CI/CD
13574 skills in DevOps > CI/CD
cve-search
Searches the NIST NVD database for CVE vulnerabilities using API 2.0. Returns CVE details, CVSS scores, affected software, and references. Use when user asks about "CVE", "vulnerability database", "NIST", "NVD", "security advisory", "CVE-2024", "CVE-2023", "脆弱性", "セキュリティアドバイザリ", or wants to find known vulnerabilities for specific software.
svelte-ui-integration
Implement or extend user-facing workflows in SvelteKit applications with full-stack capabilities. Specialized in SvelteKit's load functions, form actions, and progressive enhancement. Use when the feature is primarily a UI/UX change backed by existing APIs, affects only the web frontend, and requires following SvelteKit conventions.
mlops-captain
MLOps Captain - Model training, deployment, monitoring, and ML lifecycle management
ancient-greek
Master Ancient Greek philosophical methods, vocabulary, and debates. Use for: Socratic method, Platonic dialogues, Aristotelian analysis, Stoic ethics, Epicurean philosophy, pre-Socratic thought. Triggers: 'Socrates', 'Plato', 'Aristotle', 'Stoic', 'Epicurean', 'eudaimonia', 'virtue ethics', 'elenchus', 'four causes', 'Forms', 'nous', 'logos', 'phronesis', 'ataraxia', 'apatheia', 'dialectic', 'maieutic', 'pre-Socratic', 'Heraclitus', 'Parmenides', 'the Good', 'unmoved mover'.
specification-writer
Use this skill proactively to write and revise feature specifications
effective-go
Idiomatic Go patterns and conventions from official Effective Go guide. Use when writing Go code to ensure proper naming, error handling, concurrency patterns, interface design, and Go-specific idioms. Triggers on Go file creation/editing, code review, or when user asks for idiomatic Go. If you cannot find any info visit to https://go.dev/doc/effective_go
brand-guidelines
Applies Open Session's official brand colors and typography to any sort of artifact that may benefit from having our brand's look-and-feel. Use it when brand colors or style guidelines, visual formatting, or company design standards apply.
pubmed-paper-exploration
Deep exploration from a key paper. Triggers: 這篇論文的相關研究, 誰引用這篇, 類似文章, related articles, citation tree, paper exploration
practice-hub-debugging
Systematic debugging and code cleanup for Practice Hub. Includes scripts to find/remove console.log statements, track TODOs/FIXMEs, validate code quality, and prepare codebase for production deployment. Critical for pre-production cleanup.
lead-hunter
THE MOST CRITICAL FEATURE FOR HODGES & FOOSHEE REALTY. Ultimate distressed property intelligence system tracking 22 distress signals across financial, life event, property, legal, and market categories. Self-improving AI that monitors performance, spawns specialized skills to fix bottlenecks, runs A/B tests, and continuously optimizes lead conversion. This is the game-changer that finds homeowners in crisis BEFORE anyone else does. Use for ALL lead generation tasks, pipeline optimization, multi-source data ingestion, and automated lead intelligence.
grounded-answer
Provide accurate, evidence-based answers by referencing sources from documents, textbooks, or research papers. Use when user asks for factual or source-backed responses.
research
Conduct comprehensive academic research using OpenAlex, PDF extraction, paper search MCPs, and web search. Always produces comprehensive reports with 5+ evidence cards covering conflicting ideas and best approaches. Integrates academic papers (high weight) and non-academic sources (blogs, docs - lower weight but valuable for SOTA). Use when: (1) Researching software architecture patterns, (2) Finding academic papers on technical topics, (3) Conducting literature reviews, (4) Analyzing research papers for evidence-based decisions, (5) Building evidence cards from papers, (6) Finding related works and citations, or (7) When you need grounded, paper-backed technical recommendations. Triggers: research, find papers, literature review, evidence-based, academic research, compare approaches, what does research say, find studies on, search for papers about.
policy-as-code-template-library
Production-ready policy template library: 48 battle-tested policies (28 Kyverno + 20 OPA). Pod security, image validation, RBAC, resource governance, network security, and CI/CD integration.
applying-personas
Apply expert personas to provide specialized feedback and perspectives. Use when you want feedback through the lens of specific experts, critics, or archetypes (e.g., "give me feedback as a focused product manager" or "review this as Jason Fried would").
planning-phase
Take enriched user stories and create execution plan with waves for parallel execution. Groups stories by dependencies into execution waves, assigns domain agents, and produces Gantt-style task schedule. Use when planning implementation workflow after architecture annotations.
sc-startup
Run repo startup: prompt load, checklist sync, optional PR triage, worktree hygiene, and CI pull. Best-effort with structured status.
brutalist-academic-ui
Skriptoteket-specific brutalist/academic UI design. Use for Vue/Vite SPA and SSR templates when you want grid-based layouts, systematic typography, and high-contrast “academic” aesthetics, while staying compatible with Skriptoteket’s pure-CSS + HuleEdu token stack (no Tailwind).
replit-to-production
Transform Replit prototypes into production-grade applications following DHEPdevelopment standards. Automates TypeScript migration, testing setup, CI/CDconfiguration, and GitHub publishing. Handles full-stack web apps and datascience projects.USE WHEN user says 'transform replit', 'productionize', 'convert to production','replit to production', 'make production-ready', 'prototype to production','*transform', or has a Replit prototype needing professional architecture.
notebooklm
Use this skill to query your Google NotebookLM notebooks directly from Claude Code for source-grounded, citation-backed answers from Gemini. Browser automation, library management, persistent auth. Drastically reduced hallucinations through document-only responses.
network-security
Secure GKE networking with VPC-native IP allocation, zero-trust network policies, Private Service Connect endpoints, and Cloud Armor DDoS protection layers.