotkey, and spend 2 minutes dictating one complete multi-step development task including requirements, testing strategy, deployment plan, and success criteria. Watch Antigravity autonomously execute across editor, terminal, and browser.
Sources: