Develop React Native, Flutter, or native mobile apps with modern
Development
Code generation, debugging, testing, and development workflows
Expert in secure mobile coding practices specializing in input
Master ES6+ features including async/await, destructuring, spread operators, arrow functions, promises, modules,...
Use when adding animations with Motion Vue (motion-v) - provides motion component API, gesture animations,...
Nest.js framework expert specializing in module architecture, dependency injection, middleware, guards,...
Master Next.js 14+ App Router with Server Components, streaming, parallel routes, and advanced data fetching. Use...
Next.js App Router principles. Server Components, data fetching, routing patterns.
Expert integration of Supabase Auth with Next.js App Router Use when: supabase auth next, authentication next.js,...
Implement NFT standards (ERC-721, ERC-1155) with proper metadata handling, minting strategies, and marketplace...
Use when implementing auth in Nuxt apps with @onmax/nuxt-better-auth - provides useUserSession composable, server...
Use when creating Nuxt modules: (1) Published npm modules (@nuxtjs/, nuxt-), (2) Local project modules (modules/...
Use when working on Nuxt 4+ projects - provides server routes, file-based routing, middleware patterns,...
Guide for creating templates for the Obsidian Web Clipper. Use when you want to create a new clipping template,...
This skill should be used when the user asks to "plan a penetration test", "create a security assessment checklist",...
This skill should be used when the user asks to "run pentest commands", "scan with nmap", "use metasploit exploits",...
You are an expert AI-powered code review specialist combining automated static analysis, intelligent pattern...
Write idiomatic PHP code with generators, iterators, SPL data
Structured task planning with clear breakdowns, dependencies, and verification criteria. Use when implementing...
Create and optimize popups, modals, overlays, slide-ins, and banners to increase conversions without harming user...
Write effective blameless postmortems with root cause analysis, timelines, and action items. Use when conducting...
Autonomously deep-scan entire codebase line-by-line, understand architecture and patterns, then systematically...
Expert guide on prompt engineering patterns, best practices, and optimization techniques. Use when user wants to...
Master network protocol reverse engineering including packet analysis, protocol dissection, and custom protocol...
Profile and optimize Python code using cProfile, memory profilers, and performance best practices. Use when...