Learn Software Engineering by Crafting
Combine atomic knowledge Cards on a crafting board to create Playbooks, Pillars, and Toolkits. Discover how concepts connect and build mastery through exploration.
How It Works
Like a crafting game, but for knowledge
1. Collect Cards
Browse atomic knowledge units covering testing, deployment, security, and more.
2. Place on Grid
Drag cards onto the 3x3 crafting board and experiment with combinations.
3. Discover Recipes
When cards match a recipe, unlock Playbooks with actionable guidance.
Featured Cards
16 knowledge units to explore

Alerting
introAlerting notifies teams when metrics or logs indicate problems that require attention.

Authentication
introAuthentication verifies that users are who they claim to be, typically through passwords, tokens, or multi-factor methods.

Authorization
introAuthorization determines what actions an authenticated user is permitted to perform within a system.

Blast Radius
introThe blast radius is the scope of impact when something goes wrong. Smaller blast radius means fewer users affected by a failure.

Canary Deployment
intermediateA canary deployment releases changes to a small subset of users first, allowing you to detect issues before full rollout.

Encryption
intermediateEncryption transforms data into an unreadable format that can only be decoded with the correct key.

End-to-End Test
intermediateE2E tests simulate real user workflows through the entire system. They catch integration issues but are slower and more brittle.

Feature Flags
introFeature flags allow you to toggle functionality on or off without deploying new code. They enable gradual rollouts and quick rollbacks.
Available Recipes
3 crafting formulas to discover
Safe Rollout Recipe
Creates playbook
These four cards cover the essential components of a safe deployment: understanding impact (Blast Radius), controlled release (Feature Flags, Canary), and recovery (Rollback Strategy).
Security Pass Recipe
Creates playbook
These cards cover the security fundamentals: validating inputs, verifying identity (auth), controlling access (authz), and protecting data (encryption).
Test Strategy Recipe
Creates playbook
These cards form the test pyramid: understanding the concept, plus the three test levels (unit, integration, e2e).