This skill should be used when the user asks to "run pentest commands", "scan with nmap", "use metasploit exploits",...

Comprehensive PDF manipulation toolkit for extracting text and tables, creating new PDFs, merging/splitting...

Implement PCI DSS compliance requirements for secure handling of payment card data and payment systems. Use when...

Multi-agent orchestration patterns. Use when multiple independent tasks can run with different domain expertise or...

When the user wants help with paid advertising campaigns on Google Ads, Meta (Facebook/Instagram), LinkedIn,...

When the user wants to optimize post-signup onboarding, user activation, first-run experience, or time-to-value....