Router-First Architecture
Reference guide for Agentica multi-agent infrastructure APIs
AI-powered web search, research, and reasoning via Perplexity
Intelligently organizes your files and folders across your computer by understanding context, finding duplicates, suggesting better structures, and automating cleanup tasks. Reduces cognitive load...
Create beautiful visual art in .png and .pdf documents using design philosophy. You should use this skill when the user asks to create a poster, piece of art, design, or other static piece. Create...
Comprehensive code review workflow - parallel specialized reviews β synthesis
Code refactoring workflow - analyze β plan β implement β review β validate
Research-to-implement pipeline chaining 5 MCP tools with graceful degradation
Assists in writing high-quality content by conducting research, adding citations, improving hooks, iterating on outlines, and providing real-time feedback on each section. Transforms your writing...
Release preparation workflow - security audit β E2E tests β review β changelog β docs
Migration workflow - research β analyze β plan β implement β review
Implement technical plans from thoughts/shared/plans with verification
Planning agent that creates implementation plans and handoffs from conversation context
Test-driven development workflow with philosophy guide - plan β write tests β implement β validate
Document codebase as-is with thoughts directory for historical context
External research workflow for docs, web, APIs - NOT codebase exploration
Token-efficient code analysis via 5-layer stack (AST, Call Graph, CFG, DFG, PDG). 95% token savings.
Deep interview process to transform vague ideas into detailed specs. Works for technical and non-technical users.
Guide for writing ast-grep rules to perform structural code search and analysis. Use when users need to search codebases using Abstract Syntax Tree (AST) patterns, find specific code structures,...
Help address review/issue comments on the open GitHub PR for the current branch using gh CLI; verify gh auth first and prompt the user to authenticate if not logged in.