741 skills sorted by stars.
Git workflow guidance for commits, branches, and pull requests
|
Build autonomous AI agents with Claude Agent SDK. Structured outputs (v0.1.45, Nov 2025) guarantee JSON schema validation, plugins...
Test for security vulnerabilities using OWASP principles. Use when conducting security audits, testing auth, or implementing secur...
Identify and clean up stale git branches locally and on remotes with safe, reversible steps. Use when asked to prune, list, or del...
Systematically review pull requests, feature implementations, and code changes to ensure quality, maintainability, security, and a...
MCP Agent Mail - mail-like coordination layer for coding agents with memorable identities, inbox/outbox, searchable threads, advis...
List eval runs. Requires authentication. Use for Agentuity cloud platform operations
Audit and refactor CSS to comply with Game Loopers design system and BEM methodology
Unified agent management from selection through completion - spawning, execution, output processing. Use when selecting agents for...
How to create, structure, and publish self-contained Convex components with proper isolation, exports, and dependency management
Use when gh CLI is not installed, not configured, or authentication fails - provides installation steps, authentication methods, a...
AI图像生成与编辑能力,基于 Nano Banana (Gemini Image) 实现文生图、图生图、图像编辑。适用于创意设计、营销素材、社交媒体内容、演示文稿配图等场景。支持多种风格、高分辨率输出(最高4K)、文字渲染、角色一致性保持。
Track and evaluate AI predictions over time to assess accuracy. Use when reviewing past predictions to determine if they came true...
Plutonium Rodauth integration - authentication setup, account types, and configuration
Performs comprehensive security audits of codebases, identifying vulnerabilities and security best practices
ENFORCEMENT tool that detects when Skills automation is duplicated in agent definitions, lessons learned, or process docs. Prevent...
This skill should be used when defining a robust, type-safe, and async-compatible database schema for the Todo application using S...
无障碍设计审查与修复能力。
Analyze writing samples to create a comprehensive voice DNA profile. Use when the user wants to capture their unique writing voice...
Scans codebases and dependencies for known vulnerabilities and security issues
API security testing guide covering OWASP API Security Top 10, JWT attacks, OAuth vulnerabilities, GraphQL security, and API fuzzi...
Node.js best practices including error handling, async patterns, security, and project structure.
Interact with atomCAD node networks programmatically. Query, edit, and replace CAD geometry nodes for atomic/molecular structure d...
Security scanning with UBS (Ultimate Bug Scanner). Use before commits, when scanning for bugs, when the user mentions "ubs", "bugs...
This skill provides AWS cost optimization, monitoring, and operational best practices with integrated MCP servers for billing anal...
Automatically discover cryptography skills when working with encryption, TLS, certificates, PKI, and security
Automatically discover security skills when working with authentication, authorization, input validation, security headers, vulner...
Display plugin versions from marketplace.json. Use when user asks to "audit versions", "show plugin versions", "list marketplace v...
API security best practices and common vulnerability prevention. Enforces security checks for authentication, input validation, SQ...
Create standardized report headers with metadata for all agent-generated reports. Use when generating bug reports, security audits...
Inline orchestration workflow for security vulnerability detection and remediation. Provides step-by-step phases for security-scan...
Implement comprehensive cloud security across AWS, Azure, and GCP with IAM, encryption, network security, compliance, and threat d...
Configure network security groups and firewall rules to control inbound/outbound traffic and implement network segmentation.