Browse Skills

9063 skills found

asciinema-analyzer.md
4
1 export asciinema-analyzer
2 terrylica from "terrylica/cc-skills"
3 Semantic analysis for Claude Code consumption. TRIGGERS - analyze cast, keyword extraction, density analysis, find patterns, sharpe, backtest, iteration, trading keywords, ML keywords. Use when extracting insights from recordings.
2026-01-05
temporary-license-expert.md
4
1 export temporary-license-expert
2 reggiechan74 from "reggiechan74/vp-real-estate"
3 Expert in temporary license agreements for very short-term occupancy (1 day to 3 months) that avoid creating landlord-tenant relationships. Use when drafting licenses for film shoots, pop-up retail, event space, interim occupancy during renovations, meeting room bookings, or testing space before committing to a lease. Also use when analyzing whether arrangement is truly a license vs lease, structuring revocable occupancy rights, or evaluating holdover and termination provisions. Key terms include license vs lease, temporary occupancy, short-term license, no landlord-tenant relationship, revocable, non-exclusive, film production license, pop-up retail, interim occupancy, no statutory protections
2026-01-05
feature-implementation.md
4
1 export feature-implementation
2 NickCrew from "NickCrew/claude-cortex"
3 Use when implementing a feature or multi-file code change - provides structured implementation flow with persona selection, validation, and testing guidance.
2026-01-05
your-skill-name.md
4
1 export your-skill-name
2 outfitter-dev from "outfitter-dev/agents"
3 [YOUR_DESCRIPTION] - Be specific about WHAT the skill does and WHEN to use it. Include trigger keywords. Example: "Test REST APIs with validation and reporting. Use when testing APIs, endpoints, HTTP services, or when users mention API testing, endpoint validation, or integration testing."
2026-01-05
pentest-metasploit.md
4
1 export pentest-metasploit
2 AgentSecOps from "AgentSecOps/SecOpsAgentKit"
3 Penetration testing framework for exploit development, vulnerability validation, and authorized security assessments using Metasploit Framework. Use when: (1) Validating vulnerabilities in authorized security assessments, (2) Demonstrating exploit impact for security research, (3) Testing defensive controls in controlled environments, (4) Conducting authorized penetration tests with proper scoping and authorization, (5) Developing post-exploitation workflows for red team operations.
2026-01-05
using-quality-engineering.md
4
1 export using-quality-engineering
2 tachyon-beep from "tachyon-beep/skillpacks"
3 Use when user asks about E2E testing, performance testing, chaos engineering, test automation, flaky tests, test data management, or quality practices - routes to specialist reference sheets with deep expertise instead of providing general guidance
2026-01-05
security-engineering.md
4
1 export security-engineering
2 outfitter-dev from "outfitter-dev/agents"
3 Security auditing and vulnerability detection using OWASP patterns, CWE analysis, and threat modeling. Use when auditing code for security issues, reviewing authentication/authorization, evaluating input validation, analyzing cryptographic usage, reviewing dependency security, or when security-audit, vulnerability-scan, OWASP, threat-model, or --security are mentioned.
2026-01-05
phoenix-ecto.md
4
1 export phoenix-ecto
2 forest from "forest/dotfiles"
3 Critical Ecto and Phoenix guidelines that prevent common bugs and security issues. Use when writing Elixir code that involves Ecto schemas, changesets, queries, associations, or seeds.exs files. Prevents subtle mistakes with field access, validation options, and mass assignment vulnerabilities.
2026-01-05
hammer-benchmark-regression.md
4
1 export hammer-benchmark-regression
2 Ronin15 from "Ronin15/SDL3_HammerEngine_Template"
3 Runs performance benchmarks for SDL3 HammerEngine and detects regressions by comparing metrics against baseline. Use when testing performance-sensitive changes to AI, collision, pathfinding, particle systems, or before merging features to ensure no performance degradation.
2026-01-05
ux-waiting-audit.md
4
1 export ux-waiting-audit
2 BayramAnnakov from "BayramAnnakov/ux-waiting-audit"
3 Audit UX waiting states for web applications with long-running operations (30+ seconds). Use when asked to evaluate, audit, or analyze a product's loading states, wait times, progress indicators, or user experience during slow operations. Requires browser automation (Chrome MCP tools). Generates comprehensive reports with screenshots, checklist evaluation, and prioritized recommendations.
2026-01-05
microsim-standardization.md
4
1 export microsim-standardization
2 dmccreary from "dmccreary/claude-skills"
3 This skill standardizes MicroSim directories by validating structure, metadata, documentation, and required components against a comprehensive quality checklist. Use this when auditing or upgrading a MicroSim to ensure it meets all documentation and structural standards, including index.md formatting, metadata.json validation, iframe embeds, and p5.js editor links.
2026-01-05
systematic-debugging.md
4
1 export systematic-debugging
2 alexanderop from "alexanderop/MarkVim"
3 Use when encountering any bug, test failure, or unexpected behavior, before proposing fixes - four-phase framework (root cause investigation, pattern analysis, hypothesis testing, implementation) that ensures understanding before attempting solutions
2026-01-05
k8s-security.md
4
1 export k8s-security
2 kcns008 from "kcns008/cluster-code"
3 Kubernetes and OpenShift security assessment, hardening, and compliance. Use this skill when:(1) Auditing cluster or workload security posture(2) Implementing Pod Security Standards/Admission(3) Configuring RBAC roles and permissions(4) Setting up NetworkPolicies for zero-trust(5) Managing Secrets securely (encryption, external secrets)(6) Scanning images for vulnerabilities(7) Implementing OCP SecurityContextConstraints(8) Compliance checking (CIS benchmarks, SOC2, PCI-DSS)(9) Security incident investigation(10) Hardening cluster components
2026-01-05
backend-api-patterns.md
4
1 export backend-api-patterns
2 duyet from "duyet/duyetbot-agent"
3 Backend and API implementation patterns for scalability, security, and maintainability. Use when building APIs, services, and backend infrastructure.
2026-01-05
hammer-test-suite-generator.md
4
1 export hammer-test-suite-generator
2 Ronin15 from "Ronin15/SDL3_HammerEngine_Template"
3 Generates complete test suite infrastructure (test scripts, functional tests, benchmark tests, output directories, CMake integration) for a new SDL3 HammerEngine system or manager following project conventions. Use when adding a new manager or system that needs testing infrastructure.
2026-01-05
webapp-testing.md
4
1 export webapp-testing
2 NickCrew from "NickCrew/claude-cortex"
3 Toolkit for interacting with and testing local web applications using Playwright. Use when verifying frontend functionality, debugging UI behavior, capturing browser screenshots, and viewing browser logs.
2026-01-05
k8s-troubleshooting.md
4
1 export k8s-troubleshooting
2 kcns008 from "kcns008/cluster-code"
3 Comprehensive Kubernetes and OpenShift cluster health analysis and troubleshooting based on Popeye's issue detection patterns. Use this skill when:(1) Proactive cluster health assessment and security analysis(2) Analyzing pod/container logs for errors or issues(3) Interpreting cluster events (kubectl get events)(4) Debugging pod failures: CrashLoopBackOff, ImagePullBackOff, OOMKilled, etc.(5) Diagnosing networking issues: DNS, Service connectivity, Ingress/Route problems(6) Investigating storage issues: PVC pending, mount failures(7) Analyzing node problems: NotReady, resource pressure, taints(8) Troubleshooting OCP-specific issues: SCCs, Routes, Operators, Builds(9) Performance analysis and resource optimization(10) Security vulnerability assessment and RBAC validation(11) Configuration best practices validation(12) Reliability and high availability analysis
2026-01-05
secrets-gitleaks.md
4
1 export secrets-gitleaks
2 AgentSecOps from "AgentSecOps/SecOpsAgentKit"
3 Hardcoded secret detection and prevention in git repositories and codebases using Gitleaks. Identifies passwords, API keys, tokens, and credentials through regex-based pattern matching and entropy analysis. Use when: (1) Scanning repositories for exposed secrets and credentials, (2) Implementing pre-commit hooks to prevent secret leakage, (3) Integrating secret detection into CI/CD pipelines, (4) Auditing codebases for compliance violations (PCI-DSS, SOC2, GDPR), (5) Establishing baseline secret detection and tracking new exposures, (6) Remediating historical secret exposures in git history.
2026-01-05
backend-passport-js.md
4
1 export backend-passport-js
2 petbrains from "petbrains/mvp-builder"
3 Authentication middleware for Express.js and Node.js applications. Use when building Express APIs that need JWT authentication, OAuth, or custom auth strategies. Provides 500+ authentication strategies. Choose Passport.js over Auth.js for Express backends, pure API servers, or when you need maximum control over auth flow.
2026-01-05
schema-e2e-validation.md
4
1 export schema-e2e-validation
2 terrylica from "terrylica/cc-skills"
3 Run Earthly E2E validation for YAML schema contracts. Use when validating YAML schema changes, testing schema contracts against live ClickHouse, or regenerating Python types, DDL, and docs from YAML. For SQL schema design and optimization, use clickhouse-architect skill instead.
2026-01-05
debugging-and-diagnosis.md
4
1 export debugging-and-diagnosis
2 outfitter-dev from "outfitter-dev/agents"
3 Systematic debugging methodology using evidence-based investigation to identify root causes. Use when encountering bugs, errors, unexpected behavior, failing tests, or intermittent issues. Enforces four-phase framework (root cause investigation, pattern analysis, hypothesis testing, implementation) with the iron law NO FIXES WITHOUT ROOT CAUSE FIRST. Covers runtime errors, logic bugs, integration failures, and performance issues. Useful when debugging, troubleshooting, investigating failures, or when --debug flag is mentioned.
2026-01-05
threat-modeling-techniques.md
4
1 export threat-modeling-techniques
2 NickCrew from "NickCrew/claude-cortex"
3 Threat modeling methodologies using STRIDE, attack trees, and risk assessment for proactive security analysis. Use when designing secure systems, conducting security reviews, or identifying potential attack vectors in applications.
2026-01-05
forensics-osquery.md
4
1 export forensics-osquery
2 AgentSecOps from "AgentSecOps/SecOpsAgentKit"
3 SQL-powered forensic investigation and system interrogation using osquery to query operating systems as relational databases. Enables rapid evidence collection, threat hunting, and incident response across Linux, macOS, and Windows endpoints. Use when: (1) Investigating security incidents and collecting forensic artifacts, (2) Threat hunting across endpoints for suspicious activity, (3) Analyzing running processes, network connections, and persistence mechanisms, (4) Collecting system state during incident response, (5) Querying file hashes, user activity, and system configuration for compromise indicators, (6) Building detection queries for continuous monitoring with osqueryd.
2026-01-05
local-setup.md
4
1 export local-setup
2 toolkit-ai from "toolkit-ai/magnet-mcp-server"
3 Interactive setup workflow for running the Magnet MCP server locally (project-specific, magnet-app directory only). Use when user says "local setup", "run locally", "test locally", "configure MCP", or "set up local development".
2026-01-05