1222 results (9.6ms) page 10 / 62
ngxtm / devkit-parallel-agents exact

Multi-agent orchestration patterns. Use when multiple independent tasks can run with different domain expertise or when comprehensive analysis requires multiple perspectives.

ngxtm / devkit-job-application exact

Write tailored cover letters and job applications using your CV and preferred style

ngxtm / devkit-git-pushing exact

Stage, commit, and push git changes with conventional commit messages. Use when user wants to commit and push changes, mentions pushing to remote, or asks to save and push their work. Also...

ngxtm / devkit-nextjs-supabase-auth exact

Expert integration of Supabase Auth with Next.js App Router Use when: supabase auth next, authentication next.js, login supabase, auth middleware, protected route.

shipshitdev / library-nextra-writer exact

Expert in creating clear, comprehensive technical documentation with Nextra (Next.js-based docs framework), MDX, and modern documentation patterns. Use for documentation sites that need Next.js...

shipshitdev / library-nextjs-validator exact

Validate Next.js 16 configuration and detect/prevent deprecated patterns. Ensures proxy.ts usage, Turbopack, Cache Components, and App Router best practices. Use before any Next.js work or when...

ngxtm / devkit-chrome-devtools exact

Browser automation, debugging, and performance analysis using Puppeteer CLI scripts. Use for automating browsers, taking screenshots, analyzing performance, monitoring network traffic, web...

shipshitdev / library-gh-fix-ci exact

Inspect GitHub PR checks with gh, pull failing GitHub Actions logs, summarize failure context, then create a fix plan and implement after user approval. Use when a user asks to debug or fix...

ngxtm / devkit-pandas-pro exact

Use when working with pandas DataFrames, data cleaning, aggregation, merging, or time series analysis. Invoke for data manipulation, missing value handling, groupby operations, or performance optimization.

ngxtm / devkit-ethical-hacking-methodology exact

This skill should be used when the user asks to "learn ethical hacking", "understand penetration testing lifecycle", "perform reconnaissance", "conduct security scanning", "exploit...

shipshitdev / library-gh-address-comments exact

Help address review or issue comments on the open GitHub PR for the current branch using gh CLI; verify gh auth first and prompt the user to authenticate if not logged in.

ngxtm / devkit-product-strategist exact

Strategic product leadership toolkit for Head of Product including OKR cascade generation, market analysis, vision setting, and team scaling. Use for strategic planning, goal alignment,...

ngxtm / devkit-fine-tuning-expert exact

Use when fine-tuning LLMs, training custom models, or optimizing model performance for specific tasks. Invoke for parameter-efficient methods, dataset preparation, or model adaptation.

ngxtm / devkit-vulnerability-scanner exact

Advanced vulnerability analysis principles. OWASP 2025, Supply Chain Security, attack surface mapping, risk prioritization.

shipshitdev / library-husky-test-coverage exact

Set up or verify Husky git hooks to ensure all tests run and coverage stays above 80% (configurable) for Node.js/TypeScript projects. This skill should be used when users want to enforce test...

zartin790 / llm-system-template-agents-skills-patterns-tools-prompts-skill-creator exact

Guide for creating effective skills. This skill should be used when users

zartin790 / llm-system-template-agents-skills-patterns-tools-prompts-email-composer exact

Draft professional emails for various contexts including business, technical,

ngxtm / devkit-vercel-deployment exact

Expert knowledge for deploying to Vercel with Next.js Use when: vercel, deploy, deployment, hosting, production.

ngxtm / devkit-onboarding-cro exact

When the user wants to optimize post-signup onboarding, user activation, first-run experience, or time-to-value. Also use when the user mentions "onboarding flow," "activation rate," "user...

ngxtm / devkit-security-reviewer exact

Use when conducting security audits, reviewing code for vulnerabilities, or analyzing infrastructure security. Invoke for SAST scans, penetration testing, DevSecOps practices, cloud security reviews.