Browse Skills
9063 skills found
microsim-standardization.md
4
1
export
microsim-standardization
2
from
"dmccreary/claude-skills"
from
"dmccreary/claude-skills"
3
This skill standardizes MicroSim directories by validating structure, metadata, documentation, and required components against a comprehensive quality checklist. Use this when auditing or upgrading a MicroSim to ensure it meets all documentation and structural standards, including index.md formatting, metadata.json validation, iframe embeds, and p5.js editor links.
2026-01-05
k8s-troubleshooting.md
4
1
export
k8s-troubleshooting
2
from
"kcns008/cluster-code"
from
"kcns008/cluster-code"
3
Comprehensive Kubernetes and OpenShift cluster health analysis and troubleshooting based on Popeye's issue detection patterns. Use this skill when:(1) Proactive cluster health assessment and security analysis(2) Analyzing pod/container logs for errors or issues(3) Interpreting cluster events (kubectl get events)(4) Debugging pod failures: CrashLoopBackOff, ImagePullBackOff, OOMKilled, etc.(5) Diagnosing networking issues: DNS, Service connectivity, Ingress/Route problems(6) Investigating storage issues: PVC pending, mount failures(7) Analyzing node problems: NotReady, resource pressure, taints(8) Troubleshooting OCP-specific issues: SCCs, Routes, Operators, Builds(9) Performance analysis and resource optimization(10) Security vulnerability assessment and RBAC validation(11) Configuration best practices validation(12) Reliability and high availability analysis
2026-01-05
k8s-security.md
4
1
export
k8s-security
2
from
"kcns008/cluster-code"
from
"kcns008/cluster-code"
3
Kubernetes and OpenShift security assessment, hardening, and compliance. Use this skill when:(1) Auditing cluster or workload security posture(2) Implementing Pod Security Standards/Admission(3) Configuring RBAC roles and permissions(4) Setting up NetworkPolicies for zero-trust(5) Managing Secrets securely (encryption, external secrets)(6) Scanning images for vulnerabilities(7) Implementing OCP SecurityContextConstraints(8) Compliance checking (CIS benchmarks, SOC2, PCI-DSS)(9) Security incident investigation(10) Hardening cluster components
2026-01-05
secrets-gitleaks.md
4
1
export
secrets-gitleaks
2
from
"AgentSecOps/SecOpsAgentKit"
from
"AgentSecOps/SecOpsAgentKit"
3
Hardcoded secret detection and prevention in git repositories and codebases using Gitleaks. Identifies passwords, API keys, tokens, and credentials through regex-based pattern matching and entropy analysis. Use when: (1) Scanning repositories for exposed secrets and credentials, (2) Implementing pre-commit hooks to prevent secret leakage, (3) Integrating secret detection into CI/CD pipelines, (4) Auditing codebases for compliance violations (PCI-DSS, SOC2, GDPR), (5) Establishing baseline secret detection and tracking new exposures, (6) Remediating historical secret exposures in git history.
2026-01-05
backend-api-patterns.md
4
1
export
backend-api-patterns
2
from
"duyet/duyetbot-agent"
from
"duyet/duyetbot-agent"
3
Backend and API implementation patterns for scalability, security, and maintainability. Use when building APIs, services, and backend infrastructure.
2026-01-05
schema-e2e-validation.md
4
1
export
schema-e2e-validation
2
from
"terrylica/cc-skills"
from
"terrylica/cc-skills"
3
Run Earthly E2E validation for YAML schema contracts. Use when validating YAML schema changes, testing schema contracts against live ClickHouse, or regenerating Python types, DDL, and docs from YAML. For SQL schema design and optimization, use clickhouse-architect skill instead.
2026-01-05
debugging-and-diagnosis.md
4
1
export
debugging-and-diagnosis
2
from
"outfitter-dev/agents"
from
"outfitter-dev/agents"
3
Systematic debugging methodology using evidence-based investigation to identify root causes. Use when encountering bugs, errors, unexpected behavior, failing tests, or intermittent issues. Enforces four-phase framework (root cause investigation, pattern analysis, hypothesis testing, implementation) with the iron law NO FIXES WITHOUT ROOT CAUSE FIRST. Covers runtime errors, logic bugs, integration failures, and performance issues. Useful when debugging, troubleshooting, investigating failures, or when --debug flag is mentioned.
2026-01-05
threat-modeling-techniques.md
4
1
export
threat-modeling-techniques
2
from
"NickCrew/claude-cortex"
from
"NickCrew/claude-cortex"
3
Threat modeling methodologies using STRIDE, attack trees, and risk assessment for proactive security analysis. Use when designing secure systems, conducting security reviews, or identifying potential attack vectors in applications.
2026-01-05
backend-master.md
4
1
export
backend-master
2
from
"petbrains/mvp-builder"
from
"petbrains/mvp-builder"
3
Master skill for TypeScript backend development. Decision framework for APIs (tRPC/REST), authentication (Auth.js/Passport), database (Prisma), validation (Zod), logging (Pino), testing (Vitest), and deployment (Docker). Routes to specialized skills for implementation. Use as entry point for any backend task.
2026-01-05
presentation-generator.md
4
1
export
presentation-generator
2
from
"glebis/claude-skills"
from
"glebis/claude-skills"
3
Generate interactive HTML presentations with neobrutalism styling, ASCII art decorations, and Agency brand colors. Outputs HTML (interactive with navigation), PNG (individual slides via Playwright), and PDF. References brand-agency skill for colors and typography. Use when creating presentations, slide decks, pitch materials, or visual summaries.
2026-01-05
forensics-osquery.md
4
1
export
forensics-osquery
2
from
"AgentSecOps/SecOpsAgentKit"
from
"AgentSecOps/SecOpsAgentKit"
3
SQL-powered forensic investigation and system interrogation using osquery to query operating systems as relational databases. Enables rapid evidence collection, threat hunting, and incident response across Linux, macOS, and Windows endpoints. Use when: (1) Investigating security incidents and collecting forensic artifacts, (2) Threat hunting across endpoints for suspicious activity, (3) Analyzing running processes, network connections, and persistence mechanisms, (4) Collecting system state during incident response, (5) Querying file hashes, user activity, and system configuration for compromise indicators, (6) Building detection queries for continuous monitoring with osqueryd.
2026-01-05
local-setup.md
4
1
export
local-setup
2
from
"toolkit-ai/magnet-mcp-server"
from
"toolkit-ai/magnet-mcp-server"
3
Interactive setup workflow for running the Magnet MCP server locally (project-specific, magnet-app directory only). Use when user says "local setup", "run locally", "test locally", "configure MCP", or "set up local development".
2026-01-05
sbom-syft.md
4
1
export
sbom-syft
2
from
"AgentSecOps/SecOpsAgentKit"
from
"AgentSecOps/SecOpsAgentKit"
3
Software Bill of Materials (SBOM) generation using Syft for container images, filesystems, and archives. Detects packages across 28+ ecosystems with multi-format output support (CycloneDX, SPDX, syft-json). Enables vulnerability assessment, license compliance, and supply chain security. Use when: (1) Generating SBOMs for container images or applications, (2) Analyzing software dependencies and packages for vulnerability scanning, (3) Tracking license compliance across dependencies, (4) Integrating SBOM generation into CI/CD for supply chain security, (5) Creating signed SBOM attestations for software provenance.
2026-01-05
ruby-rspec-tdd-implementer.md
4
1
export
ruby-rspec-tdd-implementer
2
from
"viamin/aidp"
from
"viamin/aidp"
3
Expert in Test-Driven Development using Ruby and RSpec framework
2026-01-05
swift-6-best-practices-guide.md
4
1
export
swift-6-best-practices-guide
2
from
"mosif16/codex-Skills"
from
"mosif16/codex-Skills"
3
A comprehensive guide to best practices in Swift 6+, covering architecture, concurrency, UI development, code style, dependencies, performance, and testing.
2026-01-05
project-context-discovery.md
4
1
export
project-context-discovery
2
from
"bostonaholic/dotfiles"
from
"bostonaholic/dotfiles"
3
Discover project structure, package managers, test frameworks, and automation without hardcoded assumptions
2026-01-05
rust-best-practices-guide.md
4
1
export
rust-best-practices-guide
2
from
"mosif16/codex-Skills"
from
"mosif16/codex-Skills"
3
A comprehensive guide to modern Rust best practices covering style, error handling, performance, concurrency, project organization, dependency management, documentation, testing, security, and CI.
2026-01-05
python-testing-patterns.md
4
1
export
python-testing-patterns
2
from
"NickCrew/claude-cortex"
from
"NickCrew/claude-cortex"
3
Python testing patterns and best practices using pytest, mocking, and property-based testing. Use when writing unit tests, integration tests, or implementing test-driven development in Python projects.
2026-01-05
secure-coding-practices.md
4
1
export
secure-coding-practices
2
from
"NickCrew/claude-cortex"
from
"NickCrew/claude-cortex"
3
Secure coding practices and defensive programming patterns for building security-first applications. Use when implementing authentication, handling user input, managing sensitive data, or conducting secure code reviews.
2026-01-05
backend-passport-js.md
4
1
export
backend-passport-js
2
from
"petbrains/mvp-builder"
from
"petbrains/mvp-builder"
3
Authentication middleware for Express.js and Node.js applications. Use when building Express APIs that need JWT authentication, OAuth, or custom auth strategies. Provides 500+ authentication strategies. Choose Passport.js over Auth.js for Express backends, pure API servers, or when you need maximum control over auth flow.
2026-01-05
claude-code-hooks.md
3
1
export
claude-code-hooks
2
from
"0xDarkMatter/claude-mods"
from
"0xDarkMatter/claude-mods"
3
Claude Code hook system for pre/post tool execution. Triggers on: hooks, PreToolUse, PostToolUse, hook script, tool validation, audit logging.
2026-01-05
k8s-security-policies.md
3
1
export
k8s-security-policies
2
from
"amurata/cc-tools"
from
"amurata/cc-tools"
3
本番グレードのセキュリティのためのNetworkPolicy、PodSecurityPolicy、RBACを含むKubernetesセキュリティポリシーの実装。Kubernetesクラスタのセキュリティ確保、ネットワーク分離の実装、Podセキュリティ標準の強制に使用します。
2026-01-05
reviewing-security.md
3
1
export
reviewing-security
2
from
"thkt/claude-config"
from
"thkt/claude-config"
3
OWASP Top 10-based security review and vulnerability detection. Triggers: セキュリティ, 脆弱性, XSS, SQL injection, SQLインジェクション, CSRF, 認証, 認可, 暗号化, OWASP, SSRF, パスワード, セッション, rate limiting, brute force, command injection, security misconfiguration.
2026-01-05
refactor.md
3
1
export
refactor
2
from
"channingwalton/dotfiles"
from
"channingwalton/dotfiles"
3
Improve code design without changing behaviour. Use for the REFACTOR phase of XP workflow. All tests must pass before and after.
2026-01-05