Add AGENTS.md for this repo

Bug: 441727732
Test: verified gemini-cli uses AGENTS.md
Change-Id: I06add81e07714ae1156300654b1a0c3e30c83bf8
diff --git a/.gemini/settings.json b/.gemini/settings.json
new file mode 100644
index 0000000..05d52d7
--- /dev/null
+++ b/.gemini/settings.json
@@ -0,0 +1,5 @@
+{
+  "context": {
+    "fileName": "AGENTS.md"
+  }
+}
diff --git a/AGENTS.md b/AGENTS.md
new file mode 100644
index 0000000..64b666f
--- /dev/null
+++ b/AGENTS.md
@@ -0,0 +1,21 @@
+# Agent Instructions and Project Constraints
+
+This file documents key constraints and concepts for the `autorepro` repository to guide future agent interactions.
+
+## Templates are Strictly Standalone
+
+Each project within the `example/` and `templates/` directories is designed to be completely standalone. A user can copy any of these individual directories (e.g., `templates/app-with-activity`) to a new location on their filesystem and expect it to work without any external dependencies from the parent `autorepro` repository.
+
+**Implication:** All documentation, scripts, and code within a template directory **must not** use relative paths that point outside of that directory (e.g., `../templates` or `../../README.md`). All links and references must be self-contained.
+
+## `sync-common.sh` and Synced File Constraints
+
+The `sync-common.sh` script is the source of truth for common configuration files that must be kept identical across the `example` project and all `templates`.
+
+**Implication:** Any file listed in this script is considered generic and must not contain content specific to a single template. The content must be universally applicable to all projects. For example, the `AGENTS.md` file is synced by this script, and therefore must contain general instructions rather than template-specific guidance.
+
+## Vulnerability Scope
+
+**AutoRepro submissions are for vulnerabilities in the Android Platform or SoC components only.**
+
+The PoC applications you build with these templates are tools to *trigger* and *demonstrate* a platform vulnerability. The app itself should not be the vulnerable component. Your test should prove that your PoC app can bypass a security boundary enforced by the Android OS or hardware.