Validate NIST SP 800-53 control implementation with evidence mapping, gap analysis, automated testing, and...
find ~/williamzujkowski/ -name "*.skill"
Evaluate zero-trust architecture maturity using CISA ZTMM with identity verification, device trust,...
Accessibility validation configuration
Usage examples and documentation
Design edge computing solutions with CDN integration, edge functions, IoT device management, and latency-optimized...
Consumer-driven contract test specifications (Pact, Spring Cloud Contract)
Optimize costs across AWS, GCP, Azure with cross-cloud waste detection, workload placement, commitment balancing,...
Phased rollout timeline with effort estimates
Create optimized Dockerfiles with multi-stage builds, security hardening, and vulnerability scanning for minimal,...
Generate C# .NET project scaffolding with dotnet CLI, xUnit/NUnit, StyleCop analyzers, and packaging (NuGet/Docker).
Validate design systems for accessibility (WCAG), responsive design, and component consistency with design token analysis.
Generate Python project scaffolding with Poetry/pipenv, pytest configuration, type hints (mypy), linting...
Hypermedia links for resource navigation (Level 3 REST)
Analyzes and optimizes frontend performance using Core Web Vitals, bundle analysis, lazy loading, image...
Schema compatibility and breaking change analysis
Design GraphQL schemas with federation, resolvers, dataloaders, n+1 query prevention, and schema stitching patterns
Design Azure solutions across compute, storage, networking, and serverless with cost optimization, security...
Human-readable remediation guidance ranked by severity
Detect and remediate infrastructure drift between IaC definitions and live state with continuous monitoring and...
Review identity and access management using NIST SP 800-63B guidelines with MFA enforcement, password policy, and...