Browse Skills
9063 skills found
asciinema-analyzer.md
4
1
export
asciinema-analyzer
2
from
"terrylica/cc-skills"
from
"terrylica/cc-skills"
3
Semantic analysis for Claude Code consumption. TRIGGERS - analyze cast, keyword extraction, density analysis, find patterns, sharpe, backtest, iteration, trading keywords, ML keywords. Use when extracting insights from recordings.
2026-01-05
temporary-license-expert.md
4
1
export
temporary-license-expert
2
from
"reggiechan74/vp-real-estate"
from
"reggiechan74/vp-real-estate"
3
Expert in temporary license agreements for very short-term occupancy (1 day to 3 months) that avoid creating landlord-tenant relationships. Use when drafting licenses for film shoots, pop-up retail, event space, interim occupancy during renovations, meeting room bookings, or testing space before committing to a lease. Also use when analyzing whether arrangement is truly a license vs lease, structuring revocable occupancy rights, or evaluating holdover and termination provisions. Key terms include license vs lease, temporary occupancy, short-term license, no landlord-tenant relationship, revocable, non-exclusive, film production license, pop-up retail, interim occupancy, no statutory protections
2026-01-05
feature-implementation.md
4
1
export
feature-implementation
2
from
"NickCrew/claude-cortex"
from
"NickCrew/claude-cortex"
3
Use when implementing a feature or multi-file code change - provides structured implementation flow with persona selection, validation, and testing guidance.
2026-01-05
your-skill-name.md
4
1
export
your-skill-name
2
from
"outfitter-dev/agents"
from
"outfitter-dev/agents"
3
[YOUR_DESCRIPTION] - Be specific about WHAT the skill does and WHEN to use it. Include trigger keywords. Example: "Test REST APIs with validation and reporting. Use when testing APIs, endpoints, HTTP services, or when users mention API testing, endpoint validation, or integration testing."
2026-01-05
pentest-metasploit.md
4
1
export
pentest-metasploit
2
from
"AgentSecOps/SecOpsAgentKit"
from
"AgentSecOps/SecOpsAgentKit"
3
Penetration testing framework for exploit development, vulnerability validation, and authorized security assessments using Metasploit Framework. Use when: (1) Validating vulnerabilities in authorized security assessments, (2) Demonstrating exploit impact for security research, (3) Testing defensive controls in controlled environments, (4) Conducting authorized penetration tests with proper scoping and authorization, (5) Developing post-exploitation workflows for red team operations.
2026-01-05
using-quality-engineering.md
4
1
export
using-quality-engineering
2
from
"tachyon-beep/skillpacks"
from
"tachyon-beep/skillpacks"
3
Use when user asks about E2E testing, performance testing, chaos engineering, test automation, flaky tests, test data management, or quality practices - routes to specialist reference sheets with deep expertise instead of providing general guidance
2026-01-05
security-engineering.md
4
1
export
security-engineering
2
from
"outfitter-dev/agents"
from
"outfitter-dev/agents"
3
Security auditing and vulnerability detection using OWASP patterns, CWE analysis, and threat modeling. Use when auditing code for security issues, reviewing authentication/authorization, evaluating input validation, analyzing cryptographic usage, reviewing dependency security, or when security-audit, vulnerability-scan, OWASP, threat-model, or --security are mentioned.
2026-01-05
phoenix-ecto.md
4
1
export
phoenix-ecto
2
from
"forest/dotfiles"
from
"forest/dotfiles"
3
Critical Ecto and Phoenix guidelines that prevent common bugs and security issues. Use when writing Elixir code that involves Ecto schemas, changesets, queries, associations, or seeds.exs files. Prevents subtle mistakes with field access, validation options, and mass assignment vulnerabilities.
2026-01-05
hammer-benchmark-regression.md
4
1
export
hammer-benchmark-regression
2
from
"Ronin15/SDL3_HammerEngine_Template"
from
"Ronin15/SDL3_HammerEngine_Template"
3
Runs performance benchmarks for SDL3 HammerEngine and detects regressions by comparing metrics against baseline. Use when testing performance-sensitive changes to AI, collision, pathfinding, particle systems, or before merging features to ensure no performance degradation.
2026-01-05
ux-waiting-audit.md
4
1
export
ux-waiting-audit
2
from
"BayramAnnakov/ux-waiting-audit"
from
"BayramAnnakov/ux-waiting-audit"
3
Audit UX waiting states for web applications with long-running operations (30+ seconds). Use when asked to evaluate, audit, or analyze a product's loading states, wait times, progress indicators, or user experience during slow operations. Requires browser automation (Chrome MCP tools). Generates comprehensive reports with screenshots, checklist evaluation, and prioritized recommendations.
2026-01-05
microsim-standardization.md
4
1
export
microsim-standardization
2
from
"dmccreary/claude-skills"
from
"dmccreary/claude-skills"
3
This skill standardizes MicroSim directories by validating structure, metadata, documentation, and required components against a comprehensive quality checklist. Use this when auditing or upgrading a MicroSim to ensure it meets all documentation and structural standards, including index.md formatting, metadata.json validation, iframe embeds, and p5.js editor links.
2026-01-05
systematic-debugging.md
4
1
export
systematic-debugging
2
from
"alexanderop/MarkVim"
from
"alexanderop/MarkVim"
3
Use when encountering any bug, test failure, or unexpected behavior, before proposing fixes - four-phase framework (root cause investigation, pattern analysis, hypothesis testing, implementation) that ensures understanding before attempting solutions
2026-01-05
k8s-security.md
4
1
export
k8s-security
2
from
"kcns008/cluster-code"
from
"kcns008/cluster-code"
3
Kubernetes and OpenShift security assessment, hardening, and compliance. Use this skill when:(1) Auditing cluster or workload security posture(2) Implementing Pod Security Standards/Admission(3) Configuring RBAC roles and permissions(4) Setting up NetworkPolicies for zero-trust(5) Managing Secrets securely (encryption, external secrets)(6) Scanning images for vulnerabilities(7) Implementing OCP SecurityContextConstraints(8) Compliance checking (CIS benchmarks, SOC2, PCI-DSS)(9) Security incident investigation(10) Hardening cluster components
2026-01-05
backend-api-patterns.md
4
1
export
backend-api-patterns
2
from
"duyet/duyetbot-agent"
from
"duyet/duyetbot-agent"
3
Backend and API implementation patterns for scalability, security, and maintainability. Use when building APIs, services, and backend infrastructure.
2026-01-05
hammer-test-suite-generator.md
4
1
export
hammer-test-suite-generator
2
from
"Ronin15/SDL3_HammerEngine_Template"
from
"Ronin15/SDL3_HammerEngine_Template"
3
Generates complete test suite infrastructure (test scripts, functional tests, benchmark tests, output directories, CMake integration) for a new SDL3 HammerEngine system or manager following project conventions. Use when adding a new manager or system that needs testing infrastructure.
2026-01-05
webapp-testing.md
4
1
export
webapp-testing
2
from
"NickCrew/claude-cortex"
from
"NickCrew/claude-cortex"
3
Toolkit for interacting with and testing local web applications using Playwright. Use when verifying frontend functionality, debugging UI behavior, capturing browser screenshots, and viewing browser logs.
2026-01-05
k8s-troubleshooting.md
4
1
export
k8s-troubleshooting
2
from
"kcns008/cluster-code"
from
"kcns008/cluster-code"
3
Comprehensive Kubernetes and OpenShift cluster health analysis and troubleshooting based on Popeye's issue detection patterns. Use this skill when:(1) Proactive cluster health assessment and security analysis(2) Analyzing pod/container logs for errors or issues(3) Interpreting cluster events (kubectl get events)(4) Debugging pod failures: CrashLoopBackOff, ImagePullBackOff, OOMKilled, etc.(5) Diagnosing networking issues: DNS, Service connectivity, Ingress/Route problems(6) Investigating storage issues: PVC pending, mount failures(7) Analyzing node problems: NotReady, resource pressure, taints(8) Troubleshooting OCP-specific issues: SCCs, Routes, Operators, Builds(9) Performance analysis and resource optimization(10) Security vulnerability assessment and RBAC validation(11) Configuration best practices validation(12) Reliability and high availability analysis
2026-01-05
secrets-gitleaks.md
4
1
export
secrets-gitleaks
2
from
"AgentSecOps/SecOpsAgentKit"
from
"AgentSecOps/SecOpsAgentKit"
3
Hardcoded secret detection and prevention in git repositories and codebases using Gitleaks. Identifies passwords, API keys, tokens, and credentials through regex-based pattern matching and entropy analysis. Use when: (1) Scanning repositories for exposed secrets and credentials, (2) Implementing pre-commit hooks to prevent secret leakage, (3) Integrating secret detection into CI/CD pipelines, (4) Auditing codebases for compliance violations (PCI-DSS, SOC2, GDPR), (5) Establishing baseline secret detection and tracking new exposures, (6) Remediating historical secret exposures in git history.
2026-01-05
backend-passport-js.md
4
1
export
backend-passport-js
2
from
"petbrains/mvp-builder"
from
"petbrains/mvp-builder"
3
Authentication middleware for Express.js and Node.js applications. Use when building Express APIs that need JWT authentication, OAuth, or custom auth strategies. Provides 500+ authentication strategies. Choose Passport.js over Auth.js for Express backends, pure API servers, or when you need maximum control over auth flow.
2026-01-05
schema-e2e-validation.md
4
1
export
schema-e2e-validation
2
from
"terrylica/cc-skills"
from
"terrylica/cc-skills"
3
Run Earthly E2E validation for YAML schema contracts. Use when validating YAML schema changes, testing schema contracts against live ClickHouse, or regenerating Python types, DDL, and docs from YAML. For SQL schema design and optimization, use clickhouse-architect skill instead.
2026-01-05
debugging-and-diagnosis.md
4
1
export
debugging-and-diagnosis
2
from
"outfitter-dev/agents"
from
"outfitter-dev/agents"
3
Systematic debugging methodology using evidence-based investigation to identify root causes. Use when encountering bugs, errors, unexpected behavior, failing tests, or intermittent issues. Enforces four-phase framework (root cause investigation, pattern analysis, hypothesis testing, implementation) with the iron law NO FIXES WITHOUT ROOT CAUSE FIRST. Covers runtime errors, logic bugs, integration failures, and performance issues. Useful when debugging, troubleshooting, investigating failures, or when --debug flag is mentioned.
2026-01-05
threat-modeling-techniques.md
4
1
export
threat-modeling-techniques
2
from
"NickCrew/claude-cortex"
from
"NickCrew/claude-cortex"
3
Threat modeling methodologies using STRIDE, attack trees, and risk assessment for proactive security analysis. Use when designing secure systems, conducting security reviews, or identifying potential attack vectors in applications.
2026-01-05
forensics-osquery.md
4
1
export
forensics-osquery
2
from
"AgentSecOps/SecOpsAgentKit"
from
"AgentSecOps/SecOpsAgentKit"
3
SQL-powered forensic investigation and system interrogation using osquery to query operating systems as relational databases. Enables rapid evidence collection, threat hunting, and incident response across Linux, macOS, and Windows endpoints. Use when: (1) Investigating security incidents and collecting forensic artifacts, (2) Threat hunting across endpoints for suspicious activity, (3) Analyzing running processes, network connections, and persistence mechanisms, (4) Collecting system state during incident response, (5) Querying file hashes, user activity, and system configuration for compromise indicators, (6) Building detection queries for continuous monitoring with osqueryd.
2026-01-05
local-setup.md
4
1
export
local-setup
2
from
"toolkit-ai/magnet-mcp-server"
from
"toolkit-ai/magnet-mcp-server"
3
Interactive setup workflow for running the Magnet MCP server locally (project-specific, magnet-app directory only). Use when user says "local setup", "run locally", "test locally", "configure MCP", or "set up local development".
2026-01-05