Data Science
1726 skills in Data & AI > Data Science
coverage-analysis
Analyze test coverage, generate reports, and identify untested code. Use when improving test coverage, ensuring code quality, or preparing for production.
vulnerable-secret
Guidance for extracting secrets from protected or obfuscated binaries through systematic static and dynamic analysis. This skill should be used when tasks involve reverse engineering executables, extracting hidden flags or keys, analyzing binary protections, or decoding obfuscated data within compiled programs.
build-cython-ext
Guidance for building and installing Cython extension packages, particularly when resolving compatibility issues with modern Python and NumPy versions. This skill applies when installing legacy Cython packages, fixing NumPy 2.0 deprecation errors, resolving Python 3.x compatibility issues in extension modules, or troubleshooting Cython compilation failures. Use this skill for tasks involving setup.py with Cython extensions, deprecated NumPy type errors, or installing packages to system Python environments.
modernize-scientific-stack
Guide for modernizing legacy Python 2 scientific computing code to Python 3 with modern libraries. This skill should be used when migrating scientific scripts involving data processing, numerical computation, or analysis from Python 2 to Python 3, or when updating deprecated scientific computing patterns to modern equivalents (pandas, numpy, pathlib).
db-wal-recovery
Guidance for recovering data from SQLite Write-Ahead Log (WAL) files that may be corrupted, encrypted, or inaccessible. This skill should be used when tasks involve database recovery, WAL file analysis, decrypting database files, or recovering missing/corrupted SQLite data. Helps avoid common pitfalls like fabricating data based on patterns instead of actual recovery.
documents-pptx
Presentation creation, editing, and analysis. When Claude needs to work with presentations (.pptx files) for: (1) Creating new presentations, (2) Modifying or editing content, (3) Working with layouts, (4) Adding comments or speaker notes, or any other presentation tasks
quality-audit-workflow
Comprehensive codebase quality audit with parallel agent orchestration, GitHub issue creation, automated PR generation per issue, and PM-prioritized recommendations. Use for code review, refactoring audits, technical debt analysis, module quality assessment, or codebase health checks.
cybersecurity-analyst
Analyzes events through cybersecurity lens using threat modeling, attack surface analysis, defense-in-depth,zero-trust architecture, and risk-based frameworks (CIA triad, STRIDE, MITRE ATT&CK).Provides insights on vulnerabilities, attack vectors, defense strategies, incident response, and security posture.Use when: Security incidents, vulnerability assessments, threat analysis, security architecture, compliance.Evaluates: Confidentiality, integrity, availability, threat actors, attack patterns, controls, residual risk.
postgres-pro
Use when optimizing PostgreSQL queries, configuring replication, or implementing advanced database features. Invoke for EXPLAIN analysis, JSONB operations, extension usage, VACUUM tuning, performance monitoring. Keywords: PostgreSQL, EXPLAIN, replication, JSONB, pg_stat.
engineer-analyst
Analyzes technical systems and problems through engineering lens using first principles, systems thinking,design methodologies, and optimization frameworks.Provides insights on feasibility, performance, reliability, scalability, and trade-offs.Use when: System design, technical feasibility, optimization, failure analysis, performance issues.Evaluates: Requirements, constraints, trade-offs, efficiency, robustness, maintainability.
data
Use for running and editing notebooks efficiently via jtool/Jupyter; prefers uv for deps and headless execution.
pandas-pro
Use when working with pandas DataFrames, data cleaning, aggregation, merging, or time series analysis. Invoke for data manipulation, missing value handling, groupby operations, or performance optimization.
computer-scientist-analyst
Analyzes events through computer science lens using computational complexity, algorithms, data structures,systems architecture, information theory, and software engineering principles to evaluate feasibility, scalability, security.Provides insights on algorithmic efficiency, system design, computational limits, data management, and technical trade-offs.Use when: Technology evaluation, system architecture, algorithm design, scalability analysis, security assessment.Evaluates: Computational complexity, algorithmic efficiency, system architecture, scalability, data integrity, security.
deep-reading-analyst
Comprehensive framework for deep analysis of articles, papers, and long-form content using 10+ thinking models (SCQA, 5W2H, critical thinking, inversion, mental models, first principles, systems thinking, six thinking hats). Use when users want to: (1) deeply understand complex articles/content, (2) analyze arguments and identify logical flaws, (3) extract actionable insights from reading materials, (4) create study notes or learning summaries, (5) compare multiple sources, (6) transform knowledge into practical applications, or (7) apply specific thinking frameworks. Triggered by phrases like 'analyze this article,' 'help me understand,' 'deep dive into,' 'extract insights from,' 'use [framework name],' or when users provide URLs/long-form content for analysis.
physicist-analyst
Analyzes events through physics lens using fundamental laws (thermodynamics, conservation, relativity),quantitative modeling, systems dynamics, and energy principles to understand causation, constraints, and feasibility.Provides insights on energy systems, physical limits, technological feasibility, and complex systems behavior.Use when: Energy decisions, technology assessment, systems analysis, physical constraints, feasibility evaluation.Evaluates: Energy flows, conservation laws, efficiency limits, physical feasibility, scaling behavior, emergent properties.
test-audit
Test coverage analysis to ensure adequate testing, Storybook coverage, and test quality.
test-master
Use when writing tests, creating test strategies, or building automation frameworks. Invoke for unit tests, integration tests, E2E, coverage analysis, performance testing, security testing. Keywords: testing, QA, unit test, integration test, E2E, coverage, pytest, Jest.
sql-optimization
SQL query optimization patterns including EXPLAIN plan analysis, index strategies, query rewriting, and N+1 query prevention. Use when optimizing slow database queries, analyzing query performance, designing indexes, or debugging database bottlenecks. Works with PostgreSQL, MySQL, SQLite, and other SQL databases. Typical improvements: 10x-1000x query speedup.
futurist-analyst
Analyzes events through futures lens using scenario planning, trend analysis, weak signals,drivers of change, and forecasting methods (exploratory, normative, backcasting).Provides insights on possible futures, emerging trends, disruptive forces, strategic foresight, and alternative scenarios.Use when: Strategic planning, emerging trends, technology assessment, long-term planning, uncertainty navigation.Evaluates: Trends, weak signals, drivers of change, plausible futures, strategic options, uncertainty ranges.
bg3se-macos-ghidra
Develop the BG3 Script Extender macOS port using Ghidra for reverse engineering. Use this skill when:(1) Working on bg3se-macos port development or debugging(2) Using Ghidra to discover offsets, function addresses, or data structures in BG3(3) Implementing new Lua APIs (Ext.*, Osi.*) for macOS Script Extender(4) Porting Windows BG3SE features to macOS ARM64(5) Understanding ECS architecture, Osiris integration, or stats system(6) Analyzing ARM64 assembly or calling conventions for game hooks(7) Writing or modifying Ghidra Python scripts for BG3 analysis