Create structured incident response runbooks with step-by-step procedures, escalation paths, and recovery actions....
Development
Code generation, debugging, testing, and development workflows
A set of resources to help me write all kinds of internal communications, using the formats that my company likes to...
Implement comprehensive testing strategies using Jest, Vitest, and Testing Library for unit tests, integration...
Guide for continuous improvement, error proofing, and standardization. Use this skill when the user wants to improve...
Refactor legacy codebases, migrate outdated frameworks, and
Automatic quality control, linting, and static analysis procedures. Use after every code modification to ensure...
Provide proven marketing strategies and growth ideas for SaaS and software products, prioritized using a marketing...
Master memory forensics techniques including memory acquisition, process analysis, and artifact extraction using...
This skill should be used when the user asks to "use Metasploit for penetration testing", "exploit vulnerabilities...
Develop React Native, Flutter, or native mobile apps with modern
Expert in secure mobile coding practices specializing in input
Master ES6+ features including async/await, destructuring, spread operators, arrow functions, promises, modules,...
Nest.js framework expert specializing in module architecture, dependency injection, middleware, guards,...
Master Next.js 14+ App Router with Server Components, streaming, parallel routes, and advanced data fetching. Use...
Next.js App Router principles. Server Components, data fetching, routing patterns.
Expert integration of Supabase Auth with Next.js App Router Use when: supabase auth next, authentication next.js,...
Implement NFT standards (ERC-721, ERC-1155) with proper metadata handling, minting strategies, and marketplace...
Guide for creating templates for the Obsidian Web Clipper. Use when you want to create a new clipping template,...
This skill should be used when the user asks to "plan a penetration test", "create a security assessment checklist",...
This skill should be used when the user asks to "run pentest commands", "scan with nmap", "use metasploit exploits",...
You are an expert AI-powered code review specialist combining automated static analysis, intelligent pattern...
Write idiomatic PHP code with generators, iterators, SPL data
Structured task planning with clear breakdowns, dependencies, and verification criteria. Use when implementing...
Create and optimize popups, modals, overlays, slide-ins, and banners to increase conversions without harming user...